Winners
1st Place - $2k/ea
Hubert @Hacking
2nd Place - $1.25k/ea
Shell We Hack?
3rd Place - $750/ea
CyberSpies
CTF Score Board
Challenges
Organizing Committee
Luna Etihad
Anthony Andreoli
Alireza Toghiani
Ali-Moussa Darkallah
Dhiaa Elhak Rebbah
Anis Lounis
Hugo Kermabon
Event Workshops and Presentations
Create Your Own Networked CTFs Using Docker Containers
The workshop will teach the participants about how they can leverage docker and it's orchestration tools to quickly create and deploy their own CTFs. The participants will get plenty of hands on with docker and docker-compose by working on multiple demos along with the presenter. The participant will gain a good foundational knowledge of containers and their advantages, and can use the same later to not just create their own CTFs, but other distributed systems and networks to play around with various services and create a home lab.
A machine running Ubuntu is recommended, windows seems to have issues with docker-compose. The machine must have docker, as well as docker-compose installed. Optionally, you can also have a code editor of your choice. This can be done by following the instructions on the following
Docker-Compose - https://docs.docker.com/compose/install/
VSCode (Optional) - https://code.visualstudio.com/download
CISSP Unveiled: A Journey into Cybersecurity Excellence
Delve into Gaurav's triumphant journey, unraveling essential tips for CISSP aspirants, complemented by Md. Saiduzzamans' wealth of experience in the industry, as he prepares for the exam with 9 years of cybersecurity expertise. Explore their unique perspectives and study tactics, gaining valuable insights into the path of CISSP success. Beyond the exam, join us in navigating the expansive realm of cybersecurity, where we offer a comprehensive view for cyber-enthusiasts. Uncover key strategies, and embark on a journey that not only opens doors to CISSP success but also provides a broader understanding of the ever-evolving field of cybersecurity.
Developing Secure Cloud Applications with DevOps and AI
This presentation covers best practices for developing secure cloud applications using Amazon Web Services, DevOps principles and practices, integrating security testing, and leveraging AI for behavioral analysis and threat detection.
- Will present a demo and bring links to the participants. Bring the cellphone with camera!
- At the end of the presentation, a copy format PDF could be shared with the participants.