-
Follow the Event's Code of Conduct and Rules Explicitly
Always read and strictly adhere to the official competition rules and code of conduct. Breaking rules can lead to disqualification.
Every CTF has its own specific rules that may differ from other competitions. These rules are designed to ensure fair play and maintain the integrity of the competition. Familiarize yourself with them before starting, as ignorance of rules is not an acceptable excuse for violations.
-
Do NOT Attack the Event Infrastructure
Do not perform Denial of Service (DoS/DDoS) attacks, brute force, or any action that might harm the event infrastructure.
The competition infrastructure is shared by all participants. Attacking it can disrupt the experience for everyone and may result in immediate disqualification. Focus on solving the challenges rather than breaking the platform itself. If you discover a vulnerability in the platform, report it to the organizers instead.
-
Work Within the Scope of the Challenges
Attack only the machines, services, and targets explicitly marked as in-scope. Out-of-scope attacks are unethical and often illegal.
CTF challenges are carefully designed with specific learning objectives in mind. Staying within scope ensures you're developing the intended skills and knowledge. Attempting to exploit unintended vulnerabilities or attacking out-of-scope systems can have serious legal consequences.
-
TIP Document Your Process and Findings Clearly
Take clear, thorough notes of every step you perform — this is crucial for reporting flags, writing post-event reports, and for your own learning.
Good documentation helps you track your progress, avoid repeating unsuccessful approaches, and learn from your experience. It's also valuable for team collaboration and may be required for flag submission or write-ups. Screenshots, command history, and detailed notes will prove invaluable.
-
Respect Other Teams (No Sabotage or Interference)
Never interfere with other participants' systems, flags, or strategies. Ethical conduct is paramount.
CTFs are competitive but should remain respectful. Attempting to steal flags from other teams, sabotaging their progress, or engaging in social engineering against other participants violates the spirit of the competition and ethical hacking principles. Focus on your own challenges.
-
Respect Your Team
Never walk alone, work with your team as this is a "Team-based event".
Always be respectful, cooperative and friendly to your team and other teams.
-
TIP Communicate Effectively Within Your Team
Share information clearly, divide tasks wisely, and collaborate efficiently. Good teamwork often outperforms pure individual skill.
Establish clear communication channels and protocols within your team. Regularly update each other on progress, share discoveries, and avoid duplicating efforts. Assign tasks based on team members' strengths and maintain a collaborative atmosphere that encourages knowledge sharing.
-
TIP Manage Your Time Strategically
Prioritize easier challenges first to secure quick points and ensure consistent progress throughout the competition.
Time management is crucial in CTFs. Start with challenges that match your skill level to build momentum and confidence. Don't spend too much time stuck on a single problem - if you're not making progress after a reasonable effort, move on and return later with fresh perspective.
-
Stay Ethical and Legal (No Out-of-Bounds Hacks)
CTF events are simulated environments. Don't extend your hacks to external networks or real-world services, which can result in legal consequences.
The skills you practice in CTFs are powerful and could be misused. Always maintain ethical boundaries and never apply techniques learned in CTFs against systems without explicit permission. Remember that unauthorized access to computer systems is illegal in most jurisdictions and carries severe penalties.
-
TIP Keep Your Devices and Accounts Secure
Use strong passwords, VPNs (if required), and secure your laptops and accounts to avoid being compromised by others.
your own security is your own responsibility. Use unique, strong passwords for competition accounts, keep your devices updated and secured, and be cautious about connecting to untrusted networks. Consider using a dedicated VM for competitions to isolate your activities.
-
TIP Have Fun and Network Respectfully
CTFs are not just competitions but also learning and community-building events. Engage with others respectfully and enjoy the process.
The cybersecurity community is built on knowledge sharing and mutual respect. Use CTFs as opportunities to meet like-minded individuals, learn from others, and build professional relationships. The connections you make can be as valuable as the skills you develop.
-
Privacy Policy
By reading this, you agree to the collection of the data you provided for use in organizing this event.
We are using this data solely to organize this event and form teams. We will not sell, share, or use your data for marketing or any other unrelated purposes.
ANYONE WHO WOULD BREAK THESE RULES WILL GET DISMISSED IMMEDIATELY FROM THE EVENT (EVEN THE LEADERS)