InCTF 2014

Amrita University and Amrita Centre for Cyber Security

proudly present

InCTF ’14

National Level “Capture the Flag” style ethical hacking contest

Not a day passes when several machines are compromised and infections spread rampantly in the world today. The cyber world has witnessed several dangerous attacks including the Stuxnet virus and it’s successor Duqu. Other recent attacks include the Flame malware, which managed to disguise itself as a legitimate Windows software. It exploited a bug in Windows to obtain a certificate which allowed itself to authenticate itself as genuine Windows software. Other notable examples include rise of botnets such as the highly resilient Zeus banking trojan and the Conficker worm. There have also been instances of espionage by government agencies on one another such as the recent incident where Georgia CERT discovered a Russian hacker spying on them.

Indian websites offer little or no resistance to such attacks. The Computer Emergency Response Team, India has been tracking defacements of Indian websites amongst other security incidents. Their monthly and annual bulletins detail the various vulnerabilities and malware infections in various Indian websites. It’s really sad that with so much talent and skill, Indian websites are compromised frequently and nothing can be done to stand this wave of attacks on them. InCTF is a Capture the Flag style ethical hacking contest, a strategic war-game designed to mimic the real world security challenges. Software developers in India have little exposure to secure coding practices and the effects of not adopting such practices-one of the main reasons why systems are compromised quite easily these. Following such simple practices can help prevent such incidents. InCTF ‘14 is from December 2013 to March 2014 and is focused exclusively on the student community. You can participate from your own university and no travel is required. No prior exposure or experience in cyber security needed to participate.

What you need to do?

  1. Form a team (minimum three and maximum five members from your college).
  2. Approach a faculty/mentor and request him/her to mentor your team.
  3. Register online at InCTF portal.

Great Rewards

See Prizes.

  1. Teams are awarded prizes based on their performance.
  2. Deserving teams are well awarded. Exciting prizes to be won.

So, what are you waiting for? It’s simple: Register, Learn, Hack!

Keep up with us


Form a team (min. of 3 and max. of 5 students per team).
Complete the online registration before 10:00 AM on 14th February, 2014. Register(as an individual first), then create a team using the InCTF Contest Portal. Each team must have a mentor. A mentor is a faculty member of the college who can help you. Students in a team must be from the same college.
Once you complete the team registration the team members can login to the portal and access the first round questions. The first round is a learning round. You can refer and find solutions to the questions you receive. We’ll provide you with hints if needed.The last date for submission of solutions to the questions is 14th February 2014 upto 7:00 P.M. Solutions must be submitted in PDF format. If there are any attachments, kindly send them as an archive along with the PDF.
The skills you gained will be tested in the second round. In the second round teams will be tested on binary exploitation, forensics, reverse engineering and web based exploits. All teams can take part in the second round. In case of a tie, the first round will be used to break it. The second round will be held from 15th February, 2014 to on 23rd February, 2014.
The exciting final attack defence style CTF round will be held online using a VPN. More details will be published later on.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s