About the Competition
A two-round CTF: Round 1 focuses on Blue Team tasks like SOC L1/L2 analysis and malware investigation, while Round 2 features Red Team challenges including binary exploitation, web attacks, AI/ML abuse, and cryptographic exploitation.
Competition Format
Round 1: Blue Team
- SOC L1/L2 analysis
- Malware investigation
- Incident response and recovery
- Network defense and monitoring
Round 2: Red Team
- Binary exploitation
- Web attacks
- AI/ML abuse
- Cryptographic exploitation
Rules & Guidelines
- Teams must consist of 2-4 members
- All team members must be present at the event
- No sharing of flags, solutions, or hints between teams
- Internet access will be provided for research purposes only
- Use of automated tools is allowed but must be disclosed
- Attacking infrastructure or other teams is strictly prohibited
- All flags must be submitted through the official platform
- Time limits for each round must be strictly adhered to
- Judges' decisions are final and binding
- Any form of cheating or unethical behavior will result in immediate disqualification
- Participants must bring their own laptops with necessary tools pre-installed
- All participants must follow the code of conduct
Prizes
1st PlacePKR 60,000 + HTB VIP Voucher + Let's Defend VIP Voucher + Certificates
2nd PlacePKR 25,000 + HTB VIP Voucher + Let's Defend VIP Voucher + Certificates
3rd PlacePKR 15,000 + HTB VIP Voucher + Let's Defend VIP Voucher + Certificates
All ParticipantsCertificates
Total Prize Pool: PKR 100,000
🎁 Bonus: Extra rewards available for Blue Team scenario completions!
Prerequisites
- Basic understanding of networking concepts
- Familiarity with Linux command line
- Knowledge of common security vulnerabilities
- Teamwork and problem-solving skills