F.A.Q

Frequently asked questions about the event

1. What is this event?

A hands-on cybersecurity competition, commonly referred to as a CTF (Capture The Flag), with two parts: an offensive Red-Team CTF and a defensive Incident Response (IR) CTF.

2. When & where is it?

  • Red Team CTF (Pentest): Fri–Sat, Sept 19–20, 2025
  • Incident Response CTF: Sun, Sept 21, 2025
  • Venue: ALX Ethiopia, Lideta Hub, 4th Floor

3. Is there a fee?

No. Participation is free thanks to sponsors and in-kind partners.

4. Do I need to attend all days?

We expect and encourage participants to take part in both the Red Team and IR CTFs. If you can’t, please let us know so we can plan capacity.

5. What types of challenges will there be?

The CTF will feature Red Team style CTF and an Incident Response style CTF.

Teams & Eligibility

7. How are teams formed?

Teams are groups of four. Register as a team or solo (we’ll match solos).

8. Who can participate?

Students, early-career professionals, and practitioners in Ethiopia. All skill levels welcome.

9. What if I’m brand new?

Perfectly fine! We’ll host short bootcamps and share starter resources.

Preparation & Bootcamps

10. Are there pre-event trainings?

Yes—optional but recommended:

  • Red Team bootcamp (online): Wednesday evening 8-10PM, (Sept 17) — link to training will be provided when you register.
  • IR bootcamp (online): Thursday evening 8-10PM, (Sept 18) — link to training will be provided when you register.
  • Recordings/slides will be shared where possible.

What should I review beforehand?

Basic Linux/Windows use, networking, common vulns (OWASP Top 10), and log search basics (grep, Wazuh syntax).

Equipment & Network

What should I bring?

  • Laptop + charger (required)
  • Optional: small power strip, USB hub, headphones

Do I need cloud accounts?

No. Red-Team labs run in the cloud (AWS-backed) provided on site. The IR CTF uses a hosted SIEM/data set we’ll provide.

Rules, Scoring & Prizes

General rules

  • Be respectful. Follow the Code of Conduct.
  • No DoS, no attacking event infrastructure or other teams.
  • Keep testing within your assigned range. No sharing solution flags.
  • Ask for help! Mentors will be available (hint tiers provided).