- Webinar |
- USA 2024 |
- Netherlands 2023 |
- USA 2023 |
- Netherlands 2022 |
- USA 2022 |
- Netherlands 2021 |
- USA 2021 |
- Germany 2021 |
- Berlin 2021 |
- Netherlands 2020 |
- Virtual Con 2020 |
- Berlin 2020 |
- Netherlands 2019 |
- USA 2019 |
- Berlin 2019 |
- Netherlands 2018 |
- Berlin 2018 |
- Netherlands 2017 |
- Netherlands 2016 |
- Netherlands 2015
Date & Time
DAY 1 (9th July) | 10:00 am - 2:00 pm PDT |
DAY 2 (10th July) | 10:00 am - 1:00 pm PDT |
Overview
Capture the Signal takes part at Hardwear.io Virtual Con!
Capture the Signal (CTS) is a new challenge-based CTF that focuses exclusively on the reverse engineering of radio signals. This activity is also known as "blind signal analysis" as the signals' specification are unknown to the attacker. This contest is organized by renowned community radio-hackers for researchers, hackers, and practitioners in the field!
Contestants should use their RF-hacking kung-fu and tools like GNURadio, GQRX, URH, Python, C, anything, to examine a series of increasingly complex radio signals to extract key information leading them to the final, exit signal.The game runs virtually, over Internet. The radio signals will be distributed "over IP". The use of IP eliminates the complexity of deploying actual radios and transmitting RF over the air. We use GNURadio for that.
GNURadio natively supports the tunneling of signals via ZeroMQ, so that the players can focus on the real challenge: reverse engineer the protocols without bothering the distribution of the signals. For the same reason, we provide ready-to-use scripts to remotely access the radio streams, as setting up the GNURadio toolchain is time consuming and is not relevant to the core of the challenge.
We also provide a VM image with all needed software to reverse engineer the signals. Of course, participants are welcome in using their own setup.
Each radio signal corresponds to a challenge. The challenges are sorted by difficulty, and each solved challenge gives you access to the next one. In other words, the flag contained in each signal represents the clue to the next radio signal.
Remember to submit the flag to our portal for validation because the more challenges you solve, the more points you gain. Points for challenges are statically assigned and are proportional to the difficulty of the challenge. The first participants to solve a challenge will receive higher number of points. At the end of the competition, the team with highest total points will be named the winner. In the case of two different teams having the same points, whichever team was quickest to reach this high score will be declared the champion.
Check-in
To facilitate the start of the game, for example in configuring your machine e.g. downloading and installing the software we provide to simplify the connection to our infrastructure, we suggest you "showing up" on Discord 24 hours before the event starts.
Format of the Game
- When the game starts, we will officially announce the entry endpoint (ip:port).
- The contests should connect to the communicated endpoint to receive the first radio stream, either by using their GNURadio toolchain or the scripts that we supplied.
- The first and second signal could be processed using basic signal analysis techniques and visualization software.
- The third signal will contain encoded data, likely with simple digital encodings, and the decoded digital data will contain the next hint.
- The challenge will continue in this fashion with an increasingly difficult set of digital signals to demodulate and decode.
Participation Prerequisite
- You will need to register on the scoreboard to submit the flags. (Registration Link)
- The scoreboard contains all info needed to play, e.g. tools to access the CTS infrastructure. Please read it carefully.
- CTF team will use Discord for communication & coordination: (Discord Channel)
Disclaimer
We try hard to keep the competition as free and exciting as possible; however we do require teams to adhere to a few simple rules:
- Show up on time or you’ll miss the briefing
- No cooperation between teams with independent accounts. Sharing of solutions or providing revealing hints to other teams is cheating: don’t do it!
- No attacking the competition infrastructure. If bugs or vulns are found, please alert the competition organizers immediately. Hint: you might get free hints for responsible disclosure.
- Absolutely no sabotaging of other competing teams, or in any way hindering their independent competition progress.
- No brute forcing of challenge flag/ keys against the scoring server.
- DoSing the CTF platform or any of the jeopardy challenges services is forbidden.
[Brought to you by @embyte, @phretor, @rfidiot and J.A. with the support by Trend Micro Research, XForce RED and Hardwear.io]
Position | Prizes |
---|---|
Winner |
|
1st Runner Up |
|
2nd Runner Up |
|
Hospital Under Siege
Date & Time: 8th July 2021
Hospital Under Siege, a scenario-driven Capture the Flag contest, pits teams of participants against adversaries and a clock, to protect human life and public safety. Participants compete against each other on both real and simulated medical devices, integrated into the fully immersive Biohacking Village: Device Lab, laid out as a working hospital. Teams of any size are welcome, as are players from all backgrounds and skill levels. Challenges will be tailored for all skill levels and draw from expertise areas including forensics, RF hacking, network exploitation techniques, web security, protocol reverse engineering, hardware hacking, and others. You will hack actual medical devices and play with protocols like DICOM, HL7 and FHIR.
Position | Prizes |
---|---|
Winner |
|
1st Runner Up |
|
2nd Runner Up |
|