There are four workshops, in order of increasing difficulty. All workshops are structured as CTFs so beginners can focus on the easy challenges, and experts can jump to challenges that are new to them. We will help participants set up for, and complete, the challenges, as necessary. Not all participants will complete all the challenges, but they should all learn something new!

All the challenges are freely available online at and will remain available after the convention ends.

Workshop 1: Violent Python

Even if you have never programmed before, you can quickly and easily learn how to make custom hacking tools in Python. We build tools that perform port scanning, brute-force attacks, crack password hashes, and XOR encryption.

What You Need

A computer with Python 2.7, which is installed by default on Mac and Linux systems, and available as a download for Windows.

Workshop 2: Exploit Development for Beginners

Particpants will hack into a series of vulnerable servers exploiting vulnerabilities including command-injection, buffer overflow, SQL injection, SAML forgery, and logic flaws.

What You Need

All you need is a computer with a Web browser, Java, and Burp, which runs on every OS. No programming experience is required.

Workshop 3: Crypto Hero

Learn essential concepts of modern cryptography, including hashing, symmetric encryption, and asymmetric encryption. Compete to solve challenges. No previous programming experience required.

What You Need

Most challenges require only a computer with Python 2.7. Some of them require a Windows machine.

Workshop 4: Practical Malware Analysis

Learn how to analyze malware, including computer viruses, Trojans, and rootkits, using disassemblers, debuggers, static and dynamic analysis, using IDA Pro, OllyDbg and other tools. Familiarity with programming in C and assembler is helpful but not necessary.

What You Need

Participants need a computer that can run VMware or VirtualBox. The virtual machine we'll use will be provided on USB sticks.
Posted: 4-20-18