OFFENSIVE CORE
CTF
Jeopardy-style overnight challenge lanes across web, pwn, crypto, forensics, misc, and OSINT.
From vulnerabilities to trustworthy systems
A 3-day cyber operations environment for offensive security, system design, and technical credibility under real constraints.
Date
19-21 APR 2026
Venue
VIT-AP UNIVERSITY
Participants
600+ OPERATORS
Duration
72 HOURS
National cyber event for red-teamers, systems engineers, reverse analysts, and builders who can operate under pressure.
600+ participants. 2 overnight competitions. One national signal.
Recon runs like a tactical dashboard, not a generic fest. Every zone is owned, every challenge is scoped, every escalation path is documented.
SAC + distributed campus zones, with flagship operations staged for high throughput and low chaos.
Participants
0+
National systems security turnout
Side Events
0+
Villages, labs, and off-axis briefs
Night Competitions
0
CTF and KOTH under live ops pressure
Event Scale
0L
INR operating envelope
Recon is built to feel like a live systems-security exercise: controlled infra, sharp briefings, real competition cadence, and meaningful sponsor access.
OFFENSIVE CORE
Jeopardy-style overnight challenge lanes across web, pwn, crypto, forensics, misc, and OSINT.
LIVE FIRE
Target-box domination with hold intervals, resets, anti-cheat telemetry, and blue-red tactical pressure.
MODEL SECURITY
Prompt injection, jailbreak defense, exploit chains, and mitigation notes inside constrained model sandboxes.
ANALYST DRILL
Fast memory, PCAP, log-triage, and stego mini-cases for responders who prefer proof over noise.
INVESTIGATION
Synthetic personas, metadata trails, and timed inference challenges. No shortcuts, no real-world collateral.
PHYSICAL SYSTEMS
Badge hacking, firmware basics, and solder-backed experimentation in a controlled equipment zone.
TALENT PIPELINE
Resume triage, portfolio reviews, mock interviews, and direct signals from high-performing builders.
HackByte’s stacked pacing is reinterpreted here as a cyber-ops grid: denser telemetry, harder cards, sharper glows, and a more militant visual rhythm.
Guided vulnerable-app labs with beginner and advanced lanes.
Hands-on model abuse, guardrail tests, and defense writeups.
Logs, memory dumps, and PCAP triage under time pressure.
Host ownership, persistence, and scoreboard warfare across isolated targets.
Badge labs, firmware review, default creds, and device hardening drills.
Metadata extraction, graph reasoning, and inference chains with legal guardrails.
Day-level pacing is shaped for flow control: talks up front, villages distributed, overnight flagships isolated, and final debriefs after validation.
Workshop open, keynote blocks live, side villages activated, overnight CTF armed at 18:00.
Career clinic, sponsor activations, live queues, and KOTH staging under command supervision.
Final scores, awards, postmortem, and partner visibility locked into the final broadcast.
Sponsor activations are challenge-backed and recruiting-oriented. The full sponsorship copy and structure lives on the dedicated partners route with unchanged content.
Open Partners Page




The event is structured like an operations team, with role ownership and backup coverage rather than vague committee blur.
Event Director
Mission owner and escalation point
Chief Technical Officer
Platform integrity and infra oversight
Operations Chief
Field movement, crowd control, incident flow
CTF / KOTH Competition Director
Rules, challenge windows, adjudication
Program and Speakers Lead
Briefings, speaker blocks, main-stage timing
Sponsorship and Partnerships Lead
Sponsor activations, partner logistics, ROI
Design, Media, and Broadcast Lead
Visual system, screens, and media coverage
Volunteer and Logistics Lead
Shift assignments, help desks, physical flow
No. Recon is a national systems security event with workshop blocks, offensive-security competitions, side villages, and sponsor activations built around real cybersecurity practice.
Never. All exploit and target activities are sandboxed, explicitly scoped, and isolated from university infrastructure and public targets.
Security engineers, red-teamers, systems builders, students aiming for offensive security roles, and technical communities that want a serious competitive environment.
Yes. The site is designed with guided lanes such as the Web Exploit Dojo, OSINT Corner, Forensics Sprint, and Career Clinic so new entrants can learn without diluting the high bar.
The CTF supports solo or teams of up to four. Other villages vary by ruleset, and operator identities are tied to registration for queueing, anti-cheat, and scoring.
Partners activate through challenge-backed demos, career clinics, booths, technical talks, and measurable recruiting touchpoints. The full details live on the partners route.