PWNCTF 2025
A capture-the-flag competition emphasizing collaborative learning over toxic competition
What is PWNCTF?
A fresh approach to cybersecurity education through peer mentorship
Challenge Categories
We have partenred up with hacker groups from around the world to provide challenges in cutting-edge cybersecurity domains, from traditional web exploitation to emerging technologies like SATCOM and FPGA security
Required Hardware
Additional equipment is needed to actively participate in some special onsite challenges (excluded from scoreboard)
Intel Cyclone IV FPGA — EP4CE22F17C6
Why it’s needed
- Run a purposely vulnerable design (e.g., soft-CPU or state machine) where you’ll chain a minimal ret2win flow.
- Understand exploitation when the “OS” is your logic: no ASLR/DEP — timing and register flow matter.
- Hands-on with synthesis, bitstreams, and on-chip debug signals.
What you’ll do
- Flash the bitstream, connect via UART/JTAG, and trigger the overflow.
- Pivot control to a win function under strict resource/timing constraints.
- Capture proof by interacting with a success GPIO/LED/win token.
We’ll provide programmer and reference bitstream; bring a laptop with drivers (Quartus/USB-Blaster or compatible).
Adafruit M0 (ATSAMD21)
Why it’s needed
- Showcase overflow classes on a small Cortex-M0+ target with predictable memory layout.
- Practice exploitation without an OS: direct registers, linker scripts, and vectors.
- Contrast protections (stack canaries, fortify) across scenarios.
What you’ll do
- Build/flash vulnerable sketches for three distinct overflow patterns.
- Craft inputs that redirect execution (e.g., overwrite return addr / function ptr).
- Demonstrate control via a visible effect (LED, UART banner, or token printout).
We’ll provide ready-to-flash binaries and source; bring a USB cable and a serial terminal.
ESP32-WROOM (x2)
Why it’s needed
- Remote format-string exploit (MQTT-PWN): craft a malicious packet to control formatting paths and overwrite a variable to get flag.
- Firmware reversing track: analyze a provided ARM firmware image and interact via the ESP32 as the transport/IO harness (UART/Wifi), validating your understanding on real IO.
What you’ll do
- Set up one ESP32 with a MQTT server waiting for your to transmit the payload and leak the flag.
- Use the second ESP32 as a serial/IO bridge while you reverse and test the ARM image behavior.
- Document primitives (write-what-where, info leak) and produce a reproducible PoC.
Bring two ESP32-WROOM devkits + USB cables.
Arduino nano
Why it’s needed
- Introduction to glitch type attacks to control formatting paths and flip a GPIO connection.
- Firmware reversing track: analyze a provided ARM firmware image and interact via the ARDUINO as the transport/IO harness (GPIO), validating your understanding on real IO.
Arduino Uno
Why it’s needed
- Introduction to eeprom dump type attacks to gain access to proprietary code.
- Firmware reversing track: analyze a provided ARM firmware image and interact via the ARDUINO as the transport/IO harness (GPIO), validating your understanding on real IO.
Prize Pool
$3,500 in total prizes for the top performing teams
Winners must be present onsite to qualify
Winners must be present onsite to qualify
Winners must be present onsite to qualify
Organizers
Meet the team behind PWNCTF 2025
Lead Organizer
Vatafu Vladut
Reuben Sammut
Challenge Author
mainframed767
Challenge Author
Tim Fowler
Challenge Author
Sponsors
Supporting the future of cybersecurity education
Security Patch
Caido
Calypso Labs
Cyber Warfare
i0.rs
Cyber Edu
Defcon Cluj Group
DreamHack
Ethos
Evil Mainframe
MetaCTF
ZVS Hosting
Wallarm
Hacktivity
BLS
catflag_kr CTF Team
Covert Security
OSINT Industries
OtterSec
Cyber Boardroom
API SEC UNIVERISTY
IO ACTIVE
Raul Pop
László Fülöp
Venue
Join us in the heart of Timișoara
Iulius Congress Hall
www.iuliuscongresshall.roLocated in the heart of Timișoara, Iulius Congress Hall is a modern venue known for its state-of-the-art facilities and excellent accessibility. Surrounded by restaurants, cafes, and shopping areas, it offers a good setting for a comfortable onsite CTF experience.
Contact
Get in touch with the PWNCTF team