How Can I Get Involved?


In a world that increasingly relies on technology for its day-to-day operations, cyber threats are more and more important to understand in the business world. The current landscape requires local family businesses to be aware of cyber threats just as much as the largest Fortune 500 companies in the ever-evolving cyber domain. The Loyola Blakefield Cyber Challenge aims to prepare the next generation regardless of career aspirations for the future landscape of business. Educating students on computer management and cyber threats is essential to future success in a workplace which will inevitably rely on understanding the technology which runs it.

Attendance

Attend the competition or the summit. Parents, when you drop off your student please join us for the summit to get insights into opportunities in the field.

Mentorship

Are you in the IT, Security, or Engineering fields? Volunteer to be a mentor for the day and be part of the teaching and learning experience.

Financial Support

Consider sponsoring the event. The goal is for this to be a free day for all participants.

Tell others

Tell your friends, business associates, or anyone else that may be interested. Every business needs IT and cyber support from the small 5-employee company to the Fortune 500s.

Things You Need To Know:


Parent Track

This year, the LBC2 competition day also featured a parent track for the parents and guardians of the competitors to learn what the competitors are learning by competing in LBC2, the importance of cybersecurity in today’s society, and how they can support their children in learning more about cybersecurity later on. The parent track was a huge success and will return next year.

What You Need To Bring

Beginners will need:

Laptop (Don’t forget a charger)

Loaner computers will be available for beginner participants as needed.

Teams that have done CTFs will need:

Laptop (Don’t forget a charger)

Kali Linux tools are highly recommended

IoT City


The IoT (Internet of Things) City challenges were a resounding success. Consisting of six separate Capture the Flag style challenges with an IoT twist, ranging in difficulty from Intro to Advanced, the challenges tested competitors’ knowledge of both basic cybersecurity and IoT elements. The Internet of Things is an idea of how different appliances, or things, connect and communicate with each other. This can include your home security camera, phone, and even your toaster! This year, we featured a series of IOT-themed challenges revolving around common industrial “things”, such as traffic lights, billboards, and a water tower.

Practice Challenges


Challenge Categories

  • Algorithm/Programming
  • Cryptology
  • Forensics
  • Network Analysis
  • Reverse Engineering
  • Web Exploitation
  • Open Source Intelligence
  • Trivia
  • Miscellaneous
  • Privilege Escalation

Demo Challenge 1

Challenge Name: Protons
Category: Cryptology

A colleague of mine sent me this nondescript message yesterday claiming it is important that I figure out the element hidden within it. Help me decode this message and find the element.

125 163 145 040 101 144 144 151 164 151 157 156

Answer: lbctf{Nobelium}