PWN the room

Controlled competitive security with reviewed access, gated labs and a public surface that stays readable.

Login

New access is closed on this environment.

Pilot access

Pilot access works in controlled steps.

This is a closed pilot. Access is staged so email verification, approval, VPN onboarding and lab reachability can be validated safely before scale increases.

Entry sequence

The process is intentionally explicit. Each step exists to keep public access separate from restricted runtime access.

Join the waitlist

Start on the public landing. If pilot access opens for your profile, the platform contacts you through the submitted email.

Register and verify

Registration requires anti-bot verification. Email verification must be completed before any platform access is expected.

Wait for approval

Verified accounts still remain blocked until an operator explicitly approves access. That is part of the pilot safety model.

Generate the VPN profile

Approved users generate a WireGuard config from their profile. The private key is only returned in the downloaded file and new issuance invalidates the previous profile.

Reach the labs

After tunnel activation, the player plane exposes DNS, HTTPS and the assigned lab path only. It does not become a broad host-access network.

Boundary summary

The public explanation should make scope and non-scope obvious before a participant touches the runtime plane.

What the player plane allows

Restricted DNS, HTTPS and event-assigned lab reachability only.

What it does not allow

  • The platform itself is out of scope.
  • Player VPN access does not include admin surfaces.
  • SSH and plain HTTP are blocked on the player plane.
  • Only assigned lab targets are in scope.

WireGuard import by device

Keep the instructions short and operational. The goal is to reduce onboarding mistakes, not to decorate the page.

macOS

Install the official WireGuard app, import the downloaded `.conf` and activate the tunnel before opening a lab target.

Windows

Install WireGuard for Windows, choose `Import tunnel(s) from file`, select the downloaded `.conf` and connect before using lab endpoints.

iPhone / iPad

Use the WireGuard app from the App Store, import the `.conf` from Files or a secure transfer and enable the tunnel only when needed.

Android

Use the WireGuard app from Play Store, import the `.conf` from local storage and activate the tunnel while working on assigned labs.