Rules

Please note that this list is non-exhaustive and any activity that compromises the integrity of the competition will result in disqualification.
Do not attack the competition infrastructure. This includes overwhelming our servers with unnecessary traffic, such as through the use of fuzzers, scanners, or bruteforcing tools.
Our challenges are not black box penetration tests and should not be treated as such.
Strictly no discussion of solutions or hints before the CTF is over.
Strictly no cross-team communication or collaboration before the CTF is over.
This is not a social engineering competition.
At the end of the day, it boils down to exercising common sense and courtesy to your fellow competitors. Please do not engage in anything below the "Taboo CTF Tactics" part of the iceberg.
CTF Tactics Iceberg