Founded in June, 2016, WCTF invites the world’s best CTF teams and security experts to gather together on this hacking fest. It is organized by 360 Vulcan Team and exclusively sponsored by Qihoo 360. Now, WCTF has become one of the top world-class CTF competitions in China.

Battle
Master WCTF-We've selected 10 world top teams based on their rankings on and performances over the last year. They are competiting for a total bonus of 100000 USD. Campus WCTF-The committee invited 10 excellent teams from top universities of China, fighting for not only generous bonus, but also a direct ticket to next year's Master WCTF. on-Line WCTF: Opens to all CTF players.
2020.11.19
Time Agenda Note
9:00 ~ 18:00 Competition
2020.11.20
Time Agenda Note
9:00 ~ 18:00 Competition
2020.11.21 Venue: 360 Headquarters
Time Agenda Note
9:00 ~ 9:30 Audience Registration
9:30 ~ 12:00 Team1-4 Seminar
12:00 ~ 13:00 Lunch
13:00 ~ 16:50 Team5-10 Seminar
16:50 ~ 17:30 Checking marks & Announce results
17:30 ~ 18:30 Award Ceremony & Closing
Master WCTF Teams
Rules (on-site)
Master WCTF
  • invited only;Jeopardy & Seminar;
  • Each team (10 teams) will need to submit 2 challenges (20 challenges in total) as required, one must be on Windows, the other can ba on any platform. No restriction on challenge types (Reverse, Pwn, Forensics, Crypto, Web, etc.)
  • CTF 60%(Success in solving any challenge wins 120 points. The fastest three teams in solving the challenge win 30, 20 and 10 points, respectively.)+ Seminar 30% (After deducting the highest and lowest scores, the average score from both teams and judges will be the final score.)+ Miscellaneous 10% (challenge submission is in time or not; whether challenge meet the requirements);
  • Top three winners will be awarded with 50,000 USD, 30,000 USD, and 20,000 USD, respectively;
    The Best Challenge voted by teams and judges will get another 5000 USD bonus.
  • The following behaviours result in immediate disqualification:leaking or sharing challenges; intentional attacks against WCTF servers or other players' devices.
Campus WCTF Teams
Rules (Novice CTF)
Campus WCTF
  • Invited;
  • Jeopardy;
  • CTF 100% (Success in solving any challenge wins 120 points. The fastest three teams in solving the challenge win 30, 20 and 10 points, respectively.);
  • Top three winners will be awarded with 50,000 RMB, 30,000 RMB, and 20,000 RMB, respectively;
p4 is a team of Polish IT security specialists, software engineers and students playing CTFs since 2013.
In spare time we publish (a lot of) writeups(https://github.com/p4-team/ctf), write articles for local IT magazines, give talks at IT security conferences and organize small CTFs for beginners.
From Russia.More Smoked Leet Chicken organized QIWI CTF 2014 and Olympic CTF 2014. And in 2015, they won Belluminar POC 2015, EKOPARTY CTF 2015, PHD CTF Finals 2015, CONFidence CTF 2015.
Team dcua was founded in 2012 by members of DC02139 defcon international group based in Kiev,Ukraine. It since is actively participating in CTFs of various levels, resulting in CTFtime global rating #5 in 2013, #6 in 2014 and 2015, currently in 2016 is close to TOP-1.
From the US, members of Shellphish are the winners of the prize of $750,000 USD in the Cyber Grand Challenge Final Event hosted by US DARPA (Defense Advanced Research Projects Agency)
CTFTIME 2017 Ranking: 9
TokyoWesterns is a team whose members (live in/go to university in) western side of Tokyo. Th team held Tokyo Westerns CTF 3rd 2017. They won the second prize in WCTF 2017 with a bonus of 30,000 USD.
Current CTFTIME Ranking: 3; CTFTIME 2017 Ranking: 5
Team Never Stop Exploiting (NeSE) is from the University of Chinese Academy of Sciences. The team was founded in 2015 and is composed of geeks who focus on network offensive and defensive technology. It has won the Championship of 2019 WCTF Campus, and the Championship of RisingStar CTF on 2020 TCTF.
Korea University’s undergraduate cyber security research club established in 2011. We participate in various CTFs to keep up with the latest cyber security trends. Especially, We like china and chinese food (Tsingtao is love) :-).Won the second prize in WCTF 2016 with a bonus of 30,000 USD.Won the second prize in WCTF 2016 with a bonus of 30,000 USD.
Eat Sleep Pwn Repeat is a combined effort of the CTF teams StratumAuhuur and KITCTF. We host the annual 3CC3 CTF at the Chaos Communication Congress and have participated in the DEF CON CTF. As our name suggests we love pwning challenges! We wish all competing teams good luck and fun for the CTF. CTFTIME 2017 Ranking: 2
Balsn: Balsn is CTF team from Taiwan founded in 2016. Most of our current members are affiliated with Network Security Lab in National Taiwan University. We actively participate in online and onsite CTF competitions.
r3kapig is a united CTF Team mostly emerges from Eur3kA and FlappyPig since 2018. And just so you know, r3kapig is a delicious dish that can be grilled and fried, and the mission of the team is to provide the most delicious food for the host. :P We actively participate in online and on-site CTF competitions. You can browse our recently participated events and ranks on CTFtime. We are a group of cybersecurity enthusiasts interested in various areas including software security, web security, cryptography, IoT security, etc.
Novice CTF Team

Lancet

Beihang University

Tien Choo

Beijing University of Posts and Telecommunications

Syclover

Chengdu University of Information Technology

Vidar

Hangzhou Dianzi University

Kap0k

South China University of Technology

L3H_Sec

Huazhong University of Science and Technology

****** Team

Fudan University

RedBud

Tsinghua University

Dawn

Wuhan
University

L-team

Xidian University

Organizer

Judges

360Vulcan
360Vulcan Team is the binary vulnerability research team in 360 Internet Security and Innovation Center. Team members are great at vulnerability exploiting and have in-depth understanding of system security. Meanwhile, they are also experienced in product research and development. Some members have been nominated for the MSRC TOP 100. Some of them have also been awarded with the Microsoft BlueHat Prize and the Microsoft Edge Project Spartan for multiple times. This battle-hardened team used to impress the world with break records in IE browser on Pwn2Own 2015, Adobe Flash Player and Google Chrome on Pwn2Own 2016, Windows Edge and Adobe Player on Pwnfest 2016.On Pwn2Own 2017, 360Vulcan Team led the 360 Team successfully broke Windows Edge, Windows 10, Apple Safari, Mac OS and Adobe Flash Player to become the champion and has been awarded as the "Master of Pwn". So far, 360Vulcan Team has submitted hundreds of high risks security vulnerabilities to major software vendors like Microsoft, Google, Adobe.
Chen Liang
Chen Liang, Director of Singular Security Lab, has a strong research experience on software vulnerability hunting and exploitation, especially on browsers and Apple operating systems. He has spoken at several security conferences, including Black Hat, Infiltrate, RECon, PoC, XCon, CanSecWest, etc.. Under his leadership in the past years, his team has won the "Master of PWN" for three times on Pwn2Own. He himself has also demonstrated jailbreaks on the latest versions of iOS at multiple international security summit.
Pangu Lab
Pangu Lab is a security laboratory consisting of many senior security professionals with rich experience across a wide range of security research and industrial development. The members of the Pangu Lab discovered hundreds of 0day vulnerabilities in major operating systems and applications, and presented many papers and talks at the premier forums such as Black Hat, CanSecWest, Syscan, RUXCON, HITCon, PoC, XCon , IEEE S&P, USENIX Security, ACM CCS, and NDSS. Pangu Lab’s current research focuses on mobile security. Team Pangu is known for its multiple releases of untethered jailbreak tools for iOS 7, iOS 8, and iOS 9. Team Pangu was also the first to jailbreak iOS 8 and iOS 9 in the world. Besides iOS, Pangu Lab also made great progress in Android security research, and developed various products for discovering vulnerabilities in Android apps, detecting malicious Android apps, and mining mobile threat information.
Peng Zhiniang
Dr. Peng Zhiniang is the Chief Security Researcher of Sangfor. His main research areas include applied cryptography, software security and threat hunting. He got his PH.D degree in post-quantum cryptography. Dr. Peng has more than ten years of experience both in offensive and defensive security. He has discovered many high-impact vulnerabilities and talked in many security conferences.
Zhang Chao
Dr. Zhang Chao is an Associate Professor at Tsinghua University. He was selected and nominated as a member of the national youth project “Thousand Talents Program” and the “Young Talents Lifting Project” of China Association for Science and Technology. His main research area is system and software security, focusing on vulnerability research, exploitation and defense, Dr. Zhang has published a number of research papers on many well-known academic journals, including one that is of the 10 most-cited scientific papers by BIG in 2013. His research results also won Microsoft BlueHat special nomination award. Under his leadership, his team participated in the DARPA Cyber Grand Challenge and was the winner of preliminary defense game and runner-up of the attack game. As a former player of Blue Lotus, he and the team used to win the second prize in the Defcon CTF in 2016.
Contact us
© 2012-2020 Qihoo360, Inc. All rights reserved 京ICP备08010314号-1
In order to keep pace with on-site WCTF, the on-line WCTF server and system will be shut down synchronously when the on-site WCTF is off during the event. Open time: UTC 02:00-10:00, July 5th; UTC 01:40-10:00, July 6th. Deadline for Registration: UTC 15:00, July 1th.
Seminar Registration

Fees include:

1. One-day Seminar

2. Buffet Lunch

3. Tea Break

4. Souvenir bag

Time & Fees

Early-Bird(Before June 15th 2018)360.00 RMB

Regular(After June 15th 2018)600.00 RMB

Reminder

*Please be notified that that the tickets are not refundable.

Contact

Please send email to wctf@360safe.com, we will get back to you asap.

购票链接
you’ve successfully registered with us. An activation link has been sent to your registration email, please click the link to activate your account.