
Status
RECRUITMENT_OPEN
Capacity
NO_LIMIT
By clicking you agree to the terminal_user_agreement and mission_protocols.
// Rewards_Calculation: Based_on_participation_thresholds //
DATE_LOG
2026-02-23
CREDITS_REQUIRED
₹150
EXPECTED_REWARDS
10,000
REGISTRATION_CLOSES
2026-02-20
TOTAL_SLOTS
NO_LIMIT
1. COMPETITION OVERVIEW ● Format: On-site reverse engineering challenge embedded in a custom survival game. ● Target: A pre-installed game on competition workstations. ● Objective: Find and verify 10 hidden flags within the game’s internal logic, mechanics, and systems. ● Verification: All flags must be entered and validated via the in-game Flag Terminal only. 2. CORE RULES & CONDUCT ● Strict "No External Tools" Policy: ○ Only pre-installed tools on the provided workstation may be used. ○ Use of personal hardware, USB drives, cloud services, or external decompilers is forbidden and will result in disqualification. ● Environment Integrity: ○ Work only on the assigned workstation. ○ Do not attempt to bypass, tamper with, or interfere with the verification system. ● Individual Play: This is a solo competition. Collaboration, screen sharing, or communication with other participants is prohibited. ● Internet Access: Restricted to local resources only. No external browsing or research allowed. 3. TECHNICAL SPECIFICATIONS ● Flag Format: All flags follow the pattern: CYBRELLA{...} ● RE Methodologies: Flags must be discovered through in-game interaction and logic analysis, including but not limited to: ○ Triggering hidden game-state transitions. ○ Observing and exploiting unintended game mechanics. ○ Discovering sequences, secrets, or oversights in game logic. ○ Uncovering Easter eggs or developer-hidden content. ● Scope: Flags are embedded in the game’s runtime logic and systems—not in external binaries, memory dumps, or asset files. 4. SCORING SYSTEM ● Points per Flag: ○ Flags 1–4 (Easy): 50 Points ○ Flags 5–7 (Medium): 100 Points ○ Flags 8–10 (Hard): 200 Points ● Tie-breaking: In case of a tie, the participant who submitted their final flag earliest wins. 5. PROHIBITED ACTIONS ● Denial of Service: Do not attempt to crash the game or OS. ● Social Engineering: Do not seek hints or information from event proctors. ● Tampering: Do not modify the game files, verification scripts, or flag-validation logic. 6. DISQUALIFICATION CRITERIA ● Use of unauthorized tools or external software. ● Communicating with other participants in any form. ● Possession of external notes, cheat sheets, or digital aids. ● Any attempt to subvert the competition’s technical or administrative controls.