We are excited to announce BSides:TC will host a small Capture the Flag event oriented towards junior-mid level analysts who want to explore some of the challenges cyber threat researchers, analysts, and reverse engineers may encounter.

Each flag can be completed in 1-2 sittings. There are 7 flags, rated between Easy – Medium and focuses on reverse engineering primarily over offensive security.

The CTF will open on October 10th, 1 week prior to the conference, and solutions will be posted online at the end of the conference.

Rules

Players are expected to have access to a laptop with virtualization capabilities and a Linux machine (x86 and ARM should be fine).

Players will be provided a binary and need to obtain 7 flags. Execution of the binary will be required (hence virtualization is required).

This is just for fun – there are no scores nor winners. We are all here to learn share knowledge and learn something new.

The 2025 BSides:CTF is now live!

Download the file and execute the binary to start the CTF. While the challenge performs ZERO network communication, it is good practice to execute and analyze files in an isolated VM.

Download:

password is “bsidestc”

Requirements:

  • x86_64 Linux machine