Contests List


DEF CON Contests

Various contests, some lasting all 4 days of DEF CON, some short time on stage.

The Contests will be in LVCC West, Hall 4
DEF CON Contests Forum page


? Cube

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02

In-Person Contest

The Return of ? Cube

? Cube returns, weaving a tale that transcends the ordinary. This year, engagement is not just a theme—it’s a journey through the multidimensional realms of hacking. Progressive Puzzles: Unlock the secrets of each compartment as you journey through progressively harder puzzles. From the Front’s gentle introduction to the Top’s formidable challenges, the Cube invites you to engage with the spectrum of cybersecurity domains. Physical Entry Unleashed: In a bold evolution, physical entry becomes a key component. Navigate the tangible aspects of physical entry, decoding not only in the digital realm but also as you immerse yourself physically in the enigmatic sides of ? Cube. Cryptic Narratives: As each compartment unfolds, the narrative of engagement takes shape. The puzzles, touching on encryption, penetration testing, and beyond. Silent Intricacies: Engage not only with the puzzles but also with the silent intricacies woven into the physical challenges. Decrypt messages, decipher patterns, and embrace the essence of Defcon as you navigate the unseen and the tangible. Embark on the Engage Journey: ? Cube calls upon the curious and the bold. Embark on a journey where the puzzles transcend the digital divide, demanding both mental acuity and physical prowess. H4QEG5LCMUQEAICEMVTGG33OEAZTEICSMVQWI6JAORXSAZLOM5QWOZJ7

Links:
    More Info – http://0x3fcube.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249434
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249433



[CANCELED] AutoDriving CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-05-B

In-Person Contest

The AutoDriving CTF contest focuses on the emerging security challenges in autonomous driving systems. Various levels of self-driving functionalities, such as AI-powered perception, sensor fusion and route planning, are entering the product portfolio of automobile companies. From the security perspective, these AI-powered components not only contain common security problems such as memory safety bugs, but also introduce new threats such as physical adversarial attacks and sensor manipulations. Two popular examples of physical adversarial attacks are camouflage stickers that interfere with vehicle detection systems, and road graffitis that disturb lane keeping systems. The AI-powered navigation and control relies on the fusion of multiple sensor inputs, and many of the sensor inputs can be manipulated by malicious attackers. These manipulations combined with logical bugs in autonomous driving systems pose severe threats to road safety.

We design autonomous driving CTF (AutoDriving CTF) contests around the security challenges specific to these self-driving functions and components.

The goals of the AutoDriving CTF are the followings:

  • Demonstrate security implications of autonomous driving system design decisions through hands-on challenges, increase the awareness of potential risks in security professionals, and encourage them to propose defense solutions and tools to detect such risks.
  • Provide CTF challenges that allow players to learn attack and defense practices related to autonomous driving in a well-controlled, repeatable, and visible environment.
  • Build a set of vulnerable autonomous driving components that can be used for security research and defense evaluation.

The contest is based on a Jeopardy style of CTF game with a set of independent challenges. A typical contest challenge includes a backend that runs autonomous driving components in simulated or real environments, and a frontend that interacts with the players. This year’s contest will follow the style of last year and includes the following types of challenges:

  • “attack”: such as constructing adversarial patches and spoofing fake sensor inputs,
  • “forensics”: such as investigating a security incident related to autonomous driving,
  • “detection”: such as detecting spoofed sensor inputs and fake obstacles,
  • “crashme on road!”: such as creating dangerous traffic scenarios to expose logical errors in autonomous driving systems.
  • “smart planner”: such as creating intelligent path planners for dangerous tasks that are difficult for human drivers

Most of these challenges will be developed using game-engine based autonomous driving simulators, such as CARLA and SVL. The following link contains some challenge videos, summaries from AutoDriving CTF at DEF CON 29 and DEF CON 30 https://drive.google.com/drive/folders/1JSVarIaQBmseLC9XqkfrxnRQto4WM225?usp=sharing https://www.youtube.com/channel/UCPPsKbVpxwk-464KIzr8xKw

# What’s new in 2024
This year, we will unlock new traffic conflict scenarios that are observed from real-world driving logs such as Jaywalk and double parked vehicles. New difficulty levels will be added to challenges in such scenarios by integrating real downstream AI modules such as object tracking from open-source autonomous driving software like Apollo, Autoware and OpenPilot.

In order to enable the audience to experience the challenges more directly, we plan to set up a vehicle wheel controller on site and provide a driving game this year. Audiences can drive themselves to compete with the self-driving vehicle in some of the challenges. Driving game demo: https://drive.google.com/drive/folders/1LIzJJ1I3Eqj_e0_ntX5eFu82U9ObiEYB?usp=sharing

# For players
– What do players need to do to participate AutoDriving CTF? Most of the challenges do not require domain knowledge of autonomous driving software or adversarial machine learning, although knowledge of those helps. For example, the players can generate images the way they like (e.g., drawing, photoshopping) to fool the AI-components or write a short python script to control the vehicle. Some challenges, such as incident forensics likely would require players to learn domain knowledge such as sensor information format and how fusion works.

  • What do we expect players to learn through the CTF event? Players can (1) gain a deep understanding of real-world autonomous driving systems’ design, implementation, and their corresponding security properties and characteristics; and (2) learn the attack and defense practices related to autonomous driving in a well-controlled, repeatable, visible, and engaging environment.
Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249420
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249419
    Twitter (@autodrivingctf) – https://twitter.com/autodrivingctf



[Canceled] Resilience Contests

Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-D

This contest has been canceled. The contest organizers have been deployed in hurricane and wildfire relief operations.




5N4CK3Y

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-01-B

In-Person Contest

AND!XOR creates electronic badges filled with hacker challenges. We love doing this, especially coming up with unique ways for hackers to earn them. Introducing the newest member of our hacker-fam: 5N4CK3Y (Snackey). 5N4CK3Y is a vending machine hardware hacking project from AND!XOR. We retrofitted it into an IoT CTF based badge dispensing machine, bling and all. Find a flag on our web hosted CTF platform, you get a 5N4CK3Y dispense code, punch it in, and a badge is vended to you! There are a variety of challenges to earn a badge as well others to continue working on the badge itself once obtained. These span from hardware hacking, reverse engineering, OSINT, network security, and cryptography to name a few. There’s a little bit of everything, so it’s a perfect way to learn something at one of the many DEF CON villages and talking with people you meet, then attempt one of the CTF challenges to dispense a badge. Hardware hacking is our passion and we want people to learn on badges, but more importantly that there’s a lot to learn at DEF CON so our CTF will hopefully serve a desire to learn something new and meet new friends while trying to earn a badge and hack it further.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249432
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249431
    Twitter (@ANDnXOR) – https://twitter.com/ANDnXOR



A Wall of Bribes

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-F

In-Person Contest

This is a contest about bribery. Bribery is not only allowed, it is required as part of the contest, since it’s the only way to move up the leaderboard. Judges will evaluate the value of any given bribe (for example, an unusual sticker, etc.), and award points accordingly. Boring bribes will be rejected (i.e. cash). Players can expect to learn how to make a persuasive argument, and the nature of value in an (often) pay-to-win world that we live in.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249429
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249428



Adversary Wars CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-05

In-Person Contest

Adversary Village will be hosting “Adversary Wars CTF”, which is built around adversary attack simulation, offensive cyber security and purple team tactics.

Adversary War CTF centers around mimicking enterprise infrastructure and corresponding challenges. These challenges are meant to push the participants towards adopting various TTPs that adversaries and threat actors use within a definitive time frame. Adversary Wars would have real world simulation CTF scenarios and challenges, where the adversaries can simulate attacks and learn new attack vectors, cyber threat intelligence, threat actor profiles, TTPs, techniques, etc. There would be combined exercises which include different levels of adversary emulation.

As part of the Adversary Wars Capture-the-Flag competition a fictional city would be hosted virtually as a target for the participants. Like all cities, the Adversary city too would comprise of various infrastructure components including a hospital, bank, police station, fire station, army camp, city apartments, IT companies, university, government buildings, power plant, etc.

Each building will have a complex and realistic network infrastructure that includes a wide variety of components, including Windows/Linux systems, applications, industrial systems, Active directory, cloud environments, hybrid environments, and numerous other technology systems. A complex network of interconnected organizations, assumed to have been working properly, monitored by security operations center and cyber defense systems, supposed to be hackproof, until it wasn’t. One fine day, the adversary city was breached by a threat actor. A wide variety of attacks were carried out by the threat actor, in the end they decided to shut the city for good and infected the remaining systems with ransomware.

CTF participants will need to rely on cyber threat intelligence to gather more information on the threat actor, understand and collect various attack tactics, tools, and exploits used by the adversary group. The participants will have to devise possible attack paths used by the adversary group, then simulate these activities against the target city’s various components to recreate and understand how deeply the threat actor group breached the city’s infrastructure and computer systems.

To visualize the CTF environment, the contest area will feature a miniature model of the city made using interlocking-plastic-bricks. The breached components OR organization buildings will be physically marked in the city model as the CTF progresses. This will also assist visitors and observers in understanding the contest’s progress and gaining insight into what is happening behind targeted cyber-attacks, cyberwar, etc.

Links:
    More Info – https://adversaryvillage.org/adversary-wars-ctf/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249426
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249425
    Twitter (@AdversaryVillag) – https://twitter.com/AdversaryVillag



AI Art Battle

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/North Lobby/North Lobby Contests/ACK Stage

In-Person Contest

Welcome to the “AI Art Battle” Generative AI Art Contest!

This unique competition invites creative minds to dive into the world of artificial intelligence and art. The challenge is to craft the most imaginative prompts that will be used by generative AI models to create artwork.

Contestants will not be creating the art themselves; instead, they will focus on designing prompts for well-known topics that push the boundaries of creativity and innovation.

How It Works:

Select a Topic: Contestants will choose from a list of random topics.

These could range from historical events, famous literary works, mythical creatures, futuristic landscapes, to iconic pop culture references.

Craft a Prompt:

Using their creativity, contestants will write a detailed prompt designed to guide AI models in generating original artwork. The prompts should be clear, imaginative, and offer enough detail to spark the AI’s artistic capabilities.

Submission: Each contestant will submit their prompt and the intended outcome.

AI Generation: The submitted prompts will be fed into a generative AI art model, which will create corresponding artworks based on the prompts.

A random panel will determine who the winners are.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249453
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249452



Aw, man pages

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/North Lobby/North Lobby Contests/ACK Stage

In-Person Contest

How well do you know your man pages? Find out by teaming up with up to 3 other people (or come solo and get matched up with some new friends) and play “Aw, man…pages!”. Across several rounds, your knowledge of man pages will be tested to the limit. Can you remember what command line flag is being described by its help text? Can you identify a tool just from a man page snippet? Can you provide the long-form flag when only given the short? Will you prove yourself worthy to be crowned the man page champion?

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249418
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249417



Betting on Your Digital Rights: 3rd Annual EFF Benefit Poker Tournament at DEF CON 32

Contest DC Forum Page
Contest Page – Other / See Description

In-Person Contest

We’re going all in on internet freedom. Take a break from hacking the Gibson to face off with your competition at the tables—and benefit EFF! Your buy-in is paired with a donation to support EFF’s mission to protect online privacy and free expression for all. Play for glory. Play for money. Play for the future of the web. Seating is limited, so reserve your spot today.

Links:
    More Info – https://www.eff.org/poker
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249415
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249414



Beverage Chilling Contraption Contest

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-B

In-Person Contest

The Beverage Chilling Contraption Contest has been un-canceled! After a fantastic afternoon of day drinking celebrating the start of the 20th BCCC we’ve run out of beer. It’s a disaster, a catastrophe! Fortunately, we had the wherewithal to scramble a crack beverage acquisition team to the streets of Las Vegas and found more! Don’t ask where. Unfortunately, like the streets of Las Vegas, it’s HOT and kinda sticky. We need you to help us fix this and get that beer as cold as the barren wasteland that is our generation’s dreams of home ownership!

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249413
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249412



Biohacking Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-05-07

In-Person Contest

Welcome, elite hackers and cyber sleuths, to a CTF experience like no other – the “Code D.A.R.K. : Biohacking Village CTF Challenge”. Merge the worlds of biology and cybersecurity in an adrenaline-pumping contest that tests your skills in ways you’ve never imagined. Thrilling and challenging cybersecurity adventure centered around a hospital setting as a scenario where participants engage in a race against time to secure or retrieve critical medical data, navigating through various cybersecurity puzzles and challenges, where participants act as guardians of critical biological data.

Unravel Biological Mysteries: Dive into a narrative where biotechnology meets cyber-warfare. Decode genetic puzzles, breach virtual lab networks, and outsmart bioinformatics security systems. Elevate Your Hacking Game: Challenge yourself with unique biocybersecurity scenarios. This isn’t your typical CTF – it’s a fusion of biotech intrigue and hardcore hacking. Compete and Collaborate: Team up with fellow biohackers and cyber warriors. Share knowledge, strategize, and show off your skills in a community where biology and bits intersect.

Gear Up for a Cyber-Biotech Showdown
– Immersive Scenarios: Each challenge is a step into a world where safeguarding biological data is as critical as securing digital assets. – Skill Diversity: Whether you’re a veteran hacker or a biotech enthusiast, Genome Raiders offers a range of puzzles that cater to a wide array of skills and interests.

Links:
    More Info – https://www.villageb.io/capture-the-flag
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249407
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249406



Blacks in Cyber CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 3/W314-W316

Hybrid Contest

The BIC Village Capture The Flag is a jeopardy style event designed to practice solving challenges in multiple categories. This event seeks to not only be a series of puzzles and challenges to solve, but a gamified way to learn concepts of social justice and Black history. This event will highlight previous, current and up & coming Black individuals and their contributions to technology. This year we are excited to bring back our physical challenge room with a variety of interactive components for players to interface with.

This event also aims to bring to the forefront a range of technologies that we will expose to the community that operate in our day-to-day lives and examine their capabilities; contributing to the discussion of privacy, social justice and civil rights. Our event will allow the DEF CON community to fully engage in “Reading all the stories, learning all the technologies, and hacking all the things.”

Links:
    More Info – https://www.blacksincyberconf.com/ctf
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249410
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249409



Blue Team Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 3/W311-W313

In-Person Contest
See event detail for timing and location

The Blue Team Village (BTV) CTF is a cyber defense Capture the Flag inspired by a mix of trending nation-state actor kill chains and at least one custom insider threat story. You are an incident responder tasked to investigate several incidents involving different operating systems and OT devices. You will have access to SIEM and Packet captures; however, just like in real life, these tools have issues you must overcome to uncover what happened.

Expect indexes to telemetry issues, raw data not extracted properly, and missing fields. Regex may be helpful. In addition, Arkime, the network monitoring tool, will only work partially and correctly. You must find ways to make the best of the telemetry provided, and remember that you can always extract the resulting pcaps!

The CTF challenges contestants to leverage diverse cyber defense skills, including Incident Response, Forensics, and Threat Hunting. Both host and network telemetry are required to solve all the flags.

BTV’s Project Obsidian crew developed the CTF to allow anyone, regardless of skill or knowledge, to participate and sharpen their cyber defense skills. We recommend creating or joining a team if you are new to cyber defense. We highly recommend participating in the BTV’s Project Obsidian workshop sessions if you are new to cyber defense. Sessions cover many of the topics on the CTF and will help you along the way.

Links:
    More Info – https://www.blueteamvillage.org/ctf
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249405
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249404



Capture the Packet

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 2/W216-W221

In-Person Contest

This event was born out of the fires of DEF CON. Through years of analyzing network traffic for the Wall of Sheep and teaching others how to do the same, we built this system as a way to help the growing numbers in our community learn (fast). Then it quickly turned into the first defensive based CTF at DEF CON and is one of the longer running competitions at con with a twist… Each year we practically re-invent ourselves, bringing the latest tools & techniques along with never seen before content across 17 categories to unleash hell on the mostly-unsuspecting attendees. For ’24 we have added tons of new content, and new types of challenges never seen before. (muehahaha)

Links:
    More Info – https://www.capturethepacket.com
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249402
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249401
    Twitter (@capturetp) – https://twitter.com/capturetp



Car Hacking Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-01

In-Person Contest

The Car Hacking Village CTF is a fun interactive challenge which gives contestants first hand experience to interact with automotive technologies. We work with multiple automotive OEMs and suppliers to ensure our challenges give a real-world experience to car hacking. We understand hacking cars can be expensive, so please come check out our village and flex your skills in hacking automotive technologies.

With the largest collection of hackers in one area, there’s no better way to understand the security state of an industry without bringing it to security professionals to break. Over the past 10 years, the Car Hacking Village has been the focal point of interest for new hackers entering the automotive industry to learn, be a part of and actually test out automotive technologies. We plan to use this event to keep drawing attention to the automotive security industry through hands-on challenges.

Links:
    More Info – https://www.carhackingvillage.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249399
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249398
    Twitter (@CarHackVillage) – https://twitter.com/CarHackVillage



Chasse Partie Systems CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-E

Hybrid Contest

The inception of this distinctive event occurred at DEF CON 31, initiated by a fortuitous encounter with CookieT while participating in LineCon for merch. Our shared passions fostered an immediate bond, and it was amidst this camaraderie that the idea for a future challenge germinated. Having previously engaged participants with puzzle-embedded challenge coins, I (Chasse) was inspired to expand the concept beyond a mere cipher. The aim was to design a contest that would appeal across a broad spectrum of skill levels by integrating a variety of puzzles, both modern and traditional, to attract a wider audience from a complete beginner new to the hackerspace to the more seasoned and advanced hacker. Observing the collective enthusiasm as participants unraveled the first simple coin puzzle was exhilarating, yet the quick resolution of the puzzle occasionally detracted from the overall experience for more advanced puzzle solvers. Throughout DEF CON 31, CookieT and I explored the feasibility of a web-based challenge CTF, laying the foundation for what would evolve into a pioneering contest and experience. Later Raven emerged from the shadows of cyberspace to help us chisel out the contest from Zeroes and Ones

With the announcement of DEF CON 32’s theme, our concept was honed, ready to blend our creative talents into this year’s challenge. We crafted an innovative combination of a narrative-driven journey game, scavenger hunt, and web-based Capture The Flag (CTF) challenges, all meticulously aligned with the DEC CON 32 “Engage” theme. This contest emerges as a holistic platform, introducing DEF CON newcomers to core security principles through an engaging narrative. Spanning a variety of fields including OSINT, cryptography, radio, telephony, password, and web security. It promises a rich, diverse experience! Participants, automatically divided into teams, are propelled on a quest to decode puzzles and unearth flags, with challenges designed to suit everyone from novices to veterans seeking sophisticated, intricate challenges. This contest transcends the conventional competition framework, evolving into an artful endeavor that illustrates the symbiosis of storytelling and technical puzzles to create a deeply immersive learning adventure. Imagined as an interactive storybook, it invites attendees to navigate their own routes, making their own choices that lead them through a story-rich exploration of security concepts and engagement even with each other.

The technical infrastructure of this experience is built on varied technologies. The main website, https://www.chassepartie.com, is developed with Ruby on Rails 7.1 and hosted on Heroku, with CloudFlare acting as our Web Application Firewall (WAF). This site functions as the scoreboard and narrative hub of the contest. Additionally, we have set up an XCP-NG hypervisor to host approximately 10 to 15 virtual machines as targets for participant engagement. Augmented reality markers are also in place, intended for deployment in communal areas like sticker boards, to enhance the experience. These elements are interwoven with the storyline, guiding attendees through what we believe is an unprecedented adventure-style CTF challenge named Chasse Partie Systems – Dystopian Apocalypse Resistance Terminal.

So come and join us on our deviant journey, what are you waiting for?

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249396
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249395



Cloud Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 2/HW2-09-01

Hybrid Contest

If you ever wanted to break stuff on the cloud, or if you like rabbit holes that take you places you did not think you would go to, follow complicated story lines to only find you could have reached to the flag without scratching your head so much – then this CTF is for you!

Our CTF is a two days jeopardy style contest where we have a bunch of challenges hosted across multiple Cloud providers across multiple categories of difficulty.

You can register as teams or go solo, use hints or stay away from them, in the end it will be all for glory or nothing. Plus the prizes. Did we not mention the prizes? 😀

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249393
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249392
    Twitter (@cloudvillage_dc) – https://twitter.com/cloudvillage_dc



CMD+CTRL at DEF CON 32

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06-D

In-Person Contest

CMD+CTRL Web App Hacking Challenge gives you the opportunity to showcase your red team skills by attacking real web applications. The CMD+CTRL platform is a hacking game designed to teach the fundamentals of web application security. Explore vulnerable web applications, discover security flaws, and exploit those flaws to earn points and climb up the scoreboard. After attacking an application for yourself, you’ll have a better understanding of the vulnerabilities that put real world systems at risk.

At DEF CON 32: We will be replaying some of our Cyber Range Greatest Hits. We will be running 4 different Ranges with over a 150 challenges possible!

Links:
    More Info – https://defcon32.cmdnctrl.net
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249390
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249389



CrackMeIfYouCan

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-05

Online Contest

Zoogleta has been scheming to corporatize and enshittify the Internet through regulatory capture, squashing indy devs, and commodifying users.

You’ve been contacted by journalists and whistleblowers who need help sifting through some big dumps of encrypted data and password hashes.

Help them so they can publish the smoking gun, crash Zoogleta’s stock price, and get their leadership and the corrupt politicians they own arrested by exposing their internal dirt, for great justice.

Time is of the essence! You will have 48 hours to crack as many files and hashes as possible.

Open to all; preregistration is recommended. Compete in the Street class for individuals or small teams, or in Pro if you do not want to sleep all weekend. Check out past years’ contests at https://contest.korelogic.com/ , and the Password Village at https://passwordvillage.org/

Links:
    More Info – https://www.crackmeifyoucan.com
    Mastodon (@CrackMeIfYouCan@infosec.exchange) – https://infosec.exchange/@CrackMeIfYouCan
    Sub-Forum (DEF CON Forums) – https://forum.defcon.org/node/250053
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/250054



Crash and Compile

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-C

In-Person Contest

What happens when you take an ACM style programming contest, smash it head long into a drinking game, throw in a mix of our most distracting helpers, then shove the resulting chaos incarnate onto a stage? You get the contest known as Crash and Compile.

Teams are given programming challenges and have to solve them with code. If your code fails to compile? Take a drink. Segfault? Take a drink. Did your code fail to produce the correct answer when you ran it? Take a drink. We set you against the clock and the other teams. And because our “Team Distraction” think watching people simply code is boring, they have taken it upon themselves to be creative in hindering you from programming, much to the enjoyment of the audience. At the end of the night, one team will have proven their ability, and walk away with the coveted Crash and Compile trophy.

Crash and Compile is looking for the top programmers to test their skills in our contest. Do you have the problem solving and programming ability to complete our challenges? More importantly can you do so with style that sets your team ahead of the others? We encourage you to try your hand at the Crash and Compile qualifiers. Gather your team and see if you have the coding chops to secure your place as one of the top teams to move on to the main contest event.

Qualifications for Crash and Compile will take place 10:00 to 15:00. Come see us in contest area West Hall 4, or if you are excited to get started, qualifying can be completed from anywhere, as it takes place online at https://crashandcompile.org. You need a two hour block of time to complete the qualifying round. Points are awarded based on time to complete and problem difficulty.

Links:
    More Info – https://crashandcompile.org/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249388
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249387



Creative Writing Short Story Contest

Contest DC Forum Page
Contest Page – Virtual

Online Contest
Pre-con

The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums, Twitter, and reddit. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves, don their proverbial thinking cap, and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are often overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

So many hacker skills depend on your ability to tell a story. Whether it’s social engineering, intrusion, or even the dreaded customer pentest report, ALL of these require the ability to tell a story. Storytelling is one of mankind’s oldest traditions. Presenters even engage in storytelling when they get up on stage. A contest that celebrates and focuses on the ability to wind a yarn that captures and engages an audience is highly appropriate.

So why not?

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249441
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249440
    Twitter (@dcshortstory) – https://twitter.com/dcshortstory



Cyber Defender – The Game

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06-C

In-Person Contest

Various cyber tools and techniques have been utilized based on information from past attacks. Game players will learn about different cyber security frameworks, cyber-attack processes, and how they can use utilised in a fun way. The game is built to teach key cyber terms, theory and apply techniques based on real-world scenarios.

As a player, you are part of a Global Cyber Protection Team (GCPT) assigned to the mission to prevent various attacks on critical infrastructure. Your task is to use the available information that your team has at your disposal to stop the adversary from achieving their objective.

Players will find themselves in a variety of future scenarios based on a specific industry/sector focus e.g. manufacturing, utilities, defense, finance. The task will be to defend each individual network/system to govern, identify, detect, respond and recover against abnormal/suspicious activities on the network. You will be working against a global hacker network who are threatening to disrupt the overall operations of global critical infrastructure sites for their own nefarious means.

Your team must protect various networks/systems as part of a global environment. If 5 or more systems are compromised and deactivated, the hacker network successfully disabled the global environment and can assume control of the entire environment. It is your mission to protect the environment and ensure the availability of the global system.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249385
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249384



Darknet-NG

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-01-D

Hybrid Contest

Darknet-NG is an Alternate Reality Game (ARG), where the players take on the Persona of an Agent who is sent on Quests to learn real skills and gain in-game points. If this is your first time at DEF CON, this is a great place to start, because we assume no prior knowledge. Building from basic concepts, we teach agents about a range of topics from Lock-picking, to using and decoding ciphers, to Electronics 101, just to name a few, all while also helping to connect them to the larger DEF CON Community. The “Learning Quests” help the agent gather knowledge from all across the other villages at the conference, while the “Challenge Quests” help hone their skills! Sunday Morning there is a BOSS FIGHT where the Agents must use their combined skills as a community and take on that year’s final challenge! There is a whole skill tree of personal knowledge to obtain, community to connect with and memories to make! To get started, check out our site https://darknet-ng.network and join our growing Discord Community!

Links:
    More Info – https://darknet-ng.network
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249382
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249381
    Twitter (@DarknetNg) – https://twitter.com/DarknetNg



DARPA’s Artificial Intelligence Cyber Challenge (AIxCC)

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-05-06

In-Person Contest

DARPA and ARPA-H’s Artificial Intelligence Cyber Challenge (AIxCC) will bring together the foremost experts in AI and cybersecurity to safeguard the software critical to all Americans. AIxCC is a two-year competition that asks competitors to design novel AI systems to secure this critical code and will award a cumulative $29.5 million in prizes to Teams with the best systems. In 2024, top teams will be awarded prizes of $2 million each, and will advance to the finals at DEF CON 33. The AIxCC Experience at DEF CON 32 is an immersive and interactive competition environment and educational space to inspire people and organizations to accelerate the development of AI-enabled cyber defenses. Attendees will explore a futuristic city where they can learn all about the competition, the technology, and the power of AI to help secure the software we all depend on.

Registration for AIxCC is no longer open to new contestants. AIxCC Preliminary Events were held March – July 2024.

Semifinalists will be announced here: https://aicyberchallenge.com/

Links:
    More Info – https://aicyberchallenge.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249423
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249422



DC Kubernetes Capture the Flag (CTF)

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-01-E

Online Contest

The DEF CON Kubernetes Capture the Flag (CTF) contest features a Kubernetes-based CTF challenge, where teams and individuals can build and test their Kubernetes hacking skills. Each team/individual is given access to a single Kubernetes cluster that contains a set of serial challenges, winning flags and points as they progress. Later flags pose more difficulty, but count for more points.

A scoreboard tracks the teams’ current and final scores. In the event of a tie, the first team to achieve the score wins that tie.

Links:
    More Info – https://containersecurityctf.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249379
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249378



DC Sticker Design Contest

Contest DC Forum Page
Contest Page – Virtual

Online Contest
Pre-con

Ancient warriors used tattoos as a means of indicating rank in battle; it was the sort of mark that told the tales of their various conquests – their struggles and triumphs. Similarly, traversing the halls of DEF CON, one can see more modern versions manifesting as stickers – especially on laptops and other electronic equipment.

We use stickers to break the ice with strangers, as a barter currency, to tell the tales of our struggles and triumphs. After all, is a hacker really a hacker without a laptop adorned with these markings?

Here’s your chance to be part of hacker culture, by creating something that people around the world will treasure and proudly display. Submit original artwork in the theme of the con, that you believe best exemplifies hacker culture, that will be used as printed stickers.

On your marks… Make your mark.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249375
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249374



DC’s Next Top Threat Model (DCNTTM)

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-05-A

Hybrid Contest

Threat Modeling is arguably the single most important activity in an application security program and if performed early can identify a wide range of potential flaws before a single line of code has been written. While being so critically important there is no single correct way to perform Threat Modeling, many techniques, methodologies and/or tools exist.

As part of our challenge we will present contestants with the exact same design and compare the outputs they produce against a number of categories in order to identify a winner and crown DEF CON’s Next Top Threat Model(er).

Links:
    More Info – https://threatmodel.us
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249372
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249371



DEF CON 32 Beard and Mustache Contest

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/North Lobby/North Lobby Contests/ACK Stage

In-Person Contest

Held every year since DEF CON 19 in 2011 (R.I.P. Riviera), (Except during that COVID thing – but we are not going to talk about that COVID thing), the DEF CON (unofficial) Beard and Mustache Contest highlights the intersection of facial hair and hacker culture.

For 2024 there will be four categories for the competition you may only enter one: – Full beard: Self-explanatory, for the truly bearded. – Partial Beard: For those sporting Van Dykes, Goatees, Mutton Chops, and other partial beard styles. – Mustache only: Judging on the mustache only, even if bearded. Bring your Handlebars, Fu Manchus, or whatever adorns your upper lip. – Freestyle: Anything goes, including fake and creatively adorned beards. Creative women often do well in the Freestyle category.

Links:
    More Info – http://dcbeard.net/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249369
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249368
    Twitter (@DCBeardContest) – https://twitter.com/DCBeardContest



DEF CON MUD

Contest DC Forum Page
Contest Page – Virtual

Online contest
Dates TBD, approx 2 weeks prior to DEFCON, Friday: 24 hours Saturday 24 hours Sunday: 24 hours

Excited about DEFCON? want to hack on a custom 26 year old code base? Like to play text based games? The DEFCON MUD has you covered. Completely rebuilt for 2024, explore dungeons, mine, complete quests, explore, hack the game. The winner gets a human badge to DEFCON 32. This year we are running the contest virtually 2 weeks prior to DEFCON. Play an ancient form of game and see if you have what it takes. We will be leaving the game up during DEFCON for more shenanigans.

Links:
    More Info – https://mud.defcon.wtf
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249364
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249363



DEF CON Scavenger Hunt

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-02

In-Person Contest

Whether you’re a seasoned DEFCON veteran or a curious newcomer, the DEFCON Scavenger Hunt promises to challenge your skills, tickle your wits, and ignite your hacker spirit. Our list is a portal to mystery, mischief, and mayhem. Assemble your team of up to five members, interpret the items, and submit your findings at the booth to our esteemed judges. Go beyond the basics for bonus points. Legends are born here.

Casual players will enjoy doing a handful of items, but you will need to devote your entire weekend if you want to win. It’s not just about fame, glory, or boxes of swag; the true allure is the camaraderie of fellow hackers, the knowledge that you’ve etched your mark on DEFCON history, and the ultimate badge of honor: bragging rights. Nothing says “I’m a hacker” quite like being triumphant at the DEFCON Scavenger Hunt contest.

See you at the booth!

Links:
    More Info – https://www.defconscavhunt.com
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249366
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249365
    Twitter (@defconscavhunt) – https://twitter.com/defconscavhunt



Embedded CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-05-05

In-Person Contest

Embedded systems are everywhere in our daily lives, from the smart devices in our homes to the systems that control critical infrastructure. These systems exist at the intersection of hardware and software, built to accomplish a specific task. However, unlike general-purpose computers, embedded systems are typically designed for a particular case of use and have limited resources. This makes them both challenging and fascinating to work with, especially from a security perspective. Often these disciplines are dealt with individually, but understanding the custom relationships between hardware and software is vital to performing security research on these devices.

The embedded device CTF contest is an exciting opportunity to explore the intricacies of these systems and test your skills in a competitive environment. Contestants are challenged to find vulnerabilities in the firmware or hardware and exploit them to gain access or control over the device. The contest offers a unique opportunity to explore embedded devices’ inner workings and understand their design’s security implications.

New devices will be dramatically introduced at set intervals throughout the competition, and point values will decrease over time. This keeps contestants guessing and on their toes, forcing them to adapt and use their skills to tackle new challenges. It also offers a chance to learn about different types of devices and how they function, broadening participants’ knowledge and experience.

By participating in the contest, contestants can develop a deep understanding of how these systems operate and how to secure them against potential attacks. Additionally, the contest encourages participants to think outside the box and approach problems creatively, honing their problem-solving skills. The competition provides a valuable opportunity to network with like-minded individuals and a chance to learn from others in the field hands-on.

Overall, the embedded device CTF contest is an exciting and educational experience that showcases the unique challenges and rewards of working with embedded devices. With the rise of the Internet of Things and the increasing integration of technology in our daily lives, embedded devices are becoming more ubiquitous, making this contest relevant and worth checking out. Whether you’re a seasoned security professional or just starting in the field, the contest offers a chance to learn, test your skills, and have fun in a dynamic and competitive environment.

Links:
    More Info – https://www.embeddedvillage.org
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249361
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249360
    Twitter (@EmbeddedVillage) – https://twitter.com/EmbeddedVillage



Feet Feud (Hacker Family Feud)

Contest Map Page – LVCC West/Floor 1/Hall 1/Tracks 1-2

In-Person Contest

Feet Feud (Hacker Family Feud) is a Cybersecurity-themed Family Feud style game arranged by members of the OnlyFeet CTF team and hosted by Toeb3rius (aka Tib3rius). Both survey questions and their answers are crowd-sourced from the Cybersecurity community. Two teams (Left Foot and Right Foot) captained by members of OnlyFeet and comprised of audience members go head to head, trying to figure out the top answers to the survey questions.

Attendees can either watch the game or volunteer to play on one of the two teams. Audience participation is also encouraged if either of the two teams fails to get every answer of a survey question.

Ultimately Feet Feud is about having a laugh, watching people in the industry attempt to figure out what randomly surveyed people from the Cybersecurity community put as answers to a number of security / tech related questions.

Links:
    Survey – https://forms.gle/Thebx1vksze9fVsbA



Gold Bug Challenge

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-F

Hybrid Contest

Love puzzles? Need a place to exercise your classical and modern cryptography skills? This puzzle can keep you intrigued and busy throughout DEF CON – and questioning how deep the layers of cryptography go.

The Gold Bug is an annual puzzle hunt at DEF CON, focused on cryptography. You can learn about Caesar ciphers, brush up your understanding of how Enigma machines or key exchanges work, and try to crack harder modern crypto.

The Gold Bug is accessible to all, with some simpler puzzles for warmup or beginners (even kids!), and some that will require you to dig a little deeper. Whether you want to hack on puzzles solo or with a team, join us at https://goldbug.cryptovillage.org to get started!

Links:
    More Info – https://goldbug.cryptovillage.org/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249358
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249357
    Twitter (@CryptoVillage) – https://twitter.com/CryptoVillage



Hac-Man

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-01-C

Hybrid Contest
See scheduled events for timing

This Pac-Man themed set of challenges takes Players on a journey through learning and demonstrating hacker and information security skills to earn points. With multiple subject-matter specific challenge groups and tracks, this hacker challenge game has something for everyone. You, dear Player, are Hac-Man (or Ms. Hac-Man, or Hac-Person), making your way through various dark mazes eating pellets, fruit, and ghosts. Each ghost represents a hacker puzzle or skills challenge. Upon completing each challenge, you’ll be awarded points and can continue on to attempt further challenges. Many challenges have unlockable hints and location information, which you can unlock by spending your collected fruit.

There is a leaderboard! As you collect points, you’ll show up on this leaderboard. The top 10 Players at the end of the game will be awarded various prizes from a prize pool.

Links:
    More Info – https://scramble.roguesignal.io/GM_HACM24
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249355
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249354



Hack3r Runw@y

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06-BMap Page – LVCC West/Floor 1/North Lobby/North Lobby Contests/ACK Stage

In-Person Contest

Get ready to strut your stuff, hackers! We’re thrilled to announce the 6th annual Hack3r Runw@y returning to DEF CON 32, bigger and bolder than ever.

Calling all glamorous geeks, crafty coders, and fashionably functional folks: Dust off your soldering irons, grab your needles and threads, and unleash your creativity! Hack3r Runw@y challenges you to reimagine fashion through the lens of hacking.

Show us your wearable tech wonders in the following 4 categories for a chance to win in each category plus one coveted People’s Choice trophy where ANYONE can win, but there will be a twist. Did you see this year’s theme (hint).

Smart wear that wows: Integrate LEDs, microcontrollers, and sensors into your designs for dazzling functionality.

Digital design that dazzles: light it up with LEDs, bling with lights, but keep it passive.

Functional Fashion: masks and shields, hazmat suit, lockpick earrings, and cufflink shims.

Extraordinary style: Elevate your daily wardrobe with unique fabrics, passive design, 3d textures, optical illusions, cosplay, and security-inspired patterns.

No matter your skill level, Hack3r Runw@y has a place for you! Whether you’re a seasoned maker or a coding newbie, join us in celebrating the convergence of creativity, technology, and style.

Winners selected by judges selection based on:

Uniqueness
Trendy
Practical
Couture
Creativity
Relevance
Originality
Presentation
Mastery

Links:
    More Info – https://hack3rrunway.github.io/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249353
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249352



Hacker Cooling Contraption Challenge, brought to you by the TeleChallenge

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-B

Hybrid Contest

We would like to see cancer become a thing of the past, and you can help. How? Join the Hacker Cooling Contraption Challenge, brought to you by the TeleChallenge. Here’s how it works:

  1. Accept our Challenge. If you accept the Challenge, you’re also committing to nominate three people to join you.
  2. Take a video of yourself dumping a bucket of ice water over your head in combination with a Contraption of your construction to lower your temperature and raise awareness of cancer. Trust us, it’s way easier to do this during the summer in Vegas than at Halifax Analytica headquarters in the winter.
  3. Post the audio to the TeleChallenge voice BBS challenging up to three others using their phone number, or post a video to https://defcon.social or your social media of choice using the hashtag #HackerCoolingContraption and the following:
    • Your handle
    • Who challenged you
    • A statement of acceptance (“I agree that I am responsible for my own hacker cooling actions, I understand that water is wet, and I promise not to sue the TeleChallenge or DEF CON” or something to that effect)
    • The handles of 3 people you are nominating
    • A link to a nonprofit cancer research project or charity of your choice that you have chosen to support
    • A mention of your contribution (including cash, cryptocurrency, volunteer hours, or computing resources), if any

Suggested: Make a contribution of your choice to support cancer research. You may want to check nonprofit and charity quality here: https://www.charitynavigator.org/

RULES

  1. You can use up to 4 items obtained either from the TeleChallenge booth or at a dollar store costing no more than $5 plus tax, plus duct tape, along with a single one-gallon bucket or container full of conventional ice and water (solely H2O!) to build your Contraption.
  2. Only hand tools may be used.
  3. No hackers may be harmed in the execution of the Challenge. Contraption may cool to no colder than -3 degrees Celcius.
  4. You may wear no less than a bathing suit (due to dress code requirements at pools).
  5. Contraptions will be judged only for full participants of the Challenge, meaning you have made three nominations and at least two nominees have also participated.
  6. Judging criteria: Efficacy, creativity, flair, hax.
Links:
    More Info – https://www.telechallenge.org
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249290
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249289



Hacker Jeopardy

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 1/Tracks 1-2

In-Person Contest

We are back for our 30th year at DEF CON! As always, it will be a mix of questions, answers and embarrassment. Contestants will try to outwit their other teams and prove that, yes, they are in fact smarter than a CISSP. Well, sometimes anyway. As usual, this will be a double-feature, with preliminary rounds occurring Friday night and the finals on Saturday.

This year, for our big anniversary, we will also be running a special Thursday night edition of Hacker Jeopardy – Celebrity Hacker Jeopardy! We will have some well-known faces competing in a single-evening event that should bring a fun twist to kick off what will be the biggest Hacker Jeopardy event in DEF CON history!

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249351
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249350
    Twitter (@HackerJeopardy) – https://twitter.com/HackerJeopardy



HackFortress

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-A

In-Person Contest
See scheduled events for timing

HackFortress is a unique blend of Team Fortress 2 and a computer security contest. Teams are made up of 6 TF2 players and 4 hackers. TF2 players duke it out while hackers are busy with challenges like application security, network security, social engineering, or reverse engineering. As teams start scoring they can redeem points in the hack fortress store for bonuses. Bonuses range from crits for the TF2, lighting the opposing team on fire, or preventing the other teams hackers from accessing the store. HackFortress challenges range from beginner to advanced, from serious to absurd.

Links:
    More Info – http://hackfortress.net
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249348
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249347



Hacking Boundary Terminal

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06-E

In-Person Contest

In this MarSec event we will engage convention goers with a number of different tabletop games to help them understand the operational issues surrounding offensive and defensive cyber operations in a port complex. Players will become familiar with the various network components that support port and shipping operations from the underlying infrastructure to the system components at ports and commercial ships. A fictional terminal, Boundary Terminal part of the Port Elizabeth New Jersey complex, and a fictional shipping line, Worldwide Shipping Operations form the basis for all of three of our games. The games are: a short game designed to show the basic target set and linkages, a longer role-playing game where players can engage in detail with port systems, and a card driven game focused on detection, forensics, and counter-forensics. The role-playing game has been conducted as part of the MarSec portion of the ICS Village for the past two years, while the shorter version was added last year. This year we will add the counter-forensics game. All of the games are designed to be entertaining and engaging with prizes provided to the winners and best players (usually everyone gets a prize).

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249345
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249344



Ham Radio Fox Hunt

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-A

In-Person Contest

This contest is simple, and is designed to teach you the basics of transmitter direction finding and “fox hunting”. We offer multiple levels of difficulty – whether you’ve never done a fox hunt before or are a seasoned pro, you can participate in the hunt! Learning how to locate the source of radio signals is an important tool you can add to your hacker arsenal. Whether you’re hunting for a source of interference, a rogue wireless AP, or tracking down the FCC’s monitoring vans, the real-world skills you will gain from this contest will be invaluable.

To participate in the beginner IR foxhunt you will need a device that can receive IR light in the 900nm range – such as many cell phones and digital cameras!

To participate in the RF foxhunt(s) you will need a radio or a scanner that can receive signals in the 2m and/or 70cm Amateur Radio Bands (144.000 MHz – 146.000 MHz, 420.000 MHZ – 450.000 MHz).

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249342
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249341



Hardware Hacking Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 2/HW2-10-01

In-Person Contest

Grab some solder and update your JTAGulator! The Hardware Hacking Village (HHV) is back with another DEF CON hardware hacking-focused Capture the Flag (CTF) competition. This is a jeopardy style CTF, designed to challenge participants in various aspects of hardware hacking. Whether you’re new to hardware hacking or experienced and just looking for something to do while you wait for your fault injection to trigger, all are welcome and challenges range from beginner to advanced.

Links:
    More Info – https://dchhv.org/challenges/dc32
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249339
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249338



HardWired

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 2/W216-W221

In-Person Contest

This event was born out of the desire to teach an often-overlooked hardware and networking skill, and to provide the opportunity for experienced people to mentor others as they learn. DEF CON provides the perfect environment for people with no prior training to learn something useful and new. Hardwired networks are often overlooked in today’s world of cellular connection and Wi-Fi, but they still play an important part in the backbone of information sharing. We believe that while cutting-edge technologies are thrilling, traditional skills-building still has its place, and we want to provide that opportunity to the DEF CON community.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249337
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249336



HTB CTF: Data Dystopia

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06

In-Person Contest

A powerful corporation, notorious for its unethical practices, leveraged their extensive data resources gathered from users, and their psychological profiles, to subdue the population into compliance. The immune few, realizing the extent of the corporate conspiracy, band together to expose and dismantle the corporation’s grip on society. These individuals must navigate a dangerous world of surveillance and betrayal. Their mission is to ignite a global awakening and reclaim freedom from corporate domination.

Players will have to join the mission and participate in a CTF that would be beneficial for beginners and experienced players alike. The challenge categories will be Web, Cryptography, Forensics, PWN(binary exploitation) and Reverse Engineering. Various difficulty challenges from each category will be featured.

Links:
    Website – https://ctf.hackthebox.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249334
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249333
    Twitter (@hackthebox_eu) – https://twitter.com/hackthebox_eu



ICS CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-06-05

In-Person Contest

The ICS Village CTF offers hands-on experiences with industrial control systems, which bridge technology with physics. Attendees engage with industry experts while solving challenges like a red vs blue manufacturing network process coupled with OT-specific jeopardy-stye challenges. This contest highlights vulnerabilities in industrial equipment and OT protocols. By simulating attacks on critical infrastructure, participants develop and practice DEFCON-level skills, enhancing their understanding with critical infrastructure and the world we rely on.

Links:
    Website – https://www.icsvillage.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249319
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249318



IoT Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 2/HW2-08-04

In-Person Contest

The IoT village pi eating contest is a challenge where participants put their hardwear hacking experience to the test by going head to head with other hackers. Participants will be provided all the tooling necessary to get a root shell on an IoT device. Whoever roots the device in the shortest time wins.

In this brand new challenge, participants put their hardware hacking experience to the test by going head to head with other hackers. Participants will be provided all the tooling necessary to get a root shell on an IoT device. Whoever roots the device in the shortest time wins!

Links:
    More Info – https://scoreboard.iotvillage.org/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249449
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249448



It’s In That Place Where I Put That Thing That Time

Contest DC Forum Page
Contest Page – Other / See Description

In-Person Contest

Your friend called. They had their place raided. They swear it’s a setup. But now they’re in jail and you’re the only hope they have. Can you collect the evidence that will let them walk free? Where should you look? The evidence is everywhere, and it could be anywhere. You might be sitting on it. You might be standing near it. It might be stuck to something. It might be lying in plain sight. Find the disks and bring them to us. All they said to you before they hung up was “It’s in that place where I put that thing that time.” Good luck.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249331
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249330
    Twitter (@iitpwiptttt) – https://twitter.com/iitpwiptttt



Live Recon Contest

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-04

In-Person

Do you fancy doing live recon on Real Organizations? Then activate Yourself. And compete in a unique HACKER challenge.

This year we are launching a new nail biting Contest, i.e Live Recon where participants will compete with each other to perform a deep osint and recon on the target organization. Here are the details:

About the contest:

Join us for an electrifying two-day Live Reconnaissance Event. Whether you’re a seasoned security expert, a curious newcomer or a bugbounty pro, this is your chance to test your skills in a high-octane environment.

Your Mission

Get ready to perform live reconnaissance on a curated list of companies. Dig deep and unearth critical information that could be game-changing. Use your analytical prowess and sharp instincts to explore, probe, and uncover hidden data.

Why Join the Hunt?

Experience Real-World Challenges: Face off against real-world scenarios. Compete and Collaborate: Work with the best minds in the field. Learn from the Masters: Recon on a massive scale. Score Epic Prizes: Walk away with cool rewards.

Who’s Invited?

If you’ve got a passion for cybersecurity and Recon, this event is for you. Whether you’re a university student, a pro pentester, or a hobbyist eager to sharpen your skills, we want you! Teams are encouraged to register and bring a mix of talents to tackle these challenges head-on.

Get Ready to Recon!

Unleash your inner hacker and join us for a reconnaissance adventure you won’t forget!

Please note that this is an in-person event, and winners need to be at DEFCON to collect their prizes. However, once we have announced the targets, participants can play it from anywhere online (as this is Recon on public and live targets).

Links:
    More Info – https://reconvillage.org/live-recon-contest
    Sub-Forum (DEF CON Forums) – https://forum.defcon.org/node/250008
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/250009



Lonely Hard Drive

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-F

In-Person Contest

You have been randomly selected for additional security training. Be on the look out for one of our drives, USBs or surprise devices out here in Vegas, and follow along on @LonelyHardDrive for further clues to start hacking away at the puzzles. This is required for all LonelyCorp employees and Betty Pagefile is counting on you!

Links:
    Discord – https://discord.gg/68pRuKdCpW
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249325
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249324



Lonely Tag

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-F

In-Person Contest

How far will you go? Or, more accurately, how far was your tag’s last reported location? Pre-register your team to receive one of a dozen tags, and check out our socials (@LonelyHardDrive) to watch the tags move across the map!

Links:
    Discord – https://discord.gg/68pRuKdCpW
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249328
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249327
    Twitter (@LonelyHardDrive) – https://twitter.com/LonelyHardDrive



Malware Contests: MARC I & BOMBE

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-03

In-Person Contest

MARC I: Malware Analysis Report Competition I

In MARC I (Malware Analysis Report Competition I), participants collect and analyze real malware, then write an analysis report like a story, covering the entire scope of who, what, when, where, why, and how they found and analyzed the malware.

MARC I was created by Lena Yu (aka LambdaMamba) to provide malware enthusiasts with an opportunity to learn and showcase their passion and skills. Mastering malware analysis means mastering language. Essentially, we take a highly technical concept and simplify it into something that many can understand, similar to how a compiler translates high-level language into low-level language that a wide range of systems can understand.

When participants open-source and publish their work, it greatly contributes to improving the field of cyber defense. Let’s make malware analysis knowledge go viral!

BOMBE: Battle of Malware Bypass and EDR

Try to capture malware by writing your own EDR, or become the malware to bypass detection! BOMBE (Battle of Malware Bypass and EDR) is a unique match where malware and EDR systems compete against each other inside a single VM boxing ring.

Our participants can choose if they want to be malware creator or EDR developer. Malware creators aim to exfiltrate credentials and transmit them to our designated server. On the other side, EDR developers will focus on detecting the malware’s activities and report its findings. Both the malware and EDR, created by our participants, will battle each other directly inside a single VM. As they face off, they’ll earn points for wins, moving up on the leaderboard. We also encourage them to keep improving their malware or EDR systems, system logs will be released after a few rounds.

BOMBE was created by Wei-Chieh Chao (aka oalieno) and Tien-Chih Lin (aka Dange). It is not just a competition, it’s a learning platform. Participants engage with real-world scenarios, learning the circumstances between malware and EDR, a never-ending bypass and detect game. Showcase your skills! Whether you’re a wizard at weaving undetectable malware or a mastermind in sophisticated defenses, this is your stage. Demonstrate your capabilities to a global audience, including potential employers and industry leaders.

Links:
    More Info – https://digitalplaguedoctors.com/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249322
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249321
    Twitter (@DigitalPlagueDr) – https://twitter.com/DigitalPlagueDr



Octopus Game

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-06-A

In-Person Contest

Get ready to dive into the excitement of the third annual Octopus Game at DEF CON! Octopus Game is your chance to connect with fellow attendees while exploring all the fun and fascinating aspects of DEF CON. Whether you’re new to DEF CON, a beginner at code-breaking, or simply seeking a stress-free contest, this is the perfect opportunity for you. Test your skills in clue reading and code-breaking as you join in on the fun!

You and your fellow pirates will embark on an exhilarating journey, armed with clues that unveil the path to the lost treasure of a legendary pirate, now guarded by the mighty Kraken. These quests will guide you through the vibrant landscape of the Con, offering a glimpse into the myriad opportunities and experiences awaiting exploration. Designed to welcome newcomers to the hacking world, this contest fosters connections among attendees and contributors alike. Whether you choose to collaborate with a small group or brave the challenge solo, the decision is yours. Yet, amidst the excitement, remember that only one can emerge victorious. With challenges tailored for entry-level participants and a kid-friendly environment, come join us for a thrilling adventure into the depths of the Kraken’s Conundrum.

Links:
    More Info – https://www.mirolabs.info/octopus-game-dc32
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249314
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249313
    Twitter (@OctopusGameDC) – https://twitter.com/OctopusGameDC



Phish Stories

Contest DC Forum Page
Contest Page – Virtual

Online Contest

Phish Stories is a contest that combines the art of creative writing with the strategic challenge of social engineering, inviting participants to craft phishing emails that are both convincing and hilariously entertaining. It gives people at any level the chance to show off their skills in writing, social engineering, and humor to create a unique contest that allows for multiple ways to win. Writers, comedians, and Red-Teamers can all find a path to victory!

Participants are tasked with creating phishing emails targeting fictional company leaders. The goal is to produce emails that are not only convincing enough to prompt a click but also funny enough to entertain. Contestants must also provide a one-page backstory that gives the details of the approach and what happens after our unsuspecting company leader clicks on that link. Contestants receive background information on their targets to help craft their entries.

There are three winners in the contest.

The Ruler: Best overall combination of clickability and humor. The Wizard: Best technical and clickable email. The Jester: Funniest entry.

Links:
    Reddit – https://reddit.com/u/phishstories
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249237
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249107
    Twitter (@phishstories) – https://twitter.com/phishstories



PhreakMe presented by HackedExistence

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-C

Hybrid Contest

The contest will be hosted on the Publicly Switched Telephone Network and will be live for access 24/7, with real world PSTN phone numbers to dial into.

The Hacked Existence team will be hosting a telecom based CTF. The CTF will be hosted on live VoIP lines routed through a modified asterisk PBX. This will allow participants to dial in to the CTF from a real world telephone routable phone number allowing them to hunt the PBX for flags. The flags will be based around utilizing historically accurate tactics, techniques, and procedures to manipulate emulated old school switching systems.

The purpose of our contest is to bring awareness around the still existing weaknesses in our telecom infrastructure and Interactive Voice Response Systems. Ideally visitors to our contest area will participate in the CTF allowing them to get a better understanding of telecom hacking in the year 2024 as well as a respect for the art of phreaking from yesteryears.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249311
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249310
    Twitter (@HackedExistence) – https://twitter.com/HackedExistence
    Twitter (@mainframed767) – https://twitter.com/mainframed767



Pinball High Score Contest

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-01-A

In-Person Contest

The inaugural Pinball High Score contest at DEF CON will run Friday and Saturday: 10:00-18:00, Sunday 10:00-13:00 with games available for daily High Score contests, daily challenges and open qualifying for a main tournament. The daily contests will allow any attendee to play pinball games and attempt to record a qualifying high score on each of the unique games. At 18:00 on Saturday main tournament qualifying will end and the top 8 players with the highest combined scores across all eligible machines will qualify for the Sunday finals event where they could become the first DEF CON Pinball Champion!

Achieving a high score may sound simple but pinball rulesets are very complex and the skill to complete a “Wizard Mode” or achieve a high score requires research, practice, knowledge and execution. Out of the box thinking, analytical skills and pattern recognition are traits that pinball players must exhibit to be successful and some games have rule sets that can be studied and exploited to achieve a high score. Hackers are at an advantage here and while this is just a pinball contest, I expect that the community is ready for this challenge.

Stern Pinball has prepared an exclusive DEF CON 32 digital badge that will be available for any attendee to earn for playing in this event. Additional DEF CON specific Insider Connect badges may be unlocked during game play.

Pinball developers have a long history of including Easter Eggs/COWS in games. Easter eggs “may” also be available for attendees to discover during the conference. Undocumented Easter eggs found by players during the event will be documented, verified and recognized.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249308
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249307



Pub Quiz

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/North Lobby/North Lobby Contests/ACK Stage

In-Person Contest

We are back with another Pub Quiz at DEF CON. Here at Pub Quiz, we felt the need to add additional prizes for 4th and 5th place. We had a very successful one last year and we have made some improvements to make it every better. So do you like Pub Quizzes?? If you do then get your butts to join us in participating in the 2nd Pub Quiz at DEF CON 32.

Quiz will consist of 7 rounds question will include 90’s/2000’s TV and Movies, DefCon trivia, music, anime, and a little sex. The theme for our Pub Quiz will be all things that make DEF CON attendees exceptional. There will be a little something for everyone. The quiz will consist of visual and audio rounds along with some Con questions; we need to make sure we stimulate you peeps. We encourage people to get into teams of 5 or 6.

This is a social event, so we try to get people into Teams. You never know you may meet the love of your life. Did I mention CASH! Yes we will have cold hard cash prizes for the 1st, 2nd, 3rd, 4th, and 5th high scoring groups. As always if we do have ties will be break those ties with a good old fashion dance off from a person of the tied teams. The hosts and a few goons will help in judging.

Links:
    Sub-Forum (DEF CON Forums) – https://forum.defcon.org/node/249844



QOLOSSUS

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-06-01

Hybrid Contest

There’s a new emerging tech in town, and it’s name is Quantum! Following the past two years of Quantum CTF events held at the Quantum Village, we are pleased, proud, and excited to announce that our Q-CTF is indeed returning as Codename; QOLOSSUS! Pit your wits against the Atom, and come and see what devilish challenges from our Quantum Quizmasters await. Come and show your quantum prowess, and mastery of superposition and entanglement – design algorithms to break cryptography, hack our simulated quantum communications, and score points in our IRL activities. |Good Luck!〉

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249316
    Website – https://quantumvillage.org/
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249303



Radio Frequency Capture the Flag

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 3/HW3-05-03

Hybrid Contest

In this game capture the flag you will be presented with real configurations of real wireless and radio technologies to attack. Practice your skill and learn new ones from Radio Frequency IDentification (RFID) through Software Defined Radio (SDR) and up to Bluetooth and WiFi. There may even be Infrared, if you have the eye for it.

RF Hackers Sanctuary is once again holding the Radio Frequency Capture the Flag (RFCTF) at DEF CON 32. RFHS runs this game to teach security concepts and to give people a safe and legal way to practice attacks against new and old wireless technologies.

We cater to both those who are new to radio communications as well as to those who have been playing for a long time. We are looking for inexperienced players on up to the SIGINT secret squirrels to play our games. The RFCTF can be played with a little knowledge, a pen tester’s determination, and $0 to $$$$$ worth of special equipment. Our virtual RFCTF can be played completely remotely without needing any specialized equipment at all, just using your web browser! The key is to read the clues, determine the goal of each challenge, and have fun learning.

This game doesn’t let you sit still either, as there are numerous fox hunts, testing your skill in tracking various signals. If running around the conference looking for WiFi, Bluetooth, or even a Tire Pressure Monitoring System (TPMS) device sounds like fun, we are your source of a higher step count.

There will be clues everywhere, and we will provide periodic updates via discord and twitter. Make sure you pay attention to what’s happening at the RFCTF desk, #rfctf on our discord, on Twitter @rf_ctf, @rfhackers, and the interwebz, etc. If you have a question – ASK! We may or may not answer, at our discretion.

Links:
    More Info – https://rfhackers.com
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249305
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249304
    Twitter (@rf_ctf) – https://twitter.com/rf_ctf
    Twitter (@rfhackers) – https://twitter.com/rfhackers



REALI7Y OVERRUN

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-E

Hybrid Contest

This is going to be an interactive live game that is driven by a near future storyline in which deepfakes and forgeries are so difficult to detect that bad actors and foreign governments are fully engaged in a war over people’s minds. At the same time, the world is sitting on the brink of the so-called “singularity,” as AI advancements have completely blurred the line between artificial and natural cognition, and the Turing test has been rendered decisively moot.

Teams will join the game and follow the storyline to clues that will give them hints about who they can trust and who they can’t. The clues will follow the pattern of deepfakes and forgeries, asking players to figure out what’s real and what’s not, focusing on hacker and defcon focus areas such as authentication, trust, social engineering, hardware and software manipulation and more. They will be given a rich story that will lead them to research the underlying issues in trust and anonymous trust systems. They will also encounter challenges and tutorials on video and image validation and cryptographically safe messaging.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249299
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249298



Red Alert ICS CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-03-07

In-Person Contest

Red Alert ICS CTF is a competition for Hackers by Hackers, organized by the RedAlert Lab of NSHC Security. The event exclusively focuses on having the participants clear a series of challenges and break through several layers of security in our OT environment and eventually take over complete control of the ICS components.

Red Alert ICS CTF is back with a ton of fun challenges after successfully running the CTF since DEF CON 26. Red Alert ICS CTF is proud to be among the Black Badge contests at DEF CON 31 and DEF CON 26.

The contest would house real world ICS (Industrial Control System) equipment from various vendors on showcasing different sectors of critical infrastructure. The participants would be able to view and engage with the devices in real time and understand how each of them control each of the aspects of the testbed and leverage this to compromise the devices.

Red Alert ICS CTF at DEF CON 32 would also be offering players the unique opportunity to compromise the latest cyber ranges on Maritime Cyber Security.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249301
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249300
    Twitter (@icsctf) – https://twitter.com/icsctf



Red Team Village CTF

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-05-C

In-Person Contest

The Red Team Capture the Flag (CTF) competition is back at DEFCON! It is a challenging and exciting event that tests the skills of participants in offensive security.

The Red Team CTF is designed to simulate real-world challenges in which attackers are put to the test. Participants are expected to use a wide range of hacking techniques, tools, and skills to identify and exploit vulnerabilities.

Teams are typically composed of experienced hackers, penetration testers, and security researchers who have a deep understanding of the latest cybersecurity threats and attack techniques. They must work together to uncover and exploit vulnerabilities and solve challenges.

The Red Team CTF at DEFCON is considered one of the most challenging and prestigious CTF competitions in the world, with participants coming from all over the globe to compete. It is a high-pressure, high-stakes event that tests the limits of participants’ technical and strategic abilities, and offers a unique opportunity to showcase their skills and knowledge in front of a global audience of Hackers.

Links:
    Sub-Forum (DEF CON Forums) – https://forum.defcon.org/node/250035



SEC Vishing Competition

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 3/W317-W319

In-Person Contest

In this competition (#SECVC), teams go toe to toe by placing live vishing (voice phishing) phone calls in front of the Social Engineering Community audience at DEF CON. These calls showcase the duality of ease and complexity of the craft against the various levels of preparedness and defenses by actual companies. Teams can consist of 1-3 individuals, which we hope allows for teams to utilize novel techniques to implement different Social Engineering tactics. Each team has limited time to place as many calls as possible from a soundproof booth. During that time, their goal is to elicit from the receiver as many objectives as possible. Whether you’re an attacker, defender, business executive, or brand new to this community, you can learn by witnessing firsthand how easy it is for some competitors to schmooze their way to their goals and how well prepared some companies are to shut down those competitors!

This competition takes place only on Friday in the Social Engineering Community village, be sure to get there early to get a seat; they fill up fast! Additionally, at the end of Friday, join Snow and JC as they cover the behind the scenes of creating the SECVC, this year’s lessons learned, team highlights, and tips for future competitors!

Judges: Ibetika, John Hammond, Snow
Coaches: Jason, JC, Jennifer

Links:
    Sub-Forum (DEF CON Forums) – https://forum.defcon.org/node/249473
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249474



Social Engineering Community (SEC) Youth Challenge

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 3/W317-W319

In-Person Contest

The Social Engineering Community needs your help and it’s not exactly a big deal, but without your help, the entire universe is going to implode. Fortunately, some creative beings designed a failsafe just for this specific purpose, the Def Con Social Engineering Youth Challenge at DEF CON 32! Remember, DON’T PANIC!

The implosion failsafe requires anyone under the age of 18 to complete some very specific problem-solving challenges that have been carefully designed for humans only (we don’t know why these challenges were designed only for humans, but it’s reasonable to assume this is another instance of dolphins playing a prank). Some examples of challenges are decoding alien messages, hacking intergalactic systems, and understanding the meaning of life. As you complete these challenges, the universe will be one step further from complete and utter obliteration.

As part of this protocol, you can expect the opportunity to learn valuable skills in cryptography, social engineering, network security, defusing intergalactic implosion bombs, and more. You’ll need to keep your eyes on the sky and adapt to overcome serious obstacles designed by what we believe to be the least serious beings in the universe.

Will you be able to stop the universe from imploding into what we’re assuming is probably another universe but much smaller? We hope so! Otherwise, even the dolphins will have to find a new home.

Links:
    More Info – https://www.se.community/youth-challenge/
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249296
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249295



spyVspy

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-02-02-G

In-Person Contest

Embark on a thrilling espionage adventure with spyVspy! This contest imagines a world of spy games where contestants employ basic hacking, cryptography, and rogue skills to solve puzzles and uncover hidden caches strategically scattered throughout DEF CON (and beyond).

Contestants will engage in a real-world treasure hunt, where the locations of hidden caches are revealed by solving the types of puzzles you’d expect to see at DEF CON. Traditional ciphers, lockpicking, OSINT, and very basic hacking/pentesting skills may be required.

spyVspy is intended for players of all skill levels. Whether you’re a seasoned double-agent or just learning to be a covert operative, you will be able to compete and have fun in this event. Whatever skills you think you’re missing can probably be learned on-the-job anyway.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249293
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249292
    More Info – https://www.fottr.io



Tinfoil Hat Contest

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 4/HW4-01-04-D

In-Person Contest

Want to protect your noggin from Taylor Swift’s PsyOps plot for global domination? Have you angered our new AI Overlords, and now need to hide? Or do those alien mind control rays just have you feeling down lately? Fear not, for we here at the Tin Foil Hat Contest have your back for all of these! Come find us in the contest area, and we’ll have you build a tin foil hat which is guaranteed to provide top quality protection for your cerebellum . How you ask? SCIENCE!

Show us your skills by building a tin foil hat to shield your subversive thoughts, then test it out for effectiveness.

There are 2 categories: stock and unlimited. The hat in each category that causes the most signal attenuation will receive the “Substance” award for that category. We all know that hacker culture is all about looking good though, so a single winner will be selected for “Style”. We provide all contestants a meter of foil, but you’re welcome to acquire and use as much as you want from other sources.

Links:
    More Info – http://www.psychoholics.org/tfh
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249287
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249286
    Twitter (@DC_Tin_Foil_Hat) – https://twitter.com/DC_Tin_Foil_Hat



venator aurum – A Treasure Hunt

Contest DC Forum Page
Contest Page – Other / See Description

In-Person Contest

Travel the seven seas to the seven wonders across time to test your skills across both old and new worlds. Every journey’s end yields its own reward, but there is only one who can claim to be the first to the summit. Bring your entire tech arsenal or just a phone. Start at the broken compass and push forward into the known to seek the unknown. Wonders, plunder, and glory to those who test the waters and themselves.

Links:
    More Info – https://venatoraurum.org
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249283
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249282



Whose Slide Is It Anyway?

Contest DC Forum Page
Contest Map Page – LVCC West/Floor 1/Hall 1/Tracks 1-2

In-Person Contest

If someone had told us this silly contest would be in its 8th year there’s no way we would have believed it. Even when we thought “hey, the gag is getting old, maybe it’s time to hang it up” that turned out to be the year we’d gotten the most accolades from con goers during and after the contest. That was enough to recharge us and decide we’ll do this until DC no longer exists. Proud isn’t a grand enough word to describe how we feel to still be here and still making people laugh/feel better about themselves not being as stupid as us.

But to answer Why Us? WSIIA has always been about community. Whether you killed your deck or went down in a spectacular blaze of flames, this game is nothing without the people who play it and the audience who watches it. And if we’re not doing it for the community, why the fuck are we even here? We’ll remain here as long as you’ll have us, riding on a wing, a prayer, and airplane bottles of Malort all the way to Year 10. Now on to the boilerplate pitch:

We’re an unholy union of improv comedy, hacking and slide deck sado-masochism.

Our team of slide monkeys will create a stupid amount of short slide decks on whatever nonsense tickles our fancies. Slides are not exclusive to technology, they can and will be about anything. Contestants will take the stage and choose a random number corresponding to a specific slide deck. They will then improvise a minimum 5 minute / maximum 10 minute lightning talk, becoming instant subject matter experts on whatever topic/stream of consciousness appears on the screen.

Whether you delight in the chaos of watching your fellow hackers squirm or would like to sacrifice yourself to the Contest Gods, it’s a night of schadenfreude for the whole family.

Links:
    Discuss (DEF CON Forums) – https://forum.defcon.org/node/249280
    Sub-forum (DEF CON Forums) – https://forum.defcon.org/node/249279
    Twitter (@WhoseSlide) – https://twitter.com/WhoseSlide