SlideShare a Scribd company logo
#SpellCheckV2
CybersecurityStyleGuide.com
SPELLCHECKV2
INTRO AND RULES AND SUCH
DEFCON27
WELCOME TO THE BEE
01
CYBERSECURITY STYLE GUIDEV2ISCOMINGTHISFALL!!!
Check us out at cybersecuritystyleguide.com
#StyleGuideV2
cyber.dic
A spellcheck dictionary for your word processor
Introducing…
It’s on GitHub.
HOW THE BEE WORKS
01
The ruuuuuuules
7
EACH SPELLING COMES DIRECTLY FROM
V2 OF THE CYBERSECURITY STYLE GUIDE.
I AM THE AUTHOR AND THE AUTHORITY.
8
REPEAT THE TERM BACK TO ME
BEFORE SPELLING.
IF YOU HEARD IT WRONG,
YOU’LL SPELL IT WRONG.
YOU CAN ASK
FOR MORE INFO.
IF YOU DON’T ASK, AND YOU SPELL THE
WRONG THING, I WILL BE SAD FOR YOU
AND ASK YOU TO LEAVE THE STAGE.
PRONUNCIATION
PART OF SPEECH
EXAMPLE SENTENCE
ADDITIONAL INFO
You can’t change your letters
once you say them. Your first
answer is your final answer.
10
YOU CAN PRETEND TO
WRITE IN ANY WAY YOU
WANT, IF IT HELPS YOU.
WRITE IT IN THE AIR
TRACE IT ON YOUR
SHIRT OR ARM
AIR-TYPE IT
AIR-TEXT IT
THE FIRST 3 ROUNDS WILL BE ALL
LOWERCASE. THEN IT CHANGES.
BISHOPFOX PROPRIETARY | 2019 12
THE
ROUNDS
01
02
03
04
05-?
LOWERCASE TERMS ONLY
LOWERCASE TERMS ONLY
LOWERCASE TERMS ONLY
UPPERCASE TERMS ONLY
ANYTHING GOOOOOES
When capitalizing a term, you
can use a shift key or shift lock.
If you know it’s all caps, it might
help you to call it all out at once.
It’s up to you.
HOW TO DO
CAPITALS
14
When capitalizing a term, you
can be explicit about
lowercasing if you want.
If you don’t say “capital M” then
I assume you mean lowercase m,
but you can specify.
HOW TO DO
CAPITALS
15
If you are eliminated, the bell
will ding and the audience
will go AWWWWWWW.
16
If you are the first person eliminated in a
round, you might not be gone for good…
If we get down to two spellers,
they’ll have to spell 2 correctly
in a row to win.
If 5 spellers get out in a round of 6,
though, the bee endddds.
Then we take a picture.
HOW IT
ENDS
17
If the last two spellers are
difficult to eliminate, we may
announce variant rules to the
bee. EXPECT THE UNEXPECTED.
18
ALL SPELLERS GET TO KEEP THEIR
BADGES AS PARTICIPATION TROPHIES.
THE WINNER GETS A FEW OTHER THINGS.
BISHOPFOX PROPRIETARY | 2019 19
Pronunciation
Part of speech
Example sentence
Additional info (definition-ish)
WHAT YOU
CAN ASK
FOR
20
#SpellCheckV2
CybersecurityStyleGuide.com
THANK
YOU

More Related Content

PPTX
Evaluation question 7
PDF
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
PDF
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
PDF
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
PDF
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
PDF
Smarter Home Invasion With ZigDiggity
PDF
Hacking Exposed EBS Volumes
PDF
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting
Evaluation question 7
OWASP LA – SharePoint Hacking – 22Feb2012 – Slides.PDF
InfoSec World 2016 – RFIDiggity – Pentester Guide to Hacking HF/NFC and UHF...
InfoSec World 2013 – W4 – Using Google to Find Vulnerabilities in Your IT Env...
DEFCON 20 (2012) – Tenacious Diggity – 29July2012 – Slides.PDF
Smarter Home Invasion With ZigDiggity
Hacking Exposed EBS Volumes
Ghost in the Browser: Broad-Scale Espionage with Bitsquatting

More from Bishop Fox (19)

PDF
Ferris Bueller’s Guide to Abuse Domain Permutations
PDF
Check Your Privilege (Escalation)
PDF
Introduction to Linux Privilege Escalation Methods
PDF
Penetration Testing Resource Guide
PDF
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
PDF
How Perceptual Analysis Helps Bug Hunters
PDF
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale
PPTX
Evolving Cyber Adversary Simulation: How Red Teaming Benefits Organizations
PDF
ASU Cybersecurity Symposium - Breaking Into a Career of Breaking In
PDF
CactusCon 2018 - Anatomy of an AppSec Program
PDF
Preparing a Next Generation IT Strategy
PDF
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
PDF
Pulp Google Hacking
PDF
Black Hat USA - CloudBots Harvesting Crypto Coins Like a Botnet Farmer
PDF
RFID Hacking: Live Free or RFID Hard
PDF
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
PDF
Defeating Social Engineering, BECs & Phishing
PDF
DEF CON 25 (2017)- Game of Drones - Brown,Latimer - 29July2017 - Slides.PDF
PDF
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Ferris Bueller’s Guide to Abuse Domain Permutations
Check Your Privilege (Escalation)
Introduction to Linux Privilege Escalation Methods
Penetration Testing Resource Guide
Network Penetration Testing Toolkit - Nmap, Netcat, and Metasploit Basics
How Perceptual Analysis Helps Bug Hunters
Getting Buzzed on Buzzwords: Using Cloud & Big Data to Pentest at Scale
Evolving Cyber Adversary Simulation: How Red Teaming Benefits Organizations
ASU Cybersecurity Symposium - Breaking Into a Career of Breaking In
CactusCon 2018 - Anatomy of an AppSec Program
Preparing a Next Generation IT Strategy
Lord of the Bing: Taking Back Search Engine Hacking From Google and Bing
Pulp Google Hacking
Black Hat USA - CloudBots Harvesting Crypto Coins Like a Botnet Farmer
RFID Hacking: Live Free or RFID Hard
OWASP – Internet of Things (IoT) – Top 10 Vulnerabilities List
Defeating Social Engineering, BECs & Phishing
DEF CON 25 (2017)- Game of Drones - Brown,Latimer - 29July2017 - Slides.PDF
Black Hat USA 2016 - Highway to the Danger Drone - 03Aug2016 - Slides - UPDAT...
Ad

Recently uploaded (20)

PDF
What is Rotoscoping Best Software for Rotoscoping in 2025.pdf
PPTX
Social Awareness on Municipal Solid Waste.pptx
PDF
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
PPTX
just letters randomized coz i need to up
PDF
Can You Imagine? Read along and let’s see!
PDF
High-Quality PDF Backlinking for Better Rankings
PDF
CityofHorror_v1.1.pdf manual en español i
PDF
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
PPTX
understanding the Human DNA components database design
DOCX
Talking Owls and Time Travel: Lessons in Curiosity
PPTX
Introduction to NGO’s098765789709876.pptx
PDF
Download FL Studio Crack Latest version 2025
PDF
Hip Hop Culture – More Than Just Music & Style
PPTX
Squares64 Quiz, A chessboard of questions, crafted with care by @mahi_anmol_ ...
PPTX
Hacking Movie – Best Films on Cybercrime & Digital Intrigue
PPTX
PRECISION AGRICULTURE- 1.pptx for agriculture
DOC
UNG毕业证学历认证,阿莱恩特国际大学毕业证文凭证书
PPTX
701301-Happy Birthday Slideshow Template.pptx
DOCX
Elisabeth de Pot, the Witch of Flanders .
PPTX
The Pearl - project of Advanced Reading course
What is Rotoscoping Best Software for Rotoscoping in 2025.pdf
Social Awareness on Municipal Solid Waste.pptx
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
just letters randomized coz i need to up
Can You Imagine? Read along and let’s see!
High-Quality PDF Backlinking for Better Rankings
CityofHorror_v1.1.pdf manual en español i
WKA #29: "FALLING FOR CUPID" TRANSCRIPT.pdf
understanding the Human DNA components database design
Talking Owls and Time Travel: Lessons in Curiosity
Introduction to NGO’s098765789709876.pptx
Download FL Studio Crack Latest version 2025
Hip Hop Culture – More Than Just Music & Style
Squares64 Quiz, A chessboard of questions, crafted with care by @mahi_anmol_ ...
Hacking Movie – Best Films on Cybercrime & Digital Intrigue
PRECISION AGRICULTURE- 1.pptx for agriculture
UNG毕业证学历认证,阿莱恩特国际大学毕业证文凭证书
701301-Happy Birthday Slideshow Template.pptx
Elisabeth de Pot, the Witch of Flanders .
The Pearl - project of Advanced Reading course
Ad

SpellCheckV2 Rules