
The first challenge, a web exploitation task, was completed by Team A in record time. However, Team B quickly caught up, using a clever technique to bypass security measures. The battle seesawed back and forth, with each team taking turns solving challenges and countering their opponents' moves.