2021-05-20, 18:00–21:00, Workshops1
An introduction to Capture-The-Flag (CTF) with easy challenges and tips on how
to approach them.
The objective of this workshop is to dive into Capture-The-Flag (CTF)
competitions. First, by introducing participants to the basic concepts. Then,
by helping them prepare for the upcoming NorthSec CTF, and, finally, evolve in
their practice of applied cybersecurity.
We will have easy and medium CTF challenges in several categories (binaries,
Web, exploitation, forensics) and we will give hints and solutions during the
This is meant to be for CTF first-timers. Seasoned players should play
NorthSec's official CTF.
- a laptop
- a programming language of choice (it's usually Python)
- a web assessment security tool (Burp, ZAP, Watobo, mitmproxy)
- a disassembler/decompiler (Radare2, Ghidra, IDA Pro)
100Workshops only: What should participants prepare for the workshop? –
a Linux VMTicket link – Have you given this talk/workshop before? If yes, please provide details and/or slides/video. –
Yes, at northsec 2018, 2019 and 2020 ;)
Olivier Bilodeau is leading the Cybersecurity Research team at GoSecure. With
more than 10 years of infosec experience, he enjoys attracting embedded Linux
malware, writing tools for malware research, reverse-engineering
all-the-things and vulnerability research. Passionate communicator, Olivier has
spoken at several conferences like BlackHat USA/Europe, Defcon, Botconf, SecTor,
Derbycon, HackFest and many more. Invested in his community, he co-organizes
MontréHack, a monthly workshop focused on applied information security, and
NorthSec, Montreal's community conference and Capture-The-Flag.