Capture The Flag

🏆 prize pool – 2 lakhs

Event Description:

HackEra CTF is a 8 hour (in phases) cybersecurity battleground where only the sharpest minds will rise to the top! This electrifying Capture the Flag (CTF) challenge will push your problem-solving abilities, technical expertise, and hacker instincts to the limit.

Rewards and Prizes🚀

RULEBOOK

1. General Rules

  • 1.1. The competition is open to all registered participants who must abide by the rules and ethical hacking guidelines.
  • 1.2. Participants must respect the spirit of fair competition and ethical conduct.
  • 1.3. Any attempt to attack the event infrastructure, organizers, or other participants outside the provided challenges will result in immediate disqualification.
  • 1.4. Participants must not share solutions, flags, or hints with others.
  • 1.5. The event organizers reserve the right to modify rules and make final decisions on disputes.

2. Team Composition & Registration

  • 2.1. Participants can compete individually or in teams (maximum of 2 members per team).
  • 2.2. Each team must register with a unique team name and valid contact details.
  • 2.3. Multiple registrations by the same individual across different teams are prohibited.

3. Competition Format

3.1. The competition consists of two rounds:

Round 1: A multiple-choice questions (MCQ) test along with coding challenges. This is an eliminating round.

Round 2: Capture The Flag (CTF) cybersecurity battleground.

3.2. Participants will navigate a series of security puzzles, exploit vulnerabilities, and break encryption to seize control of digital flags.

3.3. The event follows a Jeopardy-style CTF format, featuring challenges in:

  • Web Exploitation – Find vulnerabilities, inject payloads, and take control of web applications.
  • Cryptography – Crack encrypted messages, decipher codes, and unveil secrets hidden in ciphers.
  • Reverse Engineering – Disassemble, analyze, and manipulate software to uncover hidden functionalities.
  • Forensics – Recover lost data, analyze digital traces, and uncover cybercriminals’ footprints.
  • OSINT (Open-Source Intelligence) – Use detective skills to gather intelligence and uncover critical information.

3.4. Teams earn points by solving challenges and capturing flags.

3.5. The difficulty of challenges determines their respective points.

3.6. The team with the highest score at the end of the competition wins.

3.7. In case of a tie, the team that achieved the highest score first will be ranked higher.

4. Scoring System

  • 4.1. Each challenge has a predefined point value based on its difficulty level.
  • 4.2. Submissions are evaluated automatically by the CTF platform.
  • 4.3. Partial credit may be awarded for multi-stage challenges.
  • 4.4. Teams can track their progress via the live leaderboard.

5. Code of Conduct

  • 5.1. Any form of cheating, collusion, or use of unauthorized tools will result in disqualification.
  • 5.2. No brute force attacks on the competition platform.
  • 5.3. Do not attempt to disrupt or tamper with other teams’ progress.
  • 5.4. Any form of harassment, discrimination, or inappropriate behavior will not be tolerated.

6. Technical Guidelines

  • 6.1. Participants are encouraged to use open-source tools and legally obtained software.
  • 6.2. VPNs, TOR, and proxies are not allowed unless explicitly stated in a challenge.
  • 6.3. Teams should follow responsible disclosure principles while handling vulnerabilities.

7. Prizes & Recognition

  • 7.1. Winners will receive certificates, prizes, and recognition from event sponsors.
  • 7.2. Top performers may be considered for cybersecurity internships or training programs.
  • 7.3. All participants will receive a certificate of participation.

8. Disqualification & Appeals

  • 8.1. The event organizers hold the right to disqualify any participant/team for rule violations.
  • 8.2. Appeals regarding scoring or disputes must be submitted within 30 minutes of the competition ending.
  • 8.3. The decision of the organizing committee is final and binding.

9. Contact & Support

Mr. Ankit Chaudhary – 8745888942

Mr. Pranav Maheshwari – 9557410485

By registering for the event, all participants agree to abide by the rules and guidelines mentioned in this rulebook.

🎫One pass for all events🎫

Search

Popular Events

  • Forensic Science and Crime Scene Investigation
    Forensic Science and Crime Scene Investigation

    Forensic science plays a crucial role in modern crime investigation and justice systems. Understanding the science behind crime scene analysis allows law enforcement agencies to identify suspects, collect evidence, and solve criminal cases efficiently. Click to learn more

  • Blossoms in Harmony: The Art of Floral Arrangement
    Blossoms in Harmony: The Art of Floral Arrangement

    Open to all interested participants, with each team consisting of two contestants. Participants will have 45 minutes to complete their arrangements using only natural flowers, as artificial flowers are strictly prohibited. The university will provide 5 types of foliage and… Click to learn more

  • Culinary Conquerors: The Art of Cooking
    Culinary Conquerors: The Art of Cooking

    Competition invites all interested participants to showcase their culinary skills. Each team, consisting of two contestants, will prepare a three-course menu using only the ingredients provided by the university, within a strict 3-hour time limit. While participants are allowed to… Click to learn more