Guide 中文版請按此
What is this?
This is a Capture the Flag (CTF) Competition. You will need to solve different challenges that requires programming, cybersecurity and problem solving skills in order to get points. The player with the highest score will win.
How do I get points?
Each challenge is worth certain points, which will slowly decrease as more players solve it. To solve a challenge, you need to find the hidden flag for the challenge. The flag is basically a string (a sequence of letters and symbols), in the format of SPYCCTF26{......}. You can treat the flag as the "solution", or the "answer" to the challenge.
I know nothing about programming and cybersecurity!
You surely can join this competition without knowing the basics. In fact, a main goal of this competition is to provide a chance for you to obtain skills in programming, cybersecurity and problem solving. Don't worry, we will provide guidance on some of the challenges, and you can start by trying out the simpler challenges first!
Join our Discord!
We will use our Discord server as the main communication channel, as well as first blood announcements. We will also provide a ticketing system for you to reach us when in trouble.
FAQ
1. Can I use AI?
Yes, you can use AI for this competition. However, we strongly recommend you to understand every step your AI makes, because if AI does the whole thing without you understanding, this competition becomes meaningless!
2. I have a serious question about this challenge. Where can I ask?
Please do not discuss about challenges publicly. You should create a ticket in our Discord Server to reach out the organizers. Please note that we will not provide hints about any challenge in tickets. We would only distribute hints through public announcements.
3. Can I use any username I like?
Yes, you can use any username of your choice, but please keep it appropriate. We may ask you to change your username if it is considered inappropriate.
Rules
-
Attack only intended targets. Do not attack the CTF platform, scoreboard, registration system, other teams, or any third-party infrastructure.
-
No disruption. Denial-of-service, resource exhaustion, and any other actions that degrade availability are prohibited.
-
No flag sharing or collaboration. You must solve challenges independently and must not exchange flags, hints, or solutions during the event.
-
No platform abuse. Do not exploit unintended vulnerabilities in the competition infrastructure, submission system, or challenge hosting environment unless explicitly marked as part of a challenge.
-
Use tools responsibly. Public references, scripts, and standard security tools are allowed unless a challenge states otherwise, but they must not be used to harm the platform or other participants.
-
No premature disclosure. Do not publish flags, write-ups, or full solutions until the organizers announce that write-up release is allowed.
-
Organizers have final say. The organizers may investigate suspicious behavior, remove solves, issue penalties, or disqualify teams, and all final decisions rest with them.