This CTF has been created by CyberSoc, the Cyber Security Society at Cardiff University. Any likeness to real organisations within the CTF is purely coincidental. Any information obtained over the course of this CTF is to be obtained from free, open and legal resources only. At no time do we endorse or condone you gaining access to a system for which you do not have the explicit permission of the owner. You are reminded of the Computer Misuse Act, or the applicable computer misuse legislature in your locality. We will not be held responsible for any nefarious activity you carry out over the course of the CTF or at any other time.
You must not commit:
unauthorised access to computer material
unauthorised access with intent to commit or facilitate commission of further offences
unauthorised acts with intent to impair, or with recklessness as to impairing, operation of computer, etcetera
The Act also makes it an offence to make, adapt, supply or obtain articles for use in unlawfully gaining access to computer material or impairing the operation of a computer.
Access is defined as:
altering or erasing the computer programme or data
copying or moving the programme or data
using the programme or data
outputting the programme or data from the computer in which it is held (whether by having it displayed or in any other manner)