Schedule

Red Teaming CTF

A Red Teaming CTF involves a full simulated attack against a network or system, similar to a real-world penetration testing scenario.

Day 1 โ€“ Saturday, September 13, แ‰…แ‹ณแˆœ, แˆ˜แˆตแŠจแˆจแˆ 3

9:00 AM โ€“ 9:30 AMRegistration
9:30 AM โ€“ 9:45 AMOpening & Keynote
10:0 AM โ€“ 10:30 AMIntroduction to the CTF Challenge and Rules
10:30 AMRed Teaming CTF Begins
12:00 PM โ€“ 1:00 PMLunch Break
5:30 PM โ€“ 5:45 PMWrap-Up and Preview of Day 2

Day 2 โ€“ Sunday, September 14, แŠฅแˆแ‹ต, แˆ˜แˆตแŠจแˆจแˆ 4

10:00 AM โ€“ 10:15 AMDay 1 Recap
10:15 AM โ€“ 12:00 PMRed Teaming CTF Continues
12:00 PM โ€“ 1:00 PMLunch Break
4:00 PMRed Teaming CTF End
4:15 PM โ€“ 4:45 PMJudging & Evaluation
4:45 PM โ€“ 5:30 PMAwards Ceremony
5:30 PM โ€“ 6:00 PMChallenge Review Session – Attack Strategy:
Focus will be placed on the attack strategies used and why certain approaches succeeded or failed. Whether or not many teams were successful, this is an opportunity to analyze the challenge from a red team perspective, evaluate different offensive tools and techniques, and discuss what alternative strategies could have been more effective. This session encourages critical thinking around real-world attack methodologies and decision-making under pressure.
6:00 PM โ€“ 6:30 PMParticipant Presentation:
A participant or team presents their strategy for the attack. Theyโ€™ll share their thought process, tools used, challenges encountered, and how they adapted during the competition. This peer-led session offers valuable insight into practical tactics and promotes knowledge sharing around red and blue team dynamics in realistic scenarios.
6:30 PM โ€“ 6:45 PMClosing Remarks

Incident Response CTF

An Incident Response CTF involves responding to a cybersecurity incident. Scenarios, logs, network captures, or system images are provided for analysis and remediation proposal.

Day 1 โ€“ Saturday, September 20, แ‰…แ‹ณแˆœ, แˆ˜แˆตแŠจแˆจแˆ 10

9:00 AM โ€“ 9:30 AMRegistration
9:30 AM โ€“ 9:45 AMOpening & Keynote
10:00 AM โ€“ 10:30 AMIntroduction to the CTF Challenge and Rules
10:30 AMIncident Response CTF Begins
12:00 PM โ€“ 1:00 PMLunch Break
5:30 PM โ€“ 5:45 PMWrap-Up and Preview of Day 2

Day 2 โ€“ Sunday, September 21, แŠฅแˆแ‹ต, แˆ˜แˆตแŠจแˆจแˆ 11

10:00 AM โ€“ 10:15 AMDay 1 Recap
10:15 AM โ€“ 12:00 PMIncident Response CTF Continues
12:00 PM โ€“ 1:00 PMLunch Break
4:00 PMIncident Response CTF End
4:15 PM โ€“ 4:45 PMJudging & Evaluation
4:45 PM โ€“ 5:30 PMAwards Ceremony
5:30 PM โ€“ 6:00 PMChallenge Review Session – IR / Threat Hunting Strategy:
Weโ€™ll examine the initial clues provided, the types of log data available in the SIEM, and the different investigative paths participants took. We’ll discuss which analysis strategies were effective, where teams got stuck, and what could have been done differently. This is a great opportunity to reflect on real-world investigation workflows, use of detection tools, and the importance of pivoting effectively during threat hunts.
6:00 PM โ€“ 6:30 PMParticipant Presentation:
A participant or team shares their approach to identifying and investigating the breach. Theyโ€™ll walk through their investigation process, tools and searches used in the SIEM, key findings, and any obstacles they faced. This session offers valuable peer insight into real-world incident response techniques, encourages discussion on effective log analysis, and highlights lessons learned from the CTF.
6:30 PM โ€“ 6:45 PMClosing Remarks