3

4

Oct 2022

2022 Cybersecurity Conference present

Cybersecurity Hackathon Competition

Starting in:

00 d
00 h
00 m
00 s

Overview

Built into this year’s Cybersecurity Conference is yet another exciting Cybersecurity Hackathon. The American Business Council Nigeria (ABC Nigeria) & Commercio in partnership with Private Sector partners are hosting a Cybersecurity Hackathon 2022.

The Council wishes to draw attention to the talents that exist in this space whilst highlighting the need to help build capacity that not only strengthens the cybersecurity ecosystem but also competes on a global level.

It is the desire of ABC and its partners to have the hackathon that will encourage discussions about upskilling and mentorship, cyber-attacks and how to mitigate them, and the state of the nation’s cybersecurity regulatory framework.

Organized:

Eligibility

The Cybersecurity Hackathon is open to students, experts, and freelance cybersecurity personnel who have experience working in the Cybersecurity space and have shown some level of expertise.

To be eligible, an applicant must:

Applicants of any age group can participate

You must be in a tertiary institution or finished from one

Must be a citizen of Nigeria.

You must indicate previous works done in the Cybersecurity space.

Not be a government agency, public administration, political organization, or non-profit of any type.

Not be an individual engaged in any illegal activity and not listed on the U.S. Department of the Treasury’s Sanctions List.

Application Process

Apply and fill out the online application form HERE.

  • To register, you need to form a team. A team is made up of 4-6 participants.
  • Once the team captain registers the team, please wait for a follow up email to join our Discord channel.

Start Hacking!

Applications are due on October 2nd at 8pm (Nigeria time).
Questions regarding the competition must be submitted via email to info@abccCyberHackathon.org. Questions and answers will be posted to the website for all potential applicants.

Selection Process

The Cyber Hackathon will have one final round. This will be held from the 3rd to the 4th of October. The top three will be awarded on the 6th of October at the 2022 Cybersecurity Conference by the Minister of Communications and Digital Economy.

The Hackathon will offer prizes such as Internship Opportunities for winners, Laptops, Cybersecurity Certificates, Cisco Certified CyberOps Associate, Certification for Teams’ Captains, and Merchandise for the teams.

Task Entails the following

CTF (Capture The Flag) is a special type of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on public websites to basic programming exercises, to hacking your way into a server to retrieve sensitive data.

CTF consists of a series of challenges that vary in their degree of difficulty, and that require participants to exercise different skillsets to solve. Once an individual challenge is solved, a “flag” is given to the player, and they submit this flag to the CTF server to earn points. Players can be lone wolves who attempt the various challenges by themselves, or they can work with others to attempt to score the highest number of points as a team.

CTF events are usually timed, and the points are totaled once the time has expired. The winning player / team will be the one that solved the most challenges and thus secured the highest score.

The challenges will be split between the following:

Programming

These types of tasks usually require some sort of programming to solve. In most cases, it will involve a mixture of programming and some reverse engineering.

Cryptography

These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.

Exploitation

These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.

Web

These are web-related tasks where you need to find real world vulnerabilities in web applications.

Reverse Engineering

For tasks like this, you are given an executable where you need to reverse the functionality and extract the embedded flag.

Forensics

Participants will be tasked with either recovering the digital trail left on a computer, finding data which is seemingly deleted, not stored, or worse, covertly recorded.

Steganography

Tasked with finding information hidden in files, images, audio tapes, etc.

General Rules & Disclaimer

Click here to read the general rules and disclaimer

  • All applications must be submitted online and completed by 6th of August 11:59pm.
  • Only those applications submitted on time through the online application processes will be accepted. Applications received by any other means will not be considered.
  • Applicants are responsible for ensuring proper contact information has been submitted and is maintained throughout the Cybersecurity Hackathon Process to allow communications about the Cyber Hackathon Award.
  • Erroneous or false information provided in the application will result in immediate disqualification of the Applicant. ABC retain the right to disqualify any Applicant in their sole discretion.
  • If for any reason, the Cybersecurity Hackathon is not capable of running as planned, ABC reserves the right in its sole discretion to cancel, terminate, modify, or suspend the Cyber Hackathon Award Program at any time.
  • By submitting an Application, or by being an Applicant, you understand that there is no joint venture, partnership, employment, or an agency relationship between you and ABC or Partner Organization/ Companies arising from any application or Cyber Hackathon Award.
  • Once notified about having a finalist application approved and receiving an Award, a Recipient has three weeks to submit information for processing the Award payment. Not meeting that deadline will result in a forfeiture of the Award.
  • Award Recipients grant permission to ABC, and its Partners to use the name, logo, statements, including city and state of primary physical location, and the submitted Application information in perpetuity, worldwide, royalty-free in all media now known, or which may be developed in the future to promote the Cyber Hackathon Award Programme and its objectives.
  • The decisions of the Cybersecurity Hackathon are final, and Applicants specifically agree that the decision of the Program and any decision of ABC is not subject to review or appeal in any form whatsoever, including courts of law.
  • By submitting your email address and/or an Application, you consent to our processing of the included personal data in order to take action on the Application and to contact you about other programs you may be interested in.
  • No warranty of any type is provided for any award. No Award may be transferred to any other party.
  • By completing an Application or being an Applicant, you agree on behalf of yourself and each of your respective heirs, executors, administrators, legal representatives, agents, successors and assigns (“Releasing Party”) to the Cybersecurity Hackathon General Rules and the decisions of the competition, as applicable, and any affiliated entities or persons, and by completing an Application or being an Applicant, you release ABC, and their affiliates, advisors, agents, licensees, and any social or other media used for the Hackathon, and any of their respective officers, directors and employees as applicable (“Released Parties”), from any and all causes of action, suits, debts, dues, sums of money, accounts, reckonings, bonds, bills, covenants, contracts, controversies, promises, lost profits, indirect or direct damages, consequential damage, incidental damages, punitive or exemplary damages, judgments, claims and demands whosoever, in law, or equity, whether known or unknown, foreseen or unforeseen, which any Releasing Party has or may ever had, now or hereafter, arising from or related to the Cybersecurity Hackathon, these General Rules, any Application materials, including but not limited to any use or non-use of any Application materials, delivery, misdelivery, acceptance, possession, attendance at, travel related to, misuse, and/or use of or inability to use, any Award, or technical or other failures of any kind.

Sponsors & Partners

Sponsors:

Partners: