This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
7
Participants
0
Est. Projects
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
Sam Chen
sam@example.org
Quality Score
Quality Score
72/100
High confidence
Organiser16/20
Event Maturity14/20
Sponsors18/25
Participants12/20
Participation Rules
This is an individual event (no teams allowed).
Each participant must carry a valid college ID card.
A participant can register only once.
Use of personal laptop is allowed (bring your own device).
Internet access will be provided (if required).
Event Format
The competition will consist of multiple cybersecurity challenges.
Participants must find hidden flags (secret codes) to score points.
Categories may include Cryptography, Web Exploitation, Forensics, Reverse Engineering, and Basic Programming.
Flags will be in a specific format (e.g., FLAG{example_code}).
Each correct flag submission earns points.
Time Rules
Total duration: 2–3 hours (as decided by organizers).
The participant with the highest score will be declared the winner.
In case of a tie, the participant who solved challenges in less time will rank higher.
Scoring System
Easy challenges: Low points.
Medium challenges: Moderate points.
Hard challenges: High points.
Bonus challenges may be included.
Rules & Restrictions
No collaboration or sharing of solutions.
No attacking the competition platform or server.
No denial-of-service (DoS) attempts.
Brute-force attacks only if explicitly allowed.
Any attempt to exploit infrastructure will lead to disqualification.
Disqualification
Cheating or discussing answers.
Using unfair means.
Misbehavior during the event.
Violating cybersecurity ethics.
Judging Criteria
Total points scored.
Speed of solving.
Compliance with rules.