Rules
- No hacking or attempting to hack other teams' systems or networks without permission.
- No use of malicious software or tools.
- No denial of service attacks.
- No physical or social engineering attacks.
- No sharing of flags or information with other teams.
- No unauthorized access to other teams' systems or networks.
- No interfering with other teams' progress in the competition.
- No sharing of answers or solutions with other teams.
- No use of exploits or vulnerabilities that are not part of the competition.
- All teams must abide by the terms and conditions of the competition and any applicable laws.