Challenge Capture.The.FIC by Hexpresso 

 
 

CHALLENGE CAPTURE.THE.FIC BY HEXPRESSO

This year, participate in the new cybersecurity competition proposed by the FIC, Sopra Steria and Manhattan in partnership with the Hexpresso team: the Capture.The.Fic (CTF) challenge!

with
          

PRESENTATION OF THE CTF PROCESS

This CTF will be held in 3 parts:
• An online "follow the rabbit" pre-qualification phase over a week, which will enable us to select 14 teams of 3 players;
• A second phase of 4 hours that will take place on Wednesday 29 January during the FIC and will oppose the 14 teams, with a very special event** as a bonus. At the end of this stage, 4 teams will be selected for the final phase.
• The final phase (1 hour) will be held during the FIC Gala Dinner and will crown the winning team and the two runners-up. ** This very special event will be a first at the FIC! It will be close to what can be seen in e-sport competitions, but in the field of cybersecurity. Prepare yourself accordingly ;)

CTF'S MAIN DEADLINES

• One week of online pre-qualification, from 12 to 19 December 2019 (link: ctf.hexpresso.fr available at 9PM UTC/GMT+1 on the 12/12/2019)
• Announcement of the 14 teams selected on 6 January 2020
• Final phase on Wednesday 29 January 2020, from 9:30 am to 1:15 pm and from 8:30 pm to 9:30 pm

THE HEXPRESSO TEAM

Capture.The.Fic is organized by the Hexpresso team. The Hexpresso team is part of the cybersecurity ecosystem in France. It has participated in numerous computer security competitions in France and abroad. Eight team members will be mobilized to organize this first edition of Capture.The.Fic: BitK / chaignc / kaluche / Mitsurugi / Notfound / SakiiR / SaxX / Xer. 2020
 

Hexpresso team members onboard for FIC 2020


BitK
“cat lover and hacks more faster than Lucky Luke”
@BitK_

chaignc
“Fuzz faster than his shadow and always up for a chilly challenge“
@chaignc

kaluche
“Pentester, RedTeamer & Golden Ticket Lover“
@kaluche_

Mitsurugi
"reverse, exploit pwn"
@0xmitsurugi
    

Notfound
"Likes .pcap, crypto and proud to be a VERY kung-fu basher. He's also troller and wine lover"
 @Notfound404__

SakiiR
Likes reverse and sploit, he's also web pentester
@sakiirsecurity

SaxX
"Addict of web exploitation and Bug Bounties, he writes all his PoC in Python. He can also find his way trhu a forest without any GPS"
@_saxx_
Xer
"An experienced CTF player. Jack of all trades, master of none, he is mostly known for his reverse engineering and binary exploitation skills. He is also known as "that guy with the PHP scripts"
    

RULES & REGISTRATION

PRIZES