Consisting of hacking into VMs, CTF, IoT, Reverse Engineering.
Open freestyle method.
All tools allowed.
No Team. Single Participant is ALLOWED.
No AGE restrictions.
At the same time, parallel to completing the hacking steps, you will be given a vulnerable VM (always connected to LAN), which you have to defend. Negative marks if you get hacked by other competitors.