How much does it take to hack a mobile network?
Is electronic government secure
in the era of WikiLeaks and Anonymous?

Is SCADA hacking a Hollywood fiction
or the nowadays reality?
Internet banking: is there any chance to win
over the fraudsters?

Cyber-crimes, cyber-espionage, cyber-war: where do we draw a borderline?

Pages

Friday, April 5, 2013

Description of PHDays CTF Finals

The third international forum on practical security Positive Hack Days will take place on May 23-24. Today we publish rules of PHDays CTF Finals.


General Points
Only ten teams that scored the largest number of points during the qualifying stage take part in the contest. Each team includes no more than 7 participants (5 active players and 2 substitutes).

During the game, teams are allowed to:

  • Attack other teams’ services
  • Solve the tasks
  • Make any modifications of the provided servers unless it is explicitly prohibited by the rules
  • Use any number of computers and network equipment
  • Change topology of the team’s own network segment

During the game, teams are prohibited from:

  • Filtering the traffic of competing teams from the jury's traffic (e.g., by IP addresses)
  • Generating unreasonably high volume of traffic threatening the game infrastructure (of the jury or other teams)
  • Conducting attacks outside the game network
  • Attacking the jury’s computers
  • Conducting destructive attacks against the rivals’ servers (such as rm-rf/)
  • Performing the above actions in the guise of a rival team
  • Exploiting vulnerabilities of the tasks server to gain undeserved points

A team may be penalized or disqualified for a foul. Full information about the contest could be found on the forum's official website

Note
The jury reserves the right to specify the rules at any time before the game begins.

No comments:

Post a Comment