The conference from Bettendorf, Iowa, has resulted in a satellite event in West Central Ohio with numerous themes and missions, beginning with port numbers, followed by CVEs (Common Vulnerabilities and Exposures), followed by exploitation and numerous related black-hat hacking tactics. Even though user creation may have been advised, the truth of the matter was significantly more interesting with each of the users. Every vulnerability would result in additional contexts necessary to understand the true context—and nature—of the connection and of the CTF.
