BCT CTF
Competition Rules
🔰 General Rules
Fuzzing and Bruteforcing are strictly prohibited.
Any automated tool or script designed to brute-force inputs, guess flags, or flood services will result in immediate disqualification and a ban.
Cheating = Instant Ban
Sharing flags, using writeups during the competition, or any kind of collusion with external participants is strictly forbidden.
Any attempts to manipulate the platform or gain an unfair advantage will result in permanent disqualification.
Organizers have full discretion.
We reserve the right to change, update, or modify the rules at any time.
Organizers may penalize or ban participants without prior notice if they violate the spirit of the competition.
One account per participant.
Multiple accounts or impersonation will be grounds for disqualification.
Be a decent human being.
Harassment, abuse, or toxic behavior towards other participants or organizers is not tolerated under any circumstances.
📜 Flag Submission Rules
Flags follow the format: BCT{...} unless stated otherwise.
Do not guess flags or attempt rapid submissions.
If you accidentally find a vulnerability in the platform (not a challenge), report it to the admins — don't exploit it.
⚠ Legal and Ethical Obligations
This CTF is hosted for educational and goodwill purposes only.
You agree to abide by ethical conduct at all times during your participation.
Any violations may be reported to institutions or sponsors, depending on severity.
What is CTF?
Capture The Flag (CTF) is a cybersecurity competition where participants solve challenges to find hidden "flags" - secret strings that prove completion.
Challenges span various categories including cryptography, web exploitation, reverse engineering, binary exploitation, and more.
CTFs test and improve your practical security skills in a competitive, time-constrained environment.
About The Competition
BCT CTF is an online cybersecurity competition focused on challenging participants across multiple security domains.
Designed for both beginners and experienced hackers, our CTF offers a range of difficulties to test your skills.
Compete for prizes, recognition, and the opportunity to join our elite cybersecurity community.
Challenge Categories
Cryptography
Break codes, decode ciphers, and reveal encrypted messages.
Web Exploitation
Exploit vulnerabilities in web applications and services.
Reverse Engineering
Deconstruct compiled programs to understand their functionality.
Miscellaneous
Various challenges that don't fit into other categories.
OSINT
Gather intelligence using publicly available information.
Frequently Asked Questions
Who can participate?
+Anyone interested in cybersecurity is welcome! Whether you're a beginner or a seasoned pro, there's something for everyone.
Do I need to register as a team?
+Nope! You can register solo or as a team. It's your choice.
What tools can I use during the competition?
+You may use any tools or resources, including search engines and open-source tools—just avoid automated scanning tools on our infrastructure.
How do I submit flags?
+Submit your flags through the official platform. Use the format BCT{your_flag}
.
Don't forget—it's case-sensitive!
Are there prizes for winners?
+Absolutely. The winning team gets to enjoy tea with the organizers—on us (yes, we're paying)!
Discord Command Center
BCT CTF Official Server
All CTF management, announcements, and coordination will happen through our Discord server. Join now to stay updated!
Join Server