Technically Possible's site

A Beginner’s Guide To Hackathons


This is a written version of my Technical talk at BEERCON2: rise of the rookies the video of the talk can be found here


A Beginner’s Guide To Hackathons & CTFs from Beginners

Who are we?

Chloe: Student currently studying cyber security and digital forensics at university. Needs to get a life.

Jen:  A literal god

Charlie: Cyber Security & Forensics Student – Has no idea what they are doing at any given moment.

List of Events:

What’s our talk about?

What’s a ctf /hackathon

CTF
CTF (Capture The Flag) is a kind of information security competition that challenges contestants to solve a variety of tasks ranging from a scavenger hunt on wikipedia to basic programming exercises, to hacking your way into a server to steal data. In these challenges, the contestant is usually asked to find a specific piece of text that may be hidden on the server or behind a webpage. This goal is called the flag, hence the name!

Hackathon
Hackathon you try to use tech to hack into real world problem to solve them better. It’s a 24–72 hours product making competition where every team needs to develop a product from scratch during those pretty hours. A team size can vary from 2–6 depending on the organization who is organizing it.

How do they help the community ?

CSCV challenge coin (team duck bear)

Back in December 2018 Lincolnshire Police held a Hackathon called “Hack The Police”.


In attendance at the Hackathon were some members of CSCV, one of them being native to Lincoln itself. Naturally the challenges that were presented were taken with a lot of enthusiasm, however, CSCV presented a side quest – “The Coin Challenge”.

According to sources, this challenge has been farmed out to quite a few organisations (within the UK and International) and have had quite a bit of difficulty with this challenge; putting it bluntly this challenge has been in the air for over a year now and still to this day, has not been solved.

CSCV challenge coin tools and techniques

Cyber Chef

Wireshark

Kleopatra

John The Ripper

GIMP

Recon CTF (DEF CON Safe Mode)

CTF tools and techniques

Wayback machine

EXIF/Metadata

Social media

Google lens & Reverse image search

Hackathons tools and techniques

What was learnt from those events?

Time Management

Building Teams

Asking Questions

Practice for CTFs & Hackathons

Hack The Box

Immersive Labs

“Tell your family you love them… You never know when the end is nigh”

W҉h҉e҉r҉e҉ ҉T҉o҉ ҉F҉i҉n҉d҉ ҉U҉S҉

Jennifer Technically Possible
https://technicallypossible.carrd.co/
Twitter –  @Techypossible

Chloe Name aka ErrorByNight aka Clive
https://twitter.com/ErrorByNight

Twitter – @ErrorByNight

Charlie LostHawk
Twitter –  @Lottie1326

Has finally been located