FAQ

Frequently Asked Questions

CTFs (Abbreviation for Capture The Flag) are a type of computer security competition. Contestants are presented with a set of challenges which test their creativity, technical (and googling) skills, and problem-solving ability. Challenges usually cover a number of categories, and when solved, each yields a string (called a flag) which is submitted to an online scoring service. CTFs are a great way to learn a wide array of computer security skills in a safe, legal environment, and are hosted and played by many security groups around the world for fun and practice.
The competition is open to all high school students (9th - 12th grade) from India.
Developing skills in the area of cyber security opens up a whole new range of career opportunities for skilled graduates. Today graduates with expertise in cyber security are in great demand for the positions of security analysts in top private computer firms in India. Of course apart from the private computer firms, the Electronic and Computer Science Division of DRDO (Defence Research and Development Organization), which is the government wing that currently handles the national cyber security, is also in need of cyber security professionals with skills, agility and a fresh and updated outlook at cyber security.
The Internet! The competition will be indefinitely available online at this website. As long as you have the ability to install software and have unfiltered Internet access, the participants can compete from anywhere in India.
Approvals for the competition will begin on the 4th of April, 2017. Quarter two challenges will be up and running from 17th of April.
The challenges from the previous round of InCTFj are accessible. The detailed solutions to these challenges will be put up later on. New users can use these solutions to learn as the challenges for this round might cover similar concepts as well. It might also be helpful to learn a bit of programming in languages such as C, Python, Javascript and HTML.
Full participation in the competition requires only a computer (preferably running Linux operating system) with a modern web browser and the ability to install applications, and ofcourse Internet access.
Our categories are Reverse engineering, Binary exploitation, Web exploitation, Cryptography, Forensics and Trivia.
Attractive prizes ranging from Raspberry Pis to laptops are in store for the winners. There will be prizes for quarterly winners and then again a final prize will be awarded to the best performers across all quarters of the year.
New challenges will be released every quarter. The challenges for quarter two will be released on the 17th ofApril.
  • At the end of every quarter, top students will be given prizes like books Raspberry Pis.
  • Students will be eligible for the Quarterly prize only once every year.
  • At the end of the four quarters, a contest will be conducted offline at Amrita University, where the final winners will be announced. The final winners will be awarded prizes ranging from laptops to quadcopters.
  • Top schools shall be judged by active participation throughout the year. These schools will be also be awarded prizes.
  • All prizes will be awarded via the school authorities after contacting the mentor
  • Attacking the scoring server, other teams, or machines not explicitly designated as targets is cheating. This includes both breaking into such machines and denying others access to them. Sharing solutions or providing overly-revealing hints with other teams is cheating, as is being directly assisted by personnel other than contest admins (using tools from the internet is OK; asking people on the internet to help you solve the problem is not). We encourage you to solve problems in novel and creative ways using all available resources, but we do require that you solve them yourselves.
    There are several CTF’s that are intended to help high school students gain some experience such as picoCTF, EasyCTF, HSCTF etc. You may try out the challenges from these CTF’s if available.
    The mentor is a guardian who we can contact for any information regarding the student. We prefer that the student's school computer science teacher be the mentor, since communications will be much easier with someone who has the technical knowledge and aptitude. The mentor will not have to actively guide you on the learning process. The student is instead expected to solve all challenges without any outside help.
    You can contact us at our facebook page for priority reply or email us directly at contact@inctf.in.