The battlefield was ablaze with fierce competition.
This wasn't the typical red versus blue clash depicted on TV screens; it was an all-out brawl among ten teams.
Like sifting sand for gold, only the strong would endure — the brutal nature of this competition was crystal clear.
At the start of the match, each team was assigned identical virtual target machines to defend. Within the limited game time, teams had to identify weaknesses in the other teams' systems to launch attacks while simultaneously fortifying their own defenses.
From the initial scores, teams scored points by exploiting vulnerabilities in network services and capturing flags from opponents, subtracting points from the victims. Conversely, defending and patching vulnerabilities in their own systems helped avoid losses. Victory was determined by the final score.
