Jail Break

Escape the digital prison using your hacking skills

Register Now
Back to All Events

About the Event

Jail Break is an immersive cybersecurity challenge that puts participants in a virtual prison cell within a complex digital security system. As a team of ethical hackers, your mission is to exploit vulnerabilities, bypass security controls, and break out of increasingly difficult levels of digital confinement.

This event combines ethical hacking, penetration testing, and practical cybersecurity skills in a competitive format. Participants will need to identify and exploit security flaws, reverse-engineer systems, and implement creative solutions to progress through multiple levels of security challenges.

Date & Time

April 12, 2025

9:00 AM - 4:00 PM

Venue

Security Lab (Room 301)

CSE Department

Team Size

2-3 Members

Prizes

1st Place: ₹10,000

2nd Place: ₹6,000

3rd Place: ₹3,000

Jail Break Event Poster

Challenge Format

Security Levels

Participants will need to progress through 5 levels of increasing difficulty:

Level 1: Cell Block

Basic web exploitation, simple password cracking, and fundamental network scanning

Level 2: Security Wing

SQL injection vulnerabilities, authentication bypasses, and basic cryptographic challenges

Level 3: Control Room

Advanced network exploitation, service enumeration, and privilege escalation

Level 4: Administration Block

Binary exploitation, reverse engineering, and advanced cryptographic challenges

Level 5: The Perimeter

Full system compromise, lateral movement techniques, and real-world security scenarios

Gameplay Mechanics

  • Teams start in a virtual "cell" with limited tools and access
  • Each level contains multiple security challenges and puzzles
  • Successfully exploiting vulnerabilities provides "keys" to advance to the next level
  • Teams can earn additional "tools" by solving bonus challenges
  • The game environment uses isolated networks with deliberately vulnerable systems
  • All activities are confined to the provided virtual environment

Technical Requirements

Knowledge Areas

Teams should have experience with:

  • Network security and common vulnerabilities
  • Web application security
  • Basic cryptography
  • Command-line interfaces (Linux/Unix)
  • Programming (Python, Bash scripting)
  • Common security tools (Nmap, Burp Suite, Metasploit, etc.)

Equipment

Teams should bring:

  • Laptops with administrative access
  • Virtual machine capabilities
  • Pre-installed security tools (a list will be provided to registered teams)
  • Ethernet adapter (if your laptop doesn't have an ethernet port)
  • Power adapters and extension cords

Note: We will provide a specialized bootable USB drive with a security-focused Linux distribution for teams that prefer it.

Rules & Guidelines

Competition Rules

  • Teams must keep their activities within the designated competition network
  • Attacking other teams' systems or the competition infrastructure is strictly prohibited
  • Sharing flags, solutions, or hints with other teams will result in disqualification
  • Teams must document their exploitation techniques and findings
  • Judges may provide hints upon request, but each hint will incur a point penalty
  • The decision of the judges is final in all matters

Scoring System

Challenge Completion

Each successful exploit or vulnerability discovered earns points based on difficulty

Flags Captured

Hidden flags throughout the system provide bonus points when discovered

Time Efficiency

Faster completion times earn additional points

Documentation

Quality of exploitation documentation and findings reports

Frequently Asked Questions

What skill level is required for this event?
Jail Break is designed for intermediate to advanced security enthusiasts. While beginners can participate, having some experience with cybersecurity concepts, penetration testing tools, and programming is highly recommended. The early levels are more accessible, while later challenges require more advanced skills.
Is this event legal and ethical?
Absolutely. All challenges take place in isolated, controlled environments specifically designed for this competition. The skills taught and practiced are ethical hacking techniques used by security professionals. We emphasize responsible disclosure and ethical behavior throughout the event.
Can we install our own tools during the competition?
Yes, you can install additional tools during the event as long as they are legitimate security tools. However, we recommend having your environment set up beforehand to save time. Internet access will be available but limited to prevent solution searching.
What happens if we get stuck?
Judges can provide hints if teams are completely stuck, but each hint will result in a point deduction. The amount deducted depends on how directly the hint relates to the solution. We encourage teams to persevere through challenges as much as possible before requesting hints.