Welcome to the Find the Flag challenge – your opportunity to demonstrate your cybersecurity skills in navigating and exploiting vulnerabilities in a simulated industrial IT environment.


🧭 Challenge Overview

Participants are required to navigate to the following hosted web system:

🔗 Access the Challenge Site:

http://10.203.12.106

Please note the website is only accessible from OSU networks on campus. If you want to access it from outside campus networks please make sure you download the OSU campus VPN. Steps to download and set up campus VPN can be found here.

This website simulates a conventional Industrial Control System (ICS) dashboard used by authorized employees to monitor and manage plant operations. The system is intentionally embedded with vulnerabilities by its developer.

Your job as a hacker:

➡️ Gain unauthorized access

➡️ Explore vulnerabilities layer by layer

➡️ Unlock deeper system access

➡️ Crash or exploit the system as deeply as possible


📄 Deliverables

Each team must submit:

  1. Submission Deadline:

    🗓️ April 16th, 2025 11:59:00pm

  2. Submission Format (4 Columns)

    Vulnerability Details (A description of the vulnerability found. Upto 200 words)

    Location (File, script, or page name)

    Access (How did you access or trigger the vulnerability)

    Impact (What does the discovered vulnerability allow an attacker to do.)

    Please ensure your write-up is clear and concise. Feel free to include screenshots or proof-of-concept steps inside your document if helpful.

    Please make sure your files are either in .md, .pdf or .docx file with the above mentioned details

  3. Submission Link: https://airtable.com/appQO7edxK4gRxBkY/pag6j85o2uaNC4tfY/form