Hacking Village – Target John

Did you know that Hacking Village…
Is the right place to be if your plan is to play with the latest technologies and get involved in various hacking activities. Test your knowledge and skills (in fields like pentest, forensics, Social Engineering, WebSec, Reverse Engineering and other more) in order to solve challenges & win prizes and fame.

Target John

target john Target John is a competition where participants receive several details about a real target and they have to find out information about that specific person or group. During the competition, participants will face challenges from many cyber security fields such as forensic, penetration testing, networking but in the end, they will have to spy the target gathering as much information is possible, hijacking his account without any notice, backdooring his devices, getting pictures and so on. The competition will be really fun, engaging and it will be like a breath of fresh air for all the security specialists, Information Security Enthusiasts and less technical persons.
Hacking Village is proudly supported by Beyond Security. DefCamp it’s the most important conference on Hacking & Information Security in Central Eastern Europe, bringing hands-on talks about the latest research and practices from the INFOSEC field. Since 2011 is gathering under the same roof decision makers, security specialists, entrepreneurs and developers.
The main sponsor for DefCamp 2016 is Orange Romania who is also the Internet provider of the event. DefCamp is also supported by Bitdefender as Gold Sponsor, SecureWorks, Ixia, Enevo Group, Bit Sentinel as Silver Sponsors.

    Related articles​

    Cybersecurity may come in different shapes and ..

    BY Adina Harabagiu
    Since you’re working in cybersecurity, you’re most probably doing everything in your power to keep your ..

    How community involvement shapes cybersecurity ..

    BY andra.zaharia
    In cybersecurity, many of us are self-starters and self-learners. In a field that’s so vast, so competitive,..

    Driving innovation while securing intricate ..

    BY Adina Harabagiu
    When scanning an extensive environment for vulnerabilities, there are lots of potential attack vectors hackers..