0% found this document useful (0 votes)
14 views

rules

The Hack or Crack CTF is a cybersecurity competition organized by DG-Sentinels, open to students with valid College IDs, featuring solo participation. It follows a Jeopardy-style format with various challenges in areas like cryptography and forensics, running on March 10th from 10AM to 5PM. Strict rules prohibit collaboration, use of certain tools, and unethical behavior, with penalties for violations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
14 views

rules

The Hack or Crack CTF is a cybersecurity competition organized by DG-Sentinels, open to students with valid College IDs, featuring solo participation. It follows a Jeopardy-style format with various challenges in areas like cryptography and forensics, running on March 10th from 10AM to 5PM. Strict rules prohibit collaboration, use of certain tools, and unethical behavior, with penalties for violations.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Hack or Crack CTF - Rulebook

Organized by DG-Sentinels
10th March

Official Rulebook for Hack or Crack CTF

1 Introduction
Hack or Crack CTF is a Capture The Flag (CTF) competition organized by DG-
Sentinels to challenge participants in the field of cybersecurity through hands-on problem-
solving in various domains such as cryptography, forensics, reverse engineering, OSINT
and Game Hacking.

2 Eligibility
ˆ The competition is open to all students with valid College ID.

ˆ Participants can compete solo only.

ˆ Organizers and problem setters are not eligible to participate.

3 Competition Format
ˆ The event follows a Jeopardy-style CTF format with challenges in different cate-
gories.

ˆ Challenges will have different point values based on their difficulty.

ˆ The event will run from [10AM] to [5PM] on 10th March.

ˆ There will be 2 Waves of Challenges.

ˆ The CTF platform will be announced before the event.

4 Rules and Regulations


ˆ Participants must not attack the competition infrastructure.

ˆ No need for any Web Exploit Tools (For example: Burpsuite, Nmap, BEeF, etc)

ˆ Denial-of-Service (DoS) attacks, brute-forcing challenges, and automated scanning


tools are strictly prohibited.

1
ˆ Collaboration between Players is not allowed.
ˆ Sharing flags or solutions with others is strictly prohibited.
ˆ Use of Communication Apps like WhatsApp, Discord, Telegram, WebRTC, etc. is
strictly prohibited.
ˆ If Any participant found violating the rules will get an immediate penalty.

5 Challenges
ˆ Cryptography
ˆ Reverse Engineering
ˆ Digital Forensics
ˆ OSINT (Open Source Intelligence)
ˆ Game Hacking
ˆ Machine Learning
ˆ Miscellaneous
Each challenge carries a specific number of points based on its difficulty.

6 Scoring and Winning Criteria


ˆ Points are awarded based on the difficulty of challenges.
ˆ Hints will be provided with the cost of a few points deduction based on how good
a Hint is.
ˆ The Players with the highest score at the end of the competition wins.
ˆ In case of a tie, the player that reached the score first will be ranked higher.
ˆ Any disputes will be resolved by the organizers, and their decision will be final.

7 Code of Conduct
ˆ Participants must maintain integrity and professionalism.
ˆ Any unethical behavior, including harassment, discrimination, or cheating, will not
be tolerated.
ˆ The organizing team reserves the right to take action against any misconduct.

8 Contact Information
For any queries, please reach out to the DG-Sentinels team via [email protected].
Happy Hacking and Good Luck!

You might also like