CAPTURE THE FLAG

HACK.SOLVE.WIN.

Join the competition to compete with the hackers around the world to solve complex security challenges and cryptographic puzzles in a race against time.

Next Challenge Begins In:

0
Days
0
Hours
0
Minutes
0
Seconds

Challenge Categories

Put your skills to the test across multiple security domains. Each category offers challenges with varying difficulty levels.

Web Exploitation

Identify and exploit vulnerabilities in web applications to gain unauthorized access. Involves finding and exploiting vulnerabilities in web applications (e.g., SQL injection, XSS, insecure cookies) to gain unauthorized access or extract data.

Reverse Engineering

Analyze compiled programs to understand their functionality and find hidden flags. Analyzing compiled programs (usually binary files) to understand how they work, often without source code.

Cryptography

Decrypt messages, crack codes, and solve mathematical puzzles to reveal hidden information. Focuses on breaking or analyzing cryptographic algorithms to uncover hidden messages or flaws in implementation.

Forensics

Analyze digital evidence to uncover flags hidden in files, memory dumps, or network captures. Involves analyzing files, memory dumps, or network traffic to uncover hidden data.

Binary Exploitation

Exploit vulnerabilities in binary programs to gain control of program execution. Requires exploiting vulnerabilities in compiled binaries (e.g., buffer overflows) to take control of program execution.

General Skills

Focuses on fundamental knowledge like encoding, decoding, scripting, and basic file or data manipulation. Challenges often involve using Linux command-line tools, writing simple scripts, and working with various file types.

Challenge Rules

1

Challenges are worth varying points based on difficulty.

2

Flag format: heCTF{"flag"}

3

No sharing of flags or solutions during the competition.

4

DoS attacks against the platform are strictly prohibited.

Prizes & Rewards

Compete for glory, recognition, and substantial prizes that recognize your hacking prowess.

2nd Place

INR 1,500

1st Place

INR 2,000
CHAMPION

3rd Place

INR 1,000

Additional Prizes

CTF Merchandise for top 10 candidates

Event Timeline

Mark your calendar for these key dates and be ready to compete with the best.

Registration Opens

Reserve your spot in the competition.
Early registration includes access to practice challenges.

May 1, 2025

Challenge Begins

The competition launches.
Access to all challenges opens simultaneously worldwide.

May 16, 2025

Challenge Ends

The competition concludes.
Submission period will end simultaneously worldwide.

May 30, 2025

Winners Announcement

Winners are determined based on points and completion time.
The top three will receive prizes.

June 3, 2025

Interested in sponsoring this event.

Frequently Asked Questions

Find answers to common questions about the CTF challenge.

The challenge is open to everyone, from cybersecurity students to seasoned professionals. You can participate as an individual candidate only.

Participants should have basic knowledge in areas such as web exploitation, cryptography, reverse engineering, and forensics. Different challenges cater to different skill levels, from beginner to expert.

You can use any tools and resources at your disposal except for those that perform automated attacks against the competition infrastructure. Sharing flags or solutions with other teams is prohibited.

Each challenge is worth a specific number of points based on difficulty. The candidate with the highest score at the end wins. Ties are broken by the earliest submission time.

Yes, the CTF is entirely online. Participants from anywhere in the world can join as long as they have a stable internet connection.

After registration, you'll receive a confirmation email with details about the competition platform and how to access practice challenges.

No, participation is completely free.

Still have questions?