Do not attack the competition infrastructure. This includes overwhelming our servers with unnecessary traffic, such as through the use of fuzzers, scanners, or bruteforcing tools.
Our challenges are not black box penetration tests and should not be treated as such.
Strictly no discussion of solutions or hints before the CTF is over.
Strictly no cross-team communication or collaboration before the CTF is over.
This is not a social engineering competition.