Skip to main content

Owning the Network

Brought to you by Fortinet

Your only real enemy is your own curiosity, skill, and time.

Owning the network will test your networking skills and allow anyone of any skill level to participate. If you are new to networking videos will be provided explaining the main concepts. 

Where Is It

Find us in the contest area.  Look for the stack of networking equipment and the Network Games sign.

How to Play

Start the game by plugging your laptop into the large switch at our contest table. After solving the first few challenges you can move to the wifi and play from anywhere in the contest area.

What to Bring

Laptop, network card, and LAN cable.

If you don’t have a a network cable, head over to the LAN Cable Contest and learn.

Important Times

Owning the network runs from Tuesday at noon to Thursday at noon. You can play each day while the contest area is open.

They called it an Atomic Code Destabilization.  A glitch at the edge of reality, where software meets physics. 

Synack Corp’s core network team was patching a deprecated warning stackdump when something broke.  Not just the code, not just the config, but reality itself.  An unvalidated paging problem deep in the control plane fractured space-time and pulled the team into a software defined shadow realm created by the network. 

Firewalls have locked down. Routing tables rewrite themselves every few seconds. SD-WAN links phase in and out like ghosts. Kubernetes nodes are spawning nightmares along ingress routes and there are rogue containers running unknown processes. Honeypots are no longer traps, they’re alive. 

That’s where you come in.

Contracted by an off-the-books team of incident responders, you’re being dropped into the wreckage. Your objective: restore control, neutralize the anomalies, and bring the Synack team home. 

Every checkpoint in this CTF is a corrupted piece of the Synack architecture. This includes firewalls, routers, VPNs, container clusters and more. The Atomic Code Destabilization has twisted everything. You’ll need to exploit vulnerabilities, manipulate traffic, exploit routing protocols, and fight your way through zero-trust systems that trust no one, not even you. 

Your first task is to find the last remaining switch and plug in. 

Each challenge unlocks a briefing: 

  • A short primer on the theory behind what’s broken. 
  • A guided walkthrough showing how each device used to work. 
  • Clues and context. Tiny fragments of the Synack team’s logs, configs, voices. 

Frequently Asked Questions:

How do I start the CTF?

A: Go to the Network Games Play Area and look for the stack of networking equipmentPlug in to the giant switch and start your adventure. It will be labeled, and experts will be on hand to help. The CTF has you solve several challenges to get access to the CTF Wi-Fi. From there you can play if you are in range of Wi-Fi. 

Do I need to bring a laptop?

A: Yes! No laptops will be provided. You will need your own equipment for this CTF.

Do I really need to bring a network adaptor and cable?

A: There will be some adaptors and cables on-hand, but they will be first come first serve. If they are all being used, break, or disappear, you will need to wait or use your own equipment. If you’ve never made a network cable we highly recommend going to the LAN Cable Contest and learning. 

What if I’ve never hacked anything before?

A: That’s okay! Videos will be provided covering the basic subjects with links to learn more. You can try using ChatGPT or asking questions of the human staff.

How are winners decided?

A: The top three individuals on the CTFd scoreboard with the highest scores will win prizes.