Rules

How to Play

A Capture The Flag (CTF) is a cybersecurity competition where participants solve challenges to find hidden pieces of data called "flags". These flags prove you’ve completed the challenge successfully and follows a specific format. For this CTF the flag format is CRYPTO25{example_flag}. In this course, the CTF is divided into two main parts:

Part 1: C Programming Challenges

Part 2: Attacks (Implemented in Python)

Deadlines

The deadlines to submit the solutions are:

Score

Incentives for participating in the CTF:

The exercise grade will be computed as:

(exam score + bonus) mod 12

CryptoCTF is OPTIONAL

Anti-Cheating Measures

Unfortunately, in the previous year, a significant number of students cheated. To address this:

⚠️ Important: If you don’t understand the attack, don’t submit the flag.

If it becomes clear during verification that you didn’t understand the solution:

This year, more students will be checked to ensure fair play.

If you've understand the rules, go submit your first flag for the warmup challenge! CRYPTO25{MyFirstFlag}