Spend a week hacking with the Major League Hacking (MLH) community at GHW: Security Week!
What is Global Hack Week?
Global Hack Week takes place throughout the year to give you a chance to complete technical challenges, network with the community, enjoy fun live sessions, build technical projects, and make new memories.
We'll have challenges, live technical sessions with MLHers, mini-events galore, and some cool content from our partners! Here’s a sneak peek:
At each Global Hack Week, you can:
⭐ Watch live technical streams
⭐ Participate in skill-building workshops
⭐ Join us for fun activities
⭐ Enter and win swag in raffles
What is Security Week?
Each GHW features a new theme, and this May we're hacking with all things security! Throughout the week we'll offer workshops, technical sessions, and more all centered around building secure hacks.
Who is GHW for?
Global Hack Week is for anyone ready to level-up their hacking skills. We welcome all programmers, designers, artists, and hackers from around the globe to join us for these events. Whether this is is day 1 or day 1000 of your hacker journey, we want you to join us!
Can I get swag at this event?
Yes, of course! Each Global Hack Week will feature some amazing 2023 Hackathon Season swag…you’ll have to participate to find out exactly what you’re getting!
What is a Guild? How can I be a part of it?
One of the best parts of our community is that it allows people to meet and make connections with others, regardless of where you live. guilds are smaller communities within Major League Hacking. Whether you come in with a guild or not, you won’t be hacking alone.
Who organized Global Hack Week?
Global Hack Week is organized by Major League Hacking (MLH). It is our mission to empower hackers worldwide by providing them with the tools, resources, and opportunities they need to succeed.
Your challenge submission must be completed within the submission period.
When relevent, your code must be available in some sort of public repository.
If you're continuing work on an old project, you MUST specify in your Devpost what was worked on 1) Before this day of Global Hack Week and 2) During this day of Global Hack Week.
Deploy from the Twilio CodeExchange
CodeExchange makes it easy to get started with any app. It’s a searchable directory of customizable code samples, written by developers around the world, vetted by Twilio experts, and ready for you to use. Checkout the Twilio challenge page for more details and submit your finished work to our devpost page!
Finish up the Twilio Challenge
Finish up the Twilio Security Week Challenge If you needed some more time to finish up this week’s Twilio's challenges, now's your chance. Earn some points by submitting any of this week's previous challenges to our day of form! "
Finish the Secure Code Game Challenge!
Did you miss out on the opportunity to finish any of the Secure Code Game levels throughout the week? Well now's your chance to catch up! Check out the challenge repository for instructions and submit your code to our devpost page when you're finished!"
Encrypt a File
Write a script that encrypts and decrypts a file! Submit on hackp.ac/DailyDevpost
Building your Own Password Generator and Manager
Build your own application to manage and create strong passwords! Submit on hackp.ac/DailyDevpost
Day 5 Challenge - Submissions Closed - Secure Code Game Level 5
Secure Code Game Level 5: Locanda! It's a common myth that passwords should be complex. In reality, it's more important that passwords are long. Some people choose phrases as their passwords. Users should avoid common expressions from movies, books, or songs to safeguard against dictionary attacks. Your password may be strong, but for this exercise, a website you have registered with has made a fatal but quite common mistake. Can you spot and fix the bug? Good luck! Check out the challenge repository for instructions and submit your code to our devpost page when you're finished!
Day 5 Challenge - Submissions Closed - First Phone Call
Make your first outbound phone call using curl! Making an outbound phone call is a similar process to what we did on Day 2 to look up a phone number. Checkout the instructions and when you're done, submit your work to our devpost page! "
Submissions Closed - Day 4 Challenge - Two-Factor Authentication
Create your own system that implements two-factor authentication, asking users to provide two different forms of identification! Share your project on hackp.ac/DailyDevpost.
Submissions Closed - Day 4 Challenge - Your first phone call
Receive your first phone call using TwiML bins and Dev Phone TwiML (Twilio Markup Language) is a special markup language which you can use to program actions in Twilio. Today you will: Buy two Twilio numbers Install the Dev Phone Create a TwiML bin to handle a phone call. Assign the TwiML bin to your Twilio number. Make a call using Dev Phone. Read the challenge instructions to get started and submit your work to hackp.ac/DailyDevpost
Submissions Closed - Day 4 Challenge - Secure Code Game Level 4
Secure Code Game Level 4: Data Bank Databases are essential for our applications. However, malicious actors only need one entry point to exploit a database, so defenders must continuously protect all entry points. Can you secure them all? Check out the challenge repository for instructions and submit your code to hackp.ac/DailyDevpost when you're finished!
Submissions Closed - Day 4 Challenge - Get Started with the Secure Code Game
Using python and other tools, you'll learn how to fix vulnerabilities in real-world code, build security into your workflows, and understand security alerts generated against your code!
Head over to the Secure Code Game repository to complete your challenge setup!
Be sure to submit your code to the GHW Devpost page!
Day 3 Challenge - Submissions Closed - Install the Authy App
Twilio’s Authy is a free application for 2FA. You can use it to protect your personal accounts with a strong second factor known as TOTP. Learn how to complete this challenge on Twilio's challenge page! Don't forget to submit your work to hackp.ac/dailydevpost
Day 3 Challenge - Submissions Closed - Implement a Caesar Cipher
Build your own Caesar Cipher encryption/decryption program. Submit your code on hackp.ac/DailyDevpost
Day 3 Challenge - Submissions Closed - Create a password strength checker
Write a script that evaluates the strength of a password. To make this more challenging, try using a language you've never programmed in before! Submit on hackp.ac/DailyDevpost
Day 3 Challenge - Submissions Closed - Auditing and Fixing
Learn about how to audit and fix website vunerabilities! You can research the topic or implement a fix of your own! Share what you discovered on hackp.ac/DailyDevpost!
Day 3 Challenge - Submissions Closed - Secure Code Game Level 3
Secure Code Game Level 3: Social Network The following fictitious story takes place in the mid-2030s. Authorities worldwide have become more digitized. Various governments are adapting social network technology to fight crime. The goal is to establish local communities that foster collaboration by supporting citizens with government-related questions. Other features include profile pictures, hashtags, real-time support in comments, and public tip sharing. Do you have what it takes to secure the social network and progress to Level 4? Check out the challenge repository for instructions and submit your code to hackp.ac/DailyDevpost when you're finished!
Day 2 Challenge - Submissions Closed - Secure Code Game Level 2
Secure Code Game Level 2: Matrix! At the time ""The Matrix"" was first released in 1999, programming was different. In the movie, a computer programmer named Thomas ""Neo"" Anderson leads the fight in an underground war against powerful computers who have constructed his entire reality with a system called the Matrix. Do you have what it takes to win that war and progress to Level 3? Check out the challenge repository for instructions and submit your code to hackp.ac/DailyDevpost when you're finished!
Day 2 Challenge - Submissions Closed - Write an Encryption Algorithm
Use any language of your choice to write an encryption algorithm! Submit your code on hackp.ac/DailyDevpost when you've finished!
Day 2 Challenge - Submissions Closed - Send and check a verification one-time passcode
Verify is Twilio’s purpose built API for sending and checking one-time passcodes (OTPs). It’s built on top of Twilio’s SMS API, but manages a lot of complexity for you so you don’t have to write as much code to make it work.
Today you will:
Create a Verify Service
Send a Verification over SMS or WhatsApp
Check the Verification
Read more for the challenge instructions! Don't forget to submit your work to our day-of devpost. "
Day 1 Prize - Submissions Closed - Lookup a phone number
You can learn a lot from a phone number. So Twilio built an API for that!
Today you will:
Learn how to use curl to make HTTP requests.
Build a curl request that will fetch phone number information using the Twilio API.
Check out the step by step instructions and submit your code to hackp.ac/Devpost!
Day 1 Prize - Submissions Closed - Secure Code Game Level 1: Black Friday
A few days before the massive shopping event Black Friday, an electronics shop without an online presence rushed to create a website to reach a broader customer base. As a result, they spent all their budget on development without investing in security. Do you have what it takes to fix the bug and progress to Level 2?
Check out the challenge repository for instructions and submit your code to hackp.ac/Devpost when you're finished!
Day 1 Prize - Submissions Closed - Try GNU Privacy Guard
Try using GNU Privacy Guard! GNU Privacy Guard (AKA GPG) is a popular tool for encrypting files. Join Wei's live session or watch the recap to see an example! Submit on Devpost!
Submitting to this hackathon could earn you:
Major League Hacking
GHW exists to give you a chance to learn, build, and share in a non-competitive environment.