To widely promote cybersecurity knowledge, enhance students' awareness and skills in network security protection, and stimulate their enthusiasm for learning about network and information security, we are organizing the ninth "C1CTF" cybersecurity competition. The relevant matters are notified as follows:
I. Background of the Event
CTF (Capture The Flag), commonly translated as Capture the Flag competition in Chinese, refers to a type of technical contest among cybersecurity professionals. Its purpose is to popularize knowledge of network information security and guide information security enthusiasts into the field. CTF originated from the DEFCON Global Hacker Conference in 1996, replacing the previous method of hackers competing by launching actual attacks against each other. It has become a popular form of competition within the global cybersecurity community, with more than fifty international CTF events held worldwide in 2013. By hosting an intramural CTF competition, we aim to improve students' professional skills, cultivate high-quality skilled and applied talents that meet societal needs, enhance students' employability, and contribute to the training of high-quality information security confrontation professionals.
II. Event Organization
Hosted by: Undergraduate College Office of Innovation and Entrepreneurship Education
Organized by: School of Computer and Information Science
Co-organized by: C1Sec Cybersecurity Society
Technical Support by: Digital Qi An Technology Research Institute
III. Theme of the Event
"Cultivating Awareness of Cybersecurity, Unearthing Information Security Talents"
IV. Participants
All current students at our university
V. Competition Content
The competition content includes various knowledge points and techniques such as basic information security, network protocols, operating system security, cryptography and information encryption, firewall and intrusion detection, IP security, and Web security. It covers information discovery, reverse engineering, cryptography, Web vulnerabilities, binary overflow, forensics, SQL, scripting languages, assembly, script injection, deception and cross-site scripting, steganography in images, and other aspects of information security.
VI. Competition Date
March 30, 2024
VII. Registration Method
This competition adopts an online registration method. Please scan the QR code below for online registration:
For competition-related notices, see the QQ group.
VIII. Competition Format
Individual participation. Contestants may answer questions independently within the specified competition time.
IX. Prizes
The competition will award one first prize, two second prizes, three third prizes, and several excellence awards. The organizing committee will present certificates and prizes to the winners.
X. Notes
During the competition, exchanging answers or solution ideas is prohibited.
Attacking the competition platform during the event is not allowed. If discovered, participants will be disqualified.
The right to interpret this event belongs to the organizing committee. Any unaddressed issues will be announced separately!