HackathonX
India's Largest and Most Prestigious Cybersecurity Competition

 30th and 31st August, 2024.

 Russian Culture Centre, Chennai 18

ABOUT HACKATHON

Hackathon X: India's Largest and Most Prestigious Cybersecurity Competition In collaboration with the state and central governments of India, we are proud to present Hackathon X, the premier Capture The Flag (CTF) competition. This prestigious event aims to gather the brightest minds in cybersecurity to tackle complex challenges and demonstrate their expertise across various domains.
Premier Competition Hackathon X is the premier Capture The Flag (CTF) competition in India. This event will bring together top talent from across the nation to engage in rigorous and thrilling cybersecurity challenges.
Bringing Together Talent The brightest minds in cybersecurity will converge to tackle a wide array of challenges, fostering collaboration and innovation in the field. Participants will have the opportunity to showcase their skills, learn from peers, and contribute to enhancing the nation's cybersecurity landscape.

Who can Participate

Hackathon X: India's Largest and Most Prestigious Cybersecurity Competition. Here's a list of potential participants:

  • Students:
    • Students pursuing degrees in computer science, information security, or related fields

Competition Timeline

hackathon_roadmap

CHIEF GUEST

guest

Hon'ble Mr.Justice S.R.Bannurmath

Former Chief Justice Of High Court Of Kerala


Rules and Guidelines

  • Eligibility Criteria:
    • Participants must be aged between 18 and 35 to ensure a fair competition among individuals in a similar age group.
  • Team Size Limit:
    • Each team is limited to three members to encourage collaboration and teamwork while preventing overly large groups that could dominate the competition.
  • Registration Requirements:
    • Participants must register in advance, providing necessary personal information and agreeing to abide by the competition's rules and regulations.
  • Competition Format:
    • The competition will consist of multiple challenges across various categories, such as web exploitation, cryptography, reverse engineering, and more.
  • Scoring System:
    • Points will be awarded based on the difficulty of each challenge and the speed and accuracy with which teams solve them.
  • Code of Conduct:
    • All participants must adhere to a code of conduct that promotes ethical behavior, respect for others, and compliance with legal standards throughout the event.
  • Prohibited Activities:
    • Actions such as attacking other participants or attempting to disrupt the competition's infrastructure are strictly prohibited and may result in disqualification.
  • Tools and Resources:
    • Participants are allowed to use only approved tools and resources during the competition, with restrictions on unauthorized software or techniques.
  • Disqualification Criteria:
    • Teams may be disqualified for violations of the rules, including cheating, plagiarism, or any behavior deemed unethical or inappropriate by the organizers.
  • Prizes and Awards:
    • Top-performing teams will receive prizes or awards, which may include cash prizes, certificates, or opportunities for further training or recognition in the cybersecurity community.