diff --git a/_pages/patriotctf.html b/_pages/patriotctf.html index 76af0e9..022c5e3 100644 --- a/_pages/patriotctf.html +++ b/_pages/patriotctf.html @@ -28,113 +28,111 @@

You are being redirected to - - + + console.log(is_mobile); -
-
-
- -
-
- PatriotCTF 2024
Hosted by MasonCC
Virtual, September 20 @ 6:00pm EDT - September 22 @ 6:00pm EDT -
-
-
-
+ if (!is_mobile) { + canvas(); + Particles.init({ + selector: '.background', + color: [ + "#006634", + "#FFCC33", + ], + connectParticles: true, + }); + } -
-
-
-
-
-
-
Registration
-

- Before registering a team, please take a look at our rules below. You must first + }; + +

+
+
+
+ +
+
+ PatriotCTF 2024
Hosted by MasonCC
Virtual, September 20 @ 6:00pm EDT - September 22 @ 6:00pm EDT +
+
+
+
+
+
+
+ -
-
-
-
About
-

- PatriotCTF is a beginner-friendly capture-the-flag competition hosted by GMU's - cybersecurity club, MasonCC. All are welcome to participate, including students and - security professionals. Challenges will range from beginner to expert, so there should - be something for everyone. This is a jeopardy-style CTF, meaning there will be various - challenges from the different categories described below. -

-
-
-
-
- -
-
-
-
-
Prizes
-

- Prizes will be awarded to the top 3 teams. -

    -
  • 1st place: Prizes $500
  • -
  • 2nd place: Prizes $250
  • -
  • 3rd place: Prizes $100
  • -
- The top student team will also receive a prize. -
    -
  • Student 1st place: Prizes $250
  • -
-

-
-
-
-
-
Rules
-

-

    -
  1. Teams may have as many members as they want. Prizes will be sent to the team captain to be distributed as they see fit.
  2. -
  3. Any given team is only eligible for one prize category. +

    + Register + Discord +
+
+
+
+
+
+
About
+

+ PatriotCTF is a beginner-friendly capture-the-flag competition hosted by GMU's + cybersecurity club, MasonCC. All are welcome to participate, including students and + security professionals. Challenges will range from beginner to expert, so there should + be something for everyone. This is a jeopardy-style CTF, meaning there will be various + challenges from the different categories described below. +

+
+
+
+
+
+
+
+
+
Prizes New
+

+

    +
  • Prizes will be awarded to the top 3 teams.
  • +
      +
    • 1st place: $500
    • +
    • 2nd place: $250
    • +
    • 3rd place: $100
    • +
    +
  • The top student team will also receive a prize.
  • +
      +
    • Student 1st place: Prizes $250
    • +
    +
+

+
+
+
+
+
Rules
+

+

    +
  1. Teams may have as many members as they want. Multiple teams are allowed per school.
  2. +
  3. Any given team is only eligible for one prize category.
    1. In order to be eligible for the student prize, all members of your team must be enrolled at a secondary or postsecondary @@ -144,99 +142,89 @@
      Rules
      institution before the prizes are given.
    2. Team members cannot be a citizen of a country - sanctioned by the U.S. and cannot have helped create this CTF. -
    3. + sanctioned by the U.S. and cannot have helped create this CTF.
    4. Prizes are not legally guaranteed and MasonCC is not responsible for any loss, nonreceipt, or misuse of prizes.
    5. Prize money is deducted to teams not individual players. Teams are responsible for deciding on how to split prize money amongst themselves.
  4. -
  5. You are not allowed to receive help from people who are not a part of your team. - (Online resources are permitted.)
  6. -
  7. You are only permitted to play for one team, playing for multiple teams, flag sharing, or otherwise attempting to gain an unfair - advantage over other teams is not permitted.
  8. -
  9. You are not allowed to attack the CTF infrastructure or anything used to host the - CTF unless a challenge specifies otherwise. If you identify a security vulnerability - within the CTF infrastructure that has nothing to do with a challenge, then please - contact masoncc@gmu.edu with details.
  10. -
  11. The purpose of this competition is to teach students cybersecurity and ethical - hacking. Please do not use any of the knowledge that you gain from this competition - to conduct illegal activities. If you decide to do so anyways, then we are not - responsible for your actions.
  12. -
  13. Breaking any of these rules will result in removal from the scoreboards and an automatic disqualification from prize eligibility.
  14. -
  15. Please contact one of the exec members on Discord if there are any issues.
  16. -
-

-
-
-
-
-
-
-
Sponsors
-

- - -
- - -
-
+

  • You are not allowed to receive help from people who are not a part of your team. + (Online resources are permitted.)
  • +
  • You are only permitted to play for one team, playing for multiple teams, flag sharing, or otherwise attempting to gain an unfair advantage over other teams is not permitted.
  • +
  • You are not allowed to attack the CTF infrastructure or anything used to host the + CTF unless a challenge specifies otherwise. If you identify a security vulnerability + within the CTF infrastructure that has nothing to do with a challenge, then please + contact masoncc@gmu.edu with details.
  • +
  • The purpose of this competition is to teach students cybersecurity and ethical + hacking. Please do not use any of the knowledge that you gain from this competition + to conduct illegal activities. If you decide to do so anyways, then we are not + responsible for your actions.
  • +
  • Breaking any of these rules will result in removal from the scoreboards and an automatic disqualification from prize eligibility.
  • +
  • Please contact one of the exec members on Discord if there are any issues.
  • + +

    +
    +
    +
    +
    +
    +
    +
    Sponsors
    +

    + + +
    + + +
    +
    - -

    -
    -
    -
    -
    -
    Challenge Categories
    -

    - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
    NameAbout
    CryptographyCode breaking, cipher smashing, and math that fights back!
    Reverse EngineeringFiguring out how things work, then breaking those things!
    PwnPlaying with bytes and bits!
    ForensicsPCAPs and file carving and memory dumps (oh my!)
    WebThe attack surface of the modern world!
    -

    -
    -
    -
    -
    - - -
    -
    - -
    -
    -
    - +

    +
    +
    +
    +
    +
    Challenge Categories
    +

    + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +
    NameAbout
    CryptographyCode breaking, cipher smashing, and math that fights back!
    Reverse EngineeringFiguring out how things work, then breaking those things!
    PwnPlaying with bytes and bits!
    ForensicsPCAPs and file carving and memory dumps (oh my!)
    WebThe attack surface of the modern world!
    +

    +
    +
    +
    +
    +
    +