Disobey Challenge

A puzzle that will require many techniques to solve.

Capture the flag

Capture the Flag is bunch of different kind of challenges, ranging from easy to hard in difficulty, which you need to solve! For every completed challenge, you get some points. The team with the most points wins.

For a general calibration of the difficulty level, you can find the walkthrough for the teaser puzzle at the following link: https://goo.gl/yeL6rs

Stuff to do

    Hostile Network

  • Anything goes, hack everything you can find

  • Workshops by Disobey Gurus

    Workshops will require a badge and registering at the infodesk before the start

  • Mikrotik - Silvan
  • SDR How hard is it to get cracking - Oona Räisänen
  • Hunting zerodays - Undisclosed
  • Webapp Hacking - Solita (sponsored)
  • OSINT by NotMyNick
  • SMDs for Terrified Beginners - Kliment (20€ for parts)
  • Cyberattack from Network Perspective - Mika Järvinen

  • Unconference Workshops

  • What are you interested in?
  • What would you like to do and learn together?


  • All through the event!


  • Facilitated by hacklab all through the event!


Disobey 2018 will be held at kattilahalli in Helsinki, between 12-13.1.2018

Day 1

12.1.2018, Doors open: 12:00

  • All your encrypted computer are belong to us - Tomi Tuominen & Timo Hirvonen
  • Game Security on Android - Giovanni Rocca
  • Tales from the trenches [Redacted] - Harry Sintonen
  • Phishing through email - Niklas Särökaari
  • Pwning BIOSes 101 - K4m1
  • Reverse Engineering fine details of Game Boy hardware - Joonas Javanainen
  • Building Windows Kernel fuzzer - Jaanus Kääp
  • It's the little things - Ben Sadeghipour
  • Web attacks against AV software - Juho Nurminen

Day 2

13.1.2018, Doors open 10:00

  • The Next Revolution - Mikko Hypponen
  • How to get the best out of your bug bounty program - a view from both sides - Ed
  • Everyday OpSec for the everyman - Daniel Sundström
  • Psychological perspective on security - Topias Uotila
  • Hacker hints for developers - Donnie Werner
  • Software Developer as an attack vector - Antti Virtanen
  • How to attack randomly / A random attack - Jussi
  • Tor de-anonymization - Juha Nurmi
  • Timing Attack Information - Joona Kannisto
  • Escapology - Mikko Kenttälä & Ossi Herrala
  • Securing ACME DNS validation - Joona Hoikkala

Program might change, and is not final until the day of the event.