Hackathon
Days:
2 Dayes
Time
10:00 AM – 4:00 PM
Hackathon : JIC Capture the Flag (CTF)
Cybersecurity Competition
Event Overview
The Capture the Flag (CTF) Cybersecurity Competition is a dynamic two-day event crafted to immerse participants in an environment that balances competition with collaboration, fostering both individual growth and team synergy. Designed to mirror real-world cybersecurity scenarios, the event challenges participants to tackle hands-on, practical problems across domains such as web security, reverse engineering, cryptography, binary exploitation (PWN), and digital forensics.
Key Features:
- Structure & Participation
- 30 participantsare grouped into teams of 3–5 members, encouraging strategic teamwork and knowledge-sharing.
- Over two days, teams engage in 60 unique challenges(30 per day), each categorized by difficulty: Easy (50–100 points), Medium (150–200 points), and Hard (250–300 points).
- Real-World Focus
- Challenges simulate actual cybersecurity threats, such as:
- Penetration Testing: Identifying vulnerabilities in web applications.
- Cryptanalysis: Decrypting encoded messages or cracking cipher algorithms.
- Incident Response: Analyzing forensic artifacts (e.g., disk images, logs) to uncover hidden flags.
- Participants use industry-standard tools (e.g., Wireshark, Ghidra, Metasploit) to solve problems, bridging theory and practice.
- Competitive-Collaborative Balance
- Teams compete on a live leaderboardto earn points, but the event also promotes collaborative learning. For example:
- Knowledge-sharing during breaks.
- Mentorship from on-site cybersecurity specialists(for general guidance, not solutions).
- Penalties for unethical practices (e.g., hacking other teams) ensure fair play.
- Educational & Professional Benefits
- Skill Development: Enhances technical expertise in threat detection, ethical hacking, and system hardening.
- Networking: Connects participants with peers, faculty, and industry professionals.
- Awareness: Highlights the importance of cybersecurity in safeguarding digital infrastructure.
- Outcome & Recognition
- Top teamsreceive awards (trophies, tech gadgets, certificates) at a dedicated award ceremony.
- All participants earn certificates of completion, adding value to academic and professional portfolios.
Event Schedule
Day 1:
- Start: 12:00 AM
- End: 4:00 PM
Day 2:
- Start: 10:00 AM
- End: 2:00 PM
Hackathon : JIC Capture the Flag (CTF)
Cybersecurity Competition
Event Overview
The Capture the Flag (CTF) Cybersecurity Competition is a dynamic two-day event crafted to immerse participants in an environment that balances competition with collaboration, fostering both individual growth and team synergy. Designed to mirror real-world cybersecurity scenarios, the event challenges participants to tackle hands-on, practical problems across domains such as web security, reverse engineering, cryptography, binary exploitation (PWN), and digital forensics.
Key Features:
- Structure & Participation
- 30 participantsare grouped into teams of 3–5 members, encouraging strategic teamwork and knowledge-sharing.
- Over two days, teams engage in 60 unique challenges(30 per day), each categorized by difficulty: Easy (50–100 points), Medium (150–200 points), and Hard (250–300 points).
- Real-World Focus
- Challenges simulate actual cybersecurity threats, such as:
- Penetration Testing: Identifying vulnerabilities in web applications.
- Cryptanalysis: Decrypting encoded messages or cracking cipher algorithms.
- Incident Response: Analyzing forensic artifacts (e.g., disk images, logs) to uncover hidden flags.
- Participants use industry-standard tools (e.g., Wireshark, Ghidra, Metasploit) to solve problems, bridging theory and practice.
- Competitive-Collaborative Balance
- Teams compete on a live leaderboardto earn points, but the event also promotes collaborative learning. For example:
- Knowledge-sharing during breaks.
- Mentorship from on-site cybersecurity specialists(for general guidance, not solutions).
- Penalties for unethical practices (e.g., hacking other teams) ensure fair play.
- Educational & Professional Benefits
- Skill Development: Enhances technical expertise in threat detection, ethical hacking, and system hardening.
- Networking: Connects participants with peers, faculty, and industry professionals.
- Awareness: Highlights the importance of cybersecurity in safeguarding digital infrastructure.
- Outcome & Recognition
- Top teamsreceive awards (trophies, tech gadgets, certificates) at a dedicated award ceremony.
- All participants earn certificates of completion, adding value to academic and professional portfolios.
Event Schedule
Day 1:
- Start: 12:00 AM
- End: 4:00 PM
Day 2:
- Start: 10:00 AM
- End: 2:00 PM
Thanks for plugins

CTFer