(BIBIFI) competitions (Ruef et al., 2016) ask build-
it teams to write software, which is subsequently at-
tacked by break-it teams. BIBIFI contests consist
of three phases. The first one, build-it, asks small
development teams to build software according to a
given specification that includes security goals. The
second phase, break-it, asks teams to find defects in
other teams’ submissions. Reported defects bene-
fit the break-it team’s score and penalize the build-it
team’s score. The final phase, fix-it, asks builders to
fix bugs and thereby get some points back.
In all types of competitions, there is also a follow-
up phase dedicated to the publication of write-ups.
Who solved a given challenge can write a short post,
detailing the steps they followed. Then, authors can
also ask the CTFtime website to host their write-ups.
From an educational point of view, this is ex-
tremely useful since, on the one hand, it allows parti-
cipants to arrange and summarize the steps towards
their solutions and, on the other hand, it allows to
compare different techniques, chosen by different
people, to face the same problem. Write-ups are even
more useful for those who did not succeed in solving
some exercise since they can, a-posteriori, find hints
valuable for future competitions.
3 THE ZenHackAdemy
The dialect name of Genoa is Zena; since we organize
activities on ethical hacking, we (see 3.1) coined the
name ZenHackAdemy for such training, by combin-
ing the words Zena, Hacking, and Academy.
3.1 Who and Why
We are a group of researchers working in cybersecur-
ity, who discovered CTFtime through word of mouth.
After attending some online jeopardy competitions,
we immediately realized the educational potential of
this type of activity. At the same time, we also real-
ized that during our studies we were never exposed to
lectures or practical activities that would have enabled
us to solve the proposed challenges. So, we thought
to offer undergraduate students some hands-on activ-
ities to fill this gap. Hence, we rolled up our sleeves,
deepened our knowledge in the practical aspects and
tools, and started participating in online competitions.
As already said in Section 1, modifying the con-
tent of official curricula is a difficult and time consum-
ing process so, in October 2017, we decided to assess
the real interest in these topics by starting some non-
formal training, outside official lectures, to get some
feedback from motivated students, interested in ac-
quiring some practical skills that formal training did
not offer. The first step was the advertising and or-
ganization of a two hours presentation, during which
we launched a call for participation to the unofficial
events on Ethical Hacking @ DIBRIS.
3.2 Autumn 2017, First Pilot
The attendance to the first presentation was notice-
able, confirming our suspicions that there was indeed
much interest in these kinds of activities and therefore
we defined a calendar of weekly meetings. We sched-
uled Friday afternoon as meeting day to maximize the
participation, since it was the only slot without official
courses.
During each meeting we covered a different topic,
ranging from web security to binary analysis, from
network analysis to cryptography. After some theory,
each seminar was accompanied by exercises proposed
to students during the class as well as homework.
Despite the unfavorable placement in the week,
participation was somewhat encouraging, with around
50 participants during the first meetings, a number
that decreased over time, as expected, when the com-
plexity of the covered topics increased.
At the end of the training we organized an on-site
Jeopardy CTF event. Thanks to a grant offered by
Boeing Company, we could also offer two prizes for
the best-performing students.
The platform chosen for hosting the local CTF is
CTFd
8
, an open source software designed to support
CTF organizers. Such a platform handles publication
of exercises, participant enrolments, and flag submis-
sions. Moreover, CTFd allows organizers to define
two types of scoring: static, that is, the score of each
challenge is defined a-priori before the competition
starts, and dynamic, where each challenge has an ini-
tial score, which decreases during the competition ac-
cording to the number of submitted solutions. Hints
can be associated with challenges, this is especially
useful for the hard ones, and participants can decide
whether to read them or not; reading a hint has a cost,
e.g, some points are deducted.
32 students attended the first on-site CTF that las-
ted for 5 hours and exposed them to exercises on dif-
ferent categories. The winner was a 2nd-year bach-
elor student in Computer Engineering with no prior
experience in computer security; the second classi-
fied was 1st-year master student in Computer Science,
who just attended his first course on security during
the same semester. Even though numbers may not
seem striking, a small seed was planted, introducing
8
https://ctfd.io/
ZenHackAdemy: Ethical Hacking @ DIBRIS
407