Skip to content

Latest commit

 

History

History
141 lines (92 loc) · 12.2 KB

index.md

File metadata and controls

141 lines (92 loc) · 12.2 KB

iCTF: the International Capture The Flag Competition

The International Capture The Flag ("iCTF") is a distributed, wide-area security exercise, which aims to test the security skills of the participants. The iCTF is one of the world's largest and longest-running educational hacking competitions and has the goal of educating students about security-related topics in a live setting.

iCTF 2024

The iCTF 2024 will take place from November 16, 2024, at 10 am Pacific Time to November 22, 2024, at 4pm Pacific Time.

As for the 2023 edition of the iCTF, there are going to be two separate competitions: a competition dedicated to high school teams (hiCTF) and a competition for college undergraduate students (uniCTF). Both competition will be challenge-based and will use CTFd as the platform.

Starting on August 19, we will make available the challenges from the 2023 edition of the iCTF through a CTFd instance, to help in preparation and training.

In addition, we will start publishing training content focused on high school teams, so that they can better prepare for the competition.

We will make registration available through a Google Form as soon as possible. Please check this web page regularly.

In the meanwhile, if you are interested in participating, please assemble a team! The only things you need are:

  • One or more persons
  • A cool name
  • A team advisor who has to be a teacher or a professor. No exception. The advisor is responsible for the ethical behavior of the team, and will be contacted in order to verify the legitimacy of the team.

You can register your team using this registration form.

You can watch an introductory presentation.

Join the iCTF discord channel, which contains pointers to training materials.

You can watch iCTF-related presentation in the iCTF YouTube playlist.

The 2024 iCTF is sponsored by the ACTION NSF AI Institute, and was organized by Shellphish and the UCSB Women in Computer Science group.

History and Background

The iCTF evolved from several security "live exercises" that were carried out locally by Prof. Giovanni Vigna at UC Santa Barbara, in 2001 and 2002.

Motivated by the students' enthusiasm for security competitions, Prof. Vigna carried out the first wide-area edition of the iCTF in December 2003. In that CTF, fourteen teams from around the United States competed in a contest to compromise other teams' network services while trying to protect their services from attacks. This historical contest included teams from UC Santa Barbara, North Carolina State University, the Naval Postgraduate School in Monterey, the West Point Academy, Georgia Tech, the University of Texas at Austin, and the University of Illinois, Urbana-Champaign.

In 2004, the iCTF evolved into a truly international exercise (hence, the name "iCTF"), which included teams from the United States, Austria, Germany, Italy, and Norway.

For many years, the iCTF was the world's largest educational security competition and helped popularize this type of event. In traditional editions of the iCTF competition, the goal of each team is to maintain a set of services so that they remain available and uncompromised throughout the contest. Each team also has to attempt to compromise the other teams' services. Since all the teams have access to an identical copy of the virtual host containing the vulnerable services, each team has to find vulnerabilities in their copy of the hosts and possibly fix the vulnerabilities without disrupting the services. At the same time, the teams have to leverage their knowledge about the vulnerabilities they found to compromise the servers run by other teams. Compromising a service allows a team to bypass the service's security mechanisms and to "capture the flag" associated with the service (a flag is just a string of characters, such as "Y0u F0und Th3 Fl4g".) These flags are then presented to the organizers as "proof of compromise" to receive "attack" points. The teams also receive "defense" points if they can keep their services functional and uncompromised. At the end of the competition, the team with the most points wins.

Throughout the years, new competition designs have been introduced that innovated the more "traditional" designs followed in the early editions of the competition.

More precisely, in 2008 the iCTF featured a separate virtual network for each team. The goal was to attack a terrorist network and defuse a bomb after compromising several hosts. This competition allowed for the recording of several parallel multi-stage attacks against the same network. The resulting dataset has been used as the basis for correlation and attack prediction research.

In 2009, the participants had to compromise the browsers of a large group of simulated users, steal their money, and create a botnet. This design focused particularly on the concept of drive-by attacks, in which users are lured into visiting websites that deliver attacks silently.

In 2010, the participants were part of a coalition that had to attack the rogue nation of Litya, ruled by the evil Lisvoy Bironulesk. A new design forced the team to attack the services supporting Litya's infrastructure only at specific times when certain activities were in progress. In addition, an intrusion detection system would temporarily firewall out the teams whose attacks were detected.

In 2011, the participants had to "launder" their money through the execution of exploits, which had some risks associated with them. This created an interesting exercise in evaluating the risk/reward trade-offs in network security.

In both 2012 and 2013, teams had to "weaponize" their exploits and give them to the organizer, who would then schedule their execution. This last design was a first step towards the creation of a "cyber-range" where interesting network datasets (with ground truth) can be created to support security research.

In 2014, the competition was used as a way to publicize the iCTF Framework. To this end, the vulnerable virtual machine contained 42 services from previous iCTF editions, which forced the participants to effectively triage their efforts.

In 2015, the iCTF followed a novel design: to participate, the teams had to provide a vulnerable service that would become part of the competition. As a result, the 2015 iCTF featured 35 new services (and 35 teams) and tested a new set of skills, in addition to attack and defense: the ability to create a well-balanced vulnerable service.

In 2016, we decided to permanently move the competition to March (and since the decision was made in October, there was no iCTF event in that year).

In March 2017, the iCTF was run using Amazon's cloud. All components were run in an enclave, and the competition, for the first time, was open to the world, resulting in more than 280 teams participating. Until then, only academic teams were allowed to participate. As part of this competition, we released the iCTF framework, which is the software infrastructure used to run the competition. The framework is available for download on GitHub: https://github.com/shellphish/ictf-framework

In March 2019, the iCTF competition continued to be hosted on Amazon AWS infrastructure and introduced a new way of creating and deploying services using containers. The competition was held on March 15th, 2019 with almost 400 teams participating.

In March 2020, the iCTF competition featured a novel component-based deployment mode, that allowed for greater scalability.

In December 2021, we themed the competition around Decentralized Finance (DeFi), while operating under the duress introduced by COVID.

In 2022, we didn't have a competition, largely due to the impact of COVID-19 on all of Shellphish's activities.

The iCTF 2023 took place on December 2-8, 2023. The iCTF 2023 was sponsored by the ACTION NSF AI Institute, and was organized by Shellphish and the UCSB Women in Computer Science group.

This edition of the competition had a different design and scope with respect to previous editions of the iCTF. First, of all the competition moved from its traditional attack/defense structure to a challenge-based one. Second, the competition lasted for a whole week. Third, the iCTF was actually composed of two separate competitions, one dedicated to high school teams and one dedicated to undergraduate students (the teams were vetted and needed to have an academic advisor, going back what was done in the early versions of the iCTF).

  • The winner of the high school iCTF competition was team where's my pwnthic cakes from Çorlu Arif Nihat Asya Anadolu Lisesi (Turkey). The full scoreboard is available here
  • The winner of the undergraduate iCTF competition was team b01lers from Purdue University (USA). The full scoreboard is available here

Publications

The organizers of the iCTF have published a number of papers about various aspects of designing and organizing security competitions:

  • "How Shall We Play a Game: A Game-Theoretical Model for Cyber-warfare Games," by Tiffany Bao, Yan Shoshitaishvili, Ruoyu Wang, Christopher Kruegel, Giovanni Vigna, and David Brumley, in Proceedings of the IEEE Computer Security Foundations Symposium (CSF), Santa Barbara, CA, August 2017.

  • "Shell We Play A Game? CTF-as-a-service for Security Education," by Erik Trickel, Francesco Disperati, Eric Gustafson, Faezeh Kalantari, Mike Mabey, Naveen Tiwari, Yeganeh Safaei, Adam Doupe, and Giovanni Vigna, in Proceedings of the USENIX Workshop on Advances in Security Education (ASE), Vancouver, BC, August 2017.

  • "Ten Years of iCTF: The Good, The Bad, and The Ugly," by Giovanni Vigna, Kevin Borgolte, Jacopo Corbetta, Adam Doupe, Yanick Fratantonio, Luca Invernizzi, Dhilung Kirat, and Yan Shoshitaishvili, in Proceedings of the USENIX Summit on Gaming, Games and Gamification in Security Education (3GSE), San Diego, CA, August 2014.

  • "Do You Feel Lucky? A Large-Scale Analysis of Risk-Rewards Trade-Offs in Cyber Security," by Yan Shoshitaishvili, Luca Invernizzi, Adam Doupe, and Giovanni Vigna, in Proceedings of the ACM Symposium on Applied Computing (SAC), Gyeongju, Korea, March 2014.

  • "Formulating Cyber-Security as Convex Optimization Problems," by Kyriakos Vamvoudakis, Joao Hespanha, Richard Kemmerer, Giovanni Vigna in Control of Cyber-Physical Systems, Lecture Notes in Control and Information Sciences, July 2013.

  • "Influence of team communication and coordination on the performance of teams at the iCTF competition," by S. Jariwala, M. Champion, P. Rajivan, and N. Cooke, in Proceedings of the Annual Conference of the Human Factors and Ergonomics Society, Santa Monica, CA, 2012.

  • "Hit 'em Where it Hurts: A Live Security Exercise on Cyber Situational Awareness," by Adam Doupe, Manuel Egele, Benjamin Caillat, Gianluca Stringhini, Gorkem Yakin, Ali Zand, Ludovico Cavedon, Giovanni Vigna, in Proceedings of the Annual Computer Security Applications Conference (ACSAC), Orlando, FL, December 2011.

  • "Organizing Large Scale Hacking Competitions," by Nicholas Childers, Bryce Boe, Lorenzo Cavallaro, Ludovico Cavedon, Marco Cova, Manuel Egele, Giovanni Vigna, in Proceedings of the Conference on Detection of Intrusions and Malware and Vulnerability Assessment (DIMVA), Bonn, Germany, July 2010.

  • "Teaching Network Security Through Live Exercises," by Giovanni Vigna, in Proceedings of the Third Annual World Conference on Information Security Education (WISE), Monterey, CA, June 2003.

  • "Teaching Hands-On Network Security: Testbeds and Live Exercises," by Giovanni Vigna, in Journal of Information Warfare, vol. 3, no. 2, February 2003.

Point Of Contact

The International Capture The Flag (iCTF) is organized by Shellphish.

For information contact [email protected].