 This is the CDF price distribution ceremony. So this was the second year we were hosting the CDF. It went quite successful again. But I know we had some technical glitches along the way. And we would like to sincerely apologize for them. We tried our best. But it was something that was happening with the providers that we were using. But yes, so OK, so some statistics. OK, so first of all, I'll go off what the CDF was about. The CDF was a jeopardy-based OSINT and reconnaissance CDF. We had, in total, about 12 challenges, all based on open source intelligence and reconnaissance, as well as some challenges required server exploitation, exfiltration, so that to capture the flags and some involved just searches on the internet, finding information, finding clues. Just a second, sorry. OK, so let's fuck you there. OK, so in all, we had these 12 challenges. And across the CDF ran for 48 hours. And we had a total of 124 teams registering. And out of which, 34 teams actually scored. So pretty good turnout compared to last year again. And then, so we had pretty interesting challenges this year. Some involved chatbot, some involved just server exploitation, web apps, two-factor authentication, things like that. And this is what the final game board looks like. So I'll just scroll it again. So now we will be awarding the first three teams. And I'd like to call up the first team. That's team DevZero, 3,000 points. And they are proud owners of PlayStation 4, one multi-go license, one Hunchly license, and a HAC5 gadget, a land turtle. Members, thank you. We would like the members to share their experiences of the CDF. What are you guys? So it was kind of a fun CDF. In the end, we couldn't solve one of the challenges. I think it was Brazil or something. It was kind of a pain in the ass. But I think the most fun challenge I had was mostly realistic as well. It's like this user that leaked this credentials on GitHub somewhere. You could actually find out what was actually leaking there. But yeah, it was quite a different challenge than we're used to, especially because it only involves online ocean challenges instead of actual exploitation and offline forensic stuff. So it was quite fun. Cool. Great. Thank you. And big congratulations to you guys. And so I'd like to call upon Justin and Maxi to distribute the prizes to them. Thank you. Thank you. Thank you. Thank you. Thank you. Hello. Hello. Hello. Yeah. Hello. Hello. Hello. Hello. Hello. Hello. It's yours. Oh, thank you. Thank you. Thank you. Thank you. Thank you. Let's take a picture of this guy. All licenses as well. Cool, right? Cool. Yeah, email him. All the individual licenses. Thank you so much. Thank you. Thank you. Congratulations again, guys. Thank you. Well done. Thank you. All right. So now going over to the second team. The second team was called Cult of the Quantum Row. Yeah, that's a big and fancy name. And they are winners of a drone, one multi-core license, and a hack-five-year USB rubber ducky. Do we have the members for Cult of the Quantum here? Okay. Come on. Cool. Congratulations, guys. Okay. So we would also like you to share some experience. And so two of my other team members had to take off already, but we had a lot of fun with it. I'd say one of the challenges was there was a bot that we were supposed to interact with through Telegram, and it was non-responsive for like the first six hours, and it was really frustrated to be like, but then it started working, and then it was pretty straightforward. And then also the other was mention of one of the challenges where we had to find like a password that had been leaked. And that really threw me because I found that it, like when you put the email address in through Haven't Been Pwn, there's like five sites it's been leaked from, and it so happens that one of my databases had some of those leaks, and it's like, well, wait, but this password's been leaked. The poor guy had multiple email addresses with multiple passwords that have been leaked. So yeah, it was very enjoyable, though. Thank you. Like you'll get a call on Justin and Maxie to give away the awards. That's a big afternoon. Thank you. Congratulations again. Thank you. And the license give you email? Yeah. Really email that to you. Okay. Thank you. All right. So now coming up to the third team, the third team was Buffer Homer Flow, and they get a hack five year bash bunny. Do we have the members here? No one from the team? Yes. Okay. All right. So we'll drop them an email. All right. So that was all for the CDF. We had a fun time. So for the people who have one multi-core and actually licenses, you can drop us a mail on adminnetrygonvillage.org, and then we will send you the license keys for that. And apart from that, the problems which you guys face in CDF are because they just come because of things which we cannot avoid. The scale at which people are playing, they were like more than 190 teams registered and playing the CDF. So, and then there were a few really notorious people who were trying to get the services down, I don't know for what, but then they were trying to get them down. Most of the time, we were spending on figuring out what's going on and why someone trying to kill our services, getting them back up again. Yeah. So we're sorry about that, and we will try to, you know, probably try to set up log monitoring and stuff like that next time. Yeah. And now I would like to call upon Maxi and Justin to talk about Hackathon, and then we'll share the prizes. Thank you. Okay. Thank you for coming. The Hackathon was amazing. Many teams involved, too. At the least, we had two main tools, and it was awesome, different kind of tools, different kind of points of view. We really enjoyed that. If you know I'm part of ToolWars, I'm part of the organization of the arsenal in Bladhead. It's like an open area to show open source tools or community tools. The idea is to, of course, start contributing to the community. At the end of the week, we will publish all the tools that have been developed or have been created during the Hackathon. So the idea is to start contributing every year, growing up this kind of community. And thank you so much for everything. Okay. Let's go ahead. Awesome. Yeah, I definitely wanted to thank the Recon Village guys for everything they've been putting on here, and just the talks have been fantastic. The CTF has been a blast, and I've talked to a bunch of people that have been playing, and we're really excited about getting the Hackathon going as well. And so we're really excited to get a couple of participants in here earlier this morning. And if you guys were here, they showed off the tools that they created. I know that the tools, one of the, part of the requirements for the Hackathon was that everything would be open sourced. So the tools are out on GitHub, and they'll be, you know, something that the community can use, you know, going forward to help more with more OSINT and more Recon. So we're really excited about it. So we'll go ahead and get, announce the winners. So we'll start the first place was the group from RTL Research. So congratulations to you guys if you want to come on up. And we've got a laptop and a USB rubber ducky for you guys. Congratulations, Ben. Thank you. It's yours. Appreciate it. Thank you for sharing something about your experience. About your experience that was, I think, the first time, right? Yeah, it's a Hackathon in such a short window, like a time frame. It's a challenge, of course, but we wanted to make something that worked at the end of the day because it's always more satisfying to present the demo that's working. So we had a lot of amazing ideas who we hope maybe to make in the future, like over a longer time span. But the tool we made now is just like a simple, I'm not going to do the whole talk again, it's just a simple way of providing a web API service that people can use in order to detect whether a text, a phone number or activation text messages are sent to are known as a public free text receiving message. But you can all read up on it, on the Recon Village GitHub or on our GitHub. Absolutely. Thanks. Awesome. And then in second place, I apologize if I mess up your name, but John Suvante, come on up. He made a module for ReconNG to do some more web scraping and getting some more data into the ReconNG. So thank you. Thank you. We've got a Wi-Fi pineapple. Congratulations, man. Thanks. Appreciate it. All done. Appreciate it. Thanks. So if you wanted to... Well, I was going to say I really hats off to the people who played the CTF thing because we tried to do that at first while we're doing this other one. So I'm pretty sure we tied with somebody for last place. I don't know if it was on the CTF. But yeah, we got a little frustrated with that and just kind of gave up and focused on this. My first time at DEF CON was last year and I ran around trying to get in all these places and so this year I decided I'm just going to pick something and stay there and actually do something. So it's been a great experience. So thank you guys for volunteering your time and stuff. Appreciate it.