Event Rules

Contest Rules

CYBER CUP | VIRTUAL hacking EVENT | November 2  &  9

“Capture the Flag!”

The goal: The goal of each challenge is to find a “flag,” which is a string of text. The flags for each challenge are submitted on this site in order to receive points.

The scoring: Challenges award varying amounts of points depending on difficulty. The teams with the most amount of points at the end of the event wins. The scoreboard is automatically updated to reflect the current state of the event. The scoreboard will reflect the final rankings when the event ends. In the event of a tie for points, the fastest team wins.

The format: Flags will have the following: CTF{<string>}. Please submit the entire flag, including CTF{}. Example flag: CtF{54fd2fe82f70de08205508ec71811cce}

Ground Rules

No Outside Help: Participants are allowed to use outside help during the event, but for educational purposes and only to help guide the team not give the answers (no unregistered players are allowed). Google/internet research is allowed.

No Collateral Damage: Only attack systems for which they have explicit permission and are running in the competition infrastructure (these will be clearly indicated). No attacks on any systems or equipment outside of this environment are allowed.

Brute Forcing: Avoid generating large amounts of traffic and/or brute forcing; none of the challenges can be solved by running automated scanners, so please do not do so. This includes scanning with Nikto, Skipfish, Vega, Nessus etc. (Nmap and Sqlmap are fine!).

No Fratricide: Sabotaging or in any way hindering the progress of other competing teams is strictly not allowed. This includes attempting to alter or disrupt a challenge or service after you have completed it.

One Team/Multiple Challenges: Each individual team can work on multiple challenges at one time, with some restrictions, based on the portal backend software.

Challenge Progression: Challenges may be attempted in any order. If your team is stuck on a challenge, move on to a different challenge.

Bring Your Own Attack Platform: All teams need to bring their own attack platform(s). We recommend Kali Linux, but this is not a requirement.

Restrictions: Students or professionals, ages 18 and over, enrolled at a participating college or university during the 2023 academic year are eligible to participate. Partners, Principals, and employees of Deloitte LLP and its subsidiaries are not eligible to participate in the competition. Government employees may enter, but may not win a prize.

In the Event of a Tie: The fastest participant wins.   

 

CHALLENGE CATEGORIES

Network: Networking activity challenges, including network packet capture analysis

Web: Challenges related to Web vulnerabilities

Crypto: Challenges related to breaking weak cryptography

Miscellaneous: Challenges that do not fit into the other category

Forensics: Challenges related to forensics investigations and incident response

Reverse Engineering: Challenges related to reverse engineering apps/programs