• Home
  • Registration
  • SPONSORS
  • 2023 Agenda
  • CtF
  • Interviews
  • Committee
  • Gallery
  • Resources
  • 2022 Agenda
  • 2021 Agenda
  • 2020 Agenda
  • 2019 Agenda
  • Promo Banners
  • More
    • Home
    • Registration
    • SPONSORS
    • 2023 Agenda
    • CtF
    • Interviews
    • Committee
    • Gallery
    • Resources
    • 2022 Agenda
    • 2021 Agenda
    • 2020 Agenda
    • 2019 Agenda
    • Promo Banners
  • Home
  • Registration
  • SPONSORS
  • 2023 Agenda
  • CtF
  • Interviews
  • Committee
  • Gallery
  • Resources
  • 2022 Agenda
  • 2021 Agenda
  • 2020 Agenda
  • 2019 Agenda
  • Promo Banners

2020 Agenda and Online CtF Information



Interviews with Experts

Look for interviews from Brent White, We Hack People, Curtis Clan, CISO - State of Tennessee and Scott Augenbaum, Retired FBI Cyber Division Special Agent, now Author, Speaker and Consultant and more here soon!

2020 Capture the flag - online

2020 Capture the Flag Winners

 

The winners of the 2020 Middle TN Cyber Conference CtF are -

1st Place Adam Marthaler 24500 points    Team
1st Place John O'Keefe-Odom 13500 points Team
2nd Place Joe Littleton    7000 points
3rd  Place Daniel Arnold 3500 points

Congratulations!


This year, the CtF will be made up of real-world servers with vulnerabilities baked into them that participants must find and capture.  More information, including the rules and registration are listed below. The CtF will be limited to 75 participants - register early!  


The servers will be in an isolated NOC/SOC area and operated by the ITIM program at the TCAT Shelbyville Cyber Center.   

Registration

 

Registration

Participant representative must register each member of their team individually via email and must include a request to participate on company letterhead or school letterhead

  • Register with Steve.Mallard[@]tcatshelbyville.edu – Subject Line: 2020 CtF
  • Participant or representative must use a company or school email for each person
  • An approval email (receipt) will be returned to you within 36 hours
  • Deadline is October 20, 2020

Event Rules

 

Event Rules

  • Each individual representative is responsible for checking IP addresses before attacking and gathering information about the given target
  • Each participant will be given streaming information, specifically, link, meeting, and password information.  You will also be given an access code. This information must remain confidential. 
  • The morning of the event, you will be placed in a waiting room and you must privately message the host your access code in order to be let into the meeting
  • When entering the event, you MUST use your registered team name or real name
  • You must mute your microphone until the event starts
  • You must turn on your webcam
  • Inappropriate backgrounds, language or public chat can result in removal from the event 
  • Check in begins at 08:00 CST
  • The event starts at 08:30 CST
  • The event ends at 11:00 CST
  • Four target servers with various vulnerabilities will be available 
  • You must gather keys (plain text files) and take the keys from the servers
  • The keys will be emailed to the host at the end of the event
  • Rules are subject to change (always check here) until the beginning of the event

Prizes this Year

  • · Trophies and medals
  • · USBs with software
  • · Books
  • · DeAuthentication Watch
  • · More

Prizes will be mailed to winners.  Please allow 2-4 weeks for delivery

  • Home
  • Registration
  • Privacy Policy
  • Terms and Conditions

Middle Tennessee Cyber Conference

1200 Conference Center Blvd, Murfreesboro, TN 37129

Copyright © 2022 Middle Tennessee Cyber Conference - All Rights Reserved

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

DeclineAccept