Teams will compete to identify and exploit vulnerabilities in a pre-made website or domain. Participants will use ethical hacking tools and techniques to assess the system’s security posture. The team that successfully identifies and exploits the most critical vulnerabilities within a given timeframe will be declared the winner.