Hello hackers!
Ready to prove your cybersecurity prowess? Join us at BSides St. Pete 2024 for an adrenaline-pumping Capture-The-Flag competition!
Further Details:
-
The competition will run from 9:15 AM to 3:30 PM on Saturday, Sept. 14, 2024.
-
Teams are permitted to be comprised of 1 to 4 members.
-
All members of the top three teams need to be physically present to claim their prizes.
-
Flags will be found and submitted in the format: STPETE24{}
-
Challenges are designed around using non-traditional technologies and competitors are encouraged to think outside the box. Good luck!
-
All participants are required to be connected to the SPC Guest network in order to access the infrastructure.
-
By connecting to the SPC guest network, you agree to abide by their Terms of Use, as well as their Acceptable Use Policy (AUP).
-
Any violations of the Terms of Use or AUP will result in immediate disqualification.
-
Any attempts to disrupt the competition infrastructure or attacking other participants' systems will result in immediate disqualification.
-
Scope is limited to target machines, services, and challenges explicitly exposed within the challenge environment. Attacking any external systems or platforms is prohibited.
-
Participants are not allowed to disclose challenge solutions or hints publicly during the competition.
The Terms of Use are as follows:
1. This is not a secure wireless guest network. Therefore, your use of and access to this network is entirely at your own risk, for which we shall not be liable.
​
2. You agree that, while using this Internet Access portal, you will not perform any of the following acts:
- Attempt to access devices or resources to which you have no explicit, legitimate rights
- Copy, reproduce, or transmit any copyrighted files or information other than in accordance with the requirements and allowances of the copyright holder
- Launch network attacks of any kind including port scans, DoS/DDoS, packet floods, replays or injections, session hijacking or interception, or other such activity with malicious intent
- Transmit malicious software such as viruses, Trojan horses, and worms
- Surreptitiously install software or make configuration changes to any device or application, by means of the installation or execution of key loggers, registry keys, or other executable or active application or script
​
3. You agree that you will use the access provided here responsibly and with full regard to the safety, security, and privacy of all other users, devices, and resources.
​
4. You agree that you will be mindful of the cultural sensitivities of others while using this portal so as not to provoke reaction or offense, and that you will not intentionally access pornographic, graphically violent, hateful, or other offensive material (as deemed by us) regardless of others´ sensitivities.
​
5. You understand that we reserve the right to log or monitor traffic to ensure that these terms are being followed.
​
6. You understand that unauthorized use of resources through this portal may give rise to a claim for damages and/or be a criminal offense.