Cyberstorm CTF (Capture the Flag) - 2025
SIES Graduate School of Technology
Cyberstorm CTF (Capture the Flag) - 2025: Stages and Timelines
Online Round
Embark on the first stage of Cyberstorm CTF! Test your skills in a series of intense cybersecurity challenges across various domains. Only the top teams will advance to the offline showdown.
Offline Round
The final battle awaits! The top teams from the online round will clash in this high-stakes offline showdown. Solve challenging problems across multiple cybersecurity domains and fight for your place at the top. The "Enter" button will appear once the round goes live. May the best hackers prevail! 🏴☠️
All that you need to know about Cyberstorm CTF (Capture the Flag) - 2025
Mumbai’s Largest Cybersecurity Challenge is here!
Brought to you by GDG On Campus SIESGST, in collaboration with Redfox & Made In Mumbai.
A storm is coming. A CyberStorm.
The battleground? A high-stakes Capture The Flag (CTF) challenge like no other.
We’re bringing together the best talent, the toughest puzzles, and the most intense competition. No second chances. No easy wins. Just you, your team, and the code that stands between you and victory.
- Prize Pool: ₹5 Lakhs
- Categories: Students & Professionals
- Online Round: 29th March 2025
- Offline Round: 5th April 2025 (only for those who qualify the online round)
Flow of Event:
- Join the Crew: Register and assemble your crew of up to 4 members. Solo pirates are welcome too!
- Online Round: Set sail into the digital abyss on March 29th and battle against teams across the nation. Only the best will advance.
- Offline Showdown: The top teams will face off on April 5th in the ultimate test of skill, grit, and teamwork at SIES Graduate School of Technology.
- Claim Your Bounty: Fight to the top, and you may walk away with a share of the epic ₹2.75 Lakh prize pool.
Challenge Structure: Cyberstorm CTF is divided into thrilling domains, each with its own set of challenges. Meet the crew representing each domain:
- Cryptography — Crack codes and uncover secrets. (Nico Robin)
- OSINT — Dive into open-source intelligence and hunt for hidden clues. (Nami)
- Steganography — Hide and seek in the digital realm. (Chopper)
- Reverse Engineering — Deconstruct programs and uncover their inner workings. (Franky)
- Penetration Testing — Exploit vulnerabilities and push systems to their limits. (Monkey D. Luffy)
- Web Exploitation — Manipulate web-based applications to gain unauthorized access. (Buggy)
- Binary Exploitation — Dive deep into binaries to manipulate program execution. (Brook)
- Digital Forensics — Investigate cyber incidents and trace digital evidence. (Kizaru)
- Operational Technology — Secure industrial systems and infrastructure. (Jinbe)
Rules & Regulations:
- Fair play is the pirate code — any form of cheating, sharing flags, or external assistance is strictly prohibited.
- Do not conduct Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks on the infrastructure or associated systems.
- Respect your fellow competitors and let skill decide the victor.
Important dates & deadlines?
-
28 Mar'25, 12:00 AM IST Registration Deadline