 we were walking across the contest area and we see this massive display and it is so cool. I wanted to find out what what is this? Where are we right now? All right, great. So what we are doing here is we are running a CTF. This is a Red Alert ICS CTF and this is basically we have a ton of toys here for people to come in, hack, play and learn a lot of things. So this is a purely ICS based CTF and all the toys that you have here are all hackable. So like all industrial control systems. So like what type of attacks are needed here like protocol fuzzing and things like that? A little bit of everything actually. So if you're looking at probably the city right here in Plaza Blackout you can have a man in the middle attack do an MITM cause Blackout can probably play around with the runway cause some sort of an airport crash. And all of these things are all interactable, like you interact with all of these things. You actually can, yeah. And when you run the attack like lights will turn off or what? Yes. What about some of this stuff over here? So what you see here, this one and this particular one, these are two units or simulations of units that you see at nuclear facilities. So this is something that's known as a spend fuel cooling system, which is used to cool nuclear fuel. And that one that you see right there is actually a centrifuge. Okay. So these are things that you would ideally find at nuclear facilities. Now you have a ton of teams here competing. Right. How many teams do you have? Actually we've got teams coming in and going but we've got a good number so far. It's a good turn out. Now it looks like you have a bunch of different manufacturers here. Do each one have, now are you, are these published vulnerabilities that the teams are going out and finding? Are they actually having to like reverse engineer and look at some of the protocols? Or can you walk me through like a standard attack path one of the teams might have to use? So it depends on the kind of challenge that you're doing. So the different manufacturers that you see here, we just want to show that there are attacks possible and we are vendor neutral. So you can attack any of them because there are tons of protocols here as well. You've got the S7 Complus that's proprietary to Siemens, you've got Modbus, DNP3, so on and so forth. And for traditional attack, one of the challenges they would have to come in, we do give them the CVE IDs as well and they can follow that, do a little bit of research, a little bit of digging in and they're good to go. Okay so let's go from start to finish because that's what I'm curious, I want to sit down and actually hack away on this thing. Do I need special hardware or anything like that for this? So all you need to do is just come in with your laptops. If there are challenges that require specialized toolkits, we'll be providing them. We've got a ton of these toolkits, ton of these things here, ton of these toys. So what's in the standard toolkit? So let's take a look, shall we? Yeah absolutely. So this is one of those toolkits that we give to the players. So we've got a hack RF to play with the radio frequency, kind of attacks. The crane that you see there is controlled by radio frequency actually. Check out this crane. This is one of my favorite ones I've come across so far. So if you send an attack in here it will actually flip it around and move. So the players will actually be able to take control of the crane. I'm worried this guy might be a little too close, might take out a laptop in the process. So let's go back over to the kit so you have a hack RF. Right. What else is in here? What's the red alert? This is actually an RTLSDR that works similar to a hack RF. We've got a Raspberry Pi here for one of the other attacks that we're required to do and we've got a tiny little teensy board here as well. Oh yeah, to simulate a keyboard? Yeah. So a lot of things going on, a ton of challenges. That's what it is. This is so cool. What is the coolest thing you've seen a team do so far here? Yesterday one of the teams were actually successful in causing a blackout. So they were able to cause a city-wide blackout, take down the scene. That's so cool. Can you give me an idea of what they did? Was it they had to flip a bit? Was it that they just tossed it? They were actually able to, they had to remotely connect to the HMI there that controls. So the HMI actually deals with the PLC. HMI human-machine interface. Yes. So and the PLC is there that actually controls this particular portion of the city and they were able to just break their way in and take control of it. And they, after they get into the PLC, did they have to inject new functionality or this is functionality already there once they got in? They could just turn it off. For this particular one, this was already there. Okay. To get there is probably the challenging part. Oh, it is the mini-hop. We just got one team so far that just managed to do it. And that's not just guessing a password or something? No, it's not. It's a lot more than that. Can you walk me through a little bit of that step? Actually it goes down to the protocol level of information that you have. So it could be, I wouldn't want to say a lot of things about it because there are people still playing and wouldn't give out any of the spoilers. But everything requires a different approach. A lot of digging in that's required. But for each of the challenges, we've given them with ample information, ample description. So if they do a little bit of digging in, they'd be able to get their way through it. Is this only for experts or can you be a beginner and plug in and start figuring out? You can be a beginner and just come in as well. So the point here is to have some fun, right? Yep. Go back with probably a lot more than you came with. So learn a little bit. So if you're a beginner, if you're an absolute beginner, you can still come in. Try out a few challenges. Probably the easier ones. And then... Yeah, excellent. Hey, thank you so much. Thanks. Is there somewhere online where the team can either interact with this or even after the contest? Is there a place where they can learn more about these techniques? We actually do a lot of these things last Defconn as well when it was completely online. We had the same kind of setup. We had similar setups, similar challenges, all online. And this is on what you're showing on the screen here. So Defconn 29 had the challenges running here actually. Excellent. Oh, that is so cool. This has to be one of the coolest displays. Thank you. Thank you. Thank you so much for sharing. Thank you very much. Thank you for watching. And as always, hack on.