LEVEL SELECT
Know Your Enemy
Since the dawn of computing, every protection has been broken. Every wall breached. Every lock picked.
Churchill is different. Unbeatable. Flags? Good luck — you won't get many, if any.
We said “prove it.” So here we are.
MISSION BRIEFING
The Challenges
Four rounds. Each round is a new category. Complete the round to advance to the next. Fall behind and you're out.
RECON
Map the terrain. Know your target before you strike.
PRIVILEGE ESCALATION
Escalate. Elevate. Own.
REVERSE ENGINEERING
Understand the machine. Then take it apart.
EVASION & PERSISTENCE
Stay hidden. Stay alive. Operate under the radar.
RULES.TXT
Rules of Engagement
AUTHORIZED_ACTIONS
- [OK]Any attack technique within your challenge environment
- [OK]Unconventional approaches -- the weirder the better
- [OK]All standard reverse engineering and debugging tools
- [OK]Document your methodology and submit for review
FORBIDDEN_ACTIONS
- [!!]Attacks against infrastructure, hosting, or admin systems
- [!!]Denial-of-service (crashing it is not beating it)
- [!!]Attacking the platform infrastructure or other participants
- [!!]Sharing access credentials or solutions publicly
HOW IT WORKS
The Event
Four rounds over four weekends. Each round begins Friday and ends Monday. Every round has a minimum of four flags at varying difficulty. Complete the round to advance — if your team doesn't finish, you're out.
Speed matters. The first team to capture a flag scores the most points. Second place scores less. Third even less. Every flag runs on a diminishing point scale — the longer you take, the fewer points you earn. Cumulative score across all rounds determines the winner.
SCORING
First team to capture a flag earns maximum points. Each subsequent capture earns less. Be fast or fall behind.
DATES TBD // TEAM REGISTRATION OPENS SOON
PLAY