Quantify Cyber Adversarial Events
to Make a More Secure Digital World
New Version of TOP Security Competition GeekPwn
Globally Unparalleled Security Geek Event
Oct
24
2023
DAF
Contest
HAC
First Place
"Cyberspace Travelling"
A Challenge that Exploits Unknown Vulnerabilities to Achieve Escape of a Virtual Machine Platform
TNB
Second Place
"Fatal Pulse"
A Challenge that Exploits Unknown Vulnerabilities to Launch a Denial-of-Service Attack on Any Website at a Magnitude of Thousands
Tiangong Lab
Third Place
"Cyberspace Travelling"
A Challenge that Exploits Unknown Vulnerabilities to Achieve Escape of a Virtual Machine Platform
Jiufeng Security Lab
Honorable Mention
Cracking and Locating a Vehicle with A Glance at the Car Window
A Challenge that Exploits Unknown Vulnerabilities to Remotely Control Intelligent Connected Vehicles
BlueThanos
Honorable Mention
He Who Knows Attacking is Intelligent
A Challenge that Exploits Unknown Vulnerabilities to Remotely Control a Domestic Operating System
NISL @THU
Honorable Mention
Vanishing Sound Waves
A challenge that Utilizes Selfmade Devices to Counter Hidden Audio Recording
DARKNAVY Insights
Special Disclosure
Assisting Law Enforcement in Capturing over 800 Black&gray Market Operators in One Year
How did we do it?
A certain security team
Haven't Heard of Online Black&gray Market Activities
Doesn't Mean You Haven't Been Involved
Two certain security teams
Cloaked in the Guise of Publicly Traded Companies
They are Currently Treating Users as Cash Cows
Two certain security teams
Annual Themed Debate
GPT and Hackers
Breakthrough Awards
Beyond Generation:
Detecting Zero-Day Web
Attacks via Security-GPT
Further Eye @Sangfor
Breakthrough Awards
GPTFuzzer:
Automated Jailbreak
of LLMs
Ant Security
Light-Year Lab
Breakthrough Awards
Red Team AI Commander:
Hacking Robot Built on LLM
CLOUDITERA
AVSS Contest
Final Contest (Android Track)
First Place
BlueThanos
Second Place
AAA
Third Place
Pindongdong
Honorable Mention
Polaris
Honorable Mention
NeSE
Honorable Mention
Dubhe
Annual Themed Debate
GPT and Hackers
DARKNAVY Insights:
Special Disclosure
DAF
Contest
AVSS
Contest
15 + 5
In-depth Sharing
Annual Themed Debate
GPT and Hackers
DARKNAVY Insights:
Special Disclosure
DAF
Contest
AVSS
Contest
15 + 5
In-depth Sharing
KEEP ON PWNING EVERYTHING!
Introduction
DAF (Defense & Attack Force) Contest is an immersive, unparalleled and extraordinary hacking contest like no other,
which unveils the real-world vulnerability exploitation threats by showcasing cyber adversarial activities in smart devices and network services.
As an upgraded version of GEEKPWN, DAF Contest continuously encourages contestants to PWN everything.
Rules and Regulations
All the submissions must abide by relevant laws and regulations.
For submissions involving the exploitation of target vulnerabilities, the targets (device, application or security module) should be in factory shipped state with official updates and default settings. The ROM and/or software versions should be the latest version 30 days before the DAF Contest begins.
All the technical approaches must be the contestant's own original work. Winning contestants must submit detailed technical report to the committee.
Winning contestants will be rewarded with certificates of honor and cash prizes. The first prize winners will be inducted into the annual Hall of Fame.

1     GEEKCON organizing committee (hereinafter referred to as "the committee") recognizes the technical capability of the winners individually, but doesn't acknowledge that it represents the capability of the winners' associated organization.

2    The committee recognize and promote the comprehensive assessment of vulnerability exploitation capabilities and mitigation mechanisms from a confrontational perspective, and do not endorse the judgement of security levels of the target products involved in the event based on a single dimension or non-quantitative dimension.

3    The committee firmly follows the Responsible Disclosure principle. The committee and contestant commit not to disclose any details to third-party before manufactures fix the issues.

4    The committee advocates and encourages in-depth knowledge sharing and communication, but firmly opposes any speech and behavior that violates laws and regulations or infringes on the rights of others.

5    The committee guarantees that the participants' personal information will not be disclosed to third-party or used for commercial activities without their agreement and authorization.

6    The committee will provide awards and honors based on the research efforts, technical breakthrough, and technical innovation of the projects. As the top 1 security geek IP operator in China, the committee always advocate a reward mechanism that emphasizes both honor and moderate bounty, encouraging more geeks to participate in technical innovation and knowledge sharing.

1     GEEKCON organizing committee (hereinafter referred to as "the committee") recognizes the technical capability of the winners individually, but doesn't acknowledge that it represents the capability of the winners' associated organization.

2    The committee recognize and promote the comprehensive assessment of vulnerability exploitation capabilities and mitigation mechanisms from a confrontational perspective, and do not endorse the judgement of security levels of the target products involved in the event based on a single dimension or non-quantitative dimension.

3    The committee firmly follows the Responsible Disclosure principle. The committee and contestant commit not to disclose any details to third-party before manufactures fix the issues.

4    The committee advocates and encourages in-depth knowledge sharing and communication, but firmly opposes any speech and behavior that violates laws and regulations or infringes on the rights of others.

5    The committee guarantees that the participants' personal information will not be disclosed to third-party or used for commercial activities without their agreement and authorization.

6    The committee will provide awards and honors based on the research efforts, technical breakthrough, and technical innovation of the projects. As the top 1 security geek IP operator in China, the committee always advocate a reward mechanism that emphasizes both honor and moderate bounty, encouraging more geeks to participate in technical innovation and knowledge sharing.

Organizer
Strategic Partnership
Tech Partners
Community Media Partners

About DARKNAVY

DARKNAVY, an independent and free-spirited security research organization and service provider. We have invented and established AVSS (Adversarial Vulnerability Scoring System) to evaluate and quantify vulnerabilities and the effectiveness of system mitigation mechanisms in real adversarial environments. We have also initiated and organized GEEKCON, a unique and top-class security geek event, to empower the development of the global security community.

Our goal is to create a more secure digital world by eliminating vulnerabilities in IT products/services. By sharing our knowledge through consulting and R&D experiences, we aim to enable organizations to better prepare and protect themselves against the ever-evolving threat of cyber attacks.

About GEEKCON

GEEKCON is the new version of the top security competition, GeekPwn. Initiated by DARKNAVY, GEEKCON aims to become a globally unparalleled technical event for security geeks, pioneering and promoting the visualization and measurable values of security ecosystem capabilities.

Registration Consultation: cfp@geekcon.top
Business&Media Cooperations: biz@geekcon.top
©2023 GEEKCON Committee
Registration Consultation: cfp@geekcon.top
Business&Media Cooperations: biz@geekcon.top
©2023 GEEKCON Committee