DefCon CTF

Viewing 5 reply threads
  • Author
    Posts
    • #4419
      timmedin
      Participant

      I haven’t been to DefCon before and obviously haven’t participated in the CTF. How does their CTF work? From what I have been reading is that the teams have to attack custom services, right? Are they given the source code as well?

    • #27828
      timmedin
      Participant

      I just found a YouTube clip with some explanation.

      Anyone have any other info?

    • #27829
      apollo
      Participant

      Check out:
      http://nopsr.us/

      I haven’t competed in the finals at DefCon, I did the qualifiers this year with some folks from Midnight Research Labs.  I gotta say, win, loose, or draw it was a lot of fun.  I hope to do the qualifiers again this year.  I have been working on my RE/Exploit skillz, but I’m not sure I know I have ways to go. 

    • #27830
      neptune
      Participant

      might as well get it straight from the horse mouth!

      http://www.ddtek.biz/

      more data than most people want, and links to past organizers.

      The thing about CTF is that it could be different every time!

    • #27831
      timmedin
      Participant

      @neptune wrote:

      might as well get it straight from the horse mouth!

      http://www.ddtek.biz/

      more data than most people want, and links to past organizers.

      The thing about CTF is that it could be different every time!

      This site appears to be down.

    • #27832
      UNIX
      Participant

      Should work again. 😉

Viewing 5 reply threads
  • You must be logged in to reply to this topic.

Copyright ©2021 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?