These Rules of Engagement govern your participation in the Pretera Cyber Security Challenge. Any violation of these rules may lead to immediate disqualification by the Organizers. The Organizers reserve the right to disqualify participants and/or teams at any time without providing an explanation.
1. General Requirements
- Valid Information: All participants must provide accurate and valid personal information during registration.
- Team Consent: Participants can only register a team with the full knowledge and consent of all team members.
2. Infrastructure and Attacks
- Permissible Targets: Only the designated challenge systems are part of the Cyber Security Challenge. Attacking any infrastructure not explicitly stated as part of the challenge (e.g., the main website, registration portal, scoring system, or other publicly accessible pages) is strictly prohibited.
- Prohibited Attacks: Any action that disrupts the availability of the underlying infrastructure, such as (but not limited to) Denial of Service (DoS) or Distributed Denial of Service (DDoS) attacks, is not permitted.
3. Eligibility Criteria
- Student Verification: Participants must possess a valid student card from an authorized Kosovar or Albanian academic institution or third-cycle training program. A complete list of authorized institutions is available on the registration page.
- Age Requirement: Participants must be 18 years or older. If a participant or a team member has not reached this age, they must contact the Organizers before registering.
4. Team Composition and Future Eligibility
- Winning Team Restriction: Members of the winning team from each year are not eligible to compete in future editions of the challenge.
5. Code of Conduct
- Fair Competition: The challenge is designed to foster a spirit of fair competition and collaboration. Participants are expected to demonstrate respect and appropriate behavior towards other participants, staff, and stakeholders at all times. Any behavior that fails to meet these standards may result in disqualification.
6. Prohibited Actions
- Cheating and Tampering: Any form of cheating, such as tampering with flags, scores, or using unauthorized methods to gain an advantage, is strictly prohibited.
- Sharing and Outsourcing: Sharing solutions or flags with other teams or outsourcing challenges to individuals outside your team is considered cheating and will lead to disqualification.