Cyber Security Challenge 2018 coming soon!
Looking to support us as a partner or sponsor ?
Then contact us at email@example.com
Based on the principles of a Capture The Flag (CTF), this computer security competition is a challenge-based game played by teams of maximum 4 students. Over a limited timeframe, the teams must solve challenges covering a wide range of security issues, e.g. cryptography, reverse engineering, network security, web or mobile application security, wireless and forensics analysis. Complexity of challenges range from trivial up to very difficult.
Anyone who is a student in a Belgian academic institution is allowed to compete in the qualifiers. Participants must be 18 years of age; if you or a member of your team has not reached that age, please contact us before registering.
For the finals, only teams that have at least one 'graduate student' (bachelor/university) member are eligible. For more information, consult the rules of engagement.
The top ten teams who are eligible to compete in the finals will be invited.
Of course! Challenges have been designed for students, not for security specialists, so you don’t need to be a security expert to join. A good general IT knowledge and a good level of motivation is what matters most.
A good way to get started with the Cyber Security Challenge Belgium is to take a look at write-ups from some of our past editions:Write-ups 2015 Write-ups 2016
Once you feel you’re ready to try and solve some challenges on your own, you could take a look at the "awesome-ctf repository": it contains a list of useful tools sorted per category (reversing, cryptography, web, …). It also contains a list of "wargames" available 24/7 for practicing.Awesome CTF
For example, the "overthewire wargames" feature a series of challenges, and suggests an order in which to play them based on their difficulty. There’s also an IRC chat channel available, so if you’re stuck you can always go ask for some help there.Overthewire wargames
The first "Qualifiers" round of the event will take place online: registration will provide each team member with an account to login.
The second "Final" round of the event will be hosted at a secret location in Brussels – more on this soon!
This challenge is an initiative of NVISO, a cyber-security consulting firm. It is supported by some of Belgium's largest private corporations (our sponsors), as well as public agencies and organizations that are committed to raising our country’s awareness on cyber-security threats and help train a generation of security-aware professionals and security experts. All sponsors are regularly recruiting talented graduates to re-inforce their security teams, so you may also be meeting your future employer at our event!
We have a wide range of challenges ranging from general security knowledge over mobile security to reverse engineering and cryptography. Some of them will be easy and others will be a challenge even for the more skilled participants. To get a feel for what you can expect you can always head over to the write-ups of the previous editions on GitHub (2015 and 2016). Don't expect a completly identical challenges for this year though!
You can email us at firstname.lastname@example.org. During the qualifiers, we will also be available through IRC on irc.freenode.org#CSCBE.