Target x WiCyS CTF 2024
Last updated
Last updated
Event announcement (July 18th-August 8th):
Sixteen of Target's infosec staff (which is ~200 strong) led by Director Sydney Delp, designed a refreshingly new type of CTF for the 3rd year of their partnership with Women in CyberSecurity (WiCyS) this year.
Traditional CTFs are held together by puns and puzzles requiring prowess in roughly 5 or more specialities (e.g. OSINT, web exploit, binary exploit, forensics, cryptography, reverse engineering, and pwn). They also run for 1-2 days. But Target simulated stages of an incident response case. Not for the pretense of having a theme, but a true case study.
I ranked 62nd of 793 registered players (amongst 1200+ applicants).
This was the first CTF where I finished all the challenges and was working up to the final second. If my last flag made it through submission, I would've ranked 54th. I felt like I ran a marathon once it was over. Below is a full list of the challenges (minus the tutorial).
Theirs is a blend of lab course and obstacle course, grounded in real-world workflows. For example, Target developed an open source tool called that works with to scan for files on an enterprise level. And they expected us to figure out how to use it.
Target usually offers official write-ups, but they haven't been released. So here's mine: , , , , , and . Other player write-ups: (aka Eris He), (aka Milah Thomas), (aka DragonDefense), (aka CyberSecJess), and (aka ThinkSecureNow).