Home / News / PH03N1X V1P3R N0V4 CTF

PH03N1X V1P3R N0V4 CTF

## PH03N1X V1P3R N0V4 CTF

PH03N1X V1P3R N0V4 CTF a new ctf in town. A CTF with a twist. Because its aim is to teach rather than focus on competition side.The approach we’ll utilize is the following: during the 3 day competition at multiple points we’ll freeze the scoreboard, and well split the 40 teams in 2, so 20/20. Than say group A will have to teach or explain to group b a certain challenge randomly chosen. Now if group B manages to solve it they are still allowed to keep competing. If they don’t manage to solve it they won’t be allowed to continue the competition. This method encourages peer based learning. \
A physical presence unique event not only on the way the ctf takes place, but unique cause it’s only one stage so no qualifiers.

Event will contain embedded pwn(arduino pwn+ re),space hacking(kudos to EthosLabsLLC), mainframe hacking(special thanks to soldier of fortran), bomb defusal, normal pwn, web, crypto ,forensics, powerpc,ic(cmos) revese engineering, nday development, docker escape, and car hacking, ics&scada(shoutout i0.rs group), browser pwn. Event will be from 29-31 October, physically in Timisoara, Romania.

Currently looking for sponsors, current sponsor: @fuzzysec\
prize sponsors: caido, metactf, cyberwarfare labs\
media sponsors&partners: i0.rs, uav.ro, cyberedu, defcon Cluj,calpyso heavy industries\
challenge sponsors: i0.rs, ethos labs, Alex Hornyai@ecsc team hungary, soldier of fortran,0xmard

Should you wish to participate in the event, please fill the form(https://docs.google.com/forms/d/e/1FAIpQLSdKO7QZKdwNRuakt7WoYnb6Fzq1Jxrx6fI8r8gJtdXDFkJRRA/viewform?usp=dialog) and join the discord or visit pwnctf.ro. Please fill it only if you consider attending it very seriously !

If any problems should arise while filling in the form please reach @f00fc7c800 on twitter!\

PH03N1X V1P3R N0V4 CTFPH03N1X V1P3R N0V4 CTF a new ctf in town.
A CTF with a twist.
Than say group A will have to teach or explain to group b a certain challenge randomly chosen.
A physical presence unique event not only on the way the ctf takes place, but unique cause it’s only one stage so no qualifiers.
If any problems should arise while filling in the form please reach @f00fc7c800 on twitter!

PH03N1X V1P3R N0V4 CTF

PH03N1X V1P3R N0V4 CTF a new ctf in town. A CTF with a twist. Because its aim is to teach rather than focus on competition side.The approach we’ll utilize is the following: during the 3 day competition at multiple points we’ll freeze the scoreboard, and well split the 40 teams in 2, so 20/20. Than say group A will have to teach or explain to group b a certain challenge randomly chosen. Now if group B manages to solve it they are still allowed to keep competing. If they don’t manage to solve it they won’t be allowed to continue the competition. This method encourages peer based learning.
A physical presence unique event not only on the way the ctf takes place, but unique cause it’s only one stage so no qualifiers.

Event will contain embedded pwn(arduino pwn+ re),space hacking(kudos to EthosLabsLLC), mainframe hacking(special thanks to soldier of fortran), bomb defusal, normal pwn, web, crypto ,forensics, powerpc,ic(cmos) revese engineering, nday development, docker escape, and car hacking, ics&scada(shoutout i0.rs group), browser pwn. Event will be from 29-31 October, physically in Timisoara, Romania.

Currently looking for sponsors, current sponsor: @fuzzysec
prize sponsors: caido, metactf, cyberwarfare labs
media sponsors&partners: i0.rs, uav.ro, cyberedu, defcon Cluj,calpyso heavy industries
challenge sponsors: i0.rs, ethos labs, Alex Hornyai@ecsc team hungary, soldier of fortran,0xmard

Should you wish to participate in the event, please fill the form(https://docs.google.com/forms/d/e/1FAIpQLSdKO7QZKdwNRuakt7WoYnb6Fzq1Jxrx6fI8r8gJtdXDFkJRRA/viewform?usp=dialog) and join the discord or visit pwnctf.ro. Please fill it only if you consider attending it very seriously !

If any problems should arise while filling in the form please reach @f00fc7c800 on twitter!

Tagged:

Leave a Reply

Your email address will not be published. Required fields are marked *