DEF_CON_(convention)

DEF CON

DEF CON

Annual hacker gathering in Las Vegas, Nevada


DEF CON (also written as DEFCON, Defcon or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.[2]

Quick Facts Status, Genre ...

Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt, and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition where teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as red team exercises).

Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, DHS (via CISA) and other agencies regularly attend DEF CON.[3][4] Some have considered DEF CON to be the "world's largest" hacker con given its attendee size and the number of other conferences modeling themselves after it.

History

DEF CON was founded in 1993, by then 18-year-old Jeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a FidoNet protocol based hacking network from Canada.[5] The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.

The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEFCON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a telephone keypad, a reference to phreakers.[6] The official name of the conference includes a space in-between DEF and CON.

Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success.[7] In 2019, an estimated 30,000 people attended DEF CON 27.[8]

For DEF CON's 20th Anniversary, a film was commissioned entitled DEFCON: The Documentary.[9] The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.

In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to COVID-19.[10]

In 2020, due to safety concerns over COVID-19 the DEF CON 28 in-person Las Vegas event was cancelled[11] and replaced with DEF CON Safe Mode,[12] a virtual event planned for the same August 6–9 dates as DC 28.

In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via Twitch and Discord). In-person attendees were required to wear masks in conference areas and to show proof to COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.[13]

Components

Handles

Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder Jeff Moss' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the con and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.

Badges

Multiple, electronic and non-electronic, DEF CON human badges and other con badges.

A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the Konami Code in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.[14][15]

Villages

Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village, Recon, Biohacking, lockpicking, ham radio, and the well known Social Engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.[16][17]

Internal Conferences

DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:

  • Queercon, a meetup of LGBTQ community.
  • Linecon, any long line has the potential to turn into a con.
  • QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.

Workshops

Workshops are dedicated classes on various topics related to information security and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking IoT devices, playing with RFID, fuzzing and attacking smart devices.

Fundraising

Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation (EFF). The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.

Contests

Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy,[18] Scavenger Hunt,[19] Capture the Packet, Crash and Compile,[20] and Hackfortress[21] to name a few.

Black Badge

The Black Badge is the highest award DEF CON gives to contest winners of certain events. Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.[22]

In April 2017, a DEF CON Black Badge was featured in an exhibit[23] in the Smithsonian Institution's National Museum of American History entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System,[24] the winner of the DARPA 2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.

Capture the flag

The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year.[25] It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.[26]

More information Year, Competing Teams ...

Capture the Flag History

In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.[35]

In 2002, the company Immunix took part in the game under the moniker "immunex",[36] to benchmark the security of their Linux-based operating system, with modifications including StackGuard, FormatGuard, OpenWall's non-executable stack, SubDomain (the ancestor of AppArmor), ...[37] Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised.[38] It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.[39]

In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.[40]

In 2008, the Sk3wl of Root team took advantage of a bug in the game (privilege dropping and forking were inverted), allowing them to have such a massive lead that they spent most of the CTF playing Guitar Hero.[41][42]

In 2009, it was announced[43] that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was in fact organising the CTF! "Hacking the top hacker contest seemed like a fun way to introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the Defcon 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.[26]

In 2011, the team "lollerskaters dropping from roflcopters" used a 0day in FreeBSD (namely CVE-2011-4062[44]) to escape jails, causing havoc in the game's infrastructure.[45]

In 2016, the 15th edition of the CTF was done in partnership with the DARPA, as part of its Cyber Grand Challenge program, where teams wrote autonomous systems to play the game without any human interaction.[46]

In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a middle-endian with 9 bits bytes CPU. With its specifications released only 24h before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.[47]

Groups

DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the 2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online.[48] DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.

Notable incidents

High-profile issues which have garnered significant media attention.

More information Year, Description ...

Entertainment references

  • DEF CON was also portrayed in The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
  • A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by Winn Schwartau, demonstrates some of the early DEF CON culture.[71]
  • A trip to DEF CON for a hacker showdown figures into the plot of The Signal. Director William Eubank came to Las Vegas and screened the film at DEF CON Movie Night.
  • A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of Jason Bourne, the fifth film of the Bourne film series. The primary antagonist of the film, a fictionalized CIA director (played by Tommy Lee Jones), is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, NSA director Keith B. Alexander.
  • In the Mr. Robot Season 3 opener "eps3.0_power-saver-mode.h" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
  • Documentarian Werner Herzog included DEF CON in his 2016 film Lo and Behold, Reveries of the Connected World, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".

Venues, dates, and attendance

Each conference venue and date has been extracted from the DEF CON archives for easy reference.[72]

More information Conference Name, Venue ...

See also


References

  1. "Def Con 1 Archive". Retrieved 2017-04-23.
  2. Zetter, Kim (3 August 2007). "Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape". Wired Blog Network. Retrieved 2007-08-15. According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to gather intelligence on the latest techniques of hackers.
  3. "DEFCON 15 FAQ's". Retrieved 9 Feb 2011. Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
  4. Tangent, The Dark. "DEF CON® Hacking Conference – About". www.defcon.org. Retrieved 2016-03-12.
  5. Jeff Moss (July 30, 2007). The Story of DEFCON. Retrieved 9 Feb 2011.
  6. "Def Con 27 Transparency Report - DEF CON Forums". forum.defcon.org. Retrieved 2019-08-17.
  7. Newman, Lily Hay. "Defcon is Cancelled". Wired.
  8. Oberhaus, Daniel (September 18, 2018). "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards". Vice Motherboard. Retrieved January 14, 2019.
  9. McAllister, Neil (August 12, 2015). "Is this the most puzzling DEF CON attendee badge yet on record?". The Register UK. Retrieved January 14, 2019.
  10. Molina, Brett (August 14, 2018). "11-year-old hacks replica of Florida state website, changes election results". USA Today. Retrieved January 14, 2019.
  11. "Home". Aerospace Village.
  12. "Hacker Jeopardy for DEF CON 28". www.dfiu.tv. Retrieved 2024-01-29.
  13. "DEF CON Scavenger Hunt". DEF CON Scavenger Hunt. Retrieved 2024-01-29.
  14. "DEF CON Crash and Compile Contest". crashandcompile.org. Retrieved 2024-01-29.
  15. "Hackfortress". hackfortress.net. Retrieved 2024-01-29.
  16. Tangent, The Dark. "DEF CON® Hacking Conference – Black Badge Hall of Fame". www.defcon.org. Retrieved 2016-03-12.
  17. "Mayhem Wins DARPA CGC". Archived from the original on 2019-02-15. Retrieved 2017-04-24.
  18. "A Brief History of CTF". psifertex.github.io. Retrieved 2023-12-20.
  19. "Diutinus Defense Techonologies Corp. / DC17". ddtek.biz. Retrieved 2023-12-27.
  20. "Diutinus Defense Techonologies Corp. / DC18". ddtek.biz. Retrieved 2023-12-27.
  21. "Diutinus Defense Techonologies Corp. / Home". ddtek.biz. Retrieved 2023-12-27.
  22. "DEF CON CTF 2018". OOO — DEF CON CTF. Retrieved 2023-12-21.
  23. "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
  24. "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
  25. "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
  26. Riley, Eller (2004). "Capture the Flag Games" (PDF).
  27. Crispin, Cowan (May 2003). "Defcon Capture the Flag: defending vulnerable code from intense attack". DARPA Information Survivability Conference and Exposition. 2 (2003).
  28. Jordan (2021-04-06), A Brief History of CTF, retrieved 2023-12-20
  29. "Diutinus Defense Techonologies Corp. / Home". 2011-05-14. Archived from the original on 2011-05-14. Retrieved 2023-12-21.
  30. routardz. "Defcon 19 CTF - CTF Inside". Retrieved 2023-12-20.
  31. "Cyber Grand Challenge (CGC) (Archived)". www.darpa.mil. Retrieved 2023-12-20.
  32. Unknown. "cLEMENCy - Showing Mercy". Retrieved 2023-12-20.
  33. Lamos, Rob (31 July 2005). "Exploit writers team up to target Cisco routers". SecurityFocus. Archived from the original on 2012-07-28. Retrieved 2004-07-31.
  34. Cassel, David (4 August 2007). "Transcript: Michelle Madigan's run from Defcon". Tech.Blorge.com. Archived from the original on 2007-09-08. Retrieved 2007-08-15.
  35. Lundin, Leigh (2008-08-17). "Dangerous Ideas". MBTA v DefCon 16. Criminal Brief. Retrieved 2010-10-07.
  36. Jeschke, Rebecca (2008-08-09). "MIT Students Gagged by Federal Court Judge". Press Room. EFF.
  37. Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology (United States District Court District of Massachusetts), Text.
  38. "Race to Zero". Archived from the original on 2011-11-18. Retrieved 2008-06-09. Contest concept.
  39. McMillan, Robert (April 2008). "Antivirus Vendors Slam Defcon Virus Contest". IDG News Service. Archived from the original on 2024-03-19. Retrieved 2024-03-19.
  40. Zetter, Kim. "Malicious ATM Catches Hackers". Wired via www.wired.com.
  41. Fisher, Dennis; Roberts, Paul (August 10, 2011). "Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON". Business Security. Archived from the original on 2011-08-10.
  42. Greenberg, Andy. "Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)." Forbes. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted[...]"
  43. Wagenseil, Paul. "Hackers Don't Believe NSA Chief's Denial of Domestic Spying." (Archive) NBC News. August 1, 2012. Retrieved on June 13, 2013.
  44. Whitney, Lance. "Defcon to feds: 'We need some time apart'". CNET. July 11, 2013. Retrieved on July 12, 2013.
  45. Blue, Violet. "Feds 'not welcome' at DEF CON hacker conference". ZDNet. July 11, 2013. Retrieved on July 11, 2013.
  46. Joe Uchill (July 29, 2017). "Hackers breach dozens of voting machines brought to conference". The Hill. Thehill.com. Retrieved 2 August 2017.
  47. "O'Reilly Security Conference in NYC 2017 Defender Awards". conferences.oreilly.com. Retrieved 2017-12-08.
  48. Hern, Alex; Levin, Sam (August 4, 2017). "Briton who stopped WannaCry attack arrested over separate malware claims". The Guardian. ISSN 0261-3077. Retrieved August 11, 2017.
  49. Winn Schwartau. "Cyber Christ Meets Lady Luck" (PDF). Archived from the original (PDF) on 18 July 2011. Retrieved 9 Feb 2011.
  50. "DEF CON® Hacking Conference – Show Archives". www.defcon.org. Retrieved 2016-04-09.
  51. Newman, Lily Hay. "Defcon Is Canceled". Wired. ISSN 1059-1028. Retrieved 2023-02-25.
  52. ""DEF CON Transparency"". August 2018. Retrieved 2018-10-28.
  53. ""Voting Machine Hacking Village"" (PDF). September 2017. p. 4. Retrieved 2018-05-17.
  54. ""Norton at DefCon"". September 2019. Retrieved 2019-09-15.
  55. "DEF CON 17 FAQ". Retrieved 2018-07-07.

Further reading

DEF CON

Multimedia


Share this article:

This article uses material from the Wikipedia article DEF_CON_(convention), and is written by contributors. Text is available under a CC BY-SA 4.0 International License; additional terms may apply. Images, videos and audio are available under their respective licenses.