The Cybersecurity Competition at the Tech Olympics is designed to identify the most outstanding talents and creative minds in the field of cybersecurity. This competition offers a unique opportunity for participants to test their technical abilities against a variety of exciting and challenging scenarios. Its goals are to strengthen the culture of information security, encourage the sharing of knowledge and experiences, and enhance preparedness to face cyber threats. By taking part in this competition, you can play an active role in improving digital security and showcase your excellence in this critical field.
Competition Stages:
The cybersecurity competition will be held in the following four stages:
1. Preliminary Competitions (Online) – Jeopardy CTF
The goal of the Capture the Flag (CTF) cybersecurity competition is to systematically identify and guide individuals interested in the field of information security.
Each topic in the competition includes between 5 to 7 challenges ranging from easy to extremely difficult.
In total, the event will include at least 35 challenges across the following categories:
- Reverse Engineering
- Cryptography
- Digital Forensics
- Web Exploitation
- Exploits
- Hardware Hacking
2. Final Competitions
Attack and Defense
In this round, the top 10 teams from the preliminary rounds will face off in a serious and innovative format, testing their offensive and defensive capabilities in real-world cyber-attack scenarios.
Hardware Hacking
The top 10 teams from the qualifying stage will also compete in hardware hacking. Participants will face complex challenges in areas such as:
- Reverse Engineering
- Communication Protocols
- Microcontrollers
- Advanced Hardware Hacking Techniques
Lightning CTF
This competition is designed to match global standards like DEFCON and will be held in multiple knockout rounds. Competitors will go head-to-head in each round, and those with lower scores (based on both speed and accuracy) will be eliminated until the final round, where the top two contestants face off.
3. Side Events
Lovely Hackers Gathering
The 3rd Annual Lovely Hackers Conference brings together experts, professionals, and enthusiasts in cybersecurity. The event will feature:
- High-level technical presentations by domestic specialists
- Technical sessions by international experts (e.g., from Russia)
- Side competitions in cybersecurity
Bug Party Event
A security-focused event aimed at discovering and resolving vulnerabilities in software and hardware systems.
This event allows cybersecurity experts, white-hat hackers, and developers to identify vulnerabilities in a controlled environment and propose solutions to improve security.
Register Now