In a world where Black Mirror and 1984 are becoming reality, profiling a given person is only a matter of perseverance.
Do you have what it takes to abuse OSINT tools and take our flags?
Be sure to pre-register for the Brainpick CTF to reserve your spot and make the most of it!
What is a Capture the Flag (CTF) event?
Capture the Flag (CTF) is a computer security competition. CTF contests are usually designed to serve as an educational exercise to give participants experience in securing a machine, as well as conducting and reacting to the sort of attacks found in the real world.
Reverse-engineering, network sniffing, protocol analysis, system administration, programming, and cryptanalysis are all skills which have been required by prior CTF contests.
There are two main styles of capture the flag competitions: attack/defense and jeopardy. In an attack/defense style competition, each team is given a machine (or small network) to defend on an isolated network. Teams are scored on both their success in defending their assigned machine and on their success in attacking other team’s machines.
Depending on the nature of the particular CTF game, teams may either be attempting to take an opponent’s flag from their machine or teams may be attempting to plant their own flag on their opponent’s machine. One of the more prominent attack/defense CTFs is held every year at the hacker conference such as DefCamp where this activity is expected every year.
Goal of the Competition
/ Capture all the flags
Rules of Engagement
/ Do not attempt to bypass platform’s mechanisms (better report bugs to us rather than get DQ for doing it)
/ This kind of Capture The Flag is a bit different as it approaches a new way of looking at OSINT based scenarios, but you should be able to find the required tools with a simple Google search.
/ If any of the provided files are not working, please inform us ASAP (some of them are not supposed to be available until a certain datetime)
/ If you submit a flag but it’s not working please review your write-up and make sure you got a flag, and not a weird string that just looks like a flag (people tend to do that often)
/ If you can’t submit a flag, please note it alongside your write-up on how did you extract it, and visit us at our booth in order to see if it’s a bug or not
/ For any questions: email@example.com
/ 10 points per flag / 130 in total
/ Video Camera GoPro HERO7 &
/ Raspberry Pi 4
More details can be found on DefCamp 2019