Cybersecurity Center
Capture the Flag Competition
This Capture the Flag (CTF) competition provides a unique and enjoyable opportunity for WIU graduate and undergraduate students to showcase their cybersecurity knowledge. Participants will use computer forensics tools to analyze a provided disk image in a hands-on, real-world scenario. They will demonstrate their skills by retrieving and analyzing critical evidence from the image.
- Competition Date and Time: Wednesday, December 4, 2024, at 11:00 AM CST
- Registration Deadline: Tuesday, December 3, 2024, at 12:00 PM CST
- Location: Stipes Hall, Room 309, WIU Macomb Campus, Macomb, IL
- Competition Format: Capture the Flag (CTF) style
- Duration: Approximately 1.5 hours
-
Awards Ceremony & Alumni Presentation:
- Friday, December 6, 2024, at 11:00 AM CST; awards ceremony followed by a presentation by WIU alumni currently employed at Microsoft.
-
Ayobami Olatunji
Security Assurance / Security Program Manager at Microsoft
Presentation Title: Review of Artificial Intelligence role in Cybersecurity
Important: Only 30 seats are available for this competition! Secure your spot by registering as soon as possible.
- Participants must be currently enrolled at WIU.
- Interest in Cybersecurity and/or Digital Forensics is recommended.
- Each team member must register individually.
- Teams must consist of exactly 2 members.
- Teams are strictly limited to 2 members each.
- Arrive at least 15 minutes before the competition begins.
- Cell phones are permitted only for receiving emergency calls during the competition.
- Transportation to the competition venue is not provided.
- Opportunity to showcase your expertise in Digital Forensics.
- All participants will receive a USB drive and a certificate of participation.
- Prizes will be awarded to the top three teams.
To help you prepare for the upcoming competition, please use the resources below. All resources are open-source and free of charge; no registration is required to access them. If you encounter any access issues, contact Dr. Tahir M. Khan at tm-khan@wiu.edu.
The competition will involve analyzing a provided disk image or files to answer questions. You should understand how to add evidence to forensic tools—at minimum, know how to process disk images using FTK Imager and Autopsy, and view data with Hex Editor. You may also use any additional computer forensics tools as needed during the competition.
Download Links
- Autopsy: https://www.autopsy.com/download/
-
FTK Imager: https://www.exterro.com/ftk-product-downloads/ftk-imager-version-4-7-1
Note: You’ll need to fill out a form to download FTK Imager. An email with the download link will be sent to you. - OS Forensics: https://www.osforensics.com/download.html
- Hex Editor: https://mh-nexus.de/en/hxd/
Documentation and User Guides
- Autopsy User Guide: https://sleuthkit.org/autopsy/docs/user-docs/4.21.0/
- FTK Imager:
- OSForensics Guide: https://www.osforensics.com/discover.html
Disk Images for Practice
These resources will provide essential guidance on using forensic tools and analyzing disk images effectively. Good luck with your preparation!
- Dr. Tahir M. Khan
Associate Professor
Interim Director of WIU Cybersecurity Center
tm-khan@wiu.edu - Michael Umakor
President of the Cybersecurity Enthusiast Club
mf-umakor@wiu.edu
Connect with us: