This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
A Capture The Flag (CTF) event is a puzzle based competition where participants solve challenges in various fields, such as coding, logic, and problem-solving. It is a cybersecurity competition to find weaknesses and exploit loopholes in various computer programs. CTF aims to engage participants in the creative exploration of real-world computer security by distilling the significant disciplines of professional cybersecurity into short, objectively measurable exercises. It will be a 'Jeopardy!' style event. Limited Seats ! It is an Offline Event First Come First Serve There will be a set of challenges from different categories like cryptography, web security, forensics, steganography, reverse engineering, binary exploits, etc. The challenges can either be a collection of downloadable files to find the 'flag' or running it as web services in which the participants try to connect and exploit to retrieve the Flag. The participants will be ranked based on their scores, and the time taken will be used as a tiebreaker. Event Categories: Steganography Cryptography Reverse Engineering OSINT Web Exploitation (Offensive Security , Defensive Security) Team Composition Rules: Team Name: Teams must choose a unique name that is appropriate and not offensive. No impersonation of other teams or organizations. Team Size: Minimum 2 Maximum 4 members per team Individual Participant not Allowed. Team Formation: Teams must be formed and registered before the competition starts. No last-minute changes unless approved by organizers. No player can be part of multiple teams. Eligibility: Open to students only. Participants must comply with the event’s code of conduct CTF Challenge Rules: Installation Needed: kali Linux (Usage for participating the CTF Event) Fair Play & Restrictions: DO NOT Attack the event infrastructure (e.g., DoS, brute-forcing, exploiting unintended vulnerabilities). Any team violating this rule will be banned immediately. Flag Submission: Flags must be submitted via the official CTF platform only. Hints & Assistance: Challenge hints may be released at the organizer’s discretion. General Conduct: No flag sharing, collaboration with other teams, or external assistance. Sharing flags or solutions is considered as cheating and may result in disqualification. Respect other teams and organizers—Improper behavior may lead to disqualification. Final Decisions: The organizers decisions are final in case of disputes or rule violations. Incorrect Flag Submission Penalty: Repeated abuse or flag guessing may lead to point deductions or disqualification Permitted Tools & Resources: Participants are required to bring their own laptops or devices. While the college Wi-Fi will be accessible, it is recommended to have a personal mobile hotspot as a backup in case of connectivity issues. Pre-written scripts are allowed. Judging Criteria: Each category contains a variety of challenges of different point values and difficulties. Participants will be ranked based on their scores, and the time taken to solve the challenge will be considered in case of a tie. The decision of the organizers will be final.