ACM Cyber at UCSD presents

logo

Friday May 6, 5pm - Sunday May 8, 5pm (PDT)

Join Now

About Us

profile picture

San Diego CTF, also known as SDCTF, is an annual Capture the Flag competition hosted by undergraduates at the University of California, San Diego (UCSD). The competition will be jeopardy-style and run in the 48 hour period from May 5 to May 8, 2022. We encourage participation from teams on and off campus, of all ages and backgrounds.

This event is hosted yearly by ACM Cyber, the chief cybersecurity organization on campus at UC San Diego. This yearly competition allows us to train our members, build our internal resources, and give back to the greater cybersecurity community.

You can now join the Discord server that will be used for the official competition in May.

Join the Discord

Details

Rules

San Diego CTF is a 48-hour jeopardy style CTF with static scoring. Challenges vary across the disciplines of Open Source Intelligence, Cryptography, Web Hacking, Reverse Engineering, Binary Exploitation, Jail Escapes, Forensic Analysis, and others. At the end of a 48 hour period, the teams participating are ranked by number of points, with ties broken by who reached that number of points first.

Teams have no size limit. Monetary prizes are planned but not finalized. At the conclusion of the competition, challenge and solution source code will be made publicly available here.

See 2021 challenges
Geisel

Infrastructure

Challenges themselves run on the wonderful kctf and the cloud infrastructure is sponsored by goo.gle/ctfsponsorship.

The competition interface is hosted entirely on the chat application Discord and facilitated by a one-of-a-kind Discord bot. Everything from team management, to challenge issuing to flag submission is handled by our bot. No web interface necessary.

The Discord bot is called ctfbot and its open source.

See ctfbot source code
Discord

Sponsorship

We are actively looking for sponsors! If you are interested, check out our official sponsorship packet and then get in touch with us below.

Let's Talk