> SYSTEM BOOT... OK | CHALLENGE LOADED... OK

UTKANSH 2026 presents

ROOTBREACH

Capture The Flag

₹10 Lakh+ WORTH PRIZES

MAR 28 - 29, 2026

An elite cybersecurity battleground featuring challenges in Web, Crypto, Reverse Engineering, Forensics, and Misc.

00 Days
:
00 Hours
:
00 Mins
:
00 Secs
WEB CRYPTO REV ENG FORENSICS MISC


OPENING: Central Seminar Hall, NITJ
HACKSPACE: IT Building, NITJ

Perks

🎯
Intense gameplay
Compete with people across country to pave your way to win.
🔗
Networking Opportunity
You'd get to network with people from industry including cybersecurity professionals and ethical hackers
👾
Cybersecurity Community
Connect with a community which fosters innovation and collaboration in cybersecurity.

Rules of Engagement

⬇ Download Rulebook
All flags follow the standard format: CSC{f1ag_h3r3}
Brute forcing flags is useless.
Sharing flags, hints or write-ups is strictly prohibited.
Do not attack the competition infrastructure, immediate disqualification
Points are awarded based on challenge difficulty
In case of a tie, the team that reaches the final score earlier will be ranked higher.

Stages of CTF

01
CodeIgnite
Participants solve problem-solving and security-focused challenges.
02
FlagForge
fixed-scoring challenge round across multiple cybersecurity domains.
03
SpeedBreach
Break Encryption, Analyze binaries, exploit the logic and pave your way to root
04
VulnHunt
Break web apps, find vulnerabilities and capture the flag.
05
SecureShield
Fix broken code of a web app

Loot

1st
Grand Prize
To Be Announced
2nd
Runner Up
To Be Announced
3rd
Third Place
To Be Announced

Our Sponsors

Community Partners

FAQ

Who can participate? +
Students from any college or university can participate. Just be enthusiast towards tech and let's hunt for flags.
Is this beginner friendly? +
Yes, challenges range from easy to advanced.
What can be the size of my team? +
Number of team members can range from 1-5.
Is there a registration fee ?+
Yes, the registration fee for the event is INR 300 per team.
What tools are allowed? +
Any legal cybersecurity tools except brute force automation on flags. Don't just be a script kiddie guys, think out of box.