This hackathons is only open to students. Double check the event page for more information as this may mean only those from a particular university/country are eligible.
Event Type
in person
38
Participants
₹6,000
Prize Pool
3
Est. Projects
Organizers
Alex Johnson
alex@example.org
Jamie Rivera
jamie@example.org
Sam Chen
sam@example.org
Quality Score
Quality Score
72/100
High confidence
Organiser16/20
Event Maturity14/20
Sponsors18/25
Participants12/20
About the Competition:
Keyspace is a story-driven cybersecurity competition where participants must solve interconnected web security challenges to progress through different physical locations.
Each clue unlocks the next stage of the challenge.
Teams must demonstrate technical knowledge, logical reasoning, and stealth coordination to advance.
The first team to successfully solve all challenges wins.
General Rules:
All participants must maintain silence and discipline throughout the event.
When instructed to move rooms, participants must do so quietly and without disturbing others.
No hints will be provided unless declared by organizers.
All challenges must be solved using ethical methods only.
Physical tampering with infrastructure, routers, systems, or event materials is strictly prohibited.
Any attempt to disrupt other teams will lead to immediate disqualification.
Technical Rules:
Only web-based attacks within the challenge scope are allowed.
Denial of Service (DoS), brute-force flooding, or network disruption attacks are strictly prohibited.
Participants may not attack real-world systems or domains.
Use of automated exploit frameworks may be restricted (to be clarified during briefing).
External help (friends, online communities, AI tools, etc.) is not allowed unless explicitly permitted.
USB sharing between teams is prohibited.
Movement Rules:
Participants must move only when instructed.
Running, shouting, or creating disturbance is not allowed.
Entry to the final room is granted only after solving the required challenge.
Judging Criteria:
First team to complete all stages wins.
In case of a tie:
Time of final flag submission will be considered.
Number of incorrect submissions may be evaluated.
Judges’ decision will be final and binding.
Code of Conduct:
Respect organizers and fellow participants.
Maintain professional cybersecurity ethics.
Follow institutional guidelines at all times.
Any misconduct may result in immediate removal.
What Participants Must Bring:
Laptop (mandatory).
Charger.
Required tools pre-installed (browser, Burp Suite, etc. if allowed).
Student ID.