Program

/

CODE BLUE 2024

Contests/Workshops

Contests/Workshops (The details of each event will be updated as needed)

Contests

  • NEC Security Skills Challenge(CTF)

    The NEC Group holds the "NEC Security Skills Challenge (CTF)" for employees every year with the aim of discovering and developing security talent. NEC security professionals create challenges based on their practical experience, and in this workshop, participants will actually solve those challenges posed to NEC employees. We look forward to the challenge from everyone interested in security!

    • Date :

      • Nov, 15th 9:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Car Hacking Village

    The CODE BLUE 2024 Car Hacking Village will feature a plethora of automotive cybersecurity and car hacking content! This year's village will feature scheduled workshops by vehicle security experts, sponsored exhibits by leaders in the automotive cybersecurity industry, and an open testing area - giving everyone access to automotive hardware targets and security testing tools!

    • Date :

      • Nov, 14th 10:00-16:00

      • Nov, 15th 10:00-16:00

    • Location :

      • B2F Room3

    • Share :

  • Adversary Village

    Adversary Village is a community-driven initiative focused on adversary simulation/emulation, purple teaming, and adversary tradecraft. The village covers a wide range of topics, including offensive cyber security, threat/APT/ransomware simulation, breach and adversarial attack simulation, adversary tactics, research on nation-state-sponsored threat-actors, adversary intelligence, adversarial mindset and hacker survival skills. The goal of Adversary Village is to build an open security community for researchers and organizations developing innovative approaches to offensive cyber security, adversary simulation/emulation, and purple teaming. We host Villages, CTF competitions, hands-on activities, and workshops at various conferences to engage and educate the community.

    • Date :

      • Nov, 15th 10:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

Workshops

  • SecuriTTX for Everyone (Tabletop Exercise)!

    Did you notice the portmanteau word created by combining “Security” and “TTX”?
    When an incident occurs in the cyber domain, a large volume of diverse and incomplete information and requests flow in from many directions, causing confusion and delay in response, which in some cases can lead to increased damage.
    As a countermeasure, our CSIRTs are experienced through TTX in preparing for cybersecurity incidents.
    This time, through the TTX of “Incident Scenarios Based on Familiar Events,” participants will consider, discuss, and gain insight into how to respond based on their own organization, position, and job title.
    Through the exercise task discussion, participants will deeply consider the importance of individual roles and key points of cooperation.

    • Date :

      • Nov, 14th 10:00-18:00

      • Nov, 15th 9:00-16:30

    • Location :

      • Track 2(HALL A)

    • Share :

  • Introduction to incident response caused by cloud configuration

    As cloud use in companies has increased in recent years, incidents such as customer data leaks caused by cloud settings have become a frequent topic of discussion.
    In this workshop, you will gain a systematic, hands-on experience of how to resolve "incidents caused by cloud settings.

    • Date :

      • Nov, 14th 14:30-18:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Hacking Active Directory

    Active Directory is used by many organizations as the core of their authentication infrastructure. Since Active Directory is a directory service that centrally manages all resources within an organization, it is the first target of an attacker who infiltrates the organization's internal network. Understanding the methods of attack against Active Directory can help prevent serious damage and, even if it is compromised, can help with early recovery and cause investigation.

    • Date :

      • Nov, 14th 10:40-15:20

      • Nov, 15th 10:40-15:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Cyber Range Exercise

    A blue team exercise centered around cybersecurity incident response. This exercise simulates cyber attacks on enterprises, where participating teams play the role of a cyber incident response team. They analyze a large volume of threat alert data and system logs to trace the attackers' footsteps and respond correctly to the attack incidents, thereby enhancing the enterprise's defense capabilities against cybersecurity threats.

    • Date :

      • Nov, 14th 10:00-17:30

      • Nov, 15th 10:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Offensive security operations: Building adversary emulation engagements

    The hands-on workshop by Adversary Village is designed to give participants a better understanding of adversary emulation engagements. Attendees will learn to emulate various threat actors safely in a controlled, enterprise-level environment. All machines in the lab will be equipped with antivirus software, web proxies, EDR, and other defense systems. The training will include detailed modules on each attack vector used in the lab and step-by-step breakthroughs of the attack path across an entire enterprise network. This training aims to help attendees assess defenses and evaluate the security controls deployed in their organization against motivated adversaries. The second day will introduce a hands-on contest to the participants, where they can use the skills learned from the workshop to solve a list of challenges and win goodies/prizes.

    • Date :

      • Nov, 14th 10:00-16:00

    • Location :

      • Track 2(HALL A)

    • Share :

  • Android Security - Hacker's Guide

    Android Security is not new. But when it comes to offensive or defensive side of android security, there are always challenges which looks easy to solve but at times its trivial . This workshop will take participants through journey of some of those very interesting challenges, like bypassing SSL pinning in modern android apps, hacking android deeplinks, effectively finding hardcoded secrets on android apps using MORF.

    • Date :

      • Nov, 14th 10:00-18:00

    • Location :

      • B2F Room1

    • Share :

  • Biohacking Village

    Biohacking Village has always been committed to bringing together experts from around the world that we unite healthcare, technology, and cybersecurity professionals to explore the latest innovations in biomedical security.

    • Date :

      • Nov, 14th 10:00-18:00

      • Nov, 15th 9:00-16:30

    • Location :

      • 1F Meetingroom 2

    • Share :

  • Kunoichi Cyber Game

    The international women’s CTF "Kunoichi Cyber Game" for young participants is not only about acquiring security skills but also about building a network with peers across countries who share an interest in cybersecurity.

    • Date :

      • Nov, 14th 9:45-18:00

      • Nov, 15th 10:00-12:00

    • Location :

      • 1F Meetingroom 1

    • Share :

  • Cyber TAMAGO :Share cybersecurity tools and ideas

    It is an space to present tools, code and ideas related to cyber security, build confidence and prepare presenter to showcase in big domestic and internationals conferences such as BlackHat Arsenal, DEFCON Demolabs, CODEBLUE Bluebox. Anyone below is welcome to join.

    • Date :

      • Nov, 15th 9:00-16:00

    • Location :

      • B2F Room 1

    • Share :