{"guid":"import-480d3f86e0ad1352fc","title":"Hosting a Hacking Challenge - CTF-style","subtitle":"Background information on CIPHER, an international Capture-The-Flag contest","slug":"22C3-428-en-hacking_challenge","link":"http://events.ccc.de/congress/2005/fahrplan/events/428.en.html","description":"The talk will give a deep view behing the scenes of creating a CTF-hacking challenge. Starting from a short analysis of requirements for such an event, the organizational work to be done, to the main topic: designing the actual contest and choosing the software to be hacked.\n","original_language":"eng","persons":["Lexi Pimendis"],"tags":["22c3"," Community"],"view_count":90,"promoted":false,"date":"2005-12-29T01:00:00.000+01:00","release_date":"2007-12-29T01:00:00.000+01:00","updated_at":"2025-05-22T13:00:09.527+02:00","length":2736,"duration":2736,"thumb_url":"https://static.media.ccc.de/media/congress/2005/22C3-428-en-hacking_challenge.jpg","poster_url":"https://static.media.ccc.de/media/congress/2005/22C3-428-en-hacking_challenge_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2005/import-480d3f86e0ad1352fc-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2005/import-480d3f86e0ad1352fc-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/22C3-428-en-hacking_challenge","url":"https://api.media.ccc.de/public/events/import-480d3f86e0ad1352fc","conference_title":"22C3: Private Investigations","conference_url":"https://api.media.ccc.de/public/conferences/22c3","related":[{"event_id":746,"event_guid":"import-3d2fea9bd42aa8754d","weight":1},{"event_id":760,"event_guid":"import-e0dc3d63d8c85c7c2f","weight":1},{"event_id":911,"event_guid":"import-318a15cba5689b8505","weight":1},{"event_id":931,"event_guid":"import-aff35a6cca25642871","weight":1},{"event_id":942,"event_guid":"import-4c93897d43ca54bf73","weight":1},{"event_id":973,"event_guid":"import-ed1c1621de6cb7a72a","weight":1},{"event_id":990,"event_guid":"import-7317225cacc9eb4d71","weight":1},{"event_id":997,"event_guid":"import-be2891faa7c05bac07","weight":1},{"event_id":1796,"event_guid":"z7M48Tb_4vtI0BBFVqe_ag","weight":1},{"event_id":1919,"event_guid":"e8iZTSvuc7GVdf4438MeJg","weight":2},{"event_id":2426,"event_guid":"1ddc32d5-765d-495b-91ae-fe7e2588e5d2","weight":1},{"event_id":2471,"event_guid":"a26b9be9-36ce-4a7f-9baa-4612251615c5","weight":1},{"event_id":2895,"event_guid":"1cac5105-cfdc-42e9-9a87-0ee71fc2443c","weight":1},{"event_id":3039,"event_guid":"4a820df8-8297-4135-9240-6e51bcf47b9b","weight":1},{"event_id":3563,"event_guid":"0bf48766-2a96-4c65-bc82-54c490c5c4e3","weight":1},{"event_id":3684,"event_guid":"3a53269d-4dcb-4a56-b018-7db9f230aab3","weight":1},{"event_id":4228,"event_guid":"991ca003-fcd1-4e28-acc3-50c82ae1d846","weight":1},{"event_id":4898,"event_guid":"8c303809-3c7c-4532-ab1e-c9a4e7c38245","weight":1},{"event_id":5832,"event_guid":"fcae0fe2-fc3b-466f-85d5-4777cd46099d","weight":1},{"event_id":6574,"event_guid":"54c671a2-1803-4085-a923-a875ca11723a","weight":1},{"event_id":6748,"event_guid":"b3fe7f83-cdd3-436a-91db-56c13b2aeb3a","weight":1},{"event_id":6932,"event_guid":"3ac46290-51e0-5ee2-93a0-8fb4b99cf67c","weight":1}],"recordings":[{"size":95,"length":2736,"mime_type":"audio/ogg","language":"eng","filename":"22C3-428-en-hacking_challenge.ogg","state":"downloaded","folder":"lectures/audio/ogg","high_quality":true,"width":320,"height":240,"updated_at":"2014-05-10T15:26:36.863+02:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/audio/ogg/22C3-428-en-hacking_challenge.ogg","url":"https://api.media.ccc.de/public/recordings/1673","event_url":"https://api.media.ccc.de/public/events/import-480d3f86e0ad1352fc","conference_url":"https://api.media.ccc.de/public/conferences/22c3"},{"size":95,"length":2736,"mime_type":"video/mp4","language":"eng","filename":"22C3-428-en-hacking_challenge.m4v","state":"downloaded","folder":"lectures/video/mp4-avc/320x240","high_quality":true,"width":320,"height":240,"updated_at":"2016-01-27T11:03:18.022+01:00","recording_url":"https://cdn.media.ccc.de/congress/2005/lectures/video/mp4-avc/320x240/22C3-428-en-hacking_challenge.m4v","url":"https://api.media.ccc.de/public/recordings/1672","event_url":"https://api.media.ccc.de/public/events/import-480d3f86e0ad1352fc","conference_url":"https://api.media.ccc.de/public/conferences/22c3"}]}