About

About this competition

Awards and Prizes

We know that all teams need more than just the notion of learning to be motivated. This is why we have some awesome awards thanks to our generous sponsors.

The prizes are as follows:

  • First place: HackRF and 30.000 ISKR for each team member
  • Second place: 20.000 ISKR for each team member
  • Third place: 10.000 ISKR for each team member

We will also give T-shirts to the top 5 teams.

Note that we must be able to contact you via email! If you do not enter a valid email or do respond within the given time, we will give the prize to the next qualifying team.

IceCTF

IceCTF is a computer security contest targeted at anyone with an interest in computer science. The game consists of a series of challenges where participants must reverse engineer, break, hack, decrypt, or do whatever it takes to solve the challenge. The challenges are all set up with the intent of being hacked, making it a great way to get some hands-on experience.

Challenge yourself and learn new concepts. You never really know how good you are at security and computer science until you really try it out. You might just win.

Don't know anything about computer science or cyber-security? Fear not. IceCTF is designed to accommodate both novice and advanced players alike. Many challenges will guide you to the right resources. As long as you're willing to learn and do a little research, most challenges should be within reach. Check out the FAQ for some tips.

Rules

We can't really stop you from not obeying the rules. However, infractions will result in disqualification depending on the severity.

  • Do not share flags with other teams.
  • Be fair. Obey the team size limit of 3.
  • Duplicate teams composed of the same individuals are not allowed.
  • Try to solve problems rather than brute-forcing the submission system. The probability that you will succeed is very small. Seriously.
  • Do not DDoS or DoS. Sending continuous requests when a challenge calls for such methods is perfectly acceptable. If you know how to perform these attacks, put your skills to better use by solving the challenges. Don't ruin the fun for everyone.
  • Limit the use of automated tools, crawlers, or scanners that send continuous requests over a prolonged period of time. None of these are required to solve any of the challenges.
  • Have fun and learn.