latest news

2011.08.11

DEFCON 19 CTF RESULTS POSTED

2011.08.07

DEFCON 19 CTF COMPLETE

2011.08.05

DEFCON 19 CTF START

2011.06.14

DEFCON 19 CTF QUALIFIER RESULTS POSTED

2011.06.06

DEFCON 19 CTF QUALIFIER COMPLETE

2011.06.03

DEFCON 19 CTF QUALIFIER START

2011.04.01

DEFCON 19 CTF QUALIFIER ANNOUNCED

2010.08.02

Diutinus Defense Technologies Corp. DEFCON 19 CTF Organizer is.

social networky

additional links

Diutinus Defense Technologies Corp.

Diuntinus Defense Techonologies Corp. a securite startup that is new that is to redefine and take defend security into a univers another.

Defcon 19 Capture the Flag Results

European Nopsled Team wins!!

Packets and other such things will follow as time permits.

Final Rankings:

1. European Nopsled Team
2. Routards
3. Hates Irony
4. IV
5. int3pids
6. lollersk8ers
7. Plaid Parliament of Pwning
8. PLUS@Postech
9. Shellphish
A. ACME Pharm
B. VelociROPtors
C. sutegoma2

Qualifications Results

Summary below, grab the raw results here.

The top teams listed below should have received email invitations to compete at the DefCon 19 CTF in Las Vegas beginning August 5, 2011 at 9AM.

Potentially Qualified Teams:

1. Hates Irony (CONFIRMED!)
2. sutegoma2 (CONFIRMED!)
3. lollersk8ers (CONFIRMED!)
4. IV (CONFIRMED!)
5. European Nopsled Team(CONFIRMED!)
6. Routards (CONFIRMED!)
7. Plaid Parliament of Pwning* (CONFIRMED!)
8. Shellphish (CONFIRMED!)
9. VelociROPtors (CONFIRMED!)
10. ACME Pharm** (CONFIRMED!)
11. int3pids (CONFIRMED!)
12. PLUS@Postech (CONFIRMED!)
13. GoN (CONFIRMED - alt. pending above)
14. WOWHACKER (CONFIRMED - alternate)
15. Robot Mafia (CONFIRMED! - alternate)

* pre-qualified
** returning champions(qualed as six men came to kill me one time)

Qualifications Completed

The list of qualifying teams and more news will be available soon.

Validation

This is how we know we're doing it right, the people that know how to pwn are quiet, working hard and putting score up on the board. The people who aren't, well, they have a couple things to say:

00:05 <user7a> I fucking hate you ddtek... ARGH
01:43 <user8> ddtek, please step down for next year's ctf, there's still hope for the future
01:43 <user8> that is all
04:41 <user10> Joseph LaGrange wants you to fucking die ddtek bastards
18:36 <user11> you suck at making shit we can solve
19:09 <user12> seriously creator of _INSERT_CHALLENGE_NAME_HERE_ should die
19:59 <user13> tasks are great fun, absolutely, but you guys suck at sysadmin stuff :( Sorry to say
19:59 <user14> BLACKHOLE
20:00 <ddtek> hahahah user13 you have no fucking idea.
20:00 <user13> ddtek: I guess, maybe because I work daily with highly loaded systems.
20:01 <ddtek> buhbye user13
20:01 <user13> godlike..right.
20:02 <ddtek> we'll see how long we play lol connecting through proxies with user13
20:04 -!- user13 has quit [Read error: Connection timed out]

Qualifications

Much lulz were had. Read what our victims had to say:

18:18 <user0> this is defcon ctf quals, there is no tutorial, there is no help, there is only zuul
19:07 <user1> For godsake ive spent a whole year learning non stop and still can't hack shit
21:16 <user1a> ddtek, how long did it take to put together the board?
21:16 <ddtek> about 5 minutes
21:16 <ddtek> we actually contract with kenshoto
21:17 <ddtek> they do it all
21:17 <user1a> Are you kidding?
21:17 <ddtek> no
21:17 <ddtek> they got tired of running the competition in vegas
21:18 <user1a> Who makes most of the contests? Visigoth?
21:18 <ddtek> yeah, visi is the man
21:18 <ddtek> except on thursdays
21:18 <ddtek> that's cross dressing day
21:20 <user1a> So kenshoto puts it all together but ddtek runs it?
21:24 <ddtek> yep
21:25 <user1a> Visigoth makes most of the challenges or do other people as well?
21:25 <ddtek> mostly visi, metro too
21:27 <user1a> Nice
21:30 <user1a> What does visi and metro do for a living?
21:31 <ddtek> they run this website and others related: http://is.gd/BTrKkg
21:34 <user1a> Always a bonus
21:37 <user2> I use nessus for ctf and I have 0 points!
21:53 <user3> here's a hint: work harder
21:55 <user3> it's the olympics of hacking competitions, it's not supposed to be easy
22:15 <user4> Certified Sheep Shearer is awfully close to CISSP
22:19 <user5> CISSP - Certified Interspecie-ial Sheep Shearing Professional
23:03 <user7> Vulcan, CCSP - Crisco Certified Sheep Penetration Tester
23:54 <[ddtek]vulcan> we are considering inverting the difficulty next year,
                      so almost everyone solves all the 500 pointers and very few
                      solves all the 500 pointers and very few solve the 100 pointers
23:54 <[ddtek]vulcan> that way everyone feels better about themselves
23:54 <[ddtek]vulcan> "no hacker left behind"
02:01 <user9> from the beginning I know I wasn't looking for the literal waldo
02:01 <responder_to_user9> you don't understand what to look for to fap to?
02:02 <user9> i'm really all fapped out

Tutorial Time:

This year during quals some people volunteered to tutor other participating persons.

01:15 <tutorialm4sta> pheerlesshax0r..   you wanna role-play a challenge ?
01:16 <pheerlesshax0r> sure ... gb200 ?
01:16 <tutorialm4sta> ok...
01:16 <tutorialm4sta> you putting on the wizard-hat or am i ?
01:16 <pheerlesshax0r> yur choice
01:17 <tutorialm4sta> nice...    I put on my wizard hat and robes...
01:17 <tutorialm4sta> you seen how we do tutorials in here before ?
01:18 <pheerlesshax0r> yes, haven't seen anyone get out of it happy, but ....
01:18 <tutorialm4sta> ok..  thats true..   I have never reached climax either...
01:18 <tutorialm4sta> ok GB200
01:18 <pheerlesshax0r> hahaa
01:18 <tutorialm4sta> what you done so far
01:19 <pheerlesshax0r> just telnet into it .... no answer ... nomatter what I send
01:19 <tutorialm4sta> ok...  lets role-play it...
01:19 <tutorialm4sta> ok..  I am the IT manager of a large corp...
01:20 <tutorialm4sta> you...   a Hacker trying to lay the shit down on one of my servers....
01:20 <tutorialm4sta> with me ?
01:20 <pheerlesshax0r> yep
01:20 <tutorialm4sta> ok..  so  you keep trying to fuck that sheep..  to the point that you are
                      both raw...
01:21 <pheerlesshax0r> I got the password for the sheep, but I dn't know where to put it ....
01:21 <pheerlesshax0r> :P
01:21 <tutorialm4sta> so its like having the biggest cock in the world.. 
                      and not knowing what to do with it ?
01:22 <tutorialm4sta> ok.. so you keep trying to put shit down on my servers
01:22 <tutorialm4sta> and you finally get frustrated enough
01:22 <tutorialm4sta> cuz maybe its just you are not hard enough
01:22 <pheerlesshax0r> yep, that is why I feel ...
01:22 <tutorialm4sta> so you call my helpdesk
01:22 <tutorialm4sta> RING
01:22 <tutorialm4sta> large corp IT helpdesk..  how can I help you
01:22 <pheerlesshax0r> hello, heldeskp ?
01:23 <pheerlesshax0r> Hi, I need some support ...
01:23 <tutorialm4sta> what are you trying to do ?
01:23 <pheerlesshax0r> I want to connect to your XWindows with my AD password ...
01:23 <tutorialm4sta> WAIT..  you are trying to do WHAT ?
01:24 <pheerlesshax0r> hehe, I know, it is ingenious :P
01:24 <pheerlesshax0r> hahah
01:24 <tutorialm4sta> sorry bro..  you might be thinking about another challenge..  this is GB200
01:24 <tutorialm4sta> oh..  so ur sticking with the ingenious line   ok  i like it kinky...
01:25 <tutorialm4sta> i'll play along...
01:25 <pheerlesshax0r> GB200 is on port 6000 (I lnow it is not an XWindows) .... and you give a password
01:25 <tutorialm4sta> so your AD password is trying to connect to my servers...   
                      what are you trying to get off my servers ?
01:26 <pheerlesshax0r> for now, anything back ..
01:26 <pheerlesshax0r> but whatever I send, it disconnects me ...
01:26 <tutorialm4sta> and I say..   that service is designed that way..
                      what are you trying to do with it ?
01:27 <tutorialm4sta> ahh  shit..   my wand just fell on the floor...
01:27 <pheerlesshax0r> root@x:/Work/DefCon2011/rr200# telnet pwn522.ddtek.biz 6000
01:27 <pheerlesshax0r> Trying 40.XXX.XXX.107...
01:27 <pheerlesshax0r> Connected to pwn522.ddtek.biz.
01:27 <pheerlesshax0r> Escape character is '^]'.
01:27 <pheerlesshax0r> blah
01:27 <pheerlesshax0r> Connection closed by foreign host.
01:27 <tutorialm4sta> i suggestively BEND OVER
01:27 <pheerlesshax0r> I dont see your 6000 open .. :S
01:27 <pheerlesshax0r> (not wide enough)
01:28 <tutorialm4sta> you saying my ass is not wide enough ?
01:28 <tutorialm4sta> WAHT ?   ur trying to fuck me in the ass ?    
01:28 <tutorialm4sta> ok..  that was fun..
01:29 <tutorialm4sta> here is the hint for GB200...
01:29 <tutorialm4sta> didnt reach climax though..   sometime tonight i need to have a
                      tutorial that I reach climax..
01:29 <tutorialm4sta> anyway..  the hint...
01:31 <tutorialm4sta> YOU ARE A HACKER..  TRYING TO "HACK INTO" A SERVICE I AM RUNNING... YOU
                      DONT CALL ME UP AND ASK ME.. "Hey, my busted-ass code is not exploiting your
                      server;  Can you help me figure out why I cant hack your servers?"
01:32 <tutorialm4sta> my response every time would be the same:
01:33 <tutorialm4sta> FIGURE IT OUT

Defcon CTF moves to the Rio for 2011 and HBGary is awarded contract to clean CTF sheep stalls!

FOR IMMEDIATE RELEASE

1 APRIL 2011

DEFCON CTF QUALIFIER ANNOUNCED

Defense Diutinus Technologies Corp (ddtek) is pleased to announce the round of qualification for DEFON 19 CTF.

Bigger, badder venue = bigger, badder CTF.

DDTEK <3 pwnage[1]

Get your supply of Tiger Blood Chronic handy and get your {va,man}jeen ready to be pwned...the competition for these coveted spots will be held over 53 non-stop hours 3-5 June (US time zones).

The qualification round will yet again be in the style of game board, but answers need not be in the form of a question.
Categories will require teams to demonstrate the superiority of hacking across a vast realm of security knowledge and practice, and their ability to form coherent questions.

Quit "playing" with your shake-weight on leatherchapsroulette.com long enough to visit ddtek.biz to register. Only those that pre-register for quals are permitted entry. Each individual should register, first team member to register will receive a team code to share with other mates before they register.

Registration site: https://www.ddtek.biz/reg/dc19_reg.jsp
Registration opens: 01 Apr 2011 00:00:00 UTC
Registration ends: 03 Jun 2011 00:00:00 UTC

Qualifications open: 03 Jun 2011 19:00:00 UTC
Qualifications ends: 06 Jun 2011 00:00:00 UTC Qualifications ends: 06 Jun 2011 01:00:00 UTC

In hysteretical fashion ACME Pharm will be automatically be permitted contest entry. NEW THIS YEAR! We are also pre-qualifying teams from two other worldwide CTFs! We have scientifically chosen the iCTF and Codegate contests as potentially worthy qualifiers for 2011. The winners of said competitions have reserved seats at this years show. As always, pre-qualified teams that don't participate in quals should be ashamed by their weakness and apply to be a CEH or SANS instructor / cyber security poser. Depending on how these teams fare, future winners of these contests may or may not be invited again, so you bitches better represent!

It wouldn't be fair to reduce the number of spots available to the public at large, so we're upping the number of tables in Vegas to 12 total. Yes, when the dust clears the _12_ best will be invited to join us this summer in sin city for the annual DEFCON deathmatch.

Also, DDTEK is tired of this bullshit[2] and has decided to fix it by jumping on the certification band wagon! Be sure to swing by the CTF room to attempt to obtain the GIAC-OFFENSIVE certification in person. It is _certainly_ the only cert anyone wants to be affiliated with. HR panties and manties are definitely gonna get wet over this one.

More infoz will follow via your registered email address.

Vulc@n
Difensiva Senior Engineer, GIAC-OFFENSIVE
Diuntinus Defense Technologies, plc., Co., Gmbh., Inc.

[1] obviously not as much as ddtek <3 sh33pS
[2] http://www.youtube.com/watch?v=FgWT-ba9q0E&hd=1

Sasha has too much time on her hands

Stay tuned

check back later for infoz on DefCon's Capture the LULZ, 2011, brought to you by ddtek.