 We're really excited to be here as part of the ICS Village this year. We started with Hack the Sea Village in 2019 in DEF CON 27, and we keep expanding the competition. This year we have three separate consoles here. We have the navigation, the steering and propulsion, and the ballast one, which is new this year. This competition is really geared around trying to get people exposure and the ability to hack on equipment that they wouldn't normally have. Most people don't have a boat sitting around, so we actually have the real electronics here, and it's really based on the protocols. The Namiya 2000 CAN bus and the Modbus TCP really have no security built into the OT protocols itself. So there are about 20 flags to capture across all three of these consoles, and with that it's really focused on trying to bring awareness to the fact that the protocols themselves aren't very strong. It's really a security through with security. So how can we help the community better understand that and hopefully press for a more secure implementation for the future? We have a wide range of folks here. A lot of folks have never touched anything industrial or anything OT before, so folks that have worked on a lot of similar systems. Now, very few people have ever worked on a boat before because it's a very small community that's actually in the Maritime Cybersecurity, but we're hoping to grow the Maritime Cybersecurity research community through this event. The competition has been going great. We've gotten people that have attacked navigation console. We've had people that have captured flags on the steering and propulsion console as well. The major one is ballast console. People that are having trouble with that one. There's a lot more to it of a technique that you have to do to attack ballast. So I'm really eager to see who will be the first one to capture a flag. But the teams are really engaged. They're asking questions, figuring things out quickly, and really having fun out here. Once we hit that, we're going to have to find a way... We're doing the ballast tank challenge, and we didn't expect to be this difficult. The first two challenges that were solved were a little bit straightforward. We have people that really knew about CAN. So what's our strategy for figuring out what does what? Is there a way to just... And just kind of deep diving into all the packets and figuring out what's going on and any type of clue we can get, we just look into it and Google and try to learn as much as we can about what we don't know. For us, I think if we just get one of the ballasts, we're going to be happy. We're nearing the end of the competition. It is a race to the finish for the first place team. It looks like it's about 175 points to split the both of them. But there is one team that has more navigation flags than the other. So that could be a tie-breaking point. Right now, it's a lot of educational stuff going on and really just bragging rights. We have a team that's still trying to gain flags on proportion and steering. And some teams that are new, that are trying to get flags on navigation. So I think it's a good tell-tale sign that it can be educational purposes and a competition at the same time. It's intense. We're probably going to be going down to the wire with both our teams. You know, we're just trying to stay focused, trying to get these last couple of points in here and hopefully we can pull it off trying to keep a close eye on that timer. So hopefully we can wrap up ballasts and put all our energy into nav and hopefully stay in the lead. It's going to be close enough. Have everybody's attention. I think we love the new ballast. It gave us a chance to do a little more like traditional IT style pen testing. We do aircraft pen testing. So it was nice to have both sides of that. It was really, really close. I think if we had managed our time a little better, we probably would have won, but I'm happy for that team. I think they did a great job. It was great competition. I was counting down. I was like, we've got seconds to get any points because we're down by five. And then, you know, and then he comes walking back looking all dejected and I'm like, oh, that's it. We did our best. And he's like, oh yeah, by the way, I got two more flags. And everybody's shaking hands and congratulating. Hey, Jeff Godd. Been running the Maritime Hacking CTF. So it's SEATF. It's an opportunity for teams to come in and hack real maritime equipment. We brought about half a million dollars worth of equipment for folks to hack on. We had 22 teams participating. They captured 186 flags throughout the weekend and spent a total of 1,871 minutes actually connected to the hardware. And so the first place team, they would come on up. It is the emoji team, ship wolf, fire, fire, fire. And... Woo!