CAPTURE THE FLAG

Status

RECRUITMENT_OPEN

Capacity

NO_LIMIT

Initiate_Registration

By clicking you agree to the terminal_user_agreement and mission_protocols.

Sector: TECHNICAL 150 ENTRY_FEE

CAPTURE THE FLAG

Prize_Pool_Authorized

10,000

// Rewards_Calculation: Based_on_participation_thresholds //

DATE_LOG

2026-02-23

CREDITS_REQUIRED

₹150

EXPECTED_REWARDS

10,000

REGISTRATION_CLOSES

2026-02-20

TOTAL_SLOTS

NO_LIMIT

1. COMPETITION OVERVIEW ​​● Format: On-site reverse engineering challenge embedded in a custom survival game. ​​● Target: A pre-installed game on competition workstations. ​​● Objective: Find and verify 10 hidden flags within the game’s internal logic, mechanics, and systems. ​​● Verification: All flags must be entered and validated via the in-game Flag Terminal only. 2. CORE RULES & CONDUCT ​​● Strict "No External Tools" Policy: ​ ​ ​○​ Only pre-installed tools on the provided workstation may be used. ​ ​ ​○​ Use of personal hardware, USB drives, cloud services, or external decompilers is forbidden and will result in disqualification. ​​● Environment Integrity: ​ ​ ​○​ Work only on the assigned workstation. ​ ​ ​○​ Do not attempt to bypass, tamper with, or interfere with the verification system. ​​● Individual Play: This is a solo competition. Collaboration, screen sharing, or communication with other participants is prohibited. ​​● Internet Access: Restricted to local resources only. No external browsing or research allowed. 3. TECHNICAL SPECIFICATIONS ​​● Flag Format: All flags follow the pattern: CYBRELLA{...} ​​● RE Methodologies: Flags must be discovered through in-game interaction and logic analysis, including but not limited to: ​ ​ ​○​ Triggering hidden game-state transitions. ​ ​ ​○​ Observing and exploiting unintended game mechanics. ​ ​ ​○​ Discovering sequences, secrets, or oversights in game logic. ​ ​ ​○​ Uncovering Easter eggs or developer-hidden content. ​​● Scope: Flags are embedded in the game’s runtime logic and systems—not in external binaries, memory dumps, or asset files. 4. SCORING SYSTEM ​​● Points per Flag: ​ ​ ​○​ Flags 1–4 (Easy): 50 Points ​ ​ ​○​ Flags 5–7 (Medium): 100 Points ​ ​ ​○​ Flags 8–10 (Hard): 200 Points ​​● Tie-breaking: In case of a tie, the participant who submitted their final flag earliest wins. 5. PROHIBITED ACTIONS ​​● Denial of Service: Do not attempt to crash the game or OS. ​​● Social Engineering: Do not seek hints or information from event proctors. ​​● Tampering: Do not modify the game files, verification scripts, or flag-validation logic. 6. DISQUALIFICATION CRITERIA ​​● Use of unauthorized tools or external software. ​​● Communicating with other participants in any form. ​​● Possession of external notes, cheat sheets, or digital aids. ​​● Any attempt to subvert the competition’s technical or administrative controls.

Mission_Protocols

  • 01Strict "No External Tools" Policy: Participants are prohibited from using external software (e.g., Ghidra, IDA Pro, Cheat Engine, x64dbg) unless they are pre-installed on the provided system.
  • 02Use of personal USB drives, cloud storage, or internet-based decompiler services is strictly forbidden and will lead to immediate disqualification.
  • 03Environment Integrity: Participants must use the provided onsite workstation only. Any attempt to bypass the local verification system or "force-solve" the flag submission database will result in a score of zero.
  • 04Individual Play: This is a solo competition. Collaborating with other participants or viewing their screens is prohibited.
  • 05Internet Access: Internet access is restricted. Any research must be done using the documentation provided locally (if any).
  • 06The tournament organizer’s decision shall be final in all matters not explicitly covered by these regulations.
  • 07Once the registration is successfully completed and the fee is paid, no refunds will be issued under any circumstances.