2021 Cybersecurity Conference present
As part of the 2021 Cybersecurity Conference, the American Business Council Nigeria (ABC Nigeria) in partnership with Private Sector partners are hosting a Cybersecurity Hackathon. The objective of the hackathon is to highlight the capacity in the space and show the importance of implementing a cybersecurity framework in Nigeria.
The Hackathon will award innovators for displaying their level of expertise and skills in developing solutions to cyber challenges. A Cyber Award will be allocated in kind and will be distributed among the top three winners.
Cyber Awards will be awarded to the top three teams. Prices includes Laptops, Cybersecurity Certificates, Bootcamp for winners on Security in IBM Cloud, Cisco Certified CyberOps Associate Certifications for the Team Captains and Merchandise. The Award is sponsored by Cisco, IBM, Comercio and American Business Council.
The Cybersecurity Hackathon is open to students, experts, and freelance cybersecurity personnel who have experience working in the Cybersecurity space and have shown some level of expertise.
To be eligible, an applicant must:
Applications are due on August 15th at 4pm (Nigeria time).
Questions regarding the competition must be submitted via email to info@abccCyberHackathon.org. Questions and answers will be posted to the website for all potential applicants.
The Cyber Hackathon will have two rounds. The qualifying round will be held from the 16th to the 18th of August virtually, while the final round will be held on the 24th of August. The top three will be awarded on the 25th of August at the 2021 Cybersecurity Conference by the Minister of Communications and Digital Economy.
CTF (Capture The Flag) is a special type of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on public websites to basic programming exercises, to hacking your way into a server to retrieve sensitive data.
CTF consists of a series of challenges that vary in their degree of difficulty, and that require participants to exercise different skillsets to solve. Once an individual challenge is solved, a “flag” is given to the player, and they submit this flag to the CTF server to earn points. Players can be lone wolves who attempt the various challenges by themselves, or they can work with others to attempt to score the highest number of points as a team.
CTF events are usually timed, and the points are totaled once the time has expired. The winning player / team will be the one that solved the most challenges and thus secured the highest score.
These types of tasks usually require some sort of programming to solve. In most cases, it will involve a mixture of programming and some reverse engineering.
These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
These are web-related tasks where you need to find real world vulnerabilities in web applications.
For tasks like this, you are given an executable where you need to reverse the functionality and extract the embedded flag.
Participants will be tasked with either recovering the digital trail left on a computer, finding data which is seemingly deleted, not stored, or worse, covertly recorded.
Tasked with finding information hidden in files, images, audio tapes, etc.