The 2024 edition of the WP CTF has ended, and we are thrilled to announce its resounding success! This year, approximately 80 participants formed teams from across Europe, including Greece, Germany, Austria, and the Netherlands.
Staying true to tradition, WP CTF 2024 featured a Jeopardy-style competition with diverse categories such as AI, Cryptography, OSINT, Web, Reversing, PWN, and Misc. Each category offered challenges spanning a range of difficulties, ensuring an engaging experience for participants of all skill levels.
The challenges were meticulously crafted throughout the year by our internal teams, taking inspiration from real-world vulnerabilities encountered in professional projects. To ensure top-notch quality, we organized a security workshop a few weeks before the event, where team members tested each other’s challenges, provided feedback, and finalized adjustments
After the competition ended and the winners were celebrated, all challenges and their writeups were published on GitHub. This allowed participants to compare their solutions, gain new insights, and find inspiration to enhance their skills. A networking session followed, where participants and challenge creators exchanged ideas, discussed feedback, and shared suggestions for future editions. The event wrapped up with an after-party, celebrating the shared passion for cybersecurity.
It has been incredibly rewarding to witness the growth of a vibrant, young community passionate about cybersecurity. Each year, this enthusiasm continues to expand, creating an inspiring and ever-evolving space for learning and innovation.
A heartfelt thank you to everyone who participated, and we can’t wait to see you at next year’s edition!
Summer is over, autumn is here – and so is the most anticipated event of the year for cybersecurity students: WP CTF 2025. Every year, the WP CTF draws cybersecurity students hungry to learn, compete, and put their skills to Read More
When we talk about security assessments, the first thing that comes to mind is a snapshot of a company’s security posture: vulnerabilities, misconfigurations, uncontrolled access, and so on. But reducing these activities to a mere "test" means missing a key Read More
Scenario: Introduction Think of an organization that maintains most of its IT infrastructure on Azure. It applies a segmentation strategy by branch office, where the assets underlying each regional branch office are deployed to their specific landing zone subscription, i.e. Read More
Stepping Deeper into the CTF World It seems that this year, I’m a step further into the world of Capture The Flag (CTF) competitions: not sure why but I don't regret it. We're only halfway through the year, and I’ve Read More
Let's assume we have the following reference scenario, which we'll use just for simplicity: A fictitious commercial freight business moves large volumes of goods all over Europe. It has two legally registered offices, one in the Netherlands (Western Europe) and Read More