RuCTFE 2017 is over /

First place: Bushwhackers
Second place: Eat Sleep Pwn Repeat
Third place: c00kies@venice
Thank you for a good game!
Please, leave us feedback


Read the legend and get the vulnerable image / torrent

Image requirements: 4 CPUs, 4GB RAM, 30GB HDD, VirtualBox 5.1.30+

sha256sum: bc650734a03004fed914da1f663fdfa5a6272e3714367978ba28ae1fc3211269 ructfe2017.ova.7z

sha256sum: 7e5f17986b955b5eb45f6edc75c4ade56f4aece94b9345aa2299eedd477512aa ructfe2017.ova

Here is the password to decrypt the vulnerable image:


You can submit your flags:

  • to TCP port 31337
  • to, here is an example



RuCTFE is an annual online international challenge in the information security. It has been held 8 times already.

The contest is driven by classic rules. Each team is given a set of vulnerable services. Organizers regulary fill services with private information — the flags. The goal of each team is to find vulnerabilities, fix them in their services and exploit them in order to get flags from other teams. Please refer to the rules page and Wikipedia article for slightly more info.

RuCTFE 2017 starts on December 2, 2017 at 10:00 UTC and will last for 9 hours. As usual, the network will be closed for the first hour.

Registration will be closed on December 2, 2017 at 08:00 UTC.

Top student teams according to the results of RuCTFE 2017 will be invited to the annual national Russian university challenge in the information security RuCTF 2018. 

112,000/ RUB

First place takes 64,000 RUB (~ $1024)
Second place takes 32,000 RUB (~ $512)
Third place takes 16,000 RUB (~ $256)


26 nov 2017
RuCTFE is going to start in less than two weeks, and we are ready to present something new to you. We hope you'll like it :) Here it is, RuCTFE Cloud!
01 dec 2017
Less than twenty-four hours is left until we start, have time to prepare! Bonus: instruction to alternative flag submission system.
02 dec 2017