Pentathon 2025 Stage I: #air8 Secures 8th Position
·
2 min read
tl;dr: Hey all, I teamed up with #air8 for Pentathon 2025 and we landed 8th in Stage I! Here’s the breakdown of our journey and why hacking drives me.
I’m 0x2510, a Penetration Tester and Red Teamer at Salesforce, and I live for the rush of hacking. This time, I teamed up with #air8 to take on Pentathon 2025, India’s ultimate national cybersecurity competition. We just finished Stage I—a Jeopardy-style CTF packed with challenges from web exploits to OT systems—and we secured 8th position! It’s a strong start, and we’re gearing up to dominate Stage II.
You can check out the leaderboard snapshot here → pentathon2025.in
Here’s the quick scoop on our Stage I run:
Waiting For Stage II
— 0x2510 (@thedvlprguy) April 9, 2025
Got 8th Position pic.twitter.com/MpPsMG7vyg
So, what’s Pentathon 2025 all about? It’s India’s hardcore national pentesting showdown, designed to unearth cyber talent through three intense stages. Stage I, held April 5-6, 2025, was a 48-hour gauntlet of Jeopardy-style challenges. With #air8, we tackled everything thrown at us—web vulns, forensics, crypto, you name it. I was in my element, running ParrotOS on my rig, clacking away on my mechanical keyboard, and channeling F1-level focus to nab those flags. Landing 8th out of a fierce field feels awesome, but we’re hungry for more in Stage II.
Hacking’s my fuel. Whether I’m breaking systems with Metasploit, sniffing packets with Wireshark, or securing MVPs for clients, I thrive on the challenge. Pentathon 2025 with #air8 reminded me why I got into this: the thrill of outsmarting defenses, the grind of late-night sessions, and the camaraderie of a killer team. I’m already thinking about how to bring this energy to my next gig—whether it’s red-teaming a client’s setup or building a bulletproof system.
That’s the wrap for now! We’re prepping hard for Stage II—expect more hacking, more flags, and maybe a few bitcoin-fueled victory bets. Stay locked!
I’m a hacking junkie. Want to secure something or break it better?
P.S. Follow me on Twitter where I spill my hacking journey, F1 rants, and cybersec ships!