not found


RETCON is a hacking competition where contestants can hack their way through our exploitation platform that consists of four networks, 25 computers, and over 150 vulnerabilities. There are prizes for the top three contestants, and a grand prize of $500 for the first contestant who can hack their way through all of four networks, while capturing all the flags, in the four hours provided. There are only 25 seats available.

Sign Up Today!

Venue: Stoke Denton

Address: 608 E Hickory St #128, Denton, TX 76205

Date: 4-9pm March 24th, 2018

Contestant Cost: $10

General Public: Free

Shirt Size
Email Address
Vulnerability Identification


Initial Access




World Domination


RETCON Background

RETCON is named after the SEH exploitation of the return pointer on the stack. POP POP RET is a sequence of instructions needed in order to create SEH (Structured Exception Handler) exploits. The registers to which the popped values go are not important for the exploits to succeed, only the fact that ESP is moved towards higher addresses twice and then a RET is executed. Thus, either POP EAX, POP EBX, RET, or POP ECX, POP ECX, RET or POP EDX, POP EAX, RET (and so on) will do. Read more here

not found

Metasploit Unleashed

Need a little brushing up? Here's Metasploit Unleashed, a free Ethical Hacking course from Offsec. "This course is a perfect starting point for Information Security Professionals who want to learn penetration testing and ethical hacking, but are not yet ready to commit to a paid course. We will teach you how to use Metasploit, in a structured and intuitive manner. Additionally, this free online ethical hacking course makes a wonderful quick reference for penetration testers, red teams, and other security professionals."

not found

Offsec Pentest Labs

Need some hands on experience? Here are the Offsec Pentest Labs, a "Our hosted virtual labs networks are rich with various Operating Systems and attack vectors, allowing participants to utilize and hone a broad set of Offensive Security pen testing skills. Many vulnerable machines have non-standard configurations, often forcing participants to dig deep into the vulnerabilities in order to complete their task, rather than blindly using automated tools."