The winners of the 2022 Middle TN Cyber Conference CtF were-
1st Place Joe Littleton- 70,000
2nd Place "Utility Guys" - 7000
3rd place "City of Crossville" -700
The winners of the 2021 Middle TN Cyber Conference CtF were -
1st Place Joe Littleton - 24000
2nd Place DC423 - 7,000
The winners of the 2020 Middle TN Cyber Conference CtF are -
1st Place Adam Marthaler 24500 points Team
1st Place John O'Keefe-Odom 13500 points Team
2nd Place Joe Littleton 7000 points
3rd Place Daniel Arnold 3500 points
Congratulations!
2022 Information
What others are saying -"The Middle TN Cyber Conference CTF is a well-thought-out and well put together event. The students do a great job putting the environment together. It is refreshing to see the students getting this kind of training early in their cyber security careers. I thoroughly enjoy this event and look forward to it every year."
~Joe Littleton, Information Security Officer
"Eye opening on how much preparation makes a difference...
" Adam Marthaler, Network Specialist
To Register - Email steve.mallard[@]gmail.com Subject line: 2022 CTF
September 14th - 8:30am CST
This year, the CtF will be made up of real-world servers with vulnerabilities baked into them that participants must find and capture keys, deface a web site, capture SQL data, and more. More information, including the rules and registration are listed below. The CtF will be limited to 60 participants - register early!
The servers will be on site.
Capture the Flag Registration and Rules
Cost: Free
Registration
Participant representative must register each member of their team individually via email -
- Register with Steve.Mallard[@]gmail.com – Subject Line: 2022 CtF
- Participant or representative must use a company or school email for each person
- An approval email (receipt) will be returned to you within 36 hours
- Deadline is August 31, 2022
Event Rules (see other hints below)
- Each individual representative is responsible for checking a device before attacking
- Wired and Wireless connections are available
- Individuals are responsible for bringing adapters (Ethernet / Wireless)
- The morning of the event, you will be given a table for you and your team.
- Check in begins at 08:00 CST
- The event starts at 08:30 CST
- The event ends at 11:00 CST
- Multiple target servers with various vulnerabilities will be available
- You must gather keys (plain text files) and take the keys from the servers
- If you fail to take a key and someone else turns the key/data in before you, the points are awarded to the person who turns the key in first
- Rules are subject to change (always check here) until the beginning of the event
- You must stay in front of the server table. Approaching or looking on the server screen can result in a disqualification
- Designers and TCAT Shelbyville students of the ITIM program cannot participate
- Five Servers will have various services
- Each server will have 5 keys, a form of SQL (My, Postgres, and/or Microsoft),
- The Servers' difficulty range from easy to hard
- Keys are 500 points (plaintext files)
- Dropping a database 5000 (first hacker to judges gets points)
- Defacing a website 5000 (first hacker to judges gets points)
- Start SCADA Fan 5000 - Hint: Everything is not always on your native dhcp network 10000 points
- Use camera to take selfie - Hint: Everything is not always on your native dhcp network 1000 points
- Adjust thermostat 'set' temp other than what is announced 700 points
- Points will decrease by 50% after first hour - Points will continue to decrease 10% every hour beginning the second hour in
- Remember, rules are subject to change based on hardware readiness
CtF and Door Prizes this Year
- Books -
- Hacking with Kali Linux - Ramon Nastase,
- Hacking for Beginners - Julian James McKinnon
- Hacking Connected Cars - Alissa Knight
- Kali Linux Hacking - Ethem Mining
- The Secret to Cybersecurity - Scott E. AugenBaum
- USBs with software
- Tools - 118-piece micro toolkit for computers x2
- Micro router
- DeAuth Watches x2
- Camel Pack
- Survival Kits x2
- USB C to Ethernet
- Ethernet Splitter
- M2 SSD
- 5 Port Switch
- Stickers
- More to be awarded during the CtF
A special thank you goes to the students and faculty at the Tennessee College of Applied Technology Shelbyville for designing and running the Capture the Flag (CtF) competition. It should be noted that the students of this school designed, built, and run all technical aspects of the CtF!
The Middle Tennessee Cyber Conference proudly supports the Governor’s Investment in Vocational Education (GIVE) Initiative.
https://www.tn.gov/governor/news/2019/2/5/gov--bill-lee-announces-the-governor-s-investment-in-vocational-education--give--initiative-.html