LEVEL SELECT

Know Your Enemy

Since the dawn of computing, every protection has been broken. Every wall breached. Every lock picked.

Churchill is different. Unbeatable. Flags? Good luck — you won't get many, if any.

We said “prove it.” So here we are.

TEMPORAL
LV.99
SPATIAL
LV.99
PRIVILEGE
LV.99
SENTINEL
LV.99

MISSION BRIEFING

The Challenges

Four rounds. Each round is a new category. Complete the round to advance to the next. Fall behind and you're out.

ROUND 1

RECON

Map the terrain. Know your target before you strike.

ROUND 2

PRIVILEGE ESCALATION

Escalate. Elevate. Own.

ROUND 3

REVERSE ENGINEERING

Understand the machine. Then take it apart.

ROUND 4

EVASION & PERSISTENCE

Stay hidden. Stay alive. Operate under the radar.

RULES.TXT

Rules of Engagement

AUTHORIZED_ACTIONS

  • [OK]Any attack technique within your challenge environment
  • [OK]Unconventional approaches -- the weirder the better
  • [OK]All standard reverse engineering and debugging tools
  • [OK]Document your methodology and submit for review

FORBIDDEN_ACTIONS

  • [!!]Attacks against infrastructure, hosting, or admin systems
  • [!!]Denial-of-service (crashing it is not beating it)
  • [!!]Attacking the platform infrastructure or other participants
  • [!!]Sharing access credentials or solutions publicly

HOW IT WORKS

The Event

Four rounds over four weekends. Each round begins Friday and ends Monday. Every round has a minimum of four flags at varying difficulty. Complete the round to advance — if your team doesn't finish, you're out.

Speed matters. The first team to capture a flag scores the most points. Second place scores less. Third even less. Every flag runs on a diminishing point scale — the longer you take, the fewer points you earn. Cumulative score across all rounds determines the winner.

4
Weekends
4
Rounds
1
Winner

SCORING

First team to capture a flag earns maximum points. Each subsequent capture earns less. Be fast or fall behind.

DATES TBD // TEAM REGISTRATION OPENS SOON

PLAY