Challenge

Unleash Your Cyber Skills, Capture the Flag and Rise to the Challenge!

Take on top-tier security experts in a series of challenges that demand a wide range of skills, including reverse engineering, web hacking, network infiltration, and cryptography.

Place yourself among the best and attempt to win!

At OffensiveX 2024, we pushed the boundaries of what a CTF competition could be.

This year, the stakes are higher than ever. OffensiveX 2025’s CTF will push boundaries, break limits, and force you to prove you’ve got what it takes.

Stay tuned—full details, including the theme, dates, rules, and prizes, will be announced soon.




Click here for optional CTF Pre-registration of your team





Offensive X Capture The Flag Competition Rules and Conduct Guidelines

  • Team Registration Is Final:
Everyone participating must lock in a team name and a list of members (maximum 3 members, name and email address of each member is required) during on-site conference check-in (09:00 AM, Day 1). After that, no renaming of your team and no adding-or-swapping players for the rest of the CTF.

  • Authorized Targets Only:

     Only attack the designated CTF challenge systems. Any attempt to target or disrupt the competition infrastructure (e.g. the scoreboard server, scoreboard panels, event network, or other teams’ machines) is strictly prohibited. This includes launching Denial-of-Service (DoS) attacks, ping-flooding, or trying to modify the scoreboard. Similarly, do not brute-force the flag submission system or spam flag guesses. Such actions are considered egregious cheating and will result in immediate disqualification.

  • No Flag Sharing or Outside Assistance:

     Teams must solve challenges independently. Sharing flags, solutions, or hints with other teams is forbidden, as is receiving help from anyone not on your team (no outside assistants or collusion between teams). Collaboration is only allowed among members of the same team – any inter-team cooperation or soliciting answers from outsiders is cheating. Teams caught exchanging flags or coordinating with other teams will be disqualified.

  • Submit Flags Immediately (No Flag Hoarding):

     Flags should be submitted as soon as they are obtained. Deliberately holding solved flags without submitting (a practice known as “flag hoarding”) to gain a strategic advantage is not allowed. Teams caught hoarding flags – for example, waiting until the last moment to submit a batch of flags – may be penalized or disqualified at the organizers’ discretion.

  • Sportsmanship and Respect:

     All participants are expected to compete in a fair, professional, and respectful manner. Any form of harassment or discriminatory behavior towards others will not be tolerated. Do not disrupt or distract other competitors – this includes refraining from excessive noise, not invading another team’s workspace, and avoiding any attempts to interfere with or spy on other teams’ equipment. Be courteous and ensure your actions do not spoil the fun or concentration of others. Unsportsmanlike conduct can lead to warnings or disqualification.

  • Scoring and “First Blood”:

     Each challenge (flag) is worth a certain number of points. Harder challenges are worth more points, and some events use dynamic scoring where a challenge’s point value decreases as more teams solve it. In addition, the first team to solve a challenge earns a “First Blood” bonus or recognition for that challenge. Teams accumulate points for each solved challenge, and the team with the highest total points at the end of the contest wins. In the event of a tie on points, the tie is broken by the time of flag submissions – the team that reached the score first (i.e. with earlier submission timestamps) ranks higher. The live scores will be hidden from view, from the participants during the last 2 hours of each day of the competition, to make the competition and the final results more interesting.

  • Equipment and Network Use:

     Teams are responsible for their own equipment. Participants should bring and use their own laptops, power adapters and if required, LAN dongles. All hacking must be done within the official competition Local Area Network/Environment (No WiFi access available!) – do not attempt to access any external systems or networks not part of the CTF. If internet access is permitted by the organizers, it may be used only for research, tool downloads, and documentation. Using online resources and tools is OK, but seeking help or answers from people outside your team (e.g. asking questions on forums or social media) is strictly prohibited. Any form of signal jamming, traffic sniffing, or network tampering aimed at other teams or the event infrastructure is forbidden, in line with Rule #2.

  • Penalties and Enforcement:

     The competition organizers and judges are there to enforce these rules strictly to ensure fair play. Any violation of the rules can result in consequences ranging from a warning or point deduction to immediate disqualification, depending on severity. Serious offenses like attacking the infrastructure or sharing flags will usually result in instant disqualification. The organizers and judges reserve the right to disqualify any individual or team for cheating, misbehavior, or other misconduct as they see fit. All decisions by the organizers and judges regarding rule violations are final. Compliance with the event’s code of conduct (and any venue or conference rules) is also required at all times.