1/1/2024 0 Comments Defcon schedule 2019People and organizations to which we owe thanks are listed here.Announcement comes as event producers iron out the logistics of streaming DEF CON 28 around the world Please come equipped to display video over HDMI (i.e., bring a monitor with HDMI input and an HDMI cable). We plan to provide internet access over this same link, however, this depends somewhat on the hotel's cooperation, so please be prepared for the contingency where we don't have internet, have filtered internet, or the world suddenly switches to FreeBSD and ipv6. You will access the game over the ethernet cable using good old-fashioned ipv4. We will run one power cable and one ethernet cable for each team. We will provide the compute to host services. Where the rest of your team hacks from is up to you. This is a hard limit, and if you violate it, we will disqualify you. You may not have more than eight people at the table. If all goes well, you will have four tables, arranged in a square, with eight chairs inside them. Eight people per team can get in to set up starting from 9am. The game will start at 10am on Friday morning. Organizational info (badge pickup, etc.) will be sent out shortly. We hope you are excited, because DEF CON is one week away! Here is some information to help you finalize your infrastructure setup. While we can't tell you exactly what the future will bring, and you may not need everything listed on your journey, it's better to come prepared, and you may need more of these tools than you think! may have a solution for youĪny GNU/Linux distribution with proper toolchain + Android SDK If you don't have a physical Mac in your hands, don’t fret. If you don’t have a proper install, can probably work in a pinch It is _/highly/_ suggested to take all of the following with you. In order to prepare yourself for a view of the future of bug-free computing, there are a few tools you'll need to bring from the past. In the future, there are no vulnerabilities in _/any/_ platform, not **just** GNU/Linux. The three types of points are normalized (compared to the top performer in each category) to account for 40%, 40%, and 20% of the total points of a team, respectively. The Order encourages you to consider hacking harder. Teams tied for second will get 6, teams tied for third will get 3, teams tied for fourth will get 2, and teams tied for fifth will get 1. King of the Hill points depend on the quality of your solution.Įach tick, all teams tied for first place will get 10 points. Note that there is no “SLA” or “uptime” here.ĭefense points accumulate by 1 for each of your services that is unexploited in a tick where successful exploits are launched.Īttack points accumulate by 1 for each flag that you retrieve, except for your own. Score takes into account three factors: attack points (earned by stealing flags from other teams’ Attack/Defense services) will account for 40%, defense points (earned by resisting attacks against YOUR Attack/Defense services) will account for 40%, and KoH points (earned by top solutions of King of the Hill challenges) will account for 20%. Inactive service might still be accessible for interested parties, but they will no longer be scored and no flags from them will be accepted. Once they are exploited, they become yellow.Īfter significant exploitation of the service has occurred by several teams, or the service reaches a steady state, the service becomes orange and network traffic for the service will be released.Ī service will become red when it has been played out.Īfter this, the Order may retire the service at any time. They begin their life as green, unexploited services. Services will go through a simple lifecycle, which is shown on the scoreboard. To attempt a King of the Hill, connect to 10.13.37.Y, where Y is YOUR team ID. To attack a team’s Attack/Defense service, connect to 10.13.37.X, where X is the victim team ID. King of the Hill is different: you compete against other teams for the best solution, which depends on the service in question. The former format is familiar: you exploit other teams’ services to steal their flags, and protect your own. The Order has continued from prior tradition, but uses two types of services: Attack/Defense and King of the Hill. We appreciate comments to and You’re awesome, hack on! Services We strive to be fully transparent and welcome recalculations. Pcaps will be available from DEF CON’s website in a few days.Īll event data is being released, and most of it was available (with a delay) to players during the first two game days. JSON with all recorded exploitation events and scores: final_tick.jsonĭump of the database with all events, announcements, and game data (~1.7 GB): dc2019_finals_db.sql.xz Scoreboard with attack/defense/KoH components / CTFtime
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |