The competition started slowly on this past Saturday morning, with the participants performing the due reconnaissance of the vulnerable machines in the network, trying to find their first target. After a few minutes most of the contenders already found point-awarding flags. From the start of the contest, it was clear that most of the players were on the same level, even though the skillset of each one was different. We saw participants trying to brute force the systems and others trying to break into our systems with more gentle techniques.
While machines were very hard to penetrate, most participants did not give up and tried harder, knowing that adversity would strengthen their techniques, as well as assist in gaining new skills.
After the first half of the competition, the top positions were occupied by three participants that were surpassing each other every few minutes.