PWNCTF 2025
A capture-the-flag competition emphasizing collaborative learning over toxic competition
What is PWNCTF?
A fresh approach to cybersecurity education through peer mentorship
Challenge Categories
We have partenred up with hacker groups from around the world to provide challenges in cutting-edge cybersecurity domains, from traditional web exploitation to emerging technologies like SATCOM and FPGA security
Required Hardware
Additional equipment is needed to actively participate in some special onsite challenges (excluded from scoreboard)
Intel Cyclone IV FPGA — EP4CE22F17C6
Why it’s needed
- Run a purposely vulnerable design (e.g., soft-CPU or state machine) where you’ll chain a minimal ret2win flow.
- Understand exploitation when the “OS” is your logic: no ASLR/DEP — timing and register flow matter.
- Hands-on with synthesis, bitstreams, and on-chip debug signals.
What you’ll do
- Flash the bitstream, connect via UART/JTAG, and trigger the overflow.
- Pivot control to a win function under strict resource/timing constraints.
- Capture proof by interacting with a success GPIO/LED/win token.
We’ll provide programmer and reference bitstream; bring a laptop with drivers (Quartus/USB-Blaster or compatible).
Adafruit M0 (ATSAMD21)
Why it’s needed
- Showcase overflow classes on a small Cortex-M0+ target with predictable memory layout.
- Practice exploitation without an OS: direct registers, linker scripts, and vectors.
- Contrast protections (stack canaries, fortify) across scenarios.
What you’ll do
- Build/flash vulnerable sketches for three distinct overflow patterns.
- Craft inputs that redirect execution (e.g., overwrite return addr / function ptr).
- Demonstrate control via a visible effect (LED, UART banner, or token printout).
We’ll provide ready-to-flash binaries and source; bring a USB cable and a serial terminal.
ESP32-WROOM (x2)
Why it’s needed
- Remote format-string exploit (LoRaWAN): craft a malicious packet to control formatting paths and flip a GPIO (blink). (A LoRa transceiver module will be provided alongside the ESP32.)
- Firmware reversing track: analyze a provided ARM firmware image and interact via the ESP32 as the transport/IO harness (UART/GPIO), validating your understanding on real IO.
What you’ll do
- Set up one ESP32 with a LoRa add-on to transmit the payload and verify the blink trigger.
- Use the second ESP32 as a serial/IO bridge while you reverse and test the ARM image behavior.
- Document primitives (write-what-where, info leak) and produce a reproducible PoC.
Bring two ESP32-WROOM devkits + USB cables. LoRa radios, antennas, and the firmware image are provided on site.
Arduino nano
Why it’s needed
- Introduction to glitch type attacks to control formatting paths and flip a GPIO connection.
- Firmware reversing track: analyze a provided ARM firmware image and interact via the ARDUINO as the transport/IO harness (GPIO), validating your understanding on real IO.
Prize Pool
€7,500 in total prizes for the top performing teams
Winners must be present onsite to qualify
Winners must be present onsite to qualify
Winners must be present onsite to qualify
Organizers
Meet the team behind PWNCTF 2025

Lead Organizer
Vatafu Vladut

Reuben Sammut
Challenge Author

mainframed767
Challenge Author

Tim Fowler
Challenge Author
Sponsors
Supporting the future of cybersecurity education

Security Patch

Caido

Calypso Labs

Cyber Warfare

i0.rs

Cyber Edu

Defcon Cluj Group

DreamHack

Ethos

Evil Mainframe

MetaCTF

ZVS Hosting

Wallarm

Hacktivity
Venue
Join us in the heart of Timișoara

Iulius Congress Hall
www.iuliuscongresshall.roLocated in the heart of Timișoara, Iulius Congress Hall is a modern venue known for its state-of-the-art facilities and excellent accessibility. Surrounded by restaurants, cafes, and shopping areas, it offers a good setting for a comfortable onsite CTF experience.
Contact
Get in touch with the PWNCTF team