{"id":145,"date":"2025-09-27T18:02:26","date_gmt":"2025-09-27T18:02:26","guid":{"rendered":"https:\/\/bsidestc.org\/?page_id=145"},"modified":"2025-10-11T03:08:42","modified_gmt":"2025-10-11T03:08:42","slug":"bsidestc-2025-ctf","status":"publish","type":"page","link":"https:\/\/bsidestc.org\/bsidestc-2025-ctf\/","title":{"rendered":"BSides:TC 2025 CTF!"},"content":{"rendered":"\n<p>We are excited to announce BSides:TC will host a small <strong>Capture the Flag<\/strong> event oriented towards junior-mid level analysts who want to explore some of the challenges cyber threat researchers, analysts, and reverse engineers may encounter.<\/p>\n\n\n\n<figure class=\"wp-block-image aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"950\" height=\"1024\" src=\"https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/09\/image-2-950x1024.png\" alt=\"\" class=\"wp-image-159\" style=\"width:485px;height:auto\" srcset=\"https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/09\/image-2-950x1024.png 950w, https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/09\/image-2-278x300.png 278w, https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/09\/image-2-768x828.png 768w, https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/09\/image-2.png 966w\" sizes=\"auto, (max-width: 950px) 100vw, 950px\" \/><\/figure>\n\n\n\n<p>Each flag can be completed in 1-2 sittings. There are 7 flags, rated between <strong>Easy &#8211; Medium<\/strong> and focuses on reverse engineering primarily over offensive security. <\/p>\n\n\n\n<p><strong>The CTF will open on October 10th<\/strong>, 1 week prior to the conference, and solutions will be posted online at the end of the conference.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Rules<\/h2>\n\n\n\n<p>Players are expected to have access to a laptop with virtualization capabilities and a Linux machine (x86 and ARM should be fine).<\/p>\n\n\n\n<p>Players will be provided a binary and need to obtain 7 flags. Execution of the binary will be required (hence virtualization is required).<\/p>\n\n\n\n<p>This is just for fun &#8211; there are no scores nor winners. We are all here to learn share knowledge and learn something new.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The 2025 BSides:CTF is now live!<\/h2>\n\n\n\n<p>Download the file and execute the binary to start the CTF. While the challenge performs ZERO network communication, it is good practice to execute and analyze files in an isolated VM.<\/p>\n\n\n\n<p><strong>Download:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-d5dc8d1e-cd8f-4303-bc86-259435489e01\" href=\"https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/10\/ctf_elf.zip\"><strong>ctf_elf<\/strong><\/a><a href=\"https:\/\/bsidestc.org\/wp-content\/uploads\/2025\/10\/ctf_elf.zip\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d5dc8d1e-cd8f-4303-bc86-259435489e01\">Download<\/a><\/div>\n\n\n\n<p><strong>password is &#8220;bsidestc&#8221;<\/strong><\/p>\n\n\n\n<p>Requirements:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>x86_64 Linux machine<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>We are excited to announce BSides:TC will host a small Capture the Flag event oriented towards junior-mid level analysts who want to explore some of the challenges cyber threat researchers, analysts, and reverse engineers may encounter. Each flag can be completed in 1-2 sittings. There are 7 flags, rated between Easy &#8211; Medium and focuses [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-145","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/pages\/145","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/comments?post=145"}],"version-history":[{"count":12,"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/pages\/145\/revisions"}],"predecessor-version":[{"id":184,"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/pages\/145\/revisions\/184"}],"wp:attachment":[{"href":"https:\/\/bsidestc.org\/wp-json\/wp\/v2\/media?parent=145"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}