Contests List


DEF CON Contests

Various contests, some lasting all 4 days of DEF CON, some short time on stage.
DEF CON Contests Forum page


? Cube

Contest DC Forum Page

.. Click image for larger version  Name:	cube - logo solid.png Views:	0 Size:	93.5 KB ID:	245554

..

? Cube

Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 14:00
DEF CON Contest Area, Forum Ballroom​
(This contest is held online and in person.)

Are you ready to put your problem-solving skills to the test?
This year, we are proud to introduce a brand new contest, designed to push your limits and awaken your curiosity.

The ? Cube Challenge is not for the faint-hearted. It is a multi-layered, complex puzzle that requires you to use all your hacking and analytical skills to solve it.
The cube is loaded with riddles and puzzles that must be solved one by one to progress further towards the ultimate goal.

This challenge is not just about solving a puzzle, it’s about exploring your curiosity and pushing the boundaries of your knowledge.It’s about putting your hacker mindset to work and seeing how far you can go. With each step, you’ll be one step closer to unlocking the secrets of the ? Cube Challenge. We know that Defcon attendees are always looking for the next big challenge, and we have created the ? Cube Challenge with that in mind.

It is a contest that will test your limits, engage your creativity, and push your curiosity to the next level. So come and join us at Defcon 31 and take on the ultimate challenge! Who knows, you might just walk away with the title of ? Cube Champion and the admiration of your fellow hackers. Are you ready to take the challenge?

Website: http://0x3fcube.com/

​


5n4ck3y

Contest DC Forum Page

.. Click image for larger version  Name:	5n4ck3y_logo_update.png.png Views:	0 Size:	192.0 KB ID:	245465





..
5n4ck3y

Friday: 10:00-18:00
Saturday: 10:00-18:00
Sunday: 10:00-12:00​
DEF CON Contest Area, Forum Ballroom | in-person |

Twitter: https://twitter.com/ANDnXOR

AND!XOR creates electronic badges that are filled with challenges. We love doing this, especially coming up with unique ways for hackers to earn them. We are excited to re-introduce the newest member of our hacker-fam… 5n4ck3y (Snackey). 5n4ck3y is a vending machine hardware hacking project, retrofitted into an IoT CTF based badge dispensing machine, complete with bling. To earn a badge, you must find a flag on our web hosted CTF platform. Once you have found a flag, you will be given a 5n4ck3y dispense code. Enter the code into the vending machine and a badge will be dispensed to you! There are a variety of challenges to earn a badge, as well as challenges to continue working on the badge itself once obtained. These span from hardware hacking, reverse engineering, OSINT, OS & network security to name a few. Hardware hacking is our passion and we want people to learn on badges. But more importantly, there is a lot to learn at DEF CON, so our challenge will hopefully serve a desire to learn something new and meet new friends while trying to earn a badge and hack it further. We hope you enjoy 5n4ck3y and all that it has to offer!
​


Adversary Wars CTF

Contest DC Forum Page

.. Click image for larger version  Name:	adversary-village-web-1.png Views:	0 Size:	2.66 MB ID:	245540


..
Adversary Wars: Adversary Village CTF

Friday: 10:00 – 17:00
Saturday: 10:00 – 17:00
Sunday: 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom

Twitter: https://twitter.com/AdversaryVillag
Website: https://adversaryvillage.org/adversa…nts/DEFCON-31/

Adversary Village proudly presents "Adversary Wars CTF," a cutting-edge capture the flag competition that revolves around adversary attack simulation, adversary-threat actor emulation, purple team tactics and adversary tradecraft. This unique competition is designed to replicate enterprise infrastructure and present participants with challenges that encourage the adoption of various techniques, tactics, and procedures (TTPs) employed by real adversaries and threat actors, all within a defined time frame.

Adversary Village is a community-driven initiative that prioritizes adversary simulation, emulation, breach and attack simulation, adversary tactics, offensive/adversary tradecraft, philosophy, and purple teaming.

Our objective is to establish a Capture the Flag competition dedicated to adversary simulation, purple teaming and knowledge sharing. Adversary Wars offers unique opportunities for “adversaries” aka participants to simulate attacks, explore new attack vectors, gain insights into threat actor profiles, master TTPs, and refine offensive tradecraft. With a range of adversary simulation exercises at different difficulty levels, this CTF promises real-world attack simulation scenarios and challenges.

Previous versions of the Adversary Wars CTF were hosted as part of Adversary Village, during DEF CON 29 and DEF CON 30.
We are excited to be back at DEF CON as an official contest this year. Adversary Wars CTF will be located in the contest area for DEF CON 31.​

A forum user who is an organizer for this which can provide authoritative answers is : abx (any other person claiming to be an organizer for this with "answers" may not actually be an organizer for this.)


AutoDriving CTF contest

Contest DC Forum Page

. AutoDriving CTF contest






.

AutoDriving CTF contest

Friday 10:00 – 18:00
DEF CON Contest Area, Forum Ballroom​
This contest will be both online and in-person.
Twitter: https://twitter.com/autodrivingctf
​
AutoDriving CTF is a Jeopardy style of CTF game with a set of challenges specific to self-driving functions and components. The contest offers participants the ability to use a simulation-based autonomous driving environment (based on the open-source simulators; e.g., LGSVL and CARLA) and explore specific attacks (such as camouflage stickers, road graffiti, and sensor spoofing/hijacking) as well as defense strategies.
We hope to continue the engagement with the hacking community to demonstrate security implications of autonomous driving system design decisions through hands-on challenges, increase the awareness of potential risks in security professionals, and encourage them to propose defense solutions and tools to detect such risks.​


Battle of the Bots

Contest DC Forum Page

..
..
Battle of the Bots
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​

Battle of The Bots presents a new twist on traditional “King-of-The-Hill” style Capture the Flag events by incorporating exploit development, vulnerability analysis, reverse engineering and software development in the form of developing computer worms aka “bots”. BOTBs requires competitors to develop proof-of-concept exploits against varying misconfigured or vulnerable network services. To maximize points scored, the competitor’s bot must automatically scan and compromise network services in the competition environment autonomously. Services that are harder to exploit (ex: requiring memory corruption exploits opposed to misconfigured databases) will result in a higher point score for the competitor.

The vulnerable network services will include real world vulnerable services where a competitor can adopt off the shelf proof-of-concepts vulnerabilities from an offensive security resource (ex: Metasploit Framework, exploit-db, packetstorm, etc…) into their bot to achieve access to said vulnerable services. Additionally, custom built vulnerable services informed by OWASP Top 10 security bugs as well as CVEs will influence challenge development resulting in a competitor to have the experience of reverse engineering new applications to identify vulnerabilities based on historically significant pain points in Software Engineering as well as infamous historical CVEs. Battle of The Bots will give competitors of all skill levels an opportunity to develop proof-of-concept exploits. Network services will be developed in a variety of compiled and interpreted languages with varying associated vulnerabilities and points. The variety of languages will provide opportunities for those less experienced with reverse engineering to analyze vulnerable Python code to find hidden API endpoints that lead to shell execution for example, rather than reverse engineer compiled binaries.

Finally, the BOTBs team will be capturing network traffic from the competition environment to later be shared with the wider community. The BOTBs team believes that this unique dataset of network service attacks can act as a unique resource for academic researchers, SOC analysts assessing their defenses and training events where having attack data for SIEM analysis. The data will be released under the Apache 2.0 License and hosted publicly on a yet to be determined platform.​


Blacks In Cyber Village CTF

Contest DC Forum Page

.. BIC Icon

..

Blacks In Cyber (BIC) Village CTF
Forum, Alliance 301-303

Friday: 12:00 PM – 11:59 PM ( in person village closes at 18:00)
Saturday: 12:00 AM – 5:00 PM
This contest is both online and in person.

@BlackInCyberCo1
https://www.blacksincyberconf.com/ctf ​

The year is 2323. You find yourself in an abandoned city in the future that is home to a variety of advanced technology and systems. You will need to use your skills to solve challenges and discover information to use to uncover your flags. Along the way, you will learn about social justice, privacy, civil rights and surveillance and how these can relate to communities and individuals as our world explores emerging technologies. This is a jeopardy style game with multiple categories in Cryptography, Steganography, Exploitation, Forensics,
Reverse Engineering and more!​ Click image for larger version  Name:	BIC_Sheild_.png Views:	102 Size:	247.5 KB ID:	245100



Blue Team Village CTF

Contest DC Forum Page


Blue Team Village CTF
Where: Flamingo, Scenic ballroom
When:
Friday: CTF begins: 10:30 – 18:00
Saturday: 10:30 – 18:00 (CTF ends)
Sunday: N/A The winners will be announced during BTV closing ceremonies

This contest is online and in person.

@BlueTeamVillage
https://www.blueteamvillage.org/ctf (not a live link yet)

The Blue Team Village CTF is a cyber defense CTF inspired by a mix of trending nation-state actor kill chains and at least one custom insider threat story. You are an incident responder tasked to investigate the recent attacks against our fictitious company: Magnus Tempus Financial. Since Magnus Tempus Financial made a vital acquisition expanding its precious metals portfolio to oil and gas operational technology (OT), you will also investigate their OT environment.

The CTF challenges contestants to leverage diverse cyber defense skills, including Incident Response, Forensics, Malware Analysis, Threat Intelligence, and Threat Hunting, to be the first team or individual to answer or solve the challenges presented.

The BTV crew developed the CTF to allow anyone, regardless of skill or knowledge, to participate, aiming to sharpen their cyber defense skills. We believe in the idea of choosing your adventure. As a result, participants can download a copy of the required evidence (logs, packets, etc.) or log into any of the 3 SIEMs we provide to hunt on.

If you are new to cyber defense, we highly recommend participating in the Blue Team Village Obsidian stations. They will cover many of the topics on the CTF and will help you along the way!

We will provide game clues on the CTF Platform and use the CTF station at the Blue Team Village and the Defcon BTV CTF Discord channel to address any CTF technical or scoring issues.
​


Capture the Packet

Contest DC Forum Page

.. Click image for larger version  Name:	logo.webp Views:	0 Size:	31.3 KB ID:	245289

..
Capture the Packet
Friday: 09:00-14:00
Saturday: 09:00-14:00
Sunday: 09:00 – 13:00
Forum, Packet Hacking Village, Academy 413

Websites:
https://www.capturethepacket.com
https://www.ariessecurity.com

DEFCON Discord: https://discord.com/channels/7082082…43512625430529
Twitter: @capturetp @wallofsheep

The time for those of hardened mettle is drawing near; are you prepared to battle? Compete in the world’s most challenging cyber defense competition, based on the Aries Security Cyber Range. In order to triumph over your competitors, contestants must be well rounded like the samurai. Tear through the challenges, traverse a hostile enterprise class network, and diligently analyze what is found in order to make it out unscathed. Not only glory, but prizes await those that emerge victorious from this upgraded labyrinth.

This year those brave enough to enter the labyrinth will witness never before seen terrors, and only the best prepared and battle hardened will manage to escape the crucible. Follow us on Twitter or Facebook to get notifications for dates and times when your team will compete, as well as what prizes will be awarded.​


Car Hacking Village CTF

Contest DC Forum Page

. Car Hacking Village Logo





Car Hacking Village CTF
Caesers Forum, Contest Area, Car Hacking Village.

WHEN:
Friday: 10am to 16:30pm
Saturday: 10am to 16:30pm
Sunday: 10am to 12pm

Twitter: https://twitter.com/CarHackVillage/
Website: https://www.carhackingvillage.com/
Community: https://discord.gg/DevtqBZ
​

The Car Hacking Village CTF is a fun interactive challenge which gives contestants first hand experience to interact with automotive technologies. We work with multiple automotive OEM’s and suppliers to ensure our challenges give a real-world experience to car hacking. We understand hacking cars can be expensive, so please come check out our village and flex your skills in hacking automotive technologies.

With the largest collection of hackers in one area, there’s no better way to understand the security state of an industry without bringing it to security professionals to break. Over the past 9 years, the Car Hacking Village has been the focal point of interest for new hackers entering the automotive industry to learn, be a part of and actually test out automotive technologies. Our contest at the village, in combination with many automotive OEMs, Suppliers, etc., is used to give people first hand experience on cutting edge and at times expensive technologies. We plan to use this event to keep drawing attention to the automotive security industry through hands-on challenges.



Cloud Village CTF

Contest DC Forum Page

.. Click image for larger version  Name:	cloud-village-logo-transparent(1).png Views:	0 Size:	59.3 KB ID:	245469


..

Cloud Village CTF
​
When: Starts at 10AM on Friday and ends at 12PM on Sunday (runs continuously).

Where: Online.
Twitter: @cloudvillage_dc
Website: https://cloud-village.org

If you ever wanted to break stuff on the cloud, or if you like rabbit holes that take you places you did not think you would go to, follow complicated story lines to only find you could have reached to the flag without scratching your head so much – then this CTF is for you!

Our CTF is a three days jeopardy style contest where we have a bunch of challenges hosted across multiple Cloud providers across multiple categories of difficulty.

You can register as teams or go solo, use hints or stay away from them, in the end it will be all for glory or nothing. Plus the prizes. Did we not mention the prizes? 😀
​


CMD+CTRL Cyber Range

Contest DC Forum Page

.. Click image for larger version  Name:	cnc-logo-purple.png Views:	129 Size:	5.1 KB ID:	245231

..

CMD+CTRL Cyber Range Showdown

Free Play: Starts Thursday at 10 AM and Ends Sunday at 12 PM
Competition: Starts Friday at 10 AM and Ends Sunday at 12 PM
Location: DEF CON Contest Area, Forum Ballroom, In-person

CMD+CTRL Cyber Range is an interactive learning and hacking platform where development, security, IT, and other roles come together to build an appreciation for protecting the enterprise. Players learn security techniques in a real-world environment where they compete to find vulnerabilities. Real-time scoring keeps everyone engaged and creates friendly competition. Our Cloud and App Cyber Ranges incorporate authentic, fully functioning applications and vulnerabilities often found in commercial web platforms.

At DEF CON 31: We will be debuting our latest Cyber Range, ShadowHealth, which focuses on exploiting a modern medical records system. We will also be opening up our platform for free play to those who do not want to commit to the full competition or want to experience some of our previous Ranges. Information below.

Find out more and register at:
http://defcon31.cmdnctrl.net/ ​


CrackMeIfYouCan

Contest DC Forum Page

.. Click image for larger version  Name:	CRack Me If You Can -kore logo.png Views:	0 Size:	19.5 KB ID:	245301




..
CrackMeIfYouCan
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​


https://contest.korelogic.com/
DEF CON Discord: https://discord.com/channels/7082082…44827053457478


The premiere password cracking contest "CrackMeIfYouCan" is back again.
Passwords so two-thousand and late. Remember, remember, the cracks of
November.

We’re preparing hashes from easy to hard, so there’ll be something for
you if you want to compete casually as a Street team, or go all out in
Pro.

Where we’re going, we don’t need roads. Purely a penchant for puzzles,
perhaps a plethora of processors.

Check out past years’ contests at https://contest.korelogic.com/ , and
the Password Village at https://passwordvillage.org/ ​


Creative Writing Short Story Contest

Contest DC Forum Page


Creative Writing Short Story Contest
Twitter: https://twitter.com/dcshortstory

Reddit: There will be a new Reddit thread at /r/defcon

This contest is run pre-con. The proposed contest will run from May 1, 2023 to June 15, 2023. Judging will run from June 16, 2023 to June 30, 2023. Winners will be announced July 8, 2023.

The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums, Twitter, and reddit. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves, don their proverbial thinking cap, and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are often overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

So many hacker skills depend on your ability to tell a story. Whether it’s social engineering, intrusion, or even the dreaded customer pentest report, ALL of these require the ability to tell a story. Storytelling is one of mankind’s oldest traditions. Presenters even engage in storytelling when they get up on stage. A contest that celebrates and focuses on the ability to wind a yarn that captures and engages an audience is highly appropriate.

So why not?

Awards are In person:
1st place: 2 badges
2nd place: 1 badge
Community choice: 1 badge

More Info: @dcshortstory

Last year’s contest entries can be found here:
Creative Writing Short Story Contest Story Entries – DEF CON Forums




Darknet-NG

Contest DC Forum Page

.. Click image for larger version  Name:	Darknet-NG-DEFCON31-Logo.png Views:	9 Size:	17.4 KB ID:	245236


..
Darknet-NG
Friday: 10 am – 4:30 pm (Contest shut down overnight)
Saturday: 10 am – 4:30 pm (Contest shut down overnight)
Sunday: 10 am – 12 pm (Contest ends at noon, and contest results to contests by 1 pm)
DEF CON Contest Area, Forum Ballroom, in-person

https://twitter.com/DarknetNg
https://defcon.social/@DarknetNG
https://darknet-ng.network

Darknet-NG is an In-Person Massively Multiplayer Online Role Playing Game (MMO-RPG), where the players take on the Persona of an Agent who is sent on Quests to learn real skills and gain in-game points. If this is your first time at DEF CON, this is a great place to start, because we assume no prior knowledge. Building from basic concepts, we teach agents about a range of topics from Lock-picking, to using and decoding ciphers, to Electronics 101, just to name a few, all while also helping to connect them to the larger DEF CON Community. The "Learning Quests" help the agent gather knowledge from all across the other villages at the conference, while the "Challenge Quests" help hone their skills! Sunday Morning there is a BOSS FIGHT where the Agents must use their combined skills as a community and take on that year’s challenge! There is a whole skill tree of personal knowledge to obtain, community to connect with and memories to make! To get started, check out our site https://darknet-ng.network and join our growing Discord Community!​


DC Kubernetes Capture the Flag (CTF)

Contest DC Forum Page

.. Click image for larger version  Name:	KubernetesCtf.jpg Views:	14 Size:	18.8 KB ID:	245246





..
DC Kubernetes Capture the Flag (CTF)
Friday: 10:00-18:00
Saturday: 10:00-17:00
Online: https://containersecurityctf.com/

Twitter @ctfsecurity
https://containersecurityctf.com/

The DEF CON Kubernetes Capture the Flag (CTF) contest features a Kubernetes-based CTF challenge, where teams and individuals can build and test their Kubernetes hacking skills. Each team/individual is given access to a single Kubernetes cluster that contains a set of serial challenges, winning flags and points as they progress. Later flags pose more difficulty, but count for more points.

A scoreboard tracks the teams’ current and final scores. In the event of a tie, the first team to achieve the score wins that tie.​


DC Sticker Design Contest

Contest DC Forum Page

.. Click image for larger version  Name:	defcon-sticker-design-poster-2022.png Views:	0 Size:	1.65 MB ID:	245251


..
DC Sticker Design Contest
Onlline Pre-Con
@InfosecStickers(@twitter) , @ stickers@defcon.social


Ancient warriors used tattoos as a means of indicating rank in battle; it was the sort of mark that told the tales of their various conquests – their struggles and triumphs. Similarly, traversing the halls of DEF CON, one can see more modern versions manifesting as stickers – especially on laptops and other electronic equipment.

We use stickers to break the ice with strangers, as a barter currency, to tell the tales of our struggles and triumphs. After all, is a hacker really a hacker without a laptop adorned with these markings?

Here’s your chance to be part of hacker culture, by creating something that people around the world will treasure and proudly display. Submit original artwork in the theme of the con, that you believe best exemplifies hacker culture, that will be used as printed stickers.


On your marks… Make your mark.​


DC’s Next Top Threat Model (DCNTTM)

Contest DC Forum Page

..
..
DC’s Next Top Threat Model (DCNTTM)
Friday: 10:00-18:00
Saturday: 10:00-18:00
DEF CON Contest Area, Forum Ballroom | Hybrid |

Twitter: @ThreatModelUs

Threat Modeling is arguably the single most important activity in an application security program and if performed early can identify a wide range of potential flaws before a single line of code has been written. While being so critically important there is no single correct way to perform Threat Modeling, many techniques, methodologies and/or tools exist.

As part of our challenge we will present contestants with the exact same design and compare the outputs they produce against a number of categories in order to identify a winner and crown DEF CON’s Next Top Threat Model(er).​


DEF CON 31 Beard and Mustache Contest

Contest DC Forum Page


DEF CON 31 Beard and Mustache Contest

When: Saturday 14:00 – 16:00
Where: Contest Stage

Website: http://dcbeard.net/ (new domain this year – update your favorites)

Twitter: @ DCBeardContest


Held every year since DEF CON 19 in 2011 (R.I.P. Riviera), (Except during that COVID thing – but we are not going to talk about that COVID thing), the DEF CON Beard and Mustache Contest highlights the intersection of facial hair and hacker culture.

For 2023 there will be three categories for the competition:

Full beard : Self-explanatory, for the truly bearded.

Partial Beard or Mustache only (combined this year)

For those sporting Van Dykes, Goatees, Mutton Chops, and other

partial beard styles -or-

Mustache only: Judging on the mustache only, even if bearded.

Bring your Handlebars, Fu Manchus, or whatever adorns your upper lip.

Freestyle : Anything goes, including fake and creatively adorned beards. Creative women often do well in the Freestyle category.
​
Starts August 12, 2023 14:00 Ends August 12, 2023 16:00 Location Contest Stage


DEF CON Chess Tournament

Contest DC Forum Page

.. Click image for larger version  Name:	DC31_Chess.jpg Views:	151 Size:	203.3 KB ID:	245637

..
DEF CON Chess Tournament
Saturday: 15:00 – 18:00
DEF CON Contest Area, Forum Ballroom | in-person |

Twitter: @ defconchess , For early registration, please send your name and rating to: defconchess@gmail.com ​

Chess, computers, and hacking go way back. In the 18th century, the Mechanical Turk appeared to play a good game, but there was a human ghost hiding in the shell. Some of the first computer software was written to play chess. In 1997, world champion Garry Kasparov lost to the program Deep Blue, but after the match he accused IBM of cheating, alleging that only a rival grandmaster could have made certain moves.

At DEF CON 31, we will run a human chess tournament. The games will have a “blitz” time control of 5 minutes on each player’s clock, for a maximum total game time of 10 minutes. The tournament will have a Swiss-system format, with a fixed number of rounds. The match pairing for each round is done after the previous round has ended, and depends on its results. Each player is paired with another player who has a similar running score.

To determine the winner, the Swiss system is considered highly effective, even when there is a large number of competitors and a small number of rounds. Every player gets to play the full tournament, and the winner has the highest aggregate score when all rounds are over.

There will be trophies and prizes for the top three players.

The tournament mechanics will be managed by the Las Vegas Chess Center (LVCC), which has many years of experience in organizing royal game tournaments for all strength levels and ages. LVCC has professional coaches, and grandmasters are frequent visitors.​

Max players: 100. In order to crown the best chess player at DEF CON, we will register the highest-rated players first.


DEF CON Scavenger Hunt

Contest DC Forum Page

.. Click image for larger version  Name:	DC31 DEF CON Scavenger Hunt_med.png Views:	0 Size:	229.1 KB ID:	245257




..
DEF CON Scavenger Hunt
Friday: 10:00 – 18:00
Saturday: 10:00 – 18:00
Sunday: 10:00 to 12:00
DEF CON Contest Area, Forum Ballroom​

DEF CON Discord: https://discord.com/channels/7082082…49278163779605
Twitter: @defconscavhunt

Are you tired of being an NPC, mindlessly standing in line at a hacker con? Do you want to be involved and improve the hacker community? The DEF CON Scavenger Hunt is here to encourage you to interact with goons and attendees alike; to be an active participant of DEF CON itself.

Come visit the DEF CON Scavenger Hunt table in the contest area and get a list, register your team of 1 to 5 players, and gather or accomplish as many items from the list as you can. Items are submitted at the table, better than average submissions shall be awarded bonus points. The team who turns in the most points by Sunday at noon will win the admiration of your like-minded peers.

The DEF CON Scavenger Hunt is one of the longest running contests at DEF CON, visit https://defconscavhunt.com for a history lesson.

If you capture pictures or video of items from our list, or have in the past, please send them to us via email scavlist@gmail.com .​
..


DEFCON MUD DUMB TERMINAL EDITION

Contest DC Forum Page

..
..
DEFCON MUD DUMB TERMINAL EDITION
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​

DEF CON Discord: https://discord.com/channels/7082082…07998796480590

The DEFCON MUD is back, this time you can only access it over dumb terminals or serial terminals hosted by the DEFCON SCAV Hunt. Flags will be hosted inside the mud, good luck, have fun, and oh yes the game has exploits, can you find them all?​


Dungeons@Defcon

Contest DC Forum Page

.. Click image for larger version  Name:	Dungeons_At_Defcon_Logo2.jpg Views:	18 Size:	19.6 KB ID:	245279





..
Dungeons@Defcon
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
DEF CON Contest Area, Forum Ballroom​

http://www.dungeonsatdefcon.com/

D@D is a table-top/RPG themed puzzling campaign for teams of 1-4 players. As part of the campaign, teams will unravel crypto challenges, solve physical puzzles, and do other side-quests that will have them interacting with different components of the Defcon community (villages, goons, NPCs, local wildlife, trolls, etc.) to earn points and progress through a narrative. The theme changes each year, but typically is based loosely on a popular table-top game that fits the theme for Defcon. Teams learn how to work cooperatively to solve large puzzles, and learn how to solve puzzles that they may have seen in CTFs, escape rooms, or other puzzle venues. The contest is designed to be accessible to all technical levels and all ages.

Pre-registration will occur online the week before con (announced via Twitter) as well as Friday morning at 10 in person, first come first served until we have enough teams filled. Contest will start at 12:00 on Friday​


Embedded CTF

Contest DC Forum Page

..
..
Embedded CTF
Friday: 0900 – 1800
Saturday: 0900 -1800
Sunday: 0900 -1400
Embedded Systems Village, Reno 2, Flamingo | in-person

Twitter: @EmbeddedVillage

Embedded systems are everywhere in our daily lives, from the smart devices in our homes to the systems that control critical infrastructure. These systems exist at the intersection of hardware and software, built to accomplish a specific task. However, unlike general-purpose computers, embedded systems are typically designed for a particular use case and have limited resources. This makes them both challenging and fascinating to work with, especially from a security perspective.

The Embedded CTF contest is an exciting opportunity to explore the intricacies of these systems and test your skills in a competitive environment. Contestants are challenged to find vulnerabilities in the firmware or hardware and exploit them to gain access or control over the device. The contest offers a unique opportunity to explore embedded devices’ inner workings and understand their design’s security implications.
New devices will be dramatically introduced at set intervals throughout the competition, and point values will decrease over time. This keeps contestants guessing and on their toes, forcing them to adapt and use their skills to tackle new challenges. It also offers a chance to learn about different types of devices and how they function, broadening participants’ knowledge and experience.

By participating in the contest, teams of up to 6 contestants can develop a deep understanding of how these systems operate and how to secure them against potential attacks. Additionally, the contest encourages participants to think outside the box and approach problems creatively, honing their problem-solving skills.
With the increasing integration of technology in our daily lives, embedded devices are becoming more ubiquitous. Whether you’re a seasoned security professional or just starting in the field, this contest offers a chance to learn, test your skills, and have fun in a dynamic and competitive environment.​


Hac-Man

Contest DC Forum Page

.. Click image for larger version  Name:	0b9943b93aa3a2fc428969326a2afccd.png Views:	0 Size:	11.0 KB ID:	245314



..
Hac-Man
Begins: Thursday Aug 10th at 08:00
Ends: Sunday Aug 13th at 12:00

DEF CON Contest Area, Forum Ballroom |Hybrid
Contest area does not open until Friday at 10:00.

https://hacman.roguesignal.io/
Twitter: @Hac__Man

Hac-Man is a hacker skills challenge, themed after the classic arcade game "Pac-Man". Navigate your avatar through the maze, completing skills challenges in many different skills categories such as Ciphers and Codes, Reverse Engineering, Packet Analysis, Scavenger Hunt, Trivia, and Lock-picking. Can you make it to the end of the maze, or better yet, top the Leaderboard?​


Hack-A-Sat 4 (HAS4)

Contest DC Forum Page

..
..
Hack-A-Sat 4 (HAS4)
Friday: 10:00 – 18:00 (active game hours)
Saturday: 10:00 – 18:00 (active game hours)
Sunday: 12:00 – 1:30 (HAS4 closing ceremony in Aerospace Village)
DEF CON Contest Area, Forum Ballroom​

The Department of the Air Force, in collaboration with the security research community, is hosting Hack-A-Sat 4 – the world’s first CTF in space. Hack-A-Sat 4 aims to enable security researchers of all levels to focus their skills and creativity on solving cyber security challenges on space systems and incentivize innovation in securing these systems. Hack-A-Sat 4 will be the first CTF hosted on an on-orbit satellite, called Moonlighter. The satellite has been designed and built to advance the security research community’s skills and knowledge of on-orbit space systems. Note: HAS4 is no longer open to new contestants as the qualifying event took place in April. Attendees stopping by the HAS4 contest area will be able to learn about the history of Hack-A-Sat, Moonlighter and this year’s challenges. The area will have live scoreboards, dashboards and visualizations relaying game status, and live commentary will be provided from the adjacent Aerospace Village throughout the weekend.

HAS4 Qualifications were held April 1-2, 2023.
Results here: https://quals.2023.hackasat.com/scoreboard/complete ​


Hack3r Runw@y

Contest DC Forum Page

.. Click image for larger version  Name:	image_2523.jpg Views:	0 Size:	35.6 KB ID:	245439






..
Hack3r Runw@y
Friday: 14:00 – 16:00
Saturday: Signup to walk the Contest Stage/Runway. Hours to be announced.
Saturday: Contestants take the stage – Time to be announced.
DEF CON Contest Area, Forum Ballroom | in-person​

https://hack3rrunway.github.io
DEF CON Discord: https://discord.com/channels/7082082…44666239647824
Twitter: @hack3rrunway
Forum user(s) with details about this contest: s0ciabl3ng_dc .

Returning to the stage for Defcon 30 was surreal and we’d be honored to return for the 5th year. Hack3r Runw@y brings out all the sheik geeks out there. It encourages rethinking fashion in the eyes of hackers. Be it smartwear, LED additions, obfuscation, cosplay or just everyday wear using fabrics and textures that are familiar to the community. Contestants can enter clothing, shoes, jewelry, hats or accessories. If it can be worn, it is perfect for the runway. For convenience, contestants can enter the contest with designs made ahead of the conference, however it needs to be made by them and not just store bought. Hack3r Runway is perfect for everyone whether technologically savvy or just crafty.

Awards will be handed out in 4 categories and one trophy for the People’s Choice category where the winner is anyone’s guess:

Digital wearable – LED, electronic, passive
Smart wear – interactive, temperature sensing, mood changing, card skimmers, etc
Aesthetics (non-electronic)- 3d printed, geeky/nerdy wear, obfuscation, cosplay
Functional wear – did you bling out your mask and/or shield, have a hazmat suit, lock pick earrings, cufflinks shims

Winners will be selected based on, but not limited to:
Uniqueness
Trendy
Practical
Couture
Creativity
Relevance
Originality
Presentation
Mastery​


Hacker Jeopardy

Contest DC Forum Page

.. Click image for larger version  Name:	Unknown.png Views:	0 Size:	495.7 KB ID:	245323

..
Hacker Jeopardy
Friday: 20:00-22:00
Saturday: 20:00-22:00​
DEF CON Contest Area, Forum Room 232

Lintile:
Hiya, ChatGPT, are you aware of the annual contest called Hacker Jeopardy at DEF CON? When is it?

ChatGPT:
Yes, Hacker Jeopardy is a popular event at DEF CON. It’s a parody of the television game show "Jeopardy!" but with a twist. Instead of general knowledge, the questions (or "answers," in Jeopardy style) are focused on hacker culture, computer security, technology, and similar topics. The game consists of two preliminary rounds on Friday, and a final round on Saturday. Both shows start at 2000 Las Vegas time. Just like in the original game show, there are DFIU Doubles and a Final Hacker Jeopardy round.

One unique aspect of Hacker Jeopardy that distinguishes it from the TV show is the incorporation of ADULT HUMOR, vulgarity, innuendo, and beer into the game. Please remember, my knowledge is current only up to September 2021, and if there have been any significant changes to Hacker Jeopardy after that, I would not be aware of them.

Lintile:
What’s the catch phrase of Hacker Jeopardy?

ChatGPT:
The catch phrase of Hacker Jeopardy is "Drink while you think". This refers to the unique element of the game where contestants are encouraged to drink beer while they are attempting to come up with the correct response to the clues.

Lintile:
That’s not correct. The acronym of the catch phrase is DFIU.

ChatGPT:
I apologize for the oversight. The catchphrase for Hacker Jeopardy at DEF CON is "Don’t Forget It’s UNIX" (DFIU), which is used humorously due to the historically significant role of Unix-based systems in hacking and network security. This phrase is often used to remind participants of the roots of many computer systems and infrastructures. I appreciate your patience and your correct information.

Note:
that this is an ADULT show with vulgarities and alcohol consumption, but if that doesn’t bother you, come enjoy one of the largest contests at DEF CON that you really need to see to believe! And as always, DFIU!
.. Click image for larger versionName:	HJ_Poster_med.pngViews:	352Size:	2.54 MBID:	245551

..



HackFortress

Contest DC Forum Page

.. Click image for larger version  Name:	hack_fortress2.png Views:	0 Size:	81.8 KB ID:	245334




..
HackFortress
Friday: 10:00 – 18:00 open play
Saturday: 10:00 – 18:00 contest hours
DEF CON Contest Area, Forum Ballroom​

hackfortress.net
DEF CON Discord: https://discord.com/channels/7082082…43831275225125
Twitter: @tf2shmoo

Hackfortress is a unique blend of Team Fortress 2 and a computer security contest. Teams are made up of 6 TF2 players and 4 hackers, TF2 players duke it out while hackers are busy with challenges like application security, network security, social engineering, or reverse engineering. As teams start scoring they can redeem points in the hack fortress store for bonuses. Bonuses range from crits for the TF2, lighting the opposing team on fire, or preventing the other teams hackers from accessing the store. HackFortress challenges range from beginner to advanced, from serious to absurd.​


Ham Radio Fox Hunting Contest

Contest DC Forum Page

..
..
Ham Radio Fox Hunting Contest
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​

defcon31foxhunt.com
DEF CON Discord: https://discord.com/channels/7082082…45275902574633
Twitter @Evil_mog (yolo)

In the world of amateur radio, groups of hams will often put
together a transmitter hunt (also called "fox hunting") in order to
hone their radio direction finding skills to locate one or more hidden
radio transmitters broadcasting. The Defcon Fox Hunt will require
participants to locate a number of hidden radio transmitters
broadcasting at very low power which are hidden throughout the
conference. Each transmitter will provide a clue or code which
will prove the player found the fox transmitter. A map
with rough search areas will be given to participants to guide them on
their hunt. Additional hints and tips will be provided throughout
Defcon at the contest table to help people who find themselves stuck.
A small prize to be determined will be given to each participant who
locates all of the foxes each day.

Expanded this year with increased difficulty each day.
Friday: Foxes in a small area, non moving
Saturday: Foxes in a larger area, with one moving.
Sunday: Foxes are on the move. The hunt is on!

There will also be a beginner friendly, no radio required, Infrared
LED Fox Hunt running everyday which participants can use their cameras
on their phones to find!​


Hardware Hacking Village CTF

Contest DC Forum Page

.. Click image for larger version  Name:	DC31_HHV_CTF_logo.png Views:	0 Size:	59.2 KB ID:	245345



..
Hardware Hacking Village CTF
Friday: 10:00 – 18:00
Saturday: 10:00 – 18:00
Hardware Hacking Village, Forum, 318 | in-person
Twitter: @dc_hhv

Heat up your soldering iron and freshen the batteries in your multimeter! The Hardware Hacking Village (HHV) is hosting their first official DEF CON Capture the Flag (CTF). This is a jeopardy style CTF, designed to challenge participants in various aspects of hardware hacking. Whether you’re new to hardware hacking or experienced and just looking for something to do while you wait for your fault injection to trigger, all are welcome and challenges range from beginner to advanced.​


HardWired

Contest DC Forum Page

.. Click image for larger version  Name:	logo.webp Views:	0 Size:	31.3 KB ID:	245295

..
HardWired

Friday: 09:00-14:00
Saturday: 09:00-14:00
Sunday: 09:00 – 13:00
Forum, Packet Hacking Village, Academy 413, in-person

Websites:
https://www.capturethepacket.com
https://www.ariessecurity.com

DEFCON Discord: https://discord.com/channels/708208267699945503/
Twitter: @capturetp @wallofsheep

Have you ever built a hardwired network? It sounds simple. Follow the cabling diagram, use the crimpers, and voila. But we’ve added a twist: this is cable construction on the clock. Whether you’re a seasoned pro or a complete newbie, we provide all the tools necessary for you to hone your skills and race against time to create and test a working cable. Come play HardWired and show us what you’ve got!​


IntelOps – Operation Spacewatch

Contest DC Forum Page

.. Click image for larger version  Name:	IntelOps-Operation Spacewatch_logo.jpg Views:	0 Size:	433.3 KB ID:	245443

..
IntelOps – Operation Spacewatch
Friday: 10:00 – 18:00
DEF CON Contest Area, Forum Ballroom​


Welcome to IntelOps – Operation Spacewatch! This is a game that pits you against threat actors in the near future, who are trying to trigger nuclear war! Using cyber threat intelligence, it is up to you to support cyber protection teams to defend a vital satellite constellation and prevent a hacker network from undermining your collective defense in a race against time.

Description of the game

Cyber Threat Intelligence (CTI) deals with information from past attacks, malware analysis and evolving threats in cyberspace. CTI enables enhanced decisions and getting ahead of the cyber-attack. But how can I apply CTI and use it? The game "IntelOps – Operation Spacewatch" aims to improve players’ understanding of CTI. Participants learn about different frameworks, sources and types of CTI and how they can use CTI data in a fun way. The game is built to teach terms and theory and apply CTI in a real-world context.

The game is based on four major CTI and cyber security models. These are the NIST Cyber Security Framework (CSF), MITRE ATT&CK Matrix, the Cyber Kill Chain and the Pyramid of Pain.

As a player, you are part of the United Nations (UN) CTI team and assigned to the mission to stop the attack on the satellite constellation. Your task is to use the available CTI your team has collected and assist the other members of the UN Cyber Protection Team (CPT).

The players find themselves in a near future scenario where every nation has access to ballistic-launched nuclear weapons. The United Nations has established a global satellite defense system to detect ballistic and hypersonic missile launches for monitoring and control purposes. The defense system allows the UN to be able to react immediately when suspicious activities on the weapons are detected. A global hacker network is threatening to disable the satellite constellation to use nuclear weapons for their purposes.

Your team has to protect 32 satellites in the global defense system. If 4 or more satellites are compromised and deactivated, the hacker network successfully disenabled the defense system and can take control of the nuclear weapons. It is your mission to protect the satellite network and ensure the availability of the global defense system.

The event will host three simultaneous instances of a team game. Teams consist of three players each. Nine players can play at a time. Every game last 20 minutes in total. Each turn, the players have 5 minutes to decide on their CTI strategy, apply the information to the NIST CSF board and stop the attack. There are a maximum of four turns to a game.
​


IoT Village CTF

Contest DC Forum Page

.. Click image for larger version  Name:	IoT_Village_logo_black (1).png Views:	0 Size:	23.6 KB ID:	245350


..
IoT Village CTF
Friday: 10:00 – 18:00
Saturday: 10:00 – 18:00
Sunday : 10:00 – 14:00

IOT Village, Forum | https://scoreboard.iotvillage.org/
DEF CON Discord: https://discord.com/channels/7082082…44307597164665

Hosted in IoT Village, teams of 1-6 players compete against one another by exploiting off-the-shelf IoT devices. This has been completely redesigned from previous contests, and features real-world devices that all have real-world vulnerabilities with real-world impacts.

This CTF is open to anyone! It is approachable for entry level people to experience getting their first root shell on IoT, but to really advance in this CTF teams will need to perform detailed vulnerability research, hardware hacking, firmware analysis, reverse engineering, and limited exploit development.

CTFs are a great experience to learn more about security and test your skills, and the IoT CTF provides the most realistic hacking experience around! So, join up in a team (or even by yourself) and compete for fun and prizes! Exploit as many as you can during the con and the top three teams will be rewarded.​


It’s In That Place Where I Put That Thing That Time

Contest DC Forum Page

..
..
It’s in That Place Where I Put That Thing That Time

Friday: 1000 PDT (GMT -7) – Saturday: 1800 PDT (GMT -7)

Your friend called. They had their place raided. They swear it’s a setup. But now they’re in jail and you’re the only hope they have. Can you collect the evidence that will let them walk free? Where should you look? The evidence is everywhere, and it could be anywhere. You might be sitting on it. You might be standing near it. It might be stuck to something. It might be lying in plain sight. Find the disks and bring them to us. All they said to you before they hung up was "It’s in that place where I put that thing that time." Good luck.

Twitter: @ iitpwiptttt
..


Maps of the digital lands

Contest DC Forum Page

.. Click image for larger version  Name:	motdl23-4.jpg Views:	0 Size:	199.3 KB ID:	245489




..
Maps of the digital lands

Friday: 10:00 -18:00
Saturday: 10:00 -18:00
Sunday: 10:00-12:00
DEF CON Contest Area, Forum Ballroom | In-Person

https://alienvualt.com/
Booking CTF slots at https://alienvualt.com/ctf

Maps of the Digital Lands is an all-ages contest that challenges participants to merge their artistic talents with their technical expertise. Contestants will be provided with a diverse array of written business designs and must hand-draw a network diagram illustrating the structure and interconnectivity of each business’s infrastructure. Judging will be based on accuracy, adherence to best practices, and artistic prowess. In addition, a captivating Capture the Flag scenario will be available for extra points, employing a digital tool to elevate the challenge. Participants of all skill levels are encouraged to join this immersive experience, compete for assorted prizes, and showcase their unique ability to blend artistry with network engineering excellence. Network engineering is a crucial yet frequently overlooked aspect of hacking, forming the backbone of a secure and efficient cyber ecosystem. By honing their network engineering skills, participants can elevate their abilities beyond mere script kiddie status, gaining a comprehensive understanding of system vulnerabilities and strengthening their overall hacking prowess.​

A forum user that is an organizer for this that is known is thetoolman : anyone else claiming to be an organizer with "answers" may not be affiliated with this.


Octopus Game

Contest DC Forum Page

.. Click image for larger versionName:	octopusgamedc31_2kx2k.pngViews:	1167Size:	4.65 MBID:	245215

..
Octopus Game

Contest
Friday: 1000 PDT (GMT -7) – Sunday: 1200 PDT (GMT -7)

Octopus Game is back for a second year with an ARG style competition where fun and friendship are the goals. This year players will meet, compete and work together in various locations in and around the con. You’ll solve puzzles and interact with characters in a world hidden just below the surface of reality. 128 players will enter, but only ONE will be crowned the Octopus CHAMPION. Join us, make some new friends and discover the world of Octopus Game!

More Info: https://www.mirolabs.info/octopusgamedc31
Twitter: @OctopusGameDC
Mastodon: @OctopusGame@defcon.social

​


Phish Stories

Contest DC Forum Page

.. Click image for larger version  Name:	phish.png Views:	0 Size:	237.6 KB ID:	245221

..

Phish Stories
Twitter: @phishstories​


In today’s world, approximately 90% of all cyberattacks begin with a phish. In fact, it’s not only the most prevalent method, but also the most effective one for someone to get malware on a machine. The sophistication of the groups who employ these methods targeting end-users continues to rapidly evolve. Many organizations around the world have adopted training to help their workforce understand what is or isn’t a phish when it hits their inbox. Hopefully, you’ve seen through the deception and haven’t been taken for a ride on any phish you’ve personally received.

At DEF CON, you might see examples of just how talented some of the red teamers and social engineers are when it comes to creating scenarios that can fool even the most seasoned of professionals. Leveraging Open-Source Intelligence (OSINT), some good looking graphics sprinkled in with proper grammar can make it tough on the targets.

It’s a far cry from the early days of phishing, when the promise of inheriting millions from a Nigerian prince or the lure of winning a sweepstakes were the focus of many an e-mail. No, the original phishing e-mails were not finely tuned instruments and more times than not they found their way into the trash bin. And, while that was the safest thing to do with these e-mails, I found myself chuckling at the rather inane stories sometimes associated with the particularly bad ones. Some were so bad that I wondered if they were written with the thought of getting someone to click or if the goal all along was to get someone to laugh.

It got me to thinking, “ Why not form a contest to see who can craft a phishing e-mail that makes us do both? Click AND laugh?”

As an avid fisherman who goes after the fish that swim, I’m very familiar with the concept of a “fish story”. A fish I catch may somehow end up looking a little bigger than it really is. That 12-inch bass becomes a 2-foot monster when held close to the camera. Or, I might fib a little on what I used to catch a certain fish or where I caught it.

I’m also a hacker, with a security day job, more than familiar with the other kind of “phishing”. It also can also be done through proclaiming incredible things to get you to click on a link. Perhaps you’ve inherited a large sum of money? Or maybe a mysterious government agent has some secret information that only you are privy to?


The Rules

First off, this is a contest about creativity, but you don’t HAVE to be funny to win.

There is more than one way to win, but there is only one entry per person. So, you must choose which way you’re going from one of the following three categories:

1. The Jester – This option is all about the laughter. Yes, you might know the technical ins and outs of SMTP or maybe you conduct penetration tests for a living and try to get your targets to click on those juicy links. But what we’re looking for in *this* option is more about just how good you are at giving us a chuckle. Write up a backstory, but no need to focus on too many of the technical details. Feel free to get really silly here. We still want you to focus on a target from the list, but the phish needs to do nothing more than make us laugh. These e-mails should be OBVIOUS phishes in this category.

2. The Wizard – You’re doing your best to ACTUALLY trick one of the targets. This would be more of your traditional phish. You’ll want to utilize the articles and create a backstory that includes any other potential sources of your OSINT. What caused you to take the path you did with the e-mail? Also, bonus points here for describing what happens AFTER your target clicks on a link. Again, though, you are limited to 3500 characters, so be concise. You want to trick them in this one, so the phish should not be overtly easy to spot.

3. The Ruler – The last of the options is the toughest one. Can you combine the two? We’re looking for “targeted absurdity” in this option. Write a ridiculous backstory complete with technical chops and then back that up with a phishing e-mail that busts a collective gut. The best e-mails in this competition will find a way to balance humor with the basic bones of a targeted phishing attempt.

Remember, this contest is more about creativity, writing, and finding a way to make us laugh. We’ll provide you with a LinkedIn profile of each member of the Management team, and three magazine articles, but it’s up to you to “fill in the blanks.” You get to make up what you want in the backstory. We’ve given you a start, but you’ll have to do the rest.


Rules for entry:

Each submission features two distinct documents:

1. The backstory – you’ll need to fill out the assumptions you made about your target. The more creative you get, the more you’ll score. This needs to be limited to roughly 3500 characters.
2. The e-mail – again, this should be limited to no more than 3500 characters. (3500 is about the size of one page)

You will be supplied with some background newspaper and magazine articles about the potential targets along with LinkedIn profiles of each as well. It is then up to you to pick your path to victory:

Save the e-mail and Backstory to a text file. Attach that text file to an e-mail and send it to phishstories@protonmail.com .

Contest begins May 15th and participants will have until June 15th to submit their entry.


One entry per participant

You will receive confirmation of your entry. If you submit more than one, we’re only counting and reading the first.

Illustrations and graphics are not accepted.

Please include your e-mail address and handle for communication and recognition.

You will receive a confirmation within 48 hours of submission. Please contact us if you do not receive confirmation after 48 hours.

Judging will be conducted by a panel and completed within 2 weeks.


Scoring Criteria

E-mail content – 50%
Backstory – 40%
Following the instructions – 10%

Awards are In Person. Top 3 will receive prizes – A “Jester”, “Wizard”, and “Ruler”. The Jester and Wizard receive one human badge each, the Ruler will receive two human badges.

You can follow @phishstories on Twitter for updates and information.

Enjoy!

The winners will get recognition in the online program and in social media. If on-site during the conference, they will also walk the stage to be recognized at the Contest Closing Ceremony.


What’s the point?

Having won the creative writing contest for DEF CON 30 and the People’s Choice award for DEF CON 29, I was looking for a way to expand pre-con participation in the creative writing process and incorporate a little (or a lot) humor along the way. Writing is a skill that has gotten me further in my information security career than most of my skills, save perhaps my sense of humor. Combining the two can be very helpful in gaining confidence for your own skills.


The Scenario



For this year’s inaugural contest, our contestants will attempt to send a phishing email to someone on the leadership team of DEF CON Custard and Cream, a new custard shop opened in August of 2020 that has 31 distinct “Phlavors” of custard and ice cream. There are three individuals on the leadership team for you to choose from:

Julia Culter, CEO

Pat Conline, CMO

Johnny “Red” Packard, CIO

Profiles of Defcon Custard and Cream management team:
​
Click image for larger version  Name:	Picture1.png Views:	120 Size:	187.2 KB ID:	245240

..


Julia Culter was always passionate about food and desserts. After working in various pastry shops and bakeries, she decided to start her own business and opened DEFCON Custard and Cream. Located in the heart of the city, the shop quickly became a local favorite for its delicious and unique flavors of custard.

As the owner and head chef of DEFCON Custard and Cream, Julia spends most of her days in the kitchen experimenting with new recipes and perfecting her craft. In her free time, she enjoys reading cookbooks in her cozy three-story condo. She is known for her strong work ethic and commitment to providing her customers with the best possible experience.

Julia Culter Founder & Head Chef at DEFCON Custard and Cream

Summary:

Passionate and dedicated pastry chef with experience in creating unique and delicious desserts. Founded DEFCON Custard and Cream to provide customers with a one-of-a-kind custard experience.

Experience:

Founder & Head Chef DEFCON Custard and Cream (May 2020 – Present)
  • Developed and implemented unique custard flavors
  • Managed all aspects of the business, including hiring, training, and inventory management
  • Created marketing and advertising strategies to increase customer awareness and sales
Pastry Chef Sweet Dreams Bakery (January 2018 – April 2020)
  • Created and executed daily dessert menu
  • Assisted in the development of new recipes and flavors
  • Worked closely with the bakery owner to plan and execute special events and catering orders
Education:

Bachelor of Science in Culinary Arts Le Cordon Bleu College of Culinary Arts (September 2014 – May 2018)

Skills:
  • Pastry and dessert making
  • Recipe development
  • Inventory management
  • Customer service
  • Marketing and advertising
  • Team leadership and training
Certifications:
  • Food Safety and Sanitation Certification
  • ServSafe Food Handler Certification
​… Click image for larger version  Name:	Picture1(1).png Views:	117 Size:	190.1 KB ID:	245241

..


Pat Conline is the Chief Marketing Officer at DEFCON Custard and Cream. With over 10 years of experience in the food and beverage industry, Pat brings a wealth of knowledge and expertise to the company.

As the CMO, Pat is responsible for overseeing the marketing and advertising efforts for DEFCON Custard and Cream. She has been working diligently on tapping new markets for the custard shop, with a focus on expanding the brand beyond its flagship store on the Las Vegas Strip. Pat is known for her creative and innovative approach to marketing, and is always looking for new ways to promote the company and its delicious custard. When not working, Pat enjoys spending time with her pet parakeet Linda.

Pat Conline Chief Marketing Officer at DEFCON Custard and Cream

Summary:

Experienced marketing professional with a background in the food and beverage industry. Currently serving as the Chief Marketing Officer at DEFCON Custard and Cream, overseeing all marketing and advertising efforts for the company.

Experience:

Chief Marketing Officer DEFCON Custard and Cream (August 2020 – Present)
  • Developed and implemented marketing strategies to promote the brand and increase customer awareness
  • Created advertising campaigns to drive sales and increase brand recognition
  • Worked closely with the company owner and sales team to develop and execute new market expansion plans
Marketing Manager Cupcake Heaven (January 2018 – July 2020)
  • Developed and executed marketing campaigns to drive sales and increase customer engagement
  • Managed the company’s social media presence and online marketing efforts
  • Created and managed the company’s email marketing campaigns
Education:

Bachelor of Science in Marketing University of Nevada, Las Vegas (September 2014 – May 2018)

Skills:
  • Marketing strategy and planning
  • Advertising and promotion
  • Social media marketing
  • Email marketing
  • Customer engagement
  • Sales and business development
​… Click image for larger version  Name:	Picture1(2).png Views:	117 Size:	202.9 KB ID:	245242

..

Johnny "Red" Packard is the Chief Information Officer at DEFCON Custard and Cream. With a background in both culinary arts and web development, Johnny brings a unique skillset to the company.

As the CIO, Johnny is responsible for managing all of the company’s information technology systems and ensuring that they are running smoothly. In addition to his technical expertise, Johnny is also known for his creative flavor creations and is always coming up with new and exciting custard flavors for the shop. In his free time, Johnny enjoys moonlighting as a web developer and was even responsible for creating the first DEFCON Custard and Cream website. He is known for his ability to bridge the gap between technology and culinary arts.

Johnny "Red" Packard Chief Information Officer at DEFCON Custard and Cream

Summary:

Experienced IT professional with a background in web development and culinary arts. Currently serving as the Chief Information Officer at DEFCON Custard and Cream, overseeing all information technology systems and managing the company’s website.

Experience:

Chief Information Officer DEFCON Custard and Cream (August 2020 – Present)
  • Developed and implemented IT systems and processes to support the company’s operations
  • Created and managed the company’s website and online presence
  • Collaborated with the head chef to create unique and innovative custard flavors
Web Developer Freelance (January 2018 – July 2020)
  • Developed and designed websites for various clients
  • Managed and maintained clients’ websites and online presence
Pastry Chef Sweet Dreams Bakery (September 2016 – December 2017)
  • Created and executed daily dessert menu
  • Assisted in the development of new recipes and flavors
Education:

Bachelor of Science in Computer Science University of Nevada, Las Vegas (September 2014 – May 2018)

Skills:
  • Web development and design
  • Information technology management
  • Recipe development and culinary arts
  • Customer service
  • Team leadership and training
Certifications:
  • CompTIA A+ Certification
  • CompTIA Network+ Certification
  • CompTIA Security+ Certification

Article 1: Def Cream Magazine

Double Dip on the Strip

DEFCON Custard and Cream is not just the brainchild of one person, but a team effort led by Julia Culter, the founder and head chef, along with Pat Conline, the Chief Marketing Officer, and Johnny "Red" Packard, the Chief Information Officer.

Pat Conline, who has over 10 years of experience in the food and beverage industry, is responsible for overseeing the marketing and advertising efforts for DEFCON Custard and Cream. "Our goal is to expand the brand beyond its flagship store on the Las Vegas Strip and tap into new markets," says Pat. "I’m always looking for new and innovative ways to promote the company and its delicious custard."

Johnny "Red" Packard, who brings a unique skillset to the company with his background in both culinary arts and web development, is responsible for managing all of the company’s information technology systems and ensuring they are running smoothly. "I really enjoy the opportunity to bridge the gap between technology and culinary arts," says Johnny. "I was even responsible for creating the first DEFCON Custard and Cream website and it’s been amazing to see how technology has helped us to grow and improve our business."

Together, Julia, Pat, and Johnny have created a winning team that is dedicated to providing their customers with the best possible experience. "We have such a great team here at DEFCON Custard and Cream," says Julia. "We all bring different skills and perspectives to the table, and it’s that diversity that makes us so successful."

With a passion for food and desserts, a commitment to customer service, and a team of experts working together, DEFCON Custard and Cream is sure to continue its sweet success for years to come.

Article 2: Linux Loves Bean Magazine

"From Pastry Chef to CIO: How Johnny ‘Red’ Packard is Revolutionizing the Dessert Industry"

Johnny "Red" Packard is no stranger to the world of desserts. With a background in both culinary arts and web development, he brings a unique skillset to his role as the Chief Information Officer at DEFCON Custard and Cream. But it’s not just his technical expertise that sets him apart – it’s his passion for experimentation and innovation.

As a pastry chef, Johnny has always been drawn to the creative process of recipe development and flavor creation. "I’ve always enjoyed experimenting with different ingredients and techniques to create new and exciting flavors," he says. "I think that mindset really helps me in my role as CIO, where I’m constantly looking for new ways to improve and streamline our systems and processes."

But what really sets Johnny apart is his hobby of "penetration testing" and ethical hacking. Johnny has a passion for understanding how systems and networks can be compromised, and he uses that knowledge to ensure that DEFCON Custard and Cream’s IT infrastructure is as secure as possible. "I think it’s important to understand the potential threats and vulnerabilities that exist in any system," he says. "That way, you can proactively take steps to protect yourself and your customers."

One of the ways that Johnny has been able to apply this knowledge is by developing an online ordering system that is both user-friendly and secure. "Our online ordering system allows customers to place their orders from the comfort of their own home, but we also made sure to use secure methods of storing and transmitting their information," he explains. "It’s a win-win for both our customers and for us as a business."

With his background in both culinary arts and web development, Johnny is able to bridge the gap between technology and culinary arts. His innovative approach and passion for experimentation and innovation has helped DEFCON Custard and Cream to stand out in the dessert industry.

"I’m so grateful for the opportunity to do something I love every day, and to have such amazing customers who support me," says Johnny. "I can’t wait to see what the future holds for DEFCON Custard and Cream."

Article 3: Bon Hacketit Magazine

"Marketing the Sweet Life: Inside the Mind of DEFCON Custard and Cream’s CMO"

When it comes to marketing, Pat Conline is a force to be reckoned with. As the Chief Marketing Officer at DEFCON Custard and Cream, she’s responsible for overseeing all of the company’s advertising and promotion efforts. But behind the creative campaigns and clever slogans is a woman who’s just as passionate about custard as she is about marketing.

"I’ve always had a sweet tooth, and when I saw the opportunity to work with DEFCON Custard and Cream, I knew it was the perfect fit," says Pat. "It’s been amazing to see how our marketing efforts have helped the brand to grow and become a household name."

But despite her success in the marketing world, Pat admits that she’s not always the most tech-savvy person. "I’ll be the first to admit that I’m not the most computer-literate person out there," she says. "I leave all of that stuff to Johnny, our CIO. He’s the one who makes sure our website and online systems are running smoothly."

When asked about the company’s computer network, Pat is quick to deflect. "I don’t know much about the technical side of things," she admits. "But I know that Johnny and his team have been hard at work, they’re the cream of the crop."

But despite her lack of technical expertise, Pat’s passion and dedication to her job are undeniable. "I love being able to create campaigns and promotions that connect with people and make them excited about our custard," she says. "It’s an amazing feeling to know that our marketing efforts are making a real difference."

Pat’s life outside of work is one that she’s hoping to have some time for now that DCC has gotten off the ground. "I have a pet Parakeet named Linda, and I love spending time with her, but I do think with our launch it might be time to enjoy this great city."

With her creative approach and passion for custard, Pat Conline is helping to make DEFCON Custard and Cream a household name in the dessert industry.

"I’m so grateful for the opportunity to do something I love every day and to have such amazing customers who support me," says Pat. "I can’t wait to see what the future holds for DEFCON Custard and Cream."
​


pTFS Presents: Mayhem Industries – Starphish

Contest DC Forum Page

..
..
pTFS Presents: Mayhem Industries – Starphish
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​
DEF CON Contest Area, Forum Ballroom

https://ptfs.team/dc31
.. Click image for larger version  Name:	IMG_8065.png Views:	0 Size:	1.03 MB ID:	245529

..​

Do you have what it takes to go up against Mayhem Industries’ latest maleficent project? Starphish Ltd. is up to no good in that way that only corporations can be. They’ve got five Divisions, which means you’ve got five opportunities to shut them down!

It won’t be easy. You’ll be directing a team of infiltrators through increasingly difficult challenges. What sort of challenges? Depends on the Division. Engineering is full of crunchy hacking challenges. HR’s got the goods on social engineering. Finance’ll be data processing the whole way.

And the C-suite? Most dangerous of all… We’ve never been able to get an operative inside, so they could be anything. We’re counting on you.

..
..

Starphish is a fun and interactive jeopardy style CTF contest. Don’t worry if you don’t know what that means. Winning will require demonstrating a wide range of hacking skills, but participating is encouraged for all ability levels. Challenges range from simple puzzles, to challenging crypto problems, to truly phishy hijinks.

pTFS is a hacker collective that has been competing in various DEF CON contests for almost 15 years.​


Pub Quiz at DEF CON

Contest DC Forum Page

..
..
Pub Quiz at DEF CON
Friday: 18:00-21:30
Location: Caesars Forum – Forum – 121-123, 129, 137 – Chillout​

Do you like Pub Quiz please join us in participating in the first ever Pub Quiz at DEF CON. Quiz will consist of 7 rounds from Question from 90s TV shows, Movies, and DEF CON questions. The quiz will be theme will be all things DEF CON. There will be visual and audio rounds so not just boring questions. People will group into teams of 5 and a cash prize will be provided for 1st, 2nd, and 3rd high scoring groups. Ties will be broken by a dance off from a person of the tied teams.

1st Prize $1,000
2nd Prize $300
3rd Prize $200​

Authoritative answers about this can be provided by frost69


Radio Frequency Capture the Flag

Contest DC Forum Page

.. Click image for larger versionName:	rfctf.jpgViews:	455Size:	96.4 KBID:	245224

..
Radio Frequency Capture the Flag

Online and In-person
Where: Radio Frequency Village, Eldorado Ballroom, Flamingo
When: Village Operating Hours are Friday to Sat 10:00 – 18:00, Sunday 10:00 to
14:00


Twitter: @rf_ctf and @rfhackers
​DEFCON Discord: https://discord.com/channels/7082082…44270976696380
RF Discord: https://discordapp.com/invite/JjPQhKy
Website: http://rfhackers.com – play with us
Github: https://github.com/rfhs
Official Support Ticketing System: https://github.com/rfhs/rfctf-support/issues


Do you have what it takes to hack WiFi, Bluetooth, and Software
Defined Radio (SDR)?

RF Hackers Sanctuary (the group formerly known as Wireless Village) is
once again holding the Radio Frequency Capture the Flag (RFCTF) at DEF
CON 31. RFHS runs this game to teach security concepts and to give
people a safe and legal way to practice attacks against new and old
wireless technologies.


We cater to both those who are new to radio communications as well as
to those who have been playing for a long time. We are looking for
inexperienced players on up to the SIGINT secret squirrels to play our
games. The RFCTF can be played with a little knowledge, a pen tester’s
determination, and $0 to $$$$$ worth of special equipment. Our new
virtual RFCTF can be played completely remotely without needing any
specialized equipment at all, just using your web browser! The key is
to read the clues, determine the goal of each challenge, and have fun
learning.


There will be clues everywhere, and we will provide periodic updates
via discord and twitter. Make sure you pay attention to what’s
happening at the RFCTF desk, #rfctf on our discord, on Twitter
@rf_ctf, @rfhackers, and the interwebz, etc. If you have a question –
ASK! We may or may not answer, at our discretion.


FOR THE NEW FOLKS

Our virtual RFCTF environment is played remotely over ssh or through a
web browser. It may help to have additional tools installed on your
local machine, but it is not required.

Read the presentations at: https://rfhackers.com/resources


Hybrid Fun

For DEF CON 31 we will be running in “Hybrid” mode. That means we
will have both a physical presence AND the virtual game running
simultaneously. All of the challenges we have perfected in the last 2
years in our virtual game will be up and running, available to anyone
all over the world (including at the conference), entirely free. In
addition to the virtual challenges, we will also have a large number
of “in person” only challenges, which do require valid conference
admission. These “in-person” only challenges will include our
traditional fox hunts, hide and seeks, and king of the hill
challenges. Additionally, we will have many challenges which we
simply haven’t had time or ability to virtualize. Playing only the
virtual game will severely limit the maximum available points which
you can score, therefore don’t expect to place. If you play virtual
only, consider the game an opportunity to learn, practice, hone your
skills, and still get on the scoreboard for bragging rights. The
virtual challenges which are available will have the same flags as the
in-person challenges, allowing physical attendees the choice of
hacking those challenges using either (or both) methods of access.


THE GAME

To score you will need to submit flags which will range from decoding
transmissions in the spectrum, passphrases used to gain access to
wireless access points, or even files located on servers. Once you
capture the flag, submit it to the scoreboard right away, if you are
confident it is correct. Flags will be worth less points the more
often they are solved. Offense and defense are fully in play by the
participants, the RFCTF organizers, and the Conference itself. Play
nice, and we might also play nice.


Getting started guide: https://github.com/rfhs/rfhs-wiki/wiki

Helpful files (in-brief, wordlist, resources) can be found at
https://github.com/rfhs/rfctf-files

Support tickets may be opened at https://github.com/rfhs/rfctf-support/issues

Our whole game is also open source and available at:
https://github.com/rfhs/rfctf-container


TL;DR

Twitter: @rf_ctf and @rfhackers
Discord: https://discordapp.com/invite/JjPQhKy
Website: http://rfhackers.com – play with us
Github: https://github.com/rfhs
Official Support Ticketing System: https://github.com/rfhs/rfctf-support/issues


Red Alert ICS CTF

Contest DC Forum Page

.. Click image for larger versionName:	78f9dfb4-9c09-11ed-a752-ee1fa6a264f8.pngViews:	357Size:	73.2 KBID:	245374


..
Red Alert ICS CTF
Friday: 12:00 – 17:00
Saturday: 10:00 – 17:00
Sunday: 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom |in-person

https://twitter.com/icsctf

Red Alert ICS CTF is a competition for Hackers by Hackers. The event exclusively focuses on having the participants break through several layers of security in our virtual SCADA environment and eventually take over complete control of the SCADA system.

The contest would house actual ICS (Industrial Control System) devices from various vendors on a testbed showcasing different sectors of critical infrastructure. The participants would be able to view and engage with the devices in real time and understand how each of them control each of the aspects of the testbed and leverage this to compromise the devices.

Red Alert ICS CTF is back with a ton of fun challenges after successfully running the CTF at DEF CON 30, DEF CON 29, DEF CON 27 and DEF CON 26 (Black Badge).

Highlights of the previous Red Alert ICS CTF is available at: https://www.youtube.com/watch?v=dz7hNnavHaY and https://youtu.be/AanKdrrQ0u0 |



Red Team CTF

Contest DC Forum Page

..
..
Red Team CTF
Friday: 10:00 – 17:00
Saturday: 10:00 – 17:00
Sunday: 10:00 – 12:00

DEF CON Contest Area, Forum Ballroom | Hybrid

https://threatsims.com/redteam-2023.html.

The Red Team Capture the Flag (CTF) competition at DEF CON is a challenging and exciting event that tests the skills of participants in offensive security. The objective of the Red Team CTF is for teams to successfully breach the security of a simulated target network.

The Red Team CTF is designed to simulate real-world scenarios in which attackers attempt to penetrate the security of a network or system. Participants are expected to use a wide range of hacking techniques, tools, and skills to identify and exploit vulnerabilities in the target network.

Teams are typically composed of experienced hackers, penetration testers, and security researchers who have a deep understanding of the latest cybersecurity threats and attack techniques. They must work together to uncover and exploit vulnerabilities in the target network, while also evading detection and countermeasures put in place by the Blue Team.

The Red Team CTF at DEF CON is considered one of the most challenging and prestigious CTF competitions in the world, with participants coming from all over the globe to compete. It is a high-pressure, high-stakes event that tests the limits of participants’ technical and strategic abilities, and offers a unique opportunity to showcase their skills and knowledge in front of a global audience of Hackers.​


Social Engineering Community (SEC) Vishing Competition

Contest DC Forum Page

.. Click image for larger version  Name:	SECVC_Logo_sm.png Views:	0 Size:	186.4 KB ID:	245514

..
Social Engineering Community Vishing Competition (SECVC)

Hours:
Friday 0830 – 1800

Location:
Social Engineering Community Village (LINQ Hotel, 3rd floor, room Social A)

Description:
In this competition (#SECVC), teams go toe to toe by placing live vishing (voice phishing) phone calls in front of the Social Engineering Community audience at DEF CON. These calls showcase the duality of ease and complexity of the craft against the various levels of preparedness and defenses by actual companies. Teams can consist of 1-3 individuals, which we hope allows for teams to utilize novel techniques to implement different Social Engineering tactics. Each team has limited time to place as many calls as possible from a soundproof booth. During that time, their goal is to elicit from the receiver as many objectives as possible. Whether you’re an attacker, defender, business executive, or brand new to this community, you can learn by witnessing firsthand how easy it is for some competitors to schmooze their way to their goals and how well prepared some companies are to shut down those competitors!

2023 judges: Corgi, FC aka freakyclown, and Snow
2023 coaches: Ibetika, JC, C_3PJoe, and Split Beans (last year’s SECVC winners: Jenn, Matt, and Sean)

This competition takes place on Friday in the Social Engineering Community village, be sure to get there early to get a seat; they fill up fast! Additionally, at the end of Friday, join Snow as she covers the behind the scenes of creating the SECVC, this year’s lessons learned, team highlights, and tips for future competitors!

Website: https://www.se.community/vishing-competition/ ​
Twitter: @ sec_defcon​


Social Engineering Community (SEC) Youth Challenge

Contest DC Forum Page

.. Click image for larger version  Name:	SECYC_Logo_sm.png Views:	0 Size:	151.9 KB ID:	245495







..
Social Engineering Community (SEC) Youth Challenge

Hours:
Friday 0830 – 1730
Saturday 0830 – 1730
Sunday 1000 – 1100

Location:
In the Social Engineering Community Village (LINQ Hotel – room Social A)

Description:
Great Scott! The Social Engineering Community needs your help to fix a disrupted timeline! We need brave and creative minds for our Youth Challenge to help us solve a series of challenges that will lead to the grand solution.

Are you up for the challenge? As my trusty assistant, you’ll be tasked with using your problem-solving skills and ingenuity to tackle each challenge, which may range from decoding messages to hacking systems. With each successful challenge, we’ll be one step closer to restoring the timeline and preventing disastrous consequences!

This is no ordinary journey! Along the way, you’ll have the opportunity to learn valuable skills in cryptography, social engineering, network security, and more. You’ll need to stay sharp and think on your feet to overcome unexpected obstacles.

So, grab your flux capacitor and join me on this thrilling adventure! Together, we can fix the disrupted timeline and save the future. Are you ready to take on this challenge, my friend? Let’s go back to the future!

Website: https://www.se.community/youth-challenge/
Twitter: @ ​sec_defcon​

..

​
​


TeleChallenge

Contest DC Forum Page

.. Click image for larger version  Name:	rev2.jpg Views:	0 Size:	70.0 KB ID:	245393




..
TeleChallenge
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​

https://www.telechallenge.org
DEF CON Discord: https://discord.com/channels/7082082…44470063399012
Twitter: @telechallenge (we also expect to use @ telechallenge@defcon.social )

The TeleChallenge is a fast-paced, fully immersive, and epic battle of wits and skill. The highest level of commitment is required, and this is one of the hardest contests in the world to win, but you don’t need any special technical skills to play: just a touch-tone phone. And remember: the best way to ascend into the Phoniverse is to get others involved in the TeleChallenge opportunity, so bring a team!​


The Beverage Cooling Contraption Contest

Contest DC Forum Page

.. Click image for larger version  Name:	contest_beveragecoolingcontraptioncontest_DC31_logo.png Views:	0 Size:	93.0 KB ID:	245399



..
The Beverage Cooling Contraption Contest
Friday: 11:00 – 14:00
DEF CON Contest Area, Forum Ballroom | in-person

I don’t know my gender non-specific guys. It’s not funny anymore. We can’t stop talking about a cheeto for paying hush money to a busty tortilla chip. Winny Pooh is presatator for life with a hunger for those sweet sweet chips. Off brand doctor evil is threatening to nuke the world on the weekly. And in the plot twist of the year BiBi is going fascist. I keep expecting ol’e Joe to bust out the force lightning and tell me to "give in to my hate". WELL TOO LATE! This year we are going to have a change of pace. I’m going to drink all the beverage! Lord knows I could use it. I’m kidding of course, I’m terribly allergic to hops. It’s the greatest irony of all, I can’t drink any of the beverage. But our spectators can! And they want that beverage to be COLD! So I need you to help me satisfy their thirst. Their thirst for escape from this mad world.
​


The Dark Tangent Look-Alike Contest

Contest DC Forum Page

..
..
The Dark Tangent Look-Alike Contest
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​

The Dark Tangent Look A-like Contest is a creative opportunity for DEF CON attendees to put their non-technical hacking skills to the test. As a contestant in The Dark Tangent Look A-like Contest, you will be judged based on your appearance, mannerisms, efforts, and overall persuasiveness. Can you assume another identity? Can you look, walk, talk, and act like Dark Tangent? Can you become THE DARK TANGENT?​


The Gold Bug Challenge

Contest DC Forum Page

.. Click image for larger version  Name:	be5af84a-0640-11ed-b394-c6fccc453a1b.png Views:	0 Size:	627.4 KB ID:	245409

..
The Gold Bug Challenge
Friday: 10:00 – 18:00
Saturday: 10:00 – 18:00
Sunday: 10:00 – 12:00
Contest Area, Forum Ballroom | Hybrid
​

https://goldbug.cryptovillage.org/
DEF CON Discord: https://discord.com/channels/7082082…44108837486602
Twitter: @CryptoVillage

Love puzzles? Need a place to exercise your classical and modern
cryptography skills? This puzzle will keep you intrigued and busy
throughout Defcon – and questioning how deep the layers of
cryptography go.

The Gold Bug an annual Defcon puzzle hunt, focused on cryptography. You can learn about Caesar ciphers, brush up your understanding of how Enigma machines or key exchanges work, and try to crack harder modern crypto. Accessible to all – and drop by for some kids’ puzzles too!

:‡?( 8*;(: .‡6*; 6) 5; 3‡0†2?3 †‡; -(:.;‡¶600538 †‡; ‡(3​


The Lonely Hard Drive

Contest DC Forum Page

.. Click image for larger version  Name:	Lonely Hard Drive Bettie.png Views:	0 Size:	606.8 KB ID:	245463











..
The Lonely Hard Drive
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00​
DEF CON Contest Area, Forum Ballroom

Are you looking for a good time? Are you trying to get lucky? Did you already get lucky by finding a Lonely Hard Drive in Vegas? Satisfy your curiosity by visiting the contest hall to get started or encounter one of the Lonely Hard Drives hidden around the conference! Contained within is a maze of puzzles and challenges that increase in difficulty the further you progress. There are flags to find and points to earn towards the leaderboard to win prizes at DEF CON 31! Act now! Limited time offer! The Lonely Hard Drive is waiting for you!

Web: https://www.dc207.org/the-lonely-hard-drive ​
Twitter: @LonelyHardDrive
Forum users that can comment on details: burninator and Krawr and Fragileduck .


Tinfoil Hat Contest

Contest DC Forum Page

.. Click image for larger version  Name:	TheyAreListening-tin-foil-hat.png Views:	0 Size:	166.8 KB ID:	245559

..
Tinfoil Hat Contest
Friday: 10:00-18:00
Saturday: 10:00-18:00
DEF CON Contest Area, Forum Ballroom​
DEF CON Contest Area, Forum Ballroom

Twitter: @DC_Tin_Foil_Hat

Want to block those pesky 5G microchips coursing through your vaccinated body? Did you anger our new AI overlords, and need to hide? Or do those alien mind control rays just have you down lately? Fear not, for we here at the Tin Foil Hat contest have your back for all of these! Come find us in the contest area, and we’ll have you build a tin foil hat which is guaranteed to provide top quality protection for your noggin. How you ask? SCIENCE!

Show us your skills by building a tin foil hat to shield your subversive thoughts, then test it out for effectiveness.

There are 2 categories: stock and unlimited. The hat in each category that causes the most signal attenuation will receive the "Substance" award for that category. We all know that hacker culture is all about looking good, though, so a single winner will be selected from each category for "Style".​


TOOOL Dozier Drill Lockpicking Challenge

Contest DC Forum Page

.. Click image for larger version  Name:	TOOOL_logo-small.png Views:	0 Size:	54.1 KB ID:	245426




..
TOOOL Dozier Drill Lockpicking Challenge
Saturday: 12:00-15:00
Lock Picking Village, The Bloq, Linq, in-person

Twitter: @toool

Have you ever wanted to break out of handcuffs, pick open a closed bag and shoot your buddy in the chest with a nerf gun? So have we, that’s why TOOOL presents the Dozer Drill. A fast paced skill based game where you have to free yourself from handcuffs, open a closed bag, and retrieve the nerf gun to be the first to hit the target. Join us Friday for qualifier games, and on Saturday for an official bracket tournament.



Trace Labs OSINT Search Party CTF

Contest DC Forum Page

.. Click image for larger version  Name:	TL-Logo-HackerGreen_1024.png Views:	0 Size:	37.0 KB ID:	245538

..
Trace Labs OSINT Search Party CTF
Friday: 10:00 – 18:00
Saturday: 10:00 – 17:00
DEF CON Contest Area, Forum Ballroom | Hybrid

https://www.tracelabs.org/initiatives/search-party
Twitter: @ tracelabs​
Forum users that can provide authoritative comments or answer questions: Belouve

The Trace Labs Search Party CTF is a non theoretical, gamified effort that allows for the crowdsourcing of contestants to perform a single task: Conduct open source intelligence operations to help find missing persons

You can have teams of 1-4 people, 4 person teams provide many benefits which include the coaching of more junior members. Often a great learning opportunity if you are able to pair up with OSINT veterans. Get your team together, stop by our booth for a registration code, and join us at searchparty.tracelabs.org/register .​.
..


venator aurum – A Treasure Hunt

Contest DC Forum Page

.. Click image for larger versionName:	Venator-full-cropped.pngViews:	418Size:	36.1 KBID:	245524

..
venator aurum – A Treasure Hunt
Friday 10:00 – 18:00
Saturday 10:00 – 18:00
Sunday 10:00 – 12:00
DEF CON Contest Area, Forum Ballroom​
Website: https://venatoraurum.org/

Through interfacing with reality you are defining that reality. Rethink your senses and test your limits. Solve the five layers and discover a hidden treasure. Each layer yields its own reward, but few will make it to the end of the hunt. For each of your senses, you will need to set aside preconceptions and look to the underlying patterns within the data.​


Whose Slide Is It Anyway?

Contest DC Forum Page

.. Click image for larger version  Name:	0d9a38_ca78c5327eef436696a6ad9dbf097a67~mv2.png Views:	0 Size:	622.3 KB ID:	245449

..
Whose Slide Is It Anyway?
Friday: 2200 – 2359
DEF CON Contest Area, Forum room 232, in-person

https://www.improvhacker.com/
DEF CON Discord: https://discord.com/channels/7082082…44337942822925

“Whose Slide Is It Anyway?”” is an unholy union of improv comedy, hacking and slide deck sado-masochism.

Our team of slide monkeys will create a stupid amount of short slide decks on whatever nonsense tickles our fancies. Slides are not exclusive to technology, they can and will be about anything. Contestants will take the stage and choose a random number corresponding to a specific slide deck. They will then improvise a minimum 5 minute / maximum 10 minute lightning talk, becoming instant subject matter experts on whatever topic/stream of consciousness appears on the screen.

But….why?
Whether you delight in the chaos of watching your fellow hackers squirm or would like to sacrifice yourself to the Contest Gods, it’s a night of schadenfreude for the whole family.​​