This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
2
Participants
0
Est. Projects
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
Eligibility:
Open to all undergraduate and postgraduate students.
Participants must register before the event start time.
Each participant must comply with the event’s code of conduct and cybersecurity ethics.
Team Composition:
Team size: 1–4 members.
Inter-specialization teams: Allowed.
Solo participation is permitted.
Event Format:
Type: Cybersecurity-based competitive Capture The Flag (CTF).
Mode: Hybrid Event (Offline + Online).
The competition is divided into 2 main parts, each consisting of 2 sub-levels.
Competition Structure:
Capture The Flag (CTF):
Offensive cybersecurity challenge.
Participants must analyze vulnerable systems, exploit weaknesses, and retrieve hidden flags.
Challenges are level-based, increasing in difficulty.
Categories may include (but are not limited to):
Web Exploitation
Cryptography
Reverse Engineering
Forensics
Binary Exploitation
OSINT
King of the Hill (KoTH):
Defensive cybersecurity challenge.
Teams are given access to a server/system that must be secured and maintained.
Other teams will attempt to compromise the system.
Scoring is survival-based — the longer your system remains secure, the higher your score.
Number of Questions / Problem Statements:
3 questions per domain
Each domain will have 3 difficulties easy , medium , hard
Duration:
Total Duration: 24 hours
Start: 30 January – 6:00 PM
End: 31 January – 6:00 PM
The event runs continuously (day & night).
Scoring & Ranking:
Points awarded for each successfully captured flag.
KoTH scores are based on system uptime and resistance to attacks.
Final leaderboard will be based on combined scores from all rounds.
Rules:
Fair Play
Participants must not share flags, solutions, exploits, or hints with other teams.
Any form of plagiarism or collaboration between teams will lead to disqualification.
Authorized Targets Only
Attacks are strictly limited to the provided systems and challenges.
Attacking the event infrastructure, organizers’ systems, or external networks is prohibited.
No Automation Abuse
Use of automated brute-force tools or scripts that generate excessive traffic is not allowed unless explicitly permitted.
Accountability
Each team is responsible for the actions performed using their credentials.
Teams found exploiting unintended vulnerabilities in the platform itself will be penalized.
King of the Hill Conduct
Do not intentionally disrupt the availability of the platform (e.g., DoS/DDoS attacks).
Defensive measures must stay within the allowed system permissions.
Environment Integrity
Tampering with logs, scoring systems, or other teams’ access credentials is strictly forbidden.
Organizer’s Authority
The organizers reserve the right to:
Modify rules if necessary.
Disqualify teams for misconduct.
Resolve disputes and make final decisions.
Ethical Hacking Policy
This event promotes ethical cybersecurity practices only.
Any behavior violating legal or ethical standards will result in immediate removal.