Rules
Objectives
- Practice problem-solving and security awareness in a safe environment.
- Learn to use investigative tools and reasoning to find vulnerabilities responsibly.
- Compete in a friendly and educational context.
How It Works
- Each challenge is standalone and linked to a specific date.
- You can solve challenges in any order, but solutions before the unlock date won’t count.
- Submit flags via the provided platform or form.
- Hints may be released after a few days if a challenge proves difficult.
Acceptable Behavior
- Only interact with the challenge environments provided.
- Work individually unless the challenge explicitly allows collaboration.
- Document and share learning points, not exploit details.
Prohibited Behavior
- Attack, scan, or stress-test any systems outside the official challenge scope (e.g., production servers, institutional sites, or networks).
- Attempt privilege escalation or data extraction from the hosting infrastructure.
- Automate attacks that degrade service availability.
- Share or leak challenge solutions publicly before the calendar ends.
- Use the event to test real-world systems or gather unauthorized data.
Code of Conduct
This CTF follows the principles of ethical hacking and responsible learning:- Respect the environment and your peers.
- When in doubt about an action, assume it is not allowed unless confirmed by organizers.
- Report any unexpected findings or vulnerabilities immediately to the organizers.
Scoring and Recognition
- Each flag contributes a specific number of points.
- Bonus points may be awarded for clarity in explanations or creative problem-solving.
- Top participants may receive recognition at the end of the event.
Tips for Success
- Read challenge descriptions carefully before acting.
- Use standard investigation and debugging tools responsibly.
- Avoid brute-forcing; most challenges rely on logic and observation, not raw power.
- Keep notes — documenting your process helps reinforce learning.