TQL is a competition for programming information security systems, a part of The International Festival of programming and high-tech sports "Knowledge Energy". Teams receive a set of tasks on cryptography, compiled code analysis, web vulnerabilities, incident investigation, etc. – in all those areas that security professionals work with.
Access will be available on the day of the competition
General Rules
1. Fair Play:
All participants must adhere to the rules of fair play. Any form of cheating, backdoor usage, DDoS attacks on the competition infrastructure, or other prohibited methods are strictly forbidden. Exploiting vulnerabilities in the organizers' or platform's infrastructure to gain an advantage is also strictly prohibited.
2. No Flag Sharing:
Participants are not allowed to share flags or task solutions with other teams. Sharing flags or results will lead to team disqualification.
3. Technical Equipment:
Participants are allowed to use their own devices, but they must be configured and used in accordance with the competition rules. The use of banned software, such as automatic flag generation tools or tools for carrying out massive attacks, is prohibited.
4. No Public Discussion of Challenges:
Participants are forbidden from discussing challenges with other teams during the competition, and from publishing solutions or flags before the event officially concludes.
5. Ethical Communication:
Participants must show respectful and ethical behavior towards organizers and other participants. Rudeness, discrimination, or threats are strictly prohibited.
6. Team Independence:
Each team must act independently. Forming alliances with other teams is not allowed.
7. Use of Public Resources:
Participants may use public resources (online documentation, articles, etc.) as long as it does not violate the confidentiality of flags or challenge solutions.
8. No Attacks on Infrastructure:
Attacks on the competition infrastructure, organizer servers, or other participants are forbidden. Any malicious impact on the competition infrastructure will result in team disqualification.
9. Challenge Solving:
Each challenge contains a vulnerability that allows the team to find a flag. After obtaining the flag, it must be submitted to the system to score points. The flag will be a string in the format tqlCTF{flag}.
10.Scoring:
Points are awarded for correct flags. The more difficult the challenge, the more points can be earned. Points may decrease over time if a dynamic scoring system is used.
Disqualification
1.Violation of Rules:
A team may be disqualified for breaking any of the aforementioned rules. Repeated or serious violations may lead to immediate disqualification.
2.Use of Prohibited Methods:
The use of automated scripts for flag discovery, massive attacks on the infrastructure of other teams or organizers, etc., will result in immediate disqualification. These rules are designed to ensure a fair and enjoyable competition for all participants.