Critical Infrastructure Attack

At Critical Infrastructure Attack challenge you will have the chance of  a full hacking experience against Industrial Electronic Devices, meant to delight both young endeavors and more experienced hackers.

Be sure to pre-register for the Critical Infrastructure Attack to reserve your spot and make the most of it! Just use the Registration button to your right and fill in the details.

Goal of the Competition

Our challenge is designed around 3 tracks that interconnect:

1. Railway Diorama
– Process zone comprised of an HMI residing on a dedicated PC;

– Control zone comprised of 2 PLCs:

o one for Digital Signal Processing;

o one for reading the process state and performing actual commands;

2. Substation Mock-up – powers the entire railway diorama. A PLC controls a single line diagram and a HMI simulates local operations;

3. Auxiliary services – 4 more PLCs from different vendors that are used in other control processes;

The goal of the challenge it to disrupt all industrial processes by targeting ICS specific protocols and devices;

Rules of Engagement

/ The goal of the challenge it to disrupt all industrial processes by targeting ICS specific protocols and devices;

/ Teams of max 3 members;

/ Denial of Service is not allowed;

/ Report discovered vulnerabilities to a Referee;

/ Points will be given based on the vulnerabilities you manage to exploit;

/ Extra points will be given for attacks on ICS specific protocols and devices;

/ You will need to find a way into the infrastructure;

/ Use tools and scripts of your liking;

/ Any dispute will be resolved on-site by the referee, who has final decision;

/ Disrespecting any of these rules as well as any offensive action taken against any other participants will result in immediate disqualification;

PRIZES

/ Wifi Pineapple Nano
/ Yard Stick One’ USB Transceiver & 915MHz antenna

SPONSORED BY
HACKING VILLAGE

Other Competitions

Lock Picking Village

Break a combination lock of beginner/average difficulty and get a lock picking set.

Defend the Castle

You know them by name: Ghost, Heartbleed, ShellShock, ImageTragick, StageFright. Vulnerabilities so big that ..

Brainpick CTF

In a world where Black Mirror and 1948 are becoming reality, profiling a given person is only a matter of ..
0
SPEAKERS
0
COUNTRIES
0
ATTENDEES
0
HACKING
COMPETITIONS
0
COMPANIES

Sponsors & Partners

They help us make this conference possible.

POWERED BY

Orange „brings you closer to what matters to you”.

This is our brand promise: to bring our clients closer to what’s essential to them and to keep them always connected and in touch with the latest technologies, by offering them the best and safest communication experience.

WWW.ORANGE.RO

PLATINUM PARTNERS

Ixia provides testing, visibility, security solutions, network testing tools and virtual network security solutions to strengthen applications across physical and virtual networks.

WWW.IXIACOM.COM

Secureworks provides threat intelligence-driven security solutions for organizations to prevent, detect, rapidly respond and predict cyberattacks.

WWW.SECUREWORKS.COM

GOLD PARTNERS
SILVER PARTNERS
GAMING PARTNER
VIP & SPEAKERS LOUNGE PARTNER
BRONZE PARTNERS
COMMUNITY & MEDIA PARTNERS