Knowledge

DEF CON

Source 📝

910:
conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.
3294: 812:. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance. 1909:, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened. A DEF CON source at NBC had tipped off organizers to Madigan's plans. 897: 1762:), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard. 1931:(CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares. The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show. 1984:, was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense." 765:. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as 1926:
students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston
2052:
The winner of the Cyber Grand Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania. Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest, where it finished in last place, despite pulling ahead of human teams often in a contest
904:
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a
1826:
meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek
1783:
In 2009, it was announced that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was in fact organising the CTF! "Hacking the top hacker contest seemed like a fun way to
918:
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village,
3153:
According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to
2033:
posted a statement, located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year." This was the first time in the organization's history that it had asked federal
836:
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people
909:
in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general
825:. In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a 2104:
In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.
870:). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas. 734:, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking 847:
In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to
1015:(CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars. 1041:
The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year. It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.
888:' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community. 1813:
with 9 bits bytes CPU. With its specifications released only 24h before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
1934:
In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.
2050:, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$ 2M grand prize. 4468: 2019:
said that NSA officials, including Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."
2004:
if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance. In June 2013, NSA surveillance programs which collected data on US citizens, such as
883:
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder
2113:
On May 8, 2020, the DEF CON in-person conference itself was cancelled and virtualized due to COVID-19. DEF CON Safe Mode was held August 6–9 online with a full roster of talks, villages, contests and events.
943:
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
4472: 2220:" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations. 792:) and other agencies regularly attend DEF CON. Some have considered DEF CON to be the "world's largest" hacker con given its attendee size and the number of other conferences modeling themselves after it. 1927:
T subway. However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the
995:
and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
48: 4449: 1003:
Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress to name a few.
1784:
introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the Defcon 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
1026:
entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the
1735:
In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
844:. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences. 4418: 4247: 4373: 3965:"4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download" 3426: 905:
non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the
3374: 5054: 1919: 5197: 1990: 859:
the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
4808: 5008: 4562: 935:
and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
394: 789: 1742:
took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including
4637: 2229: 5212: 3608: 785: 1822:
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the
1860:(later discovered to be infected with the CIH virus) at DEF CON 7, in what was, at the time, the largest presentation in DEF CON history. 2193: 674: 4426: 3070: 1765:
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
3933: 2091:
was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with the
2201: 4377: 2070:
DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure
781: 4255: 5217: 4329:
Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology
1923: 504: 5092: 17: 4674:"WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…" 4938: 1023: 777: 4492: 2122:
On February 4, 2024, Cesar's Entertainment cancelled the contract with DEF CON without warning with speculation that a
958:
QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
198: 5051: 4346: 4215: 2069: 1998: 5202: 1012: 971:
and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking
762: 43: 1980:, gave the keynote speech. During the question and answers session, the first question for Alexander, fielded by 773: 215: 4962: 4512: 4314: 2662: 2643: 2624: 2605: 2126:
attack and bomb scare and subsequent evacuation in 2023 were in part to blame. The conference was moved to the
988: 667: 4815: 3950: 3178:
Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
2149: 932: 607: 404: 287: 277: 4760: 2217: 2156:. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention. 3032: 2006: 1928: 1809:
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a
703: 314: 302: 3307:"Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled" 5207: 4450:
Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)
4084: 2287: 2268: 2127: 1964:
used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.
389: 4110: 4012: 2928: 2757: 2738: 2719: 2700: 2681: 2454: 2353: 2322: 2233:, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives". 2088: 2047: 1949: 1823: 1803: 1030: 723: 626: 364: 4547: 660: 409: 3400: 1891:
used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the
4615: 3306: 1973: 1945: 585: 544: 514: 464: 5178:
The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
3612: 3094: 1776:
were inverted), allowing them to have such a massive lead that they spent most of the CTF playing
5072: 4719: 4125: 3049: 2909: 1019: 324: 31: 5172: 4983: 4027: 3136: 2242:
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
5182: 4399: 3345: 3004: 2168: 920: 738:). Contests held during the event are extremely varied and can range from creating the longest 579: 4170: 1806:
program, where teams wrote autonomous systems to play the game without any human interaction.
4782: 2419: 2349: 2318: 2072:" summarizing its findings. The findings were publicly released at an event sponsored by the 1755: 731: 5073:"Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued" 2200:), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, 5105: 4734: 4677: 2586: 2563: 2450: 2376: 2186: 1987: 1853: 1747: 968: 754: 597: 539: 459: 4673: 4458:. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted" 3293: 1952:
capturing data from an unknown number of hackers attending the DEF CON hacker conference.
8: 4917: 3668: 3027: 2966: 2181: 1011:
The Black Badge is the highest award DEF CON gives to contest winners of certain events.
574: 399: 309: 3566: 714:. The first DEF CON took place in June 1993 and today many attendees at DEF CON include 5136: 5028: 3229: 3166: 2500: 2458: 2427: 2345: 2314: 2204: 2030: 1981: 1977: 972: 885: 801: 135: 4145: 4042: 2159:
A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by
4893: 4840: 4647: 3288: 3137:"Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape" 3038: 2077: 1857: 862:
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via
735: 715: 569: 532: 499: 3654: 3591:"Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity" 3590: 2179:
A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of
804:
as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a
5109: 5077: 5063: 5009:""Black Hat and Defcon see record attendance — even without the government spooks"" 4333: 3989: 3375:"A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards" 3359: 2291: 2092: 2073: 1751: 900:
Multiple, electronic and non-electronic, DEF CON human badges and other con badges.
863: 826: 707: 549: 250: 5177: 4885: 3327: 3215: 3191: 5058: 3055: 2582: 2559: 2446: 2372: 2197: 2153: 2087:, the 23-year-old British security researcher who was credited with stopping the 1869: 1827:
permission to make a logo that includes the official DEF CON logo with approval.
1769: 329: 220: 189: 4306: 2038:
visited the convention to study the DEF CON culture for an upcoming movie role.
4592:"DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org" 2540: 2496: 2173: 2160: 2063: 2010: 1961: 833:. The official name of the conference includes a space in-between DEF and CON. 758: 638: 469: 422: 352: 233: 210: 4063: 3427:"11-year-old hacks replica of Florida state website, changes election results" 3233: 5191: 4897: 4651: 4220: 2985: 2415: 2395: 2341: 2310: 2224: 2001: 1888: 1873: 1810: 1208: 722:, lawyers, federal government employees, security researchers, students, and 474: 369: 266: 39: 3836: 3812: 3788: 3764: 3634: 30:
This article is about the computer security convention. For other uses, see
4642: 3311: 2477: 1905: 1792: 1773: 924: 562: 429: 382: 237: 4638:"Briton who stopped WannaCry attack arrested over separate malware claims" 4225: 4591: 4570: 4508: 4350: 4190: 3964: 2890: 2871: 2852: 2833: 2814: 2795: 2776: 2144: 2084: 1777: 1033:
at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
906: 750: 727: 632: 519: 256: 5163: 3990:"Defcon Capture the Flag: defending vulnerable code from intense attack" 3282: 4864: 4695: 3259: 3141: 2123: 2035: 1743: 1307: 1018:
In April 2017, a DEF CON Black Badge was featured in an exhibit in the
719: 489: 484: 261: 1798:
In 2016, the 15th edition of the CTF was done in partnership with the
4735:"DEF CON is canceled! No, really this time – but the show will go on" 3074: 3061: 2212: 1994: 1892: 1835:
High-profile issues which have garnered significant media attention.
1768:
In 2008, the Sk3wl of Root team took advantage of a bug in the game (
992: 928: 830: 509: 359: 339: 244: 205: 98: 5183:
Transcript, audio, video of Jess Moss describing DEF CON's inception
3451: 4476: 4332: (United States District Court District of Massachusetts), 4277: 3043: 2947: 2423: 1872:
was arrested the day after DEF CON for writing software to decrypt
1787:
In 2011, the team "lollerskaters dropping from roflcopters" used a
1759: 856: 849: 817: 766: 742:
connection to finding the most effective way to cool a beer in the
603: 334: 282: 3493: 3058:, a community supported conference with locations across the globe 5146: 4681: 4530:"ForAllSecure | Mayhem Security | Application Security" 3908: 3884: 3860: 3401:"Is this the most puzzling DEF CON attendee badge yet on record?" 2520: 2166:
A trip to DEF CON for a hacker showdown figures into the plot of
1739: 1281: 1233: 867: 840:
For DEF CON's 20th Anniversary, a film was commissioned entitled
805: 591: 479: 454: 447: 4563:"Hackers breach dozens of voting machines brought to conference" 4028:"Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11" 3064:, the first American hacker conference, organized by members of 896: 4696:"DEF CON 28 in-person conference is CANCELLED - DEF CON Forums" 4454: 3517: 3065: 2176:
came to Las Vegas and screened the film at DEF CON Movie Night.
2015: 1876: 822: 809: 743: 711: 645: 494: 434: 272: 102: 4088: 3114: 5158: 4516: 4419:"Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON" 3740: 3716: 3692: 1799: 1027: 967:
Workshops are dedicated classes on various topics related to
739: 4529: 3541: 955:
Linecon, any long line has the potential to turn into a con.
5167: 5141: 5097: 4496: 4469:
Hackers Don't Believe NSA Chief's Denial of Domestic Spying
4282: 1788: 976: 949: 4616:"O'Reilly Security Conference in NYC 2017 Defender Awards" 987:
Since DEF CON 11, fundraisers have been conducted for the
5129: 5052:
DefCon's Moss: Undercover Reporter Damages 'Neutral Zone'
4191:"Official forums social group section for DEF CON groups" 3994:
DARPA Information Survivability Conference and Exposition
3567:"DEF CON® Hacking Conference – Black Badge Hall of Fame" 3154:
gather intelligence on the latest techniques of hackers.
2068:
In September 2017, the Voting Machine Village produced "
3635:"DEF CON Hacking Conference - Capture the Flag Archive" 3469: 4761:"Caesars Ransomware Attack, MGM Hit Linked To DEFCON?" 4111:"Buffer overflow in handling of UNIX socket addresses" 2192:. The primary antagonist of the film, a fictionalized 1920:
Massachusetts Bay Transportation Authority v. Anderson
823:
U.S. Armed Forces defense readiness condition (DEFCON)
1948:
kiosk was positioned in the conference center of the
170: 5006: 5002: 5000: 4931: 4108: 2083:Marcus Hutchins, better known online by his handle 2046:On August 4, 2016, DEF CON and DARPA co-hosted the 4444: 4442: 4440: 4438: 4436: 4025: 3254: 3252: 4487: 4485: 4417:Fisher, Dennis; Roberts, Paul (August 10, 2011). 4216:"Exploit writers team up to target Cisco routers" 3260:"Def Con 27 Transparency Report - DEF CON Forums" 2163:, demonstrates some of the early DEF CON culture. 2062:At the "Voting Machine Village" event, dozens of 1997:quoted the 2012 DEF CON keynote speech and asked 1903:In August 2007, Michelle Madigan, a reporter for 800:DEF CON was founded in 1993, by then 18-year-old 5189: 4997: 4955: 4248:"Transcript: Michelle Madigan's run from Defcon" 2237: 5173:A first ever look inside the DEF CON NOC (2008) 5106:To Fix Voting Machines, Hackers Tear Them Apart 4910: 4671: 4513:Feds 'not welcome' at DEF CON hacker conference 4433: 3652: 3249: 4783:"Bomb scare causes mass evacuation at DEF CON" 4482: 2230:Lo and Behold, Reveries of the Connected World 1795:, causing havoc in the game's infrastructure. 4841:"DEF CON® Hacking Conference – Show Archives" 4479:. August 1, 2012. Retrieved on June 13, 2013. 4416: 4374:"Antivirus Vendors Slam Defcon Virus Contest" 4085:"Diutinus Defense Techonologies Corp. / Home" 3951:"Defcon 9 - Capture The Flag Contest Network" 3741:"Diutinus Defense Techonologies Corp. / Home" 3717:"Diutinus Defense Techonologies Corp. / DC18" 3693:"Diutinus Defense Techonologies Corp. / DC17" 3115:"DefCon Beverage Cooling Contraption Contest" 668: 5198:Las Vegas Valley conventions and trade shows 4865:"DEF CON 32 Was Canceled. We Un-Canceled it" 4519:. July 11, 2013. Retrieved on July 11, 2013. 4499:. July 11, 2013. Retrieved on July 12, 2013. 4307:"MIT Students Gagged by Federal Court Judge" 4013:"Defcon 10 - Capture the Flag (CTF) contest" 2053:for which it was not specifically designed. 1791:in FreeBSD (namely CVE-2011-4062) to escape 27:Annual hacker gathering in Las Vegas, Nevada 5021: 2136: 1730: 5093:NSA director finally greets Defcon hackers 4806: 4560: 3655:"A history of Capture the Flag at DEF CON" 3398: 3292: 749:Other contests, past and present, include 675: 661: 5070: 4636:Hern, Alex; Levin, Sam (August 4, 2017). 4635: 4493:Defcon to feds: 'We need some time apart' 4010: 2066:brought to the conference were breached. 4976: 4371: 4146:"Cyber Grand Challenge (CGC) (Archived)" 3372: 3130: 3128: 895: 772:Federal law enforcement agents from the 4758: 4548:"DEF CON Capture the Flag Final Scores" 4304: 3987: 3373:Oberhaus, Daniel (September 18, 2018). 979:, fuzzing and attacking smart devices. 938: 782:United States Postal Inspection Service 14: 5190: 4984:""Gray Tier Technologies at DEFCON23"" 4275: 4245: 4239: 4040: 3424: 3134: 815:The term DEF CON comes from the movie 74:Security Conference, Hacker Conference 4759:Khaitan, Ashish (14 September 2023). 4213: 4207: 4065:A Brief History of CTF - Jordan Wiens 3931: 3648: 3646: 3644: 3192:"DEF CON® Hacking Conference – About" 3125: 3073:, a yearly hacker conference held in 1868:On July 16, 2001, Russian programmer 855:In 2020, due to safety concerns over 5213:Recurring events established in 1993 4780: 4732: 4123: 4026:The Ghetto Hackers (June 29, 2003). 3399:McAllister, Neil (August 12, 2015). 1830: 808:protocol based hacking network from 5071:Greenberg, Andy (August 10, 2023). 5007:Richard Byrne Reilly (2014-08-12). 4298: 4269: 4168: 3564: 3518:"DEF CON Crash and Compile Contest" 3189: 3046:, a quadrennial European convention 1036: 1024:National Museum of American History 395:forensics-focused operating systems 24: 5044: 4939:""Voting Machine Hacking Village"" 4883: 4397: 4376:. IDG News Service. Archived from 4109:The FreeBSD Project (2011-09-28). 3641: 3325: 2227:included DEF CON in his 2016 film 991:(EFF). The first fundraiser was a 25: 5229: 5116: 4672:@VotingVillageDC (6 March 2018). 3425:Molina, Brett (August 14, 2018). 2034:authorities not to attend. Actor 1999:Director of National Intelligence 4720:"DEF CON Safe Mode archive site" 3909:"CTFtime.org / DEF CON CTF 2024" 3885:"CTFtime.org / DEF CON CTF 2023" 3861:"CTFtime.org / DEF CON CTF 2022" 3632: 3470:"Hacker Jeopardy for DEF CON 28" 2076:and the paper went on to win an 1991:Select Committee on Intelligence 5147:DEF CON v3 Tor .onion addresses 4877: 4857: 4833: 4800: 4774: 4752: 4726: 4712: 4688: 4665: 4629: 4608: 4584: 4554: 4540: 4522: 4502: 4461: 4410: 4400:"Malicious ATM Catches Hackers" 4391: 4372:McMillan, Robert (April 2008). 4365: 4339: 4321: 4305:Jeschke, Rebecca (2008-08-09). 4246:Cassel, David (4 August 2007). 4183: 4162: 4138: 4117: 4102: 4077: 4056: 4034: 4019: 4004: 3981: 3957: 3943: 3925: 3901: 3877: 3853: 3829: 3805: 3781: 3757: 3733: 3709: 3685: 3661: 3626: 3601: 3583: 3558: 3534: 3510: 3486: 3462: 3444: 3418: 3392: 3366: 3352: 3338: 3319: 3299: 216:Hacking of consumer electronics 4809:"Cyber Christ Meets Lady Luck" 3276: 3222: 3208: 3183: 3159: 3107: 3087: 2142:DEF CON was also portrayed in 1557:Legitimate Business Syndicate 1534:Legitimate Business Syndicate 1511:Legitimate Business Syndicate 1488:Legitimate Business Syndicate 1465:Legitimate Business Syndicate 1006: 989:Electronic Frontier Foundation 982: 13: 1: 5218:1993 establishments in Nevada 3135:Zetter, Kim (3 August 2007). 3081: 2967:Tropicana Resort & Casino 2948:Monte Carlo Resort and Casino 2238:Venues, dates, and attendance 2152:" featuring an appearance by 1758:, SubDomain (the ancestor of 1190:Ghetto Hackers & digirev 873: 4561:Joe Uchill (July 29, 2017). 4276:Lundin, Leigh (2008-08-17). 4126:"Defcon 19 CTF - CTF Inside" 4087:. 2011-05-14. Archived from 3033:Chaos Communication Congress 1986:On March 12, 2013, during a 1929:Computer Fraud and Abuse Act 962: 757:, art, slogan, coffee wars, 315:Chaos Communication Congress 7: 4944:. September 2017. p. 4 4214:Lamos, Rob (31 July 2005). 3988:Crispin, Cowan (May 2003). 3021: 2288:Las Vegas Convention Center 2269:Las Vegas Convention Center 2128:Las Vegas Convention Center 1856:hacker collective released 1612:Plaid Parliament of Pwning 1566:Plaid Parliament of Pwning 1543:Plaid Parliament of Pwning 1497:Plaid Parliament of Pwning 1474:Plaid Parliament of Pwning 1046:Capture the Flag Timeline 998: 913: 726:with a general interest in 10: 5234: 4406:– via www.wired.com. 4171:"cLEMENCy - Showing Mercy" 3346:"DEF CON 28 Safe Mode FAQ" 2929:Aladdin Hotel & Casino 2758:Riviera Hotel & Casino 2739:Riviera Hotel & Casino 2720:Riviera Hotel & Casino 2701:Riviera Hotel & Casino 2682:Riviera Hotel & Casino 2048:2016 Cyber Grand Challenge 1917: 1724:Maple Mallard Magistrates 1702:Maple Mallard Magistrates 1680:Maple Mallard Magistrates 1031:2016 Cyber Grand Challenge 878: 795: 627:2600: The Hacker Quarterly 365:List of computer criminals 29: 4618:. conferences.oreilly.com 2218:eps3.0_power-saver-mode.h 2080:Defender Research Award. 1817: 891: 755:robotics-related contests 165: 157: 149: 141: 131: 116: 108: 94: 86: 78: 70: 62: 57: 5164:DEF CON: The Documentary 5159:DEF CON: The Documentary 4918:""DEF CON Transparency"" 3934:"Capture the Flag Games" 3669:"A Brief History of CTF" 3653:vulc@n of DDTek (2023). 3494:"DEF CON Scavenger Hunt" 2910:Plaza Hotel & Casino 2185:, the fifth film of the 2137:Entertainment references 1974:National Security Agency 1731:Capture the Flag History 545:Cloud computing security 5203:Annual events in Nevada 3609:"Mayhem Wins DARPA CGC" 3284:DEFCON: The Documentary 3077:, California since 1999 3050:Hackers on Planet Earth 2986:Sahara Hotel and Casino 1944:WIRED reported that an 1020:Smithsonian Institution 842:DEFCON: The Documentary 325:Hackers on Planet Earth 44:Infobox recurring event 36: 32:Defcon (disambiguation) 4044:A Brief History of CTF 3595:americanhistory.si.edu 3498:DEF CON Scavenger Hunt 3005:Sands Hotel and Casino 2663:Rio Hotel & Casino 2644:Rio Hotel & Casino 2625:Rio Hotel & Casino 2606:Rio Hotel & Casino 1852:On July 10, 1999, the 1649:Order Of the Overflow 1626:Order Of the Overflow 1603:Order Of the Overflow 1583:MIPS, x86 & armv7 1580:Order Of the Overflow 1514:MIPS, x86 & armv7 975:devices, playing with 948:Queercon, a meetup of 901: 580:Homebrew Computer Club 120:June 9, 1993 49:considered for merging 4041:Jordan (2021-04-06), 3932:Riley, Eller (2004). 3328:"Defcon is Cancelled" 2093:Kronos banking trojan 1804:Cyber Grand Challenge 1738:In 2002, the company 1606:x86, arm64, esoteric 1402:FreeBSD & Debian 931:, and the well known 899: 837:attended DEF CON 27. 732:computer architecture 4963:""Norton at DefCon"" 4886:"Defcon Is Canceled" 2009:, had been exposed. 1988:United States Senate 1972:The director of the 1950:Riviera Hotel Casino 1854:Cult of the Dead Cow 1756:non-executable stack 1428:European Nopsleders 969:information security 939:Internal Conferences 598:Masters of Deception 540:Application security 18:DEF CON (convention) 4550:. blog.legitbs.net. 3837:"OOO — DEF CON CTF" 3813:"OOO — DEF CON CTF" 3789:"OOO — DEF CON CTF" 3673:psifertex.github.io 3565:Tangent, The Dark. 3522:crashandcompile.org 3235:The Story of DEFCON 3190:Tangent, The Dark. 3095:"Def Con 1 Archive" 3028:Black Hat Briefings 2914:July 31 – August 2 2800:July 30 – August 1 2705:July 30 – August 2 2686:July 30 – August 1 1716:Nautilus Institute 1694:Nautilus Institute 1672:Nautilus Institute 1214:Digital Revelation 1047: 575:Chaos Computer Club 310:Black Hat Briefings 184:Part of a series on 5208:Hacker conventions 5104:Newman, Lily Hay " 5057:2019-09-24 at the 4884:Newman, Lily Hay. 4467:Wagenseil, Paul. " 4448:Greenberg, Andy. " 3765:"DEF CON CTF 2018" 3326:Newman, Lily Hay. 3142:Wired Blog Network 2891:Alexis Park Resort 2872:Alexis Park Resort 2853:Alexis Park Resort 2834:Alexis Park Resort 2815:Alexis Park Resort 2796:Alexis Park Resort 2777:Alexis Park Resort 2474:DEF CON China 1.0 2392:DEF CON Safe Mode 2205:Keith B. Alexander 2029:On July 11, 2013, 1978:Keith B. Alexander 1887:On July 31, 2005, 1770:privilege dropping 1045: 933:Social Engineering 902: 821:, referencing the 405:Social engineering 5067:. August 6, 2007. 4491:Whitney, Lance. " 4423:Business Security 4278:"Dangerous Ideas" 3841:OOO — DEF CON CTF 3817:OOO — DEF CON CTF 3793:OOO — DEF CON CTF 3769:OOO — DEF CON CTF 3456:Aerospace Village 3232:(July 30, 2007). 3167:"DEFCON 15 FAQ's" 3039:Electronic voting 3019: 3018: 2216:Season 3 opener " 2134: 2133: 2089:WannaCry outbreak 1993:hearing, Senator 1960:Security company 1895:used on routers. 1858:Back Orifice 2000 1831:Notable incidents 1802:, as part of its 1728: 1727: 1652:x86, microengine 1609:Linux, iOS, Xbox 1491:armv7 & i386 829:, a reference to 716:computer security 706:held annually in 704:hacker convention 690:(also written as 685: 684: 533:Computer security 500:Keystroke logging 179: 178: 153:August 7-10, 2025 145:August 8-11, 2024 16:(Redirected from 5225: 5133: 5132: 5130:Official website 5101:. July 27, 2012. 5091:Mills, Elinor. " 5088: 5086: 5085: 5064:Information Week 5039: 5038: 5036: 5035: 5029:"DEF CON 17 FAQ" 5025: 5019: 5018: 5016: 5015: 5004: 4995: 4994: 4992: 4991: 4980: 4974: 4973: 4971: 4970: 4965:. September 2019 4959: 4953: 4952: 4950: 4949: 4943: 4935: 4929: 4928: 4926: 4925: 4914: 4908: 4907: 4905: 4904: 4881: 4875: 4874: 4872: 4871: 4861: 4855: 4854: 4852: 4851: 4837: 4831: 4830: 4828: 4826: 4820: 4814:. Archived from 4813: 4807:Winn Schwartau. 4804: 4798: 4797: 4795: 4793: 4778: 4772: 4771: 4769: 4767: 4756: 4750: 4749: 4747: 4745: 4730: 4724: 4723: 4716: 4710: 4709: 4707: 4706: 4700:forum.defcon.org 4692: 4686: 4685: 4669: 4663: 4662: 4660: 4658: 4633: 4627: 4626: 4624: 4623: 4612: 4606: 4605: 4603: 4602: 4588: 4582: 4581: 4579: 4577: 4558: 4552: 4551: 4544: 4538: 4537: 4526: 4520: 4506: 4500: 4489: 4480: 4465: 4459: 4446: 4431: 4430: 4425:. Archived from 4414: 4408: 4407: 4395: 4389: 4388: 4386: 4385: 4369: 4363: 4362:Contest concept. 4361: 4359: 4358: 4349:. Archived from 4343: 4337: 4331: 4325: 4319: 4318: 4302: 4296: 4295: 4293: 4292: 4287:. Criminal Brief 4273: 4267: 4266: 4264: 4263: 4254:. Archived from 4243: 4237: 4236: 4234: 4233: 4224:. Archived from 4211: 4205: 4204: 4202: 4201: 4187: 4181: 4180: 4178: 4177: 4166: 4160: 4159: 4157: 4156: 4142: 4136: 4135: 4133: 4132: 4121: 4115: 4114: 4106: 4100: 4099: 4097: 4096: 4081: 4075: 4074: 4073: 4072: 4060: 4054: 4053: 4052: 4051: 4038: 4032: 4031: 4023: 4017: 4016: 4008: 4002: 4001: 3985: 3979: 3978: 3976: 3975: 3961: 3955: 3954: 3947: 3941: 3940: 3938: 3929: 3923: 3922: 3920: 3919: 3905: 3899: 3898: 3896: 3895: 3881: 3875: 3874: 3872: 3871: 3857: 3851: 3850: 3848: 3847: 3833: 3827: 3826: 3824: 3823: 3809: 3803: 3802: 3800: 3799: 3785: 3779: 3778: 3776: 3775: 3761: 3755: 3754: 3752: 3751: 3737: 3731: 3730: 3728: 3727: 3713: 3707: 3706: 3704: 3703: 3689: 3683: 3682: 3680: 3679: 3665: 3659: 3658: 3650: 3639: 3638: 3630: 3624: 3623: 3621: 3620: 3611:. Archived from 3605: 3599: 3598: 3597:. 20 April 2017. 3587: 3581: 3580: 3578: 3577: 3562: 3556: 3555: 3553: 3552: 3546:hackfortress.net 3538: 3532: 3531: 3529: 3528: 3514: 3508: 3507: 3505: 3504: 3490: 3484: 3483: 3481: 3480: 3466: 3460: 3459: 3448: 3442: 3441: 3439: 3437: 3422: 3416: 3415: 3413: 3411: 3396: 3390: 3389: 3387: 3385: 3379:Vice Motherboard 3370: 3364: 3363: 3360:"DEF CON 29 FAQ" 3356: 3350: 3349: 3342: 3336: 3335: 3323: 3317: 3316: 3303: 3297: 3296: 3280: 3274: 3273: 3271: 3270: 3264:forum.defcon.org 3256: 3247: 3246: 3244: 3242: 3226: 3220: 3219: 3212: 3206: 3205: 3203: 3202: 3187: 3181: 3180: 3175: 3173: 3163: 3157: 3156: 3150: 3149: 3132: 3123: 3122: 3111: 3105: 3104: 3102: 3101: 3091: 2482:May 31 – June 2 2455:Planet Hollywood 2248:Conference Name 2245: 2244: 2074:Atlantic Council 1838: 1837: 1057:Competing Teams 1048: 1044: 1037:Capture the flag 1013:Capture the flag 827:telephone keypad 763:Capture the Flag 677: 670: 663: 550:Network security 251:Hacker Manifesto 190:Computer hacking 181: 180: 175: 172: 127: 125: 55: 54: 52: 21: 5233: 5232: 5228: 5227: 5226: 5224: 5223: 5222: 5188: 5187: 5128: 5127: 5119: 5112:August 1, 2017. 5083: 5081: 5059:Wayback Machine 5047: 5045:Further reading 5042: 5033: 5031: 5027: 5026: 5022: 5013: 5011: 5005: 4998: 4989: 4987: 4982: 4981: 4977: 4968: 4966: 4961: 4960: 4956: 4947: 4945: 4941: 4937: 4936: 4932: 4923: 4921: 4916: 4915: 4911: 4902: 4900: 4882: 4878: 4869: 4867: 4863: 4862: 4858: 4849: 4847: 4839: 4838: 4834: 4824: 4822: 4821:on 18 July 2011 4818: 4811: 4805: 4801: 4791: 4789: 4781:Thompson, Ian. 4779: 4775: 4765: 4763: 4757: 4753: 4743: 4741: 4733:Thompson, Ian. 4731: 4727: 4718: 4717: 4713: 4704: 4702: 4694: 4693: 4689: 4670: 4666: 4656: 4654: 4634: 4630: 4621: 4619: 4614: 4613: 4609: 4600: 4598: 4590: 4589: 4585: 4575: 4573: 4559: 4555: 4546: 4545: 4541: 4528: 4527: 4523: 4507: 4503: 4490: 4483: 4466: 4462: 4447: 4434: 4415: 4411: 4396: 4392: 4383: 4381: 4370: 4366: 4356: 4354: 4345: 4344: 4340: 4327: 4326: 4322: 4303: 4299: 4290: 4288: 4274: 4270: 4261: 4259: 4252:Tech.Blorge.com 4244: 4240: 4231: 4229: 4212: 4208: 4199: 4197: 4189: 4188: 4184: 4175: 4173: 4167: 4163: 4154: 4152: 4144: 4143: 4139: 4130: 4128: 4122: 4118: 4107: 4103: 4094: 4092: 4083: 4082: 4078: 4070: 4068: 4062: 4061: 4057: 4049: 4047: 4039: 4035: 4024: 4020: 4011:Ghettohackers. 4009: 4005: 3986: 3982: 3973: 3971: 3969:slideplayer.com 3963: 3962: 3958: 3949: 3948: 3944: 3936: 3930: 3926: 3917: 3915: 3907: 3906: 3902: 3893: 3891: 3883: 3882: 3878: 3869: 3867: 3859: 3858: 3854: 3845: 3843: 3835: 3834: 3830: 3821: 3819: 3811: 3810: 3806: 3797: 3795: 3787: 3786: 3782: 3773: 3771: 3763: 3762: 3758: 3749: 3747: 3739: 3738: 3734: 3725: 3723: 3715: 3714: 3710: 3701: 3699: 3691: 3690: 3686: 3677: 3675: 3667: 3666: 3662: 3651: 3642: 3631: 3627: 3618: 3616: 3607: 3606: 3602: 3589: 3588: 3584: 3575: 3573: 3563: 3559: 3550: 3548: 3540: 3539: 3535: 3526: 3524: 3516: 3515: 3511: 3502: 3500: 3492: 3491: 3487: 3478: 3476: 3468: 3467: 3463: 3450: 3449: 3445: 3435: 3433: 3423: 3419: 3409: 3407: 3405:The Register UK 3397: 3393: 3383: 3381: 3371: 3367: 3358: 3357: 3353: 3344: 3343: 3339: 3324: 3320: 3305: 3304: 3300: 3281: 3277: 3268: 3266: 3258: 3257: 3250: 3240: 3238: 3228: 3227: 3223: 3214: 3213: 3209: 3200: 3198: 3188: 3184: 3171: 3169: 3165: 3164: 3160: 3147: 3145: 3133: 3126: 3113: 3112: 3108: 3099: 3097: 3093: 3092: 3088: 3084: 3056:Security BSides 3024: 2516:DEF CON China 2240: 2198:Tommy Lee Jones 2154:The Lone Gunmen 2150:Three of a Kind 2139: 2064:voting machines 1932: 1922: 1870:Dmitry Sklyarov 1833: 1820: 1733: 1252:Ghetto Hackers 1228:Ghetto Hackers 1203:Ghetto Hackers 1169:Ghetto Hackers 1149:Ghetto Hackers 1039: 1009: 1001: 985: 965: 941: 916: 894: 881: 876: 798: 718:professionals, 681: 652: 651: 621: 613: 612: 565: 555: 554: 535: 525: 524: 450: 440: 439: 425: 415: 414: 385: 375: 374: 355: 345: 344: 330:Security BSides 305: 295: 294: 240: 226: 225: 221:List of hackers 201: 169: 123: 121: 53: 37: 35: 28: 23: 22: 15: 12: 11: 5: 5231: 5221: 5220: 5215: 5210: 5205: 5200: 5186: 5185: 5180: 5175: 5170: 5161: 5150: 5149: 5144: 5142:DEF CON Groups 5139: 5134: 5118: 5117:External links 5115: 5114: 5113: 5102: 5089: 5068: 5046: 5043: 5041: 5040: 5020: 4996: 4975: 4954: 4930: 4909: 4876: 4856: 4845:www.defcon.org 4832: 4799: 4773: 4751: 4725: 4711: 4687: 4680:) – via 4664: 4628: 4607: 4583: 4553: 4539: 4521: 4501: 4481: 4460: 4432: 4429:on 2011-08-10. 4409: 4390: 4364: 4347:"Race to Zero" 4338: 4320: 4297: 4268: 4238: 4206: 4195:DEF CON Forums 4182: 4161: 4137: 4116: 4101: 4076: 4055: 4033: 4018: 4003: 3980: 3956: 3942: 3924: 3900: 3876: 3852: 3828: 3804: 3780: 3756: 3732: 3708: 3684: 3660: 3640: 3625: 3600: 3582: 3571:www.defcon.org 3557: 3542:"Hackfortress" 3533: 3509: 3485: 3461: 3443: 3417: 3391: 3365: 3351: 3337: 3318: 3298: 3275: 3248: 3221: 3216:"DEFCON about" 3207: 3196:www.defcon.org 3182: 3158: 3124: 3106: 3085: 3083: 3080: 3079: 3078: 3068: 3059: 3053: 3047: 3041: 3036: 3030: 3023: 3020: 3017: 3016: 3013: 3010: 3007: 3002: 2998: 2997: 2994: 2991: 2988: 2983: 2979: 2978: 2975: 2972: 2969: 2964: 2960: 2959: 2956: 2953: 2950: 2945: 2941: 2940: 2937: 2934: 2931: 2926: 2922: 2921: 2918: 2915: 2912: 2907: 2903: 2902: 2899: 2896: 2893: 2888: 2884: 2883: 2880: 2877: 2874: 2869: 2865: 2864: 2861: 2858: 2855: 2850: 2846: 2845: 2842: 2839: 2836: 2831: 2827: 2826: 2823: 2820: 2817: 2812: 2808: 2807: 2804: 2801: 2798: 2793: 2789: 2788: 2785: 2782: 2779: 2774: 2770: 2769: 2766: 2763: 2760: 2755: 2751: 2750: 2747: 2744: 2741: 2736: 2732: 2731: 2728: 2725: 2722: 2717: 2713: 2712: 2709: 2706: 2703: 2698: 2694: 2693: 2690: 2687: 2684: 2679: 2675: 2674: 2671: 2668: 2665: 2660: 2656: 2655: 2652: 2649: 2646: 2641: 2637: 2636: 2633: 2630: 2627: 2622: 2618: 2617: 2614: 2611: 2608: 2603: 2599: 2598: 2595: 2592: 2589: 2580: 2576: 2575: 2572: 2569: 2566: 2557: 2553: 2552: 2549: 2546: 2543: 2541:Caesars Palace 2538: 2534: 2533: 2530: 2527: 2524: 2519:Kuntai Hotel ( 2517: 2513: 2512: 2509: 2506: 2503: 2497:Caesars Palace 2494: 2490: 2489: 2486: 2483: 2480: 2475: 2471: 2470: 2467: 2464: 2461: 2444: 2440: 2439: 2436: 2433: 2430: 2412: 2408: 2407: 2404: 2401: 2398: 2393: 2389: 2388: 2385: 2382: 2379: 2370: 2366: 2365: 2362: 2359: 2356: 2350:Harrah's Hotel 2339: 2335: 2334: 2331: 2328: 2325: 2319:Harrah's Hotel 2308: 2304: 2303: 2300: 2297: 2294: 2285: 2281: 2280: 2277: 2274: 2271: 2266: 2262: 2261: 2258: 2255: 2252: 2249: 2239: 2236: 2235: 2234: 2223:Documentarian 2221: 2208: 2177: 2174:William Eubank 2164: 2161:Winn Schwartau 2157: 2138: 2135: 2132: 2131: 2120: 2116: 2115: 2111: 2107: 2106: 2102: 2098: 2097: 2060: 2056: 2055: 2044: 2040: 2039: 2027: 2023: 2022: 2011:Andy Greenberg 1970: 1966: 1965: 1962:HBGary Federal 1958: 1954: 1953: 1942: 1938: 1937: 1918:Main article: 1915: 1911: 1910: 1901: 1897: 1896: 1885: 1881: 1880: 1866: 1862: 1861: 1850: 1846: 1845: 1842: 1832: 1829: 1819: 1816: 1732: 1729: 1726: 1725: 1722: 1720: 1717: 1714: 1711: 1708: 1704: 1703: 1700: 1698: 1695: 1692: 1689: 1686: 1682: 1681: 1678: 1676: 1673: 1670: 1667: 1664: 1660: 1659: 1656: 1653: 1650: 1647: 1644: 1641: 1637: 1636: 1633: 1630: 1629:x86, esoteric 1627: 1624: 1621: 1618: 1614: 1613: 1610: 1607: 1604: 1601: 1598: 1595: 1591: 1590: 1587: 1584: 1581: 1578: 1575: 1572: 1568: 1567: 1564: 1561: 1558: 1555: 1552: 1549: 1545: 1544: 1541: 1538: 1535: 1532: 1529: 1526: 1522: 1521: 1518: 1515: 1512: 1509: 1506: 1503: 1499: 1498: 1495: 1492: 1489: 1486: 1483: 1480: 1476: 1475: 1472: 1469: 1466: 1463: 1460: 1457: 1453: 1452: 1449: 1446: 1443: 1440: 1437: 1434: 1430: 1429: 1426: 1423: 1420: 1417: 1414: 1411: 1407: 1406: 1403: 1400: 1397: 1394: 1391: 1388: 1384: 1383: 1380: 1377: 1374: 1371: 1368: 1365: 1361: 1360: 1359:Sk3wl of Root 1357: 1354: 1351: 1348: 1345: 1342: 1338: 1337: 1334: 1331: 1328: 1325: 1322: 1319: 1315: 1314: 1311: 1305: 1302: 1299: 1296: 1293: 1289: 1288: 1285: 1279: 1276: 1273: 1270: 1267: 1263: 1262: 1259: 1256: 1253: 1250: 1247: 1244: 1240: 1239: 1236: 1231: 1229: 1226: 1223: 1220: 1216: 1215: 1212: 1206: 1204: 1201: 1199: 1196: 1192: 1191: 1188: 1185: 1183: 1180: 1178: 1175: 1171: 1170: 1167: 1165: 1163: 1160: 1158: 1155: 1151: 1150: 1147: 1145: 1143: 1140: 1138: 1135: 1131: 1130: 1127: 1125: 1123: 1120: 1118: 1115: 1111: 1110: 1107: 1105: 1103: 1100: 1098: 1095: 1091: 1090: 1087: 1085: 1083: 1080: 1078: 1075: 1071: 1070: 1067: 1064: 1061: 1058: 1055: 1052: 1038: 1035: 1008: 1005: 1000: 997: 984: 981: 964: 961: 960: 959: 956: 953: 940: 937: 915: 912: 893: 890: 880: 877: 875: 872: 797: 794: 759:scavenger hunt 683: 682: 680: 679: 672: 665: 657: 654: 653: 650: 649: 642: 639:Nuts and Volts 635: 630: 622: 619: 618: 615: 614: 611: 610: 601: 595: 589: 586:Legion of Doom 583: 577: 572: 566: 561: 560: 557: 556: 553: 552: 547: 542: 536: 531: 530: 527: 526: 523: 522: 517: 512: 507: 502: 497: 492: 487: 482: 477: 472: 467: 462: 457: 451: 446: 445: 442: 441: 438: 437: 432: 426: 423:Practice sites 421: 420: 417: 416: 413: 412: 407: 402: 397: 392: 386: 381: 380: 377: 376: 373: 372: 367: 362: 356: 353:Computer crime 351: 350: 347: 346: 343: 342: 337: 332: 327: 322: 317: 312: 306: 301: 300: 297: 296: 293: 292: 291: 290: 285: 280: 269: 264: 259: 254: 247: 241: 234:Hacker culture 232: 231: 228: 227: 224: 223: 218: 213: 211:Cryptovirology 208: 202: 197: 196: 193: 192: 186: 185: 177: 176: 167: 163: 162: 159: 155: 154: 151: 147: 146: 143: 142:Previous event 139: 138: 133: 129: 128: 118: 114: 113: 110: 106: 105: 96: 92: 91: 88: 84: 83: 80: 76: 75: 72: 68: 67: 64: 60: 59: 26: 9: 6: 4: 3: 2: 5230: 5219: 5216: 5214: 5211: 5209: 5206: 5204: 5201: 5199: 5196: 5195: 5193: 5184: 5181: 5179: 5176: 5174: 5171: 5169: 5165: 5162: 5160: 5157: 5156: 5155: 5154: 5148: 5145: 5143: 5140: 5138: 5135: 5131: 5126: 5125: 5124: 5123: 5111: 5107: 5103: 5100: 5099: 5094: 5090: 5080: 5079: 5074: 5069: 5066: 5065: 5060: 5056: 5053: 5049: 5048: 5030: 5024: 5010: 5003: 5001: 4986:. August 2015 4985: 4979: 4964: 4958: 4940: 4934: 4920:. August 2018 4919: 4913: 4899: 4895: 4891: 4887: 4880: 4866: 4860: 4846: 4842: 4836: 4817: 4810: 4803: 4788: 4784: 4777: 4762: 4755: 4740: 4736: 4729: 4721: 4715: 4701: 4697: 4691: 4683: 4679: 4675: 4668: 4653: 4649: 4645: 4644: 4639: 4632: 4617: 4611: 4597: 4593: 4587: 4572: 4568: 4564: 4557: 4549: 4543: 4535: 4531: 4525: 4518: 4514: 4510: 4505: 4498: 4494: 4488: 4486: 4478: 4474: 4470: 4464: 4457: 4456: 4451: 4445: 4443: 4441: 4439: 4437: 4428: 4424: 4420: 4413: 4405: 4401: 4398:Zetter, Kim. 4394: 4380:on 2024-03-19 4379: 4375: 4368: 4353:on 2011-11-18 4352: 4348: 4342: 4335: 4330: 4324: 4316: 4312: 4308: 4301: 4286: 4284: 4279: 4272: 4258:on 2007-09-08 4257: 4253: 4249: 4242: 4228:on 2012-07-28 4227: 4223: 4222: 4221:SecurityFocus 4217: 4210: 4196: 4192: 4186: 4172: 4165: 4151: 4150:www.darpa.mil 4147: 4141: 4127: 4120: 4112: 4105: 4091:on 2011-05-14 4090: 4086: 4080: 4067: 4066: 4059: 4046: 4045: 4037: 4029: 4022: 4014: 4007: 3999: 3995: 3991: 3984: 3970: 3966: 3960: 3953:. 2001-07-09. 3952: 3946: 3935: 3928: 3914: 3910: 3904: 3890: 3886: 3880: 3866: 3862: 3856: 3842: 3838: 3832: 3818: 3814: 3808: 3794: 3790: 3784: 3770: 3766: 3760: 3746: 3742: 3736: 3722: 3718: 3712: 3698: 3694: 3688: 3674: 3670: 3664: 3656: 3649: 3647: 3645: 3636: 3629: 3615:on 2019-02-15 3614: 3610: 3604: 3596: 3592: 3586: 3572: 3568: 3561: 3547: 3543: 3537: 3523: 3519: 3513: 3499: 3495: 3489: 3475: 3471: 3465: 3457: 3453: 3447: 3432: 3428: 3421: 3406: 3402: 3395: 3380: 3376: 3369: 3361: 3355: 3347: 3341: 3333: 3329: 3322: 3314: 3313: 3308: 3302: 3295: 3290: 3286: 3285: 3279: 3265: 3261: 3255: 3253: 3237: 3236: 3231: 3225: 3217: 3211: 3197: 3193: 3186: 3179: 3168: 3162: 3155: 3144: 3143: 3138: 3131: 3129: 3120: 3119:deviating.net 3116: 3110: 3096: 3090: 3086: 3076: 3072: 3069: 3067: 3063: 3060: 3057: 3054: 3051: 3048: 3045: 3042: 3040: 3037: 3034: 3031: 3029: 3026: 3025: 3014: 3011: 3008: 3006: 3003: 3000: 2999: 2995: 2992: 2989: 2987: 2984: 2981: 2980: 2976: 2973: 2970: 2968: 2965: 2962: 2961: 2957: 2954: 2951: 2949: 2946: 2943: 2942: 2938: 2935: 2932: 2930: 2927: 2924: 2923: 2919: 2916: 2913: 2911: 2908: 2905: 2904: 2900: 2897: 2894: 2892: 2889: 2886: 2885: 2881: 2878: 2875: 2873: 2870: 2867: 2866: 2862: 2859: 2856: 2854: 2851: 2848: 2847: 2843: 2840: 2837: 2835: 2832: 2829: 2828: 2824: 2821: 2818: 2816: 2813: 2810: 2809: 2805: 2802: 2799: 2797: 2794: 2791: 2790: 2786: 2783: 2780: 2778: 2775: 2772: 2771: 2767: 2764: 2761: 2759: 2756: 2753: 2752: 2748: 2745: 2742: 2740: 2737: 2734: 2733: 2729: 2726: 2723: 2721: 2718: 2715: 2714: 2710: 2707: 2704: 2702: 2699: 2696: 2695: 2691: 2688: 2685: 2683: 2680: 2677: 2676: 2672: 2669: 2666: 2664: 2661: 2658: 2657: 2653: 2650: 2647: 2645: 2642: 2639: 2638: 2634: 2631: 2628: 2626: 2623: 2620: 2619: 2615: 2612: 2609: 2607: 2604: 2601: 2600: 2596: 2593: 2590: 2588: 2587:Bally's Hotel 2584: 2581: 2578: 2577: 2573: 2570: 2567: 2565: 2564:Bally's Hotel 2561: 2558: 2555: 2554: 2550: 2547: 2544: 2542: 2539: 2536: 2535: 2531: 2528: 2525: 2522: 2518: 2515: 2514: 2510: 2507: 2504: 2502: 2498: 2495: 2492: 2491: 2487: 2484: 2481: 2479: 2476: 2473: 2472: 2468: 2465: 2462: 2460: 2456: 2452: 2451:Bally's Hotel 2448: 2445: 2442: 2441: 2437: 2434: 2431: 2429: 2425: 2421: 2417: 2416:Caesars Forum 2413: 2410: 2409: 2405: 2402: 2399: 2397: 2396:Virtual event 2394: 2391: 2390: 2386: 2383: 2380: 2378: 2377:Bally's Hotel 2374: 2371: 2368: 2367: 2363: 2360: 2358:August 11–14 2357: 2355: 2351: 2347: 2343: 2342:Caesars Forum 2340: 2337: 2336: 2332: 2329: 2327:August 10–13 2326: 2324: 2320: 2316: 2312: 2311:Caesars Forum 2309: 2306: 2305: 2301: 2298: 2295: 2293: 2289: 2286: 2283: 2282: 2278: 2275: 2272: 2270: 2267: 2264: 2263: 2259: 2256: 2253: 2250: 2247: 2246: 2243: 2232: 2231: 2226: 2225:Werner Herzog 2222: 2219: 2215: 2214: 2209: 2206: 2203: 2199: 2195: 2191: 2189: 2184: 2183: 2178: 2175: 2171: 2170: 2165: 2162: 2158: 2155: 2151: 2147: 2146: 2141: 2140: 2130:as a result. 2129: 2125: 2121: 2118: 2117: 2112: 2109: 2108: 2103: 2100: 2099: 2096: 2094: 2090: 2086: 2081: 2079: 2075: 2071: 2065: 2061: 2058: 2057: 2054: 2049: 2045: 2042: 2041: 2037: 2032: 2028: 2025: 2024: 2021: 2018: 2017: 2012: 2008: 2003: 2002:James Clapper 2000: 1996: 1992: 1989: 1983: 1979: 1975: 1971: 1968: 1967: 1963: 1959: 1956: 1955: 1951: 1947: 1943: 1940: 1939: 1936: 1930: 1925: 1921: 1916: 1913: 1912: 1908: 1907: 1902: 1899: 1898: 1894: 1890: 1886: 1883: 1882: 1878: 1875: 1871: 1867: 1864: 1863: 1859: 1855: 1851: 1848: 1847: 1843: 1840: 1839: 1836: 1828: 1825: 1815: 1812: 1811:middle-endian 1807: 1805: 1801: 1796: 1794: 1790: 1785: 1781: 1779: 1775: 1771: 1766: 1763: 1761: 1757: 1753: 1749: 1745: 1741: 1736: 1723: 1721: 1718: 1715: 1712: 1709: 1706: 1705: 1701: 1699: 1696: 1693: 1690: 1687: 1684: 1683: 1679: 1677: 1674: 1671: 1668: 1665: 1662: 1661: 1657: 1654: 1651: 1648: 1645: 1642: 1639: 1638: 1634: 1631: 1628: 1625: 1622: 1619: 1616: 1615: 1611: 1608: 1605: 1602: 1599: 1596: 1593: 1592: 1588: 1585: 1582: 1579: 1576: 1573: 1570: 1569: 1565: 1562: 1559: 1556: 1553: 1550: 1547: 1546: 1542: 1539: 1536: 1533: 1530: 1527: 1524: 1523: 1519: 1516: 1513: 1510: 1507: 1504: 1501: 1500: 1496: 1493: 1490: 1487: 1484: 1481: 1478: 1477: 1473: 1470: 1467: 1464: 1461: 1458: 1455: 1454: 1450: 1447: 1444: 1441: 1438: 1435: 1432: 1431: 1427: 1424: 1421: 1418: 1415: 1412: 1409: 1408: 1404: 1401: 1398: 1395: 1392: 1389: 1386: 1385: 1381: 1378: 1375: 1372: 1369: 1366: 1363: 1362: 1358: 1355: 1352: 1349: 1346: 1343: 1340: 1339: 1335: 1332: 1329: 1326: 1323: 1320: 1317: 1316: 1312: 1309: 1306: 1303: 1300: 1297: 1294: 1291: 1290: 1286: 1283: 1280: 1277: 1274: 1271: 1268: 1265: 1264: 1260: 1257: 1254: 1251: 1248: 1245: 1242: 1241: 1237: 1235: 1232: 1230: 1227: 1224: 1221: 1218: 1217: 1213: 1210: 1207: 1205: 1202: 1200: 1197: 1194: 1193: 1189: 1186: 1184: 1181: 1179: 1176: 1173: 1172: 1168: 1166: 1164: 1161: 1159: 1156: 1153: 1152: 1148: 1146: 1144: 1141: 1139: 1136: 1133: 1132: 1128: 1126: 1124: 1121: 1119: 1116: 1113: 1112: 1108: 1106: 1104: 1101: 1099: 1096: 1093: 1092: 1088: 1086: 1084: 1081: 1079: 1076: 1073: 1072: 1069:Winning Team 1068: 1065: 1063:Architecture 1062: 1059: 1056: 1053: 1050: 1049: 1043: 1034: 1032: 1029: 1025: 1021: 1016: 1014: 1004: 996: 994: 990: 980: 978: 974: 970: 957: 954: 951: 947: 946: 945: 936: 934: 930: 926: 922: 911: 908: 898: 889: 887: 871: 869: 865: 860: 858: 853: 851: 845: 843: 838: 834: 832: 828: 824: 820: 819: 813: 811: 807: 803: 793: 791: 787: 783: 779: 775: 770: 768: 764: 760: 756: 752: 747: 745: 741: 737: 733: 729: 725: 721: 717: 713: 709: 705: 701: 697: 693: 689: 678: 673: 671: 666: 664: 659: 658: 656: 655: 648: 647: 643: 641: 640: 636: 634: 631: 629: 628: 624: 623: 617: 616: 609: 605: 602: 599: 596: 593: 590: 587: 584: 581: 578: 576: 573: 571: 568: 567: 564: 559: 558: 551: 548: 546: 543: 541: 538: 537: 534: 529: 528: 521: 518: 516: 513: 511: 508: 506: 503: 501: 498: 496: 493: 491: 488: 486: 483: 481: 478: 476: 473: 471: 468: 466: 463: 461: 458: 456: 453: 452: 449: 444: 443: 436: 433: 431: 428: 427: 424: 419: 418: 411: 410:Vulnerability 408: 406: 403: 401: 398: 396: 393: 391: 388: 387: 384: 383:Hacking tools 379: 378: 371: 370:Script kiddie 368: 366: 363: 361: 358: 357: 354: 349: 348: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 316: 313: 311: 308: 307: 304: 299: 298: 289: 286: 284: 281: 279: 276: 275: 274: 270: 268: 267:Maker culture 265: 263: 260: 258: 255: 253: 252: 248: 246: 243: 242: 239: 235: 230: 229: 222: 219: 217: 214: 212: 209: 207: 204: 203: 200: 195: 194: 191: 188: 187: 183: 182: 174: 168: 164: 160: 156: 152: 148: 144: 140: 137: 134: 130: 119: 115: 111: 107: 104: 100: 97: 93: 89: 85: 81: 77: 73: 69: 65: 61: 56: 50: 46: 45: 41: 33: 19: 5152: 5151: 5137:Official FAQ 5121: 5120: 5096: 5082:. Retrieved 5076: 5062: 5032:. Retrieved 5023: 5012:. Retrieved 4988:. Retrieved 4978: 4967:. Retrieved 4957: 4946:. Retrieved 4933: 4922:. Retrieved 4912: 4901:. Retrieved 4889: 4879: 4868:. Retrieved 4859: 4848:. Retrieved 4844: 4835: 4823:. Retrieved 4816:the original 4802: 4792:12 September 4790:. Retrieved 4787:The Register 4786: 4776: 4766:12 September 4764:. Retrieved 4754: 4744:12 September 4742:. Retrieved 4739:The Register 4738: 4728: 4714: 4703:. Retrieved 4699: 4690: 4667: 4655:. Retrieved 4643:The Guardian 4641: 4631: 4620:. Retrieved 4610: 4599:. Retrieved 4595: 4586: 4574:. Retrieved 4566: 4556: 4542: 4534:ForAllSecure 4533: 4524: 4509:Blue, Violet 4504: 4463: 4453: 4427:the original 4422: 4412: 4403: 4393: 4382:. Retrieved 4378:the original 4367: 4355:. Retrieved 4351:the original 4341: 4328: 4323: 4310: 4300: 4289:. Retrieved 4281: 4271: 4260:. Retrieved 4256:the original 4251: 4241: 4230:. Retrieved 4226:the original 4219: 4209: 4198:. Retrieved 4194: 4185: 4174:. Retrieved 4164: 4153:. Retrieved 4149: 4140: 4129:. Retrieved 4119: 4104: 4093:. Retrieved 4089:the original 4079: 4069:, retrieved 4064: 4058: 4048:, retrieved 4043: 4036: 4021: 4006: 3997: 3993: 3983: 3972:. Retrieved 3968: 3959: 3945: 3927: 3916:. Retrieved 3912: 3903: 3892:. Retrieved 3888: 3879: 3868:. Retrieved 3864: 3855: 3844:. Retrieved 3840: 3831: 3820:. Retrieved 3816: 3807: 3796:. Retrieved 3792: 3783: 3772:. Retrieved 3768: 3759: 3748:. Retrieved 3744: 3735: 3724:. Retrieved 3720: 3711: 3700:. Retrieved 3696: 3687: 3676:. Retrieved 3672: 3663: 3633:Moss, Jeff. 3628: 3617:. Retrieved 3613:the original 3603: 3594: 3585: 3574:. Retrieved 3570: 3560: 3549:. Retrieved 3545: 3536: 3525:. Retrieved 3521: 3512: 3501:. Retrieved 3497: 3488: 3477:. Retrieved 3473: 3464: 3455: 3446: 3434:. Retrieved 3430: 3420: 3408:. Retrieved 3404: 3394: 3382:. Retrieved 3378: 3368: 3354: 3340: 3331: 3321: 3312:The Register 3310: 3301: 3283: 3278: 3267:. Retrieved 3263: 3239:. Retrieved 3234: 3224: 3210: 3199:. Retrieved 3195: 3185: 3177: 3170:. Retrieved 3161: 3152: 3146:. Retrieved 3140: 3118: 3109: 3098:. Retrieved 3089: 2724:August 8–10 2610:August 7–10 2505:August 9–12 2463:August 8–11 2296:August 8–11 2273:August 7–10 2241: 2228: 2211: 2202:NSA director 2194:CIA director 2187: 2182:Jason Bourne 2180: 2167: 2143: 2082: 2067: 2051: 2014: 1985: 1933: 1906:Dateline NBC 1904: 1844:Description 1834: 1821: 1808: 1797: 1786: 1782: 1767: 1764: 1737: 1734: 1261:sk3wl0fr00t 1040: 1017: 1010: 1002: 986: 966: 942: 917: 903: 882: 861: 854: 846: 841: 839: 835: 816: 814: 799: 771: 769:exercises). 748: 699: 695: 691: 687: 686: 644: 637: 625: 620:Publications 465:Trojan horse 430:HackThisSite 319: 249: 109:Years active 42: 4571:Thehill.com 4285:v DefCon 16 3474:www.dfiu.tv 3436:January 14, 3410:January 14, 3384:January 14, 2990:July 22–24 2971:August 4–6 2952:July 26–28 2933:July 11–13 2876:July 28–30 2857:July 13–15 2838:August 2–4 2830:DEF CON 10 2819:August 1–3 2811:DEF CON 11 2792:DEF CON 12 2781:July 29–31 2773:DEF CON 13 2762:August 4–6 2754:DEF CON 14 2743:August 3–5 2735:DEF CON 15 2716:DEF CON 16 2697:DEF CON 17 2678:DEF CON 18 2667:August 4–7 2659:DEF CON 19 2648:July 26–29 2640:DEF CON 20 2629:August 1–4 2621:DEF CON 21 2602:DEF CON 22 2591:August 6–9 2583:Paris Hotel 2579:DEF CON 23 2568:August 4–7 2560:Paris Hotel 2556:DEF CON 24 2545:July 27–30 2537:DEF CON 25 2493:DEF CON 26 2447:Paris Hotel 2443:DEF CON 27 2432:August 6–9 2411:DEF CON 28 2400:August 6–9 2381:August 5–8 2373:Paris Hotel 2369:DEF CON 29 2338:DEF CON 30 2307:DEF CON 31 2284:DEF CON 32 2265:DEF CON 33 2260:Attendance 2196:(played by 2190:film series 2172:. Director 2145:The X-Files 2085:MalwareTech 1778:Guitar Hero 1748:FormatGuard 1405:ACME Pharm 1287:shellphish 1060:Organizers 1007:Black Badge 983:Fundraising 925:lockpicking 907:Konami Code 751:lockpicking 720:journalists 633:Hacker News 520:Infostealer 303:Conferences 257:Hackerspace 161:Over 30,000 117:Inaugurated 95:Location(s) 38:‹ The 5192:Categories 5153:Multimedia 5084:2023-08-10 5034:2018-07-07 5014:2017-06-07 4990:2019-09-15 4969:2019-09-15 4948:2018-05-17 4924:2018-10-28 4903:2023-02-25 4870:2024-02-04 4850:2016-04-09 4705:2020-05-08 4657:August 11, 4622:2017-12-08 4601:2017-12-08 4596:C-SPAN.org 4384:2024-03-19 4357:2008-06-09 4311:Press Room 4291:2010-10-07 4262:2007-08-15 4232:2004-07-31 4200:2023-02-25 4176:2023-12-20 4155:2023-12-20 4131:2023-12-20 4124:routardz. 4095:2023-12-21 4071:2023-12-20 4050:2023-12-20 3974:2023-12-21 3918:2024-09-09 3894:2024-09-06 3870:2024-09-06 3846:2023-12-21 3822:2023-12-21 3798:2023-12-21 3774:2023-12-21 3750:2023-12-27 3726:2023-12-27 3702:2023-12-27 3678:2023-12-20 3619:2017-04-24 3576:2016-03-12 3551:2024-01-29 3527:2024-01-29 3503:2024-01-29 3479:2024-01-29 3269:2019-08-17 3201:2016-03-12 3148:2007-08-15 3100:2017-04-23 3082:References 3009:June 9–11 3001:DEF CON 1 2982:DEF CON 2 2963:DEF CON 3 2944:DEF CON 4 2925:DEF CON 5 2906:DEF CON 6 2895:July 9–11 2887:DEF CON 7 2868:DEF CON 8 2849:DEF CON 9 2526:May 11–13 2478:751 D-Park 2354:Linq Hotel 2323:Linq Hotel 2292:The Sahara 2169:The Signal 2124:ransomware 2036:Will Smith 1744:StackGuard 1589:DEFKOR00T 1336:1@stplace 1313:1@stplace 1109:AJ Reznor 1089:AJ Reznor 952:community. 921:Biohacking 874:Components 490:Logic bomb 485:Ransomware 262:Hacktivism 158:Attendance 150:Next event 124:1993-06-09 4898:1059-1028 4652:0261-3077 4169:Unknown. 3745:ddtek.biz 3721:ddtek.biz 3697:ddtek.biz 3431:USA Today 3230:Jeff Moss 3075:San Diego 3062:Summercon 2254:Duration 2213:Mr. Robot 2148:episode " 2031:Jeff Moss 1995:Ron Wyden 1982:Jeff Moss 1893:Cisco IOS 1658:Katzebin 1563:cLEMENCy 1560:cLEMENCy 1382:VedaGodz 1350:Kenshoto 1327:Kenshoto 1301:Kenshoto 1275:Kenshoto 1187:Multiple 1066:Platform 993:dunk tank 963:Workshops 929:ham radio 886:Jeff Moss 831:phreakers 802:Jeff Moss 708:Las Vegas 608:Blue team 600:(defunct) 594:(defunct) 588:(defunct) 582:(defunct) 570:Anonymous 510:Web shell 360:Crimeware 340:Summercon 288:White hat 278:Black hat 271:Types of 245:Hackathon 206:Phreaking 136:Jeff Moss 99:Las Vegas 79:Frequency 47:is being 5055:Archived 4576:2 August 4567:The Hill 4477:NBC News 3044:Hack-Tic 3022:See also 2977:Unknown 2958:Unknown 2939:Unknown 2920:Unknown 2901:Unknown 2882:Unknown 2863:Unknown 2844:Unknown 2825:Unknown 2806:Unknown 2787:Unknown 2768:Unknown 2749:Unknown 2711:Unknown 2692:Unknown 2673:Unknown 2654:Unknown 2597:16,000+ 2532:Unknown 2501:Flamingo 2488:Unknown 2469:~30,000 2459:Flamingo 2428:Flamingo 2424:The Linq 2420:Harrah's 2414:Planned 2364:~25,000 2346:Flamingo 2333:~25,000 2315:Flamingo 2078:O'Reilly 1879:format. 1760:AppArmor 1752:OpenWall 1451:Samurai 1448:FreeBSD 1425:FreeBSD 1379:FreeBSD 1356:FreeBSD 1333:FreeBSD 1258:Windows 1238:Anomaly 1054:DEF CON 999:Contests 914:Villages 857:COVID-19 850:COVID-19 818:WarGames 767:red team 736:wargames 728:software 604:Red team 460:Backdoor 335:ShmooCon 283:Grey hat 51:. › 40:template 5122:DEF CON 4682:Twitter 4473:Archive 4000:(2003). 3913:CTFtime 3889:CTFtime 3865:CTFtime 3071:ToorCon 2635:12,000 2616:16,000 2574:22,000 2551:25,000 2521:Beijing 2511:28,000 2387:~8,700 2210:In the 1874:Adobe's 1774:forking 1740:Immunix 1540:DECREE 1520:DEFKOR 1308:Solaris 1282:FreeBSD 1234:OpenBSD 919:Recon, 879:Handles 868:Discord 806:FidoNet 796:History 724:hackers 702:) is a 688:DEF CON 592:LulzSec 480:Spyware 455:Rootkit 448:Malware 400:Payload 390:Exploit 320:DEF CON 273:hackers 199:History 166:Website 132:Founder 122: ( 58:DEF CON 4896:  4650:  4455:Forbes 3452:"Home" 3291:  3066:Phrack 3052:(HOPE) 2730:8,000 2457:, and 2426:, and 2352:, and 2321:, and 2290:, and 2251:Venue 2188:Bourne 2016:Forbes 1877:e-book 1818:Groups 1719:mixed 1697:mixed 1675:mixed 1655:Linux 1635:A*0*E 1632:Linux 1586:Linux 1517:Linux 1494:Linux 1471:Linux 1468:armv7 1442:DDTEK 1419:DDTEK 1396:DDTEK 1373:DDTEK 1209:Redhat 1182:Goons 1162:Goons 1142:Goons 1122:Goons 1102:Goons 1082:Goons 892:Badges 864:Twitch 810:Canada 761:, and 746:heat. 744:Nevada 712:Nevada 696:Defcon 692:DEFCON 646:Phrack 563:Groups 495:Botnet 435:Zone-H 171:defcon 103:Nevada 90:Varies 82:Annual 66:Active 63:Status 5110:WIRED 5078:Wired 4942:(PDF) 4890:Wired 4825:9 Feb 4819:(PDF) 4812:(PDF) 4678:Tweet 4517:ZDNet 4404:Wired 3937:(PDF) 3332:Wired 3241:9 Feb 3172:9 Feb 3015:~100 3012:1993 2996:~200 2993:1994 2974:1995 2955:1996 2936:1997 2917:1998 2898:1999 2879:2000 2860:2001 2841:2002 2822:2003 2803:2004 2784:2005 2765:2006 2746:2007 2727:2008 2708:2009 2689:2010 2670:2011 2651:2012 2632:2013 2613:2014 2594:2015 2571:2016 2548:2017 2529:2018 2508:2018 2485:2019 2466:2019 2435:2020 2403:2020 2384:2021 2361:2022 2330:2023 2299:2024 2276:2025 2257:Year 2119:2024 2110:2020 2101:2018 2059:2017 2043:2016 2026:2013 2007:PRISM 1969:2012 1957:2011 1941:2009 1914:2008 1900:2007 1889:Cisco 1884:2005 1865:2001 1849:1999 1841:Year 1800:DARPA 1793:jails 1707:2024 1685:2023 1663:2022 1640:2021 1617:2020 1594:2019 1571:2018 1548:2017 1537:i386 1525:2016 1502:2015 1479:2014 1456:2013 1445:i386 1433:2012 1422:i386 1410:2011 1399:i386 1387:2010 1376:i386 1364:2009 1353:i386 1341:2008 1330:i386 1318:2007 1304:i386 1292:2006 1278:i386 1266:2005 1255:i386 1243:2004 1219:2003 1195:2002 1174:2001 1154:2000 1134:1999 1114:1998 1094:1997 1074:1996 1051:Year 1028:DARPA 950:LGBTQ 788:(via 740:Wi-Fi 470:Virus 238:ethic 87:Venue 71:Genre 5168:IMDb 5098:CNET 4894:ISSN 4827:2011 4794:2024 4768:2024 4746:2024 4659:2017 4648:ISSN 4578:2017 4497:CNET 4471:." ( 4334:Text 4283:MBTA 3438:2019 3412:2019 3386:2019 3289:IMDb 3243:2011 3174:2011 3035:(C3) 2585:and 2562:and 2499:and 2406:N/A 2375:and 2302:N/A 2279:N/A 1824:2600 1789:0day 1772:and 1284:5.4 1211:6.2 1129:SNI 977:RFID 866:and 790:CISA 505:HIDS 475:Worm 236:and 173:.org 5166:on 5095:." 5061:." 4515:". 4511:. " 4495:". 4452:." 4315:EFF 3287:at 2095:. 2013:of 1946:ATM 1924:MIT 1754:'s 1713:12 1710:32 1691:12 1688:31 1669:16 1666:30 1646:16 1643:29 1623:16 1620:28 1600:16 1597:27 1577:24 1574:26 1554:15 1551:25 1531:15 1528:24 1508:15 1505:23 1485:20 1482:22 1462:20 1459:21 1439:20 1436:20 1416:12 1413:19 1393:12 1390:18 1367:17 1344:16 1321:15 1310:10 1295:14 1269:13 1246:12 1222:11 1198:10 1022:'s 973:IoT 786:DHS 778:DoD 774:FBI 698:or 515:RCE 5194:: 5108:" 5075:. 4999:^ 4892:. 4888:. 4843:. 4785:. 4737:. 4698:. 4646:. 4640:. 4594:. 4569:. 4565:. 4532:. 4484:^ 4475:) 4435:^ 4421:. 4402:. 4313:. 4309:. 4280:. 4250:. 4218:. 4193:. 4148:. 3996:. 3992:. 3967:. 3911:. 3887:. 3863:. 3839:. 3815:. 3791:. 3767:. 3743:. 3719:. 3695:. 3671:. 3643:^ 3593:. 3569:. 3544:. 3520:. 3496:. 3472:. 3454:. 3429:. 3403:. 3377:. 3330:. 3309:. 3262:. 3251:^ 3194:. 3176:. 3151:. 3139:. 3127:^ 3117:. 2523:) 2453:, 2449:, 2438:0 2422:, 2418:, 2348:, 2344:, 2317:, 2313:, 1976:, 1780:. 1750:, 1746:, 1370:9 1347:8 1324:8 1298:8 1272:8 1249:8 1225:8 1177:9 1157:8 1137:7 1117:6 1097:5 1077:4 927:, 923:, 852:. 784:, 780:, 776:, 753:, 730:, 710:, 700:DC 694:, 606:/ 112:31 101:, 5087:. 5050:" 5037:. 5017:. 4993:. 4972:. 4951:. 4927:. 4906:. 4873:. 4853:. 4829:. 4796:. 4770:. 4748:. 4722:. 4708:. 4684:. 4676:( 4661:. 4625:. 4604:. 4580:. 4536:. 4387:. 4360:. 4336:. 4317:. 4294:. 4265:. 4235:. 4203:. 4179:. 4158:. 4134:. 4113:. 4098:. 4030:. 4015:. 3998:2 3977:. 3939:. 3921:. 3897:. 3873:. 3849:. 3825:. 3801:. 3777:. 3753:. 3729:. 3705:. 3681:. 3657:. 3637:. 3622:. 3579:. 3554:. 3530:. 3506:. 3482:. 3458:. 3440:. 3414:. 3388:. 3362:. 3348:. 3334:. 3315:. 3272:. 3245:. 3218:. 3204:. 3121:. 3103:. 2207:. 676:e 669:t 662:v 126:) 34:. 20:)

Index

DEF CON (convention)
Defcon (disambiguation)
template
Infobox recurring event
considered for merging
Las Vegas
Nevada
Jeff Moss
defcon.org
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.