The challenges started with a seemingly simple task: hack into a publicly available database and extract a specific piece of information. But as the hours passed, the challenges grew exponentially more difficult. Teams had to use their skills in cryptography, network exploitation, and creative problem-solving to overcome each hurdle.