RuCTF


Channel's geo and language: Russia, Russian
Category: Technologies


RuCTFE is an annual online international challenge in the information security.
PoC: @AAAlexeev.
RuCTF.org

Related channels

Channel's geo and language
Russia, Russian
Statistics
Posts filter


Greetings! We are pleased to announce that registration for RuCTF 2023 is officially open!

🦎 This year's event is slated for November 4th, starting at 10:00 UTC.
To sign up, just fill out the registration form at ructf.org. Before the competition begins, we will provide you with all the necessary information to access the game network.

🦎 For this edition of RuCTF, we've delved into the realm of conspiracy theories. One particularly intriguing theory, in our opinion, revolves around the ancient Rus and their supposed conflict with the enigmatic "Lizards." This theme will be central to our competition. So brace yourselves for an adventure that's out of this world!

🦎 You can find more information about this confrontation on the internet, we intentionally do not include any links to avoid offending genuine researchers who want to investigate it on their own. So, put on your tin foil hats, draw the curtains, and get ready for an exciting competition!

P.S. You are welcome to join our Discord community right now ❤️

3.5k 2 79 12 18



We invite you to take a participation in cybersecurity international team competitions BRICS+ Capture The Flag. The qualification stage will be online in CTF Jeopardy format. The best teams will be able to compete in the final, which will be held online in CTF Attack-Defense format.

The CTF is for any academic/professional team from all around the world. Top-3 teams from each of the 5 BRICS countries (Brazil, Russia, India, China and South Africa) and 10 international teams will be invited to the final round.

🏆 XCTF gives the best team in Quals a spot in the 8th XCTF final
💰 Prize pool of the finals is 800 000 roubles

➡️ Quals registration link: https://quals.brics-ctf.ru/


Only 🔤🔤 days left until the competition.

Hurry up if you want to join our 2-day Attack-Defence CTF!

🔤 https://2023.ctf.hitb.org/


This year, we have prepared a special training game to allow all participants to get a hands-on experience with our infrastructure before the main CTF event. As a registered participant, you will have access to the CTF Cloud Console, where you can launch a virtual machine with the service, search for vulnerability, hack another team, and protect your own service from potential attackers. This training will help you become more familiar with the rules of the upcoming CTF and our checking system.

To guide you through these steps, we've created a detailed step-by-step guide, which you can find here: https://2023.ctf.hitb.org/hitb-ctf-phuket-2023/training.

Don't be intimidated by the size of the guide. If you're already familiar with Attack-Defense CTFs, you should be able to complete it in an hour at most. However, if this is your first time participating in such a CTF, the training game is highly recommended. You can play the training game at any time before the competition starts, but we advise against waiting until the last moment, as we may be busy the day before the competition and may not be able to assist with any issues that arise 🙃.

So, go ahead and take the training game now and make sure to share it with your teammates: https://2023.ctf.hitb.org/hitb-ctf-phuket-2023/training. Completing the training will also earn your team bonus points in the main game.

And if you haven't registered for our CTF yet, what are you waiting for? 😉


Over the past four years, Hackerdom (the organizer and developer of RuCTF) has collaborated closely with Hack in the Box conferences, hosting exciting Attack-Defence CTFs as part of their events.

The upcoming conference will take place in August in Phuket, Thailand, and Hackerdom is once again organizing a grand CTF, offering participants the option to either join on-site in Phuket or play online! The competition is scheduled for August 24-25, with a break for the night, and teams of up to 5 people can participate. The top-performing teams will not only win cash prizes but also receive an invitation to the PRO CTF, slated for the spring of 2024 in the UAE.

With interesting services, our cloud infrastructure handling all the hosting, and top teams from around the world as competitors, it's bound to be an exhilarating experience.

Don't miss out, register now at https://2023.ctf.hitb.org/!


Our final results for international standings!

1. 🇷🇺 C4T BuT S4D
2. 🇮🇹 pwnthem0le
3. 🇷🇺 Bushwhackers

Congrats!


First-bloods:
1. museumorphosis: kks
2. lost_museum: C4T BuT S4D
3. solaris: C4T BuT S4D
4. Hermicache: C4T BuT S4D
5. sneakers: SPRAVEDLIVAЯ RUSH A
6. Stalker: C4T BuT S4D
7. Bookster: SPRAVEDLIVAЯ RUSH A
8. DCS: pwnthem0le
9. SCP: no auto-sploited firstblood

Please, leave your feedback for us to know, how you liked the game. The form can be filled by any player of any team — we're here to listen to you.
Also, vote for us on CTF Time.


Finally, we have prepared our repo and now it is available at this link.
Thank you all for your participation.

With


Competition has been finished.
Results will be published soon.

Thanks for participation!
See you on the next event ;)


"wetox" got real first blood on service "SCP” 👼!


“pwnthem0le” got real first blood on service “DCS” 🌊!


"SPRAVEDLIVAЯ RUSH A" got real first blood on service "Bookster" 📖 !


C4T BuT S4D got real first-blood on “Stalker” service 🌌!


Bushwhackers got 4 firstbloods!

Bookster!
Scp!
dcs!
Stalker!

But!
All flags has been stolen from "smiley-from-telega", Only 1 flag per service has been sent.
Traffic mirroring, farm leak or 4 sploits? Who knows...


SPRAVEDLIVAЯ RUSH A got their firstblood on service “sneakers”!


Network is open!
Have a nice game!


Network is closed!
You have an hour for dinner :)


C4T BuT S4D got firstblood on 🫅 "Hermicache”!
Three in a row!


C4T BuT S4D first blood on service “solaris” 🌞!


Our late annouce C4T BuT S4D had first blood on service “lost_museum”😱!

20 last posts shown.

860

subscribers
Channel statistics