Schedule
.
Red Teaming CTF
A Red Teaming CTF involves a full simulated attack against a network or system, similar to a real-world penetration testing scenario.
Day 1 โ Saturday, September 13, แ แณแ, แแตแจแจแ 3
9:00 AM โ 9:30 AM | Registration |
9:30 AM โ 9:45 AM | Opening & Keynote |
10:0 AM โ 10:30 AM | Introduction to the CTF Challenge and Rules |
10:30 AM | Red Teaming CTF Begins |
12:00 PM โ 1:00 PM | Lunch Break |
5:30 PM โ 5:45 PM | Wrap-Up and Preview of Day 2 |
Day 2 โ Sunday, September 14, แฅแแต, แแตแจแจแ 4
10:00 AM โ 10:15 AM | Day 1 Recap |
10:15 AM โ 12:00 PM | Red Teaming CTF Continues |
12:00 PM โ 1:00 PM | Lunch Break |
4:00 PM | Red Teaming CTF End |
4:15 PM โ 4:45 PM | Judging & Evaluation |
4:45 PM โ 5:30 PM | Awards Ceremony |
5:30 PM โ 6:00 PM | Challenge Review Session – Attack Strategy: Focus will be placed on the attack strategies used and why certain approaches succeeded or failed. Whether or not many teams were successful, this is an opportunity to analyze the challenge from a red team perspective, evaluate different offensive tools and techniques, and discuss what alternative strategies could have been more effective. This session encourages critical thinking around real-world attack methodologies and decision-making under pressure. |
6:00 PM โ 6:30 PM | Participant Presentation: A participant or team presents their strategy for the attack. Theyโll share their thought process, tools used, challenges encountered, and how they adapted during the competition. This peer-led session offers valuable insight into practical tactics and promotes knowledge sharing around red and blue team dynamics in realistic scenarios. |
6:30 PM โ 6:45 PM | Closing Remarks |
.
Incident Response CTF
An Incident Response CTF involves responding to a cybersecurity incident. Scenarios, logs, network captures, or system images are provided for analysis and remediation proposal.
Day 1 โ Saturday, September 20, แ แณแ, แแตแจแจแ 10
9:00 AM โ 9:30 AM | Registration |
9:30 AM โ 9:45 AM | Opening & Keynote |
10:00 AM โ 10:30 AM | Introduction to the CTF Challenge and Rules |
10:30 AM | Incident Response CTF Begins |
12:00 PM โ 1:00 PM | Lunch Break |
5:30 PM โ 5:45 PM | Wrap-Up and Preview of Day 2 |
Day 2 โ Sunday, September 21, แฅแแต, แแตแจแจแ 11
10:00 AM โ 10:15 AM | Day 1 Recap |
10:15 AM โ 12:00 PM | Incident Response CTF Continues |
12:00 PM โ 1:00 PM | Lunch Break |
4:00 PM | Incident Response CTF End |
4:15 PM โ 4:45 PM | Judging & Evaluation |
4:45 PM โ 5:30 PM | Awards Ceremony |
5:30 PM โ 6:00 PM | Challenge Review Session – IR / Threat Hunting Strategy: Weโll examine the initial clues provided, the types of log data available in the SIEM, and the different investigative paths participants took. We’ll discuss which analysis strategies were effective, where teams got stuck, and what could have been done differently. This is a great opportunity to reflect on real-world investigation workflows, use of detection tools, and the importance of pivoting effectively during threat hunts. |
6:00 PM โ 6:30 PM | Participant Presentation: A participant or team shares their approach to identifying and investigating the breach. Theyโll walk through their investigation process, tools and searches used in the SIEM, key findings, and any obstacles they faced. This session offers valuable peer insight into real-world incident response techniques, encourages discussion on effective log analysis, and highlights lessons learned from the CTF. |
6:30 PM โ 6:45 PM | Closing Remarks |
.