Beyond Security will not only sponsor CodeBlue this year, but also try something new (for us and I believe the conference's attendees).
Eleven of the most commonly found network devices will be brought to the conference premises and attendees will try their skills at hacking them.
We looked wide and far for devices with different applications and different manufacturers, all around the $200 USD mark, so that they won't be expensive for you to buy and try out before the event. For a complete list see the SecuriTeam.com blog posting noted below.
The event will be divided into two days. On the first day 1 hour will be given to anyone that registers to the contest. On the second day, it will be a free-for-all for anyone who wants to try his or her skills. Everyone will be given simultaneous access.
Three prizes will be awarded in the first day event of $8,000, $4,000 and $2,000 USD. The prizes for the second day event will be $3,000, $2,000 and $1,000 USD. The first, second and third place prizes will be awarded to the first three people (or groups) who can successfully hack any one of the 11 devices. The complexity, depth and displayed innovation of the hacks will be used by the judges to determine first, second or third place.
The contest is open to anyone who is at the legal age to receive a contest prize in their country of origin. The contest is not open to anyone working for any of the manufacturers of the devices in the contest. We will announce all the winners (for first and second day) at the end of the second day. We plan to stop the hacking event 2-3 hours before the end of the second day - so that we can prepare. Please don't wait until the last minute!
For more information see: https://blogs.securiteam.com/index.php/archives/2626
About Beyond Security
Beyond Security's testing solutions accurately assess and manage security weaknesses in networks, web applications, industrial systems and networked software. We help businesses and governments improve and simplify their network and application security thus reducing their vulnerability to attack and data loss. Our product lines, AVDS (network and web application vulnerability management) and beSTORM (software security testing), will help you secure your network and applications, comply with your security policy requirements and exceed industry and government standards. For more information about Beyond Security see www.beyondsecurity.com or contact Brian Pearce at firstname.lastname@example.org.