Do not use any device owned by your employer to take part of the CTF.
We highly recommend following a disposable approach, such as creating a virtual machine on your personal computer that will be destroyed after the event. This avoids polluting your host.
Do not bruteforce flags.
Do not share or trade flags and challenge solutions with other teams.
Do not attack the CTF infrastructure. No challenges are hosted on bnctf.com; make sure that you are performing operations on challenges hosted on challenges.bnctf.com and shell.bnctf.com.
Do not break challenges or perform denial-of-service attacks. If you think something is broken, contact the administrators.