CipherHunt 2.0
The world relies on QuantumFire™
A rogue quantum AI, Q-Havoc trigger a digital blackout.
You are the Elite Cyber Guardians assigned to halt the breach.
Enter the grid now, to register for the chaos.
DATES: October 28th - 29th, 2025
AN OFFLINE EVENT at CHANDIGARH UNIVERSITY
Mission Flow: Quantum Breach Protocol
Analyze the threat vector. This is your high-level briefing of the Q-Havoc intrusion timeline and mission flow.
PHASE 1: THE ERA OF QUANTUM
Global defense relies on QuantumFire™, the ultimate firewall.
PHASE 2: THREAT INITIALIZED
Dark Qubit deploys Q-Havoc, a rogue AI, attacking the core system.
PHASE 3: CYBER GUARDIANS
Neutralize the breach by solving Breach Attempt Vectors (CTF Categories).
PHASE 4: CRITICAL STAKES
Q-Havoc is learning, adapting, evolving.
Outsmart the rogue quantum AI.
OBJECTIVE: SUCCESS
Become the Cyber Guardians of the Quantum Era
Breach Attempt Vectors
Each challenge category represents a unique breach attempt against QuantumFire™ by Q-Havoc.
Web Exploitation
Compromise attempts on the Quantum Firewall Dashboard. Patch the broken authentication before Q-Havoc bypasses it.
Binary Exploitation (Pwn)
Rogue hardware exploits against Quantum Core Processors. Exploit the memory leak to understand—or patch it to defend.
Cryptography
Exploiting weaknesses in quantum key distribution. Recover the master key material before Q-Havoc does.
Reverse Engineering (Rev)
Deconstruct proprietary codebases and algorithms to identify Q-Havoc's communication protocols and attack logic.
Forensics
Analyzing tampered logs from corrupted quantum devices. Reconstruct the full sequence of the intrusion from the debris.
OSINT
Tracing Q-Havoc’s human operators through leaked metadata. Identify the human element behind the quantum attack.
Industrial OT
Sabotage of automated factories and industrial control systems. Restore critical infrastructure immediately.
Android
Quantum communication apps targeted on mobile devices. Reverse-engineer the malicious payload and stop the data leak.
Prize Matrix: Recognition, Rewards & Swag
Updates Ongoing
The top-performing teams will be honored with exclusive certifications, merchandise, and recognitions for their excellence in cybersecurity.
🥇 Gold – Winner: eXpert Series Rewards
All team members are awarded an eXpert Series voucher of their choice from The SecOps Group, along with an official Winner’s Trophy.
🥈 Silver – Runner-up: Professional Series Rewards
All team members are awarded a Professional Series voucher of their choice from The SecOps Group.
🥉 Bronze – 2nd Runner-up: Essentials Series Rewards
All team members are awarded an Essentials Series voucher of their choice from The SecOps Group.
Top Teams – Medals, Domains & T-Shirts
Top 5 teams receive custom medals
Top 10 teams are awarded a 1-year .xyz domain subscription courtesy of gen.xyz.
Top 15 teams receive exclusive, custom-designed event T-shirts.
Certificates & Exclusive Swag
Participation and Merit Certificates will be issued to all qualifying teams based on their final rankings.
Every registered participant also receives
official event swag and merchandise.
The First Blood (First team to solve a challenge) receives an exclusive digital badge and recognition.
Operational Protocols (Rules)
Adherence to these guidelines is mandatory for system access and maintaining fair play. Breaches result in immediate disconnection.
01. Eligibility and Team Protocol
Open to all undergraduate/postgraduate students and individuals. Mandatory teams of 2–5 members are required for registration.
02. Scoring & Tiebreaker Metrics
Scoring is dynamic on CTFd (based on flags captured, challenge difficulty, and time of submission). Tiebreaker is determined by the final flag timestamp
03. Challenge Integrity & Conduct (Disqualification)
Participants must NOT share flags or solutions. Any attacks against the CTF infrastructure or organizers in any form are strictly prohibited and will lead to immediate disqualification. All participants must follow the university's code of conduct.
04. Flag Submission Format
All captured flags must be submitted in the established format: CipherHunt{...}
Strategic Sponsors & Partners
We are proud to collaborate with key industry leaders and partners to bring you CipherHunt 2.0.