Challenge Bounty

CELEBRATED, REWARDED & RECOGNIZED

Ever thought about creating your Capture-The-Flag challenge?

Here's your chance! Cyber League is looking for awesome challenges to test our players' mettle. Get your name added to our bounty list! Players who attempt your challenge will hear of your legacy.

Here at Cyber League we appreciate your hard work and believe that challenge creators should be rewarded for contributing to the Cyber League. Yes! you heard that right! Approved challenges will be celebrated and creators will be rewarded with cash!

Curious? Checkout our challenge submission process below and start those creative juices flowing!

Challenge TemplateSubmit Challenge

SUBMISSION PROCESS

  1. Download the challenge template from gitlab.
  2. Read through our guidelines, T&C and submission requirements.
  3. Start developing the challenge! Make sure to check if you have fufilled the submission requirements before submitting.
  4. Upon Submission, a confirmation of submission email will sent to you.
  5. Once your submission has been confirmed, the Cyber League team will review your challenge. This process may take a while, so please be patient with us.
  6. If your challenge meets our requirements and is approved, an email will be sent to notify you together with the reward that you will be receiving.

REWARD CRITERIA

Challenge DifficultyEst. Time Taken To SolveReward Amount
Easy1-3 HoursS$80
Medium1-4 HoursS$130
HardMore Than 4 HoursS$200

REVIEW PROCESS

  1. Challenges should not breach the terms and conditions provided in the challenge template and should follow the guidelines provided in order for the challenge to be considered eligible.
  2. The Cyber League team will take in to consideration of the suggested difficulty level by the creator but may be changed by the Cyber League team after reviewing the challenge.
  3. The challenge creator will be rewarded according to the final difficulty level decided.

GUIDELINES

  1. Challenge submitted must be related to Infosecurity or Cybersecurity topics such as, but not limited to:
    1. Web Exploitations
    2. Reverse Engineering
    3. Binary Exploitation
    4. Cryptography
    5. Mobile Security
    6. Internet of Things
    7. Steganography
    8. Programming
    9. Open Source Intelligence (OSINT)
  2. Challenge need not be limited to one topic.
  3. Level of difficulty of the challenge can be ranked as Easy, Medium or Hard.
  4. Challenge should be solvable within reasonable time, according to the challenge rank
  5. Challenges should not encourage brute forcing or require probing of servers. If brute forcing is required for a challenge, the plaintext should be easily found in common wordlists. E.g. rockyou.txt
  6. If challenges have the need to be deployed, it is encouraged for the challenge to be containerized either using docker or docker-compose.
  7. OSINT Challenge should not require or suggest contact with any real life person.
  8. Challenges that are tracked in any online version control platforms for example: github, gitlab, bitbucket and others must be kept private.
We strive to build a thriving community of budding students and professionals to develop expertise and capabilities in cybersecurity for Singapore.
Copyright © 2024. Made with ♥ by Web3Templates. Illustrations from Glazestock