2021 Cybersecurity Conference present
Built into this year’s Cybersecurity Conference is yet another exciting Cybersecurity Hackathon. The American Business Council Nigeria (ABC Nigeria) is partnering with Private Sector partners to host the Cybersecurity Hackathon 2022.
The Council wishes to draw attention to the talents that exist in this space whilst highlighting the need to help build capacity that not only strengthens the cybersecurity ecosystem but also competes on a global level.
It is the desire of ABC and its partners to have the hackathon encourage discussions about upskilling and mentorship, cyber-attacks and how to mitigate them, and the state of the nation’s cybersecurity regulatory framework.
The Hackathon will offer prizes such as Internship Opportunities for winners, Laptops, Cybersecurity Certificates, Cisco Certified CyberOps Associate, Certification for Teams’ Captains, and Merchandise for the teams.
The Cybersecurity Hackathon is open to students, experts, and freelance cybersecurity personnel who have experience working in the Cybersecurity space and have shown some level of expertise.
To be eligible, an applicant must:
Applications are due on August 15th at 4pm (Nigeria time).
Questions regarding the competition must be submitted via email to info@abccCyberHackathon.org. Questions and answers will be posted to the website for all potential applicants.
The Cyber Hackathon will have two rounds. The qualifying round will be held from the 16th to the 18th of August virtually, while the final round will be held on the 24th of August. The top three will be awarded on the 25th of August at the 2021 Cybersecurity Conference by the Minister of Communications and Digital Economy.
CTF (Capture The Flag) is a special type of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on public websites to basic programming exercises, to hacking your way into a server to retrieve sensitive data.
CTF consists of a series of challenges that vary in their degree of difficulty, and that require participants to exercise different skillsets to solve. Once an individual challenge is solved, a “flag” is given to the player, and they submit this flag to the CTF server to earn points. Players can be lone wolves who attempt the various challenges by themselves, or they can work with others to attempt to score the highest number of points as a team.
CTF events are usually timed, and the points are totaled once the time has expired. The winning player / team will be the one that solved the most challenges and thus secured the highest score.
These types of tasks usually require some sort of programming to solve. In most cases, it will involve a mixture of programming and some reverse engineering.
These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.
These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.
These are web-related tasks where you need to find real world vulnerabilities in web applications.
For tasks like this, you are given an executable where you need to reverse the functionality and extract the embedded flag.
Participants will be tasked with either recovering the digital trail left on a computer, finding data which is seemingly deleted, not stored, or worse, covertly recorded.
Tasked with finding information hidden in files, images, audio tapes, etc.