910:
conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.
3294:
812:. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
1909:, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened. A DEF CON source at NBC had tipped off organizers to Madigan's plans.
897:
1762:), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.
1931:(CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares. The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show.
1984:, was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense."
765:. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as
1926:
students Zack
Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston
2052:
The winner of the Cyber Grand
Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania. Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest, where it finished in last place, despite pulling ahead of human teams often in a contest
904:
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a
1826:
meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek
1783:
In 2009, it was announced that "Diutinus
Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was in fact organising the CTF! "Hacking the top hacker contest seemed like a fun way to
918:
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include
Aerospace Village, Car Hacking Village, IoT Village,
3153:
According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about
Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to
2033:
posted a statement, located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year." This was the first time in the organization's history that it had asked federal
836:
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people
909:
in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general
825:. In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a
2104:
In March 2018, the DEF CON Voting
Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.
870:). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.
734:, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking
847:
In
January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to
1015:(CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
1041:
The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year. It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.
888:' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
1813:
with 9 bits bytes CPU. With its specifications released only 24h before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
1934:
In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.
2050:, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$ 2M grand prize.
4468:
2019:
said that NSA officials, including
Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."
2004:
if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance. In June 2013, NSA surveillance programs which collected data on US citizens, such as
883:
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder
2113:
On May 8, 2020, the DEF CON in-person conference itself was cancelled and virtualized due to COVID-19. DEF CON Safe Mode was held August 6–9 online with a full roster of talks, villages, contests and events.
943:
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
4472:
2220:" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
792:) and other agencies regularly attend DEF CON. Some have considered DEF CON to be the "world's largest" hacker con given its attendee size and the number of other conferences modeling themselves after it.
1927:
T subway. However, the
Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the
995:
and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
48:
4449:
1003:
Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker
Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress to name a few.
1784:
introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the Defcon 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
1026:
entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the
1735:
In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
844:. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
4418:
4247:
4373:
3965:"4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download"
3426:
905:
non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the
3374:
5054:
1919:
5197:
1990:
859:
the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
4808:
5008:
4562:
935:
and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
394:
789:
1742:
took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including
4637:
2229:
5212:
3608:
785:
1822:
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the
1860:(later discovered to be infected with the CIH virus) at DEF CON 7, in what was, at the time, the largest presentation in DEF CON history.
2193:
674:
4426:
3070:
1765:
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
3933:
2091:
was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with the
2201:
4377:
2070:
DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure
781:
4255:
5217:
4329:
Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology
1923:
504:
5092:
17:
4674:"WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…"
4938:
1023:
777:
4492:
2122:
On February 4, 2024, Cesar's Entertainment cancelled the contract with DEF CON without warning with speculation that a
958:
QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
198:
5051:
4346:
4215:
2069:
1998:
5202:
1012:
971:
and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking
762:
43:
1980:, gave the keynote speech. During the question and answers session, the first question for Alexander, fielded by
773:
215:
4962:
4512:
4314:
2662:
2643:
2624:
2605:
2126:
attack and bomb scare and subsequent evacuation in 2023 were in part to blame. The conference was moved to the
988:
667:
4815:
3950:
3178:
Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
2149:
932:
607:
404:
287:
277:
4760:
2217:
2156:. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
3032:
2006:
1928:
1809:
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a
703:
314:
302:
3307:"Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled"
5207:
4450:
Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)
4084:
2287:
2268:
2127:
1964:
used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.
389:
4110:
4012:
2928:
2757:
2738:
2719:
2700:
2681:
2454:
2353:
2322:
2233:, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
2088:
2047:
1949:
1823:
1803:
1030:
723:
626:
364:
4547:
660:
409:
3400:
1891:
used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the
4615:
3306:
1973:
1945:
585:
544:
514:
464:
5178:
The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
3612:
3094:
1776:
were inverted), allowing them to have such a massive lead that they spent most of the CTF playing
5072:
4719:
4125:
3049:
2909:
1019:
324:
31:
5172:
4983:
4027:
3136:
2242:
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
5182:
4399:
3345:
3004:
2168:
920:
738:). Contests held during the event are extremely varied and can range from creating the longest
579:
4170:
1806:
program, where teams wrote autonomous systems to play the game without any human interaction.
4782:
2419:
2349:
2318:
2072:" summarizing its findings. The findings were publicly released at an event sponsored by the
1755:
731:
5073:"Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued"
2200:), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker,
5105:
4734:
4677:
2586:
2563:
2450:
2376:
2186:
1987:
1853:
1747:
968:
754:
597:
539:
459:
4673:
4458:. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted"
3293:
1952:
capturing data from an unknown number of hackers attending the DEF CON hacker conference.
8:
4917:
3668:
3027:
2966:
2181:
1011:
The Black Badge is the highest award DEF CON gives to contest winners of certain events.
574:
399:
309:
3566:
714:. The first DEF CON took place in June 1993 and today many attendees at DEF CON include
5136:
5028:
3229:
3166:
2500:
2458:
2427:
2345:
2314:
2204:
2030:
1981:
1977:
972:
885:
801:
135:
4145:
4042:
2159:
A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by
4893:
4840:
4647:
3288:
3137:"Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape"
3038:
2077:
1857:
862:
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via
735:
715:
569:
532:
499:
3654:
3591:"Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity"
3590:
2179:
A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of
804:
as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a
5109:
5077:
5063:
5009:""Black Hat and Defcon see record attendance — even without the government spooks""
4333:
3989:
3375:"A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards"
3359:
2291:
2092:
2073:
1751:
900:
Multiple, electronic and non-electronic, DEF CON human badges and other con badges.
863:
826:
707:
549:
250:
5177:
4885:
3327:
3215:
3191:
5058:
3055:
2582:
2559:
2446:
2372:
2197:
2153:
2087:, the 23-year-old British security researcher who was credited with stopping the
1869:
1827:
permission to make a logo that includes the official DEF CON logo with approval.
1769:
329:
220:
189:
4306:
2038:
visited the convention to study the DEF CON culture for an upcoming movie role.
4592:"DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org"
2540:
2496:
2173:
2160:
2063:
2010:
1961:
833:. The official name of the conference includes a space in-between DEF and CON.
758:
638:
469:
422:
352:
233:
210:
4063:
3427:"11-year-old hacks replica of Florida state website, changes election results"
3233:
5191:
4897:
4651:
4220:
2985:
2415:
2395:
2341:
2310:
2224:
2001:
1888:
1873:
1810:
1208:
722:, lawyers, federal government employees, security researchers, students, and
474:
369:
266:
39:
3836:
3812:
3788:
3764:
3634:
30:
This article is about the computer security convention. For other uses, see
4642:
3311:
2477:
1905:
1792:
1773:
924:
562:
429:
382:
237:
4638:"Briton who stopped WannaCry attack arrested over separate malware claims"
4225:
4591:
4570:
4508:
4350:
4190:
3964:
2890:
2871:
2852:
2833:
2814:
2795:
2776:
2144:
2084:
1777:
1033:
at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
906:
750:
727:
632:
519:
256:
5163:
3990:"Defcon Capture the Flag: defending vulnerable code from intense attack"
3282:
4864:
4695:
3259:
3141:
2123:
2035:
1743:
1307:
1018:
In April 2017, a DEF CON Black Badge was featured in an exhibit in the
719:
489:
484:
261:
1798:
In 2016, the 15th edition of the CTF was done in partnership with the
4735:"DEF CON is canceled! No, really this time – but the show will go on"
3074:
3061:
2212:
1994:
1892:
1835:
High-profile issues which have garnered significant media attention.
1768:
In 2008, the Sk3wl of Root team took advantage of a bug in the game (
992:
928:
830:
509:
359:
339:
244:
205:
98:
5183:
Transcript, audio, video of Jess Moss describing DEF CON's inception
3451:
4476:
4332: (United States District Court District of Massachusetts),
4277:
3043:
2947:
2423:
1872:
was arrested the day after DEF CON for writing software to decrypt
1787:
In 2011, the team "lollerskaters dropping from roflcopters" used a
1759:
856:
849:
817:
766:
742:
connection to finding the most effective way to cool a beer in the
603:
334:
282:
3493:
3058:, a community supported conference with locations across the globe
5146:
4681:
4530:"ForAllSecure | Mayhem Security | Application Security"
3908:
3884:
3860:
3401:"Is this the most puzzling DEF CON attendee badge yet on record?"
2520:
2166:
A trip to DEF CON for a hacker showdown figures into the plot of
1739:
1281:
1233:
867:
840:
For DEF CON's 20th Anniversary, a film was commissioned entitled
805:
591:
479:
454:
447:
4563:"Hackers breach dozens of voting machines brought to conference"
4028:"Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11"
3064:, the first American hacker conference, organized by members of
896:
4696:"DEF CON 28 in-person conference is CANCELLED - DEF CON Forums"
4454:
3517:
3065:
2176:
came to Las Vegas and screened the film at DEF CON Movie Night.
2015:
1876:
822:
809:
743:
711:
645:
494:
434:
272:
102:
4088:
3114:
5158:
4516:
4419:"Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON"
3740:
3716:
3692:
1799:
1027:
967:
Workshops are dedicated classes on various topics related to
739:
4529:
3541:
955:
Linecon, any long line has the potential to turn into a con.
5167:
5141:
5097:
4496:
4469:
Hackers Don't Believe NSA Chief's Denial of Domestic Spying
4282:
1788:
976:
949:
4616:"O'Reilly Security Conference in NYC 2017 Defender Awards"
987:
Since DEF CON 11, fundraisers have been conducted for the
5129:
5052:
DefCon's Moss: Undercover Reporter Damages 'Neutral Zone'
4191:"Official forums social group section for DEF CON groups"
3994:
DARPA Information Survivability Conference and Exposition
3567:"DEF CON® Hacking Conference – Black Badge Hall of Fame"
3154:
gather intelligence on the latest techniques of hackers.
2068:
In September 2017, the Voting Machine Village produced "
3635:"DEF CON Hacking Conference - Capture the Flag Archive"
3469:
4761:"Caesars Ransomware Attack, MGM Hit Linked To DEFCON?"
4111:"Buffer overflow in handling of UNIX socket addresses"
2192:. The primary antagonist of the film, a fictionalized
1920:
Massachusetts Bay Transportation Authority v. Anderson
823:
U.S. Armed Forces defense readiness condition (DEFCON)
1948:
kiosk was positioned in the conference center of the
170:
5006:
5002:
5000:
4931:
4108:
2083:Marcus Hutchins, better known online by his handle
2046:On August 4, 2016, DEF CON and DARPA co-hosted the
4444:
4442:
4440:
4438:
4436:
4025:
3254:
3252:
4487:
4485:
4417:Fisher, Dennis; Roberts, Paul (August 10, 2011).
4216:"Exploit writers team up to target Cisco routers"
3260:"Def Con 27 Transparency Report - DEF CON Forums"
2163:, demonstrates some of the early DEF CON culture.
2062:At the "Voting Machine Village" event, dozens of
1997:quoted the 2012 DEF CON keynote speech and asked
1903:In August 2007, Michelle Madigan, a reporter for
800:DEF CON was founded in 1993, by then 18-year-old
5189:
4997:
4955:
4248:"Transcript: Michelle Madigan's run from Defcon"
2237:
5173:A first ever look inside the DEF CON NOC (2008)
5106:To Fix Voting Machines, Hackers Tear Them Apart
4910:
4671:
4513:Feds 'not welcome' at DEF CON hacker conference
4433:
3652:
3249:
4783:"Bomb scare causes mass evacuation at DEF CON"
4482:
2230:Lo and Behold, Reveries of the Connected World
1795:, causing havoc in the game's infrastructure.
4841:"DEF CON® Hacking Conference – Show Archives"
4479:. August 1, 2012. Retrieved on June 13, 2013.
4416:
4374:"Antivirus Vendors Slam Defcon Virus Contest"
4085:"Diutinus Defense Techonologies Corp. / Home"
3951:"Defcon 9 - Capture The Flag Contest Network"
3741:"Diutinus Defense Techonologies Corp. / Home"
3717:"Diutinus Defense Techonologies Corp. / DC18"
3693:"Diutinus Defense Techonologies Corp. / DC17"
3115:"DefCon Beverage Cooling Contraption Contest"
668:
5198:Las Vegas Valley conventions and trade shows
4865:"DEF CON 32 Was Canceled. We Un-Canceled it"
4519:. July 11, 2013. Retrieved on July 11, 2013.
4499:. July 11, 2013. Retrieved on July 12, 2013.
4307:"MIT Students Gagged by Federal Court Judge"
4013:"Defcon 10 - Capture the Flag (CTF) contest"
2053:for which it was not specifically designed.
1791:in FreeBSD (namely CVE-2011-4062) to escape
27:Annual hacker gathering in Las Vegas, Nevada
5021:
2136:
1730:
5093:NSA director finally greets Defcon hackers
4806:
4560:
3655:"A history of Capture the Flag at DEF CON"
3398:
3292:
749:Other contests, past and present, include
675:
661:
5070:
4636:Hern, Alex; Levin, Sam (August 4, 2017).
4635:
4493:Defcon to feds: 'We need some time apart'
4010:
2066:brought to the conference were breached.
4976:
4371:
4146:"Cyber Grand Challenge (CGC) (Archived)"
3372:
3130:
3128:
895:
772:Federal law enforcement agents from the
4758:
4548:"DEF CON Capture the Flag Final Scores"
4304:
3987:
3373:Oberhaus, Daniel (September 18, 2018).
979:, fuzzing and attacking smart devices.
938:
782:United States Postal Inspection Service
14:
5190:
4984:""Gray Tier Technologies at DEFCON23""
4275:
4245:
4239:
4040:
3424:
3134:
815:The term DEF CON comes from the movie
74:Security Conference, Hacker Conference
4759:Khaitan, Ashish (14 September 2023).
4213:
4207:
4065:A Brief History of CTF - Jordan Wiens
3931:
3648:
3646:
3644:
3192:"DEF CON® Hacking Conference – About"
3125:
3073:, a yearly hacker conference held in
1868:On July 16, 2001, Russian programmer
855:In 2020, due to safety concerns over
5213:Recurring events established in 1993
4780:
4732:
4123:
4026:The Ghetto Hackers (June 29, 2003).
3399:McAllister, Neil (August 12, 2015).
1830:
808:protocol based hacking network from
5071:Greenberg, Andy (August 10, 2023).
5007:Richard Byrne Reilly (2014-08-12).
4298:
4269:
4168:
3564:
3518:"DEF CON Crash and Compile Contest"
3189:
3046:, a quadrennial European convention
1036:
1024:National Museum of American History
395:forensics-focused operating systems
24:
5044:
4939:""Voting Machine Hacking Village""
4883:
4397:
4376:. IDG News Service. Archived from
4109:The FreeBSD Project (2011-09-28).
3641:
3325:
2227:included DEF CON in his 2016 film
991:(EFF). The first fundraiser was a
25:
5229:
5116:
4672:@VotingVillageDC (6 March 2018).
3425:Molina, Brett (August 14, 2018).
2034:authorities not to attend. Actor
1999:Director of National Intelligence
4720:"DEF CON Safe Mode archive site"
3909:"CTFtime.org / DEF CON CTF 2024"
3885:"CTFtime.org / DEF CON CTF 2023"
3861:"CTFtime.org / DEF CON CTF 2022"
3632:
3470:"Hacker Jeopardy for DEF CON 28"
2076:and the paper went on to win an
1991:Select Committee on Intelligence
5147:DEF CON v3 Tor .onion addresses
4877:
4857:
4833:
4800:
4774:
4752:
4726:
4712:
4688:
4665:
4629:
4608:
4584:
4554:
4540:
4522:
4502:
4461:
4410:
4400:"Malicious ATM Catches Hackers"
4391:
4372:McMillan, Robert (April 2008).
4365:
4339:
4321:
4305:Jeschke, Rebecca (2008-08-09).
4246:Cassel, David (4 August 2007).
4183:
4162:
4138:
4117:
4102:
4077:
4056:
4034:
4019:
4004:
3981:
3957:
3943:
3925:
3901:
3877:
3853:
3829:
3805:
3781:
3757:
3733:
3709:
3685:
3661:
3626:
3601:
3583:
3558:
3534:
3510:
3486:
3462:
3444:
3418:
3392:
3366:
3352:
3338:
3319:
3299:
216:Hacking of consumer electronics
4809:"Cyber Christ Meets Lady Luck"
3276:
3222:
3208:
3183:
3159:
3107:
3087:
2142:DEF CON was also portrayed in
1557:Legitimate Business Syndicate
1534:Legitimate Business Syndicate
1511:Legitimate Business Syndicate
1488:Legitimate Business Syndicate
1465:Legitimate Business Syndicate
1006:
989:Electronic Frontier Foundation
982:
13:
1:
5218:1993 establishments in Nevada
3135:Zetter, Kim (3 August 2007).
3081:
2967:Tropicana Resort & Casino
2948:Monte Carlo Resort and Casino
2238:Venues, dates, and attendance
2152:" featuring an appearance by
1758:, SubDomain (the ancestor of
1190:Ghetto Hackers & digirev
873:
4561:Joe Uchill (July 29, 2017).
4276:Lundin, Leigh (2008-08-17).
4126:"Defcon 19 CTF - CTF Inside"
4087:. 2011-05-14. Archived from
3033:Chaos Communication Congress
1986:On March 12, 2013, during a
1929:Computer Fraud and Abuse Act
962:
757:, art, slogan, coffee wars,
315:Chaos Communication Congress
7:
4944:. September 2017. p. 4
4214:Lamos, Rob (31 July 2005).
3988:Crispin, Cowan (May 2003).
3021:
2288:Las Vegas Convention Center
2269:Las Vegas Convention Center
2128:Las Vegas Convention Center
1856:hacker collective released
1612:Plaid Parliament of Pwning
1566:Plaid Parliament of Pwning
1543:Plaid Parliament of Pwning
1497:Plaid Parliament of Pwning
1474:Plaid Parliament of Pwning
1046:Capture the Flag Timeline
998:
913:
726:with a general interest in
10:
5234:
4406:– via www.wired.com.
4171:"cLEMENCy - Showing Mercy"
3346:"DEF CON 28 Safe Mode FAQ"
2929:Aladdin Hotel & Casino
2758:Riviera Hotel & Casino
2739:Riviera Hotel & Casino
2720:Riviera Hotel & Casino
2701:Riviera Hotel & Casino
2682:Riviera Hotel & Casino
2048:2016 Cyber Grand Challenge
1917:
1724:Maple Mallard Magistrates
1702:Maple Mallard Magistrates
1680:Maple Mallard Magistrates
1031:2016 Cyber Grand Challenge
878:
795:
627:2600: The Hacker Quarterly
365:List of computer criminals
29:
4618:. conferences.oreilly.com
2218:eps3.0_power-saver-mode.h
2080:Defender Research Award.
1817:
891:
755:robotics-related contests
165:
157:
149:
141:
131:
116:
108:
94:
86:
78:
70:
62:
57:
5164:DEF CON: The Documentary
5159:DEF CON: The Documentary
4918:""DEF CON Transparency""
3934:"Capture the Flag Games"
3669:"A Brief History of CTF"
3653:vulc@n of DDTek (2023).
3494:"DEF CON Scavenger Hunt"
2910:Plaza Hotel & Casino
2185:, the fifth film of the
2137:Entertainment references
1974:National Security Agency
1731:Capture the Flag History
545:Cloud computing security
5203:Annual events in Nevada
3609:"Mayhem Wins DARPA CGC"
3284:DEFCON: The Documentary
3077:, California since 1999
3050:Hackers on Planet Earth
2986:Sahara Hotel and Casino
1944:WIRED reported that an
1020:Smithsonian Institution
842:DEFCON: The Documentary
325:Hackers on Planet Earth
44:Infobox recurring event
36:
32:Defcon (disambiguation)
4044:A Brief History of CTF
3595:americanhistory.si.edu
3498:DEF CON Scavenger Hunt
3005:Sands Hotel and Casino
2663:Rio Hotel & Casino
2644:Rio Hotel & Casino
2625:Rio Hotel & Casino
2606:Rio Hotel & Casino
1852:On July 10, 1999, the
1649:Order Of the Overflow
1626:Order Of the Overflow
1603:Order Of the Overflow
1583:MIPS, x86 & armv7
1580:Order Of the Overflow
1514:MIPS, x86 & armv7
975:devices, playing with
948:Queercon, a meetup of
901:
580:Homebrew Computer Club
120:June 9, 1993
49:considered for merging
4041:Jordan (2021-04-06),
3932:Riley, Eller (2004).
3328:"Defcon is Cancelled"
2093:Kronos banking trojan
1804:Cyber Grand Challenge
1738:In 2002, the company
1606:x86, arm64, esoteric
1402:FreeBSD & Debian
931:, and the well known
899:
837:attended DEF CON 27.
732:computer architecture
4963:""Norton at DefCon""
4886:"Defcon Is Canceled"
2009:, had been exposed.
1988:United States Senate
1972:The director of the
1950:Riviera Hotel Casino
1854:Cult of the Dead Cow
1756:non-executable stack
1428:European Nopsleders
969:information security
939:Internal Conferences
598:Masters of Deception
540:Application security
18:DEF CON (convention)
4550:. blog.legitbs.net.
3837:"OOO — DEF CON CTF"
3813:"OOO — DEF CON CTF"
3789:"OOO — DEF CON CTF"
3673:psifertex.github.io
3565:Tangent, The Dark.
3522:crashandcompile.org
3235:The Story of DEFCON
3190:Tangent, The Dark.
3095:"Def Con 1 Archive"
3028:Black Hat Briefings
2914:July 31 – August 2
2800:July 30 – August 1
2705:July 30 – August 2
2686:July 30 – August 1
1716:Nautilus Institute
1694:Nautilus Institute
1672:Nautilus Institute
1214:Digital Revelation
1047:
575:Chaos Computer Club
310:Black Hat Briefings
184:Part of a series on
5208:Hacker conventions
5104:Newman, Lily Hay "
5057:2019-09-24 at the
4884:Newman, Lily Hay.
4467:Wagenseil, Paul. "
4448:Greenberg, Andy. "
3765:"DEF CON CTF 2018"
3326:Newman, Lily Hay.
3142:Wired Blog Network
2891:Alexis Park Resort
2872:Alexis Park Resort
2853:Alexis Park Resort
2834:Alexis Park Resort
2815:Alexis Park Resort
2796:Alexis Park Resort
2777:Alexis Park Resort
2474:DEF CON China 1.0
2392:DEF CON Safe Mode
2205:Keith B. Alexander
2029:On July 11, 2013,
1978:Keith B. Alexander
1887:On July 31, 2005,
1770:privilege dropping
1045:
933:Social Engineering
902:
821:, referencing the
405:Social engineering
5067:. August 6, 2007.
4491:Whitney, Lance. "
4423:Business Security
4278:"Dangerous Ideas"
3841:OOO — DEF CON CTF
3817:OOO — DEF CON CTF
3793:OOO — DEF CON CTF
3769:OOO — DEF CON CTF
3456:Aerospace Village
3232:(July 30, 2007).
3167:"DEFCON 15 FAQ's"
3039:Electronic voting
3019:
3018:
2216:Season 3 opener "
2134:
2133:
2089:WannaCry outbreak
1993:hearing, Senator
1960:Security company
1895:used on routers.
1858:Back Orifice 2000
1831:Notable incidents
1802:, as part of its
1728:
1727:
1652:x86, microengine
1609:Linux, iOS, Xbox
1491:armv7 & i386
829:, a reference to
716:computer security
706:held annually in
704:hacker convention
690:(also written as
685:
684:
533:Computer security
500:Keystroke logging
179:
178:
153:August 7-10, 2025
145:August 8-11, 2024
16:(Redirected from
5225:
5133:
5132:
5130:Official website
5101:. July 27, 2012.
5091:Mills, Elinor. "
5088:
5086:
5085:
5064:Information Week
5039:
5038:
5036:
5035:
5029:"DEF CON 17 FAQ"
5025:
5019:
5018:
5016:
5015:
5004:
4995:
4994:
4992:
4991:
4980:
4974:
4973:
4971:
4970:
4965:. September 2019
4959:
4953:
4952:
4950:
4949:
4943:
4935:
4929:
4928:
4926:
4925:
4914:
4908:
4907:
4905:
4904:
4881:
4875:
4874:
4872:
4871:
4861:
4855:
4854:
4852:
4851:
4837:
4831:
4830:
4828:
4826:
4820:
4814:. Archived from
4813:
4807:Winn Schwartau.
4804:
4798:
4797:
4795:
4793:
4778:
4772:
4771:
4769:
4767:
4756:
4750:
4749:
4747:
4745:
4730:
4724:
4723:
4716:
4710:
4709:
4707:
4706:
4700:forum.defcon.org
4692:
4686:
4685:
4669:
4663:
4662:
4660:
4658:
4633:
4627:
4626:
4624:
4623:
4612:
4606:
4605:
4603:
4602:
4588:
4582:
4581:
4579:
4577:
4558:
4552:
4551:
4544:
4538:
4537:
4526:
4520:
4506:
4500:
4489:
4480:
4465:
4459:
4446:
4431:
4430:
4425:. Archived from
4414:
4408:
4407:
4395:
4389:
4388:
4386:
4385:
4369:
4363:
4362:Contest concept.
4361:
4359:
4358:
4349:. Archived from
4343:
4337:
4331:
4325:
4319:
4318:
4302:
4296:
4295:
4293:
4292:
4287:. Criminal Brief
4273:
4267:
4266:
4264:
4263:
4254:. Archived from
4243:
4237:
4236:
4234:
4233:
4224:. Archived from
4211:
4205:
4204:
4202:
4201:
4187:
4181:
4180:
4178:
4177:
4166:
4160:
4159:
4157:
4156:
4142:
4136:
4135:
4133:
4132:
4121:
4115:
4114:
4106:
4100:
4099:
4097:
4096:
4081:
4075:
4074:
4073:
4072:
4060:
4054:
4053:
4052:
4051:
4038:
4032:
4031:
4023:
4017:
4016:
4008:
4002:
4001:
3985:
3979:
3978:
3976:
3975:
3961:
3955:
3954:
3947:
3941:
3940:
3938:
3929:
3923:
3922:
3920:
3919:
3905:
3899:
3898:
3896:
3895:
3881:
3875:
3874:
3872:
3871:
3857:
3851:
3850:
3848:
3847:
3833:
3827:
3826:
3824:
3823:
3809:
3803:
3802:
3800:
3799:
3785:
3779:
3778:
3776:
3775:
3761:
3755:
3754:
3752:
3751:
3737:
3731:
3730:
3728:
3727:
3713:
3707:
3706:
3704:
3703:
3689:
3683:
3682:
3680:
3679:
3665:
3659:
3658:
3650:
3639:
3638:
3630:
3624:
3623:
3621:
3620:
3611:. Archived from
3605:
3599:
3598:
3597:. 20 April 2017.
3587:
3581:
3580:
3578:
3577:
3562:
3556:
3555:
3553:
3552:
3546:hackfortress.net
3538:
3532:
3531:
3529:
3528:
3514:
3508:
3507:
3505:
3504:
3490:
3484:
3483:
3481:
3480:
3466:
3460:
3459:
3448:
3442:
3441:
3439:
3437:
3422:
3416:
3415:
3413:
3411:
3396:
3390:
3389:
3387:
3385:
3379:Vice Motherboard
3370:
3364:
3363:
3360:"DEF CON 29 FAQ"
3356:
3350:
3349:
3342:
3336:
3335:
3323:
3317:
3316:
3303:
3297:
3296:
3280:
3274:
3273:
3271:
3270:
3264:forum.defcon.org
3256:
3247:
3246:
3244:
3242:
3226:
3220:
3219:
3212:
3206:
3205:
3203:
3202:
3187:
3181:
3180:
3175:
3173:
3163:
3157:
3156:
3150:
3149:
3132:
3123:
3122:
3111:
3105:
3104:
3102:
3101:
3091:
2482:May 31 – June 2
2455:Planet Hollywood
2248:Conference Name
2245:
2244:
2074:Atlantic Council
1838:
1837:
1057:Competing Teams
1048:
1044:
1037:Capture the flag
1013:Capture the flag
827:telephone keypad
763:Capture the Flag
677:
670:
663:
550:Network security
251:Hacker Manifesto
190:Computer hacking
181:
180:
175:
172:
127:
125:
55:
54:
52:
21:
5233:
5232:
5228:
5227:
5226:
5224:
5223:
5222:
5188:
5187:
5128:
5127:
5119:
5112:August 1, 2017.
5083:
5081:
5059:Wayback Machine
5047:
5045:Further reading
5042:
5033:
5031:
5027:
5026:
5022:
5013:
5011:
5005:
4998:
4989:
4987:
4982:
4981:
4977:
4968:
4966:
4961:
4960:
4956:
4947:
4945:
4941:
4937:
4936:
4932:
4923:
4921:
4916:
4915:
4911:
4902:
4900:
4882:
4878:
4869:
4867:
4863:
4862:
4858:
4849:
4847:
4839:
4838:
4834:
4824:
4822:
4821:on 18 July 2011
4818:
4811:
4805:
4801:
4791:
4789:
4781:Thompson, Ian.
4779:
4775:
4765:
4763:
4757:
4753:
4743:
4741:
4733:Thompson, Ian.
4731:
4727:
4718:
4717:
4713:
4704:
4702:
4694:
4693:
4689:
4670:
4666:
4656:
4654:
4634:
4630:
4621:
4619:
4614:
4613:
4609:
4600:
4598:
4590:
4589:
4585:
4575:
4573:
4559:
4555:
4546:
4545:
4541:
4528:
4527:
4523:
4507:
4503:
4490:
4483:
4466:
4462:
4447:
4434:
4415:
4411:
4396:
4392:
4383:
4381:
4370:
4366:
4356:
4354:
4345:
4344:
4340:
4327:
4326:
4322:
4303:
4299:
4290:
4288:
4274:
4270:
4261:
4259:
4252:Tech.Blorge.com
4244:
4240:
4231:
4229:
4212:
4208:
4199:
4197:
4189:
4188:
4184:
4175:
4173:
4167:
4163:
4154:
4152:
4144:
4143:
4139:
4130:
4128:
4122:
4118:
4107:
4103:
4094:
4092:
4083:
4082:
4078:
4070:
4068:
4062:
4061:
4057:
4049:
4047:
4039:
4035:
4024:
4020:
4011:Ghettohackers.
4009:
4005:
3986:
3982:
3973:
3971:
3969:slideplayer.com
3963:
3962:
3958:
3949:
3948:
3944:
3936:
3930:
3926:
3917:
3915:
3907:
3906:
3902:
3893:
3891:
3883:
3882:
3878:
3869:
3867:
3859:
3858:
3854:
3845:
3843:
3835:
3834:
3830:
3821:
3819:
3811:
3810:
3806:
3797:
3795:
3787:
3786:
3782:
3773:
3771:
3763:
3762:
3758:
3749:
3747:
3739:
3738:
3734:
3725:
3723:
3715:
3714:
3710:
3701:
3699:
3691:
3690:
3686:
3677:
3675:
3667:
3666:
3662:
3651:
3642:
3631:
3627:
3618:
3616:
3607:
3606:
3602:
3589:
3588:
3584:
3575:
3573:
3563:
3559:
3550:
3548:
3540:
3539:
3535:
3526:
3524:
3516:
3515:
3511:
3502:
3500:
3492:
3491:
3487:
3478:
3476:
3468:
3467:
3463:
3450:
3449:
3445:
3435:
3433:
3423:
3419:
3409:
3407:
3405:The Register UK
3397:
3393:
3383:
3381:
3371:
3367:
3358:
3357:
3353:
3344:
3343:
3339:
3324:
3320:
3305:
3304:
3300:
3281:
3277:
3268:
3266:
3258:
3257:
3250:
3240:
3238:
3228:
3227:
3223:
3214:
3213:
3209:
3200:
3198:
3188:
3184:
3171:
3169:
3165:
3164:
3160:
3147:
3145:
3133:
3126:
3113:
3112:
3108:
3099:
3097:
3093:
3092:
3088:
3084:
3056:Security BSides
3024:
2516:DEF CON China
2240:
2198:Tommy Lee Jones
2154:The Lone Gunmen
2150:Three of a Kind
2139:
2064:voting machines
1932:
1922:
1870:Dmitry Sklyarov
1833:
1820:
1733:
1252:Ghetto Hackers
1228:Ghetto Hackers
1203:Ghetto Hackers
1169:Ghetto Hackers
1149:Ghetto Hackers
1039:
1009:
1001:
985:
965:
941:
916:
894:
881:
876:
798:
718:professionals,
681:
652:
651:
621:
613:
612:
565:
555:
554:
535:
525:
524:
450:
440:
439:
425:
415:
414:
385:
375:
374:
355:
345:
344:
330:Security BSides
305:
295:
294:
240:
226:
225:
221:List of hackers
201:
169:
123:
121:
53:
37:
35:
28:
23:
22:
15:
12:
11:
5:
5231:
5221:
5220:
5215:
5210:
5205:
5200:
5186:
5185:
5180:
5175:
5170:
5161:
5150:
5149:
5144:
5142:DEF CON Groups
5139:
5134:
5118:
5117:External links
5115:
5114:
5113:
5102:
5089:
5068:
5046:
5043:
5041:
5040:
5020:
4996:
4975:
4954:
4930:
4909:
4876:
4856:
4845:www.defcon.org
4832:
4799:
4773:
4751:
4725:
4711:
4687:
4680:) – via
4664:
4628:
4607:
4583:
4553:
4539:
4521:
4501:
4481:
4460:
4432:
4429:on 2011-08-10.
4409:
4390:
4364:
4347:"Race to Zero"
4338:
4320:
4297:
4268:
4238:
4206:
4195:DEF CON Forums
4182:
4161:
4137:
4116:
4101:
4076:
4055:
4033:
4018:
4003:
3980:
3956:
3942:
3924:
3900:
3876:
3852:
3828:
3804:
3780:
3756:
3732:
3708:
3684:
3660:
3640:
3625:
3600:
3582:
3571:www.defcon.org
3557:
3542:"Hackfortress"
3533:
3509:
3485:
3461:
3443:
3417:
3391:
3365:
3351:
3337:
3318:
3298:
3275:
3248:
3221:
3216:"DEFCON about"
3207:
3196:www.defcon.org
3182:
3158:
3124:
3106:
3085:
3083:
3080:
3079:
3078:
3068:
3059:
3053:
3047:
3041:
3036:
3030:
3023:
3020:
3017:
3016:
3013:
3010:
3007:
3002:
2998:
2997:
2994:
2991:
2988:
2983:
2979:
2978:
2975:
2972:
2969:
2964:
2960:
2959:
2956:
2953:
2950:
2945:
2941:
2940:
2937:
2934:
2931:
2926:
2922:
2921:
2918:
2915:
2912:
2907:
2903:
2902:
2899:
2896:
2893:
2888:
2884:
2883:
2880:
2877:
2874:
2869:
2865:
2864:
2861:
2858:
2855:
2850:
2846:
2845:
2842:
2839:
2836:
2831:
2827:
2826:
2823:
2820:
2817:
2812:
2808:
2807:
2804:
2801:
2798:
2793:
2789:
2788:
2785:
2782:
2779:
2774:
2770:
2769:
2766:
2763:
2760:
2755:
2751:
2750:
2747:
2744:
2741:
2736:
2732:
2731:
2728:
2725:
2722:
2717:
2713:
2712:
2709:
2706:
2703:
2698:
2694:
2693:
2690:
2687:
2684:
2679:
2675:
2674:
2671:
2668:
2665:
2660:
2656:
2655:
2652:
2649:
2646:
2641:
2637:
2636:
2633:
2630:
2627:
2622:
2618:
2617:
2614:
2611:
2608:
2603:
2599:
2598:
2595:
2592:
2589:
2580:
2576:
2575:
2572:
2569:
2566:
2557:
2553:
2552:
2549:
2546:
2543:
2541:Caesars Palace
2538:
2534:
2533:
2530:
2527:
2524:
2519:Kuntai Hotel (
2517:
2513:
2512:
2509:
2506:
2503:
2497:Caesars Palace
2494:
2490:
2489:
2486:
2483:
2480:
2475:
2471:
2470:
2467:
2464:
2461:
2444:
2440:
2439:
2436:
2433:
2430:
2412:
2408:
2407:
2404:
2401:
2398:
2393:
2389:
2388:
2385:
2382:
2379:
2370:
2366:
2365:
2362:
2359:
2356:
2350:Harrah's Hotel
2339:
2335:
2334:
2331:
2328:
2325:
2319:Harrah's Hotel
2308:
2304:
2303:
2300:
2297:
2294:
2285:
2281:
2280:
2277:
2274:
2271:
2266:
2262:
2261:
2258:
2255:
2252:
2249:
2239:
2236:
2235:
2234:
2223:Documentarian
2221:
2208:
2177:
2174:William Eubank
2164:
2161:Winn Schwartau
2157:
2138:
2135:
2132:
2131:
2120:
2116:
2115:
2111:
2107:
2106:
2102:
2098:
2097:
2060:
2056:
2055:
2044:
2040:
2039:
2027:
2023:
2022:
2011:Andy Greenberg
1970:
1966:
1965:
1962:HBGary Federal
1958:
1954:
1953:
1942:
1938:
1937:
1918:Main article:
1915:
1911:
1910:
1901:
1897:
1896:
1885:
1881:
1880:
1866:
1862:
1861:
1850:
1846:
1845:
1842:
1832:
1829:
1819:
1816:
1732:
1729:
1726:
1725:
1722:
1720:
1717:
1714:
1711:
1708:
1704:
1703:
1700:
1698:
1695:
1692:
1689:
1686:
1682:
1681:
1678:
1676:
1673:
1670:
1667:
1664:
1660:
1659:
1656:
1653:
1650:
1647:
1644:
1641:
1637:
1636:
1633:
1630:
1629:x86, esoteric
1627:
1624:
1621:
1618:
1614:
1613:
1610:
1607:
1604:
1601:
1598:
1595:
1591:
1590:
1587:
1584:
1581:
1578:
1575:
1572:
1568:
1567:
1564:
1561:
1558:
1555:
1552:
1549:
1545:
1544:
1541:
1538:
1535:
1532:
1529:
1526:
1522:
1521:
1518:
1515:
1512:
1509:
1506:
1503:
1499:
1498:
1495:
1492:
1489:
1486:
1483:
1480:
1476:
1475:
1472:
1469:
1466:
1463:
1460:
1457:
1453:
1452:
1449:
1446:
1443:
1440:
1437:
1434:
1430:
1429:
1426:
1423:
1420:
1417:
1414:
1411:
1407:
1406:
1403:
1400:
1397:
1394:
1391:
1388:
1384:
1383:
1380:
1377:
1374:
1371:
1368:
1365:
1361:
1360:
1359:Sk3wl of Root
1357:
1354:
1351:
1348:
1345:
1342:
1338:
1337:
1334:
1331:
1328:
1325:
1322:
1319:
1315:
1314:
1311:
1305:
1302:
1299:
1296:
1293:
1289:
1288:
1285:
1279:
1276:
1273:
1270:
1267:
1263:
1262:
1259:
1256:
1253:
1250:
1247:
1244:
1240:
1239:
1236:
1231:
1229:
1226:
1223:
1220:
1216:
1215:
1212:
1206:
1204:
1201:
1199:
1196:
1192:
1191:
1188:
1185:
1183:
1180:
1178:
1175:
1171:
1170:
1167:
1165:
1163:
1160:
1158:
1155:
1151:
1150:
1147:
1145:
1143:
1140:
1138:
1135:
1131:
1130:
1127:
1125:
1123:
1120:
1118:
1115:
1111:
1110:
1107:
1105:
1103:
1100:
1098:
1095:
1091:
1090:
1087:
1085:
1083:
1080:
1078:
1075:
1071:
1070:
1067:
1064:
1061:
1058:
1055:
1052:
1038:
1035:
1008:
1005:
1000:
997:
984:
981:
964:
961:
960:
959:
956:
953:
940:
937:
915:
912:
893:
890:
880:
877:
875:
872:
797:
794:
759:scavenger hunt
683:
682:
680:
679:
672:
665:
657:
654:
653:
650:
649:
642:
639:Nuts and Volts
635:
630:
622:
619:
618:
615:
614:
611:
610:
601:
595:
589:
586:Legion of Doom
583:
577:
572:
566:
561:
560:
557:
556:
553:
552:
547:
542:
536:
531:
530:
527:
526:
523:
522:
517:
512:
507:
502:
497:
492:
487:
482:
477:
472:
467:
462:
457:
451:
446:
445:
442:
441:
438:
437:
432:
426:
423:Practice sites
421:
420:
417:
416:
413:
412:
407:
402:
397:
392:
386:
381:
380:
377:
376:
373:
372:
367:
362:
356:
353:Computer crime
351:
350:
347:
346:
343:
342:
337:
332:
327:
322:
317:
312:
306:
301:
300:
297:
296:
293:
292:
291:
290:
285:
280:
269:
264:
259:
254:
247:
241:
234:Hacker culture
232:
231:
228:
227:
224:
223:
218:
213:
211:Cryptovirology
208:
202:
197:
196:
193:
192:
186:
185:
177:
176:
167:
163:
162:
159:
155:
154:
151:
147:
146:
143:
142:Previous event
139:
138:
133:
129:
128:
118:
114:
113:
110:
106:
105:
96:
92:
91:
88:
84:
83:
80:
76:
75:
72:
68:
67:
64:
60:
59:
26:
9:
6:
4:
3:
2:
5230:
5219:
5216:
5214:
5211:
5209:
5206:
5204:
5201:
5199:
5196:
5195:
5193:
5184:
5181:
5179:
5176:
5174:
5171:
5169:
5165:
5162:
5160:
5157:
5156:
5155:
5154:
5148:
5145:
5143:
5140:
5138:
5135:
5131:
5126:
5125:
5124:
5123:
5111:
5107:
5103:
5100:
5099:
5094:
5090:
5080:
5079:
5074:
5069:
5066:
5065:
5060:
5056:
5053:
5049:
5048:
5030:
5024:
5010:
5003:
5001:
4986:. August 2015
4985:
4979:
4964:
4958:
4940:
4934:
4920:. August 2018
4919:
4913:
4899:
4895:
4891:
4887:
4880:
4866:
4860:
4846:
4842:
4836:
4817:
4810:
4803:
4788:
4784:
4777:
4762:
4755:
4740:
4736:
4729:
4721:
4715:
4701:
4697:
4691:
4683:
4679:
4675:
4668:
4653:
4649:
4645:
4644:
4639:
4632:
4617:
4611:
4597:
4593:
4587:
4572:
4568:
4564:
4557:
4549:
4543:
4535:
4531:
4525:
4518:
4514:
4510:
4505:
4498:
4494:
4488:
4486:
4478:
4474:
4470:
4464:
4457:
4456:
4451:
4445:
4443:
4441:
4439:
4437:
4428:
4424:
4420:
4413:
4405:
4401:
4398:Zetter, Kim.
4394:
4380:on 2024-03-19
4379:
4375:
4368:
4353:on 2011-11-18
4352:
4348:
4342:
4335:
4330:
4324:
4316:
4312:
4308:
4301:
4286:
4284:
4279:
4272:
4258:on 2007-09-08
4257:
4253:
4249:
4242:
4228:on 2012-07-28
4227:
4223:
4222:
4221:SecurityFocus
4217:
4210:
4196:
4192:
4186:
4172:
4165:
4151:
4150:www.darpa.mil
4147:
4141:
4127:
4120:
4112:
4105:
4091:on 2011-05-14
4090:
4086:
4080:
4067:
4066:
4059:
4046:
4045:
4037:
4029:
4022:
4014:
4007:
3999:
3995:
3991:
3984:
3970:
3966:
3960:
3953:. 2001-07-09.
3952:
3946:
3935:
3928:
3914:
3910:
3904:
3890:
3886:
3880:
3866:
3862:
3856:
3842:
3838:
3832:
3818:
3814:
3808:
3794:
3790:
3784:
3770:
3766:
3760:
3746:
3742:
3736:
3722:
3718:
3712:
3698:
3694:
3688:
3674:
3670:
3664:
3656:
3649:
3647:
3645:
3636:
3629:
3615:on 2019-02-15
3614:
3610:
3604:
3596:
3592:
3586:
3572:
3568:
3561:
3547:
3543:
3537:
3523:
3519:
3513:
3499:
3495:
3489:
3475:
3471:
3465:
3457:
3453:
3447:
3432:
3428:
3421:
3406:
3402:
3395:
3380:
3376:
3369:
3361:
3355:
3347:
3341:
3333:
3329:
3322:
3314:
3313:
3308:
3302:
3295:
3290:
3286:
3285:
3279:
3265:
3261:
3255:
3253:
3237:
3236:
3231:
3225:
3217:
3211:
3197:
3193:
3186:
3179:
3168:
3162:
3155:
3144:
3143:
3138:
3131:
3129:
3120:
3119:deviating.net
3116:
3110:
3096:
3090:
3086:
3076:
3072:
3069:
3067:
3063:
3060:
3057:
3054:
3051:
3048:
3045:
3042:
3040:
3037:
3034:
3031:
3029:
3026:
3025:
3014:
3011:
3008:
3006:
3003:
3000:
2999:
2995:
2992:
2989:
2987:
2984:
2981:
2980:
2976:
2973:
2970:
2968:
2965:
2962:
2961:
2957:
2954:
2951:
2949:
2946:
2943:
2942:
2938:
2935:
2932:
2930:
2927:
2924:
2923:
2919:
2916:
2913:
2911:
2908:
2905:
2904:
2900:
2897:
2894:
2892:
2889:
2886:
2885:
2881:
2878:
2875:
2873:
2870:
2867:
2866:
2862:
2859:
2856:
2854:
2851:
2848:
2847:
2843:
2840:
2837:
2835:
2832:
2829:
2828:
2824:
2821:
2818:
2816:
2813:
2810:
2809:
2805:
2802:
2799:
2797:
2794:
2791:
2790:
2786:
2783:
2780:
2778:
2775:
2772:
2771:
2767:
2764:
2761:
2759:
2756:
2753:
2752:
2748:
2745:
2742:
2740:
2737:
2734:
2733:
2729:
2726:
2723:
2721:
2718:
2715:
2714:
2710:
2707:
2704:
2702:
2699:
2696:
2695:
2691:
2688:
2685:
2683:
2680:
2677:
2676:
2672:
2669:
2666:
2664:
2661:
2658:
2657:
2653:
2650:
2647:
2645:
2642:
2639:
2638:
2634:
2631:
2628:
2626:
2623:
2620:
2619:
2615:
2612:
2609:
2607:
2604:
2601:
2600:
2596:
2593:
2590:
2588:
2587:Bally's Hotel
2584:
2581:
2578:
2577:
2573:
2570:
2567:
2565:
2564:Bally's Hotel
2561:
2558:
2555:
2554:
2550:
2547:
2544:
2542:
2539:
2536:
2535:
2531:
2528:
2525:
2522:
2518:
2515:
2514:
2510:
2507:
2504:
2502:
2498:
2495:
2492:
2491:
2487:
2484:
2481:
2479:
2476:
2473:
2472:
2468:
2465:
2462:
2460:
2456:
2452:
2451:Bally's Hotel
2448:
2445:
2442:
2441:
2437:
2434:
2431:
2429:
2425:
2421:
2417:
2416:Caesars Forum
2413:
2410:
2409:
2405:
2402:
2399:
2397:
2396:Virtual event
2394:
2391:
2390:
2386:
2383:
2380:
2378:
2377:Bally's Hotel
2374:
2371:
2368:
2367:
2363:
2360:
2358:August 11–14
2357:
2355:
2351:
2347:
2343:
2342:Caesars Forum
2340:
2337:
2336:
2332:
2329:
2327:August 10–13
2326:
2324:
2320:
2316:
2312:
2311:Caesars Forum
2309:
2306:
2305:
2301:
2298:
2295:
2293:
2289:
2286:
2283:
2282:
2278:
2275:
2272:
2270:
2267:
2264:
2263:
2259:
2256:
2253:
2250:
2247:
2246:
2243:
2232:
2231:
2226:
2225:Werner Herzog
2222:
2219:
2215:
2214:
2209:
2206:
2203:
2199:
2195:
2191:
2189:
2184:
2183:
2178:
2175:
2171:
2170:
2165:
2162:
2158:
2155:
2151:
2147:
2146:
2141:
2140:
2130:as a result.
2129:
2125:
2121:
2118:
2117:
2112:
2109:
2108:
2103:
2100:
2099:
2096:
2094:
2090:
2086:
2081:
2079:
2075:
2071:
2065:
2061:
2058:
2057:
2054:
2049:
2045:
2042:
2041:
2037:
2032:
2028:
2025:
2024:
2021:
2018:
2017:
2012:
2008:
2003:
2002:James Clapper
2000:
1996:
1992:
1989:
1983:
1979:
1975:
1971:
1968:
1967:
1963:
1959:
1956:
1955:
1951:
1947:
1943:
1940:
1939:
1936:
1930:
1925:
1921:
1916:
1913:
1912:
1908:
1907:
1902:
1899:
1898:
1894:
1890:
1886:
1883:
1882:
1878:
1875:
1871:
1867:
1864:
1863:
1859:
1855:
1851:
1848:
1847:
1843:
1840:
1839:
1836:
1828:
1825:
1815:
1812:
1811:middle-endian
1807:
1805:
1801:
1796:
1794:
1790:
1785:
1781:
1779:
1775:
1771:
1766:
1763:
1761:
1757:
1753:
1749:
1745:
1741:
1736:
1723:
1721:
1718:
1715:
1712:
1709:
1706:
1705:
1701:
1699:
1696:
1693:
1690:
1687:
1684:
1683:
1679:
1677:
1674:
1671:
1668:
1665:
1662:
1661:
1657:
1654:
1651:
1648:
1645:
1642:
1639:
1638:
1634:
1631:
1628:
1625:
1622:
1619:
1616:
1615:
1611:
1608:
1605:
1602:
1599:
1596:
1593:
1592:
1588:
1585:
1582:
1579:
1576:
1573:
1570:
1569:
1565:
1562:
1559:
1556:
1553:
1550:
1547:
1546:
1542:
1539:
1536:
1533:
1530:
1527:
1524:
1523:
1519:
1516:
1513:
1510:
1507:
1504:
1501:
1500:
1496:
1493:
1490:
1487:
1484:
1481:
1478:
1477:
1473:
1470:
1467:
1464:
1461:
1458:
1455:
1454:
1450:
1447:
1444:
1441:
1438:
1435:
1432:
1431:
1427:
1424:
1421:
1418:
1415:
1412:
1409:
1408:
1404:
1401:
1398:
1395:
1392:
1389:
1386:
1385:
1381:
1378:
1375:
1372:
1369:
1366:
1363:
1362:
1358:
1355:
1352:
1349:
1346:
1343:
1340:
1339:
1335:
1332:
1329:
1326:
1323:
1320:
1317:
1316:
1312:
1309:
1306:
1303:
1300:
1297:
1294:
1291:
1290:
1286:
1283:
1280:
1277:
1274:
1271:
1268:
1265:
1264:
1260:
1257:
1254:
1251:
1248:
1245:
1242:
1241:
1237:
1235:
1232:
1230:
1227:
1224:
1221:
1218:
1217:
1213:
1210:
1207:
1205:
1202:
1200:
1197:
1194:
1193:
1189:
1186:
1184:
1181:
1179:
1176:
1173:
1172:
1168:
1166:
1164:
1161:
1159:
1156:
1153:
1152:
1148:
1146:
1144:
1141:
1139:
1136:
1133:
1132:
1128:
1126:
1124:
1121:
1119:
1116:
1113:
1112:
1108:
1106:
1104:
1101:
1099:
1096:
1093:
1092:
1088:
1086:
1084:
1081:
1079:
1076:
1073:
1072:
1069:Winning Team
1068:
1065:
1063:Architecture
1062:
1059:
1056:
1053:
1050:
1049:
1043:
1034:
1032:
1029:
1025:
1021:
1016:
1014:
1004:
996:
994:
990:
980:
978:
974:
970:
957:
954:
951:
947:
946:
945:
936:
934:
930:
926:
922:
911:
908:
898:
889:
887:
871:
869:
865:
860:
858:
853:
851:
845:
843:
838:
834:
832:
828:
824:
820:
819:
813:
811:
807:
803:
793:
791:
787:
783:
779:
775:
770:
768:
764:
760:
756:
752:
747:
745:
741:
737:
733:
729:
725:
721:
717:
713:
709:
705:
701:
697:
693:
689:
678:
673:
671:
666:
664:
659:
658:
656:
655:
648:
647:
643:
641:
640:
636:
634:
631:
629:
628:
624:
623:
617:
616:
609:
605:
602:
599:
596:
593:
590:
587:
584:
581:
578:
576:
573:
571:
568:
567:
564:
559:
558:
551:
548:
546:
543:
541:
538:
537:
534:
529:
528:
521:
518:
516:
513:
511:
508:
506:
503:
501:
498:
496:
493:
491:
488:
486:
483:
481:
478:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
452:
449:
444:
443:
436:
433:
431:
428:
427:
424:
419:
418:
411:
410:Vulnerability
408:
406:
403:
401:
398:
396:
393:
391:
388:
387:
384:
383:Hacking tools
379:
378:
371:
370:Script kiddie
368:
366:
363:
361:
358:
357:
354:
349:
348:
341:
338:
336:
333:
331:
328:
326:
323:
321:
318:
316:
313:
311:
308:
307:
304:
299:
298:
289:
286:
284:
281:
279:
276:
275:
274:
270:
268:
267:Maker culture
265:
263:
260:
258:
255:
253:
252:
248:
246:
243:
242:
239:
235:
230:
229:
222:
219:
217:
214:
212:
209:
207:
204:
203:
200:
195:
194:
191:
188:
187:
183:
182:
174:
168:
164:
160:
156:
152:
148:
144:
140:
137:
134:
130:
119:
115:
111:
107:
104:
100:
97:
93:
89:
85:
81:
77:
73:
69:
65:
61:
56:
50:
46:
45:
41:
33:
19:
5152:
5151:
5137:Official FAQ
5121:
5120:
5096:
5082:. Retrieved
5076:
5062:
5032:. Retrieved
5023:
5012:. Retrieved
4988:. Retrieved
4978:
4967:. Retrieved
4957:
4946:. Retrieved
4933:
4922:. Retrieved
4912:
4901:. Retrieved
4889:
4879:
4868:. Retrieved
4859:
4848:. Retrieved
4844:
4835:
4823:. Retrieved
4816:the original
4802:
4792:12 September
4790:. Retrieved
4787:The Register
4786:
4776:
4766:12 September
4764:. Retrieved
4754:
4744:12 September
4742:. Retrieved
4739:The Register
4738:
4728:
4714:
4703:. Retrieved
4699:
4690:
4667:
4655:. Retrieved
4643:The Guardian
4641:
4631:
4620:. Retrieved
4610:
4599:. Retrieved
4595:
4586:
4574:. Retrieved
4566:
4556:
4542:
4534:ForAllSecure
4533:
4524:
4509:Blue, Violet
4504:
4463:
4453:
4427:the original
4422:
4412:
4403:
4393:
4382:. Retrieved
4378:the original
4367:
4355:. Retrieved
4351:the original
4341:
4328:
4323:
4310:
4300:
4289:. Retrieved
4281:
4271:
4260:. Retrieved
4256:the original
4251:
4241:
4230:. Retrieved
4226:the original
4219:
4209:
4198:. Retrieved
4194:
4185:
4174:. Retrieved
4164:
4153:. Retrieved
4149:
4140:
4129:. Retrieved
4119:
4104:
4093:. Retrieved
4089:the original
4079:
4069:, retrieved
4064:
4058:
4048:, retrieved
4043:
4036:
4021:
4006:
3997:
3993:
3983:
3972:. Retrieved
3968:
3959:
3945:
3927:
3916:. Retrieved
3912:
3903:
3892:. Retrieved
3888:
3879:
3868:. Retrieved
3864:
3855:
3844:. Retrieved
3840:
3831:
3820:. Retrieved
3816:
3807:
3796:. Retrieved
3792:
3783:
3772:. Retrieved
3768:
3759:
3748:. Retrieved
3744:
3735:
3724:. Retrieved
3720:
3711:
3700:. Retrieved
3696:
3687:
3676:. Retrieved
3672:
3663:
3633:Moss, Jeff.
3628:
3617:. Retrieved
3613:the original
3603:
3594:
3585:
3574:. Retrieved
3570:
3560:
3549:. Retrieved
3545:
3536:
3525:. Retrieved
3521:
3512:
3501:. Retrieved
3497:
3488:
3477:. Retrieved
3473:
3464:
3455:
3446:
3434:. Retrieved
3430:
3420:
3408:. Retrieved
3404:
3394:
3382:. Retrieved
3378:
3368:
3354:
3340:
3331:
3321:
3312:The Register
3310:
3301:
3283:
3278:
3267:. Retrieved
3263:
3239:. Retrieved
3234:
3224:
3210:
3199:. Retrieved
3195:
3185:
3177:
3170:. Retrieved
3161:
3152:
3146:. Retrieved
3140:
3118:
3109:
3098:. Retrieved
3089:
2724:August 8–10
2610:August 7–10
2505:August 9–12
2463:August 8–11
2296:August 8–11
2273:August 7–10
2241:
2228:
2211:
2202:NSA director
2194:CIA director
2187:
2182:Jason Bourne
2180:
2167:
2143:
2082:
2067:
2051:
2014:
1985:
1933:
1906:Dateline NBC
1904:
1844:Description
1834:
1821:
1808:
1797:
1786:
1782:
1767:
1764:
1737:
1734:
1261:sk3wl0fr00t
1040:
1017:
1010:
1002:
986:
966:
942:
917:
903:
882:
861:
854:
846:
841:
839:
835:
816:
814:
799:
771:
769:exercises).
748:
699:
695:
691:
687:
686:
644:
637:
625:
620:Publications
465:Trojan horse
430:HackThisSite
319:
249:
109:Years active
42:
4571:Thehill.com
4285:v DefCon 16
3474:www.dfiu.tv
3436:January 14,
3410:January 14,
3384:January 14,
2990:July 22–24
2971:August 4–6
2952:July 26–28
2933:July 11–13
2876:July 28–30
2857:July 13–15
2838:August 2–4
2830:DEF CON 10
2819:August 1–3
2811:DEF CON 11
2792:DEF CON 12
2781:July 29–31
2773:DEF CON 13
2762:August 4–6
2754:DEF CON 14
2743:August 3–5
2735:DEF CON 15
2716:DEF CON 16
2697:DEF CON 17
2678:DEF CON 18
2667:August 4–7
2659:DEF CON 19
2648:July 26–29
2640:DEF CON 20
2629:August 1–4
2621:DEF CON 21
2602:DEF CON 22
2591:August 6–9
2583:Paris Hotel
2579:DEF CON 23
2568:August 4–7
2560:Paris Hotel
2556:DEF CON 24
2545:July 27–30
2537:DEF CON 25
2493:DEF CON 26
2447:Paris Hotel
2443:DEF CON 27
2432:August 6–9
2411:DEF CON 28
2400:August 6–9
2381:August 5–8
2373:Paris Hotel
2369:DEF CON 29
2338:DEF CON 30
2307:DEF CON 31
2284:DEF CON 32
2265:DEF CON 33
2260:Attendance
2196:(played by
2190:film series
2172:. Director
2145:The X-Files
2085:MalwareTech
1778:Guitar Hero
1748:FormatGuard
1405:ACME Pharm
1287:shellphish
1060:Organizers
1007:Black Badge
983:Fundraising
925:lockpicking
907:Konami Code
751:lockpicking
720:journalists
633:Hacker News
520:Infostealer
303:Conferences
257:Hackerspace
161:Over 30,000
117:Inaugurated
95:Location(s)
38:‹ The
5192:Categories
5153:Multimedia
5084:2023-08-10
5034:2018-07-07
5014:2017-06-07
4990:2019-09-15
4969:2019-09-15
4948:2018-05-17
4924:2018-10-28
4903:2023-02-25
4870:2024-02-04
4850:2016-04-09
4705:2020-05-08
4657:August 11,
4622:2017-12-08
4601:2017-12-08
4596:C-SPAN.org
4384:2024-03-19
4357:2008-06-09
4311:Press Room
4291:2010-10-07
4262:2007-08-15
4232:2004-07-31
4200:2023-02-25
4176:2023-12-20
4155:2023-12-20
4131:2023-12-20
4124:routardz.
4095:2023-12-21
4071:2023-12-20
4050:2023-12-20
3974:2023-12-21
3918:2024-09-09
3894:2024-09-06
3870:2024-09-06
3846:2023-12-21
3822:2023-12-21
3798:2023-12-21
3774:2023-12-21
3750:2023-12-27
3726:2023-12-27
3702:2023-12-27
3678:2023-12-20
3619:2017-04-24
3576:2016-03-12
3551:2024-01-29
3527:2024-01-29
3503:2024-01-29
3479:2024-01-29
3269:2019-08-17
3201:2016-03-12
3148:2007-08-15
3100:2017-04-23
3082:References
3009:June 9–11
3001:DEF CON 1
2982:DEF CON 2
2963:DEF CON 3
2944:DEF CON 4
2925:DEF CON 5
2906:DEF CON 6
2895:July 9–11
2887:DEF CON 7
2868:DEF CON 8
2849:DEF CON 9
2526:May 11–13
2478:751 D-Park
2354:Linq Hotel
2323:Linq Hotel
2292:The Sahara
2169:The Signal
2124:ransomware
2036:Will Smith
1744:StackGuard
1589:DEFKOR00T
1336:1@stplace
1313:1@stplace
1109:AJ Reznor
1089:AJ Reznor
952:community.
921:Biohacking
874:Components
490:Logic bomb
485:Ransomware
262:Hacktivism
158:Attendance
150:Next event
124:1993-06-09
4898:1059-1028
4652:0261-3077
4169:Unknown.
3745:ddtek.biz
3721:ddtek.biz
3697:ddtek.biz
3431:USA Today
3230:Jeff Moss
3075:San Diego
3062:Summercon
2254:Duration
2213:Mr. Robot
2148:episode "
2031:Jeff Moss
1995:Ron Wyden
1982:Jeff Moss
1893:Cisco IOS
1658:Katzebin
1563:cLEMENCy
1560:cLEMENCy
1382:VedaGodz
1350:Kenshoto
1327:Kenshoto
1301:Kenshoto
1275:Kenshoto
1187:Multiple
1066:Platform
993:dunk tank
963:Workshops
929:ham radio
886:Jeff Moss
831:phreakers
802:Jeff Moss
708:Las Vegas
608:Blue team
600:(defunct)
594:(defunct)
588:(defunct)
582:(defunct)
570:Anonymous
510:Web shell
360:Crimeware
340:Summercon
288:White hat
278:Black hat
271:Types of
245:Hackathon
206:Phreaking
136:Jeff Moss
99:Las Vegas
79:Frequency
47:is being
5055:Archived
4576:2 August
4567:The Hill
4477:NBC News
3044:Hack-Tic
3022:See also
2977:Unknown
2958:Unknown
2939:Unknown
2920:Unknown
2901:Unknown
2882:Unknown
2863:Unknown
2844:Unknown
2825:Unknown
2806:Unknown
2787:Unknown
2768:Unknown
2749:Unknown
2711:Unknown
2692:Unknown
2673:Unknown
2654:Unknown
2597:16,000+
2532:Unknown
2501:Flamingo
2488:Unknown
2469:~30,000
2459:Flamingo
2428:Flamingo
2424:The Linq
2420:Harrah's
2414:Planned
2364:~25,000
2346:Flamingo
2333:~25,000
2315:Flamingo
2078:O'Reilly
1879:format.
1760:AppArmor
1752:OpenWall
1451:Samurai
1448:FreeBSD
1425:FreeBSD
1379:FreeBSD
1356:FreeBSD
1333:FreeBSD
1258:Windows
1238:Anomaly
1054:DEF CON
999:Contests
914:Villages
857:COVID-19
850:COVID-19
818:WarGames
767:red team
736:wargames
728:software
604:Red team
460:Backdoor
335:ShmooCon
283:Grey hat
51:. ›
40:template
5122:DEF CON
4682:Twitter
4473:Archive
4000:(2003).
3913:CTFtime
3889:CTFtime
3865:CTFtime
3071:ToorCon
2635:12,000
2616:16,000
2574:22,000
2551:25,000
2521:Beijing
2511:28,000
2387:~8,700
2210:In the
1874:Adobe's
1774:forking
1740:Immunix
1540:DECREE
1520:DEFKOR
1308:Solaris
1282:FreeBSD
1234:OpenBSD
919:Recon,
879:Handles
868:Discord
806:FidoNet
796:History
724:hackers
702:) is a
688:DEF CON
592:LulzSec
480:Spyware
455:Rootkit
448:Malware
400:Payload
390:Exploit
320:DEF CON
273:hackers
199:History
166:Website
132:Founder
122: (
58:DEF CON
4896:
4650:
4455:Forbes
3452:"Home"
3291:
3066:Phrack
3052:(HOPE)
2730:8,000
2457:, and
2426:, and
2352:, and
2321:, and
2290:, and
2251:Venue
2188:Bourne
2016:Forbes
1877:e-book
1818:Groups
1719:mixed
1697:mixed
1675:mixed
1655:Linux
1635:A*0*E
1632:Linux
1586:Linux
1517:Linux
1494:Linux
1471:Linux
1468:armv7
1442:DDTEK
1419:DDTEK
1396:DDTEK
1373:DDTEK
1209:Redhat
1182:Goons
1162:Goons
1142:Goons
1122:Goons
1102:Goons
1082:Goons
892:Badges
864:Twitch
810:Canada
761:, and
746:heat.
744:Nevada
712:Nevada
696:Defcon
692:DEFCON
646:Phrack
563:Groups
495:Botnet
435:Zone-H
171:defcon
103:Nevada
90:Varies
82:Annual
66:Active
63:Status
5110:WIRED
5078:Wired
4942:(PDF)
4890:Wired
4825:9 Feb
4819:(PDF)
4812:(PDF)
4678:Tweet
4517:ZDNet
4404:Wired
3937:(PDF)
3332:Wired
3241:9 Feb
3172:9 Feb
3015:~100
3012:1993
2996:~200
2993:1994
2974:1995
2955:1996
2936:1997
2917:1998
2898:1999
2879:2000
2860:2001
2841:2002
2822:2003
2803:2004
2784:2005
2765:2006
2746:2007
2727:2008
2708:2009
2689:2010
2670:2011
2651:2012
2632:2013
2613:2014
2594:2015
2571:2016
2548:2017
2529:2018
2508:2018
2485:2019
2466:2019
2435:2020
2403:2020
2384:2021
2361:2022
2330:2023
2299:2024
2276:2025
2257:Year
2119:2024
2110:2020
2101:2018
2059:2017
2043:2016
2026:2013
2007:PRISM
1969:2012
1957:2011
1941:2009
1914:2008
1900:2007
1889:Cisco
1884:2005
1865:2001
1849:1999
1841:Year
1800:DARPA
1793:jails
1707:2024
1685:2023
1663:2022
1640:2021
1617:2020
1594:2019
1571:2018
1548:2017
1537:i386
1525:2016
1502:2015
1479:2014
1456:2013
1445:i386
1433:2012
1422:i386
1410:2011
1399:i386
1387:2010
1376:i386
1364:2009
1353:i386
1341:2008
1330:i386
1318:2007
1304:i386
1292:2006
1278:i386
1266:2005
1255:i386
1243:2004
1219:2003
1195:2002
1174:2001
1154:2000
1134:1999
1114:1998
1094:1997
1074:1996
1051:Year
1028:DARPA
950:LGBTQ
788:(via
740:Wi-Fi
470:Virus
238:ethic
87:Venue
71:Genre
5168:IMDb
5098:CNET
4894:ISSN
4827:2011
4794:2024
4768:2024
4746:2024
4659:2017
4648:ISSN
4578:2017
4497:CNET
4471:." (
4334:Text
4283:MBTA
3438:2019
3412:2019
3386:2019
3289:IMDb
3243:2011
3174:2011
3035:(C3)
2585:and
2562:and
2499:and
2406:N/A
2375:and
2302:N/A
2279:N/A
1824:2600
1789:0day
1772:and
1284:5.4
1211:6.2
1129:SNI
977:RFID
866:and
790:CISA
505:HIDS
475:Worm
236:and
173:.org
5166:on
5095:."
5061:."
4515:".
4511:. "
4495:".
4452:."
4315:EFF
3287:at
2095:.
2013:of
1946:ATM
1924:MIT
1754:'s
1713:12
1710:32
1691:12
1688:31
1669:16
1666:30
1646:16
1643:29
1623:16
1620:28
1600:16
1597:27
1577:24
1574:26
1554:15
1551:25
1531:15
1528:24
1508:15
1505:23
1485:20
1482:22
1462:20
1459:21
1439:20
1436:20
1416:12
1413:19
1393:12
1390:18
1367:17
1344:16
1321:15
1310:10
1295:14
1269:13
1246:12
1222:11
1198:10
1022:'s
973:IoT
786:DHS
778:DoD
774:FBI
698:or
515:RCE
5194::
5108:"
5075:.
4999:^
4892:.
4888:.
4843:.
4785:.
4737:.
4698:.
4646:.
4640:.
4594:.
4569:.
4565:.
4532:.
4484:^
4475:)
4435:^
4421:.
4402:.
4313:.
4309:.
4280:.
4250:.
4218:.
4193:.
4148:.
3996:.
3992:.
3967:.
3911:.
3887:.
3863:.
3839:.
3815:.
3791:.
3767:.
3743:.
3719:.
3695:.
3671:.
3643:^
3593:.
3569:.
3544:.
3520:.
3496:.
3472:.
3454:.
3429:.
3403:.
3377:.
3330:.
3309:.
3262:.
3251:^
3194:.
3176:.
3151:.
3139:.
3127:^
3117:.
2523:)
2453:,
2449:,
2438:0
2422:,
2418:,
2348:,
2344:,
2317:,
2313:,
1976:,
1780:.
1750:,
1746:,
1370:9
1347:8
1324:8
1298:8
1272:8
1249:8
1225:8
1177:9
1157:8
1137:7
1117:6
1097:5
1077:4
927:,
923:,
852:.
784:,
780:,
776:,
753:,
730:,
710:,
700:DC
694:,
606:/
112:31
101:,
5087:.
5050:"
5037:.
5017:.
4993:.
4972:.
4951:.
4927:.
4906:.
4873:.
4853:.
4829:.
4796:.
4770:.
4748:.
4722:.
4708:.
4684:.
4676:(
4661:.
4625:.
4604:.
4580:.
4536:.
4387:.
4360:.
4336:.
4317:.
4294:.
4265:.
4235:.
4203:.
4179:.
4158:.
4134:.
4113:.
4098:.
4030:.
4015:.
3998:2
3977:.
3939:.
3921:.
3897:.
3873:.
3849:.
3825:.
3801:.
3777:.
3753:.
3729:.
3705:.
3681:.
3657:.
3637:.
3622:.
3579:.
3554:.
3530:.
3506:.
3482:.
3458:.
3440:.
3414:.
3388:.
3362:.
3348:.
3334:.
3315:.
3272:.
3245:.
3218:.
3204:.
3121:.
3103:.
2207:.
676:e
669:t
662:v
126:)
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.