$ getent passwd bbuckwalter . ├─── name: Brenna Buckwalter ├──── org: Polarity └─ social: ├─ linkedin: linkedin └── twitter: @PolarityIO
The competition is a series of short head-to-head sprints rather than a marathon. Fastest correct answer submission for each sprint wins. Simple questions will test how fast you can triage micro datasets. For example, you might need to pick out the three vulnerabilities that are remotely exploitable from a list of 10 CVEs, find the benign IP in a list of known C&C servers, or decode the powershell payload from a base64 string. Each challenge lasts seconds or minutes and when all else fails, can usually be solved with some web searching. The grand prize samurai sword trophy goes to the competitor who answered all sprints correctly in the shortest amount of time.
All skill levels are welcome, your StarCraft micro or ShmooCon ticket purchasing skills will help, but you may also want to bring some of your favorite free security tools such as Google Search, CyberChef, and Polarity Community Edition. Scripting/programming/machine learning skills will not be necessary but we won’t stop you if you want to use them.