{"id":25,"date":"2021-08-26T06:48:40","date_gmt":"2021-08-26T06:48:40","guid":{"rendered":"https:\/\/ctfjo.com\/index.php\/saturnwp\/"},"modified":"2025-10-19T10:07:21","modified_gmt":"2025-10-19T10:07:21","slug":"home","status":"publish","type":"page","link":"https:\/\/ctfjo.com\/","title":{"rendered":"Home"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"25\" class=\"elementor elementor-25\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-60dc82f9 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"60dc82f9\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-54b04ed1\" data-id=\"54b04ed1\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2acc721b elementor-widget elementor-widget-text-editor\" data-id=\"2acc721b\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><div id=\"mtphr-dnt-517\" class=\"mtphr-dnt mtphr-dnt-517 mtphr-dnt-default mtphr-dnt-scroll mtphr-dnt-scroll-left\"><div class=\"mtphr-dnt-wrapper mtphr-dnt-clearfix\"><div class=\"mtphr-dnt-tick-container\"><div class=\"mtphr-dnt-tick-contents\"><div class=\"mtphr-dnt-tick mtphr-dnt-default-tick mtphr-dnt-clearfix \">The largest cybersecurity competition for young women in the Middle East, SHEHacks aims to raise awareness about information security and empower participants through skill-building opportunities and real-world experience.<\/div><\/div><\/div><\/div><\/div><br \/><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM-1024x657.jpeg\" sizes=\"(max-width: 800px) 100vw, 800px\" srcset=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM-1024x657.jpeg 1024w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM-300x192.jpeg 300w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM-768x492.jpeg 768w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM-1536x985.jpeg 1536w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/WhatsApp-Image-2024-07-09-at-7.37.13-AM.jpeg 1600w\" alt=\"\" width=\"800\" height=\"513\" \/><br \/>Unlock Your Potential in Cybersecurity with SHEHacks: Experience Real-World Challenges, Win Prizes, and Discover Job Opportunities.<\/p><p>Following the success of the groundbreaking 2024 SHEHacks competition, Green Circle is proud to launch the second edition of SHEHacks in 2025. The first cybersecurity competition in the Middle East dedicated to empowering women. Building on the momentum of our previous initiatives and the remarkable achievements of last year\u2019s participants, SHEHacks 2025 continues our mission to cultivate and elevate female talent in the cybersecurity field.<br \/>Following the success of the groundbreaking 2024 SHEHacks competition, Green Circle is proud to launch the second edition of SHEHacks in 2025. The first cybersecurity competition in the Middle East dedicated to empowering women. Building on the momentum of our previous initiatives and the remarkable achievements of last year\u2019s participants, SHEHacks 2025 continues our mission to cultivate and elevate female talent in the cybersecurity field.<\/p><p>This initiative is designed to inspire young women who are passionate about cyber and information security by providing real-world challenges, professional development, and direct pathways to employment. Through this competition, we aim to equip the next generation of female cybersecurity professionals with the technical skills, confidence, and career opportunities they need to thrive in this vital industry.<\/p><p><a href=\"\/index.php\/register\/\"><br \/>Register Here<br \/><\/a><br \/><a href=\"#fees\"><br \/>Participation Fees<br \/><\/a><\/p><h1>Meet Our Patron<\/h1><p><img decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/06\/harry-verweij-150x150.png\" alt=\"\" width=\"150\" height=\"150\" \/><br \/>The Honorable Harry Verweij<br \/>Dutch Ambassador in Amman<\/p><h4 style=\"text-align: center;\">We are honored to once again have Harry Verweij, the Netherlands Ambassador to Jordan, as the patron of SHEHacks. His continued support underscores the importance of empowering young women in cybersecurity and highlights the international commitment to gender inclusion in the tech sector. Ambassador Verweij\u2019s dedication to innovation and youth development aligns closely with our mission to inspire and advance the next generation of female cybersecurity professionals, creating meaningful opportunities for women in Jordan and beyond.<\/h4><figure><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/hackathon-circle-ewN-23.png\" alt=\"\" width=\"375\" height=\"356\" \/><\/figure><figure><img decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/08\/greenCircle-Shehacks-new-150x150.png\" alt=\"greenCircle Shehacks-new\" \/><\/figure><figure><img decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/08\/ec-council-Shehacks-new-150x150.png\" alt=\"ec-council Shehacks-new\" \/><\/figure><p>About SHEHacks<br \/>SHEHacks is a competition designed to empower young women and foster gender diversity in the field of cybersecurity. Inspired by Capture the Flag (CTF) competitions, participants engage in solving security-related challenges to uncover hidden data, known as &#8220;flags.&#8221; The competition is designed to test and enhance participants\u2019 skills in key cybersecurity domains, including Cryptography, Reverse Engineering, Web Application Security, Digital Forensics, Open Source Intelligence (OSINT), and Miscellaneous challenges that encourage creative problem-solving and critical thinking.<\/p><p><br \/><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/hackathon-circle-ewN-23.png\" sizes=\"(max-width: 1000px) 100vw, 1000px\" srcset=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/hackathon-circle-ewN-23.png 1000w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/hackathon-circle-ewN-23-300x285.png 300w, https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/hackathon-circle-ewN-23-768x730.png 768w\" alt=\"\" width=\"557\" height=\"518\" \/><br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2024\/07\/sec5-arrowNew.png\" alt=\"\" width=\"119\" height=\"71\" \/><br \/>SHEHacks, Aim To<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/sec6-planning.png\" alt=\"\" width=\"163\" height=\"163\" \/><\/figure><p>Encourage young women to pursue careers in cybersecurity.<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/sec6-strategys.png\" alt=\"\" width=\"163\" height=\"163\" \/><\/figure><p>Provide hands-on experience and specialized training.<br \/><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/08\/rocket-img.png\" alt=\"\" width=\"76\" height=\"128\" \/><\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/sec6-optimization.png\" alt=\"\" width=\"163\" height=\"163\" \/><\/figure><p>Enhance problem-solving and technical skills.<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/sec6-research.png\" alt=\"\" width=\"163\" height=\"163\" \/><\/figure><p>To create a network of young women in tech for ongoing support and collaboration.<\/p><figure><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/sec6-results.png\" alt=\"\" width=\"163\" height=\"163\" \/><\/figure><p>To facilitate career opportunities and professional development.<br \/><br \/>Eligibility<\/p><h2>The competition is exclusively open to young women who meet the following criteria:<br \/>\u2022 Must have a desire to learn about information security.<br \/>\u2022 Participants can be from inside or outside the Kingdom.<br \/>\u2022 Participants should be between the ages of 17 and 30 years.<\/h2><p>Competition Challenges<\/p><figure><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/cryptography.png\" alt=\"\" width=\"143\" height=\"143\" \/><\/figure><p>Encryption<\/p><p>Participants will learn and apply encryption principles, identify and exploit weaknesses in flawed implementations, and enhance their skills in data security. The challenge aims to deepen their understanding of protecting sensitive information using various encryption techniques.<\/p><figure><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/market.png\" alt=\"\" width=\"142\" height=\"142\" \/><\/figure><p>Web Exploitation\/ Penetration<\/p><p>Websites all around the world are programmed using various programming languages. While there are specific vulnerabilities in each programming language that the developer should be aware of, there are issues fundamental to the internet that can show up regardless of the chosen language or framework.<\/p><figure><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/122932.png\" alt=\"\" width=\"144\" height=\"144\" \/><\/figure><h3>Binary Exploitation<\/h3><p>In this challenge players will be asked to find a vulnerability (Binaries, or executables) in the program and exploit it to gain control of a shell in order to modify the program&#8217;s functions.<\/p><figure><img loading=\"lazy\" decoding=\"async\" class=\"\" src=\"https:\/\/ctfjo.com\/wp-content\/uploads\/2021\/10\/reverse-engineering.png\" alt=\"\" width=\"144\" height=\"144\" \/><\/figure><h3>Reverse Engineering<\/h3><p>In this challenge the players will be required to take a compiled (machine code, bytecode) program and convert it back into a more human readable format. Very often the goal of a reverse engineering challenge is to understand the functionality of a given program such that you can identify deeper issues.<\/p><h2>Get to know the Organizer<\/h2><p>Green Circle for Cyber solutions (GRCICO) is a Jordanian company, founded in 2017 by Mohammad Al-Khudari, specialized in cyber security. Green Circle is an innovative and professional organization that partners with top product vendors and partners with the aim to provide the market with the most efficient solutions in handling and managing any related topic to cyber security.<\/p><p>Green Circle team consists of many technical professionals and engineers with in depth experience and knowledge in the majors of cyber or information security, Risk Management, Compliance, SOC management and so on.<\/p><p>We are looking forward to hearing from you to apply to our competition and be apart of it, and hope the competition will provide you with the needed professional growth while also ensuring you are having fun, doing the things you are passionate about<\/p><p>Good Luck to you all, and may the best win<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Unlock Your Potential in Cybersecurity with SHEHacks: Experience Real-World Challenges, Win Prizes, and Discover Job Opportunities. Following the success of the groundbreaking 2024 SHEHacks competition, Green Circle is proud to launch the second edition of SHEHacks in 2025. The first cybersecurity competition in the Middle East dedicated to empowering women. Building on the momentum of our previous initiatives and the remarkable achievements of last year\u2019s participants, SHEHacks 2025 continues our mission to cultivate and elevate female talent in the cybersecurity field.Following the success of the groundbreaking 2024 SHEHacks competition, Green Circle is proud to launch the second edition of SHEHacks in 2025. The first cybersecurity competition in the Middle East dedicated to empowering women. Building on the momentum of our previous initiatives and the remarkable achievements of last year\u2019s participants, SHEHacks 2025 continues our mission to cultivate and elevate female talent in the cybersecurity field. This initiative is designed to&hellip;<\/p>\n<p> <a class=\"more-link\" href=\"https:\/\/ctfjo.com\/\">Read more<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-25","page","type-page","status-publish"],"_links":{"self":[{"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/pages\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/comments?post=25"}],"version-history":[{"count":446,"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions"}],"predecessor-version":[{"id":1645,"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/pages\/25\/revisions\/1645"}],"wp:attachment":[{"href":"https:\/\/ctfjo.com\/index.php\/wp-json\/wp\/v2\/media?parent=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}