Knowledge

DEF CON

Source đź“ť

892:
conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.
3276: 794:. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance. 1891:, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened. A DEF CON source at NBC had tipped off organizers to Madigan's plans. 879: 1744:), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard. 1913:(CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares. The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show. 1966:, was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense." 747:. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as 1908:
students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston
2034:
The winner of the Cyber Grand Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania. Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest, where it finished in last place, despite pulling ahead of human teams often in a contest
886:
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a
1808:
meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek
1765:
In 2009, it was announced that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was in fact organising the CTF! "Hacking the top hacker contest seemed like a fun way to
900:
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village,
3135:
According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to
2015:
posted a statement, located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year." This was the first time in the organization's history that it had asked federal
818:
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people
891:
in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general
807:. In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a 2086:
In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.
852:). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas. 716:, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking 829:
In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to
997:(CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars. 1023:
The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year. It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.
870:' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community. 1795:
with 9 bits bytes CPU. With its specifications released only 24h before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
1916:
In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.
2032:, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$ 2M grand prize. 4450: 2001:
said that NSA officials, including Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."
1986:
if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance. In June 2013, NSA surveillance programs which collected data on US citizens, such as
865:
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder
2095:
On May 8, 2020, the DEF CON in-person conference itself was cancelled and virtualized due to COVID-19. DEF CON Safe Mode was held August 6–9 online with a full roster of talks, villages, contests and events.
925:
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
4454: 2202:" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations. 774:) and other agencies regularly attend DEF CON. Some have considered DEF CON to be the "world's largest" hacker con given its attendee size and the number of other conferences modeling themselves after it. 1909:
T subway. However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the
977:
and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
4431: 985:
Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress to name a few.
1766:
introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the Defcon 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
1008:
entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the
1717:
In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
826:. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences. 4400: 4229: 4355: 3947:"4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download" 3408: 887:
non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the
3356: 5036: 1901: 5179: 1972: 841:
the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
4790: 4990: 4544: 917:
and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
376: 771: 1724:
took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including
4619: 2211: 5194: 3590: 767: 1804:
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the
1842:(later discovered to be infected with the CIH virus) at DEF CON 7, in what was, at the time, the largest presentation in DEF CON history. 2175: 656: 4408: 3052: 1747:
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
3915: 2073:
was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with the
2183: 4359: 2052:
DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure
763: 4237: 5199: 4311:
Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology
1905: 486: 5074: 17: 4656:"WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…" 4920: 1005: 759: 4474: 2104:
On February 4, 2024, Cesar's Entertainment cancelled the contract with DEF CON without warning with speculation that a
940:
QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
180: 5033: 4328: 4197: 2051: 1980: 5184: 994: 953:
and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking
744: 1962:, gave the keynote speech. During the question and answers session, the first question for Alexander, fielded by 755: 197: 4944: 4494: 4296: 2644: 2625: 2606: 2587: 2108:
attack and bomb scare and subsequent evacuation in 2023 were in part to blame. The conference was moved to the
970: 649: 4797: 3932: 3160:
Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
2131: 914: 589: 386: 269: 259: 4742: 2199: 2138:. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention. 3014: 1988: 1910: 1791:
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a
685: 296: 284: 3289:"Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled" 5189: 4432:
Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)
4066: 2269: 2250: 2109: 1946:
used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.
371: 4092: 3994: 2910: 2739: 2720: 2701: 2682: 2663: 2436: 2335: 2304: 2215:, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives". 2070: 2029: 1931: 1805: 1785: 1012: 705: 608: 346: 4529: 642: 391: 3382: 1873:
used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the
4597: 3288: 1955: 1927: 567: 526: 496: 446: 5160:
The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
3594: 3076: 1758:
were inverted), allowing them to have such a massive lead that they spent most of the CTF playing
5054: 4701: 4107: 3031: 2891: 1001: 306: 31: 5154: 4965: 4009: 3118: 2224:
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
5164: 4381: 3327: 2986: 2150: 902: 720:). Contests held during the event are extremely varied and can range from creating the longest 561: 4152: 1788:
program, where teams wrote autonomous systems to play the game without any human interaction.
4764: 2401: 2331: 2300: 2054:" summarizing its findings. The findings were publicly released at an event sponsored by the 1737: 713: 5055:"Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued" 2182:), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, 5087: 4716: 4659: 2568: 2545: 2432: 2358: 2168: 1969: 1835: 1729: 950: 736: 579: 521: 441: 4655: 4440:. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted" 3275: 1934:
capturing data from an unknown number of hackers attending the DEF CON hacker conference.
8: 4899: 3650: 3009: 2948: 2163: 993:
The Black Badge is the highest award DEF CON gives to contest winners of certain events.
556: 381: 291: 3548: 696:. The first DEF CON took place in June 1993 and today many attendees at DEF CON include 5118: 5010: 3211: 3148: 2482: 2440: 2409: 2327: 2296: 2186: 2012: 1963: 1959: 954: 867: 783: 117: 4127: 4024: 2141:
A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by
4875: 4822: 4629: 3270: 3119:"Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape" 3020: 2059: 1839: 844:
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via
717: 697: 551: 514: 481: 3636: 3573:"Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity" 3572: 2161:
A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of
786:
as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a
5091: 5059: 5045: 4991:""Black Hat and Defcon see record attendance — even without the government spooks"" 4315: 3971: 3357:"A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards" 3341: 2273: 2074: 2055: 1733: 882:
Multiple, electronic and non-electronic, DEF CON human badges and other con badges.
845: 808: 689: 531: 232: 5159: 4867: 3309: 3197: 3173: 5040: 3037: 2564: 2541: 2428: 2354: 2179: 2135: 2069:, the 23-year-old British security researcher who was credited with stopping the 1851: 1809:
permission to make a logo that includes the official DEF CON logo with approval.
1751: 311: 202: 171: 4288: 2020:
visited the convention to study the DEF CON culture for an upcoming movie role.
4574:"DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org" 2522: 2478: 2155: 2142: 2045: 1992: 1943: 815:. The official name of the conference includes a space in-between DEF and CON. 740: 620: 451: 404: 334: 215: 192: 4045: 3409:"11-year-old hacks replica of Florida state website, changes election results" 3215: 5173: 4879: 4633: 4202: 2967: 2397: 2377: 2323: 2292: 2206: 1983: 1870: 1855: 1792: 1190: 704:, lawyers, federal government employees, security researchers, students, and 456: 351: 248: 3818: 3794: 3770: 3746: 3616: 30:
This article is about the computer security convention. For other uses, see
4624: 3293: 2459: 1887: 1774: 1755: 906: 544: 411: 364: 219: 4620:"Briton who stopped WannaCry attack arrested over separate malware claims" 4207: 4573: 4552: 4490: 4332: 4172: 3946: 2872: 2853: 2834: 2815: 2796: 2777: 2758: 2126: 2066: 1759: 1015:
at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
888: 732: 709: 614: 501: 238: 5145: 3972:"Defcon Capture the Flag: defending vulnerable code from intense attack" 3264: 4846: 4677: 3241: 3123: 2105: 2017: 1725: 1289: 1000:
In April 2017, a DEF CON Black Badge was featured in an exhibit in the
701: 471: 466: 243: 1780:
In 2016, the 15th edition of the CTF was done in partnership with the
4717:"DEF CON is canceled! No, really this time – but the show will go on" 3056: 3043: 2194: 1976: 1874: 1817:
High-profile issues which have garnered significant media attention.
1750:
In 2008, the Sk3wl of Root team took advantage of a bug in the game (
974: 910: 812: 491: 341: 321: 226: 187: 80: 5165:
Transcript, audio, video of Jess Moss describing DEF CON's inception
3433: 4458: 4314: (United States District Court District of Massachusetts), 4259: 3025: 2929: 2405: 1854:
was arrested the day after DEF CON for writing software to decrypt
1769:
In 2011, the team "lollerskaters dropping from roflcopters" used a
1741: 838: 831: 799: 748: 724:
connection to finding the most effective way to cool a beer in the
585: 316: 264: 3475: 3040:, a community supported conference with locations across the globe 5128: 4663: 4512:"ForAllSecure | Mayhem Security | Application Security" 3890: 3866: 3842: 3383:"Is this the most puzzling DEF CON attendee badge yet on record?" 2502: 2148:
A trip to DEF CON for a hacker showdown figures into the plot of
1721: 1263: 1215: 849: 822:
For DEF CON's 20th Anniversary, a film was commissioned entitled
787: 573: 461: 436: 429: 4545:"Hackers breach dozens of voting machines brought to conference" 4010:"Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11" 3046:, the first American hacker conference, organized by members of 878: 4678:"DEF CON 28 in-person conference is CANCELLED - DEF CON Forums" 4436: 3499: 3047: 2158:
came to Las Vegas and screened the film at DEF CON Movie Night.
1997: 1858: 804: 791: 725: 693: 627: 476: 416: 254: 84: 4070: 3096: 5140: 4498: 4401:"Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON" 3722: 3698: 3674: 1781: 1009: 949:
Workshops are dedicated classes on various topics related to
721: 4511: 3523: 937:
Linecon, any long line has the potential to turn into a con.
5149: 5123: 5079: 4478: 4451:
Hackers Don't Believe NSA Chief's Denial of Domestic Spying
4264: 1770: 958: 931: 4598:"O'Reilly Security Conference in NYC 2017 Defender Awards" 969:
Since DEF CON 11, fundraisers have been conducted for the
5111: 5034:
DefCon's Moss: Undercover Reporter Damages 'Neutral Zone'
4173:"Official forums social group section for DEF CON groups" 3976:
DARPA Information Survivability Conference and Exposition
3549:"DEF CON® Hacking Conference – Black Badge Hall of Fame" 3136:
gather intelligence on the latest techniques of hackers.
2050:
In September 2017, the Voting Machine Village produced "
3617:"DEF CON Hacking Conference - Capture the Flag Archive" 3451: 4743:"Caesars Ransomware Attack, MGM Hit Linked To DEFCON?" 4093:"Buffer overflow in handling of UNIX socket addresses" 2174:. The primary antagonist of the film, a fictionalized 1902:
Massachusetts Bay Transportation Authority v. Anderson
805:
U.S. Armed Forces defense readiness condition (DEFCON)
1930:
kiosk was positioned in the conference center of the
152: 4988: 4984: 4982: 4913: 4090: 2065:Marcus Hutchins, better known online by his handle 2028:On August 4, 2016, DEF CON and DARPA co-hosted the 4426: 4424: 4422: 4420: 4418: 4007: 3236: 3234: 4469: 4467: 4399:Fisher, Dennis; Roberts, Paul (August 10, 2011). 4198:"Exploit writers team up to target Cisco routers" 3242:"Def Con 27 Transparency Report - DEF CON Forums" 2145:, demonstrates some of the early DEF CON culture. 2044:At the "Voting Machine Village" event, dozens of 1979:quoted the 2012 DEF CON keynote speech and asked 1885:In August 2007, Michelle Madigan, a reporter for 782:DEF CON was founded in 1993, by then 18-year-old 5171: 4979: 4937: 4230:"Transcript: Michelle Madigan's run from Defcon" 2219: 5155:A first ever look inside the DEF CON NOC (2008) 5088:To Fix Voting Machines, Hackers Tear Them Apart 4892: 4653: 4495:Feds 'not welcome' at DEF CON hacker conference 4415: 3634: 3231: 4765:"Bomb scare causes mass evacuation at DEF CON" 4464: 2212:Lo and Behold, Reveries of the Connected World 1777:, causing havoc in the game's infrastructure. 4823:"DEF CON® Hacking Conference – Show Archives" 4461:. August 1, 2012. Retrieved on June 13, 2013. 4398: 4356:"Antivirus Vendors Slam Defcon Virus Contest" 4067:"Diutinus Defense Techonologies Corp. / Home" 3933:"Defcon 9 - Capture The Flag Contest Network" 3723:"Diutinus Defense Techonologies Corp. / Home" 3699:"Diutinus Defense Techonologies Corp. / DC18" 3675:"Diutinus Defense Techonologies Corp. / DC17" 3097:"DefCon Beverage Cooling Contraption Contest" 650: 5180:Las Vegas Valley conventions and trade shows 4847:"DEF CON 32 Was Canceled. We Un-Canceled it" 4501:. July 11, 2013. Retrieved on July 11, 2013. 4481:. July 11, 2013. Retrieved on July 12, 2013. 4289:"MIT Students Gagged by Federal Court Judge" 3995:"Defcon 10 - Capture the Flag (CTF) contest" 2035:for which it was not specifically designed. 1773:in FreeBSD (namely CVE-2011-4062) to escape 27:Annual hacker gathering in Las Vegas, Nevada 5003: 2118: 1712: 5075:NSA director finally greets Defcon hackers 4788: 4542: 3637:"A history of Capture the Flag at DEF CON" 3380: 3274: 731:Other contests, past and present, include 657: 643: 5052: 4618:Hern, Alex; Levin, Sam (August 4, 2017). 4617: 4475:Defcon to feds: 'We need some time apart' 3992: 2048:brought to the conference were breached. 4958: 4353: 4128:"Cyber Grand Challenge (CGC) (Archived)" 3354: 3112: 3110: 877: 754:Federal law enforcement agents from the 4740: 4530:"DEF CON Capture the Flag Final Scores" 4286: 3969: 3355:Oberhaus, Daniel (September 18, 2018). 961:, fuzzing and attacking smart devices. 920: 764:United States Postal Inspection Service 14: 5172: 4966:""Gray Tier Technologies at DEFCON23"" 4257: 4227: 4221: 4022: 3406: 3116: 797:The term DEF CON comes from the movie 56:Security Conference, Hacker Conference 4741:Khaitan, Ashish (14 September 2023). 4195: 4189: 4047:A Brief History of CTF - Jordan Wiens 3913: 3630: 3628: 3626: 3174:"DEF CON® Hacking Conference – About" 3107: 3055:, a yearly hacker conference held in 1850:On July 16, 2001, Russian programmer 837:In 2020, due to safety concerns over 5195:Recurring events established in 1993 4762: 4714: 4105: 4008:The Ghetto Hackers (June 29, 2003). 3381:McAllister, Neil (August 12, 2015). 1812: 790:protocol based hacking network from 5053:Greenberg, Andy (August 10, 2023). 4989:Richard Byrne Reilly (2014-08-12). 4280: 4251: 4150: 3546: 3500:"DEF CON Crash and Compile Contest" 3171: 3028:, a quadrennial European convention 1018: 1006:National Museum of American History 377:forensics-focused operating systems 24: 5026: 4921:""Voting Machine Hacking Village"" 4865: 4379: 4358:. IDG News Service. Archived from 4091:The FreeBSD Project (2011-09-28). 3623: 3307: 2209:included DEF CON in his 2016 film 973:(EFF). The first fundraiser was a 25: 5211: 5098: 4654:@VotingVillageDC (6 March 2018). 3407:Molina, Brett (August 14, 2018). 2016:authorities not to attend. Actor 1981:Director of National Intelligence 4702:"DEF CON Safe Mode archive site" 3891:"CTFtime.org / DEF CON CTF 2024" 3867:"CTFtime.org / DEF CON CTF 2023" 3843:"CTFtime.org / DEF CON CTF 2022" 3614: 3452:"Hacker Jeopardy for DEF CON 28" 2058:and the paper went on to win an 1973:Select Committee on Intelligence 5129:DEF CON v3 Tor .onion addresses 4859: 4839: 4815: 4782: 4756: 4734: 4708: 4694: 4670: 4647: 4611: 4590: 4566: 4536: 4522: 4504: 4484: 4443: 4392: 4382:"Malicious ATM Catches Hackers" 4373: 4354:McMillan, Robert (April 2008). 4347: 4321: 4303: 4287:Jeschke, Rebecca (2008-08-09). 4228:Cassel, David (4 August 2007). 4165: 4144: 4120: 4099: 4084: 4059: 4038: 4016: 4001: 3986: 3963: 3939: 3925: 3907: 3883: 3859: 3835: 3811: 3787: 3763: 3739: 3715: 3691: 3667: 3643: 3608: 3583: 3565: 3540: 3516: 3492: 3468: 3444: 3426: 3400: 3374: 3348: 3334: 3320: 3301: 3281: 198:Hacking of consumer electronics 4791:"Cyber Christ Meets Lady Luck" 3258: 3204: 3190: 3165: 3141: 3089: 3069: 2124:DEF CON was also portrayed in 1539:Legitimate Business Syndicate 1516:Legitimate Business Syndicate 1493:Legitimate Business Syndicate 1470:Legitimate Business Syndicate 1447:Legitimate Business Syndicate 988: 971:Electronic Frontier Foundation 964: 13: 1: 5200:1993 establishments in Nevada 3117:Zetter, Kim (3 August 2007). 3063: 2949:Tropicana Resort & Casino 2930:Monte Carlo Resort and Casino 2220:Venues, dates, and attendance 2134:" featuring an appearance by 1740:, SubDomain (the ancestor of 1172:Ghetto Hackers & digirev 855: 4543:Joe Uchill (July 29, 2017). 4258:Lundin, Leigh (2008-08-17). 4108:"Defcon 19 CTF - CTF Inside" 4069:. 2011-05-14. Archived from 3015:Chaos Communication Congress 1968:On March 12, 2013, during a 1911:Computer Fraud and Abuse Act 944: 739:, art, slogan, coffee wars, 297:Chaos Communication Congress 7: 4926:. September 2017. p. 4 4196:Lamos, Rob (31 July 2005). 3970:Crispin, Cowan (May 2003). 3003: 2270:Las Vegas Convention Center 2251:Las Vegas Convention Center 2110:Las Vegas Convention Center 1838:hacker collective released 1594:Plaid Parliament of Pwning 1548:Plaid Parliament of Pwning 1525:Plaid Parliament of Pwning 1479:Plaid Parliament of Pwning 1456:Plaid Parliament of Pwning 1028:Capture the Flag Timeline 980: 895: 708:with a general interest in 10: 5216: 4388:– via www.wired.com. 4153:"cLEMENCy - Showing Mercy" 3328:"DEF CON 28 Safe Mode FAQ" 2911:Aladdin Hotel & Casino 2740:Riviera Hotel & Casino 2721:Riviera Hotel & Casino 2702:Riviera Hotel & Casino 2683:Riviera Hotel & Casino 2664:Riviera Hotel & Casino 2030:2016 Cyber Grand Challenge 1899: 1706:Maple Mallard Magistrates 1684:Maple Mallard Magistrates 1662:Maple Mallard Magistrates 1013:2016 Cyber Grand Challenge 860: 777: 609:2600: The Hacker Quarterly 347:List of computer criminals 29: 4600:. conferences.oreilly.com 2200:eps3.0_power-saver-mode.h 2062:Defender Research Award. 1799: 873: 737:robotics-related contests 147: 139: 131: 123: 113: 98: 90: 76: 68: 60: 52: 44: 39: 5146:DEF CON: The Documentary 5141:DEF CON: The Documentary 4900:""DEF CON Transparency"" 3916:"Capture the Flag Games" 3651:"A Brief History of CTF" 3635:vulc@n of DDTek (2023). 3476:"DEF CON Scavenger Hunt" 2892:Plaza Hotel & Casino 2167:, the fifth film of the 2119:Entertainment references 1956:National Security Agency 1713:Capture the Flag History 527:Cloud computing security 5185:Annual events in Nevada 3591:"Mayhem Wins DARPA CGC" 3266:DEFCON: The Documentary 3059:, California since 1999 3032:Hackers on Planet Earth 2968:Sahara Hotel and Casino 1926:WIRED reported that an 1002:Smithsonian Institution 824:DEFCON: The Documentary 307:Hackers on Planet Earth 32:Defcon (disambiguation) 4026:A Brief History of CTF 3577:americanhistory.si.edu 3480:DEF CON Scavenger Hunt 2987:Sands Hotel and Casino 2645:Rio Hotel & Casino 2626:Rio Hotel & Casino 2607:Rio Hotel & Casino 2588:Rio Hotel & Casino 1834:On July 10, 1999, the 1631:Order Of the Overflow 1608:Order Of the Overflow 1585:Order Of the Overflow 1565:MIPS, x86 & armv7 1562:Order Of the Overflow 1496:MIPS, x86 & armv7 957:devices, playing with 930:Queercon, a meetup of 883: 562:Homebrew Computer Club 102:June 9, 1993 4023:Jordan (2021-04-06), 3914:Riley, Eller (2004). 3310:"Defcon is Cancelled" 2075:Kronos banking trojan 1786:Cyber Grand Challenge 1720:In 2002, the company 1588:x86, arm64, esoteric 1384:FreeBSD & Debian 913:, and the well known 881: 819:attended DEF CON 27. 714:computer architecture 4945:""Norton at DefCon"" 4868:"Defcon Is Canceled" 1991:, had been exposed. 1970:United States Senate 1954:The director of the 1932:Riviera Hotel Casino 1836:Cult of the Dead Cow 1738:non-executable stack 1410:European Nopsleders 951:information security 921:Internal Conferences 580:Masters of Deception 522:Application security 18:DEF CON (convention) 4532:. blog.legitbs.net. 3819:"OOO — DEF CON CTF" 3795:"OOO — DEF CON CTF" 3771:"OOO — DEF CON CTF" 3655:psifertex.github.io 3547:Tangent, The Dark. 3504:crashandcompile.org 3217:The Story of DEFCON 3172:Tangent, The Dark. 3077:"Def Con 1 Archive" 3010:Black Hat Briefings 2896:July 31 – August 2 2782:July 30 – August 1 2687:July 30 – August 2 2668:July 30 – August 1 1698:Nautilus Institute 1676:Nautilus Institute 1654:Nautilus Institute 1196:Digital Revelation 1029: 557:Chaos Computer Club 292:Black Hat Briefings 166:Part of a series on 5190:Hacker conventions 5086:Newman, Lily Hay " 5039:2019-09-24 at the 4866:Newman, Lily Hay. 4449:Wagenseil, Paul. " 4430:Greenberg, Andy. " 3747:"DEF CON CTF 2018" 3308:Newman, Lily Hay. 3124:Wired Blog Network 2873:Alexis Park Resort 2854:Alexis Park Resort 2835:Alexis Park Resort 2816:Alexis Park Resort 2797:Alexis Park Resort 2778:Alexis Park Resort 2759:Alexis Park Resort 2456:DEF CON China 1.0 2374:DEF CON Safe Mode 2187:Keith B. Alexander 2011:On July 11, 2013, 1960:Keith B. Alexander 1869:On July 31, 2005, 1752:privilege dropping 1027: 915:Social Engineering 884: 803:, referencing the 387:Social engineering 5049:. August 6, 2007. 4473:Whitney, Lance. " 4405:Business Security 4260:"Dangerous Ideas" 3823:OOO — DEF CON CTF 3799:OOO — DEF CON CTF 3775:OOO — DEF CON CTF 3751:OOO — DEF CON CTF 3438:Aerospace Village 3214:(July 30, 2007). 3149:"DEFCON 15 FAQ's" 3021:Electronic voting 3001: 3000: 2198:Season 3 opener " 2116: 2115: 2071:WannaCry outbreak 1975:hearing, Senator 1942:Security company 1877:used on routers. 1840:Back Orifice 2000 1813:Notable incidents 1784:, as part of its 1710: 1709: 1634:x86, microengine 1591:Linux, iOS, Xbox 1473:armv7 & i386 811:, a reference to 698:computer security 688:held annually in 686:hacker convention 672:(also written as 667: 666: 515:Computer security 482:Keystroke logging 161: 160: 135:August 7-10, 2025 127:August 8-11, 2024 16:(Redirected from 5207: 5115: 5114: 5112:Official website 5083:. July 27, 2012. 5073:Mills, Elinor. " 5070: 5068: 5067: 5046:Information Week 5021: 5020: 5018: 5017: 5011:"DEF CON 17 FAQ" 5007: 5001: 5000: 4998: 4997: 4986: 4977: 4976: 4974: 4973: 4962: 4956: 4955: 4953: 4952: 4947:. September 2019 4941: 4935: 4934: 4932: 4931: 4925: 4917: 4911: 4910: 4908: 4907: 4896: 4890: 4889: 4887: 4886: 4863: 4857: 4856: 4854: 4853: 4843: 4837: 4836: 4834: 4833: 4819: 4813: 4812: 4810: 4808: 4802: 4796:. Archived from 4795: 4789:Winn Schwartau. 4786: 4780: 4779: 4777: 4775: 4760: 4754: 4753: 4751: 4749: 4738: 4732: 4731: 4729: 4727: 4712: 4706: 4705: 4698: 4692: 4691: 4689: 4688: 4682:forum.defcon.org 4674: 4668: 4667: 4651: 4645: 4644: 4642: 4640: 4615: 4609: 4608: 4606: 4605: 4594: 4588: 4587: 4585: 4584: 4570: 4564: 4563: 4561: 4559: 4540: 4534: 4533: 4526: 4520: 4519: 4508: 4502: 4488: 4482: 4471: 4462: 4447: 4441: 4428: 4413: 4412: 4407:. Archived from 4396: 4390: 4389: 4377: 4371: 4370: 4368: 4367: 4351: 4345: 4344:Contest concept. 4343: 4341: 4340: 4331:. Archived from 4325: 4319: 4313: 4307: 4301: 4300: 4284: 4278: 4277: 4275: 4274: 4269:. Criminal Brief 4255: 4249: 4248: 4246: 4245: 4236:. Archived from 4225: 4219: 4218: 4216: 4215: 4206:. Archived from 4193: 4187: 4186: 4184: 4183: 4169: 4163: 4162: 4160: 4159: 4148: 4142: 4141: 4139: 4138: 4124: 4118: 4117: 4115: 4114: 4103: 4097: 4096: 4088: 4082: 4081: 4079: 4078: 4063: 4057: 4056: 4055: 4054: 4042: 4036: 4035: 4034: 4033: 4020: 4014: 4013: 4005: 3999: 3998: 3990: 3984: 3983: 3967: 3961: 3960: 3958: 3957: 3943: 3937: 3936: 3929: 3923: 3922: 3920: 3911: 3905: 3904: 3902: 3901: 3887: 3881: 3880: 3878: 3877: 3863: 3857: 3856: 3854: 3853: 3839: 3833: 3832: 3830: 3829: 3815: 3809: 3808: 3806: 3805: 3791: 3785: 3784: 3782: 3781: 3767: 3761: 3760: 3758: 3757: 3743: 3737: 3736: 3734: 3733: 3719: 3713: 3712: 3710: 3709: 3695: 3689: 3688: 3686: 3685: 3671: 3665: 3664: 3662: 3661: 3647: 3641: 3640: 3632: 3621: 3620: 3612: 3606: 3605: 3603: 3602: 3593:. Archived from 3587: 3581: 3580: 3579:. 20 April 2017. 3569: 3563: 3562: 3560: 3559: 3544: 3538: 3537: 3535: 3534: 3528:hackfortress.net 3520: 3514: 3513: 3511: 3510: 3496: 3490: 3489: 3487: 3486: 3472: 3466: 3465: 3463: 3462: 3448: 3442: 3441: 3430: 3424: 3423: 3421: 3419: 3404: 3398: 3397: 3395: 3393: 3378: 3372: 3371: 3369: 3367: 3361:Vice Motherboard 3352: 3346: 3345: 3342:"DEF CON 29 FAQ" 3338: 3332: 3331: 3324: 3318: 3317: 3305: 3299: 3298: 3285: 3279: 3278: 3262: 3256: 3255: 3253: 3252: 3246:forum.defcon.org 3238: 3229: 3228: 3226: 3224: 3208: 3202: 3201: 3194: 3188: 3187: 3185: 3184: 3169: 3163: 3162: 3157: 3155: 3145: 3139: 3138: 3132: 3131: 3114: 3105: 3104: 3093: 3087: 3086: 3084: 3083: 3073: 2464:May 31 – June 2 2437:Planet Hollywood 2230:Conference Name 2227: 2226: 2056:Atlantic Council 1820: 1819: 1039:Competing Teams 1030: 1026: 1019:Capture the flag 995:Capture the flag 809:telephone keypad 745:Capture the Flag 659: 652: 645: 532:Network security 233:Hacker Manifesto 172:Computer hacking 163: 162: 157: 154: 109: 107: 37: 36: 21: 5215: 5214: 5210: 5209: 5208: 5206: 5205: 5204: 5170: 5169: 5110: 5109: 5101: 5094:August 1, 2017. 5065: 5063: 5041:Wayback Machine 5029: 5027:Further reading 5024: 5015: 5013: 5009: 5008: 5004: 4995: 4993: 4987: 4980: 4971: 4969: 4964: 4963: 4959: 4950: 4948: 4943: 4942: 4938: 4929: 4927: 4923: 4919: 4918: 4914: 4905: 4903: 4898: 4897: 4893: 4884: 4882: 4864: 4860: 4851: 4849: 4845: 4844: 4840: 4831: 4829: 4821: 4820: 4816: 4806: 4804: 4803:on 18 July 2011 4800: 4793: 4787: 4783: 4773: 4771: 4763:Thompson, Ian. 4761: 4757: 4747: 4745: 4739: 4735: 4725: 4723: 4715:Thompson, Ian. 4713: 4709: 4700: 4699: 4695: 4686: 4684: 4676: 4675: 4671: 4652: 4648: 4638: 4636: 4616: 4612: 4603: 4601: 4596: 4595: 4591: 4582: 4580: 4572: 4571: 4567: 4557: 4555: 4541: 4537: 4528: 4527: 4523: 4510: 4509: 4505: 4489: 4485: 4472: 4465: 4448: 4444: 4429: 4416: 4397: 4393: 4378: 4374: 4365: 4363: 4352: 4348: 4338: 4336: 4327: 4326: 4322: 4309: 4308: 4304: 4285: 4281: 4272: 4270: 4256: 4252: 4243: 4241: 4234:Tech.Blorge.com 4226: 4222: 4213: 4211: 4194: 4190: 4181: 4179: 4171: 4170: 4166: 4157: 4155: 4149: 4145: 4136: 4134: 4126: 4125: 4121: 4112: 4110: 4104: 4100: 4089: 4085: 4076: 4074: 4065: 4064: 4060: 4052: 4050: 4044: 4043: 4039: 4031: 4029: 4021: 4017: 4006: 4002: 3993:Ghettohackers. 3991: 3987: 3968: 3964: 3955: 3953: 3951:slideplayer.com 3945: 3944: 3940: 3931: 3930: 3926: 3918: 3912: 3908: 3899: 3897: 3889: 3888: 3884: 3875: 3873: 3865: 3864: 3860: 3851: 3849: 3841: 3840: 3836: 3827: 3825: 3817: 3816: 3812: 3803: 3801: 3793: 3792: 3788: 3779: 3777: 3769: 3768: 3764: 3755: 3753: 3745: 3744: 3740: 3731: 3729: 3721: 3720: 3716: 3707: 3705: 3697: 3696: 3692: 3683: 3681: 3673: 3672: 3668: 3659: 3657: 3649: 3648: 3644: 3633: 3624: 3613: 3609: 3600: 3598: 3589: 3588: 3584: 3571: 3570: 3566: 3557: 3555: 3545: 3541: 3532: 3530: 3522: 3521: 3517: 3508: 3506: 3498: 3497: 3493: 3484: 3482: 3474: 3473: 3469: 3460: 3458: 3450: 3449: 3445: 3432: 3431: 3427: 3417: 3415: 3405: 3401: 3391: 3389: 3387:The Register UK 3379: 3375: 3365: 3363: 3353: 3349: 3340: 3339: 3335: 3326: 3325: 3321: 3306: 3302: 3287: 3286: 3282: 3263: 3259: 3250: 3248: 3240: 3239: 3232: 3222: 3220: 3210: 3209: 3205: 3196: 3195: 3191: 3182: 3180: 3170: 3166: 3153: 3151: 3147: 3146: 3142: 3129: 3127: 3115: 3108: 3095: 3094: 3090: 3081: 3079: 3075: 3074: 3070: 3066: 3038:Security BSides 3006: 2498:DEF CON China 2222: 2180:Tommy Lee Jones 2136:The Lone Gunmen 2132:Three of a Kind 2121: 2046:voting machines 1914: 1904: 1852:Dmitry Sklyarov 1815: 1802: 1715: 1234:Ghetto Hackers 1210:Ghetto Hackers 1185:Ghetto Hackers 1151:Ghetto Hackers 1131:Ghetto Hackers 1021: 991: 983: 967: 947: 923: 898: 876: 863: 858: 780: 700:professionals, 663: 634: 633: 603: 595: 594: 547: 537: 536: 517: 507: 506: 432: 422: 421: 407: 397: 396: 367: 357: 356: 337: 327: 326: 312:Security BSides 287: 277: 276: 222: 208: 207: 203:List of hackers 183: 151: 105: 103: 35: 28: 23: 22: 15: 12: 11: 5: 5213: 5203: 5202: 5197: 5192: 5187: 5182: 5168: 5167: 5162: 5157: 5152: 5143: 5132: 5131: 5126: 5124:DEF CON Groups 5121: 5116: 5100: 5099:External links 5097: 5096: 5095: 5084: 5071: 5050: 5028: 5025: 5023: 5022: 5002: 4978: 4957: 4936: 4912: 4891: 4858: 4838: 4827:www.defcon.org 4814: 4781: 4755: 4733: 4707: 4693: 4669: 4662:) – via 4646: 4610: 4589: 4565: 4535: 4521: 4503: 4483: 4463: 4442: 4414: 4411:on 2011-08-10. 4391: 4372: 4346: 4329:"Race to Zero" 4320: 4302: 4279: 4250: 4220: 4188: 4177:DEF CON Forums 4164: 4143: 4119: 4098: 4083: 4058: 4037: 4015: 4000: 3985: 3962: 3938: 3924: 3906: 3882: 3858: 3834: 3810: 3786: 3762: 3738: 3714: 3690: 3666: 3642: 3622: 3607: 3582: 3564: 3553:www.defcon.org 3539: 3524:"Hackfortress" 3515: 3491: 3467: 3443: 3425: 3399: 3373: 3347: 3333: 3319: 3300: 3280: 3257: 3230: 3203: 3198:"DEFCON about" 3189: 3178:www.defcon.org 3164: 3140: 3106: 3088: 3067: 3065: 3062: 3061: 3060: 3050: 3041: 3035: 3029: 3023: 3018: 3012: 3005: 3002: 2999: 2998: 2995: 2992: 2989: 2984: 2980: 2979: 2976: 2973: 2970: 2965: 2961: 2960: 2957: 2954: 2951: 2946: 2942: 2941: 2938: 2935: 2932: 2927: 2923: 2922: 2919: 2916: 2913: 2908: 2904: 2903: 2900: 2897: 2894: 2889: 2885: 2884: 2881: 2878: 2875: 2870: 2866: 2865: 2862: 2859: 2856: 2851: 2847: 2846: 2843: 2840: 2837: 2832: 2828: 2827: 2824: 2821: 2818: 2813: 2809: 2808: 2805: 2802: 2799: 2794: 2790: 2789: 2786: 2783: 2780: 2775: 2771: 2770: 2767: 2764: 2761: 2756: 2752: 2751: 2748: 2745: 2742: 2737: 2733: 2732: 2729: 2726: 2723: 2718: 2714: 2713: 2710: 2707: 2704: 2699: 2695: 2694: 2691: 2688: 2685: 2680: 2676: 2675: 2672: 2669: 2666: 2661: 2657: 2656: 2653: 2650: 2647: 2642: 2638: 2637: 2634: 2631: 2628: 2623: 2619: 2618: 2615: 2612: 2609: 2604: 2600: 2599: 2596: 2593: 2590: 2585: 2581: 2580: 2577: 2574: 2571: 2562: 2558: 2557: 2554: 2551: 2548: 2539: 2535: 2534: 2531: 2528: 2525: 2523:Caesars Palace 2520: 2516: 2515: 2512: 2509: 2506: 2501:Kuntai Hotel ( 2499: 2495: 2494: 2491: 2488: 2485: 2479:Caesars Palace 2476: 2472: 2471: 2468: 2465: 2462: 2457: 2453: 2452: 2449: 2446: 2443: 2426: 2422: 2421: 2418: 2415: 2412: 2394: 2390: 2389: 2386: 2383: 2380: 2375: 2371: 2370: 2367: 2364: 2361: 2352: 2348: 2347: 2344: 2341: 2338: 2332:Harrah's Hotel 2321: 2317: 2316: 2313: 2310: 2307: 2301:Harrah's Hotel 2290: 2286: 2285: 2282: 2279: 2276: 2267: 2263: 2262: 2259: 2256: 2253: 2248: 2244: 2243: 2240: 2237: 2234: 2231: 2221: 2218: 2217: 2216: 2205:Documentarian 2203: 2190: 2159: 2156:William Eubank 2146: 2143:Winn Schwartau 2139: 2120: 2117: 2114: 2113: 2102: 2098: 2097: 2093: 2089: 2088: 2084: 2080: 2079: 2042: 2038: 2037: 2026: 2022: 2021: 2009: 2005: 2004: 1993:Andy Greenberg 1952: 1948: 1947: 1944:HBGary Federal 1940: 1936: 1935: 1924: 1920: 1919: 1900:Main article: 1897: 1893: 1892: 1883: 1879: 1878: 1867: 1863: 1862: 1848: 1844: 1843: 1832: 1828: 1827: 1824: 1814: 1811: 1801: 1798: 1714: 1711: 1708: 1707: 1704: 1702: 1699: 1696: 1693: 1690: 1686: 1685: 1682: 1680: 1677: 1674: 1671: 1668: 1664: 1663: 1660: 1658: 1655: 1652: 1649: 1646: 1642: 1641: 1638: 1635: 1632: 1629: 1626: 1623: 1619: 1618: 1615: 1612: 1611:x86, esoteric 1609: 1606: 1603: 1600: 1596: 1595: 1592: 1589: 1586: 1583: 1580: 1577: 1573: 1572: 1569: 1566: 1563: 1560: 1557: 1554: 1550: 1549: 1546: 1543: 1540: 1537: 1534: 1531: 1527: 1526: 1523: 1520: 1517: 1514: 1511: 1508: 1504: 1503: 1500: 1497: 1494: 1491: 1488: 1485: 1481: 1480: 1477: 1474: 1471: 1468: 1465: 1462: 1458: 1457: 1454: 1451: 1448: 1445: 1442: 1439: 1435: 1434: 1431: 1428: 1425: 1422: 1419: 1416: 1412: 1411: 1408: 1405: 1402: 1399: 1396: 1393: 1389: 1388: 1385: 1382: 1379: 1376: 1373: 1370: 1366: 1365: 1362: 1359: 1356: 1353: 1350: 1347: 1343: 1342: 1341:Sk3wl of Root 1339: 1336: 1333: 1330: 1327: 1324: 1320: 1319: 1316: 1313: 1310: 1307: 1304: 1301: 1297: 1296: 1293: 1287: 1284: 1281: 1278: 1275: 1271: 1270: 1267: 1261: 1258: 1255: 1252: 1249: 1245: 1244: 1241: 1238: 1235: 1232: 1229: 1226: 1222: 1221: 1218: 1213: 1211: 1208: 1205: 1202: 1198: 1197: 1194: 1188: 1186: 1183: 1181: 1178: 1174: 1173: 1170: 1167: 1165: 1162: 1160: 1157: 1153: 1152: 1149: 1147: 1145: 1142: 1140: 1137: 1133: 1132: 1129: 1127: 1125: 1122: 1120: 1117: 1113: 1112: 1109: 1107: 1105: 1102: 1100: 1097: 1093: 1092: 1089: 1087: 1085: 1082: 1080: 1077: 1073: 1072: 1069: 1067: 1065: 1062: 1060: 1057: 1053: 1052: 1049: 1046: 1043: 1040: 1037: 1034: 1020: 1017: 990: 987: 982: 979: 966: 963: 946: 943: 942: 941: 938: 935: 922: 919: 897: 894: 875: 872: 862: 859: 857: 854: 779: 776: 741:scavenger hunt 665: 664: 662: 661: 654: 647: 639: 636: 635: 632: 631: 624: 621:Nuts and Volts 617: 612: 604: 601: 600: 597: 596: 593: 592: 583: 577: 571: 568:Legion of Doom 565: 559: 554: 548: 543: 542: 539: 538: 535: 534: 529: 524: 518: 513: 512: 509: 508: 505: 504: 499: 494: 489: 484: 479: 474: 469: 464: 459: 454: 449: 444: 439: 433: 428: 427: 424: 423: 420: 419: 414: 408: 405:Practice sites 403: 402: 399: 398: 395: 394: 389: 384: 379: 374: 368: 363: 362: 359: 358: 355: 354: 349: 344: 338: 335:Computer crime 333: 332: 329: 328: 325: 324: 319: 314: 309: 304: 299: 294: 288: 283: 282: 279: 278: 275: 274: 273: 272: 267: 262: 251: 246: 241: 236: 229: 223: 216:Hacker culture 214: 213: 210: 209: 206: 205: 200: 195: 193:Cryptovirology 190: 184: 179: 178: 175: 174: 168: 167: 159: 158: 149: 145: 144: 141: 137: 136: 133: 129: 128: 125: 124:Previous event 121: 120: 115: 111: 110: 100: 96: 95: 92: 88: 87: 78: 74: 73: 70: 66: 65: 62: 58: 57: 54: 50: 49: 46: 42: 41: 26: 9: 6: 4: 3: 2: 5212: 5201: 5198: 5196: 5193: 5191: 5188: 5186: 5183: 5181: 5178: 5177: 5175: 5166: 5163: 5161: 5158: 5156: 5153: 5151: 5147: 5144: 5142: 5139: 5138: 5137: 5136: 5130: 5127: 5125: 5122: 5120: 5117: 5113: 5108: 5107: 5106: 5105: 5093: 5089: 5085: 5082: 5081: 5076: 5072: 5062: 5061: 5056: 5051: 5048: 5047: 5042: 5038: 5035: 5031: 5030: 5012: 5006: 4992: 4985: 4983: 4968:. August 2015 4967: 4961: 4946: 4940: 4922: 4916: 4902:. August 2018 4901: 4895: 4881: 4877: 4873: 4869: 4862: 4848: 4842: 4828: 4824: 4818: 4799: 4792: 4785: 4770: 4766: 4759: 4744: 4737: 4722: 4718: 4711: 4703: 4697: 4683: 4679: 4673: 4665: 4661: 4657: 4650: 4635: 4631: 4627: 4626: 4621: 4614: 4599: 4593: 4579: 4575: 4569: 4554: 4550: 4546: 4539: 4531: 4525: 4517: 4513: 4507: 4500: 4496: 4492: 4487: 4480: 4476: 4470: 4468: 4460: 4456: 4452: 4446: 4439: 4438: 4433: 4427: 4425: 4423: 4421: 4419: 4410: 4406: 4402: 4395: 4387: 4383: 4380:Zetter, Kim. 4376: 4362:on 2024-03-19 4361: 4357: 4350: 4335:on 2011-11-18 4334: 4330: 4324: 4317: 4312: 4306: 4298: 4294: 4290: 4283: 4268: 4266: 4261: 4254: 4240:on 2007-09-08 4239: 4235: 4231: 4224: 4210:on 2012-07-28 4209: 4205: 4204: 4203:SecurityFocus 4199: 4192: 4178: 4174: 4168: 4154: 4147: 4133: 4132:www.darpa.mil 4129: 4123: 4109: 4102: 4094: 4087: 4073:on 2011-05-14 4072: 4068: 4062: 4049: 4048: 4041: 4028: 4027: 4019: 4011: 4004: 3996: 3989: 3981: 3977: 3973: 3966: 3952: 3948: 3942: 3935:. 2001-07-09. 3934: 3928: 3917: 3910: 3896: 3892: 3886: 3872: 3868: 3862: 3848: 3844: 3838: 3824: 3820: 3814: 3800: 3796: 3790: 3776: 3772: 3766: 3752: 3748: 3742: 3728: 3724: 3718: 3704: 3700: 3694: 3680: 3676: 3670: 3656: 3652: 3646: 3638: 3631: 3629: 3627: 3618: 3611: 3597:on 2019-02-15 3596: 3592: 3586: 3578: 3574: 3568: 3554: 3550: 3543: 3529: 3525: 3519: 3505: 3501: 3495: 3481: 3477: 3471: 3457: 3453: 3447: 3439: 3435: 3429: 3414: 3410: 3403: 3388: 3384: 3377: 3362: 3358: 3351: 3343: 3337: 3329: 3323: 3315: 3311: 3304: 3296: 3295: 3290: 3284: 3277: 3272: 3268: 3267: 3261: 3247: 3243: 3237: 3235: 3219: 3218: 3213: 3207: 3199: 3193: 3179: 3175: 3168: 3161: 3150: 3144: 3137: 3126: 3125: 3120: 3113: 3111: 3102: 3101:deviating.net 3098: 3092: 3078: 3072: 3068: 3058: 3054: 3051: 3049: 3045: 3042: 3039: 3036: 3033: 3030: 3027: 3024: 3022: 3019: 3016: 3013: 3011: 3008: 3007: 2996: 2993: 2990: 2988: 2985: 2982: 2981: 2977: 2974: 2971: 2969: 2966: 2963: 2962: 2958: 2955: 2952: 2950: 2947: 2944: 2943: 2939: 2936: 2933: 2931: 2928: 2925: 2924: 2920: 2917: 2914: 2912: 2909: 2906: 2905: 2901: 2898: 2895: 2893: 2890: 2887: 2886: 2882: 2879: 2876: 2874: 2871: 2868: 2867: 2863: 2860: 2857: 2855: 2852: 2849: 2848: 2844: 2841: 2838: 2836: 2833: 2830: 2829: 2825: 2822: 2819: 2817: 2814: 2811: 2810: 2806: 2803: 2800: 2798: 2795: 2792: 2791: 2787: 2784: 2781: 2779: 2776: 2773: 2772: 2768: 2765: 2762: 2760: 2757: 2754: 2753: 2749: 2746: 2743: 2741: 2738: 2735: 2734: 2730: 2727: 2724: 2722: 2719: 2716: 2715: 2711: 2708: 2705: 2703: 2700: 2697: 2696: 2692: 2689: 2686: 2684: 2681: 2678: 2677: 2673: 2670: 2667: 2665: 2662: 2659: 2658: 2654: 2651: 2648: 2646: 2643: 2640: 2639: 2635: 2632: 2629: 2627: 2624: 2621: 2620: 2616: 2613: 2610: 2608: 2605: 2602: 2601: 2597: 2594: 2591: 2589: 2586: 2583: 2582: 2578: 2575: 2572: 2570: 2569:Bally's Hotel 2566: 2563: 2560: 2559: 2555: 2552: 2549: 2547: 2546:Bally's Hotel 2543: 2540: 2537: 2536: 2532: 2529: 2526: 2524: 2521: 2518: 2517: 2513: 2510: 2507: 2504: 2500: 2497: 2496: 2492: 2489: 2486: 2484: 2480: 2477: 2474: 2473: 2469: 2466: 2463: 2461: 2458: 2455: 2454: 2450: 2447: 2444: 2442: 2438: 2434: 2433:Bally's Hotel 2430: 2427: 2424: 2423: 2419: 2416: 2413: 2411: 2407: 2403: 2399: 2398:Caesars Forum 2395: 2392: 2391: 2387: 2384: 2381: 2379: 2378:Virtual event 2376: 2373: 2372: 2368: 2365: 2362: 2360: 2359:Bally's Hotel 2356: 2353: 2350: 2349: 2345: 2342: 2340:August 11–14 2339: 2337: 2333: 2329: 2325: 2324:Caesars Forum 2322: 2319: 2318: 2314: 2311: 2309:August 10–13 2308: 2306: 2302: 2298: 2294: 2293:Caesars Forum 2291: 2288: 2287: 2283: 2280: 2277: 2275: 2271: 2268: 2265: 2264: 2260: 2257: 2254: 2252: 2249: 2246: 2245: 2241: 2238: 2235: 2232: 2229: 2228: 2225: 2214: 2213: 2208: 2207:Werner Herzog 2204: 2201: 2197: 2196: 2191: 2188: 2185: 2181: 2177: 2173: 2171: 2166: 2165: 2160: 2157: 2153: 2152: 2147: 2144: 2140: 2137: 2133: 2129: 2128: 2123: 2122: 2112:as a result. 2111: 2107: 2103: 2100: 2099: 2094: 2091: 2090: 2085: 2082: 2081: 2078: 2076: 2072: 2068: 2063: 2061: 2057: 2053: 2047: 2043: 2040: 2039: 2036: 2031: 2027: 2024: 2023: 2019: 2014: 2010: 2007: 2006: 2003: 2000: 1999: 1994: 1990: 1985: 1984:James Clapper 1982: 1978: 1974: 1971: 1965: 1961: 1957: 1953: 1950: 1949: 1945: 1941: 1938: 1937: 1933: 1929: 1925: 1922: 1921: 1918: 1912: 1907: 1903: 1898: 1895: 1894: 1890: 1889: 1884: 1881: 1880: 1876: 1872: 1868: 1865: 1864: 1860: 1857: 1853: 1849: 1846: 1845: 1841: 1837: 1833: 1830: 1829: 1825: 1822: 1821: 1818: 1810: 1807: 1797: 1794: 1793:middle-endian 1789: 1787: 1783: 1778: 1776: 1772: 1767: 1763: 1761: 1757: 1753: 1748: 1745: 1743: 1739: 1735: 1731: 1727: 1723: 1718: 1705: 1703: 1700: 1697: 1694: 1691: 1688: 1687: 1683: 1681: 1678: 1675: 1672: 1669: 1666: 1665: 1661: 1659: 1656: 1653: 1650: 1647: 1644: 1643: 1639: 1636: 1633: 1630: 1627: 1624: 1621: 1620: 1616: 1613: 1610: 1607: 1604: 1601: 1598: 1597: 1593: 1590: 1587: 1584: 1581: 1578: 1575: 1574: 1570: 1567: 1564: 1561: 1558: 1555: 1552: 1551: 1547: 1544: 1541: 1538: 1535: 1532: 1529: 1528: 1524: 1521: 1518: 1515: 1512: 1509: 1506: 1505: 1501: 1498: 1495: 1492: 1489: 1486: 1483: 1482: 1478: 1475: 1472: 1469: 1466: 1463: 1460: 1459: 1455: 1452: 1449: 1446: 1443: 1440: 1437: 1436: 1432: 1429: 1426: 1423: 1420: 1417: 1414: 1413: 1409: 1406: 1403: 1400: 1397: 1394: 1391: 1390: 1386: 1383: 1380: 1377: 1374: 1371: 1368: 1367: 1363: 1360: 1357: 1354: 1351: 1348: 1345: 1344: 1340: 1337: 1334: 1331: 1328: 1325: 1322: 1321: 1317: 1314: 1311: 1308: 1305: 1302: 1299: 1298: 1294: 1291: 1288: 1285: 1282: 1279: 1276: 1273: 1272: 1268: 1265: 1262: 1259: 1256: 1253: 1250: 1247: 1246: 1242: 1239: 1236: 1233: 1230: 1227: 1224: 1223: 1219: 1217: 1214: 1212: 1209: 1206: 1203: 1200: 1199: 1195: 1192: 1189: 1187: 1184: 1182: 1179: 1176: 1175: 1171: 1168: 1166: 1163: 1161: 1158: 1155: 1154: 1150: 1148: 1146: 1143: 1141: 1138: 1135: 1134: 1130: 1128: 1126: 1123: 1121: 1118: 1115: 1114: 1110: 1108: 1106: 1103: 1101: 1098: 1095: 1094: 1090: 1088: 1086: 1083: 1081: 1078: 1075: 1074: 1070: 1068: 1066: 1063: 1061: 1058: 1055: 1054: 1051:Winning Team 1050: 1047: 1045:Architecture 1044: 1041: 1038: 1035: 1032: 1031: 1025: 1016: 1014: 1011: 1007: 1003: 998: 996: 986: 978: 976: 972: 962: 960: 956: 952: 939: 936: 933: 929: 928: 927: 918: 916: 912: 908: 904: 893: 890: 880: 871: 869: 853: 851: 847: 842: 840: 835: 833: 827: 825: 820: 816: 814: 810: 806: 802: 801: 795: 793: 789: 785: 775: 773: 769: 765: 761: 757: 752: 750: 746: 742: 738: 734: 729: 727: 723: 719: 715: 711: 707: 703: 699: 695: 691: 687: 683: 679: 675: 671: 660: 655: 653: 648: 646: 641: 640: 638: 637: 630: 629: 625: 623: 622: 618: 616: 613: 611: 610: 606: 605: 599: 598: 591: 587: 584: 581: 578: 575: 572: 569: 566: 563: 560: 558: 555: 553: 550: 549: 546: 541: 540: 533: 530: 528: 525: 523: 520: 519: 516: 511: 510: 503: 500: 498: 495: 493: 490: 488: 485: 483: 480: 478: 475: 473: 470: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 443: 440: 438: 435: 434: 431: 426: 425: 418: 415: 413: 410: 409: 406: 401: 400: 393: 392:Vulnerability 390: 388: 385: 383: 380: 378: 375: 373: 370: 369: 366: 365:Hacking tools 361: 360: 353: 352:Script kiddie 350: 348: 345: 343: 340: 339: 336: 331: 330: 323: 320: 318: 315: 313: 310: 308: 305: 303: 300: 298: 295: 293: 290: 289: 286: 281: 280: 271: 268: 266: 263: 261: 258: 257: 256: 252: 250: 249:Maker culture 247: 245: 242: 240: 237: 235: 234: 230: 228: 225: 224: 221: 217: 212: 211: 204: 201: 199: 196: 194: 191: 189: 186: 185: 182: 177: 176: 173: 170: 169: 165: 164: 156: 150: 146: 142: 138: 134: 130: 126: 122: 119: 116: 112: 101: 97: 93: 89: 86: 82: 79: 75: 71: 67: 63: 59: 55: 51: 47: 43: 38: 33: 19: 5134: 5133: 5119:Official FAQ 5103: 5102: 5078: 5064:. Retrieved 5058: 5044: 5014:. Retrieved 5005: 4994:. Retrieved 4970:. Retrieved 4960: 4949:. Retrieved 4939: 4928:. Retrieved 4915: 4904:. Retrieved 4894: 4883:. Retrieved 4871: 4861: 4850:. Retrieved 4841: 4830:. Retrieved 4826: 4817: 4805:. Retrieved 4798:the original 4784: 4774:12 September 4772:. Retrieved 4769:The Register 4768: 4758: 4748:12 September 4746:. Retrieved 4736: 4726:12 September 4724:. Retrieved 4721:The Register 4720: 4710: 4696: 4685:. Retrieved 4681: 4672: 4649: 4637:. Retrieved 4625:The Guardian 4623: 4613: 4602:. Retrieved 4592: 4581:. Retrieved 4577: 4568: 4556:. Retrieved 4548: 4538: 4524: 4516:ForAllSecure 4515: 4506: 4491:Blue, Violet 4486: 4445: 4435: 4409:the original 4404: 4394: 4385: 4375: 4364:. Retrieved 4360:the original 4349: 4337:. Retrieved 4333:the original 4323: 4310: 4305: 4292: 4282: 4271:. Retrieved 4263: 4253: 4242:. Retrieved 4238:the original 4233: 4223: 4212:. Retrieved 4208:the original 4201: 4191: 4180:. Retrieved 4176: 4167: 4156:. Retrieved 4146: 4135:. Retrieved 4131: 4122: 4111:. Retrieved 4101: 4086: 4075:. Retrieved 4071:the original 4061: 4051:, retrieved 4046: 4040: 4030:, retrieved 4025: 4018: 4003: 3988: 3979: 3975: 3965: 3954:. Retrieved 3950: 3941: 3927: 3909: 3898:. Retrieved 3894: 3885: 3874:. Retrieved 3870: 3861: 3850:. Retrieved 3846: 3837: 3826:. Retrieved 3822: 3813: 3802:. Retrieved 3798: 3789: 3778:. Retrieved 3774: 3765: 3754:. Retrieved 3750: 3741: 3730:. Retrieved 3726: 3717: 3706:. Retrieved 3702: 3693: 3682:. Retrieved 3678: 3669: 3658:. Retrieved 3654: 3645: 3615:Moss, Jeff. 3610: 3599:. Retrieved 3595:the original 3585: 3576: 3567: 3556:. Retrieved 3552: 3542: 3531:. Retrieved 3527: 3518: 3507:. Retrieved 3503: 3494: 3483:. Retrieved 3479: 3470: 3459:. Retrieved 3455: 3446: 3437: 3428: 3416:. Retrieved 3412: 3402: 3390:. Retrieved 3386: 3376: 3364:. Retrieved 3360: 3350: 3336: 3322: 3313: 3303: 3294:The Register 3292: 3283: 3265: 3260: 3249:. Retrieved 3245: 3221:. Retrieved 3216: 3206: 3192: 3181:. Retrieved 3177: 3167: 3159: 3152:. Retrieved 3143: 3134: 3128:. Retrieved 3122: 3100: 3091: 3080:. Retrieved 3071: 2706:August 8–10 2592:August 7–10 2487:August 9–12 2445:August 8–11 2278:August 8–11 2255:August 7–10 2223: 2210: 2193: 2184:NSA director 2176:CIA director 2169: 2164:Jason Bourne 2162: 2149: 2125: 2064: 2049: 2033: 1996: 1967: 1915: 1888:Dateline NBC 1886: 1826:Description 1816: 1803: 1790: 1779: 1768: 1764: 1749: 1746: 1719: 1716: 1243:sk3wl0fr00t 1022: 999: 992: 984: 968: 948: 924: 899: 885: 864: 843: 836: 828: 823: 821: 817: 798: 796: 781: 753: 751:exercises). 730: 681: 677: 673: 669: 668: 626: 619: 607: 602:Publications 447:Trojan horse 412:HackThisSite 301: 231: 91:Years active 4553:Thehill.com 4267:v DefCon 16 3456:www.dfiu.tv 3418:January 14, 3392:January 14, 3366:January 14, 2972:July 22–24 2953:August 4–6 2934:July 26–28 2915:July 11–13 2858:July 28–30 2839:July 13–15 2820:August 2–4 2812:DEF CON 10 2801:August 1–3 2793:DEF CON 11 2774:DEF CON 12 2763:July 29–31 2755:DEF CON 13 2744:August 4–6 2736:DEF CON 14 2725:August 3–5 2717:DEF CON 15 2698:DEF CON 16 2679:DEF CON 17 2660:DEF CON 18 2649:August 4–7 2641:DEF CON 19 2630:July 26–29 2622:DEF CON 20 2611:August 1–4 2603:DEF CON 21 2584:DEF CON 22 2573:August 6–9 2565:Paris Hotel 2561:DEF CON 23 2550:August 4–7 2542:Paris Hotel 2538:DEF CON 24 2527:July 27–30 2519:DEF CON 25 2475:DEF CON 26 2429:Paris Hotel 2425:DEF CON 27 2414:August 6–9 2393:DEF CON 28 2382:August 6–9 2363:August 5–8 2355:Paris Hotel 2351:DEF CON 29 2320:DEF CON 30 2289:DEF CON 31 2266:DEF CON 32 2247:DEF CON 33 2242:Attendance 2178:(played by 2172:film series 2154:. Director 2127:The X-Files 2067:MalwareTech 1760:Guitar Hero 1730:FormatGuard 1387:ACME Pharm 1269:shellphish 1042:Organizers 989:Black Badge 965:Fundraising 907:lockpicking 889:Konami Code 733:lockpicking 702:journalists 615:Hacker News 502:Infostealer 285:Conferences 239:Hackerspace 143:Over 30,000 99:Inaugurated 77:Location(s) 5174:Categories 5135:Multimedia 5066:2023-08-10 5016:2018-07-07 4996:2017-06-07 4972:2019-09-15 4951:2019-09-15 4930:2018-05-17 4906:2018-10-28 4885:2023-02-25 4852:2024-02-04 4832:2016-04-09 4687:2020-05-08 4639:August 11, 4604:2017-12-08 4583:2017-12-08 4578:C-SPAN.org 4366:2024-03-19 4339:2008-06-09 4293:Press Room 4273:2010-10-07 4244:2007-08-15 4214:2004-07-31 4182:2023-02-25 4158:2023-12-20 4137:2023-12-20 4113:2023-12-20 4106:routardz. 4077:2023-12-21 4053:2023-12-20 4032:2023-12-20 3956:2023-12-21 3900:2024-09-09 3876:2024-09-06 3852:2024-09-06 3828:2023-12-21 3804:2023-12-21 3780:2023-12-21 3756:2023-12-21 3732:2023-12-27 3708:2023-12-27 3684:2023-12-27 3660:2023-12-20 3601:2017-04-24 3558:2016-03-12 3533:2024-01-29 3509:2024-01-29 3485:2024-01-29 3461:2024-01-29 3251:2019-08-17 3183:2016-03-12 3130:2007-08-15 3082:2017-04-23 3064:References 2991:June 9–11 2983:DEF CON 1 2964:DEF CON 2 2945:DEF CON 3 2926:DEF CON 4 2907:DEF CON 5 2888:DEF CON 6 2877:July 9–11 2869:DEF CON 7 2850:DEF CON 8 2831:DEF CON 9 2508:May 11–13 2460:751 D-Park 2336:Linq Hotel 2305:Linq Hotel 2274:The Sahara 2151:The Signal 2106:ransomware 2018:Will Smith 1726:StackGuard 1571:DEFKOR00T 1318:1@stplace 1295:1@stplace 1091:AJ Reznor 1071:AJ Reznor 934:community. 903:Biohacking 856:Components 472:Logic bomb 467:Ransomware 244:Hacktivism 140:Attendance 132:Next event 106:1993-06-09 4880:1059-1028 4634:0261-3077 4151:Unknown. 3727:ddtek.biz 3703:ddtek.biz 3679:ddtek.biz 3413:USA Today 3212:Jeff Moss 3057:San Diego 3044:Summercon 2236:Duration 2195:Mr. Robot 2130:episode " 2013:Jeff Moss 1977:Ron Wyden 1964:Jeff Moss 1875:Cisco IOS 1640:Katzebin 1545:cLEMENCy 1542:cLEMENCy 1364:VedaGodz 1332:Kenshoto 1309:Kenshoto 1283:Kenshoto 1257:Kenshoto 1169:Multiple 1048:Platform 975:dunk tank 945:Workshops 911:ham radio 868:Jeff Moss 813:phreakers 784:Jeff Moss 690:Las Vegas 590:Blue team 582:(defunct) 576:(defunct) 570:(defunct) 564:(defunct) 552:Anonymous 492:Web shell 342:Crimeware 322:Summercon 270:White hat 260:Black hat 253:Types of 227:Hackathon 188:Phreaking 118:Jeff Moss 81:Las Vegas 61:Frequency 5037:Archived 4558:2 August 4549:The Hill 4459:NBC News 3026:Hack-Tic 3004:See also 2959:Unknown 2940:Unknown 2921:Unknown 2902:Unknown 2883:Unknown 2864:Unknown 2845:Unknown 2826:Unknown 2807:Unknown 2788:Unknown 2769:Unknown 2750:Unknown 2731:Unknown 2693:Unknown 2674:Unknown 2655:Unknown 2636:Unknown 2579:16,000+ 2514:Unknown 2483:Flamingo 2470:Unknown 2451:~30,000 2441:Flamingo 2410:Flamingo 2406:The Linq 2402:Harrah's 2396:Planned 2346:~25,000 2328:Flamingo 2315:~25,000 2297:Flamingo 2060:O'Reilly 1861:format. 1742:AppArmor 1734:OpenWall 1433:Samurai 1430:FreeBSD 1407:FreeBSD 1361:FreeBSD 1338:FreeBSD 1315:FreeBSD 1240:Windows 1220:Anomaly 1036:DEF CON 981:Contests 896:Villages 839:COVID-19 832:COVID-19 800:WarGames 749:red team 718:wargames 710:software 586:Red team 442:Backdoor 317:ShmooCon 265:Grey hat 5104:DEF CON 4664:Twitter 4455:Archive 3982:(2003). 3895:CTFtime 3871:CTFtime 3847:CTFtime 3053:ToorCon 2617:12,000 2598:16,000 2556:22,000 2533:25,000 2503:Beijing 2493:28,000 2369:~8,700 2192:In the 1856:Adobe's 1756:forking 1722:Immunix 1522:DECREE 1502:DEFKOR 1290:Solaris 1264:FreeBSD 1216:OpenBSD 901:Recon, 861:Handles 850:Discord 788:FidoNet 778:History 706:hackers 684:) is a 670:DEF CON 574:LulzSec 462:Spyware 437:Rootkit 430:Malware 382:Payload 372:Exploit 302:DEF CON 255:hackers 181:History 148:Website 114:Founder 104: ( 40:DEF CON 4878:  4632:  4437:Forbes 3434:"Home" 3273:  3048:Phrack 3034:(HOPE) 2712:8,000 2439:, and 2408:, and 2334:, and 2303:, and 2272:, and 2233:Venue 2170:Bourne 1998:Forbes 1859:e-book 1800:Groups 1701:mixed 1679:mixed 1657:mixed 1637:Linux 1617:A*0*E 1614:Linux 1568:Linux 1499:Linux 1476:Linux 1453:Linux 1450:armv7 1424:DDTEK 1401:DDTEK 1378:DDTEK 1355:DDTEK 1191:Redhat 1164:Goons 1144:Goons 1124:Goons 1104:Goons 1084:Goons 1064:Goons 874:Badges 846:Twitch 792:Canada 743:, and 728:heat. 726:Nevada 694:Nevada 678:Defcon 674:DEFCON 628:Phrack 545:Groups 477:Botnet 417:Zone-H 153:defcon 85:Nevada 72:Varies 64:Annual 48:Active 45:Status 5092:WIRED 5060:Wired 4924:(PDF) 4872:Wired 4807:9 Feb 4801:(PDF) 4794:(PDF) 4660:Tweet 4499:ZDNet 4386:Wired 3919:(PDF) 3314:Wired 3223:9 Feb 3154:9 Feb 2997:~100 2994:1993 2978:~200 2975:1994 2956:1995 2937:1996 2918:1997 2899:1998 2880:1999 2861:2000 2842:2001 2823:2002 2804:2003 2785:2004 2766:2005 2747:2006 2728:2007 2709:2008 2690:2009 2671:2010 2652:2011 2633:2012 2614:2013 2595:2014 2576:2015 2553:2016 2530:2017 2511:2018 2490:2018 2467:2019 2448:2019 2417:2020 2385:2020 2366:2021 2343:2022 2312:2023 2281:2024 2258:2025 2239:Year 2101:2024 2092:2020 2083:2018 2041:2017 2025:2016 2008:2013 1989:PRISM 1951:2012 1939:2011 1923:2009 1896:2008 1882:2007 1871:Cisco 1866:2005 1847:2001 1831:1999 1823:Year 1782:DARPA 1775:jails 1689:2024 1667:2023 1645:2022 1622:2021 1599:2020 1576:2019 1553:2018 1530:2017 1519:i386 1507:2016 1484:2015 1461:2014 1438:2013 1427:i386 1415:2012 1404:i386 1392:2011 1381:i386 1369:2010 1358:i386 1346:2009 1335:i386 1323:2008 1312:i386 1300:2007 1286:i386 1274:2006 1260:i386 1248:2005 1237:i386 1225:2004 1201:2003 1177:2002 1156:2001 1136:2000 1116:1999 1096:1998 1076:1997 1056:1996 1033:Year 1010:DARPA 932:LGBTQ 770:(via 722:Wi-Fi 452:Virus 220:ethic 69:Venue 53:Genre 5150:IMDb 5080:CNET 4876:ISSN 4809:2011 4776:2024 4750:2024 4728:2024 4641:2017 4630:ISSN 4560:2017 4479:CNET 4453:." ( 4316:Text 4265:MBTA 3420:2019 3394:2019 3368:2019 3271:IMDb 3225:2011 3156:2011 3017:(C3) 2567:and 2544:and 2481:and 2388:N/A 2357:and 2284:N/A 2261:N/A 1806:2600 1771:0day 1754:and 1266:5.4 1193:6.2 1111:SNI 959:RFID 848:and 772:CISA 487:HIDS 457:Worm 218:and 155:.org 5148:on 5077:." 5043:." 4497:". 4493:. " 4477:". 4434:." 4297:EFF 3269:at 2077:. 1995:of 1928:ATM 1906:MIT 1736:'s 1695:12 1692:32 1673:12 1670:31 1651:16 1648:30 1628:16 1625:29 1605:16 1602:28 1582:16 1579:27 1559:24 1556:26 1536:15 1533:25 1513:15 1510:24 1490:15 1487:23 1467:20 1464:22 1444:20 1441:21 1421:20 1418:20 1398:12 1395:19 1375:12 1372:18 1349:17 1326:16 1303:15 1292:10 1277:14 1251:13 1228:12 1204:11 1180:10 1004:'s 955:IoT 768:DHS 760:DoD 756:FBI 680:or 497:RCE 5176:: 5090:" 5057:. 4981:^ 4874:. 4870:. 4825:. 4767:. 4719:. 4680:. 4628:. 4622:. 4576:. 4551:. 4547:. 4514:. 4466:^ 4457:) 4417:^ 4403:. 4384:. 4295:. 4291:. 4262:. 4232:. 4200:. 4175:. 4130:. 3978:. 3974:. 3949:. 3893:. 3869:. 3845:. 3821:. 3797:. 3773:. 3749:. 3725:. 3701:. 3677:. 3653:. 3625:^ 3575:. 3551:. 3526:. 3502:. 3478:. 3454:. 3436:. 3411:. 3385:. 3359:. 3312:. 3291:. 3244:. 3233:^ 3176:. 3158:. 3133:. 3121:. 3109:^ 3099:. 2505:) 2435:, 2431:, 2420:0 2404:, 2400:, 2330:, 2326:, 2299:, 2295:, 1958:, 1762:. 1732:, 1728:, 1352:9 1329:8 1306:8 1280:8 1254:8 1231:8 1207:8 1159:9 1139:8 1119:7 1099:6 1079:5 1059:4 909:, 905:, 834:. 766:, 762:, 758:, 735:, 712:, 692:, 682:DC 676:, 588:/ 94:31 83:, 5069:. 5032:" 5019:. 4999:. 4975:. 4954:. 4933:. 4909:. 4888:. 4855:. 4835:. 4811:. 4778:. 4752:. 4730:. 4704:. 4690:. 4666:. 4658:( 4643:. 4607:. 4586:. 4562:. 4518:. 4369:. 4342:. 4318:. 4299:. 4276:. 4247:. 4217:. 4185:. 4161:. 4140:. 4116:. 4095:. 4080:. 4012:. 3997:. 3980:2 3959:. 3921:. 3903:. 3879:. 3855:. 3831:. 3807:. 3783:. 3759:. 3735:. 3711:. 3687:. 3663:. 3639:. 3619:. 3604:. 3561:. 3536:. 3512:. 3488:. 3464:. 3440:. 3422:. 3396:. 3370:. 3344:. 3330:. 3316:. 3297:. 3254:. 3227:. 3200:. 3186:. 3103:. 3085:. 2189:. 658:e 651:t 644:v 108:) 34:. 20:)

Index

DEF CON (convention)
Defcon (disambiguation)
Las Vegas
Nevada
Jeff Moss
defcon.org
Computer hacking
History
Phreaking
Cryptovirology
Hacking of consumer electronics
List of hackers
Hacker culture
ethic
Hackathon
Hacker Manifesto
Hackerspace
Hacktivism
Maker culture
hackers
Black hat
Grey hat
White hat
Conferences
Black Hat Briefings
Chaos Communication Congress
DEF CON
Hackers on Planet Earth
Security BSides
ShmooCon

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑