WhatTheHack : A Collection Of Challenge Based Hack

WhattheHack is a challenge based hackathon format. A collection of challenge based hack-a-thons including student guide, proctor guide, lecture presentations, sample/instructional code and templates.

What, Why and How

  • “What the Hack” is a challenge based hackathon format
  • Challenges describe high-level tasks and goals to be accomplished
  • Challenges are not step-by-step labs
  • Attendees work in teams of 3 to 5 people to solve the challenges
  • Attendees “learn from” and “share with” each other
  • By having to “figure it out”, attendee knowledge retention is greater
  • Proctors provide guidance, but not answers to the teams
  • Emcees provide lectures & demos to setup challenges & review solutions
  • What the Hack can be hosted in-person or virtually via MS Teams

Also Read – See-SURF : Python Based Scanner To Find Potential SSRF Parameters

How to Add Your Hack

We welcome all new hacks! The process for doing this is:

  • Fork this repo into your own github account
  • Create a new branch for your work
  • Add a new top level folder using the next number in sequence, eg:
    • 011-BigNewHack
  • Within this folder, create two folders, each with two folders with in that looks like this:
    • Host
      • Guides
      • Solutions
    • Student
      • Guides
      • Resources
  • The content of each folder should be:
    • Student/Guides: The Student’s Guide
    • Student/Resources: Any template or “starter” files that students may need in challenges
    • Host/Guides: The Proctor’s Guide lives here as well as any Lecture slide decks
    • Host/Solutions: Specific files that the proctors might need that have solutions in them.
  • Once your branch and repo have all your content and it formatted correctly, follow the instructions on this page to submit a pull request back to the main repository:
R K

Recent Posts

Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

1 week ago

ExecutePeFromPngViaLNK – Advanced Execution Of Embedded PE Files via PNG And LNK

Extract and execute a PE embedded within a PNG file using an LNK file. The…

2 weeks ago

Red Team Certification – A Comprehensive Guide To Advancing In Cybersecurity Operations

Embark on the journey of becoming a certified Red Team professional with our definitive guide.…

3 weeks ago

CVE-2024-5836 / CVE-2024-6778 : Chromium Sandbox Escape via Extension Exploits

This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…

3 weeks ago

Rust BOFs – Unlocking New Potentials In Cobalt Strike

This took me like 4 days (+2 days for an update), but I got it…

3 weeks ago

MaLDAPtive – Pioneering LDAP SearchFilter Parsing And Security Framework

MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…

3 weeks ago