Skip to content

CTF Competition Types

Jeopardy: Problem Solving

The problem-solving (Jeopardy) is a common format in online CTF competitions. In a Jeopardy CTF, the participating teams can participate through the Internet or the on-site network. Furthermore, teams can use the online environment to communicate and share files, solve technical challenges, and submit the answers to score points.

Generally in a Jeopardy CTF the first three teams that solve a challenge will be rewarded with extra points. Typically, the first three solves are called the first blood , second blood, and the third blood. This scoring format not only rewards teams who can solve the challenge quickly, but also shows teamwork through collaboration.

Besides that, there's also another popular rule focusing on "decreasing participants' points", which means to set a original point for a challenge at the start, and gradually get it lower according to the number of teams who have solved it. The point of a challenge will keep being decreased as more teams have successfully solved it, and stops at a lowest point and finally keep unchanged.

Currently, there are six main categories in CTF:

  • Web – Web Application Exploitation
  • RE - Reverse Engineering
  • Pwn - Binary Exploitation
  • Crypto - Cryptography Security
  • Mobile - Mobile Security
  • Misc - Miscellaneous

Belluminar: War Sharing

Belluminar mode was developed by POC SECURITY from South Korea, and was introduced into China since World Hacking Masters Challenge (WCTF) in 2016.

You can refer to Belluminar's official website for more information: http://belluminar.org/ .

Introduction to the Belluminar System

Here's the introduction from Belluminar's official website:

Belluminar, hacking contest of POC, started at POC2015 in KOREA for the first time. Belluminar is from 'Bellum'(war in Latin) and 'seminar'. It is not a just hacking contest but a kind of festival consisted of CTF & seminar for the solution about challenges. Only invited teams can join Belluminar. Each team can show its ability to attack what other teams want to protect and can defend what others want to attack.

Stage of Making the Challenges

First, each invited team must submit two challenges before the official competition. The teams will have 12 weeks to prepare their challenges. The score of making challenges accounted for 30% of the total team score.

Challenge 1: must be on the Linux platform;

Challenge 2: No platform restriction(except Linux) No challenge type restriction (Pwn, Reverse...)

Traditional Belluminar systems require each team to make two challenges. One of the challenges must be in Linux, while the other has no platform(except Linux) or challenge type restriction. Therefore, teams can show their skill and creativity.

In order to make the types of challenges more balanced, teams have to draw for their challenge type. This requires the team's skill level to be more comprehensive. In order to maintain balance, the two challenges might have different scores (For example, one might need to be the score of 200, while the other be the score of 100).

Submitting and Deploying Challenges

Before the deadline of challenge submitting , each team must submit a full document and a solve writeup of the challenges. The document must contain the challenge name, score, description, creator, knowledge needed, and source code of the challenge. However, the solve write-up only needs to include the operating environment, full solving process, and solve script/code.

After the challenges have been submitted, the organizers will test the challenges and code. If issues were found, the person responsible for the challenge must help to solve the problems. Then, the challenges can be put on the competition platform.

During the Competition

After entering the competition, each team can request to solve other teams' challenges. Typically there's no First Blood reward here. The ranking is based on the accumulated points earned by solving the challenges; points earned from challenges account for 60% of the overall points.

Discussion After the Competition

After the game is over, each team need to prepare slides for their own challenges. During the sharing meeting, each team needs to have two members to share their intended solutions, learning process, knowledge points, etc. Once the presentative is over, open discussion begins. The two team representatives must answer questions from other players or judges. While they don’t have a time limit on answering questions, however, the time used is a variable in the scoring process.

Scoring Rules

Scores from creating challenges (30% of overall score) – 50% of the points are based on the level of details, completion, submit time, and the other 50% of the points coms from solved challenges. The formula is as follows: Score = MaxScore -- | N -- Expect_N | N is the number of teams that solved this challenge. Expect_N is the number of teams expected to solve this challenge. Only when the challenge’s difficulty is balanced, the number of teams solved this challenge will be closer to the number of teams expected to solve this challenge, the challenge’s creator will earn more points.

Score from solving challenges (60% of overall score) – First Blood is not included in the calculation.

Score from sharing – (10% of overall score) – Scores based on the content during the sharing meeting voted by players and judges (account for the time taken and other restrictions), will be calculated as an average.

Thoughts on the Belluminar System

The Belluminar system handed over the responsibility of creating challenges to the invited teams, where each team do their best to create challenges for each other. The difficulty and scope of the competition will not be restricted by the organizer, so the quality of the challenges will improve. The “Sharing” phase allows each team to explain their challenges. The open discussion process enables the sharing of creative ideas/methods. The “Sharing” phase after the competition is a great way for others players to learn.

Attack and Defense Mode - Attack & Defense

Overview

The Attack and Defense competitions are usually done offline, especially the final stages of some huge CTF competitions. In Attack and Defense mode, each team will have the same copy of a specific system environment, often referred to as the “Gamebox”. On the attacking side, teams need to discover vulnerabilities on services running on the opponent’s machine, then exploit them to score by obtaining the flag. On the defending side, teams need to patch existing vulnerabilities to stop losing points (usually defending and patching are the only way to stop losing points, of course, in some competitions successful defending can be rewarded with points).

An Attack and Defend competition not only tests the team’s technical skills but also tests the players' body (since most competitions last about 48 hours). At the same time, team members need to split up the tasks and work together on solving different problems.

Usually, the competition organizer will disclose the details on the requirements 30 minutes or 1 day before the competition. During that time, you cannot attack. You need to get familiar with the given environment and prepare to defend based on the given requirements. You will need to discover the opponent Gamebox’s IP address using the given subnet.

If the two Attack and Defend sessions are between morning and afternoon, then the vulnerable services will get changed (in case players talk about them during the break). However, the IP address and what will not change.

Normally, the organizer will provide ethernet cables, but not ethernet adopters.

Basic Rules

The general rules of attack and defense mode are as follows:

  • The teams will start with same points.
  • During each round, the organizer will update which service contains the released flag.
  • During each round, if a team’s vulnerable service and the attacker obtained the flag via the vulnerable service, then the team will lose some points and the attacker will gain some points.
  • During each round, if a team can keep the its services running normally, then that team won’t lose points. (if defended successful, the points will be rewarded)
  • If a team’s service goes down, then the team will lose points, which distributed to teams that had their service running normally. Often, service downtime and errors will result in more deduction of points.
  • If all teams’ service goes down during a round and it is determined to be unavoidable. Then, no points will be deducted.
  • During each round, if a service goes down and a team gets the flag, the team responsible for the service may get deduct double the points.
  • The uses of general defense methods are forbidden. The participating teams should backup all services before the competition. If a service gets lost or damaged, the organizer will not restore it.
  • It is forbidden to attack the competition platform, including but not limited obtaining root in Gameebox. The offender immediately banned from the competing.
  • If the team finds violations of other teams, please report them immediately and we will strictly review and make corresponding judgments.

Network Environment

The document will usually contain a network topology map (as shown below). Each team will maintain some Gamebox (one’s own server), vulnerable services are deployed on the Gamebox.

network

The document will include the area of the players, the attack and defense zone, and the organizer’s or third party’s environment.

Players environment includes (players need to configure or use DHCP to obtain the following configuration):

  • IP address
  • Gateway
  • Subnet
  • DNS server address

Attack and defense environment includes:

  • The IP addresses of their own and the other teams' Gamebox.
  • The competition usually provides a table of team ids with their corresponding IP address to make planning easier.

Organizer environment includes:

  • Competition platform
  • Submit flag portal
  • Traffic dashboard

Accessing Gamebox

The document provides the login details. Normally, it's like the following:

  • Username is ctf.
  • Login to SSH using a password or private key.

Tips: Default passwords should be changed immediately and weak passwords should not be used.