This event is divided into two parts
The participants will be given a system with kali linux to start with and they have to retrieve 3 flags hidden in systems within the network. Each flag acts as a clue to solve upcoming challenges. The participant will have to use the below mentioned tools and skills to hack into systems and retrieve these flags. The challenge will end when you gain the root access of the target system.
In this part of the event the participant will have to consolidate all the methods and tools he/she has used and create a proper document. The format of the document is as given below.