NOTE: This CTF challenge was created by Living Sky School Division No. 202 for the IT Summit 2026 conference.
Details
STARTS: May 28, 2026, 7:00am
ENDS: May 29, 2026, 1:00pm
Registration code can be found on posters on-site.
Rules
- You must be present at the IT Summit 2026 conference to win a prize.
- Challenges can be solved anytime between the start and end of the CTF. The competition will be available all evening and night.
- Players may work together to solve challenges. Prizes are limited, so teams may need to share.
- The CTF scoring platform (this website) is out-of-scope, do not attack it, and do not attempt to "brute force" the flag submission box.
Prizes
TBD
What is a CTF?
A CTF is a competition where teams and/or individuals solve cybersecurity related challenges to score points. The person or team to solve the most challenges the fastest wins.
How to play
- Find a
Registration Codefrom a poster or handout at the conference. - Register an account on this site to see challenges and submit flags.
- You don't have to use your real name or email address. If you win a prize, you may need to prove that you are the owner of an account.
- Information submitted to this system (such as your name and contact information) will be purged shortly after the event.
- Log in, and click "Challenges" along the top menu to view available challenges.
- Find a challenge that sounds interesting, and read the description. Most challenges include downloadable content.
- Some content may trip your antivirus scanner. There are no active viruses or malware in the challanges, but there may be malicious-looking code that AV flags as a virus. We have made every attempt to make any malicious code found in challenges safe to handle. You should still avoid arbitrarily running such code on your systems.
- Use all of the information you've been given to solve the challenge and find the flag. A flag is just a string of text that looks like this:
FLAG{50m3_un1qu3_73x7_6035_h3r3}(the exact text is unique to each challenge). - Submit your found flag to the challenge, and if correct, you will be awarded points.
- You don't have to play to win - play to have fun, or play to learn something new!
Advice
- You may use any tools, utilities, sites, methods, etc., to solve challenges.
- If you are stuck, look back at all of the information you have on the challenge (including the challenge description and name).
- All challenges have a solution, there are no trick-questions.
- Challenges will never involve brute-forcing a website. Brute forcing a file locally on your own hardware is OK (and sometimes required).
- To get the most out of this event, avoid using LLMs like ChatGPT to solve challenges for you.
Useful tools and utilities
You may use whatever tools and utilities you wish to solve the challenges, but if you are not as experienced and don't know where to start, the tools below may be useful to you.
- Wireshark - a network packet analyzer.
- Strings (Windows) - utility for extracting otherwise hidden strings in files
- CyberChef - an intuitive web app for analysing and decoding data. Runs entirely in your browser, can be downloaded for offline use.
- SecLists - wordlists containing the most commonly used passwords, usernames, directory names, and many other things.