16

25

Aug 2021

2021 Cybersecurity Conference present

Cybersecurity Hackathon Competition

Starting in:

00 d
00 h
00 m
00 s

Overview

As part of the 2021 Cybersecurity Conference, the American Business Council Nigeria (ABC Nigeria) in partnership with Private Sector partners are hosting a Cybersecurity Hackathon. The objective of the hackathon is to highlight the capacity in the space and show the importance of implementing a cybersecurity framework in Nigeria.

The Hackathon will award innovators for displaying their level of expertise and skills in developing solutions to cyber challenges. A Cyber Award will be allocated in kind and will be distributed among the top three winners. 

Cyber Awards will be awarded to the top three teams. Prices includes Laptops, Cybersecurity Certificates, Bootcamp for winners on Security in IBM Cloud, Cisco Certified CyberOps Associate Certifications for the Team Captains and Merchandise. The Award is sponsored by Cisco, IBM, Comercio and American Business Council.

Organized:

Eligibility

The Cybersecurity Hackathon is open to students, experts, and freelance cybersecurity personnel who have experience working in the Cybersecurity space and have shown some level of expertise.

To be eligible, an applicant must:

Applicants must be above 18

You must be in a tertiary institution or finished from one

Must be a citizen of Nigeria.

You must indicate previous works done in the Cybersecurity space.

Not be a government agency, public administration, political organization, or non-profit of any type.

Not be an individual engaged in any illegal activity and not listed on the U.S. Department of the Treasury’s Sanctions List.

Application Process

  • Apply on www.abccCyberHackathon.org
  • Fill out the online application form on https://abcccyberhackathon.org/application. The following questions will be required in the application: The full name(s), Area of expertise in cybersecurity, Physical address, Website (if any), Email address, Phone number and Work(s) done
  • Wait for a follow up email to join our Discord channel.
  • You can register yourself or a team of ten. If you do not have a team, you will be paired with one.
  • Start Hacking!

Applications are due on August 15th at 4pm (Nigeria time).
Questions regarding the competition must be submitted via email to info@abccCyberHackathon.org. Questions and answers will be posted to the website for all potential applicants.

Selection Process

The Cyber Hackathon will have two rounds. The qualifying round will be held from the 16th to the 18th of August virtually, while the final round will be held on the 24th of August. The top three will be awarded on the 25th of August at the 2021 Cybersecurity Conference by the Minister of Communications and Digital Economy.

Task Entails the following

CTF (Capture The Flag) is a special type of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on public websites to basic programming exercises, to hacking your way into a server to retrieve sensitive data.

CTF consists of a series of challenges that vary in their degree of difficulty, and that require participants to exercise different skillsets to solve. Once an individual challenge is solved, a “flag” is given to the player, and they submit this flag to the CTF server to earn points. Players can be lone wolves who attempt the various challenges by themselves, or they can work with others to attempt to score the highest number of points as a team.

CTF events are usually timed, and the points are totaled once the time has expired. The winning player / team will be the one that solved the most challenges and thus secured the highest score.

The challenges will be split between the following:

These types of tasks usually require some sort of programming to solve. In most cases, it will involve a mixture of programming and some reverse engineering.

These challenges feature common “real world” scenarios that often include the ever-popular ransomware type of malware.

These tasks will force you to determine how to exploit (using buffer overflow, string format, SQL injection, etc.…) a given running process on the CTF target machine.

These are web-related tasks where you need to find real world vulnerabilities in web applications.

For tasks like this, you are given an executable where you need to reverse the functionality and extract the embedded flag.

Participants will be tasked with either recovering the digital trail left on a computer, finding data which is seemingly deleted, not stored, or worse, covertly recorded.

Tasked with finding information hidden in files, images, audio tapes, etc.

General Rules & Disclaimer

  • All applications must be submitted online and completed by 6th of August 11:59pm.
  • Only those applications submitted on time through the online application processes will be accepted. Applications received by any other means will not be considered.
  • Applicants are responsible for ensuring proper contact information has been submitted and is maintained throughout the Cybersecurity Hackathon Process to allow communications about the Cyber Hackathon Award.
  • Erroneous or false information provided in the application will result in immediate disqualification of the Applicant. ABC retain the right to disqualify any Applicant in their sole discretion.
  • If for any reason, the Cybersecurity Hackathon is not capable of running as planned, ABC reserves the right in its sole discretion to cancel, terminate, modify, or suspend the Cyber Hackathon Award Program at any time.
  • By submitting an Application, or by being an Applicant, you understand that there is no joint venture, partnership, employment, or an agency relationship between you and ABC or Partner Organization/ Companies arising from any application or Cyber Hackathon Award.
  • Once notified about having a finalist application approved and receiving an Award, a Recipient has three weeks to submit information for processing the Award payment. Not meeting that deadline will result in a forfeiture of the Award.
  • Award Recipients grant permission to ABC, and its Partners to use the name, logo, statements, including city and state of primary physical location, and the submitted Application information in perpetuity, worldwide, royalty-free in all media now known, or which may be developed in the future to promote the Cyber Hackathon Award Programme and its objectives.
  • The decisions of the Cybersecurity Hackathon are final, and Applicants specifically agree that the decision of the Program and any decision of ABC is not subject to review or appeal in any form whatsoever, including courts of law.
  • By submitting your email address and/or an Application, you consent to our processing of the included personal data in order to take action on the Application and to contact you about other programs you may be interested in.
  • No warranty of any type is provided for any award. No Award may be transferred to any other party.
  • By completing an Application or being an Applicant, you agree on behalf of yourself and each of your respective heirs, executors, administrators, legal representatives, agents, successors and assigns (“Releasing Party”) to the Cybersecurity Hackathon General Rules and the decisions of the competition, as applicable, and any affiliated entities or persons, and by completing an Application or being an Applicant, you release ABC, and their affiliates, advisors, agents, licensees, and any social or other media used for the Hackathon, and any of their respective officers, directors and employees as applicable (“Released Parties”), from any and all causes of action, suits, debts, dues, sums of money, accounts, reckonings, bonds, bills, covenants, contracts, controversies, promises, lost profits, indirect or direct damages, consequential damage, incidental damages, punitive or exemplary damages, judgments, claims and demands whosoever, in law, or equity, whether known or unknown, foreseen or unforeseen, which any Releasing Party has or may ever had, now or hereafter, arising from or related to the Cybersecurity Hackathon, these General Rules, any Application materials, including but not limited to any use or non-use of any Application materials, delivery, misdelivery, acceptance, possession, attendance at, travel related to, misuse, and/or use of or inability to use, any Award, or technical or other failures of any kind.

Sponsors & Partners

Sponsors:

Partners: