2022 Cybersecurity Conference present
Built into this year’s Cybersecurity Conference is yet another exciting Cybersecurity Hackathon. The American Business Council Nigeria (ABC Nigeria) & Commercio in partnership with Private Sector partners are hosting a Cybersecurity Hackathon 2022.
The Council wishes to draw attention to the talents that exist in this space whilst highlighting the need to help build capacity that not only strengthens the cybersecurity ecosystem but also competes on a global level.
It is the desire of ABC and its partners to have the hackathon that will encourage discussions about upskilling and mentorship, cyber-attacks and how to mitigate them, and the state of the nation’s cybersecurity regulatory framework.
The Cybersecurity Hackathon is open to students, experts, and freelance cybersecurity personnel who have experience working in the Cybersecurity space and have shown some level of expertise.
To be eligible, an applicant must:
Apply and fill out the online application form HERE.
Applications are due on October 2nd at 8pm (Nigeria time).
Questions regarding the competition must be submitted via email to info@abccCyberHackathon.org. Questions and answers will be posted to the website for all potential applicants.
The Cyber Hackathon will have one final round. This will be held from the 3rd to the 4th of October. The top three will be awarded on the 6th of October at the 2022 Cybersecurity Conference by the Minister of Communications and Digital Economy.
The Hackathon will offer prizes such as Internship Opportunities for winners, Laptops, Cybersecurity Certificates, Cisco Certified CyberOps Associate, Certification for Teams’ Captains, and Merchandise for the teams.
CTF (Capture The Flag) is a special type of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on public websites to basic programming exercises, to hacking your way into a server to retrieve sensitive data.
CTF consists of a series of challenges that vary in their degree of difficulty, and that require participants to exercise different skillsets to solve. Once an individual challenge is solved, a “flag” is given to the player, and they submit this flag to the CTF server to earn points. Players can be lone wolves who attempt the various challenges by themselves, or they can work with others to attempt to score the highest number of points as a team.
CTF events are usually timed, and the points are totaled once the time has expired. The winning player / team will be the one that solved the most challenges and thus secured the highest score.
These types of tasks usually require some sort of programming to solve. In most cases, it will involve a mixture of programming and some reverse engineering.
These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
These are web-related tasks where you need to find real world vulnerabilities in web applications.
For tasks like this, you are given an executable where you need to reverse the functionality and extract the embedded flag.
Participants will be tasked with either recovering the digital trail left on a computer, finding data which is seemingly deleted, not stored, or worse, covertly recorded.
Tasked with finding information hidden in files, images, audio tapes, etc.