BLUE TEAM vs RED TEAMin the Age of IoT Security
Join us for NetComDays 6.0, where cybersecurity experts battle it out in the evolving landscape of IoT security. Witness the clash between offensive and defensive security strategies.

BLUE TEAM vs RED TEAM
In the age of IoT security, the battle between offensive and defensive security teams has never been more critical. Explore the tactics, tools, and strategies used by both sides.
Offensive Security
Red Teams simulate real-world attacks to identify vulnerabilities before malicious actors can exploit them. In the IoT landscape, this means testing everything from firmware to communication protocols.
Penetration Testing
Identifying and exploiting vulnerabilities in IoT systems
Exploit Development
Creating custom exploits for IoT-specific vulnerabilities
Wireless Attacks
Targeting wireless protocols used by IoT devices
Finding and leveraging vulnerabilities in IoT systems to gain unauthorized access.
Reverse engineering IoT device firmware to discover hidden vulnerabilities.
Targeting communication protocols like MQTT, CoAP, and Zigbee used in IoT ecosystems.
Using compromised IoT devices to pivot into cloud infrastructure and backend systems.
Red Team Resources
Essential tools and resources for offensive security professionals working in IoT security
Essential Tools & Resources
Equip yourself with the most effective offensive security tools
Essential tools for identifying and exploiting vulnerabilities in IoT systems
Tools for reverse engineering IoT device firmware to discover vulnerabilities
Tools for analyzing and exploiting wireless protocols used by IoT devices
Resources for creating custom exploits for IoT-specific vulnerabilities
Blue Team Resources
Essential tools and resources for defensive security professionals protecting IoT infrastructure
Essential Tools & Resources
Strengthen your defenses with these powerful security tools
Tools for continuous monitoring of IoT devices and networks to detect suspicious activities
Resources for rapidly responding to and mitigating security incidents in IoT environments
Tools for securing IoT network communications and implementing proper segmentation
Solutions for identifying, assessing, and remediating security vulnerabilities in IoT systems
Expert Speakers
Learn from industry-leading experts in both offensive and defensive security as they share insights on the latest IoT security challenges and solutions.

Faycal Belbachir
Expert cybersecurity consultant

Hamza Essad
Cybersecurity Engineer

Mohssine Massaf
MVP Microsoft

Abdessamad El Amrani
Cybersecurity Team Engineer

Souhail Mssassi
Senior Security Researcher

Mohamed Wahbi
Cybersecurity Consultant

Houssam-Eddine Ajaite
Cybersecurity Consultant

Mehdi El Hadry
Cybersecurity Engineer
Test Your Skills
Put your IoT security skills to the test in our 24-hour Capture The Flag competition. Solve challenges, find vulnerabilities, and compete for prizes.
Competition Details
24-Hour Challenge
A full day of intense competition with challenges of varying difficulty
Team-Based Competition
Form teams of up to 4 members to tackle challenges collaboratively
Valuable Prizes
Win cash prizes, security hardware, and recognition in the security community
Event Status
Extract and analyze the firmware of a simulated IoT device to find hidden backdoors.
Identify and exploit vulnerabilities in a smart home control API.
Ready to Test Your Skills?
Join the NetComDays 6.0 CTF competition and put your IoT security knowledge to the test. Whether you're a seasoned professional or just starting out, there are challenges for all skill levels.
Meet Our Team
The dedicated professionals behind NetComDays 6.0 who work tirelessly to create an exceptional cybersecurity event experience.
Our Sponsors
NetComDays 6.0 is made possible by the generous support of our sponsors who are committed to advancing cybersecurity in the IoT space.

Cosumar

Sidi Ali

Lets Defend

OCP

Hit Radio

EKBAAL

B-Secure
