Cybersecurity Problem Setter Challenge

1264 Registered Allowed team size: 1

This campaign is over.

Problem Submission Phase
starts on:
Aug 31, 2020, 12:30 AM
ends on:
Nov 23, 2020, 12:25 AM
Evaluation Phase
starts on:
Dec 21, 2020, 06:20 PM
ends on:
Dec 21, 2020, 06:25 PM


enter image description here


Here are the Top 10 participants from the challenge (In no particular order)

Kaushal Kumar Agarwal
Lakshay Arora
Rami Husami
Ravi Teja
Smit Sawant
Suvaditya Sur
Syed Modassir Ali
Utkarsh Yadav
Hitesh Patra

Do you love thinking out of the box and setting challenges? Do you have some interesting and creative problems to share in the domain of Cybersecurity? Share your ideas here!

HackerEarth is looking for Cybersecurity problem setters across the globe to come, collaborate together and build better contests in the domain of Cybersecurity.

How to participate?

  • Easy! Register and submit your problem statements as per the submission guidelines for testing and certification.
  • Join the Slack channel to get connected with the organizers and stay up-to-date with all HackerEarth events
  • We will carry out the evaluation and testing at our end and classify your submissions under the categories - Easy, Medium, Hard.
  • Once approved, we will credit the certificates to you!
  • You are not limited in terms of the problems/challenges you can submit. So go ahead and submit as many creative challenges you can come up with.
  • Additional goodies for the top 5 participants who submit the most innovative challenges.
  • We will use the challenges you submit in our Cybersecurity Community events! We will feature your HackerEarth profile in the events we use your submitted challenges in!
  • Participants who submit more than 5 approved problem statements will win a chance to interview with HackerEarth for the position of Remote Subject Matter Expert - Cybersecurity!


Core Concepts
Web Application Security (OWASP - Top 10)
Malware Analysis
Reverse Engineering
Network Security
Computer Forensics

1. Web Application Security is a branch of information security that deals specifically with security of websites, web applications and web services.

2. PWN category consists of challenges that test your skills in bypassing security mechanisms inside of systems.

3. Malware Analysis is the process of determining the functionality, origin and potential impact of a given malware sample such as a Virus, Worm, Trojan horse, rootkit, or backdoor.

4. Reverse Engineering is the process by which a man-made object is deconstructed to reveal its designs, architecture, code or to extract knowledge from the object.

5. Network Security is practices adopted to prevent and monitor unauthorised access, misuse, modification, or denial of a computer network.

6. Computer Forensics is a branch of digital forensic science pertaining to evidence found in computers and digital storage media.

7. Steganography is the practice of concealing a file, message, image, or video within another file, message, image, or video.


Zip and upload all the source files, executable / Docker File , deployment instructions, write up and README files on the HackerEarth platform. Please provide the Deployed URL link if your code is deployed anywhere. If not, provide source code to run it locally.

Open Innovation

Have we missed out on any of your favorite categories in Cybersecurity? Submit your new conecepts/challenges under the open innovation theme!


Main Prizes
Top 5

Participants who submit 5 or more approved challenges win a chance to interview at HackerEarth and work as a remote Subject Matter Expert with our Cybersecurity team!

Top 10

Participants who make it into the Top 10 impressing the team with innovative challenges, will win a giftcard worth $10

Special Category Certificates

Win unique certificates from HackerEarth based on the category of the problem statement submitted!

Social Share

View All Notifications