BSides Vadodara CTF
Capture The Flag Competition
Test your cybersecurity skills across web, cryptography, reverse engineering, steganography, and more. Join hackers from around the world in this ultimate challenge.
bsides-ctf-terminal
BSV CTF
Cryptography
Reverse Engineering
Steganography
OSINT
Web Security
Networking
CTF Rules & Guidelines
CTF Rules & Regulations (Mandatory)
- Individual Accounts Only — Each participant must use only their assigned account. Sharing credentials or accessing another user’s account is strictly prohibited.
- No Collaboration / Teaming — This is an individual CTF unless explicitly stated otherwise. Collaboration, flag sharing, or external assistance is not allowed.
- Platform Scope Only — Attacks are permitted only within the provided CTF environment. Attempting to attack the platform infrastructure, organizers, or any external systems will result in immediate disqualification.
- No Automated Attacks or DoS — Denial-of-Service (DoS), brute-force flooding, or automated exploitation that degrades platform performance is strictly forbidden.
- No Sharing of Flags or Write-ups During Live CTF — Sharing flags, hints, solutions, screenshots, or partial answers during the live CTF period is not allowed.
- Respect Fair Play & Ethics — Any attempt to cheat, exploit platform bugs, bypass scoring mechanisms, or gain unfair advantage will lead to disqualification.
- Organizer’s Decision is Final — The BSides Vadodara CTF Team reserves the right to disqualify participants for rule violations. All decisions made by the organizers are final and binding.
CTF Guidelines
- Test your login before the CTF start time.
- Ensure a stable internet connection throughout the 24-hour window.
- Use only legal and ethical techniques.
- Keep notes and write-ups private until the CTF officially ends.
- In case of technical issues, report them immediately to the organizers.
- Prizes will be distributed only at the event.
Disqualification Policy
- Participants may be disqualified for credential sharing.
- Flag sharing or collaboration during the live event.
- Attacking infrastructure outside the challenge scope.
- Abusive or unethical behavior.
- Violating any rule mentioned above.
CTF Sponsors
CTF Sponsor
CTF Partner
Platinum Sponsor
Platinum Sponsor
CTF Sponsor
CTF Sponsor