Sub-Forums
Topics
Posts
Last Post
Phish Stories
Phish Stories Phish Stories
Phish Stories is a contest that combines the art of creative writing with the strategic challenge of social engineering, inviting participants to craft phishing emails that are both convincing and hilariously entertaining.
Topics: 6 Posts: 28
6 Topics
28 Posts
Whose Slide Is It Anyway?
Whose Slide Is It Anyway? Whose Slide Is It Anyway?
Contestants will take the stage and choose a random number corresponding to a specific slide deck. They will then improvise a minimum 5 minute / maximum 10 minute lightning talk, becoming instant subject matter experts on whatever topic/stream of consciousness appears on the screen.
Topics: 2 Posts: 2
2 Topics
2 Posts
venator aurum - A Treasure Hunt
venator aurum - A Treasure Hunt venator aurum - A Treasure Hunt
Travel the seven seas to the seven wonders across time to test your skills across both old and new worlds. Every journey's end yields its own reward, but there is only one who can claim to be the first to the summit. Bring your entire tech arsenal or just a phone. Start at the broken compass and push forward into the known to seek the unknown. Wonders, plunder, and glory to those who test the waters and themselves.
Topics: 4 Posts: 4
4 Topics
4 Posts
Tinfoil Hat Contest
Tinfoil Hat Contest Tinfoil Hat Contest
Show us your skills by building a tin foil hat to shield your subversive thoughts, then test it out for effectiveness.
Topics: 3 Posts: 3
3 Topics
3 Posts
TeleChallenge
TeleChallenge TeleChallenge
The TeleChallenge is a fast-paced, fully immersive, and epic battle of wits and skill. The highest level of commitment is required, and this is one of the hardest contests in the world to win, but you don't need any special technical skills to play: just a touch-tone phone.
Topics: 4 Posts: 4
4 Topics
4 Posts
spyVspy
spyVspy spyVspy
Embark on a thrilling espionage adventure with spyVspy! This contest imagines a world of spy games where contestants employ basic hacking, cryptography, and rogue skills to solve puzzles and uncover hidden NFC tags strategically scattered throughout DEF CON.
Topics: 3 Posts: 3
3 Topics
3 Posts
number6
by number6
Social Engineering Community (SEC) Youth Challenge 2024
Social Engineering Community (SEC) Youth Challenge 2024 Social Engineering Community (SEC) Youth Challenge 2024
The Social Engineering Community’s Youth Challenge is designed to guide children under the age of 17 through a series of hands-on challenges across various DEF CON villages (but primarily within the Social Engineering Community.)
Topics: 3 Posts: 4
3 Topics
4 Posts
REALI7Y OVERRUN
REALI7Y OVERRUN REALI7Y OVERRUN
This is going to be an interactive live game that is driven by a near future storyline in which deepfakes and forgeries are so difficult to detect that bad actors and foreign governments are fully engaged in a war over people's minds.
Topics: 4 Posts: 4
4 Topics
4 Posts
Red Alert ICS
Red Alert ICS Red Alert ICS
Red Alert ICS CTF is a competition for Hackers by Hackers, organized by the RedAlert Lab of NSHC Security. The event exclusively focuses on having the participants clear a series of challenges and break through several layers of security in our OT environment and eventually take over complete control of the ICS components.
Topics: 4 Posts: 4
4 Topics
4 Posts
QOLOSSUS CTF
QOLOSSUS CTF QOLOSSUS CTF
Pit your wits against the Atom, and come and see what devilish challenges from our Quantum Quizmasters await. Come and show your quantum prowess, and mastery of superposition and entanglement - design algorithms to break cryptography, hack our simulated quantum communications, and score points in our IRL activities.
Topics: 4 Posts: 4
4 Topics
4 Posts
Radio Frequency Capture the Flag
Radio Frequency Capture the Flag Radio Frequency Capture the Flag
In this game capture the flag you will be presented with real configurations of real wireless and radio technologies to attack.
Topics: 4 Posts: 4
4 Topics
4 Posts
Pinball High Score Contest
Pinball High Score Contest Pinball High Score Contest
The inaugural Pinball High Score contest at DEF CON has a daily High Score contests, daily challenges and open qualifying for a main tournament. The daily contests will allow any attendee to play pinball games and attempt to record a qualifying high score on each of the unique games.
Topics: 4 Posts: 17
4 Topics
17 Posts
labhu419
PhreakMe presented by HackedExistence
PhreakMe presented by HackedExistence PhreakMe presented by HackedExistence
The CTF will be hosted on live VoIP lines routed through a modified asterisk PBX. This will allow participants to dial in to the CTF from a real world telephone routable phone number allowing them to hunt the PBX for flags.
Topics: 1 Posts: 1
1 Topics
1 Posts
Octopus Game
Octopus Game Octopus Game
Octopus Game is your chance to connect with fellow attendees while exploring all the fun and fascinating aspects of DEF CON. Whether you're new to DEF CON, a beginner at code-breaking, or simply seeking a stress-free contest, this is the perfect opportunity for you. Test your skills in clue reading and code-breaking as you join in on the fun!
Topics: 6 Posts: 6
6 Topics
6 Posts
c1ph0r
by c1ph0r
ICS Village CTF
ICS Village CTF ICS Village CTF
The ICS Village CTF offers hands-on experiences with industrial control systems, which bridge technology with physics. Attendees engage with industry experts while solving challenges like a red vs blue manufacturing network process coupled with OT-specific jeopardy-stye challenges.
Topics: 4 Posts: 5
Last Post:
4 Topics
5 Posts
Dan314
by Dan314
Malware Contests: MARC I and BOMBE
Malware Contests: MARC I and BOMBE Malware Contests: MARC I and BOMBE
Try to capture malware by writing your own EDR, or become the malware to bypass detection! BOMBE (Battle of Malware Bypass and EDR) is a unique match where malware and EDR systems compete against each other inside a single VM boxing ring.
Topics: 3 Posts: 8
Last Post:
3 Topics
8 Posts
oalieno
by oalieno
Lonely Hard Drive
Lonely Hard Drive Lonely Hard Drive
You have been randomly selected for additional security training. Be on the look out for one of our drives, USBs or surprise devices out here in Vegas, and follow along on @LonelyHardDrive for further clues to start hacking away at the puzzles.
Topics: 4 Posts: 4
4 Topics
4 Posts
Lonely Tag
Lonely Tag Lonely Tag
How far will you go? Or, more accurately, how far was your tag's last reported location? Pre-register your team to receive one of a dozen tags, and check out our socials (@LonelyHardDrive) to watch the tags move across the map!
Topics: 4 Posts: 4
4 Topics
4 Posts
number6
by number6
It's In That Place Where I Put That Thing That Time
It's In That Place Where I Put That Thing That Time It's In That Place Where I Put That Thing That Time
Your friend called. They had their place raided. They swear it's a setup. But now they're in jail and you're the only hope they have. Can you collect the evidence that will let them walk free? Where should you look? The evidence is everywhere, and it could be anywhere.
Topics: 3 Posts: 3
3 Topics
3 Posts
HTB CTF: Data Dystopia
HTB CTF: Data Dystopia HTB CTF: Data Dystopia
Players will have to join the mission and participate in a CTF that would be beneficial for beginners and experienced players alike. The challenge categories will be Web, Cryptography, Forensics, PWN(binary exploitation) and Reverse Engineering.
Topics: 4 Posts: 4
4 Topics
4 Posts
HardWired
Hardwired networks are often overlooked in today’s world of cellular connection and Wi-Fi, but they still play an important part in the backbone of information sharing. We believe that while cutting-edge technologies are thrilling, traditional skills-building still has its place, and we want to provide that opportunity to the DEF CON community.
Topics: 4 Posts: 4
4 Topics
4 Posts
number6
by number6
Hardware Hacking Village CTF
Hardware Hacking Village CTF Hardware Hacking Village CTF
Grab some solder and update your JTAGulator! The Hardware Hacking Village (HHV) is back with another DEF CON hardware hacking-focused Capture the Flag (CTF) competition. This is a jeopardy style CTF, designed to challenge participants in various aspects of hardware hacking.
Topics: 3 Posts: 4
3 Topics
4 Posts
HAM RADIO FOX HUNT
HAM RADIO FOX HUNT HAM RADIO FOX HUNT
This contest is simple, and is designed to teach you the basics of transmitter direction finding and “fox hunting”.
Topics: 4 Posts: 7
4 Topics
7 Posts
Hacking Boundary Terminal
Hacking Boundary Terminal Hacking Boundary Terminal
In this MarSec event we will engage convention goers with a number of different tabletop games to help them understand the operational issues surrounding offensive and defensive cyber operations in a port complex.
Topics: 3 Posts: 3
3 Topics
3 Posts
HackFortress
HackFortress HackFortress
HackFortress is a unique blend of Team Fortress 2 and a computer security contest. Teams are made up of 6 TF2 players and 4 hackers. TF2 players duke it out while hackers are busy with challenges like application security, network security, social engineering, or reverse engineering.
Topics: 11 Posts: 11
11 Topics
11 Posts
Hacker Jeopardy
Contestants will try to outwit their other teams and prove that, yes, they are in fact smarter than a CISSP. Well, sometimes anyway.
Topics: 3 Posts: 4
3 Topics
4 Posts
Hack3r Runw@y
Hack3r Runw@y Hack3r Runw@y
Get ready to strut your stuff, hackers! We're thrilled to announce the 6th annual Hack3r Runw@y returning to DEF CON 32, bigger and bolder than ever.
Topics: 2 Posts: 2
2 Topics
2 Posts
Hac-Man
Hac-Man Hac-Man
This Pac-Man themed set of challenges takes Players on a journey through learning and demonstrating hacker and information security skills to earn points.
Topics: 3 Posts: 5
3 Topics
5 Posts
I)ruid
by I)ruid
Gold Bug Challenge
Gold Bug Challenge Gold Bug Challenge
Love puzzles? Need a place to exercise your classical and modern cryptography skills? This puzzle can keep you intrigued and busy throughout DEF CON - and questioning how deep the layers of cryptography go.
Topics: 4 Posts: 4
4 Topics
4 Posts
Embedded CTF
Embedded CTF Embedded CTF
The embedded device CTF contest is an exciting opportunity to explore the intricacies of these systems and test your skills in a competitive environment. Contestants are challenged to find vulnerabilities in the firmware or hardware and exploit them to gain access or control over the device.
Topics: 4 Posts: 4
4 Topics
4 Posts
DEF CON MUD
want to hack on a custom 26 year old code base? Like to play text based games? The DEFCON MUD has you covered.
Topics: 3 Posts: 6
3 Topics
6 Posts
evilmog
by evilmog
DEF CON Scavenger Hunt
DEF CON Scavenger Hunt DEF CON Scavenger Hunt
The DEFCON Scavenger Hunt promises to challenge your skills, tickle your wits, and ignite your hacker spirit. Our list is a portal to mystery, mischief, and mayhem. Assemble your team of up to five members, interpret the items, and submit your findings at the booth to our esteemed judges. Go beyond the basics for bonus points. Legends are born here.
Topics: 4 Posts: 4
4 Topics
4 Posts
DEF CON 32 Beard and Mustache Contest
DEF CON 32 Beard and Mustache Contest DEF CON 32 Beard and Mustache Contest
The DEF CON (unofficial) Beard and Mustache Contest highlights the intersection of facial hair and hacker culture.
Topics: 2 Posts: 2
2 Topics
2 Posts
DC’s Next Top Threat Model (DCNTTM)
DC’s Next Top Threat Model (DCNTTM) DC’s Next Top Threat Model (DCNTTM)
As part of our challenge we will present contestants with the exact same design and compare the outputs they produce against a number of categories in order to identify a winner and crown DEF CON’s Next Top Threat Model(er).
Topics: 3 Posts: 3
3 Topics
3 Posts
DC Sticker Design Contest
DC Sticker Design Contest DC Sticker Design Contest
Here's your chance to be part of hacker culture, by creating something that people around the world will treasure and proudly display. Submit original artwork in the theme of the con, that you believe best exemplifies hacker culture, that will be used as printed stickers.
Topics: 1 Posts: 1
1 Topics
1 Posts
number6
by number6
DC Kubernetes Capture the Flag (CTF)
DC Kubernetes Capture the Flag (CTF) DC Kubernetes Capture the Flag (CTF)
The DEF CON Kubernetes Capture the Flag (CTF) contest features a Kubernetes-based CTF challenge, where teams and individuals can build and test their Kubernetes hacking skills.
Topics: 3 Posts: 3
3 Topics
3 Posts
Darknet-NG
Darknet-NG Darknet-NG
Darknet-NG is an Alternate Reality Game (ARG), where the players take on the Persona of an Agent who is sent on Quests to learn real skills and gain in-game points.
Topics: 4 Posts: 4
4 Topics
4 Posts
Cyber Defender - The Game
Cyber Defender - The Game Cyber Defender - The Game
As a player, you are part of a Global Cyber Protection Team (GCPT) assigned to the mission to prevent various attacks on critical infrastructure. Your task is to use the available information that your team has at your disposal to stop the adversary from achieving their objective.
Topics: 4 Posts: 4
4 Topics
4 Posts
Crash and Compile
Teams are given programming challenges and have to solve them with code. If your code fails to compile? Take a drink. Segfault? Take a drink. Did your code fail to produce the correct answer when you ran it? Take a drink.
Topics: 3 Posts: 3
3 Topics
3 Posts
CMD+CTRL at DEF CON 32
CMD+CTRL at DEF CON 32 CMD+CTRL at DEF CON 32
CMD+CTRL Web App Hacking Challenge gives you the opportunity to showcase your red team skills by attacking real web applications. The CMD+CTRL platform is a hacking game designed to teach the fundamentals of web application security.
Topics: 4 Posts: 4
4 Topics
4 Posts
Cloud Village CTF
Cloud Village CTF Cloud Village CTF
Our CTF is a two days jeopardy style contest where we have a bunch of challenges hosted across multiple Cloud providers across multiple categories of difficulty.
Topics: 3 Posts: 3
3 Topics
3 Posts
Chasse Partie Systems CTF
Chasse Partie Systems CTF Chasse Partie Systems CTF
A contest that would appeal across a broad spectrum of skill levels by integrating a variety of puzzles, both modern and traditional, to attract a wider audience from a complete beginner new to the hackerspace to the more seasoned and advanced hacker.
Topics: 4 Posts: 4
4 Topics
4 Posts
Car Hacking Village CTF
Car Hacking Village CTF Car Hacking Village CTF
The Car Hacking Village CTF is a fun interactive challenge which gives contestants first hand experience to interact with automotive technologies. We work with multiple automotive OEMs and suppliers to ensure our challenges give a real-world experience to car hacking.
Topics: 4 Posts: 4
4 Topics
4 Posts
Capture The Packet
Capture The Packet Capture The Packet
Each year we practically re-invent ourselves, bringing the latest tools & techniques along with never seen before content across 17 categories to unleash hell on the mostly-unsuspecting attendees. For ’24 we have added tons of new content, and new types of challenges never seen before.
Topics: 4 Posts: 4
4 Topics
4 Posts
Blue Team Village CTF
The Blue Team Village (BTV) CTF is a cyber defense Capture the Flag inspired by a mix of trending nation-state actor kill chains and at least one custom insider threat story. You are an incident responder tasked to investigate several incidents involving different operating systems and OT devices.
Topics: 3 Posts: 3
3 Topics
3 Posts
Biohacking CTF
Biohacking CTF Biohacking CTF
Merge the worlds of biology and cybersecurity in an adrenaline-pumping contest that tests your skills in ways you've never imagined. Thrilling and challenging cybersecurity adventure centered around a hospital setting as a scenario where participants engage in a race against time to secure or retrieve critical medical data, navigating through various cybersecurity puzzles and challenges, where participants act as guardians of critical biological data.
Topics: 1 Posts: 1
Last Post:
1 Topics
1 Posts
number6
by number6
BIC CTF
BIC CTF BIC CTF
The BIC Village Capture The Flag is a jeopardy style event designed to practice solving challenges in multiple categories. This event seeks to not only be a series of puzzles and challenges to solve, but a gamified way to learn concepts of social justice and Black history.
Topics: 3 Posts: 3
3 Topics
3 Posts
Hacker Cooling Contraption Challenge
We would like to see cancer become a thing of the past, and you can help. How? Join the Hacker Cooling Contraption Challenge
Topics: 3 Posts: 7
3 Topics
7 Posts
Betting on Your Digital Rights: 3rd Annual EFF Benefit Poker Tournament at DEF CON 32
Betting on Your Digital Rights: 3rd Annual EFF Benefit Poker Tournament at DEF CON 32 Betting on Your Digital Rights: 3rd Annual EFF Benefit Poker Tournament at DEF CON 32
We’re going all in on internet freedom. Take a break from hacking the Gibson to face off with your competition at the tables—and benefit EFF!
Topics: 3 Posts: 3
3 Topics
3 Posts
AW, MAN PAGES
How well do *you* know your man pages? Find out by teaming up with up to 3 other people (or come solo and get matched up with some new friends) and play "Aw, man...pages!".
Topics: 2 Posts: 2
2 Topics
2 Posts
AutoDriving CTF
AutoDriving CTF AutoDriving CTF
The AutoDriving CTF contest focuses on the emerging security challenges in autonomous driving systems.
Topics: 2 Posts: 2
2 Topics
2 Posts
DARPA's Artificial Intelligence Cyber Challenge (AIxCC)
DARPA's Artificial Intelligence Cyber Challenge (AIxCC) DARPA's Artificial Intelligence Cyber Challenge (AIxCC)
The AIxCC Experience at DEF CON 32 is an immersive and interactive competition environment and educational space to inspire people and organizations to accelerate the development of AI-enabled cyber defenses. Attendees will explore a futuristic city where they can learn all about the competition, the technology, and the power of AI to help secure the software we all depend on.
Topics: 4 Posts: 4
4 Topics
4 Posts
Adversary Wars CTF
Adversary Wars CTF Adversary Wars CTF
Adversary War CTF centers around mimicking enterprise infrastructure and corresponding challenges. These challenges are meant to push the participants towards adopting various TTPs that adversaries and threat actors use within a definitive time frame.
Topics: 4 Posts: 4
4 Topics
4 Posts
A Wall of Bribes
A Wall of Bribes A Wall of Bribes
This is a contest about bribery. Bribery is not only allowed, it is required as part of the contest, since it's the only way to move up the leaderboard.
Topics: 3 Posts: 3
3 Topics
3 Posts
5n4ck3y
5N4CK3Y is a vending machine hardware hacking project from AND!XOR. We retrofitted it into an IoT CTF based badge dispensing machine, bling and all. Find a flag on our web hosted CTF platform, you get a 5N4CK3Y dispense code, punch it in, and a badge is vended to you!
Topics: 4 Posts: 4
4 Topics
4 Posts
number6
by number6
? Cube
? Cube ? Cube
This year, engagement is not just a theme—it's a journey through the multidimensional realms of hacking.
Topics: 4 Posts: 4
4 Topics
4 Posts
number6
by number6
Creative Writing Short Story Contest
The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are often overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.
Topics: 4 Posts: 20
4 Topics
20 Posts
IoT Village CTF
The IoT village pi eating contest is a challenge where participants put their hardwear hacking experience to the test by going head to head with other hackers. Participants will be provided all the tooling necessary to get a root shell on an IoT device. Whoever roots the device in the shortest time wins.
Topics: 4 Posts: 8
4 Topics
8 Posts
AI Art Battle
AI Art Battle AI Art Battle
Contestants will not be creating the art themselves; instead, they will focus on designing prompts for well-known topics that push the boundaries of creativity and innovation.
Topics: 5 Posts: 5
5 Topics
5 Posts
SEC Vishing Competition
SEC Vishing Competition SEC Vishing Competition
In SECVC, teams go toe to toe by placing live vishing (voice phishing) phone calls in front of the Social Engineering Community audience at DEF CON. These calls showcase the duality of ease and complexity of the craft against the various levels of preparedness and defenses by actual companies.
Topics: 1 Posts: 1
1 Topics
1 Posts
number6
by number6
Pub Quiz at DEF CON
Pub Quiz at DEF CON Pub Quiz at DEF CON
Here at Pub Quiz, we felt the need to add additional prizes for 4th and 5th place. We had a very successful one last year and we have made some improvements to make it every better. So do you like Pub Quizzes?? If you do then get your butts to join us in participating in the 2nd Pub Quiz at DEF CON 32.
Topics: 1 Posts: 7
1 Topics
7 Posts
Live Recon
Live Recon Live Recon
Join us for an electrifying two-day Live Reconnaissance Event. Whether you're a seasoned security expert or a curious newcomer, this is your chance to test your skills in a high-octane environment.
Topics: 1 Posts: 1
Last Post:
1 Topics
1 Posts
number6
by number6
Red Team Village CTF
Red Team Village CTF Red Team Village CTF
The Red Team CTF is designed to simulate real-world challenges in which attackers are put to the test. Participants are expected to use a wide range of hacking techniques, tools, and skills to identify and exploit vulnerabilities.
Topics: 3 Posts: 3
3 Topics
3 Posts
CrackMeIfYouCan
CrackMeIfYouCan CrackMeIfYouCan
You've been contacted by journalists and whistleblowers who need help sifting through some big dumps of encrypted data and password hashes.
Topics: 1 Posts: 2
Last Post:
1 Topics
2 Posts
Grimace
by Grimace
Feet Feud (Hacker Family Feud)
Feet Feud (Hacker Family Feud) Feet Feud (Hacker Family Feud)
Two teams (Left Foot and Right Foot) captained by members of OnlyFeet and comprised of audience members go head to head, trying to figure out the top answers to the survey questions.
Topics: 1 Posts: 1
1 Topics
1 Posts
  •  
  • Time
  • Answered
  • Show
  • New Topics
Clear All
new posts
There are no conversations in this channel.
 
  • Time
  • Show
Clear All
new posts
Please log in to your account to view your subscribed posts.
  •  
  • Time
  • Answered
  • Show
  • Sort By
  • Order
Clear All
new posts
No topics found.
  • Time
Clear All
Working...