AHE17: Call for Participation

 


Interested in hacking Android apps, smartphones, cash safes and other Android-related hardware? Interested in winning awesome prizes? Then this is for you…


OVERVIEW

  • Remote Hackers: no qualification needed.
  • Local Hackers: Qualification required
    • Challenges (Solve at least one challenge. Limited number of participants: The more challenges you solve, the better your chances are to be invited.): https://goo.gl/vKKuJI (released: April 5th)
    • Submission until:
      • Early Bird: May 3rd 2017 23:59 (German time)
      • Last Chance: May 17th 2017 23:59 (German time)
    • Submission website: https://team-sik.org/ahe17-registration/
    • Main Event: June 7th 2017 @Fraunhofer SIT (Rheinstraße 75, Darmstadt, Germany)
    • Prizes for best hackers sponsored by: Avira, Google, Microsoft, Intel, Titus and an anonymous sponsor

WHAT IS AN ANDROID HACKING EVENT?

The Android Hacking Event is a CTF-based event where participants need to solve a variety of challenges. Each challenge contains a flag, which needs to be extracted. There will be different challenges: easy, medium and difficult challenges which need to be mastered within a certain time. This year, we extended the challenges from pure reverse engineering challenges to challenges in the area of: real smartphone hacking, money safe hardware hacking, and more. Note that all these challenges are related to Android.


PRIZES

Prizes are for local hackers only. Remote hackers can participate for the fame, your points will still be recorded publicly.


WHEN AND WHERE?

Main event June 7th 2017:

  • Local hackers: @Fraunhofer SIT (Rheinstraße 75, Darmstadt, Germany), 4pm until around 1am.
  • Remote hackers: Registration before 3 hours before event (https://ahe17.sit.fraunhofer.de); Start: 5:30pm

HOW CAN I PARTICIPATE?

Remote Hackers:

  • No need for qualification, everybody can participate online
  • Registration (scoreboard): https://ahe17.sit.fraunhofer.de/li>
  • Start at 5:30pm June 7th 2017. Challenges will be available at scoreboard

Local Hackers:
Every single hacker needs to pass at least one of our qualifying challenges before (s)he can attend at the main event (June 7th 2017). The hacking challenges in the area of reverse engineering are similar to the one in the main event. There will be three Android apps, all of them require a single password to pass the challenge. If you entered the correct password (found the flag), you see a “Congratulations” dialog box. Solve at least one challenge. Limited number of participants: The more challenges you solve, the better your chances are to be invited.
We will release the qualifying challenges by April 5th 2017: https://goo.gl/vKKuJI
There will be two qualifying rounds:

  • Early Bird: May 3rd 2017 23:59 (German time)
  • Last Chance: May 17th 2017 23:59 (German time)

If you are qualified before „Early Bird“, you will get a bonus prize at the main event.

Please submit your results at: https://team-sik.org/ahe17-registration/
The submission requires the correct password and also a short description how you extracted the password (see submission website) for each challenge.

Every participant who qualifies for the main event will receive an email from us.

During the main event at Darmstadt, there will be time to build groups of up to three local hackers. Don’t worry, even if you do not know the others, there will be a group for you as well! More information about the agenda will be presented at the main event.


NEXT STEPS?

Local Hackers:

  • Wait until we release our qualifying challenges, hack them and submit them at https://team-sik.org/ahe17-registration/ by May 3rd or May 17th.
  • After the first and the second deadline, we will let you know if you are part of the main event on June 7th 2017.

Remote Hackers:

  • You are welcome to look into the qualifying challenges, but it is not required.
  • We will announce the URL for registration at least 2 days before the event here and via twitter @teamsik

Happy Hacking!

If you have any questions, please do not hesitate and contact us here.