TCS HackQuest Season 9 for 2025 Batch Freshers

TCS HackQuest
Join TelegramJoin Telegram
Join Whatsapp GroupsJoin Whatsapp

TCS HackQuest Season 9 for 2025 Batch Freshers: The contest is open for will be graduating in the academic year 2025 batch of B.Tech / M.Tech / BCA / MCA / B.Sc / M.Sc from all disciplines and all the relevant institutes in India. HackQuest Season 9 round 1 will be held on 25th January 2025, Saturday. The contest will start at 10 AM and end at 4 PM.

★★ TCS NQT ★★

★★ TCS NQT Mock Tests ★★

Additionally, from the following sections, aspirants can find out important details like TCS HackQuest 2025 Selection Process, TCS HackQuest Eligibility, TCS HackQuest Prize Details, TCS HackQuest Program Information, etc. Therefore, after checking all these details follow our TCS HackQuest Registration Process and apply for this TCS HackQuest Season 7 right away.

TCS HackQuest 2025 – Overview

TCS HackQuest 2025 for Freshers Graduates
Organization NameTata Consultancy Services (TCS)
Name of the ProgramHackQuest
EligibilityEngineering Graduates from the 2025 batch
QualificationB. Tech, B.E, M. Tech, M.E, B.C.A, M.C.A, B.Sc. – B.S, M.Sc – M.S from all disciplines
Registration Start DateStarted
Registration End Date23rd January 2025, Thursday
Exam Date25th January 2025, Saturday
LocationAcross India
Official Sitetcshackquest.com

TCS HackQuest 2025 Season 9 Instructions

  • HackQuest Season 9 round 1 will be held on 25th January 2025, Saturday.
  • The contest will start at 10 AM and end at 4 PM.
  • Time to upload the report will be between 4 to 6pm. However you can start preparing the report during any time of the contest.
  • Reports must be uploaded in the HackQuest template which can be downloaded from the portal itself.
  • A valid CT/DT ID is mandatory to register for HackQuest Season 9. If you have not used the correct CT/DT ID, you will be prohibited from participating and/or disqualified from HackQuest Season 9.
  • Participants are expected to have stable high-speed internet connection to download files related to challenges. The size may vary as per challenge complexity.
  • Participants are expected to be ready with their platform of choice to solve the challenges. There might be challenges which are easier to solve in certain OS distributions.
  • You are allowed to use tools and programming languages of your choice, but usage of any automated scanners or tools which send a huge amount of traffic or try to brute force is strictly prohibited. Your access may be blocked from the application.
  • Once you solve a challenge, you will be rewarded with a flag. For your information all flags will be in the format of HQ9FLAG {..}. Please copy the flag in the flag submission box provided in each of the challenge pop ups.
  • There might be hidden keys for certain challenges which would be in the format of HQ9 {…}. and contestants are expected to be on a lookout for the same.
  • In case of any queries, write to us at careers@tcs.com

Details Regarding TCS HackQuest

HackQuest started in 2016 to unearth talents who excel in playing their favorite game – Catch the Flag! Based on the popular ‘Catch the Flag’ (CTF) format, the contest presents challenges to be completed in 6 hours. The set of challenges will be presented in 3 categories- 1. Beginner, 2- Intermediate, 3-Expert. The participants are free to choose challenges from distinct categories and are encouraged to attempt all challenges across all categories and demonstrate their ability to handle different scenarios. In the end, associates are awarded special prizes and potential job offers from TCS in the cybersecurity unit.

TCS HackQuest Eligibility

  • The Contest is open to students (enrolled in any recognized college /university / academic institute) in India who will be graduating in the academic year 2025 with any of the following degrees in any specialization:
    • Bachelor of Technology (B. Tech)
    • Bachelor of Engineering (B.E)
    • Master of Technology (M. Tech)
    • Master of Engineering (M.E.)
    • Bachelor of Computer Applications (B.C.A.)
    • Master of Computer Applications (M.C.A.)
    • Bachelor of Science (B.Sc. – B.S.)
    • Master of Science (M.Sc. – M.S.)
  • TCS reserves the right to take necessary steps and seek any relevant documents to verify the eligibility of the participants mentioned above.
  • The contest will be considered void if participation in the contest and/or conducting the contest is prohibited by law.

Participants

  • Participants can take part in the contest only as an individual. Team/Group participation is NOT allowed.
  • TCS reserves the right to assess each participant’s eligibility and compliance with the rules at any point during the validity of the contest.
  • Participants must promptly respond with any necessary evidence to verify their eligibility and/or compliance upon TCS’ request.
  • TCS reserves the right to refuse entry to any participant and shall not be obliged to provide any explanations thereof.
  • There are no participation/registration/submission/contest related fees. However, expenses, if any, arising from an individual’s participation in the contest shall be borne by that individual. TCS will not sponsor or reimburse any such expenses.

Contest Structure, Submission Shortlisting, Evaluation, Selection and Judging

Registration

  • Once the registration window is open, the participants are required to register for the contest on the Site (https://www.hackquest.tcsapps.com) with a valid TCS NextStep reference ID (CT/DT number).
    • To create a valid TCS NextStep reference ID (CT/DT number), participant needs to login to the TCS NextStep (https://nextstep.tcs.com/campus/) in the ‘IT’ section (Not BPS), fill the required fields, and submit. The participant will receive a pop-up with the TCS NextStep reference ID (CT/DT number). TCS NextStep reference ID (CT/DT number) is mandatory for participating in the contest.
    • Apart from the TCS NextStep reference ID (CT/DT number) generated through TCS Next Step, the participant will receive a unique credential to take part in the contest. This credential is of utmost importance and should not be shared with any other participants.
  • During registration, participants interested in the contest will register on the site along with the necessary profile details.

Structure

  • The contest will be conducted in two rounds. The first round (“Round 1”) is an online ‘Catch the Flag’ competition where all participants can take part and they will be shortlisted for next rounds basis qualification.
  • Participants shortlisted after Round 1 will move to Round 2, which will be conducted over Microsoft TEAMS/Webex and participants will have to keep their camera switched ‘ON’ during the entire period of the Round 2. This is under the company’s discretion and is subject to change according to company’s plan. The participants should be ready to attend the event physically if needed. The travel expenses will be bourne by TCS.
  • Final round will be conducted in person. It will be a Jury evaluation round at TCS premises. The details of which will be intimated to the qualified participants.
  • TCS will arrange for remote modalities of evaluating a select list of participants from Round 1. Shortlisted participants are required to stay tuned for real-time updates on Round 2, dates, format etc. Participants shall be solely responsible for keeping track of the announcements and participating accordingly.

Round 1

  • This will be an online challenge-based test where the participants would be required to log on to an online application with a set of challenge statements. These tests will require the participants to demonstrate their ethical hacking skills and their specific competency in security challenges. The set of challenge statements will be presented in three (3) categories:
    • Beginner level challenges: This category of challenges has been meticulously crafted for those with limited to no prior experience. These challenges will be based on the fundamentals of  cybersecurity, know-how of fundamental tools and techniques. Challenges focus on basic concepts like (not necessarily limited to) password cracking, simple encryption, and basic network vulnerabilities.
    • Intermediate level challenges: This set of challenges has been designed to test your problem-solving abilities and creative thinking. As you tackle these challenges, you will have to demonstrate your knowledge of advanced cybersecurity tools and methodologies. The challenges include more advanced topics (not necessarily limited to) such as web application security, SQL injection, and network analysis. Will require a deeper understanding of common vulnerabilities and exploitation techniques.
    • Expert level challenges: This set of challenges has been categorically created to push you to the limits of knowledge and ingenuity. These challenges will demand resourcefulness, deep understanding of cybersecurity principles, and the ability to think out of the box. The challenges are complex and may involve topics (not necessarily limited to) like reverse engineering, advanced cryptography, and sophisticated penetration testing. Attempting these would require a comprehensive understanding of multiple cybersecurity domains.
  • N.B. – The participants are free to choose challenges from distinct categories and are encouraged to attempt all challenges across all categories and demonstrate their ability to handle different scenarios. The URL of the application will be shared before the contest begins.
  • Round 1 will be for six (6) hour duration during which all the participants are required to use their skills and solve the challenge statement(s) (according to the category chosen) and submit the flags captured in the online portal.
  • Post solving a challenge statement, the participant needs to capture a screenshot of the flag with the timestamp visible and prepare a detailed report in the template provided on the site with a step-by-step approach for solving a particular challenge statement.
  • The detailed report should be uploaded on the site before the deadline as mentioned on the site. Uploading the report on the site is mandatory and any participant failing to upload the report will NOT be considered for further evaluation. This will result in the automatic disqualification of the participant from the rest of the contest. Please also make sure that your report is original and does not match with any other participant’s report(s) in which case both the participants would be rendered ineligible for further rounds in the contest. The participant should maintain the maximum size requirement for a report provided on the site.
  • Participants are free to use tools of their choice. However, usage of tools that send a huge amount of traffic or tools that tamper with the site and/or any of its application(s)/functionalities is strictly prohibited. If any participant is found violating this, he/she will be disqualified immediately from the contest. Participants are advised to take note of the recommended tools provided by TCS on the Site.
  • The submissions will be evaluated based on the following criteria:
    • Flags captured
    • Quality of report submitted
    • Approach followed for capturing the flags

Round 2

  • Participants selected from ‘Round 1’ will be eligible to participate in ‘Round 2.’ Round 2 will be conducted in a remote environment and will be proctored by the TCS team.
  • Activity 1: Penetration testing on hosted challenges
  • The participant would be provided with the hosted challenge statements which he/she is expected to solve by using his/her intuitive skills. Challenge statements in this round might require expertise in the following areas as well:
    • System exploitation
    • Penetration testing of web applications
    • Mobile Security
    • Digital forensics
    • Threat hunting
    • Incident response
    • Source code analysis
    • Scoring will be based on the flags captured by the participants in above mentioned topics
  • Activity 2: Case Explanation (3-4 hours) – Remotely
  • Shortlisted participants will be invited for a case explanation round. In this round, participants will be required to explain their approach to solving challenge statement(s) and answer the queries posed by the jury panel.

Domains

Participants trained in the below security domains will have an added advantage while participating in the contest:

  • Application Security
  • Network security
  • Java/J2EE, PHP, Python. GO
  •  Information security and risk management
  • Ethical hacking
  • Digital forensics
  • Threat hunting
  • Malware Analysis/Reverse Engineering
  • Any security specific certification like Security+, CEH, ISO 27001, etc.

The participant represents and warrants that:

  • the submission made/submitted is an original work or invention created solely by him/her;
  • he/she owns all rights in the submission or otherwise have right to submit the submission;
  • the submission does not violate any contractual obligation; and
  • the submission does not (i) violate any applicable laws and/or (ii) cause any form of plagiarism/infringement whether in full or in part.

The submission must not contain content:

  • that is inappropriate, indecent, obscene, violent, hateful, tortuous, defamatory, slanderous
  • that promotes racism or hatred against any group or individual
  • that promotes discrimination based on race, sex, religion, nationality, disability, sexual orientation or age
  • that is unlawful, in violation of or contrary to the laws or regulations in the state or province or region where the submission is developed.

TCS reserves:

  • the right to alter the duration of contest rounds at any time, without providing any justification. Such amendments will be communicated to the participants prior to such change.
  • the right to reject all entries for a certain challenge statement that does not meet the judging and assessment criteria.
  • the absolute right to disqualify a participant. If it considers that the participant/team has used improper means to participate in the contest; any information provided by the participant is found to be incorrect, inaccurate, false, misleading in any manner; or due to any other valid reason that may nullify the participant’s participation/win in the contest. TCS will be the sole authority to decide the winners of the contest and the decision of TCS will be final and binding on all the participants.

Additionally:

  • The submissions will be evaluated by a jury panel consisting of experts from the TCS  Cybersecurity team.
  • Participants agree that the evaluation criteria listed above are indicative, and the jury panel will be free to use their expertise, experience, and judgment to evaluate the submissions.
  • Mere participation in the contest and sending/submitting the submissions do not entitle the participant to win the contest.
  • The selection process may vary and shall be as per TCS’ sole discretion.
  • The participant or any third party shall have no right to question the process of selection.
  • TCS may determine the correctness, quality, and validity of the submissions at its sole discretion.

Prizes/Awards/Rewards

  1. The Participant hereby agrees and undertakes that mere announcement/declaration of being announced as a winner shall not entitle him/her to the prize/award/reward. Only upon complying with the Rules and fulfilling all conditions mentioned herein, to the satisfaction of TCS, shall the winning be validated.
  2. The top 10 Participants from Round 2 will be invited to attend the award ceremony and interact with TCS leadership.
  3. The top performing Participants who clear Round 2 may stand a chance to receive ‘Ninja or Digital’ provisional job offers subject to interview process and other selection criteria as per TCS’ sole discretion and policies in effect.
  4. Total prizes worth up to INR 5 Lakhs are given to the top-performing participants.
  5. Certification of merit will be awarded to all top performing Participants.
  6. Exceptional performers will be given a chance to work with the TCS Cybersecurity Centre of Excellence.

TCS HackQuest Prize Details

  • The top-performing candidates who clear Round 2 will receive job offers with Ninja and Digital job offers. (Evaluation will be based on the candidate’s performance only)
  • Winners will be awarded exciting prizes worth up to 5 Lakhs.
  • Exceptional performers will be given chance to work with Centre of Excellence teams.

How To Apply For the TCS HackQuest Season 9?

  • Initially, you have to visit the official website @ tcshackquest.com
  • Then, go through the instructions carefully.
  • Next, click on the About HackQuest option.
  • Now, check out complete details about the TCS HackQuest Season 9.
  • And if you are eligible & interested, click on the Register option.
  • Now proceed to fill in the details about CT/DT ID, Name, Email Id, Password.
  • After filling in all these details, click on the Register button.
  • After registration, participants will be receiving a unique credential which will be helpful in the contest.

Note: If you don’t have a CT/ DT ID, then log in to TCS NextStep, register your profile and then proceed for the TCS HackQuest.

TCS HackQuest 2025 Registration Link

TCS HackQuest 2025 Season 9 –  Important Links
For TCS HackQuest Season 9 RegistrationRegister Now (Active Now)
To Know More Details about the TCS HackQuest 2025Click Here

Aspirants who wish to make an extraordinary career by taking part in TCS HackQuest may find this article useful to check about TCS HackQuest Eligibility. For more updates/ information about these kinds of programs kindly keep following our Freshersnow.com website frequently.