CU Logo

CipherHunt 2.0

The world relies on QuantumFire™
A rogue quantum AI, Q-Havoc trigger a digital blackout.
You are the Elite Cyber Guardians assigned to halt the breach.
Enter the grid now, to register for the chaos.

DATES: October 28th - 29th, 2025

DURATION: 30 Hours Non-Stop FORMAT: Jeopardy-Style CTF PLATFORM: CTFd

AN OFFLINE EVENT at CHANDIGARH UNIVERSITY

Mission Flow: Quantum Breach Protocol

Analyze the threat vector. This is your high-level briefing of the Q-Havoc intrusion timeline and mission flow.

PHASE 1: THE ERA OF QUANTUM

Global defense relies on QuantumFire™, the ultimate firewall.

PHASE 2: THREAT INITIALIZED

Dark Qubit deploys Q-Havoc, a rogue AI, attacking the core system.

PHASE 3: CYBER GUARDIANS

Neutralize the breach by solving Breach Attempt Vectors (CTF Categories).

PHASE 4: CRITICAL STAKES

Q-Havoc is learning, adapting, evolving.

Outsmart the rogue quantum AI.

OBJECTIVE: SUCCESS

Become the Cyber Guardians of the Quantum Era

Breach Attempt Vectors

Each challenge category represents a unique breach attempt against QuantumFire™ by Q-Havoc.

Web Exploitation

Compromise attempts on the Quantum Firewall Dashboard. Patch the broken authentication before Q-Havoc bypasses it.

Binary Exploitation (Pwn)

Rogue hardware exploits against Quantum Core Processors. Exploit the memory leak to understand—or patch it to defend.

Cryptography

Exploiting weaknesses in quantum key distribution. Recover the master key material before Q-Havoc does.

Reverse Engineering (Rev)

Deconstruct proprietary codebases and algorithms to identify Q-Havoc's communication protocols and attack logic.

Forensics

Analyzing tampered logs from corrupted quantum devices. Reconstruct the full sequence of the intrusion from the debris.

OSINT

Tracing Q-Havoc’s human operators through leaked metadata. Identify the human element behind the quantum attack.

Industrial OT

Sabotage of automated factories and industrial control systems. Restore critical infrastructure immediately.

Android

Quantum communication apps targeted on mobile devices. Reverse-engineer the malicious payload and stop the data leak.

Prize Matrix: Recognition, Rewards & Swag

Updates Ongoing

The top-performing teams will be honored with exclusive certifications, merchandise, and recognitions for their excellence in cybersecurity.

🥇 Gold – Winner: eXpert Series Rewards

All team members are awarded an eXpert Series voucher of their choice from The SecOps Group, along with an official Winner’s Trophy.

🥈 Silver – Runner-up: Professional Series Rewards

All team members are awarded a Professional Series voucher of their choice from The SecOps Group.

🥉 Bronze – 2nd Runner-up: Essentials Series Rewards

All team members are awarded an Essentials Series voucher of their choice from The SecOps Group.

Top Teams – Medals, Domains & T-Shirts

Top 5 teams receive custom medals
Top 10 teams are awarded a 1-year .xyz domain subscription courtesy of gen.xyz.
Top 15 teams receive exclusive, custom-designed event T-shirts.

Certificates & Exclusive Swag

Participation and Merit Certificates will be issued to all qualifying teams based on their final rankings.

Every registered participant also receives official event swag and merchandise.

The First Blood (First team to solve a challenge) receives an exclusive digital badge and recognition.

Operational Protocols (Rules)

Adherence to these guidelines is mandatory for system access and maintaining fair play. Breaches result in immediate disconnection.

01. Eligibility and Team Protocol

Open to all undergraduate/postgraduate students and individuals. Mandatory teams of 2–5 members are required for registration.

02. Scoring & Tiebreaker Metrics

Scoring is dynamic on CTFd (based on flags captured, challenge difficulty, and time of submission). Tiebreaker is determined by the final flag timestamp

03. Challenge Integrity & Conduct (Disqualification)

Participants must NOT share flags or solutions. Any attacks against the CTF infrastructure or organizers in any form are strictly prohibited and will lead to immediate disqualification. All participants must follow the university's code of conduct.

04. Flag Submission Format

All captured flags must be submitted in the established format: CipherHunt{...}

Strategic Sponsors & Partners

We are proud to collaborate with key industry leaders and partners to bring you CipherHunt 2.0.

The SecOps Group Logo

The SecOps Group

Platinum Sponsor

LinkedIn Profile Website
gen.xyz Logo

gen.xyz

Bronze Sponsor

Website
Chandigarh University Logo

Chandigarh University

Organizer

LinkedIn Profile Website
CypherLock Logo

CypherLock

Event Partner

LinkedIn Profile Socials