Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

DEF CON

From Wikipedia, the free encyclopedia
Annual hacker gathering in Las Vegas, Nevada
This article is about the computer security convention. For the defense alert system used in the United States, seeDEFCON. For other uses, seeDefcon (disambiguation).
StatusActive
GenreSecurity Conference, Hacker Conference
FrequencyAnnual
VenueVaries
LocationsLas Vegas,Nevada
CountryUnited States
Years active32
InauguratedJune 9, 1993 (1993-06-09)[1]
FounderJeff Moss
Previous eventAugust 7–10, 2025
AttendanceOver 30,000
Website
Part of a series on
Computer hacking

DEF CON (also written asDEFCON, Defcon, orDC) is ahacker convention held annually inLas Vegas,Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON includecomputer security professionals,journalists, lawyers, federal government employees, security researchers, students, andhackers with a general interest insoftware,computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions (known as hackingwargames). Contests held during the event are extremely varied and can range from creating the longestWi-Fi connection to finding the most effective way to cool a beer in theNevada heat.[3]

Other contests, past and present, includelockpicking,robotics-related contests, art, slogan, coffee wars,scavenger hunt, andCapture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition in which teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (asred team exercises).

Federal law enforcement agents from theFBI,DoD,United States Postal Inspection Service,DHS (viaCISA) and other agencies regularly attend DEF CON.[4][5] Some have considered DEF CON to be the "world's largest" hacker conference given its attendee size and the number of other conferences modeling themselves after it.

History

[edit]

DEF CON was founded in 1993, by then 18-year-oldJeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", aFidoNet protocol based hacking network fromCanada.[6] The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.

The term DEF CON comes from the movieWarGames, referencing theU.S. Armed Forces defense readiness condition (DEF CON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on atelephone keypad, a reference tophreakers.[7] The official name of the conference includes a space in between DEF and CON.

Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success.[8] In 2019, an estimated 30,000 people attended DEF CON 27.[9]

For DEF CON's 20th Anniversary, a film was commissioned entitledDEF CON: The Documentary.[10] The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.

In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related toCOVID-19.[11]

In 2020, due to safety concerns overCOVID-19 the DEF CON 28 in-person Las Vegas event was cancelled[12] and replaced with DEF CON Safe Mode,[13] a virtual event planned for the same August 6–9 dates as DC 28.

In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (viaTwitch andDiscord). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.[14]

Components

[edit]

Handles

[edit]

Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founderJeff Moss' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the conference and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.

Badges

[edit]
Multiple, electronic and non-electronic, DEF CON human badges along with other conference badges.

A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), withLEDs, or sometimes being a non-electronic badge such as avinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of theKonami Code in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.[15][16]

Villages

[edit]

Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village, Recon,Biohacking,lockpicking,ham radio, and the well knownSocial Engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.[17][18]

Internal Conferences

[edit]

DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:

  • Queercon, a meetup ofLGBTQ community.
  • Linecon, any long line has the potential to turn into a con.
  • QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.

Workshops

[edit]

Workshops are dedicated classes on various topics related toinformation security and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hackingIoT devices, playing withRFID, fuzzing and attacking smart devices.

Fundraising

[edit]

Since DEF CON 11, fundraisers have been conducted for theElectronic Frontier Foundation (EFF). The first fundraiser was adunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.

Contests

[edit]

Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy,[19] Scavenger Hunt,[20] Capture the Packet, Crash and Compile,[21] and Hackfortress[22] to name a few.

Black Badge

[edit]

The Black Badge is the highest award DEF CON gives to contest winners of certain events.Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.[23]

In April 2017, a DEF CON Black Badge was featured in an exhibit[24] in theSmithsonian Institution'sNational Museum of American History entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System,[25] the winner of theDARPA2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.

Capture the flag

[edit]

The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year.[26] It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.[27]

Capture the Flag Timeline[28][27]
YearDEF CONCompeting TeamsOrganizersArchitecturePlatformWinning team
19964GoonsAJ Reznor
19975GoonsAJ Reznor
19986GoonsSNI
19997GoonsGhetto Hackers
20008GoonsGhetto Hackers
20019GoonsMultipleGhetto Hackers & digirev
200210Ghetto HackersRedhat 6.2Digital Revelation
2003118Ghetto HackersOpenBSDAnomaly
2004128Ghetto Hackersi386Windowssk3wl0fr00t
2005138Kenshotoi386FreeBSD 5.4shellphish
2006148Kenshotoi386Solaris 101@stplace
2007158Kenshotoi386FreeBSD1@stplace
2008168Kenshotoi386FreeBSDSk3wl of Root
2009179DDTEKi386FreeBSDVedaGodz[29]
20101812DDTEKi386FreeBSD & DebianACME Pharm[30]
20111912DDTEKi386FreeBSDEuropean Nopsleders[31]
20122020DDTEKi386FreeBSDSamurai
20132120Legitimate Business Syndicatearmv7LinuxPlaid Parliament of Pwning
20142220Legitimate Business Syndicatearmv7 & i386LinuxPlaid Parliament of Pwning
20152315Legitimate Business SyndicateMIPS, x86 & armv7LinuxDEFKOR
20162415Legitimate Business Syndicatei386DECREEPlaid Parliament of Pwning
20172515Legitimate Business SyndicatecLEMENCycLEMENCyPlaid Parliament of Pwning
20182624Order Of the OverflowMIPS, x86 & armv7LinuxDEFKOR00T[32]
20192716Order Of the Overflowx86, arm64, esotericLinux, iOS, XboxPlaid Parliament of Pwning[33]
20202816Order Of the Overflowx86, esotericLinuxA*0*E[34]
20212916Order Of the Overflowx86, microengineLinuxKatzebin[35]
20223016Nautilus InstitutemixedMaple Mallard Magistrates[36]
20233112Nautilus InstitutemixedMaple Mallard Magistrates[37]
20243212Nautilus InstitutemixedMaple Mallard Magistrates[38]

Capture the Flag History

[edit]

In 1996, the first DEF CON CTF was organized, with a couple ofservers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.[39]

In 2002, the companyImmunix took part in the game under the moniker "immunex",[40] to benchmark the security of their Linux-based operating system, with modifications includingStackGuard,FormatGuard,OpenWall'snon-executable stack, SubDomain (the ancestor ofAppArmor), ...[41] Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised.[42] It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.[43]

In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.[44]

In 2008, the Sk3wl of Root team took advantage of abug in the game (privilege dropping andforking were inverted), allowing them to have such a massive lead that they spent most of the CTF playingGuitar Hero.[45][46]

In 2009, it was announced[47] that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was the organizer.[27] "Hacking the top hacker contest seemed like a fun way to introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the DEF CON 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.[27]

In 2011, the team "lollerskaters dropping from roflcopters" used a0day inFreeBSD (namely CVE-2011-4062[48]) to escapejails, causing havoc in the game's infrastructure.[49]

In 2016, the 15th edition of the CTF was done in partnership with theDARPA, as part of itsCyber Grand Challenge program, where teams wrote autonomous systems to play the game without any human interaction.[50]

In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: amiddle-endian with 9 bits bytesCPU. With its specifications released only 24 hours before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.[51]

Groups

[edit]

DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online.[52] DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.

Notable incidents

[edit]

Following are a list of high-profile issues which have garnered significant media attention.

YearDescription
1999On July 10, 1999, theCult of the Dead Cow hacker collective releasedBack Orifice 2000 (later discovered to be infected with the CIH virus) at DEF CON 7,[53] in what was, at the time, the largest presentation in DEF CON history.
2001On July 16, 2001, Russian programmerDmitry Sklyarov was arrested the day after DEF CON for writing software to decryptAdobe'se-book format.[54]
2005On July 31, 2005,Cisco used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in theCisco IOS used on routers.[55]
2007In August 2007, Michelle Madigan, a reporter forDateline NBC, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened.[56] A DEF CON source at NBC had tipped off organizers to Madigan's plans.[4]
2008MIT students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston T subway.[57] However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated theComputer Fraud and Abuse Act (CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares.[58][59] The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show.

In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.[60][61]

2009WIRED[62] reported that anATM kiosk was positioned in the conference center of theRiviera Hotel Casino capturing data from an unknown number of hackers attending the DEF CON hacker conference.
2011Security companyHBGary Federal used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.[63]
2012The director of theNational Security Agency,Keith B. Alexander, gave the keynote speech.[64] During the question and answers session, the first question for Alexander,[64] fielded byJeff Moss,[65] was "Does theNSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense."[64]

On March 12, 2013, during aUnited States SenateSelect Committee on Intelligence hearing, SenatorRon Wyden quoted the 2012 DEF CON keynote speech and askedDirector of National IntelligenceJames Clapper if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance.[64] In June 2013, NSA surveillance programs which collected data on US citizens, such asPRISM, had been exposed.Andy Greenberg ofForbes said that NSA officials, including Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."[64]

2013On July 11, 2013,Jeff Moss posted a statement,[66] located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year."[67] This was the first time in the organization's history that it had asked federal authorities not to attend.[66] ActorWill Smith visited the convention to study the DEF CON culture for an upcoming movie role.[68]
2016On August 4, 2016, DEF CON andDARPA co-hosted the2016 Cyber Grand Challenge, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$2M grand prize.[69]

The winner of the Cyber Grand Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania.[69][70] Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest,[71] where it finished in last place, despite pulling ahead of human teams often in a contest for which it was not specifically designed.

2017At the "Voting Machine Village" event, dozens ofvoting machines brought to the conference were breached.[72]

In September 2017, the Voting Machine Village produced "DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure" summarizing its findings. The findings were publicly released at an event sponsored by theAtlantic Council[73] and the paper went on to win anO'Reilly Defender Research Award.[74]

Marcus Hutchins, better known online by his handleMalwareTech, the 23-year-old British security researcher who was credited with stopping theWannaCry outbreak was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with theKronos banking trojan.[75]

2018In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award.[76] The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan.
2020On May 8, 2020, the DEF CON in-person conference itself was cancelled[77] and virtualized due toCOVID-19. DEF CON Safe Mode[78] was held August 6–9 online with a full roster of talks, villages, contests and events.
2024On February 4, 2024, Caesar's Entertainment cancelled the contract with DEF CON without warning[79] with speculation that aransomware attack[80] and bomb scare and subsequent evacuation[81] in 2023 were in part to blame. The conference was moved to theLas Vegas Convention Center as a result.

Entertainment references

[edit]

Venues, dates, and attendance

[edit]

Each conference venue and date has been extracted from the DEF CON archives for easy reference.[83]

Conference NameVenueDurationYearAttendance
DEF CON 33Las Vegas Convention CenterAugust 7–102025~26,000[84]
DEF CON 32Las Vegas Convention Center, andThe Sahara[85]August 8–112024N/A
DEF CON 31Caesars Forum,Flamingo,Harrah's Hotel, andLinq HotelAugust 10–132023~25,000[citation needed]
DEF CON 30Caesars Forum,Flamingo,Harrah's Hotel, andLinq HotelAugust 11–142022~25,000[citation needed]
DEF CON 29Paris Hotel andBally's HotelAugust 5–82021~8,700[citation needed]
DEF CON Safe ModeVirtual eventAugust 6–92020N/A
DEF CON 28PlannedCaesars Forum,Harrah's,The Linq, andFlamingoAugust 6–920200[86]
DEF CON 27Paris Hotel,Bally's Hotel,Planet Hollywood, andFlamingoAugust 8–112019~30,000[9]
DEF CON China 1.0751 D-ParkMay 31–June 22019Unknown
DEF CON 26Caesars Palace andFlamingoAugust 9–12201828,000[87]
DEF CON China [Beta]Kuntai Hotel (Beijing)May 11–132018Unknown
DEF CON 25Caesars PalaceJuly 27–30201725,000[88]
DEF CON 24Paris Hotel andBally's HotelAugust 4–7201622,000[89]
DEF CON 23Paris Hotel andBally's HotelAugust 6–9201516,000+[90]
DEF CON 22Rio Hotel & CasinoAugust 7–10201416,000[91]
DEF CON 21Rio Hotel & CasinoAugust 1–4201312,000[91]
DEF CON 20Rio Hotel & CasinoJuly 26–292012Unknown
DEF CON 19Rio Hotel & CasinoAugust 4–72011Unknown
DEF CON 18Riviera Hotel & CasinoJuly 30–August 12010Unknown
DEF CON 17Riviera Hotel & CasinoJuly 30–August 22009Unknown
DEF CON 16Riviera Hotel & CasinoAugust 8–1020088,000[92]
DEF CON 15Riviera Hotel & CasinoAugust 3–52007Unknown
DEF CON 14Riviera Hotel & CasinoAugust 4–62006Unknown
DEF CON 13Alexis Park ResortJuly 29–312005Unknown
DEF CON 12Alexis Park ResortJuly 30–August 12004Unknown
DEF CON 11Alexis Park ResortAugust 1–32003Unknown
DEF CON 10Alexis Park ResortAugust 2–42002Unknown
DEF CON 9Alexis Park ResortJuly 13–152001Unknown
DEF CON 8Alexis Park ResortJuly 28–302000Unknown
DEF CON 7Alexis Park ResortJuly 9–111999Unknown
DEF CON 6Plaza Hotel & CasinoJuly 31–August 21998Unknown
DEF CON 5Aladdin Hotel & CasinoJuly 11–131997Unknown
DEF CON 4Monte Carlo Resort and CasinoJuly 26–281996Unknown
DEF CON 3Tropicana Resort & CasinoAugust 4–61995Unknown
DEF CON 2Sahara Hotel and CasinoJuly 22–241994~200
DEF CON 1Sands Hotel and CasinoJune 9–111993~100

See also

[edit]

References

[edit]
  1. ^"Def Con 1 Archive". Retrieved2017-04-23.
  2. ^"Defcon Onion Links".defcon.org.
  3. ^"DefCon Beverage Cooling Contraption Contest".deviating.net. Archived fromthe original on 2024-08-15.
  4. ^abZetter, Kim (3 August 2007)."Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape".Wired Blog Network. Retrieved2007-08-15.According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to gather intelligence on the latest techniques of hackers.
  5. ^"DEFCON 15 FAQ's". Retrieved9 Feb 2011.Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
  6. ^Tangent, The Dark."DEF CON® Hacking Conference – About".www.defcon.org. Retrieved2016-03-12.
  7. ^"DEFCON about".
  8. ^Jeff Moss (July 30, 2007).The Story of DEFCON. Retrieved9 Feb 2011.
  9. ^ab"Def Con 27 Transparency Report - DEF CON Forums".forum.defcon.org. Retrieved2019-08-17.
  10. ^DEFCON: The Documentary atIMDb Edit this at Wikidata
  11. ^"Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled".The Register.
  12. ^Newman, Lily Hay."Defcon is Cancelled".Wired.
  13. ^"DEF CON 28 Safe Mode FAQ".
  14. ^"DEF CON 29 FAQ".
  15. ^Oberhaus, Daniel (September 18, 2018)."A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards".Vice Motherboard. RetrievedJanuary 14, 2019.
  16. ^McAllister, Neil (August 12, 2015)."Is this the most puzzling DEF CON attendee badge yet on record?".The Register UK. RetrievedJanuary 14, 2019.
  17. ^Molina, Brett (August 14, 2018)."11-year-old hacks replica of Florida state website, changes election results".USA Today. RetrievedJanuary 14, 2019.
  18. ^"Home".Aerospace Village.
  19. ^"Hacker Jeopardy for DEF CON 28".www.dfiu.tv. Retrieved2024-01-29.
  20. ^"DEF CON Scavenger Hunt".DEF CON Scavenger Hunt. Retrieved2024-01-29.
  21. ^"DEF CON Crash and Compile Contest".crashandcompile.org. Retrieved2024-01-29.
  22. ^"Hackfortress".hackfortress.net. Retrieved2024-01-29.
  23. ^Tangent, The Dark."DEF CON® Hacking Conference – Black Badge Hall of Fame".www.defcon.org. Retrieved2016-03-12.
  24. ^"Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity".americanhistory.si.edu. 20 April 2017.
  25. ^"Mayhem Wins DARPA CGC". Archived fromthe original on 2019-02-15. Retrieved2017-04-24.
  26. ^Moss, Jeff."DEF CON Hacking Conference - Capture the Flag Archive".
  27. ^abcdvulc@n of DDTek (2023)."A history of Capture the Flag at DEF CON".
  28. ^"A Brief History of CTF".psifertex.github.io. Retrieved2023-12-20.
  29. ^"Diutinus Defense Technologies Corp. / DC17".ddtek.biz. Retrieved2023-12-27.
  30. ^"Diutinus Defense Technologies Corp. / DC18".ddtek.biz. Retrieved2023-12-27.
  31. ^"Diutinus Defense Technologies Corp. / Home".ddtek.biz. Retrieved2023-12-27.
  32. ^"DEF CON CTF 2018".OOO — DEF CON CTF. Retrieved2023-12-21.
  33. ^"OOO — DEF CON CTF".OOO — DEF CON CTF. Retrieved2023-12-21.
  34. ^"OOO — DEF CON CTF".OOO — DEF CON CTF. Retrieved2023-12-21.
  35. ^"OOO — DEF CON CTF".OOO — DEF CON CTF. Retrieved2023-12-21.
  36. ^"CTFtime.org / DEF CON CTF 2022".CTFtime. Retrieved2024-09-06.
  37. ^"CTFtime.org / DEF CON CTF 2023".CTFtime. Retrieved2024-09-06.
  38. ^"CTFtime.org / DEF CON CTF 2024".CTFtime. Retrieved2024-09-09.
  39. ^Riley, Eller (2004)."Capture the Flag Games"(PDF).
  40. ^"Defcon 9 - Capture The Flag Contest Network". 2001-07-09.
  41. ^"4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download".slideplayer.com. Retrieved2023-12-21.
  42. ^Crispin, Cowan (May 2003)."Defcon Capture the Flag: defending vulnerable code from intense attack".DARPA Information Survivability Conference and Exposition.2 (2003).
  43. ^Ghettohackers."Defcon 10 - Capture the Flag (CTF) contest".
  44. ^The Ghetto Hackers (June 29, 2003)."Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11".
  45. ^Jordan (2021-04-06),A Brief History of CTF, retrieved2023-12-20
  46. ^A Brief History of CTF - Jordan Wiens. 2018-03-28. Event occurs at 35:41.
  47. ^"Diutinus Defense Techonologies Corp. / Home". 2011-05-14. Archived fromthe original on 2011-05-14. Retrieved2023-12-21.
  48. ^The FreeBSD Project (2011-09-28)."Buffer overflow in handling of UNIX socket addresses".
  49. ^routardz."Defcon 19 CTF - CTF Inside". Retrieved2023-12-20.
  50. ^"Cyber Grand Challenge (CGC) (Archived)".www.darpa.mil. Archived fromthe original on 2019-06-10. Retrieved2023-12-20.
  51. ^Unknown."cLEMENCy - Showing Mercy". Retrieved2023-12-20.
  52. ^"Official forums social group section for DEF CON groups".DEF CON Forums. Retrieved2023-02-25.
  53. ^Nuttall, Chris (1999-07-13)."Back Orifice is child's play, say virus firms".BBC News. Retrieved2024-10-21.
  54. ^"Russian computer programmer arrested at hacker conference".CBC. 2001-07-19. Retrieved2024-10-21.
  55. ^Lamos, Rob (31 July 2005)."Exploit writers team up to target Cisco routers".SecurityFocus. Archived fromthe original on 2012-07-28. Retrieved2004-07-31.
  56. ^Cassel, David (4 August 2007)."Transcript: Michelle Madigan's run from Defcon".Tech.Blorge.com. Archived fromthe original on 2007-09-08. Retrieved2007-08-15.
  57. ^Lundin, Leigh (2008-08-17)."Dangerous Ideas".MBTA v DefCon 16. Criminal Brief. Retrieved2010-10-07.
  58. ^Jeschke, Rebecca (2008-08-09)."MIT Students Gagged by Federal Court Judge".Press Room.EFF.
  59. ^Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology (United States District Court District of Massachusetts), Text.
  60. ^"Race to Zero". Archived fromthe original on 2011-11-18. Retrieved2008-06-09. Contest concept.
  61. ^McMillan, Robert (April 2008)."Antivirus Vendors Slam Defcon Virus Contest". IDG News Service. Archived fromthe original on 2024-03-19. Retrieved2024-03-19.
  62. ^Zetter, Kim."Malicious ATM Catches Hackers".Wired – via www.wired.com.
  63. ^Fisher, Dennis; Roberts, Paul (August 10, 2011)."Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON".Business Security. Archived fromthe original on 2011-08-10.
  64. ^abcdeGreenberg, Andy. "Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)."Forbes. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted[...]"
  65. ^Wagenseil, Paul. "Hackers Don't Believe NSA Chief's Denial of Domestic Spying." (Archive)NBC News. August 1, 2012. Retrieved on June 13, 2013.
  66. ^abWhitney, Lance. "Defcon to feds: 'We need some time apart'".CNET. July 11, 2013. Retrieved on July 12, 2013.[dead link]
  67. ^Blue, Violet. "Feds 'not welcome' at DEF CON hacker conference".ZDNet. July 11, 2013. Retrieved on July 11, 2013.
  68. ^Constantin, Lucian (2013-08-05)."Will Smith makes unexpected appearance at Defcon hacker conference".PCWorld. Retrieved2024-10-21.
  69. ^abPellerin, Cheryl."Three Teams Earn Prizes in DARPA Cyber Grand Challenge".U.S. Department of Defense. Retrieved2024-10-21.
  70. ^"ForAllSecure | Mayhem Security | Application Security".ForAllSecure.
  71. ^"DEF CON Capture the Flag Final Scores". blog.legitbs.net.
  72. ^Joe Uchill (July 29, 2017)."Hackers breach dozens of voting machines brought to conference".The Hill.Thehill.com. Retrieved2 August 2017.
  73. ^"DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org".C-SPAN.org. Retrieved2017-12-08.
  74. ^"O'Reilly Security Conference in NYC 2017 Defender Awards". conferences.oreilly.com. Retrieved2017-12-08.
  75. ^Hern, Alex; Levin, Sam (August 4, 2017)."Briton who stopped WannaCry attack arrested over separate malware claims".The Guardian.ISSN 0261-3077. RetrievedAugust 11, 2017.
  76. ^@VotingVillageDC (6 March 2018)."WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…" (Tweet) – viaTwitter.
  77. ^"DEF CON 28 in-person conference is CANCELLED - DEF CON Forums".forum.defcon.org. Retrieved2020-05-08.
  78. ^"DEF CON Safe Mode archive site".
  79. ^Thompson, Ian."DEF CON is canceled! No, really this time – but the show will go on".The Register. Retrieved12 September 2024.
  80. ^Khaitan, Ashish (14 September 2023)."Caesars Ransomware Attack, MGM Hit Linked To DEFCON?". Retrieved12 September 2024.
  81. ^Thompson, Ian."Bomb scare causes mass evacuation at DEF CON".The Register. Retrieved12 September 2024.
  82. ^Winn Schwartau."Cyber Christ Meets Lady Luck"(PDF). Archived fromthe original(PDF) on 18 July 2011. Retrieved9 Feb 2011.
  83. ^"DEF CON® Hacking Conference – Show Archives".www.defcon.org. Retrieved2016-04-09.
  84. ^Moss, Jeff (August 21, 2025)."DC33 Attendance".Reddit. RetrievedSeptember 12, 2025.
  85. ^"DEF CON 32 Was Canceled. We Un-Canceled it". Retrieved2024-02-04.
  86. ^Newman, Lily Hay."Defcon Is Canceled".Wired.ISSN 1059-1028. Retrieved2023-02-25.
  87. ^""DEF CON Transparency"". August 2018. Retrieved2018-10-28.
  88. ^""Voting Machine Hacking Village""(PDF). September 2017. p. 4. Retrieved2018-05-17.
  89. ^""Norton at DefCon"". September 2019. Archived fromthe original on 2020-06-25. Retrieved2019-09-15.
  90. ^""Gray Tier Technologies at DEFCON23"". August 2015. Retrieved2019-09-15.[permanent dead link]
  91. ^abRichard Byrne Reilly (2014-08-12).""Black Hat and Defcon see record attendance — even without the government spooks"". Retrieved2017-06-07.
  92. ^"DEF CON 17 FAQ". Retrieved2018-07-07.

Further reading

[edit]

External links

[edit]
Wikimedia Commons has media related toDEF CON.

DEF CON

Multimedia

Retrieved from "https://en.wikipedia.org/w/index.php?title=DEF_CON&oldid=1320733930"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp