RuCTFE 2011 RulesThe spirit of the challengeIt is difficult to give a complete set of rules of CTF challenge. Aim of this challenge is not to find out the best. True professionals are incomparable. The main goal is to share experience and knowlege in the field of computer security. Nevertheless, the luckiest team will become a winner :)Destructive attacks (like "rm -rf /"), as well as DoS attacks with a great amount of garbage traffic, contradict with the spirit of the challenge. Be ready for any operating system and any programming language. You're professionals, aren't you? DefinitionsTeamA group of people with a captain.
ServiceA vulnerable application written for the challenge.
FlagA string that matches regex: /^\w{31}=$/.
Team is given points for
Teams are prohibited to:
PermissionsTeams may patch vulnerabilities in ther services or block exploitation of vulnerabilities.AdvisoryAdvisory is a message on vulnerability in the game image. Organizers evaluate advisories, teams earn scores for them. For complete vulnerability description one can get maximum of 10 points. Maximal score for the advisory depends on the complexity of vulnerability described, its difficulty to find, exploit and patch. If there is another scored advisory on the same vulnerability then the score for your advisory is difference between these two advisories (but not less that 0). Advisory is published to all teams after 30 minutes after scoring. Advisories will be accepted until one hour before the end of the game. Full description of vulnerability consists of Description
PatchIt may be in the following forms:
ExploitThe source code that exploits this vulnerability on a remote server. The exploit should be at least in a proof of concept format.Organizers
ExceptionsTeams should meet organizers decisions in critical situations, which may not have been listed here, with understanding.Still organizers do their best to steer clear of such. |