 This is the Adversarial Wars CTF. How many years has this contest been going on? This is like the third year at Defconn. So we are an adversary village. We organize talks, workshops, and CTF. And this is our third year. So this year we're kind of concentrating on the CTF only. Not talks. This is more like adversary wars. We have created a fictional city in the cloud. Let's say there are many, many threat actors, right? For example... I'm assuming that we have B-Roll, but the fictional city that Gauri took pictures of earlier, that is all the fictional city in which this entire CTF occurs. Yes. Right now we know that in Cyber Warfare, certain threat actors are there, coming from certain countries. Like for example, Cosy Bear, right? I mean, Lazy Pond, Cosy Bear, all those kind of stuff, right? So again, so we have created a fictional threat actor using that elephant. There is a big, big story behind that elephant that is coming from South India, the land mafia, and the people complained against it. And the government decided to deport that elephant to, like, you know, 400, 500 km far away from its natural habitat. So we kind of decided to, like, you know, use that as a fictional threat actor. And our pretext here is that threat actors compromise the entire city. And all these guys are trying to figure out what are the activities performed by that threat actor, or cyber adversary, and trying to emulate these activities. For example, let's say we have an apartment here. We have a hospital here. So we'll be opening all these challenges in the CTF. And, you know, they get to attack and it'll figure out the flags. So that's the whole purpose here. So let me, I'm going to echo this back, make sure I understand it. You're saying there's the giant elephant is going to simulate kind of like the attack on them? Yeah, there is a fictional threat actor. And it's going to be, the threat actor is going after the hospital, is going after buildings. And players are defending against the attack? No, they are not defending. The damage has already done. The threat actor successfully compromised the entire city. But the defenders here, we don't have an idea what was performed by the threat actor. So now we are trying to emulate the threat actions performed by that, you know, adversary there. So that's the point. So players then are simulating the attack? Yeah, simulating the attacks. Exactly. They are kind of a retina simulation, offensive simulation. They are doing that activity right now. And what makes this CTF different from other CTF? Because mostly we have different levels of different types of CTF, right? Japanese CTF, they are like King of the Hill, all these types. Here, we have created a threatened, you know, profile for the adversary. Let's say one country or organization got hit by a cyber adversary. The very first thing they would do is trying to collect the TTPs used by the attack actor. What are the techniques used by them? What are the tools used by them? How far they went into our country? How far they went into our organization? So we find it using an offensive way. We're trying to post like that attacker and we're trying to find the loopholes in the system. Then we kind of emulate these activities. So next time the attacker hits us, we'll be in a better position to defend it. So the attack happened. You're using attackers are then simulating the same attack fast to understand what happened. And the tractor probably is half cooked. We are not giving away what are the actual TTPs used by this attack. I mean the rice tractor, the truck tractor. The players need to figure it out. Yeah, that's the point. In the end, they also need to create a tractor report. Like, you know, this is how we emulated the activities of the so-and-so tractor actors. Well, that's interesting. So not only did I have to go ahead and do all the hacks, but at the same time, they didn't have to write a report and submit the report. Not like a formal report, but like a tractor. For example, a tractor coming out of Russia. It has a certain like, you know, tools and techniques. Like that, we'll ask the players to create a tractor profile based on the issue they have identified. More like a pure, adulterous emulation CTF. That's the idea here. Okay. And about the lego city. Do you like the lego city there? Yeah, it's really cool, people. They have like set up and whatnot. That's more like for the manager and professionals and, you know, other executives. Because when you, even if I am stepping into that CTF area, I have no clue what is happening in there. Because what I'm seeing is a bunch of folks are sitting with laptops and something is happening in there. Mostly the players and organizers will do, will know what is happening in the CTF. So for example, policy makers are coming here. We could just easily displace them. Like, you know, this is how a cyber adversary would hit a country, I mean country or city. And this is how they are going to do damage. So that's a kind of a visual symbol, visual representation. And also there is for the kids. If kids are dropping by, we have a couple of additional lego sets. We could give it to them and we could ask them to play with the lego. I mean, whatever they want. Yeah, that's awesome. Yeah, that's the part. Excellent. Thank you so much for running it. Thanks for, thanks for sharing. Thank you for watching.