BEGIN:VCALENDAR
PRODID:-//vBulletin 6//EN
VERSION:2.0
CALSCALE:GREGORIAN
BEGIN:VEVENT
UID:02219363-0438-4fa9-adb9-fc21d3d17b0b
DTSTAMP:20260429T234210Z
SUMMARY:Adversary Wars CTF\, Saturday 10:00-17:00
DESCRIPTION:.. [/URL]\n \n\n\n..\n\nAdversary Wars CTF\n\nIn-person contest
 \nFriday: 10:00 - 17:00 Saturday: 10:00 - 17:00 Sunday: 10:00 - 12:00\n\nA
 dversary Village will be hosting "Adversary Wars CTF"\, which is built aro
 und adversary attack simulation\, offensive cyber security and purple team
  tactics.\n\nAdversary War CTF centers around mimicking enterprise infrast
 ructure and corresponding challenges. These challenges are meant to push t
 he participants towards adopting various TTPs that adversaries and threat 
 actors use within a definitive time frame. Adversary Wars would have real 
 world simulation CTF scenarios and challenges\, where the adversaries can 
 simulate attacks and learn new attack vectors\, cyber threat intelligence\
 , threat actor profiles\, TTPs\, techniques\, etc. There would be combined
  exercises which include different levels of adversary emulation.\n\nAs pa
 rt of the Adversary Wars Capture-the-Flag competition a fictional city wou
 ld be hosted virtually as a target for the participants. Like all cities\,
  the Adversary city too would comprise of various infrastructure component
 s including a hospital\, bank\, police station\, fire station\, army camp\
 , city apartments\, IT companies\, university\, government buildings\, pow
 er plant\, etc.\n\nEach building will have a complex and realistic network
  infrastructure that includes a wide variety of components\, including Win
 dows/Linux systems\, applications\, industrial systems\, Active directory\
 , cloud environments\, hybrid environments\, and numerous other technology
  systems. A complex network of interconnected organizations\, assumed to h
 ave been working properly\, monitored by security operations center and cy
 ber defense systems\, supposed to be hackproof\, until it wasn’t. One fi
 ne day\, the adversary city was breached by a threat actor. A wide variety
  of attacks were carried out by the threat actor\, in the end they decided
  to shut the city for good and infected the remaining systems with ransomw
 are.\n\nCTF participants will need to rely on cyber threat intelligence to
  gather more information on the threat actor\, understand and collect vari
 ous attack tactics\, tools\, and exploits used by the adversary group. The
  participants will have to devise possible attack paths used by the advers
 ary group\, then simulate these activities against the target city's vario
 us components to recreate and understand how deeply the threat actor group
  breached the city's infrastructure and computer systems.\n\nTo visualize 
 the CTF environment\, the contest area will feature a miniature model of t
 he city made using interlocking-plastic-bricks. The breached components OR
  organization buildings will be physically marked in the city model as the
  CTF progresses. This will also assist visitors and observers in understan
 ding the contest's progress and gaining insight into what is happening beh
 ind targeted cyber-attacks\, cyberwar\, etc.\n\nMore Info: [URL="https://a
 dversaryvillage.org/adversary-wars-ctf/"]https://adversaryvillage.org/adve
 rsary-wars-ctf/ (filedata/fetch?id=249427&d=1718451522)\nTwitter: @Adversa
 ryVillag/ (https://twitter.com/AdversaryVillag/)
URL:https://forum.defcon.org/node/249894
DTSTART:20240810T180000Z
DTEND:20240811T010001Z
END:VEVENT
END:VCALENDAR
