Missing Persons CTF 2019
Trace Labs Missing CTF - An OSINT CTF for Missing Persons
We are pleased to announce for a seconf year the Missing CTF in collaboration with TraceLabs
About this Event
To participate in this Missing CTF, you must be attending Hackfest in-person.
Trace Labs is a Not-For-Profit organization whose mission is to crowdsource the collection of Open Source Intelligence (OSINT) to generate new leads on active missing persons investigations.
The missing persons issue is getting worse and requires modern and scalable solutions at various levels to help mitigate risk to society. Trace Labs leverages an intelligence platform that enables the collection of OSINT to power these crowdsourced community CTF events. These CTF events allow missing persons to receive the attention that is needed early in the search process.
For this CTF, contestants can participate as either a Solo Team or a team of up to 4.
RegistrationContestants can pre-register on Eventbrite
here or register onsite in the CTF area.
How does the CTF work?
For this CTF, 8 missing persons cases will be selected for contestants to collect OSINT on to generate new leads.
This isn’t a typical “Theoretical CTF” where the flags are already known. All flags found by contestants are treated as new intelligence that can serve as a potential lead for an active missing persons investigation.
At the start of the event, contestants will be able to view the 8 missing persons case details by logging into the CTF platform at ctf.tracelabs.org with their own credentials. Registration e-mail to be sent one day prior to the CTF for those who have pre-registered.
For each “OSINT Flag” submitted on one of the missing persons that falls into any of the categories listed here, the flag will be validated by one of our Judges prior to awarding points.
Please also review our CTF rules here for first time contestants.
1st Place Prizes
At the end of the CTF, the team with the most points on the scoreboard will claim first prize of:
Up to 4 Hunchly licenses for each of their team members
Access to the “Penetration With Kali” (PWK) online course for up to 3 team members from Offensive-Security! This comes with 30 days lab access and one attempt at the OSCP exam!
How to Prepare for the Event
- Review Trace Labs training video(s)
- View our Contestant training video here: https://www.youtube.com/watch?v=2DR7cOqy0c4
- Optionally, you can also view our Judge training video here: https://www.youtube.com/watch?v=x1YNxcICw7c
- Have a personal laptop ready to use
- Note: it is highly recommended to not use a work laptop
- Get on boarded to our Missing CTF platform
- You will be e-mailed a link to register on the CTF platform one day prior to the event.
- The registration e-mail will originate from “[email protected]” with the subject line “Set New Password On Your Trace Labs Missing CTF Account”
- Join our slack group here
- All event communications will take place in our #hackfest-2019 channel in our slack group so please do sign up prior!
Our Secondary method of communication is via our Twitter
- Prepare Your “Work Environment” ahead of time to help you stay anonymous when gathering OSINT on the missing persons at the event
- Recommended to use a virtual machine or run a Linux distribution such as Buscador
- Buscador is a Linux distribution built specifically for OSINT investigations that comes with several pre-installed OSINT tools
- An installation guide for Buscador can be found here
- Windows and MacOS operating systems will work as well, but you will be responsible for configuring/installing your own tools
- Setup your browsers and plugins such as EXIF Viewer plugins.
- Use a VPN or use TOR. You likely want to hide your trail.
- Setup burner social media accounts (Facebook, LinkedIn, Instagram, Twitter, Google +, etc.) - Not recommended to be logged into your own personal social media account when viewing profiles of missing persons
If you have any questions, please reach out to [email protected]
- Saturday November 2nd at 10am go to the CTF room on level 1st of the hotel.
- First come, first served