Red vs. Blue Capture the Flag (CTF)

Level Up Your Next Event With ThreatGEN® Red vs. Blue CTF!


Looking to spice up your event or workshop with something new and exciting!? ThreatGEN® Red vs. Blue CTF offers a capture the flag like no other on the market. ThreatGEN® Red vs. Blue CTF is not the style usually found at cybersecurity events. Rather than passively solving challenges for points, players compete against each other in live matches, where they actively attack and defend their systems and networks! Game play is simple enough for beginners, yet still challenging enough for seasoned cybersecurity veterans. Best of all, the "playing field" remains even and competitive for all! This is because ThreatGEN® Red vs. Blue CTF is a turn-based strategy game, based on our gamification platform. All of the realism of real-world cybersecurity concepts, methods, and strategies remain, but actions are played through a point-and-click interface. Cybersecurity beginners don't have to be intimidated by technical challenges, and experienced players and professionals get to put their, otherwise technical, knowledge and experience to the test in a strategic format!

ThreatGEN® Red vs. Blue CTF Features & Benefits:

  • Add an extremely exciting and visual element to your cybersecurity events!
  • Anyone can play - No technical skills required
  • Strategic turn-based, point-and-click game play
  • ThreatGEN® Red vs. Blue tournament bracket style play
  • Integrated tournament bracket system
  • Players compete, head-to-head, in individual matches
  • Scalable for a large number of players
  • Supports online virtual events
  • Completely web-based, cloud delivered - No onsite equipment required
  • Completely hands-off for event coordinators - ThreatGEN handles it all
  • Optional E-Sports style live show with shoutcast streaming available

What is a Capture the Flag (CTF) Competition?

There are two different styles of CTF competitions:

  • Red Team vs. Blue Team - In this style of event, the red team attempts to capture one or more flags, while the blue team attempts to defend the various flags from being captured. The flags could be files or values hidden within the blue team's systems, or the event might be goal-based, such as gaining access to a specific system. Based on historical military "war games", this style is interactive between the two teams, and what one team does effects the other. Difficulty levels can range from very technical to more strategic in nature.
  • Red Team - This style of event usually involves one or more people, working alone or on a team, who attempt to capture various flags while there is no team defending them. This style is more like a cyber "scavenger hunt", where players are given puzzles and challenges to solve, which can range from very technical to completely non-technical such as trivia.

Each type of event has various pros and cons:

In a Red Team vs. Blue Team scenario, the attackers learn offensive techniques, while the defenders have a chance to learn how to defend their systems from an active attack. Another potential learning experience for the red team is learning how to compromise systems while the blue team is actively defending. It's the proverbial "cat and mouse" chase or "chess match".

In a Red Team scenario, however, players are rewarded with points for successfully solving challenges, but there is no blue team element. Therefore, the active attack and defense "chess match" strategy component is not there.