892:
conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.
3276:
794:. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
1891:, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened. A DEF CON source at NBC had tipped off organizers to Madigan's plans.
879:
1744:), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.
1913:(CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares. The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show.
1966:, was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense."
747:. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as
1908:
students Zack
Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston
2034:
The winner of the Cyber Grand
Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania. Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest, where it finished in last place, despite pulling ahead of human teams often in a contest
886:
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a
1808:
meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek
1765:
In 2009, it was announced that "Diutinus
Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was in fact organising the CTF! "Hacking the top hacker contest seemed like a fun way to
900:
Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include
Aerospace Village, Car Hacking Village, IoT Village,
3135:
According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about
Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to
2015:
posted a statement, located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year." This was the first time in the organization's history that it had asked federal
818:
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. In 2019, an estimated 30,000 people
891:
in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general
807:. In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a
2086:
In March 2018, the DEF CON Voting
Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.
852:). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.
716:, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking
829:
In
January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to
997:(CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
1023:
The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year. It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.
870:' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
1795:
with 9 bits bytes CPU. With its specifications released only 24h before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
1916:
In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.
2032:, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$ 2M grand prize.
4450:
2001:
said that NSA officials, including
Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."
1986:
if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance. In June 2013, NSA surveillance programs which collected data on US citizens, such as
865:
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder
2095:
On May 8, 2020, the DEF CON in-person conference itself was cancelled and virtualized due to COVID-19. DEF CON Safe Mode was held August 6–9 online with a full roster of talks, villages, contests and events.
925:
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
4454:
2202:" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
774:) and other agencies regularly attend DEF CON. Some have considered DEF CON to be the "world's largest" hacker con given its attendee size and the number of other conferences modeling themselves after it.
1909:
T subway. However, the
Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the
977:
and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
4431:
985:
Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker
Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress to name a few.
1766:
introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the Defcon 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
1008:
entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the
1717:
In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
826:. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
4400:
4229:
4355:
3947:"4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download"
3408:
887:
non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the
3356:
5036:
1901:
5179:
1972:
841:
the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
4790:
4990:
4544:
917:
and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
376:
771:
1724:
took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including
4619:
2211:
5194:
3590:
767:
1804:
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the
1842:(later discovered to be infected with the CIH virus) at DEF CON 7, in what was, at the time, the largest presentation in DEF CON history.
2175:
656:
4408:
3052:
1747:
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
3915:
2073:
was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with the
2183:
4359:
2052:
DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure
763:
4237:
5199:
4311:
Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology
1905:
486:
5074:
17:
4656:"WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…"
4920:
1005:
759:
4474:
2104:
On February 4, 2024, Cesar's Entertainment cancelled the contract with DEF CON without warning with speculation that a
940:
QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
180:
5033:
4328:
4197:
2051:
1980:
5184:
994:
953:
and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking
744:
1962:, gave the keynote speech. During the question and answers session, the first question for Alexander, fielded by
755:
197:
4944:
4494:
4296:
2644:
2625:
2606:
2587:
2108:
attack and bomb scare and subsequent evacuation in 2023 were in part to blame. The conference was moved to the
970:
649:
4797:
3932:
3160:
Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
2131:
914:
589:
386:
269:
259:
4742:
2199:
2138:. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
3014:
1988:
1910:
1791:
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a
685:
296:
284:
3289:"Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled"
5189:
4432:
Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)
4066:
2269:
2250:
2109:
1946:
used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.
371:
4092:
3994:
2910:
2739:
2720:
2701:
2682:
2663:
2436:
2335:
2304:
2215:, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
2070:
2029:
1931:
1805:
1785:
1012:
705:
608:
346:
4529:
642:
391:
3382:
1873:
used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the
4597:
3288:
1955:
1927:
567:
526:
496:
446:
5160:
The Story of DEF CON – video interview with Jeff Moss, a.k.a. Dark Tangent, the founder of DEF CON
3594:
3076:
1758:
were inverted), allowing them to have such a massive lead that they spent most of the CTF playing
5054:
4701:
4107:
3031:
2891:
1001:
306:
31:
5154:
4965:
4009:
3118:
2224:
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
5164:
4381:
3327:
2986:
2150:
902:
720:). Contests held during the event are extremely varied and can range from creating the longest
561:
4152:
1788:
program, where teams wrote autonomous systems to play the game without any human interaction.
4764:
2401:
2331:
2300:
2054:" summarizing its findings. The findings were publicly released at an event sponsored by the
1737:
713:
5055:"Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued"
2182:), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker,
5087:
4716:
4659:
2568:
2545:
2432:
2358:
2168:
1969:
1835:
1729:
950:
736:
579:
521:
441:
4655:
4440:. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted"
3275:
1934:
capturing data from an unknown number of hackers attending the DEF CON hacker conference.
8:
4899:
3650:
3009:
2948:
2163:
993:
The Black Badge is the highest award DEF CON gives to contest winners of certain events.
556:
381:
291:
3548:
696:. The first DEF CON took place in June 1993 and today many attendees at DEF CON include
5118:
5010:
3211:
3148:
2482:
2440:
2409:
2327:
2296:
2186:
2012:
1963:
1959:
954:
867:
783:
117:
4127:
4024:
2141:
A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by
4875:
4822:
4629:
3270:
3119:"Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape"
3020:
2059:
1839:
844:
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via
717:
697:
551:
514:
481:
3636:
3573:"Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity"
3572:
2161:
A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of
786:
as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a
5091:
5059:
5045:
4991:""Black Hat and Defcon see record attendance — even without the government spooks""
4315:
3971:
3357:"A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards"
3341:
2273:
2074:
2055:
1733:
882:
Multiple, electronic and non-electronic, DEF CON human badges and other con badges.
845:
808:
689:
531:
232:
5159:
4867:
3309:
3197:
3173:
5040:
3037:
2564:
2541:
2428:
2354:
2179:
2135:
2069:, the 23-year-old British security researcher who was credited with stopping the
1851:
1809:
permission to make a logo that includes the official DEF CON logo with approval.
1751:
311:
202:
171:
4288:
2020:
visited the convention to study the DEF CON culture for an upcoming movie role.
4574:"DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org"
2522:
2478:
2155:
2142:
2045:
1992:
1943:
815:. The official name of the conference includes a space in-between DEF and CON.
740:
620:
451:
404:
334:
215:
192:
4045:
3409:"11-year-old hacks replica of Florida state website, changes election results"
3215:
5173:
4879:
4633:
4202:
2967:
2397:
2377:
2323:
2292:
2206:
1983:
1870:
1855:
1792:
1190:
704:, lawyers, federal government employees, security researchers, students, and
456:
351:
248:
3818:
3794:
3770:
3746:
3616:
30:
This article is about the computer security convention. For other uses, see
4624:
3293:
2459:
1887:
1774:
1755:
906:
544:
411:
364:
219:
4620:"Briton who stopped WannaCry attack arrested over separate malware claims"
4207:
4573:
4552:
4490:
4332:
4172:
3946:
2872:
2853:
2834:
2815:
2796:
2777:
2758:
2126:
2066:
1759:
1015:
at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
888:
732:
709:
614:
501:
238:
5145:
3972:"Defcon Capture the Flag: defending vulnerable code from intense attack"
3264:
4846:
4677:
3241:
3123:
2105:
2017:
1725:
1289:
1000:
In April 2017, a DEF CON Black Badge was featured in an exhibit in the
701:
471:
466:
243:
1780:
In 2016, the 15th edition of the CTF was done in partnership with the
4717:"DEF CON is canceled! No, really this time – but the show will go on"
3056:
3043:
2194:
1976:
1874:
1817:
High-profile issues which have garnered significant media attention.
1750:
In 2008, the Sk3wl of Root team took advantage of a bug in the game (
974:
910:
812:
491:
341:
321:
226:
187:
80:
5165:
Transcript, audio, video of Jess Moss describing DEF CON's inception
3433:
4458:
4314: (United States District Court District of Massachusetts),
4259:
3025:
2929:
2405:
1854:
was arrested the day after DEF CON for writing software to decrypt
1769:
In 2011, the team "lollerskaters dropping from roflcopters" used a
1741:
838:
831:
799:
748:
724:
connection to finding the most effective way to cool a beer in the
585:
316:
264:
3475:
3040:, a community supported conference with locations across the globe
5128:
4663:
4512:"ForAllSecure | Mayhem Security | Application Security"
3890:
3866:
3842:
3383:"Is this the most puzzling DEF CON attendee badge yet on record?"
2502:
2148:
A trip to DEF CON for a hacker showdown figures into the plot of
1721:
1263:
1215:
849:
822:
For DEF CON's 20th Anniversary, a film was commissioned entitled
787:
573:
461:
436:
429:
4545:"Hackers breach dozens of voting machines brought to conference"
4010:"Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11"
3046:, the first American hacker conference, organized by members of
878:
4678:"DEF CON 28 in-person conference is CANCELLED - DEF CON Forums"
4436:
3499:
3047:
2158:
came to Las Vegas and screened the film at DEF CON Movie Night.
1997:
1858:
804:
791:
725:
693:
627:
476:
416:
254:
84:
4070:
3096:
5140:
4498:
4401:"Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON"
3722:
3698:
3674:
1781:
1009:
949:
Workshops are dedicated classes on various topics related to
721:
4511:
3523:
937:
Linecon, any long line has the potential to turn into a con.
5149:
5123:
5079:
4478:
4451:
Hackers Don't Believe NSA Chief's Denial of Domestic Spying
4264:
1770:
958:
931:
4598:"O'Reilly Security Conference in NYC 2017 Defender Awards"
969:
Since DEF CON 11, fundraisers have been conducted for the
5111:
5034:
DefCon's Moss: Undercover Reporter Damages 'Neutral Zone'
4173:"Official forums social group section for DEF CON groups"
3976:
DARPA Information Survivability Conference and Exposition
3549:"DEF CON® Hacking Conference – Black Badge Hall of Fame"
3136:
gather intelligence on the latest techniques of hackers.
2050:
In September 2017, the Voting Machine Village produced "
3617:"DEF CON Hacking Conference - Capture the Flag Archive"
3451:
4743:"Caesars Ransomware Attack, MGM Hit Linked To DEFCON?"
4093:"Buffer overflow in handling of UNIX socket addresses"
2174:. The primary antagonist of the film, a fictionalized
1902:
Massachusetts Bay Transportation Authority v. Anderson
805:
U.S. Armed Forces defense readiness condition (DEFCON)
1930:
kiosk was positioned in the conference center of the
152:
4988:
4984:
4982:
4913:
4090:
2065:Marcus Hutchins, better known online by his handle
2028:On August 4, 2016, DEF CON and DARPA co-hosted the
4426:
4424:
4422:
4420:
4418:
4007:
3236:
3234:
4469:
4467:
4399:Fisher, Dennis; Roberts, Paul (August 10, 2011).
4198:"Exploit writers team up to target Cisco routers"
3242:"Def Con 27 Transparency Report - DEF CON Forums"
2145:, demonstrates some of the early DEF CON culture.
2044:At the "Voting Machine Village" event, dozens of
1979:quoted the 2012 DEF CON keynote speech and asked
1885:In August 2007, Michelle Madigan, a reporter for
782:DEF CON was founded in 1993, by then 18-year-old
5171:
4979:
4937:
4230:"Transcript: Michelle Madigan's run from Defcon"
2219:
5155:A first ever look inside the DEF CON NOC (2008)
5088:To Fix Voting Machines, Hackers Tear Them Apart
4892:
4653:
4495:Feds 'not welcome' at DEF CON hacker conference
4415:
3634:
3231:
4765:"Bomb scare causes mass evacuation at DEF CON"
4464:
2212:Lo and Behold, Reveries of the Connected World
1777:, causing havoc in the game's infrastructure.
4823:"DEF CON® Hacking Conference – Show Archives"
4461:. August 1, 2012. Retrieved on June 13, 2013.
4398:
4356:"Antivirus Vendors Slam Defcon Virus Contest"
4067:"Diutinus Defense Techonologies Corp. / Home"
3933:"Defcon 9 - Capture The Flag Contest Network"
3723:"Diutinus Defense Techonologies Corp. / Home"
3699:"Diutinus Defense Techonologies Corp. / DC18"
3675:"Diutinus Defense Techonologies Corp. / DC17"
3097:"DefCon Beverage Cooling Contraption Contest"
650:
5180:Las Vegas Valley conventions and trade shows
4847:"DEF CON 32 Was Canceled. We Un-Canceled it"
4501:. July 11, 2013. Retrieved on July 11, 2013.
4481:. July 11, 2013. Retrieved on July 12, 2013.
4289:"MIT Students Gagged by Federal Court Judge"
3995:"Defcon 10 - Capture the Flag (CTF) contest"
2035:for which it was not specifically designed.
1773:in FreeBSD (namely CVE-2011-4062) to escape
27:Annual hacker gathering in Las Vegas, Nevada
5003:
2118:
1712:
5075:NSA director finally greets Defcon hackers
4788:
4542:
3637:"A history of Capture the Flag at DEF CON"
3380:
3274:
731:Other contests, past and present, include
657:
643:
5052:
4618:Hern, Alex; Levin, Sam (August 4, 2017).
4617:
4475:Defcon to feds: 'We need some time apart'
3992:
2048:brought to the conference were breached.
4958:
4353:
4128:"Cyber Grand Challenge (CGC) (Archived)"
3354:
3112:
3110:
877:
754:Federal law enforcement agents from the
4740:
4530:"DEF CON Capture the Flag Final Scores"
4286:
3969:
3355:Oberhaus, Daniel (September 18, 2018).
961:, fuzzing and attacking smart devices.
920:
764:United States Postal Inspection Service
14:
5172:
4966:""Gray Tier Technologies at DEFCON23""
4257:
4227:
4221:
4022:
3406:
3116:
797:The term DEF CON comes from the movie
56:Security Conference, Hacker Conference
4741:Khaitan, Ashish (14 September 2023).
4195:
4189:
4047:A Brief History of CTF - Jordan Wiens
3913:
3630:
3628:
3626:
3174:"DEF CON® Hacking Conference – About"
3107:
3055:, a yearly hacker conference held in
1850:On July 16, 2001, Russian programmer
837:In 2020, due to safety concerns over
5195:Recurring events established in 1993
4762:
4714:
4105:
4008:The Ghetto Hackers (June 29, 2003).
3381:McAllister, Neil (August 12, 2015).
1812:
790:protocol based hacking network from
5053:Greenberg, Andy (August 10, 2023).
4989:Richard Byrne Reilly (2014-08-12).
4280:
4251:
4150:
3546:
3500:"DEF CON Crash and Compile Contest"
3171:
3028:, a quadrennial European convention
1018:
1006:National Museum of American History
377:forensics-focused operating systems
24:
5026:
4921:""Voting Machine Hacking Village""
4865:
4379:
4358:. IDG News Service. Archived from
4091:The FreeBSD Project (2011-09-28).
3623:
3307:
2209:included DEF CON in his 2016 film
973:(EFF). The first fundraiser was a
25:
5211:
5098:
4654:@VotingVillageDC (6 March 2018).
3407:Molina, Brett (August 14, 2018).
2016:authorities not to attend. Actor
1981:Director of National Intelligence
4702:"DEF CON Safe Mode archive site"
3891:"CTFtime.org / DEF CON CTF 2024"
3867:"CTFtime.org / DEF CON CTF 2023"
3843:"CTFtime.org / DEF CON CTF 2022"
3614:
3452:"Hacker Jeopardy for DEF CON 28"
2058:and the paper went on to win an
1973:Select Committee on Intelligence
5129:DEF CON v3 Tor .onion addresses
4859:
4839:
4815:
4782:
4756:
4734:
4708:
4694:
4670:
4647:
4611:
4590:
4566:
4536:
4522:
4504:
4484:
4443:
4392:
4382:"Malicious ATM Catches Hackers"
4373:
4354:McMillan, Robert (April 2008).
4347:
4321:
4303:
4287:Jeschke, Rebecca (2008-08-09).
4228:Cassel, David (4 August 2007).
4165:
4144:
4120:
4099:
4084:
4059:
4038:
4016:
4001:
3986:
3963:
3939:
3925:
3907:
3883:
3859:
3835:
3811:
3787:
3763:
3739:
3715:
3691:
3667:
3643:
3608:
3583:
3565:
3540:
3516:
3492:
3468:
3444:
3426:
3400:
3374:
3348:
3334:
3320:
3301:
3281:
198:Hacking of consumer electronics
4791:"Cyber Christ Meets Lady Luck"
3258:
3204:
3190:
3165:
3141:
3089:
3069:
2124:DEF CON was also portrayed in
1539:Legitimate Business Syndicate
1516:Legitimate Business Syndicate
1493:Legitimate Business Syndicate
1470:Legitimate Business Syndicate
1447:Legitimate Business Syndicate
988:
971:Electronic Frontier Foundation
964:
13:
1:
5200:1993 establishments in Nevada
3117:Zetter, Kim (3 August 2007).
3063:
2949:Tropicana Resort & Casino
2930:Monte Carlo Resort and Casino
2220:Venues, dates, and attendance
2134:" featuring an appearance by
1740:, SubDomain (the ancestor of
1172:Ghetto Hackers & digirev
855:
4543:Joe Uchill (July 29, 2017).
4258:Lundin, Leigh (2008-08-17).
4108:"Defcon 19 CTF - CTF Inside"
4069:. 2011-05-14. Archived from
3015:Chaos Communication Congress
1968:On March 12, 2013, during a
1911:Computer Fraud and Abuse Act
944:
739:, art, slogan, coffee wars,
297:Chaos Communication Congress
7:
4926:. September 2017. p. 4
4196:Lamos, Rob (31 July 2005).
3970:Crispin, Cowan (May 2003).
3003:
2270:Las Vegas Convention Center
2251:Las Vegas Convention Center
2110:Las Vegas Convention Center
1838:hacker collective released
1594:Plaid Parliament of Pwning
1548:Plaid Parliament of Pwning
1525:Plaid Parliament of Pwning
1479:Plaid Parliament of Pwning
1456:Plaid Parliament of Pwning
1028:Capture the Flag Timeline
980:
895:
708:with a general interest in
10:
5216:
4388:– via www.wired.com.
4153:"cLEMENCy - Showing Mercy"
3328:"DEF CON 28 Safe Mode FAQ"
2911:Aladdin Hotel & Casino
2740:Riviera Hotel & Casino
2721:Riviera Hotel & Casino
2702:Riviera Hotel & Casino
2683:Riviera Hotel & Casino
2664:Riviera Hotel & Casino
2030:2016 Cyber Grand Challenge
1899:
1706:Maple Mallard Magistrates
1684:Maple Mallard Magistrates
1662:Maple Mallard Magistrates
1013:2016 Cyber Grand Challenge
860:
777:
609:2600: The Hacker Quarterly
347:List of computer criminals
29:
4600:. conferences.oreilly.com
2200:eps3.0_power-saver-mode.h
2062:Defender Research Award.
1799:
873:
737:robotics-related contests
147:
139:
131:
123:
113:
98:
90:
76:
68:
60:
52:
44:
39:
5146:DEF CON: The Documentary
5141:DEF CON: The Documentary
4900:""DEF CON Transparency""
3916:"Capture the Flag Games"
3651:"A Brief History of CTF"
3635:vulc@n of DDTek (2023).
3476:"DEF CON Scavenger Hunt"
2892:Plaza Hotel & Casino
2167:, the fifth film of the
2119:Entertainment references
1956:National Security Agency
1713:Capture the Flag History
527:Cloud computing security
5185:Annual events in Nevada
3591:"Mayhem Wins DARPA CGC"
3266:DEFCON: The Documentary
3059:, California since 1999
3032:Hackers on Planet Earth
2968:Sahara Hotel and Casino
1926:WIRED reported that an
1002:Smithsonian Institution
824:DEFCON: The Documentary
307:Hackers on Planet Earth
32:Defcon (disambiguation)
4026:A Brief History of CTF
3577:americanhistory.si.edu
3480:DEF CON Scavenger Hunt
2987:Sands Hotel and Casino
2645:Rio Hotel & Casino
2626:Rio Hotel & Casino
2607:Rio Hotel & Casino
2588:Rio Hotel & Casino
1834:On July 10, 1999, the
1631:Order Of the Overflow
1608:Order Of the Overflow
1585:Order Of the Overflow
1565:MIPS, x86 & armv7
1562:Order Of the Overflow
1496:MIPS, x86 & armv7
957:devices, playing with
930:Queercon, a meetup of
883:
562:Homebrew Computer Club
102:June 9, 1993
4023:Jordan (2021-04-06),
3914:Riley, Eller (2004).
3310:"Defcon is Cancelled"
2075:Kronos banking trojan
1786:Cyber Grand Challenge
1720:In 2002, the company
1588:x86, arm64, esoteric
1384:FreeBSD & Debian
913:, and the well known
881:
819:attended DEF CON 27.
714:computer architecture
4945:""Norton at DefCon""
4868:"Defcon Is Canceled"
1991:, had been exposed.
1970:United States Senate
1954:The director of the
1932:Riviera Hotel Casino
1836:Cult of the Dead Cow
1738:non-executable stack
1410:European Nopsleders
951:information security
921:Internal Conferences
580:Masters of Deception
522:Application security
18:DEF CON (convention)
4532:. blog.legitbs.net.
3819:"OOO — DEF CON CTF"
3795:"OOO — DEF CON CTF"
3771:"OOO — DEF CON CTF"
3655:psifertex.github.io
3547:Tangent, The Dark.
3504:crashandcompile.org
3217:The Story of DEFCON
3172:Tangent, The Dark.
3077:"Def Con 1 Archive"
3010:Black Hat Briefings
2896:July 31 – August 2
2782:July 30 – August 1
2687:July 30 – August 2
2668:July 30 – August 1
1698:Nautilus Institute
1676:Nautilus Institute
1654:Nautilus Institute
1196:Digital Revelation
1029:
557:Chaos Computer Club
292:Black Hat Briefings
166:Part of a series on
5190:Hacker conventions
5086:Newman, Lily Hay "
5039:2019-09-24 at the
4866:Newman, Lily Hay.
4449:Wagenseil, Paul. "
4430:Greenberg, Andy. "
3747:"DEF CON CTF 2018"
3308:Newman, Lily Hay.
3124:Wired Blog Network
2873:Alexis Park Resort
2854:Alexis Park Resort
2835:Alexis Park Resort
2816:Alexis Park Resort
2797:Alexis Park Resort
2778:Alexis Park Resort
2759:Alexis Park Resort
2456:DEF CON China 1.0
2374:DEF CON Safe Mode
2187:Keith B. Alexander
2011:On July 11, 2013,
1960:Keith B. Alexander
1869:On July 31, 2005,
1752:privilege dropping
1027:
915:Social Engineering
884:
803:, referencing the
387:Social engineering
5049:. August 6, 2007.
4473:Whitney, Lance. "
4405:Business Security
4260:"Dangerous Ideas"
3823:OOO — DEF CON CTF
3799:OOO — DEF CON CTF
3775:OOO — DEF CON CTF
3751:OOO — DEF CON CTF
3438:Aerospace Village
3214:(July 30, 2007).
3149:"DEFCON 15 FAQ's"
3021:Electronic voting
3001:
3000:
2198:Season 3 opener "
2116:
2115:
2071:WannaCry outbreak
1975:hearing, Senator
1942:Security company
1877:used on routers.
1840:Back Orifice 2000
1813:Notable incidents
1784:, as part of its
1710:
1709:
1634:x86, microengine
1591:Linux, iOS, Xbox
1473:armv7 & i386
811:, a reference to
698:computer security
688:held annually in
686:hacker convention
672:(also written as
667:
666:
515:Computer security
482:Keystroke logging
161:
160:
135:August 7-10, 2025
127:August 8-11, 2024
16:(Redirected from
5207:
5115:
5114:
5112:Official website
5083:. July 27, 2012.
5073:Mills, Elinor. "
5070:
5068:
5067:
5046:Information Week
5021:
5020:
5018:
5017:
5011:"DEF CON 17 FAQ"
5007:
5001:
5000:
4998:
4997:
4986:
4977:
4976:
4974:
4973:
4962:
4956:
4955:
4953:
4952:
4947:. September 2019
4941:
4935:
4934:
4932:
4931:
4925:
4917:
4911:
4910:
4908:
4907:
4896:
4890:
4889:
4887:
4886:
4863:
4857:
4856:
4854:
4853:
4843:
4837:
4836:
4834:
4833:
4819:
4813:
4812:
4810:
4808:
4802:
4796:. Archived from
4795:
4789:Winn Schwartau.
4786:
4780:
4779:
4777:
4775:
4760:
4754:
4753:
4751:
4749:
4738:
4732:
4731:
4729:
4727:
4712:
4706:
4705:
4698:
4692:
4691:
4689:
4688:
4682:forum.defcon.org
4674:
4668:
4667:
4651:
4645:
4644:
4642:
4640:
4615:
4609:
4608:
4606:
4605:
4594:
4588:
4587:
4585:
4584:
4570:
4564:
4563:
4561:
4559:
4540:
4534:
4533:
4526:
4520:
4519:
4508:
4502:
4488:
4482:
4471:
4462:
4447:
4441:
4428:
4413:
4412:
4407:. Archived from
4396:
4390:
4389:
4377:
4371:
4370:
4368:
4367:
4351:
4345:
4344:Contest concept.
4343:
4341:
4340:
4331:. Archived from
4325:
4319:
4313:
4307:
4301:
4300:
4284:
4278:
4277:
4275:
4274:
4269:. Criminal Brief
4255:
4249:
4248:
4246:
4245:
4236:. Archived from
4225:
4219:
4218:
4216:
4215:
4206:. Archived from
4193:
4187:
4186:
4184:
4183:
4169:
4163:
4162:
4160:
4159:
4148:
4142:
4141:
4139:
4138:
4124:
4118:
4117:
4115:
4114:
4103:
4097:
4096:
4088:
4082:
4081:
4079:
4078:
4063:
4057:
4056:
4055:
4054:
4042:
4036:
4035:
4034:
4033:
4020:
4014:
4013:
4005:
3999:
3998:
3990:
3984:
3983:
3967:
3961:
3960:
3958:
3957:
3943:
3937:
3936:
3929:
3923:
3922:
3920:
3911:
3905:
3904:
3902:
3901:
3887:
3881:
3880:
3878:
3877:
3863:
3857:
3856:
3854:
3853:
3839:
3833:
3832:
3830:
3829:
3815:
3809:
3808:
3806:
3805:
3791:
3785:
3784:
3782:
3781:
3767:
3761:
3760:
3758:
3757:
3743:
3737:
3736:
3734:
3733:
3719:
3713:
3712:
3710:
3709:
3695:
3689:
3688:
3686:
3685:
3671:
3665:
3664:
3662:
3661:
3647:
3641:
3640:
3632:
3621:
3620:
3612:
3606:
3605:
3603:
3602:
3593:. Archived from
3587:
3581:
3580:
3579:. 20 April 2017.
3569:
3563:
3562:
3560:
3559:
3544:
3538:
3537:
3535:
3534:
3528:hackfortress.net
3520:
3514:
3513:
3511:
3510:
3496:
3490:
3489:
3487:
3486:
3472:
3466:
3465:
3463:
3462:
3448:
3442:
3441:
3430:
3424:
3423:
3421:
3419:
3404:
3398:
3397:
3395:
3393:
3378:
3372:
3371:
3369:
3367:
3361:Vice Motherboard
3352:
3346:
3345:
3342:"DEF CON 29 FAQ"
3338:
3332:
3331:
3324:
3318:
3317:
3305:
3299:
3298:
3285:
3279:
3278:
3262:
3256:
3255:
3253:
3252:
3246:forum.defcon.org
3238:
3229:
3228:
3226:
3224:
3208:
3202:
3201:
3194:
3188:
3187:
3185:
3184:
3169:
3163:
3162:
3157:
3155:
3145:
3139:
3138:
3132:
3131:
3114:
3105:
3104:
3093:
3087:
3086:
3084:
3083:
3073:
2464:May 31 – June 2
2437:Planet Hollywood
2230:Conference Name
2227:
2226:
2056:Atlantic Council
1820:
1819:
1039:Competing Teams
1030:
1026:
1019:Capture the flag
995:Capture the flag
809:telephone keypad
745:Capture the Flag
659:
652:
645:
532:Network security
233:Hacker Manifesto
172:Computer hacking
163:
162:
157:
154:
109:
107:
37:
36:
21:
5215:
5214:
5210:
5209:
5208:
5206:
5205:
5204:
5170:
5169:
5110:
5109:
5101:
5094:August 1, 2017.
5065:
5063:
5041:Wayback Machine
5029:
5027:Further reading
5024:
5015:
5013:
5009:
5008:
5004:
4995:
4993:
4987:
4980:
4971:
4969:
4964:
4963:
4959:
4950:
4948:
4943:
4942:
4938:
4929:
4927:
4923:
4919:
4918:
4914:
4905:
4903:
4898:
4897:
4893:
4884:
4882:
4864:
4860:
4851:
4849:
4845:
4844:
4840:
4831:
4829:
4821:
4820:
4816:
4806:
4804:
4803:on 18 July 2011
4800:
4793:
4787:
4783:
4773:
4771:
4763:Thompson, Ian.
4761:
4757:
4747:
4745:
4739:
4735:
4725:
4723:
4715:Thompson, Ian.
4713:
4709:
4700:
4699:
4695:
4686:
4684:
4676:
4675:
4671:
4652:
4648:
4638:
4636:
4616:
4612:
4603:
4601:
4596:
4595:
4591:
4582:
4580:
4572:
4571:
4567:
4557:
4555:
4541:
4537:
4528:
4527:
4523:
4510:
4509:
4505:
4489:
4485:
4472:
4465:
4448:
4444:
4429:
4416:
4397:
4393:
4378:
4374:
4365:
4363:
4352:
4348:
4338:
4336:
4327:
4326:
4322:
4309:
4308:
4304:
4285:
4281:
4272:
4270:
4256:
4252:
4243:
4241:
4234:Tech.Blorge.com
4226:
4222:
4213:
4211:
4194:
4190:
4181:
4179:
4171:
4170:
4166:
4157:
4155:
4149:
4145:
4136:
4134:
4126:
4125:
4121:
4112:
4110:
4104:
4100:
4089:
4085:
4076:
4074:
4065:
4064:
4060:
4052:
4050:
4044:
4043:
4039:
4031:
4029:
4021:
4017:
4006:
4002:
3993:Ghettohackers.
3991:
3987:
3968:
3964:
3955:
3953:
3951:slideplayer.com
3945:
3944:
3940:
3931:
3930:
3926:
3918:
3912:
3908:
3899:
3897:
3889:
3888:
3884:
3875:
3873:
3865:
3864:
3860:
3851:
3849:
3841:
3840:
3836:
3827:
3825:
3817:
3816:
3812:
3803:
3801:
3793:
3792:
3788:
3779:
3777:
3769:
3768:
3764:
3755:
3753:
3745:
3744:
3740:
3731:
3729:
3721:
3720:
3716:
3707:
3705:
3697:
3696:
3692:
3683:
3681:
3673:
3672:
3668:
3659:
3657:
3649:
3648:
3644:
3633:
3624:
3613:
3609:
3600:
3598:
3589:
3588:
3584:
3571:
3570:
3566:
3557:
3555:
3545:
3541:
3532:
3530:
3522:
3521:
3517:
3508:
3506:
3498:
3497:
3493:
3484:
3482:
3474:
3473:
3469:
3460:
3458:
3450:
3449:
3445:
3432:
3431:
3427:
3417:
3415:
3405:
3401:
3391:
3389:
3387:The Register UK
3379:
3375:
3365:
3363:
3353:
3349:
3340:
3339:
3335:
3326:
3325:
3321:
3306:
3302:
3287:
3286:
3282:
3263:
3259:
3250:
3248:
3240:
3239:
3232:
3222:
3220:
3210:
3209:
3205:
3196:
3195:
3191:
3182:
3180:
3170:
3166:
3153:
3151:
3147:
3146:
3142:
3129:
3127:
3115:
3108:
3095:
3094:
3090:
3081:
3079:
3075:
3074:
3070:
3066:
3038:Security BSides
3006:
2498:DEF CON China
2222:
2180:Tommy Lee Jones
2136:The Lone Gunmen
2132:Three of a Kind
2121:
2046:voting machines
1914:
1904:
1852:Dmitry Sklyarov
1815:
1802:
1715:
1234:Ghetto Hackers
1210:Ghetto Hackers
1185:Ghetto Hackers
1151:Ghetto Hackers
1131:Ghetto Hackers
1021:
991:
983:
967:
947:
923:
898:
876:
863:
858:
780:
700:professionals,
663:
634:
633:
603:
595:
594:
547:
537:
536:
517:
507:
506:
432:
422:
421:
407:
397:
396:
367:
357:
356:
337:
327:
326:
312:Security BSides
287:
277:
276:
222:
208:
207:
203:List of hackers
183:
151:
105:
103:
35:
28:
23:
22:
15:
12:
11:
5:
5213:
5203:
5202:
5197:
5192:
5187:
5182:
5168:
5167:
5162:
5157:
5152:
5143:
5132:
5131:
5126:
5124:DEF CON Groups
5121:
5116:
5100:
5099:External links
5097:
5096:
5095:
5084:
5071:
5050:
5028:
5025:
5023:
5022:
5002:
4978:
4957:
4936:
4912:
4891:
4858:
4838:
4827:www.defcon.org
4814:
4781:
4755:
4733:
4707:
4693:
4669:
4662:) – via
4646:
4610:
4589:
4565:
4535:
4521:
4503:
4483:
4463:
4442:
4414:
4411:on 2011-08-10.
4391:
4372:
4346:
4329:"Race to Zero"
4320:
4302:
4279:
4250:
4220:
4188:
4177:DEF CON Forums
4164:
4143:
4119:
4098:
4083:
4058:
4037:
4015:
4000:
3985:
3962:
3938:
3924:
3906:
3882:
3858:
3834:
3810:
3786:
3762:
3738:
3714:
3690:
3666:
3642:
3622:
3607:
3582:
3564:
3553:www.defcon.org
3539:
3524:"Hackfortress"
3515:
3491:
3467:
3443:
3425:
3399:
3373:
3347:
3333:
3319:
3300:
3280:
3257:
3230:
3203:
3198:"DEFCON about"
3189:
3178:www.defcon.org
3164:
3140:
3106:
3088:
3067:
3065:
3062:
3061:
3060:
3050:
3041:
3035:
3029:
3023:
3018:
3012:
3005:
3002:
2999:
2998:
2995:
2992:
2989:
2984:
2980:
2979:
2976:
2973:
2970:
2965:
2961:
2960:
2957:
2954:
2951:
2946:
2942:
2941:
2938:
2935:
2932:
2927:
2923:
2922:
2919:
2916:
2913:
2908:
2904:
2903:
2900:
2897:
2894:
2889:
2885:
2884:
2881:
2878:
2875:
2870:
2866:
2865:
2862:
2859:
2856:
2851:
2847:
2846:
2843:
2840:
2837:
2832:
2828:
2827:
2824:
2821:
2818:
2813:
2809:
2808:
2805:
2802:
2799:
2794:
2790:
2789:
2786:
2783:
2780:
2775:
2771:
2770:
2767:
2764:
2761:
2756:
2752:
2751:
2748:
2745:
2742:
2737:
2733:
2732:
2729:
2726:
2723:
2718:
2714:
2713:
2710:
2707:
2704:
2699:
2695:
2694:
2691:
2688:
2685:
2680:
2676:
2675:
2672:
2669:
2666:
2661:
2657:
2656:
2653:
2650:
2647:
2642:
2638:
2637:
2634:
2631:
2628:
2623:
2619:
2618:
2615:
2612:
2609:
2604:
2600:
2599:
2596:
2593:
2590:
2585:
2581:
2580:
2577:
2574:
2571:
2562:
2558:
2557:
2554:
2551:
2548:
2539:
2535:
2534:
2531:
2528:
2525:
2523:Caesars Palace
2520:
2516:
2515:
2512:
2509:
2506:
2501:Kuntai Hotel (
2499:
2495:
2494:
2491:
2488:
2485:
2479:Caesars Palace
2476:
2472:
2471:
2468:
2465:
2462:
2457:
2453:
2452:
2449:
2446:
2443:
2426:
2422:
2421:
2418:
2415:
2412:
2394:
2390:
2389:
2386:
2383:
2380:
2375:
2371:
2370:
2367:
2364:
2361:
2352:
2348:
2347:
2344:
2341:
2338:
2332:Harrah's Hotel
2321:
2317:
2316:
2313:
2310:
2307:
2301:Harrah's Hotel
2290:
2286:
2285:
2282:
2279:
2276:
2267:
2263:
2262:
2259:
2256:
2253:
2248:
2244:
2243:
2240:
2237:
2234:
2231:
2221:
2218:
2217:
2216:
2205:Documentarian
2203:
2190:
2159:
2156:William Eubank
2146:
2143:Winn Schwartau
2139:
2120:
2117:
2114:
2113:
2102:
2098:
2097:
2093:
2089:
2088:
2084:
2080:
2079:
2042:
2038:
2037:
2026:
2022:
2021:
2009:
2005:
2004:
1993:Andy Greenberg
1952:
1948:
1947:
1944:HBGary Federal
1940:
1936:
1935:
1924:
1920:
1919:
1900:Main article:
1897:
1893:
1892:
1883:
1879:
1878:
1867:
1863:
1862:
1848:
1844:
1843:
1832:
1828:
1827:
1824:
1814:
1811:
1801:
1798:
1714:
1711:
1708:
1707:
1704:
1702:
1699:
1696:
1693:
1690:
1686:
1685:
1682:
1680:
1677:
1674:
1671:
1668:
1664:
1663:
1660:
1658:
1655:
1652:
1649:
1646:
1642:
1641:
1638:
1635:
1632:
1629:
1626:
1623:
1619:
1618:
1615:
1612:
1611:x86, esoteric
1609:
1606:
1603:
1600:
1596:
1595:
1592:
1589:
1586:
1583:
1580:
1577:
1573:
1572:
1569:
1566:
1563:
1560:
1557:
1554:
1550:
1549:
1546:
1543:
1540:
1537:
1534:
1531:
1527:
1526:
1523:
1520:
1517:
1514:
1511:
1508:
1504:
1503:
1500:
1497:
1494:
1491:
1488:
1485:
1481:
1480:
1477:
1474:
1471:
1468:
1465:
1462:
1458:
1457:
1454:
1451:
1448:
1445:
1442:
1439:
1435:
1434:
1431:
1428:
1425:
1422:
1419:
1416:
1412:
1411:
1408:
1405:
1402:
1399:
1396:
1393:
1389:
1388:
1385:
1382:
1379:
1376:
1373:
1370:
1366:
1365:
1362:
1359:
1356:
1353:
1350:
1347:
1343:
1342:
1341:Sk3wl of Root
1339:
1336:
1333:
1330:
1327:
1324:
1320:
1319:
1316:
1313:
1310:
1307:
1304:
1301:
1297:
1296:
1293:
1287:
1284:
1281:
1278:
1275:
1271:
1270:
1267:
1261:
1258:
1255:
1252:
1249:
1245:
1244:
1241:
1238:
1235:
1232:
1229:
1226:
1222:
1221:
1218:
1213:
1211:
1208:
1205:
1202:
1198:
1197:
1194:
1188:
1186:
1183:
1181:
1178:
1174:
1173:
1170:
1167:
1165:
1162:
1160:
1157:
1153:
1152:
1149:
1147:
1145:
1142:
1140:
1137:
1133:
1132:
1129:
1127:
1125:
1122:
1120:
1117:
1113:
1112:
1109:
1107:
1105:
1102:
1100:
1097:
1093:
1092:
1089:
1087:
1085:
1082:
1080:
1077:
1073:
1072:
1069:
1067:
1065:
1062:
1060:
1057:
1053:
1052:
1049:
1046:
1043:
1040:
1037:
1034:
1020:
1017:
990:
987:
982:
979:
966:
963:
946:
943:
942:
941:
938:
935:
922:
919:
897:
894:
875:
872:
862:
859:
857:
854:
779:
776:
741:scavenger hunt
665:
664:
662:
661:
654:
647:
639:
636:
635:
632:
631:
624:
621:Nuts and Volts
617:
612:
604:
601:
600:
597:
596:
593:
592:
583:
577:
571:
568:Legion of Doom
565:
559:
554:
548:
543:
542:
539:
538:
535:
534:
529:
524:
518:
513:
512:
509:
508:
505:
504:
499:
494:
489:
484:
479:
474:
469:
464:
459:
454:
449:
444:
439:
433:
428:
427:
424:
423:
420:
419:
414:
408:
405:Practice sites
403:
402:
399:
398:
395:
394:
389:
384:
379:
374:
368:
363:
362:
359:
358:
355:
354:
349:
344:
338:
335:Computer crime
333:
332:
329:
328:
325:
324:
319:
314:
309:
304:
299:
294:
288:
283:
282:
279:
278:
275:
274:
273:
272:
267:
262:
251:
246:
241:
236:
229:
223:
216:Hacker culture
214:
213:
210:
209:
206:
205:
200:
195:
193:Cryptovirology
190:
184:
179:
178:
175:
174:
168:
167:
159:
158:
149:
145:
144:
141:
137:
136:
133:
129:
128:
125:
124:Previous event
121:
120:
115:
111:
110:
100:
96:
95:
92:
88:
87:
78:
74:
73:
70:
66:
65:
62:
58:
57:
54:
50:
49:
46:
42:
41:
26:
9:
6:
4:
3:
2:
5212:
5201:
5198:
5196:
5193:
5191:
5188:
5186:
5183:
5181:
5178:
5177:
5175:
5166:
5163:
5161:
5158:
5156:
5153:
5151:
5147:
5144:
5142:
5139:
5138:
5137:
5136:
5130:
5127:
5125:
5122:
5120:
5117:
5113:
5108:
5107:
5106:
5105:
5093:
5089:
5085:
5082:
5081:
5076:
5072:
5062:
5061:
5056:
5051:
5048:
5047:
5042:
5038:
5035:
5031:
5030:
5012:
5006:
4992:
4985:
4983:
4968:. August 2015
4967:
4961:
4946:
4940:
4922:
4916:
4902:. August 2018
4901:
4895:
4881:
4877:
4873:
4869:
4862:
4848:
4842:
4828:
4824:
4818:
4799:
4792:
4785:
4770:
4766:
4759:
4744:
4737:
4722:
4718:
4711:
4703:
4697:
4683:
4679:
4673:
4665:
4661:
4657:
4650:
4635:
4631:
4627:
4626:
4621:
4614:
4599:
4593:
4579:
4575:
4569:
4554:
4550:
4546:
4539:
4531:
4525:
4517:
4513:
4507:
4500:
4496:
4492:
4487:
4480:
4476:
4470:
4468:
4460:
4456:
4452:
4446:
4439:
4438:
4433:
4427:
4425:
4423:
4421:
4419:
4410:
4406:
4402:
4395:
4387:
4383:
4380:Zetter, Kim.
4376:
4362:on 2024-03-19
4361:
4357:
4350:
4335:on 2011-11-18
4334:
4330:
4324:
4317:
4312:
4306:
4298:
4294:
4290:
4283:
4268:
4266:
4261:
4254:
4240:on 2007-09-08
4239:
4235:
4231:
4224:
4210:on 2012-07-28
4209:
4205:
4204:
4203:SecurityFocus
4199:
4192:
4178:
4174:
4168:
4154:
4147:
4133:
4132:www.darpa.mil
4129:
4123:
4109:
4102:
4094:
4087:
4073:on 2011-05-14
4072:
4068:
4062:
4049:
4048:
4041:
4028:
4027:
4019:
4011:
4004:
3996:
3989:
3981:
3977:
3973:
3966:
3952:
3948:
3942:
3935:. 2001-07-09.
3934:
3928:
3917:
3910:
3896:
3892:
3886:
3872:
3868:
3862:
3848:
3844:
3838:
3824:
3820:
3814:
3800:
3796:
3790:
3776:
3772:
3766:
3752:
3748:
3742:
3728:
3724:
3718:
3704:
3700:
3694:
3680:
3676:
3670:
3656:
3652:
3646:
3638:
3631:
3629:
3627:
3618:
3611:
3597:on 2019-02-15
3596:
3592:
3586:
3578:
3574:
3568:
3554:
3550:
3543:
3529:
3525:
3519:
3505:
3501:
3495:
3481:
3477:
3471:
3457:
3453:
3447:
3439:
3435:
3429:
3414:
3410:
3403:
3388:
3384:
3377:
3362:
3358:
3351:
3343:
3337:
3329:
3323:
3315:
3311:
3304:
3296:
3295:
3290:
3284:
3277:
3272:
3268:
3267:
3261:
3247:
3243:
3237:
3235:
3219:
3218:
3213:
3207:
3199:
3193:
3179:
3175:
3168:
3161:
3150:
3144:
3137:
3126:
3125:
3120:
3113:
3111:
3102:
3101:deviating.net
3098:
3092:
3078:
3072:
3068:
3058:
3054:
3051:
3049:
3045:
3042:
3039:
3036:
3033:
3030:
3027:
3024:
3022:
3019:
3016:
3013:
3011:
3008:
3007:
2996:
2993:
2990:
2988:
2985:
2982:
2981:
2977:
2974:
2971:
2969:
2966:
2963:
2962:
2958:
2955:
2952:
2950:
2947:
2944:
2943:
2939:
2936:
2933:
2931:
2928:
2925:
2924:
2920:
2917:
2914:
2912:
2909:
2906:
2905:
2901:
2898:
2895:
2893:
2890:
2887:
2886:
2882:
2879:
2876:
2874:
2871:
2868:
2867:
2863:
2860:
2857:
2855:
2852:
2849:
2848:
2844:
2841:
2838:
2836:
2833:
2830:
2829:
2825:
2822:
2819:
2817:
2814:
2811:
2810:
2806:
2803:
2800:
2798:
2795:
2792:
2791:
2787:
2784:
2781:
2779:
2776:
2773:
2772:
2768:
2765:
2762:
2760:
2757:
2754:
2753:
2749:
2746:
2743:
2741:
2738:
2735:
2734:
2730:
2727:
2724:
2722:
2719:
2716:
2715:
2711:
2708:
2705:
2703:
2700:
2697:
2696:
2692:
2689:
2686:
2684:
2681:
2678:
2677:
2673:
2670:
2667:
2665:
2662:
2659:
2658:
2654:
2651:
2648:
2646:
2643:
2640:
2639:
2635:
2632:
2629:
2627:
2624:
2621:
2620:
2616:
2613:
2610:
2608:
2605:
2602:
2601:
2597:
2594:
2591:
2589:
2586:
2583:
2582:
2578:
2575:
2572:
2570:
2569:Bally's Hotel
2566:
2563:
2560:
2559:
2555:
2552:
2549:
2547:
2546:Bally's Hotel
2543:
2540:
2537:
2536:
2532:
2529:
2526:
2524:
2521:
2518:
2517:
2513:
2510:
2507:
2504:
2500:
2497:
2496:
2492:
2489:
2486:
2484:
2480:
2477:
2474:
2473:
2469:
2466:
2463:
2461:
2458:
2455:
2454:
2450:
2447:
2444:
2442:
2438:
2434:
2433:Bally's Hotel
2430:
2427:
2424:
2423:
2419:
2416:
2413:
2411:
2407:
2403:
2399:
2398:Caesars Forum
2395:
2392:
2391:
2387:
2384:
2381:
2379:
2378:Virtual event
2376:
2373:
2372:
2368:
2365:
2362:
2360:
2359:Bally's Hotel
2356:
2353:
2350:
2349:
2345:
2342:
2340:August 11–14
2339:
2337:
2333:
2329:
2325:
2324:Caesars Forum
2322:
2319:
2318:
2314:
2311:
2309:August 10–13
2308:
2306:
2302:
2298:
2294:
2293:Caesars Forum
2291:
2288:
2287:
2283:
2280:
2277:
2275:
2271:
2268:
2265:
2264:
2260:
2257:
2254:
2252:
2249:
2246:
2245:
2241:
2238:
2235:
2232:
2229:
2228:
2225:
2214:
2213:
2208:
2207:Werner Herzog
2204:
2201:
2197:
2196:
2191:
2188:
2185:
2181:
2177:
2173:
2171:
2166:
2165:
2160:
2157:
2153:
2152:
2147:
2144:
2140:
2137:
2133:
2129:
2128:
2123:
2122:
2112:as a result.
2111:
2107:
2103:
2100:
2099:
2094:
2091:
2090:
2085:
2082:
2081:
2078:
2076:
2072:
2068:
2063:
2061:
2057:
2053:
2047:
2043:
2040:
2039:
2036:
2031:
2027:
2024:
2023:
2019:
2014:
2010:
2007:
2006:
2003:
2000:
1999:
1994:
1990:
1985:
1984:James Clapper
1982:
1978:
1974:
1971:
1965:
1961:
1957:
1953:
1950:
1949:
1945:
1941:
1938:
1937:
1933:
1929:
1925:
1922:
1921:
1918:
1912:
1907:
1903:
1898:
1895:
1894:
1890:
1889:
1884:
1881:
1880:
1876:
1872:
1868:
1865:
1864:
1860:
1857:
1853:
1849:
1846:
1845:
1841:
1837:
1833:
1830:
1829:
1825:
1822:
1821:
1818:
1810:
1807:
1797:
1794:
1793:middle-endian
1789:
1787:
1783:
1778:
1776:
1772:
1767:
1763:
1761:
1757:
1753:
1748:
1745:
1743:
1739:
1735:
1731:
1727:
1723:
1718:
1705:
1703:
1700:
1697:
1694:
1691:
1688:
1687:
1683:
1681:
1678:
1675:
1672:
1669:
1666:
1665:
1661:
1659:
1656:
1653:
1650:
1647:
1644:
1643:
1639:
1636:
1633:
1630:
1627:
1624:
1621:
1620:
1616:
1613:
1610:
1607:
1604:
1601:
1598:
1597:
1593:
1590:
1587:
1584:
1581:
1578:
1575:
1574:
1570:
1567:
1564:
1561:
1558:
1555:
1552:
1551:
1547:
1544:
1541:
1538:
1535:
1532:
1529:
1528:
1524:
1521:
1518:
1515:
1512:
1509:
1506:
1505:
1501:
1498:
1495:
1492:
1489:
1486:
1483:
1482:
1478:
1475:
1472:
1469:
1466:
1463:
1460:
1459:
1455:
1452:
1449:
1446:
1443:
1440:
1437:
1436:
1432:
1429:
1426:
1423:
1420:
1417:
1414:
1413:
1409:
1406:
1403:
1400:
1397:
1394:
1391:
1390:
1386:
1383:
1380:
1377:
1374:
1371:
1368:
1367:
1363:
1360:
1357:
1354:
1351:
1348:
1345:
1344:
1340:
1337:
1334:
1331:
1328:
1325:
1322:
1321:
1317:
1314:
1311:
1308:
1305:
1302:
1299:
1298:
1294:
1291:
1288:
1285:
1282:
1279:
1276:
1273:
1272:
1268:
1265:
1262:
1259:
1256:
1253:
1250:
1247:
1246:
1242:
1239:
1236:
1233:
1230:
1227:
1224:
1223:
1219:
1217:
1214:
1212:
1209:
1206:
1203:
1200:
1199:
1195:
1192:
1189:
1187:
1184:
1182:
1179:
1176:
1175:
1171:
1168:
1166:
1163:
1161:
1158:
1155:
1154:
1150:
1148:
1146:
1143:
1141:
1138:
1135:
1134:
1130:
1128:
1126:
1123:
1121:
1118:
1115:
1114:
1110:
1108:
1106:
1103:
1101:
1098:
1095:
1094:
1090:
1088:
1086:
1083:
1081:
1078:
1075:
1074:
1070:
1068:
1066:
1063:
1061:
1058:
1055:
1054:
1051:Winning Team
1050:
1047:
1045:Architecture
1044:
1041:
1038:
1035:
1032:
1031:
1025:
1016:
1014:
1011:
1007:
1003:
998:
996:
986:
978:
976:
972:
962:
960:
956:
952:
939:
936:
933:
929:
928:
927:
918:
916:
912:
908:
904:
893:
890:
880:
871:
869:
853:
851:
847:
842:
840:
835:
833:
827:
825:
820:
816:
814:
810:
806:
802:
801:
795:
793:
789:
785:
775:
773:
769:
765:
761:
757:
752:
750:
746:
742:
738:
734:
729:
727:
723:
719:
715:
711:
707:
703:
699:
695:
691:
687:
683:
679:
675:
671:
660:
655:
653:
648:
646:
641:
640:
638:
637:
630:
629:
625:
623:
622:
618:
616:
613:
611:
610:
606:
605:
599:
598:
591:
587:
584:
581:
578:
575:
572:
569:
566:
563:
560:
558:
555:
553:
550:
549:
546:
541:
540:
533:
530:
528:
525:
523:
520:
519:
516:
511:
510:
503:
500:
498:
495:
493:
490:
488:
485:
483:
480:
478:
475:
473:
470:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
443:
440:
438:
435:
434:
431:
426:
425:
418:
415:
413:
410:
409:
406:
401:
400:
393:
392:Vulnerability
390:
388:
385:
383:
380:
378:
375:
373:
370:
369:
366:
365:Hacking tools
361:
360:
353:
352:Script kiddie
350:
348:
345:
343:
340:
339:
336:
331:
330:
323:
320:
318:
315:
313:
310:
308:
305:
303:
300:
298:
295:
293:
290:
289:
286:
281:
280:
271:
268:
266:
263:
261:
258:
257:
256:
252:
250:
249:Maker culture
247:
245:
242:
240:
237:
235:
234:
230:
228:
225:
224:
221:
217:
212:
211:
204:
201:
199:
196:
194:
191:
189:
186:
185:
182:
177:
176:
173:
170:
169:
165:
164:
156:
150:
146:
142:
138:
134:
130:
126:
122:
119:
116:
112:
101:
97:
93:
89:
86:
82:
79:
75:
71:
67:
63:
59:
55:
51:
47:
43:
38:
33:
19:
5134:
5133:
5119:Official FAQ
5103:
5102:
5078:
5064:. Retrieved
5058:
5044:
5014:. Retrieved
5005:
4994:. Retrieved
4970:. Retrieved
4960:
4949:. Retrieved
4939:
4928:. Retrieved
4915:
4904:. Retrieved
4894:
4883:. Retrieved
4871:
4861:
4850:. Retrieved
4841:
4830:. Retrieved
4826:
4817:
4805:. Retrieved
4798:the original
4784:
4774:12 September
4772:. Retrieved
4769:The Register
4768:
4758:
4748:12 September
4746:. Retrieved
4736:
4726:12 September
4724:. Retrieved
4721:The Register
4720:
4710:
4696:
4685:. Retrieved
4681:
4672:
4649:
4637:. Retrieved
4625:The Guardian
4623:
4613:
4602:. Retrieved
4592:
4581:. Retrieved
4577:
4568:
4556:. Retrieved
4548:
4538:
4524:
4516:ForAllSecure
4515:
4506:
4491:Blue, Violet
4486:
4445:
4435:
4409:the original
4404:
4394:
4385:
4375:
4364:. Retrieved
4360:the original
4349:
4337:. Retrieved
4333:the original
4323:
4310:
4305:
4292:
4282:
4271:. Retrieved
4263:
4253:
4242:. Retrieved
4238:the original
4233:
4223:
4212:. Retrieved
4208:the original
4201:
4191:
4180:. Retrieved
4176:
4167:
4156:. Retrieved
4146:
4135:. Retrieved
4131:
4122:
4111:. Retrieved
4101:
4086:
4075:. Retrieved
4071:the original
4061:
4051:, retrieved
4046:
4040:
4030:, retrieved
4025:
4018:
4003:
3988:
3979:
3975:
3965:
3954:. Retrieved
3950:
3941:
3927:
3909:
3898:. Retrieved
3894:
3885:
3874:. Retrieved
3870:
3861:
3850:. Retrieved
3846:
3837:
3826:. Retrieved
3822:
3813:
3802:. Retrieved
3798:
3789:
3778:. Retrieved
3774:
3765:
3754:. Retrieved
3750:
3741:
3730:. Retrieved
3726:
3717:
3706:. Retrieved
3702:
3693:
3682:. Retrieved
3678:
3669:
3658:. Retrieved
3654:
3645:
3615:Moss, Jeff.
3610:
3599:. Retrieved
3595:the original
3585:
3576:
3567:
3556:. Retrieved
3552:
3542:
3531:. Retrieved
3527:
3518:
3507:. Retrieved
3503:
3494:
3483:. Retrieved
3479:
3470:
3459:. Retrieved
3455:
3446:
3437:
3428:
3416:. Retrieved
3412:
3402:
3390:. Retrieved
3386:
3376:
3364:. Retrieved
3360:
3350:
3336:
3322:
3313:
3303:
3294:The Register
3292:
3283:
3265:
3260:
3249:. Retrieved
3245:
3221:. Retrieved
3216:
3206:
3192:
3181:. Retrieved
3177:
3167:
3159:
3152:. Retrieved
3143:
3134:
3128:. Retrieved
3122:
3100:
3091:
3080:. Retrieved
3071:
2706:August 8–10
2592:August 7–10
2487:August 9–12
2445:August 8–11
2278:August 8–11
2255:August 7–10
2223:
2210:
2193:
2184:NSA director
2176:CIA director
2169:
2164:Jason Bourne
2162:
2149:
2125:
2064:
2049:
2033:
1996:
1967:
1915:
1888:Dateline NBC
1886:
1826:Description
1816:
1803:
1790:
1779:
1768:
1764:
1749:
1746:
1719:
1716:
1243:sk3wl0fr00t
1022:
999:
992:
984:
968:
948:
924:
899:
885:
864:
843:
836:
828:
823:
821:
817:
798:
796:
781:
753:
751:exercises).
730:
681:
677:
673:
669:
668:
626:
619:
607:
602:Publications
447:Trojan horse
412:HackThisSite
301:
231:
91:Years active
4553:Thehill.com
4267:v DefCon 16
3456:www.dfiu.tv
3418:January 14,
3392:January 14,
3366:January 14,
2972:July 22–24
2953:August 4–6
2934:July 26–28
2915:July 11–13
2858:July 28–30
2839:July 13–15
2820:August 2–4
2812:DEF CON 10
2801:August 1–3
2793:DEF CON 11
2774:DEF CON 12
2763:July 29–31
2755:DEF CON 13
2744:August 4–6
2736:DEF CON 14
2725:August 3–5
2717:DEF CON 15
2698:DEF CON 16
2679:DEF CON 17
2660:DEF CON 18
2649:August 4–7
2641:DEF CON 19
2630:July 26–29
2622:DEF CON 20
2611:August 1–4
2603:DEF CON 21
2584:DEF CON 22
2573:August 6–9
2565:Paris Hotel
2561:DEF CON 23
2550:August 4–7
2542:Paris Hotel
2538:DEF CON 24
2527:July 27–30
2519:DEF CON 25
2475:DEF CON 26
2429:Paris Hotel
2425:DEF CON 27
2414:August 6–9
2393:DEF CON 28
2382:August 6–9
2363:August 5–8
2355:Paris Hotel
2351:DEF CON 29
2320:DEF CON 30
2289:DEF CON 31
2266:DEF CON 32
2247:DEF CON 33
2242:Attendance
2178:(played by
2172:film series
2154:. Director
2127:The X-Files
2067:MalwareTech
1760:Guitar Hero
1730:FormatGuard
1387:ACME Pharm
1269:shellphish
1042:Organizers
989:Black Badge
965:Fundraising
907:lockpicking
889:Konami Code
733:lockpicking
702:journalists
615:Hacker News
502:Infostealer
285:Conferences
239:Hackerspace
143:Over 30,000
99:Inaugurated
77:Location(s)
5174:Categories
5135:Multimedia
5066:2023-08-10
5016:2018-07-07
4996:2017-06-07
4972:2019-09-15
4951:2019-09-15
4930:2018-05-17
4906:2018-10-28
4885:2023-02-25
4852:2024-02-04
4832:2016-04-09
4687:2020-05-08
4639:August 11,
4604:2017-12-08
4583:2017-12-08
4578:C-SPAN.org
4366:2024-03-19
4339:2008-06-09
4293:Press Room
4273:2010-10-07
4244:2007-08-15
4214:2004-07-31
4182:2023-02-25
4158:2023-12-20
4137:2023-12-20
4113:2023-12-20
4106:routardz.
4077:2023-12-21
4053:2023-12-20
4032:2023-12-20
3956:2023-12-21
3900:2024-09-09
3876:2024-09-06
3852:2024-09-06
3828:2023-12-21
3804:2023-12-21
3780:2023-12-21
3756:2023-12-21
3732:2023-12-27
3708:2023-12-27
3684:2023-12-27
3660:2023-12-20
3601:2017-04-24
3558:2016-03-12
3533:2024-01-29
3509:2024-01-29
3485:2024-01-29
3461:2024-01-29
3251:2019-08-17
3183:2016-03-12
3130:2007-08-15
3082:2017-04-23
3064:References
2991:June 9–11
2983:DEF CON 1
2964:DEF CON 2
2945:DEF CON 3
2926:DEF CON 4
2907:DEF CON 5
2888:DEF CON 6
2877:July 9–11
2869:DEF CON 7
2850:DEF CON 8
2831:DEF CON 9
2508:May 11–13
2460:751 D-Park
2336:Linq Hotel
2305:Linq Hotel
2274:The Sahara
2151:The Signal
2106:ransomware
2018:Will Smith
1726:StackGuard
1571:DEFKOR00T
1318:1@stplace
1295:1@stplace
1091:AJ Reznor
1071:AJ Reznor
934:community.
903:Biohacking
856:Components
472:Logic bomb
467:Ransomware
244:Hacktivism
140:Attendance
132:Next event
106:1993-06-09
4880:1059-1028
4634:0261-3077
4151:Unknown.
3727:ddtek.biz
3703:ddtek.biz
3679:ddtek.biz
3413:USA Today
3212:Jeff Moss
3057:San Diego
3044:Summercon
2236:Duration
2195:Mr. Robot
2130:episode "
2013:Jeff Moss
1977:Ron Wyden
1964:Jeff Moss
1875:Cisco IOS
1640:Katzebin
1545:cLEMENCy
1542:cLEMENCy
1364:VedaGodz
1332:Kenshoto
1309:Kenshoto
1283:Kenshoto
1257:Kenshoto
1169:Multiple
1048:Platform
975:dunk tank
945:Workshops
911:ham radio
868:Jeff Moss
813:phreakers
784:Jeff Moss
690:Las Vegas
590:Blue team
582:(defunct)
576:(defunct)
570:(defunct)
564:(defunct)
552:Anonymous
492:Web shell
342:Crimeware
322:Summercon
270:White hat
260:Black hat
253:Types of
227:Hackathon
188:Phreaking
118:Jeff Moss
81:Las Vegas
61:Frequency
5037:Archived
4558:2 August
4549:The Hill
4459:NBC News
3026:Hack-Tic
3004:See also
2959:Unknown
2940:Unknown
2921:Unknown
2902:Unknown
2883:Unknown
2864:Unknown
2845:Unknown
2826:Unknown
2807:Unknown
2788:Unknown
2769:Unknown
2750:Unknown
2731:Unknown
2693:Unknown
2674:Unknown
2655:Unknown
2636:Unknown
2579:16,000+
2514:Unknown
2483:Flamingo
2470:Unknown
2451:~30,000
2441:Flamingo
2410:Flamingo
2406:The Linq
2402:Harrah's
2396:Planned
2346:~25,000
2328:Flamingo
2315:~25,000
2297:Flamingo
2060:O'Reilly
1861:format.
1742:AppArmor
1734:OpenWall
1433:Samurai
1430:FreeBSD
1407:FreeBSD
1361:FreeBSD
1338:FreeBSD
1315:FreeBSD
1240:Windows
1220:Anomaly
1036:DEF CON
981:Contests
896:Villages
839:COVID-19
832:COVID-19
800:WarGames
749:red team
718:wargames
710:software
586:Red team
442:Backdoor
317:ShmooCon
265:Grey hat
5104:DEF CON
4664:Twitter
4455:Archive
3982:(2003).
3895:CTFtime
3871:CTFtime
3847:CTFtime
3053:ToorCon
2617:12,000
2598:16,000
2556:22,000
2533:25,000
2503:Beijing
2493:28,000
2369:~8,700
2192:In the
1856:Adobe's
1756:forking
1722:Immunix
1522:DECREE
1502:DEFKOR
1290:Solaris
1264:FreeBSD
1216:OpenBSD
901:Recon,
861:Handles
850:Discord
788:FidoNet
778:History
706:hackers
684:) is a
670:DEF CON
574:LulzSec
462:Spyware
437:Rootkit
430:Malware
382:Payload
372:Exploit
302:DEF CON
255:hackers
181:History
148:Website
114:Founder
104: (
40:DEF CON
4878:
4632:
4437:Forbes
3434:"Home"
3273:
3048:Phrack
3034:(HOPE)
2712:8,000
2439:, and
2408:, and
2334:, and
2303:, and
2272:, and
2233:Venue
2170:Bourne
1998:Forbes
1859:e-book
1800:Groups
1701:mixed
1679:mixed
1657:mixed
1637:Linux
1617:A*0*E
1614:Linux
1568:Linux
1499:Linux
1476:Linux
1453:Linux
1450:armv7
1424:DDTEK
1401:DDTEK
1378:DDTEK
1355:DDTEK
1191:Redhat
1164:Goons
1144:Goons
1124:Goons
1104:Goons
1084:Goons
1064:Goons
874:Badges
846:Twitch
792:Canada
743:, and
728:heat.
726:Nevada
694:Nevada
678:Defcon
674:DEFCON
628:Phrack
545:Groups
477:Botnet
417:Zone-H
153:defcon
85:Nevada
72:Varies
64:Annual
48:Active
45:Status
5092:WIRED
5060:Wired
4924:(PDF)
4872:Wired
4807:9 Feb
4801:(PDF)
4794:(PDF)
4660:Tweet
4499:ZDNet
4386:Wired
3919:(PDF)
3314:Wired
3223:9 Feb
3154:9 Feb
2997:~100
2994:1993
2978:~200
2975:1994
2956:1995
2937:1996
2918:1997
2899:1998
2880:1999
2861:2000
2842:2001
2823:2002
2804:2003
2785:2004
2766:2005
2747:2006
2728:2007
2709:2008
2690:2009
2671:2010
2652:2011
2633:2012
2614:2013
2595:2014
2576:2015
2553:2016
2530:2017
2511:2018
2490:2018
2467:2019
2448:2019
2417:2020
2385:2020
2366:2021
2343:2022
2312:2023
2281:2024
2258:2025
2239:Year
2101:2024
2092:2020
2083:2018
2041:2017
2025:2016
2008:2013
1989:PRISM
1951:2012
1939:2011
1923:2009
1896:2008
1882:2007
1871:Cisco
1866:2005
1847:2001
1831:1999
1823:Year
1782:DARPA
1775:jails
1689:2024
1667:2023
1645:2022
1622:2021
1599:2020
1576:2019
1553:2018
1530:2017
1519:i386
1507:2016
1484:2015
1461:2014
1438:2013
1427:i386
1415:2012
1404:i386
1392:2011
1381:i386
1369:2010
1358:i386
1346:2009
1335:i386
1323:2008
1312:i386
1300:2007
1286:i386
1274:2006
1260:i386
1248:2005
1237:i386
1225:2004
1201:2003
1177:2002
1156:2001
1136:2000
1116:1999
1096:1998
1076:1997
1056:1996
1033:Year
1010:DARPA
932:LGBTQ
770:(via
722:Wi-Fi
452:Virus
220:ethic
69:Venue
53:Genre
5150:IMDb
5080:CNET
4876:ISSN
4809:2011
4776:2024
4750:2024
4728:2024
4641:2017
4630:ISSN
4560:2017
4479:CNET
4453:." (
4316:Text
4265:MBTA
3420:2019
3394:2019
3368:2019
3271:IMDb
3225:2011
3156:2011
3017:(C3)
2567:and
2544:and
2481:and
2388:N/A
2357:and
2284:N/A
2261:N/A
1806:2600
1771:0day
1754:and
1266:5.4
1193:6.2
1111:SNI
959:RFID
848:and
772:CISA
487:HIDS
457:Worm
218:and
155:.org
5148:on
5077:."
5043:."
4497:".
4493:. "
4477:".
4434:."
4297:EFF
3269:at
2077:.
1995:of
1928:ATM
1906:MIT
1736:'s
1695:12
1692:32
1673:12
1670:31
1651:16
1648:30
1628:16
1625:29
1605:16
1602:28
1582:16
1579:27
1559:24
1556:26
1536:15
1533:25
1513:15
1510:24
1490:15
1487:23
1467:20
1464:22
1444:20
1441:21
1421:20
1418:20
1398:12
1395:19
1375:12
1372:18
1349:17
1326:16
1303:15
1292:10
1277:14
1251:13
1228:12
1204:11
1180:10
1004:'s
955:IoT
768:DHS
760:DoD
756:FBI
680:or
497:RCE
5176::
5090:"
5057:.
4981:^
4874:.
4870:.
4825:.
4767:.
4719:.
4680:.
4628:.
4622:.
4576:.
4551:.
4547:.
4514:.
4466:^
4457:)
4417:^
4403:.
4384:.
4295:.
4291:.
4262:.
4232:.
4200:.
4175:.
4130:.
3978:.
3974:.
3949:.
3893:.
3869:.
3845:.
3821:.
3797:.
3773:.
3749:.
3725:.
3701:.
3677:.
3653:.
3625:^
3575:.
3551:.
3526:.
3502:.
3478:.
3454:.
3436:.
3411:.
3385:.
3359:.
3312:.
3291:.
3244:.
3233:^
3176:.
3158:.
3133:.
3121:.
3109:^
3099:.
2505:)
2435:,
2431:,
2420:0
2404:,
2400:,
2330:,
2326:,
2299:,
2295:,
1958:,
1762:.
1732:,
1728:,
1352:9
1329:8
1306:8
1280:8
1254:8
1231:8
1207:8
1159:9
1139:8
1119:7
1099:6
1079:5
1059:4
909:,
905:,
834:.
766:,
762:,
758:,
735:,
712:,
692:,
682:DC
676:,
588:/
94:31
83:,
5069:.
5032:"
5019:.
4999:.
4975:.
4954:.
4933:.
4909:.
4888:.
4855:.
4835:.
4811:.
4778:.
4752:.
4730:.
4704:.
4690:.
4666:.
4658:(
4643:.
4607:.
4586:.
4562:.
4518:.
4369:.
4342:.
4318:.
4299:.
4276:.
4247:.
4217:.
4185:.
4161:.
4140:.
4116:.
4095:.
4080:.
4012:.
3997:.
3980:2
3959:.
3921:.
3903:.
3879:.
3855:.
3831:.
3807:.
3783:.
3759:.
3735:.
3711:.
3687:.
3663:.
3639:.
3619:.
3604:.
3561:.
3536:.
3512:.
3488:.
3464:.
3440:.
3422:.
3396:.
3370:.
3344:.
3330:.
3316:.
3297:.
3254:.
3227:.
3200:.
3186:.
3103:.
3085:.
2189:.
658:e
651:t
644:v
108:)
34:.
20:)
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.