This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
₹22,000
Prize Pool
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
About CyberConquest:
CyberConquest is a high‑intensity cybersecurity competition designed to simulate real‑world investigative and offensive security scenarios. The event is structured into two rigorous phases — an Offline Digital Forensics Investigation followed by an Advanced Capture‑the‑Flag (CTF) round.
The competition is built to test participants on analytical thinking, technical depth, teamwork, and endurance, making it an ideal platform to identify top cybersecurity talent.
Objectives:
Promote hands‑on cybersecurity skills among students
Bridge the gap between academic learning and real‑world security challenges
Identify and reward exceptional talent in Digital Forensics and Offensive Security
Provide sponsors with visibility among highly motivated, technically skilled participants
Team Composition:
Team Size: 1–3 members per team
Participation Type: Student teams
Cross‑year teams are allowed, inter-college teams are not allowed.
Event Structure (Two‑Phase Model):
Phase 1: Digital Forensics Investigation
Mode: Offline (On‑site)
Duration: 6 Hours
Difficulty Level: Intermediate → Advanced
Overview:
Teams are presented with simulated cybercrime scenarios and digital evidence. Participants must analyze, extract, and interpret forensic artifacts to answer investigative questions.
Key Skill Areas Tested:
Disk & File System Forensics
Memory Analysis
Network Traffic Analysis
Log & Timeline Reconstruction
Data Recovery & Correlation
Outcome:
Teams are ranked based on accuracy, depth of analysis, and completeness
Top 4–8 teams qualify for Phase 2 (number depends on total participation)
Phase 2: Capture‑the‑Flag (CTF) Round
Mode: Offline (On‑site)
Duration: 8 Hours
Difficulty Level: Intermediate → Advanced
Overview:
Qualified teams compete in a high‑pressure CTF environment featuring realistic security challenges inspired by industry and competitive hacking scenarios.
Challenge Domains:
Digital Forensics
Web Exploitation
Binary Exploitation
Cryptography
Reverse Engineering
OSINT & Miscellaneous Security Challenges
Scoring Model:
Dynamic scoring based on challenge difficulty
Rules & Regulations (General)
Teams must consist of a maximum of 3 members
All activities must remain within the scope of provided challenges
Internet access may be restricted or monitored during offline rounds
Use of any Large Language Model (LLM), AI assistant, or generative AI tool (online or offline) is strictly prohibited
Use of automated attack tools may be restricted depending on challenge rules
Any form of cheating, collusion, or rule violation leads to immediate disqualification
Judges’ decisions are final and binding
Phase‑Specific Rules:
Phase 1 – Forensics Rules
Evidence files must not be altered or corrupted
Only analysis is permitted; brute‑forcing unrelated systems is prohibited
External data sharing between teams is strictly forbidden
Phase 2 – CTF Rules
Attacking the competition infrastructure is prohibited
Flag sharing between teams is strictly disallowed
Teams must rely solely on their own skills and tools
Prize Pool (Indicative):
Total Prize Pool: ₹22,000+ (subject to sponsorship)
Winner: ₹10,000 Cash Prize + Certificates + Goodies*
Runner‑up: ₹7,000 Cash Prize + Certificates + Goodies*
Second Runner‑up: ₹5,000 Cash Prize + Certificates + Goodies*
Goodies will be awarded if provided by sponsors and may also be extended to other outstanding performers, at the discretion of the organizers.
Sponsorship Opportunities:
CyberConquest offers sponsors:
Direct engagement with top cybersecurity talent
Brand visibility across event materials, banners, and digital promotions
Opportunity to sponsor challenges, prizes, or special awards
Recognition during opening and closing ceremonies
(Custom sponsorship tiers can be designed upon request.)
Target Audience:
Undergraduate students
Cybersecurity enthusiasts
Competitive CTF players
Digital forensics and SOC aspirants
Event Snapshot:
Event Name: CyberConquest
Format: Offline, Two‑Phase
Phase 1: Digital Forensics – 6 Hours
Phase 2: CTF – 8 Hours
Team Size: 1–3 Members
Qualification: Top 4–8 teams advance to CTF