One Schedule to Rule them All!


Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 26.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings have expanded from epub and mobi formats and now include html, csv, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links. There is much more going on at DEF CON than what is listed here. In particular check out the Villages, Parties & Meetups, Contest & Events, and defconparties pages.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org

Have a good time at DEF CON 26!


Index of DEF CON 26 Activities


Venue Maps
Locations Legends and Info
Schedule   - Thursday  - Friday  - Saturday  - Sunday
Speaker List
Talk Title List
Talk Descriptions
DEF CON News
DEF CON 26 FAQ
DEF CON FAQ
Links to DEF CON 26 related pages

Venue Maps



Full Size PDF from defcon.org

Full Size PDF from defcon.org

Full Size PDF from defcon.org

Linq Workshops


Far end of hall from Casino escalators

View Full Caesars Page to see where this is.


Near end of hall from Casino escalators

View Full Caesars Page to see where this is.


Far end of hall from Casino escalators

View Full Caesars Page to see where this is.


Near end of hall from Casino escalators

View Full Caesars Page to see where this is.


View Full Caesars Page to see where this is.


View Full Caesars Page to see where this is.


View Full Caesars Page to see where this is.


Flamingo Village Wing

View Full Flamingo Page to see where this is.


Flamingo 101 Wing

View Full Flamingo Page to see where this is.


Locations Legends and Info


AIV = Artifical Intellegence Village
     Caesars Promenade Level - Florentine BR 3 - behind Registration

BCOS = Blockchain & Cryptocurrency Open Security Village
     Caesars Promenade Level - Pompeian BR 1 - by Info Booth and Elators

BHV = Bio Hacking Village
     Caesars Promenade Level - Pisa/Palermo/Siena Rms - Middle of long hallway

BTV = Blue Team Village
     Flamingo 3rd Flr - Savoy Rm

CAAD = CAAD Village
     Flamingo Lower Level - Lake Mead Rms

Chip Off Village
     Caesars Pool Level - Tribune Rm - next to Info Booth near escalators

CHV = Car Hacking Village
     Flamingo Lower Level - Red Rock Rm 1-5 - Right Side of hallway

Contest Area
     Caesars Emperor's Level - Agustus BR - far end of long hallway

CPV = Crypto Privacy Village
     Caesars Promenade Level - Milano BR 1,2 - far end of long hallway

DC = DEF CON Talks
     Track 101 - Flamingo 3rd Flr - Sunset BR
     Track    1 - Caesars Emperor's Level - Palace BR - top of escalator
     Track    2 - Caesars Promenade South - Octavius BR 12-24 - far end from escalator
     Track    3 - Caesars Pool Level - Forum BR 1-11,25 - near excalator

Deaf Con Village
     Caesars Pool Level - Patrician Rm - next to Info Booth near escalators

DDV = Data Duplication Village
     Caesars Promenade Level - Capri Rm - Across from Registration

DL = DEF CON DemoLabs
     Caesars Promenade Emperor's Level - Tables outside Track 1

Drone Warz Village
     Caesars Pool Level - Abruzzi Rm - far end from escalators around corner

EHV = Ethics Village
     Caesars Promenade Level - Modena Rm - Middle of long hallway

HHV = Hardware Hacking Village
     Caesars Pool Level - Forum 17-19 - far end from escalators around corner

ICS = Industrial Control Systems Village
     Flamingo Lower Level - Red Rock Rm 6-8 - Left side of hallway

IOT = Internet Of Things Village
     Caesars Promenade Level - Turin/Verona/Trevi Rms - Middle of long hallway

Laser Cutting Village
     Caesars Pool Level - Calibria Rm - far end from escalators around corner

Lockpicking Village
     Caesars Pool Level - Forum 24 - far end from escalators

Mobile Museum
     Caesars Promenade Level - Florentine BR 4 - behind Registration

RCV = Recon Village
     Caesars Promenade Level - Florentine BR 1,2 - behind Registration

Rootz Asylum
     Caesars Promenade Level - Milano BR 3,4 - far end of long hallway

SEV = Social Engineering Village
     Caesars Promenade South - Octavius BR 3-8 - near excalator

SKY = 303 SkyTalks
     Flamingo 3rd Flr - Virginia City Rm

Soldering Skills Village
     Caesars Pool Level - Forum 20,21 - far end from escalators around corner

Tamper Evident Village
     Caesars Pool Level - Forum 24 - far end from escalators

PHV, PHW = Packet Hacking Village / Wall of Sheep; Talks and Workshops
     Caesars Promenade Level - Neopolitan BR - far end of long hallway

PPV = Puff Puff Village
     Flamingo Lower Level - Valley Of Fire Rms

Vendors Area
     Caesars Promenade South - Octavius BR 25

WLV = Wireless Village
     Caesars Promenade Level - Milano BR 5,6 - far end of long hallway

WS = DEF CON Workshops - All Workshops are at the Linq Hotel
     Linq 4th Flr - Icon A-G Rms

VMHV = Voting Machine Hacking Village
     Caesars Pool Level - Forum 14-16 - far end from escalators


Speaker List


_delta_zero
@_delta_zero
@_j3lena_
@3ncr1pted
@arinerron
@bodaceacat
@bwall (Moderator)
@drhyrum
@filar
@gradient_janitor
@IrishMASMS
@jtpereyda
@malwareunicorn
@pixieofchaos
@Plug
@rainbow_tables
@rharang
@Straithe
@wornbt
0x200b
a nurse
A.
Aadvark
Aamir Lakhani
Abhay Bhargav
Abhijeth D
Adam Caudill
Adam Steed
Adrian, Alex
Agent X
AI Village Organizers
Alejandro Mayorkas
Alejo Murillo
Alex Catarineu
Alex Levinson
Alex Levinson
Alex Long
Alex Padilla
Alex Stanev
Alex
Alexander Winnicki
Alexandre Borges
Alexandrine Torrents
Alexei Bulazel
Alfonso García
Allen Cai
Almost Human
Amanda Rousseau
Amber McReynolds
Amit Elazari Bar On
Amit Elazari
Amit Elazari
Anand Tiwari
Andrés Arrieta
Andrea Marcelli
Andrew Johnson
Andrew Macpherson
Andrew Morris
Andrew Morris
Andy Applebaum
Andy Applebaum
Andy Coravos
Angelos Stavrou
Ankur Tyagi
Anne Kim
Annie Rouse
Anonimal
Anonimal
Anshuman Bhartiya
Anto Joseph
April Wright
Ariel Herbert-Voss
Arnaud SOULLIÉ
Arun Magesh
Arun Mane
Aseem Jakhar
Ashwin K Whitchurch
Aunsuhl Rege
Aylin Caliskan
Azeem Aqil
BACE16
Balint Seeber
Balint Seeber
Beau Woods
Ben Barenz
Ben Hughes
Ben Nassi
Besim Altinok
Beth Schechter
Bhadreshkumar Patel
Bharath Kumar
BiaSciLab
Billy Boatright
Bob Wall
Brandon Workentin
Brendan OConnor
Brent White (B1TK1LL3R)
Brian Genz
Brian Milliron
Brittany "Straithe" Postnikoff
Bruce Potter
Bryan Austin
Bryan Passifiume
Bryce Kunz
Bryson Bort
Caleb Madrigal
Caleb Madrigal
Caleb Madrigal
Carlos Aguayo
Carlos Pacho
Caroline D. Hardin
Carsten Schurmann
Casey Bourbonnais
Chad Wanke
Changhyun Park
Chet Hosmer
Chet Hosmer
Chris Gammell
Chris Gardner
Chris Hadnagy
Chris Hanlon
Chris Roberts
Chris Silvers
Chris"Suggy" Sumner
Christian "quaddi" Dameff MD
Christian Paquin
Christian"quaddi" Dameff MD
Christopher Domas
Christopher Domas
Cinnamonflower
Clarence Chio
Colt Frederickson
Commodore Z
Craig Smith
Cristina Munoz
Csaba Fitzl
Cyberlass
Damien "virtualabs" Cauquil
Damon "ch3f" Small
Dan Borges
Dan Borges
Daniel "unicornFurnace" Crowley
Daniel Underhay
Daniel Williams (fbus)
Daniel Zolnikov
Darkmatter
Darren Kitchen
Dave Buchwald
Dave Porcello
David Melendez Cano
David Melendez Cano
David Nathans
David Pearson
David Scott Lewis
David Tomaschik
David Turco
Davin Potts
Debra Laefer
Dennis Giese
Dennis Giese
Dennis Taggart
Devin "Bearded Warrior" Pearson
Diego "rehrar" Salazar
Diego Aranha
DilDog
Dimitri
Dino Covotsos
dj beep code
Dominic Spill
Dominic Spill
Dongsung Kim
Douglas McKee
Dr Adam Everspaugh
Dr. Aylin Caliskan
Dr. Siegfried Rasthofer
Dr. Silke Holtmanns
Dr. Stan Naydin
Dr. Stan Naydin
Dr. Stan Naydin
Dr. Stan Naydin
Dr. Steven Arzt
Dylan Ayrey
Dylan James Smith
Ed Miles
Eduardo Izycki
Efrain Ortiz
egypt
Eijah
Elinor Mills
Elissa Shevinsky
Elizabeth Biddlecome
elkentaro
Elliott Brink
Erez Yalon
Eric Reuter
Eric Sesterhenn
Erin Hefley
Erwin Paternotte
Esteban Rodriguez
Ethan Gregory Dodge
Ethan Gregory Dodge
Evan Yang
Eyal Itkin
Ezra Caltum
Ezra Caltum
Faz
Fedor Sakharov
Felix "Crypto_Cat" Honigwachs
Feng Xiao
Flamingo
Fluffy Pony
Fluffy Pony
Francisco "ArticMine" Cabañas
Frank (@cosmovaltran
Fred Mastrippolito
Gabriel Bergel
Gabriel Ryan
Gabriel Ryan
Gabriel Ryan
Garett Montgomery
Gary Bates
George Tarnovsky
Georgia Weidman
Gerry Scott
gh057
Gita Ziabari
Glen Grant
Gozde Sinturk
Gozde Sinturk
Guang Gong
Guy Barnhart-Magen
Guy Barnhart-Magen
Guy Propper
HackaThon Product(s) Shocase by Participants
Hadar Yudovich
Hannah Silvers
Hari Hursti
Harish Ramadoss
Harry Moreno
HighWiz
hon1nbo
Howard (hyc) Chu
Huajiang "Kevin2600" Chen
Hwiwon Lee
Hyoung-Kee Choi
Ian Foster
Ian Haken
Ian Vitek
illwill
Imri Goldberg
infosecanon
Irwin Reyes
Isao Takaesu
Isao Takaesu
Isha Singh
Ivan Torroledo
J. Alex Halderman
Jacob Holcomb
Jacob Wilkin
Jake Braun
Jake Braun(moderator)
Jakub Botwicz
James Albany
James Coote
James Harris
Jamie Lee Williams
Jamie Williams
Jason Haddix
Jason Hill
Jason Malley
Jay Radcliffe
Jay Turla
Jayesh Singh Chauhan
Jayson E. Street
Jeanette Manfra
Jeanette Manfra
Jeanna Matthews
Jeanna Matthews
Jeff Kosseff
Jeff Magloire
Jeff"r3plicant" Tully MD
Jeffrey Ladish
Jen "savagejen" Savage
Jen Dalsen
Jen Ellis
Jennifer Roderick
Jeremy Johnson
Jericho
Jerome Greco
Jesse Michael
Jessica “Zhanna” Malekos Smith
Jeswin Mathai
Jeswin Mathai
Jianjun Dai
Jianwei Huang
Jin Yang
Joan Donovan
Joe FitzPatriclk
Joe Grand (Kingpin)
Joe Grand (Kingpin)
Joe Grand
Joe Grand
Joe Rozner
Joe Slowik
Joel Murphy
John Aho
John Dunlap
John Dunlap
John Dunlap
John Stoner
John Stoner
John Stoner
John Stoner
John Tan
Johnny Long
Jon Medina
Jon Overgaard Christiansen
Jos Wetzels
Josep M. Pujol
Josep Pi Rodriguez
Joseph Kiniry
Joseph Muniz
Joseph Zadeh
Joseph Zadeh
Josh Mitchell
Josh Mitchell
Joshua Corman
Joshua M Franklin
Joshua Pereyda
Joshua Pereyda
Judy Towers
Jun Li
Justin Ehrenhofer
Justin Ehrenhofer
Justin Whitehead
Kang Li
Kat Mansourimoaied
Kat Sweet
Katherine Pratt
Kathleen Mullen
Katiza Rodriguez
Keith Conway (@algirhythm)
Kelley
Ken Keiser
Kendall Blaylock
Keren Elazari
Keren Elazari
Kevin Chen
Kevin Franklin
Kevin Lustic
Kirill Levchenko PhD
Konark Modi
Konark Modi
Kunzhe Chai
Kurt Opsahl
L0pht Heavy Industries
Ladar Levison
Lane Broadbent
Laura H
ldionmarcil
Leandro Velasco
Lei Shi
Leigh-Anne Galloway
Lennart Koopmann
Leo Meyerovich & Eugene Teo
Leo Meyerovich & Eugene Teo
Li Chen
Lin Huang
Lior Kolnik
Lloyd Miller
Lokesh Pidawekar
Lorenzo Bernardi
Louis Nyffenegger
Louis Nyffenegger
Luca Bongiorni
Luke Jahnke
Luke Jahnke
M.Can KURNAZ
m010ch_
Madhu Akula
Madhu
Magg
Maggie Mayhem
Maggie Mayhem
magicspacekiwi (Colin Campbell)
Mahrud Sayrafi
Maksim Shudrak
Malware Unicorn
Mansour Ahmadi
Marc DaCosta
Marcelle
Margaret MacAlpine
Marie Fromm
Marina Krotofi
Marina Krotofil
Mark Klink
Mark Lewi
Mark Lewis
Mark Mager
Marko Bencun
Marko Bencun
Martin Vigo
MasterChen
MasterChen
Masuya Masafumi
Matt
Matt Blaze
Matt Cheung
Matt Cheung
Matt Goerzen
Matt King
Matt Knight
Matt Mahler
Matt Urquhart
Matt Wixey
Matt Wixey
Matthew Bernhard
Matthew Daley
Mattijs van Ommeren
Mauricio Velazco
Mauro Cáseres
Mauro Caseres
Mauro Paredes
Mayor Chad Wanke
Mbis0n Shadoru
Mehmet Kutlay Kocer
Micah Hoffman
Micah Hoffman
Michael Gianarakis
Michael Hiller
Michael Hiller
Michael Lee Nirenberg
Michael Ossmann
Michael Schloh
Michael Schloh
Michael Schloh
Michael West
Mickey Shkatov
midipoet
midipoet
Miguel Guirao
Mike Davis
Mike Godfrey
Mike Raggo
Mike Raggo
Mike Spicer
Mike Westmacott
Mikhail Burshteyn
Min (Spark) Zheng
Min (Spark) Zheng
Mingchuang Qun
Mixæl Laufer
Monta Elkins
Morgan "indrora" Gangwere
Mr. Br!ml3y
MSvB
MSvB
Mudge
mwguy
Nafeez
Nancy Eckert
Nate Cardozo
Nate Cardozo
Nate Temple
Nathan 'nash' Sheard
Nathan Adams
Nathan White
Neal Kelley
Neel Pandeya
Neil Fallon
Nevermoe (@n3v3rm03)
Nicholas Doiron
Nick - GraphX
Nick Cano
Nick Cano
Nick Cano
Nick Delewski
Nick Sayer
Nick Tait
Nicolas Kseib
Nikita
Nils Amiet
Nishant Sharma
Nishant Sharma
Noah Praetz
Nox
OCP (by proxy)
Octet In Triplicate
Olivia Thet
Omar Santos
Omer Cohen
Orange Tsai
Panel
Parasew
Parsia Hakimian
Patrick DeSantis
Patrick Wardle
Patrick Wardle
Paul Shapiro
Pavan Mohan
Pedro Fortuna
Peng Liu
Philip Martin
Philipp Claen
Philippe Delteil
Pigeon
Pranshu Bajpai
Prashant Mahajan
Prof Andrea M. Matwyshyn, Professor of Law, NUSL
Project Nexus
Project Nexus
pwrcycle
Qian Wenxiang
Rachel Greenstadt
Ram Shankar Siva Kumar
Raphael Norwitz
Raye Keslensky
recompiler
Recon Village Team
Renderman
Rex
Rich Seymour
Richard Henderson
Richard Thieme
Rick "Captain Marko Ramius" Mellendick
Rick "Ward River" Mellendick
Rick "Ward River" Mellendick
Rick "Ward River" Mellendick
Rick "Ward River" Mellendick
Rick Ramgattie
Ricky "HeadlessZeke" Lawshae
Rik van Duijn
Roamer
Rob Brandon
Rob Joyce
Rob Joyce
Robert Karas
Robert Portvliet
Robert Potter
Roberto Suarez
Robin "midipoet" Renwick
Rod Soto
Rod Soto
Rod Soto
Rodrigo Colli
Rogan Dawes
Rogan Dawes
Roger Dingledine
Ron Taylor
Rowan Phipps
Ruo Ando
Rushikesh D. Nandedkar
Russ Handorf
Russell Mosley
Ryan Holeman
Ryan Johnson
Ryan Kovar
Ryan Kovar
Ryan Kovar
Ryan Kovar
Ryan MacDougall
Ryan Mitchell
Ryan Speers
S0ups
Salvador Mendoza
Sam Bowne
Sam Erb
Sanat Sharma
Sandeep Singh
Sanoop Thomas
Sara-Jayne Terp
Sarah St. Vincent
Sarang Noether
Saurabh Harit
Saurabh Harit
Saurabh Harit
Saurabh Harit
Scott Arciszewski
Seamus Burke
Sean Gallagher
Sean Metcalf
Sean Wilson
Seb Kinne
Sebastian Garcia
security panda
Senhua Wang
Sergei Frankoff
Sergio De Los Santos
Seth Law
sghctoma
Shaggy
Shamiq
Shaokun Cao
Sharath Kumar Ramadas
Shawn Merdinger
Sheila A. Berta
Sheng-Hao Ma
Sherrie Cowley
Shubham Mittal
Shubham Mittal
Shubham Shah
Si
Siddharth Rao
Sidragon
siDragon
Silas Cutler
Silicosis
singe
Slava Makkaveev
smea
Sneha Rajguru
Soldier of FORTRAN
Space Rogue
Srinivas Rao
Stark Riedesel
Stephan Huber
Stephanie Stroka
Stephen Hilt
Steve Thomas
steve0
Steven Danneman
Stumbles The Drunk
Sudhanshu Chahuhan
Sudhanshu Chauhan
Svea Eckert
Sven Cattell
Tarah Wheeler
Tay-Tay fanboi Wasabi
Taylor Banks
Taylor Hornby
Tess Schrodinger
Thanh Bui
The Dark Tangent
The Dark Tangent
The Tarquin
Thiago Alves
Thomas VanNorman
Till Krause
Tim Roberts (byt3boy)
Tim Yunusov
Timothy Clemans
To be announced
toddpar0dy
Tom Kahana
Tom Sela
TonTon Huang
Toshitsugu Yoneyama,
Travis Goodspeed
Travis Goodspeed
Truman Kain
TryCatchHCF
Ulf Frisk
Uncle G.
Utku Sen
Utku Sen
Vadim Pavlov
Vaibhav Gupta
Veronica Schmit
Veronica Schmitt
Vincent Tan
Vinnie Vanhoecke
Violet Blue
Vlad Gostomelsky
Walter Cuestas
Wasabi
Wayne Ronaldson
Wbbigdave
Weed Anon
WeedAnon
Weld Pond
Wendy Knox Everette
Wenlin Yang
Wesley McGrew
Wesley McGrew
Whitney Champion
William Knowles
William Martin
William Martin
William Suthers
William Vu
Wiseacre
Wojciech Rauner
Wu HuiYu
Xavier Ashe
Xavier Ashe
Xiaolong Bai
Xiaolong Bai
Yaniv Balmas
yawnbox
Yifeng Zhang
Yingtao Zeng
Yolan Romailler
Yu Wang
Yueting Lee
Yunding Jian
Yuwei Zheng
Yuwei Zheng
Zach
zenofex
Zero_Chaos
Zero_Chaos
Zero_Chaos
Zero_Chaos
Zero_Chaos
Zero_Chaos
zerosum0x0
Zhenxuan Bai
Zhi Zhou
Zhiniang Peng

Talk List


Reverse Engineering with OpenSCAD and 3D Printing - WS - Linq 4th Flr - Icon B
"Probably": an Irreverent Overview of the GDPR - CPV - Caesars Promenade Level - Milano BR 1,2
"Won't Somebody Think of the Children?" Examining COPPA Compliance at Scale - CPV - Caesars Promenade Level - Milano BR 1,2
(Not Recorded) Ask Me Anything about Tor: AMA with Roger Dingledine - CPV - Caesars Promenade Level - Milano BR 1,2
(Responsible?) Offensive Machine Learning - AIV - Caesars Promenade Level - Florentine BR 3
[Networking/Social] Blackhat/DefCon Meet-up at Cafe Americano - Meetup - Caesars - Cafe Americano
/R/defcon redit Meetup - Meetup - Stage Door 4000 Linq Ln., Las Vegas (Right across the street from Caesars Palace)
/R/defcon redit Meetup - Meetup - Flamingo - 3rd Floor - Chillout Rm
#WiFiCactus - DL - Table 1 - Caesars Promenade Emperor's Level - Outside Track 1
1983: I’m born. 2018: I’m taking on the bad guys - RCV - Caesars Promenade Level - Florentine BR 1,2
4G—Who is paying your cellular phone bill? - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
503 Party 2018 - Night Life - Forum Tower Duplex Hangover Suite
80 to 0 in under 5 seconds: Falsifying a medical patient's vitals - DC - Track 1 - Caesars Emperor's Level - Palace BR
8th Defcon Bike Ride - Meetup - Local Bikeshop
  - RCV - Caesars Promenade Level - Florentine BR 1,2
A Comprehensive Forensic Analysis of WINVote Voting Machines - VMHV - Caesars Pool Level - Forum 14-16
A CTF That Teaches: Challenging the Next Generation of ICS Ethical Hackers - ICS - Flamingo Lower Level - Red Rock Rm 6-8
A Journey Into Hexagon: Dissecting a Qualcomm Baseband - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
A Rundown of Security Issues in Crypto Software Wallets - BCOS - Caesars Promenade Level - Pompeian BR 1
A SOC in the Village - ICS - Flamingo Lower Level - Red Rock Rm 6-8
About the Open Cannabis Project - PPV - Flamingo Lower Level - Valley Of Fire Rms
Accountability without accountability: A censorship measurement case study - EHV - Caesars Promenade Level - Modena Rm
ADRecon: Active Directory Recon - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Advanced APT Hunting with Splunk - PHW - Caesars Promenade Level - Neopolitan BR
Advanced APT Hunting with Splunk - PHW - Caesars Promenade Level - Neopolitan BR
Advanced Custom Network Protocol Fuzzing - WS - Linq 4th Flr - Icon C
Advanced Wireless Attacks Against Enterprise Networks - WS - Linq 4th Flr - Icon C
Adventures in Radio Scanning: Advanced Scanning Techniques with SDR - WS - Linq 4th Flr - Icon D
Adventures in the dark web of government data - RCV - Caesars Promenade Level - Florentine BR 1,2
Adversarial Patches - AIV - Caesars Promenade Level - Florentine BR 3
AI DevOps: Behind the Scenes of a Global Anti-Virus Company's Machine Learning Infrastructure - AIV - Caesars Promenade Level - Florentine BR 3
All your family secrets belong to us—Worrisome security issues in tracker apps - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
All your math are belong to us - DC - Track 1 - Caesars Emperor's Level - Palace BR
An Attacker Looks at Docker: Approaching Multi-Container Applications - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
An Introduction to Kovri - BCOS - Caesars Promenade Level - Pompeian BR 1
An OSINT Approach to Third Party Cloud Service Provider Evaluation - PHV - Caesars Promenade Level - Neopolitan BR
An Overview of Hydroponic Grow Techniques - PPV - Flamingo Lower Level - Valley Of Fire Rms
Analyzing Malscripts: Return of the Exploits! - WS - Linq 4th Flr - Icon E
Analyzing VPNFilter's Modbus Module - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Angad: A Malware Detection Framework using Multi-Dimensional Visualization - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
Announcing the Underhanded Crypto Contest Winners - CPV - Caesars Promenade Level - Milano BR 1,2
Anonymous rate-limiting in services with Direct Anonymous Attestation - CPV - Caesars Promenade Level - Milano BR 1,2
Applied OSINT For Politics: Turning Open Data Into News - RCV - Caesars Promenade Level - Florentine BR 1,2
Applied Physical Attacks on Embedded Systems, Introductory Version - HHV - Caesars Pool Level - Forum 17-21
Arcade Party - Night Life - Flamingo - 3rd Floor - Mesquite Rm
Archery—Open Source Vulnerability Assessment and Management - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
ARM eXploitation 101 - WS - Linq 4th Flr - Icon D
Asking for a Friend - EHV - Caesars Promenade Level - Modena Rm
Assessments of Election Infrastructure and Our Understanding and sometimes whY - VMHV - Caesars Pool Level - Forum 14-16
Asura: A huge PCAP file analyzer for anomaly packets detection using massive multithreading - DC - Track 1 - Caesars Emperor's Level - Palace BR
Attack & Defense in AWS Environments - WS - Linq 4th Flr - Icon E
Attacking & Auditing Docker Containers Using Open Source - WS - Linq 4th Flr - Icon E
Attacking Active Directory and Advanced Defense Methods in 2018 - WS - Linq 4th Flr - Icon C
Attacking Commercial Smart Irrigation Systems - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Attacking Gotenna Networks - WLV - Caesars Promenade Level - Milano BR 5,6
Attacking the macOS Kernel Graphics Driver - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Automated Discovery of Deserialization Gadget Chains - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Automated Planning for the Automated Red Team - AIV - Caesars Promenade Level - Florentine BR 3
Automating DFIR: The Counter Future - BTV - Flamingo 3rd Flr- Savoy Rm
barcOwned—Popping shells with your cereal box - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Batman, Brain Hacking, and Bank Accounts - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
BCOS keynote speech - BCOS - Caesars Promenade Level - Pompeian BR 1
Behavior-Based Defense in ICS Environments: Leveraging Minor Incidents to Protect Against Major Attacks - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Betrayed by the keyboard: How what you type can give you away - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Beyond Adversarial Learning -- Security Risks in AI Implementations - AIV - Caesars Promenade Level - Florentine BR 3
Beyond the Lulz: Black-Hat Trolling, White-Hat Trolling, Attacking and Defending Our Attention Landscape - DC - Octavius 9
Biohacking the Disability - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Bitsquatting: Passive DNS Hijacking - PHV - Caesars Promenade Level - Neopolitan BR
BlanketFortCon - Night Life - Flamingo - 3rd Floor - Carson City Rm
BLE CTF - WLV - Caesars Promenade Level - Milano BR 5,6
BLEMystique—Affordable custom BLE target - DL - Table 5 - Caesars Promenade Emperor's Level - Outside Track 1
Blue Team Bio: Using Kill-Chain Methodology to Stop Bioterrorism - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Blue_Sonar - WLV - Caesars Promenade Level - Milano BR 5,6
Booby Trapping Boxes - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
boofuzz - DL - Table 5 - Caesars Promenade Emperor's Level - Outside Track 1
Book Signing - Craig Smith - The Car Hacker's Handbook - Service - Vendors Area - No Starch Press Table
Book Signing - Elissa Shevinsky - Lean Out - Service - Vendors Area - No Starch Press Table
Book Signing - Georgia Weidman - Penetration Testing - Service - Vendors Area - No Starch Press Table
Book Signing - Nick Cano - Game Hacking - Service - Vendors Area - No Starch Press Table
Book Signing - Tarah Wheeler, with Keren Elazari - Women in Tech - Service - Vendors Area - No Starch Press Table
Book Signing - Travis Goodspeed - PoC || GTFO - Service - Vendors Area - No Starch Press Table
Book Signing - Violet Blue - The Smart Girls's Guide to Privacy - Service - Vendors Area - No Starch Press Table
Breakfast at Defcon - Meetup - HHV - Caesars Pool Level - Forum 17-19
Breaking Extreme Networks WingOS: How to own millions of devices running on Aircrafts, Government, Smart cities and more. - DC - Track 1 - Caesars Emperor's Level - Palace BR
Breaking In: Building a home lab without having to rob a bank - HHV - Caesars Pool Level - Forum 17-21
Breaking Parser Logic: Take Your Path Normalization Off and Pop 0days Out! - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Breaking Smart Speakers: We are Listening to You. - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
BruCamp - Meetup - Caesars - Promenade Level - Livorno/Village Talks Rm
BSSI [Brain Signal Strength Indicator] - finding foxis with acoustic help (piClicker) - WLV - Caesars Promenade Level - Milano BR 5,6
Bug Bounty Hunting on Steroids - RCV - Caesars Promenade Level - Florentine BR 1,2
Build Your Own OpticSpy Receiver Module - WS - Linq 4th Flr - Icon A
Building a Better Bedside - The Blue Team Needs a Plan B - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Building a Cryptographic Backdoor in OpenSSL - CPV - Caesars Promenade Level - Milano BR 1,2
Building a Teaching SOC - PHV - Caesars Promenade Level - Neopolitan BR
Building Absurd Christmas Light Shows - DC - 101 Track
Building Autonomous AppSec Test Pipelines with the Robot Framework - WS - Linq 4th Flr - Icon E
Building Drones the Hard Way - HHV - Caesars Pool Level - Forum 17-21
Building Environmentally Responsive Implants with Gscript - WS - Linq 4th Flr - Icon C
Building the Hacker Tracker - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Building visualisation platforms for OSINT data using open source solutions - RCV - Caesars Promenade Level - Florentine BR 1,2
Buzzing Smart Devices: Smart Band Hacking - WS - Linq 4th Flr - Icon B
Bypassing Port-Security In 2018: Defeating MacSEC and 802.1x-2010 - DC - Track 1 - Caesars Emperor's Level - Palace BR
Bypassing Windows Driver Signature Enforcement - WS - Linq 4th Flr - Icon A
Can you hear me now, DEF CON? - WLV - Caesars Promenade Level - Milano BR 5,6
Capturing in Hard to Reach Places - PHV - Caesars Promenade Level - Neopolitan BR
Car Infotainment Hacking Methodology and Attack Surface Scenarios - PHV - Caesars Promenade Level - Neopolitan BR
Cartoons, Sketchnotes, Bullet Journals and Other Data Visualization Tricks - RCV - Caesars Promenade Level - Florentine BR 1,2
CATs - A Tale of Scalable Authentication - CPV - Caesars Promenade Level - Milano BR 1,2
Chatting with your programs to find vulnerabilities - AIV - Caesars Promenade Level - Florentine BR 3
CHIRON - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
Cicada: What the Puzzles Can Teach Us About Cryptography and Privacy. - CPV - Caesars Promenade Level - Milano BR 1,2
Closing Note - RCV - Caesars Promenade Level - Florentine BR 1,2
Cloud Encryption: How to not suck at securing your encryption keys - CPV - Caesars Promenade Level - Milano BR 1,2
Cloud Security Myths - BTV - Flamingo 3rd Flr- Savoy Rm
Cloud Security Myths - SKY - Flamingo 3rd Flr - Virginia City Rm
Cloud Security Suite—One stop tool for AWS, GCP & Azure Security Audit - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
Cobalt DEF CON Party 2018 - Night Life - Flamingo, Rm # after registration
Compression Oracle Attacks on VPN Networks - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Compromising online accounts by cracking voicemail systems - DC - Track 1 - Caesars Emperor's Level - Palace BR
Conformer - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Contest winners, prizes, showcase and awards - BCOS - Caesars Promenade Level - Pompeian BR 1
Contests, Challenges, and free giveaways - BCOS - Caesars Promenade Level - Pompeian BR 1
Core OSINT: Keeping Track of and Reporting All the Things - RCV - Caesars Promenade Level - Florentine BR 1,2
Cruising the Cannabis Highway: Major Breaches in Cannabis Software - PPV - Flamingo Lower Level - Valley Of Fire Rms
Crypto Hero - WS - Linq 4th Flr - Icon F
Cryptography, Codes, and Secret Writing: An Introduction to Secret Communications - CPV - Caesars Promenade Level - Milano BR 1,2
Cubcon 2018 - Night Life - Caesars - Location printed on badges
Current Policy Responses to Election Security Concerns - VMHV - Caesars Pool Level - Forum 14-16
Custodial Responsibilities in the Connected Age: Digital Specimens and Social Contracts - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
D(Struction)20 CTF - Contest - Contest Stage
D0 N0 H4RM: A Healthcare Security Conversation - DC - Octavius 9
DC 26 GothCon - Night Life - Caesars - Lobby bar
DC801 Party - Night Life - Location TBA
De-anonymizing Programmers from Source Code and Binaries - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Deaf Con Meet Up - Meetup - Chill Out Lounge
Decentralized Hacker Net - WS - Linq 4th Flr - Icon F
Deconstructing DeFeNeStRaTe.C: The first public buffer overflow on a mainframe? - SKY - Flamingo 3rd Flr - Virginia City Rm
Deep Exploit - AIV - Caesars Promenade Level - Florentine BR 3
DeepPhish: Simulating the Malicious Use of AI - AIV - Caesars Promenade Level - Florentine BR 3
DEF CON 101 Panel - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
DEF CON 26: Bugcrowd House Party - Night Life - Rockhouse Bar 3370 S Las Vegas Blvd
DEF CON Beard and Moustache Contest - Contest - Contest Stage
DEF CON Biohacking Village Badge Talk - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
DEF CON Blitz Chess Tournament - Contest - Contest Stage
DEF CON Closing Ceremonies - DC - Track 1 - Caesars Emperor's Level - Palace BR
DEF CON Dinner Con - Meetup - The Park on Las Vegas Blvd. by TMobile Arena
Defcon 26 4X5K run - Meetup - corner of W Flamingo and Las Vegas Blvd underneath the circular temple structure
Defcon 26 4X5K run - Meetup - corner of W Flamingo and Las Vegas Blvd underneath the circular temple structure
Defcon 26 4X5K run - Meetup - corner of W Flamingo and Las Vegas Blvd underneath the circular temple structure
Defcon 26 4X5K run - Meetup - corner of W Flamingo and Las Vegas Blvd underneath the circular temple structure
DEFCON 909 Meet Up - Meetup - Caesars - Circle Bar
Defcon Monero Party 2018 - Night Life - Caesars Palace Forum Tower, Rm TBA
Defending the 2018 Midterm Elections from Foreign Adversaries - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Defense in Depth: The Path to SGX at Akamai - PHV - Caesars Promenade Level - Neopolitan BR
DejaVU—An Open Source Deception Framework - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
Demystifying MS17-010: Reverse Engineering the ETERNAL Exploits - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Deploying, Attacking, and Securing Software Defined Networks - WS - Linq 4th Flr - Icon F
Designing and Applying Extensible RF Fuzzing Tools to Expose PHY Layer Vulnerabilities - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Detecting Blue Team Research Through Targeted Ads - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Detecting Web Attacks with Recurrent Neural Networks - AIV - Caesars Promenade Level - Florentine BR 3
Diagnosing Sick Plants with Computer Vision - PPV - Flamingo Lower Level - Valley Of Fire Rms
Digital Leviathan: a comprehensive list of Nation-State Big Brothers (from huge to little ones - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Disabling Intel ME in Firmware - HHV - Caesars Pool Level - Forum 17-21
Disassembly and Hacking of Firmware Where You Least Expect It: In Your Tools- with live hacking demonstration - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Discussion - EHV - Caesars Promenade Level - Modena Rm
Discussion - EHV - Caesars Promenade Level - Modena Rm
Disrupting the Digital Dystopia or What the hell is happening in computer law? - DC - Octavius 13
Dissecting the Teddy Ruxpin: Reverse Engineering the Smart Bear - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Diversity and Equality in Infosec - EHV - Caesars Promenade Level - Modena Rm
DNA Encryption: Bioencryption to Store Your Secrets in living organisms - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Don't Bring Me Down: Weaponizing botnets - SKY - Flamingo 3rd Flr - Virginia City Rm
Dragnet—Your Social Engineering Sidekick - DC - Track 1 - Caesars Emperor's Level - Palace BR
Drunk Hacker History - Contest - Contest Stage
Ducky-in-the-Middle: Injecting Keystrokes into Plaintext Protocols - PHV - Caesars Promenade Level - Neopolitan BR
EAPHammer - DL - Table 1 - Caesars Promenade Emperor's Level - Outside Track 1
Edge Side Include Injection: Abusing Caching Servers into SSRF and Transparent Session Hijacking - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
EFF Fireside Hax (AKA Ask the EFF) - DC - Roman Chillout
EFF Tech Trivia - Contest - Contest Stage
Effective Log & Events Management - BTV - Flamingo 3rd Flr- Savoy Rm
Emergent Recon - fresh methodology and tools for hackers in 2018 - RCV - Caesars Promenade Level - Florentine BR 1,2
Ethical Disclosure and the Reduction of Harm - EHV - Caesars Promenade Level - Modena Rm
Ethics for Security Practitioners - EHV - Caesars Promenade Level - Modena Rm
Ethics of Technology in Humanitarian and Disaster Response - EHV - Caesars Promenade Level - Modena Rm
Evolving security operations to the year 2020 - BTV - Flamingo 3rd Flr- Savoy Rm
Examining Monero's Ring Signatures - BCOS - Caesars Promenade Level - Pompeian BR 1
Expl-iot—IoT Security Testing and Exploitation framework - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
Exploiting Active Directory Administrator Insecurities - DC - Track 1 - Caesars Emperor's Level - Palace BR
Exploiting immune defences - can malware learn from biological viruses? - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Exploiting IoT Communications - A Cover within a Cover - SKY - Flamingo 3rd Flr - Virginia City Rm
Exploiting the IoT hub : What happened to my home? - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Exploring the 802.15.4 Attack Surface - WLV - Caesars Promenade Level - Milano BR 5,6
Facial Recognition - Let me let you in on a secret - SKY - Flamingo 3rd Flr - Virginia City Rm
Fasten your seatbelts: We are escaping iOS 11 sandbox! - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Finding and Attacking Undocumented APIs with Python - PHW - Caesars Promenade Level - Neopolitan BR
Finding Needles in Haystacks - WS - Linq 4th Flr - Icon D
Finding Xori: Malware Analysis Triage with Automated Disassembly - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Fire & Ice: Making and Breaking macOS Firewalls - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
firstorder - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
Fishing for Phishers. The Enterprise Strikes Back! - PHV - Caesars Promenade Level - Neopolitan BR
For the Love of Money: Finding and exploiting vulnerabilities in mobile point of sales systems - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Forensic Investigation for the Non-Forensic Investigator - WS - Linq 4th Flr - Icon A
FPGA’s: a new attack surface for embedded adversaries. - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Freedom of Information: Hacking the Human Black Box - PHV - Caesars Promenade Level - Neopolitan BR
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
Friends of Bill W - Meetup - Caesars - Promenade Level - Office 4 behind Info Booth near Promenade South
From Introvert to SE: The Journey - SEV - Caesars Promenade South - Octavius BR 3-8
From MormonLeaks to FaithLeaks - SKY - Flamingo 3rd Flr - Virginia City Rm
Fuzzing FTW - WS - Linq 4th Flr - Icon D
Fuzzing Malware For Fun & Profit. Applying Coverage-guided Fuzzing to Find and Exploit Bugs in Modern Malware - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Fuzzing with AFL (American Fuzzy Lop) - WS - Linq 4th Flr - Icon B
Game Runner 2049: The Battles Fought by the King of the Replicants - SKY - Flamingo 3rd Flr - Virginia City Rm
GAN to the dark side: A case study of attacking machine-learning systems to empower defenses - AIV - Caesars Promenade Level - Florentine BR 3
GeekPwn Party - Night Life - Flamingo - 3rd floor - Track 101 Scenic BR
GeekPwn - Contest - Contest Stage
Generating Labeled Data From Adversary Simulations With MITRE ATT&CK - AIV - Caesars Promenade Level - Florentine BR 3
Geolocation and Homomorphic Encryption - CPV - Caesars Promenade Level - Milano BR 1,2
Getting Skin in the Game: Biohacking & Business - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Getting to Blinky: #badgelife begins with a single blink - HHV - Caesars Pool Level - Forum 17-21
GOD MODE UNLOCKED: Hardware Backdoors in [redacted] x86 CPUs - DC - Track 1 - Caesars Emperor's Level - Palace BR
Goodwatch Update - WLV - Caesars Promenade Level - Milano BR 5,6
Grand Theft Auto: Digital Key Hacking - PHV - Caesars Promenade Level - Neopolitan BR
Green Locks for You and Me - CPV - Caesars Promenade Level - Milano BR 1,2
GreyNoise - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
GUI Tool for OpenC2 Command Generation - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Guided Tour to IEEE 802.15.4 and BLE Exploitation - WS - Linq 4th Flr - Icon A
GyoiThon - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
Hack Back: Not An Option, But A Necessity? (A Mini-Workshop) - EHV - Caesars Promenade Level - Modena Rm
Hack On The BitBox Hardware Wallet - BCOS - Caesars Promenade Level - Pompeian BR 1
Hackathon and CTF Prizes, and a Group Photo - RCV - Caesars Promenade Level - Florentine BR 1,2
Hacker Flairgrounds - Meetup - Flamingo - 3rd floor - Chillout Rm
Hacker Jeopardy - Contest - Caesars - Track 3 - Pool Level - Forum BR 1-11,25
Hacker Jeopardy - Contest - Caesars - Track 3 - Pool Level - Forum BR 1-11,25
Hacker Karaoke - Night Life - Caesars - Emperors Level - Chillout Rm
Hacker Karaoke - Night Life - Caesars - Emperors Level - Chillout Rm
Hacking a Crypto Payment Gateway - BCOS - Caesars Promenade Level - Pompeian BR 1
Hacking BLE Bicycle Locks for Fun and a Small Profit - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Hacking for Special Needs - Meetup - Caesars - Promenade Level - Anzio Rm past Registration
Hacking Human Fetuses - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Hacking Phenotypic Pathways In Cannabis - PPV - Flamingo Lower Level - Valley Of Fire Rms
Hacking PLCs and Causing Havoc on Critical Infrastructures - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Hacking the Brain: Customize Evil Protocol to Pwn an SDN Controller - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Hacking the international RFQ Process #killthebuzzwords - RCV - Caesars Promenade Level - Florentine BR 1,2
Hacking the Technical Interview - SKY - Flamingo 3rd Flr - Virginia City Rm
Hacking Thingz Powered By Machine Learning - WS - Linq 4th Flr - Icon A
Hacking U-Boot - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Hacking Your Dev Job to Save the World - Where Programming and Hacking Meet - BTV - Flamingo 3rd Flr- Savoy Rm
Hacking your HackRF - HHV - Caesars Pool Level - Forum 17-21
Halcyon IDE - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Ham Radio Exams - Service - Caesars - Promenade Level - Anzio Rm past Registration
Ham Radio Exams - Service - Caesars - Promenade Level - Anzio Rm past Registration
Hamilton's Private Key: American Exceptionalism and the Right to Anonymity - CPV - Caesars Promenade Level - Milano BR 1,2
Having fun with IoT: Reverse Engineering and Hacking of Xiaomi IoT Devices - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Healthcare Exposure on Public Internet - SKY - Flamingo 3rd Flr - Virginia City Rm
HealthyPi—Connected Health - DL - Table 4 - Caesars Promenade Emperor's Level - Outside Track 1
Hey Bro, I Got Your Fitness Right Here (and your PHI). - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Hiding in plain sight: Disguising HTTPS traffic with domain-fronting - CPV - Caesars Promenade Level - Milano BR 1,2
Holy BATSense! Deploying TBATS Machine Learning Algorithm to Detect Security Events - AIV - Caesars Promenade Level - Florentine BR 3
Honeycomb—An extensible honeypot framework - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
House of Kenzo - Night Life - Flamingo - 3rd Floor - Track 101 Twilight BR
House of Roman—a "leakless" heap fengshui to achieve RCE on PIE Binaries - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
How can industrial IioT be protected from the great unwashed masses of IoT devices - ICS - Flamingo Lower Level - Red Rock Rm 6-8
How Compliance Affects the Surface Area of Cannabis POS - PPV - Flamingo Lower Level - Valley Of Fire Rms
How not to suck at Vulnerability Management [at Scale] - BTV - Flamingo 3rd Flr- Savoy Rm
How to Microdose Yourself - PPV - Flamingo Lower Level - Valley Of Fire Rms
How to Tune Automation to Avoid False Positives - PHV - Caesars Promenade Level - Neopolitan BR
How We Cost Our Client £1.2M with 4 lines of code and less than 2 Hours ($2M) - ICS - Flamingo Lower Level - Red Rock Rm 6-8
How WHOIS Data Uncovered $32 Billion Connected to the Mormon Church - RCV - Caesars Promenade Level - Florentine BR 1,2
How-to modify ARM Cortex-M based firmware: A step-by-step approach for Xiaomi devices - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
http2 and you - SKY - Flamingo 3rd Flr - Virginia City Rm
Hunting Predators: SE Style - SEV - Caesars Promenade South - Octavius BR 3-8
Hunting Rogue APs: Hard Lessons - WLV - Caesars Promenade Level - Milano BR 5,6
Hunting the Ethereum Smart Contract: Color-inspired Inspection of Potential Attacks - AIV - Caesars Promenade Level - Florentine BR 3
I fought the law and law lost - RCV - Caesars Promenade Level - Florentine BR 1,2
I'll See Your Missile and Raise You A MIRV: An overview of the Genesis Scripting Engine - DC - Track 1 - Caesars Emperor's Level - Palace BR
I'm the One Who Doesn't Knock: Unlocking Doors from the Network - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Identifying and correlating anomalies in Internet-wide scan traffic to newsworthy security events - AIV - Caesars Promenade Level - Florentine BR 3
Implementing a Library for Pairing-based Transform Cryptography - CPV - Caesars Promenade Level - Milano BR 1,2
In Soviet Russia Smartcard Hacks You - DC - Track 1 - Caesars Emperor's Level - Palace BR
In-N-Out - That’s What It’s All About - SEV - Caesars Promenade South - Octavius BR 3-8
Infecting The Embedded Supply Chain - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Inside the Fake Science Factory - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Instructions and invitations to party - BCOS - Caesars Promenade Level - Pompeian BR 1
Integrating post-quantum crypto into real-life applications - CPV - Caesars Promenade Level - Milano BR 1,2
IntelliAV: Building an Effective On-Device Android Malware Detector - AIV - Caesars Promenade Level - Florentine BR 3
Intense Introduction to Modern Web Application Hacking - PHW - Caesars Promenade Level - Neopolitan BR
Internet of Laws: Navigating to IoT Hacking Legal Landscape - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Internet of Medicine : The ultimate key to Rooting the human being - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
INTRO TO DATA MASTERCLASS: Graphs & Anomalies - AIV - Caesars Promenade Level - Florentine BR 3
INTRO TO DATA MASTERCLASS: Tour-de-ML - AIV - Caesars Promenade Level - Florentine BR 3
Introducing YOGA: Your OSINT Graphical Analyzer - RCV - Caesars Promenade Level - Florentine BR 1,2
Introduction to Cryptographic Attacks - WS - Linq 4th Flr - Icon B
Introduction to Railroad Telemetry - WLV - Caesars Promenade Level - Milano BR 5,6
ioc2rpz - DL - Table 3 - Caesars Promenade Emperor's Level - Outside Track 1
IoT Data Exfiltration - PHV - Caesars Promenade Level - Neopolitan BR
IoT Village Keynote - Tales of a SOHOpeful Journey: Where our Research Started and Where it's Going - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
IoT Village Manson Party - Night Life - Off-site party, Register and receive adddress from IOT VIllage
It WISN't me, attacking industrial wireless mesh networks - DC - Track 1 - Caesars Emperor's Level - Palace BR
It's Assembler, Jim, but not as we know it: (ab)using binaries from embedded devices for fun and profit - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
It's not wifi: Stories in Wireless Reverse Engineering - WLV - Caesars Promenade Level - Milano BR 5,6
It’s a Beautiful Day in the Malware Neighborhood - AIV - Caesars Promenade Level - Florentine BR 3
Jailbreaking the 3DS through 7 years of hardening - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Jailed by a Google Search: the Surveillance State's War on Self-induced Abortion - CPV - Caesars Promenade Level - Milano BR 1,2
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else - SKY - Flamingo 3rd Flr - Virginia City Rm
JARVIS never saw it coming: Hacking machine learning (ML) in speech, text and face recognition - and frankly, everywhere else - CPV - Caesars Promenade Level - Milano BR 1,2
JMPgate: Accelerating reverse engineering into hyperspace using AI - AIV - Caesars Promenade Level - Florentine BR 3
Joe Grand's Hardware Hacking Basics - WS - Linq 4th Flr - Icon A
Jumping the Epidermal Barrier - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Just what the Doctor Ordered: 2nd Opinions on Medical Device Security - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
JWAT...Attacking JSON Web Tokens - WS - Linq 4th Flr - Icon D
Kali Dojo Workshop - PHW - Caesars Promenade Level - Neopolitan BR
Keynote - From Breach to Bust: A short story of graphing and grey data - RCV - Caesars Promenade Level - Florentine BR 1,2
Keynote Address: Alejandro Mayorkas - VMHV - Caesars Pool Level - Forum 14-16
Keynote Address: TBA - VMHV - Caesars Pool Level - Forum 14-16
Keynote Presentation: Avoiding Trauma, Drama and FUD in Medical Device Disclosure - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Keynote Speech: Inside Monero - BCOS - Caesars Promenade Level - Pompeian BR 1
Last mile authentication problem: Exploiting the missing link in end-to-end secure communication - DC - Track 1 - Caesars Emperor's Level - Palace BR
Lateral Movement 101: 2018 Update - WS - Linq 4th Flr - Icon D
Lawyer Meet - Meetup - Flamingo - 3rd Floor - Carson City Rm
Learning to Listen: Machine Learning for Adaptive Wireless Adversary Detection - WLV - Caesars Promenade Level - Milano BR 5,6
Lessons Learned: DEFCON Voting Village 2017 - VMHV - Caesars Pool Level - Forum 14-16
Leveling the Bug Bounty Playfield - Introducing the #LEGALBUGBOUNTY project - SKY - Flamingo 3rd Flr - Virginia City Rm
LHT (Lossy Hash Table) - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Lightning Talks - A Crash Course on Election Security - VMHV - Caesars Pool Level - Forum 14-16
Lightning Talks - Mechanics & Pitfalls of Auditing with Scanners - VMHV - Caesars Pool Level - Forum 14-16
Lightning Talks - The Return of Software Vulnerabilities in the Brazilian Voting Machine - VMHV - Caesars Pool Level - Forum 14-16
Lightning Talks - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Little Fluffy Pineapple Clouds - Commanding a Fleet of Wireless Fruit - WLV - Caesars Promenade Level - Milano BR 5,6
Live Band Karaoke - Night Life - Flamingo - 3rd Floor - Track 101 Vista BR
Local Sheriff - DL - Table 5 - Caesars Promenade Emperor's Level - Outside Track 1
Lonely Hackers Club Party - Night Life - Flamingo - 3rd Floor - El Dorado BR
Looking for the perfect signature: an automatic YARA rules generation algorithm in the AI-era - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Lora Smart Water Meter Security Analysis - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Lost and Found Certificates: dealing with residual certificates for pre-owned domains - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Loud Party - Meetup - Caesars Palace Forum Tower Duplex Suite, Diana Initiative Suite Rm TBA
Lunch Keynote: State and Local Perspectives on Election Security - VMHV - Caesars Pool Level - Forum 14-16
Macabre stories of a hacker in the public health sector (Chile) - SKY - Flamingo 3rd Flr - Virginia City Rm
Machine Learning as a Service in Your Pocket - AIV - Caesars Promenade Level - Florentine BR 3
Machine Learning for Network Security Hands-on Workshop: DIYML - AIV - Caesars Promenade Level - Florentine BR 3
Machine Learning Model Hardening For Fun and Profit - AIV - Caesars Promenade Level - Florentine BR 3
Mallet, An Intercepting Proxy for Arbitrary Protocols - PHW - Caesars Promenade Level - Neopolitan BR
Mallet: A Proxy for Arbitrary Traffic - PHV - Caesars Promenade Level - Neopolitan BR
Malware Panel - AIV - Caesars Promenade Level - Florentine BR 3
Man-In-The-Disk - DC - Track 1 - Caesars Emperor's Level - Palace BR
Mapping Social Media with Facial Recognition - RCV - Caesars Promenade Level - Florentine BR 1,2
Mapping Wi-Fi Networks and Triggering on Interesting Traffic Patterns - PHV - Caesars Promenade Level - Neopolitan BR
Mapping wifi networks and triggering on interesting traffic patterns - RCV - Caesars Promenade Level - Florentine BR 1,2
Master Baiting! Dont Click Bait, Click Yourself - SKY - Flamingo 3rd Flr - Virginia City Rm
Micro-Renovator: Bringing Processor Firmware up to Code - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Microcontrollers and Single Board Computers for Hacking, Fun and Profit - PHV - Caesars Promenade Level - Neopolitan BR
Moderator Justin Ehrenhofer's Greatest Questions - BCOS - Caesars Promenade Level - Pompeian BR 1
Monero Project's Vulnerability Response Process - BCOS - Caesars Promenade Level - Pompeian BR 1
Monero's Differentiated Community - BCOS - Caesars Promenade Level - Pompeian BR 1
Monero's Emerging Applications - BCOS - Caesars Promenade Level - Pompeian BR 1
Mother Natures Development Lifecycles… OR Why the T-Rex didn’t get extenders. - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Movie Night - Night Life - Caesars - Track 2 - Promenade South - Octavius BR 12-24
Movie Night - Night Life - Caesars - Track 2 - Promenade South - Octavius BR 12-24
Mr. Sinatra Will Hack You Now - SEV - Caesars Promenade South - Octavius BR 3-8
My Stripper Name is Bubbles - SEV - Caesars Promenade South - Octavius BR 3-8
n00b Party - Night Life - Flamingo - 3rd floor - Track 101 Sunset BR
Nations and Nationalism and Cyber Security - Navigating Difficult Relationships in the Private Infosec Space - EHV - Caesars Promenade Level - Modena Rm
Nature’s source code is vulnerable and cannot be patched - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
NEST: Securing the Home - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
NFC Payments: The Art of Relay & Replay Attacks - HHV - Caesars Pool Level - Forum 17-21
No Firewall Can Save You At The Intersection Of Genetics and Privacy - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
No Way JOSE! Designing Cryptography Features for Mere Mortals - CPV - Caesars Promenade Level - Milano BR 1,2
Normalizing Empire's Traffic to Evade Anomaly-Based IDS - PHV - Caesars Promenade Level - Neopolitan BR
NSA Talks Cybersecurity - DC - Track 1 - Caesars Emperor's Level - Palace BR
nzyme - DL - Table 1 - Caesars Promenade Emperor's Level - Outside Track 1
Oh Noes!—A Role Playing Incident Response Game - DC - Roman Chillout
On the Hunt: Hacking the Hunt - SEV - Caesars Promenade South - Octavius BR 3-8
One bite and all your dreams will come true: Analyzing and Attacking Apple Kernel Drivers - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
One Step Ahead of Cheaters -- Instrumenting Android Emulators - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
One-Click to OWA - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
One-liners to Rule Them All - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Open Source Endpoint Monitoring - BTV - Flamingo 3rd Flr- Savoy Rm
Open Source Hardware and the Monero Project - BCOS - Caesars Promenade Level - Pompeian BR 1
Opening Note - RCV - Caesars Promenade Level - Florentine BR 1,2
Opening Remarks - AIV - Caesars Promenade Level - Florentine BR 3
OpenPiMap - Hacking the hackers with OSINT, Raspberry Pis, and Data Analysis - RCV - Caesars Promenade Level - Florentine BR 1,2
Opportunistic Onion: More Protection Some of the Time - CPV - Caesars Promenade Level - Milano BR 1,2
Orthrus - DL - Table 4 - Caesars Promenade Emperor's Level - Outside Track 1
OSINT IS FOR SOCCER MOMS - SKY - Flamingo 3rd Flr - Virginia City Rm
Outsmarting the Smart City - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Owning Gluster FS with GEVAUDAN - DDV - Caesars Promenade Level - Capri Rm
PA Toolkit—Wireshark plugins for Pentesters - DL - Table 6 - Caesars Promenade Emperor's Level - Outside Track 1
Packet Mining for Privacy Leakage - WS - Linq 4th Flr - Icon F
PacketWhisper: Stealthily Exfiltrating Data and Defeating Attribution Using DNS and Text-Based Steganography - PHV - Caesars Promenade Level - Neopolitan BR
Panel Discussion: The Internet of Bodies - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Panel on digital & Physical Security in Cannabis - PPV - Flamingo Lower Level - Valley Of Fire Rms
Panel Q&A – IoT Manufacturers: Answers on Security Straight from the Source - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
PANEL: DEF CON GROUPS - DC - Track 1 - Caesars Emperor's Level - Palace BR
Party Music - Acid-T - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Circuit Static - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - DJ v.27 - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Dualcore - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Icetre Normal - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - JG & The Robots - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Juno Reactor - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - MC Frontalot - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Miss Jackalope - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - OS System - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - s7a73farm - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Scotch & Bubbles - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Skittish & Bus - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - TBD - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Tineh Nimjeh - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - YT Cracker - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - YurkMeister - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Party Music - Zebbler Encanti - Night Life - Caesars Emperor's Level - Track 1 Palace BR
Passionfruit - DL - Table 5 - Caesars Promenade Emperor's Level - Outside Track 1
Patching the CFAA: The New CIAA and “Ethical” Conduct in Security Research - EHV - Caesars Promenade Level - Modena Rm
PCILeech - DL - Table 4 - Caesars Promenade Emperor's Level - Outside Track 1
Penetration Testing Environments: Client & Test Security - WS - Linq 4th Flr - Icon E
penetration testing sex toys: "I've seen things you people wouldn't believe" - SKY - Flamingo 3rd Flr - Virginia City Rm
Pentesting ICS 101 - WS - Linq 4th Flr - Icon B
Playback: a TLS 1.3 story - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Playing Malware Injection with Exploit thoughts - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Playing with RFID - WS - Linq 4th Flr - Icon E
Please do not Duplicate: Attacking the Knox Box and Other Keyed Alike Systems - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Politics and the Surveillance State. The story of a young politician's successful efforts to fight surveillance and pass the nation's strongest privacy bills. - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Practical & Improved Wifi MitM with Mana - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Practical attack simulations in Critical National Infrastructure (CNI): Oh the perils, or oh the fun? - SKY - Flamingo 3rd Flr - Virginia City Rm
Prebellico - 100% Passive Pre-Engagement and Post Compromise Network Reconnaissance Tool - RCV - Caesars Promenade Level - Florentine BR 1,2
Primer On Dealing w/ Local Gov. for Legal Cannabis - PPV - Flamingo Lower Level - Valley Of Fire Rms
Privacy and Blockchain: A Boundary Object Perspective - BCOS - Caesars Promenade Level - Pompeian BR 1
Privacy infrastructure, challenges and opportunities - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Privacy Is Equality—And It's Far from Dead - DC - Octavius 13
Prize winners, awards, and announcements - BCOS - Caesars Promenade Level - Pompeian BR 1
Project Interceptor: avoiding counter-drone systems with nanodrones - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Promether, 1st Party of Defcon - Night Life - Caesars Palace, Queercon Lounge Suite, Rm TBA
Protecting Crypto Exchanges From a New Wave of Man-in-the-Browser Attacks - PHV - Caesars Promenade Level - Neopolitan BR
Prototyping Cryptographic Protocols With Charm - CPV - Caesars Promenade Level - Milano BR 1,2
PWN to OWN my own Heart. Journey into hacking my own pacemake - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Pwning "the toughest target": the exploit chain of winning the largest bug bounty in the history of ASR program - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Queercon Mixer - Meetup - Caesars Palace, Queercon Lounge Suite, Rm TBA
Queercon Rainbow Ball - Night Life - Caesars Palace, Queercon Lounge Suite, Rm TBA
Quiet Party - Meetup - Caesars Palace Forum Tower Duplex Suite, Diana Initiative Suite Rm TBA
Real Simple Blue Team Shit - SKY - Flamingo 3rd Flr - Virginia City Rm
Reaping and breaking keys at scale: when crypto meets big data - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Relocation Bonus: Attacking the Windows Loader Makes Analysts Switch Careers - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Remote Sensing, Distributed Computing, BigData and 3D Epidemiology: Today’s Public Health Opportunity - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Responsible Disclosure Panel - EHV - Caesars Promenade Level - Modena Rm
Rethinking Role-Based Security Education - PHV - Caesars Promenade Level - Neopolitan BR
Reverse Engineering Malware 101 - PHW - Caesars Promenade Level - Neopolitan BR
Reverse Engineering Physical Processes in Industrial Control Systems - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Reverse Engineering Windows Defender's Emulator - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Reverse Engineering, hacking documentary series - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Revolting Radios - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Revolutionizing Authentication with Oblivious Cryptography - CPV - Caesars Promenade Level - Milano BR 1,2
RFNoC: Accelerating the Spectrum with the FPGA - WLV - Caesars Promenade Level - Milano BR 5,6
Ridealong Adventures: Critical Issues with Police Body Cameras - PHV - Caesars Promenade Level - Neopolitan BR
Ridealong Adventures—Critical Issues with Police Body Cameras - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Ring 0/-2 Rootkits: bypassing defenses - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Robots and AI: What scares the experts? - SKY - Flamingo 3rd Flr - Virginia City Rm
Rock appround the clock: Tracking malware developers by Android "AAPT" timezone disclosure bug - DC - Track 1 - Caesars Emperor's Level - Palace BR
SAEDAY: Subversion and Espionage Directed Against You - BTV - Flamingo 3rd Flr- Savoy Rm
Scaling and Economic Implications of the Adaptive Blocksize in Monero - BCOS - Caesars Promenade Level - Pompeian BR 1
SDR Basics Class - WLV - Caesars Promenade Level - Milano BR 5,6
Searching for the Light: Adventures with OpticSpy - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
SecKC the World - Night Life - Flamingo - 3rd Floor - Mesquite Rm
Securing Big Data in Hadoop - WS - Linq 4th Flr - Icon F
Securing Critical Infrastructure through Side-Channel Monitoring - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Securing our Nation's Election Infrastructure - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Selfie or Mugshot? - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Serious Intro to Python for Admins - PHW - Caesars Promenade Level - Neopolitan BR
Sex Work After SESTA - SKY - Flamingo 3rd Flr - Virginia City Rm
Sex Work After SESTA/FOSTA - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Sh00t—An open platform for manual security testers & bug hunters - DL - Table 2 - Caesars Promenade Emperor's Level - Outside Track 1
SirenJack: Cracking a 'Secure' Emergency Waring Siren System - WLV - Caesars Promenade Level - Milano BR 5,6
Skiptracer - ghetto OSINT for broke hackers - RCV - Caesars Promenade Level - Florentine BR 1,2
skytalks (303) FRIDAY PARTY - Read the Details - SKY - Flamingo 3rd Flr - Virginia City Rm
skytalks (303) PARTY - FLAMINGO POOL PARTY Open to All - SKY - Flamingo 3rd Flr - Virginia City Rm
Sluts, Bullies, and Best Selves: Rethinking Digital Privacy Education - CPV - Caesars Promenade Level - Milano BR 1,2
SMBetray—Backdooring and breaking signatures - DC - Track 1 - Caesars Emperor's Level - Palace BR
Social Engineering Course Projects for Undergraduate Students - SEV - Caesars Promenade South - Octavius BR 3-8
Social Engineering from a CISO's Perspective - SEV - Caesars Promenade South - Octavius BR 3-8
Some Mining Related Attacks - BCOS - Caesars Promenade Level - Pompeian BR 1
Spell Check: The Hacker Spelling Bee - Contest - Contest Stage
Stalker In A Haystack - RCV - Caesars Promenade Level - Florentine BR 1,2
Stalker In A Haystack - SKY - Flamingo 3rd Flr - Virginia City Rm
Stealing Crypto 2 Factor Isn't a Factor - BCOS - Caesars Promenade Level - Pompeian BR 1
Stop and Step Away from the Data: Rapid Anomaly Detection via Ransom Note File Classification - AIV - Caesars Promenade Level - Florentine BR 3
Stop, Drop, and Assess your SOC - BTV - Flamingo 3rd Flr- Savoy Rm
Story Time - Biggest ITSec fuck-ups I've seen over the past 25 years. - SKY - Flamingo 3rd Flr - Virginia City Rm
StuxNNet: Practical Live Memory Attacks on Machine Learning Systems - AIV - Caesars Promenade Level - Florentine BR 3
Supercharge Your Web Recon With Commonspeak and Evolutionary Wordlists - RCV - Caesars Promenade Level - Florentine BR 1,2
Swarm Intelligence and Augmented Reality Gaming - SEV - Caesars Promenade South - Octavius BR 3-8
Swiss Cheese Holes in the Foundation of Modern Security - CERT VU#919801 - PHV - Caesars Promenade Level - Neopolitan BR
Swissduino—Stealthy USB HID Networking & Attack - DL - Table 4 - Caesars Promenade Emperor's Level - Outside Track 1
Synfuzz: Building a Grammar Based Re-targetable Test Generation Framework - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Take two of these and syscall execve() in the morning: A retrospective and primer on medical device security research - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Target-Based Security Model - PHV - Caesars Promenade Level - Neopolitan BR
Targeted User Analytics and Human Honeypotss - RCV - Caesars Promenade Level - Florentine BR 1,2
Technology Enabled Prosthetic Environments - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
THC Producing, Genetically Modified Yeast - PPV - Flamingo Lower Level - Valley Of Fire Rms
The Abyss is Waving Back - SKY - Flamingo 3rd Flr - Virginia City Rm
The Abyss is Waving Back… - SEV - Caesars Promenade South - Octavius BR 3-8
The Art of Business Warfare - SEV - Caesars Promenade South - Octavius BR 3-8
The Beginner’s Guide to the Musical Scales of Cyberwar - DDV - Caesars Promenade Level - Capri Rm
The Cactus: 6502 Blinkenlights 40 Years Late - HHV - Caesars Pool Level - Forum 17-21
The Cantankerous Cannabis Cryptocurrency Kerfuffle - PPV - Flamingo Lower Level - Valley Of Fire Rms
The challenge of building an secure and safe digital environment in the healthcare - SKY - Flamingo 3rd Flr - Virginia City Rm
The current state of adversarial machine learning - AIV - Caesars Promenade Level - Florentine BR 3
The Good, the Bad, and the Private: Building and Breaking Safe Cryptocurrencies - BCOS - Caesars Promenade Level - Pompeian BR 1
The great power of AI: Algorithmic mirrors of society - AIV - Caesars Promenade Level - Florentine BR 3
The Invisible Hands Tending the Secret Greens - PPV - Flamingo Lower Level - Valley Of Fire Rms
The L0pht Testimony, 20 Years Later (and Other Things You Were Afraid to Ask) - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
The Least Common Denominator Strategy (AKA Don't make DevOps too easy) - SKY - Flamingo 3rd Flr - Virginia City Rm
The Memory Remains - Cold drive memory forensics 101 - DDV - Caesars Promenade Level - Capri Rm
The Mouse is Mightier than the Sword - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
The Ongoing Federal Lawsuit Against Jeff Sessions - PPV - Flamingo Lower Level - Valley Of Fire Rms
The Real History of Marijuana Prohibition - PPV - Flamingo Lower Level - Valley Of Fire Rms
The ring 0 façade: awakening the processor's inner demons - DC - Track 1 - Caesars Emperor's Level - Palace BR
The Road to Resilience: How Real Hacking Redeems this Damnable Profession - DC - Track 1 - Caesars Emperor's Level - Palace BR
The Sound of a Targeted Attack: Attacking IoT Speakers - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
The Truth is in the Network: Reverse Engineering Application-Layer Protocols Via PCAP - WS - Linq 4th Flr - Icon F
ThinSIM-based Attacks on Mobile Money Systems - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Threat Hunting with ELK - WS - Linq 4th Flr - Icon C
Through the Eyes of the Attacker: Designing Embedded Systems Exploits for Industrial Control Systems - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Tineola: Taking a Bite Out of Enterprise Blockchain - DC - Track 1 - Caesars Emperor's Level - Palace BR
TOR for The IOT aka TORT Reform - ICS - Flamingo Lower Level - Red Rock Rm 6-8
Torrent More Pharmaceutical Drugs. File Sharing Still Saves Lives. - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Towards a framework to quantitatively assess AI safety – challenges, open questions and opportunities. - AIV - Caesars Promenade Level - Florentine BR 3
Toxic BBQ - Meetup - (off Site)Sunset Park, Pavilion F, (36.0636, -115.1178)
trackerjacker - DL - Table 1 - Caesars Promenade Emperor's Level - Outside Track 1
Trouble in the tubes: How internet routing security breaks down and how you can do it at home - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Trustworthy Elections - VMHV - Caesars Pool Level - Forum 14-16
Turning Deception Outside-In: Tricking Attackers with OSINT - PHV - Caesars Promenade Level - Neopolitan BR
Two-Steps to Owning MFA - CPV - Caesars Promenade Level - Milano BR 1,2
UEFI exploitation for the masses - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Using AI to Create Music - AIV - Caesars Promenade Level - Florentine BR 3
Using Deep Learning to uncover darkweb malicious actors and their close circle - RCV - Caesars Promenade Level - Florentine BR 1,2
Vet Con - Night Life - Flamingo - Lower Level - Red Rock RM 6
Village summary - BCOS - Caesars Promenade Level - Pompeian BR 1
Vulnerabilities in Cannabis Software - PPV - Flamingo Lower Level - Valley Of Fire Rms
Vulnerable Out of the Box: An Evaluation of Android Carrier Devices - DC - Track 1 - Caesars Emperor's Level - Palace BR
WAGGING THE TAIL—COVERT PASSIVE SURVEILLANCE AND HOW TO MAKE THEIR LIFE DIFFICULT - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Walrus - DL - Table 5 - Caesars Promenade Emperor's Level - Outside Track 1
Wardrivers Anonymous - WLV - Caesars Promenade Level - Milano BR 5,6
WaterBot - Hackable Scientific Plant Bot - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
We Don't Need No Stinkin Badges - BCOS - Caesars Promenade Level - Pompeian BR 1
We Program Our Stinkin Badges! - BCOS - Caesars Promenade Level - Pompeian BR 1
Weaponizing Unicode: Homographs Beyond IDNs - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Weapons Training for the Empire - WS - Linq 4th Flr - Icon B
Weed Hacking: A Pragmatic Primer For Home Grows - PPV - Flamingo Lower Level - Valley Of Fire Rms
WELCOME TO BHV! - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
WELCOME TO DAY 2 of BHV! - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
Welcome To DEF CON & Badge Maker Talk - DC - Track 1 - Caesars Emperor's Level - Palace BR
Welcome to the BCOS Monero Village - BCOS - Caesars Promenade Level - Pompeian BR 1
WELCOME TO THE LAST DAY OF BHV! - BHV - Caesars Promenade Level - Pisa/Palermo/Siena Rms
WEP and WPA Cracking 101 - WLV - Caesars Promenade Level - Milano BR 5,6
What Do You Want to be When You Grow Up? - PHV - Caesars Promenade Level - Neopolitan BR
What happened behind the closed doors at MS - SKY - Flamingo 3rd Flr - Virginia City Rm
What the Fax!? - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
When Incident Response Meets Reality - SKY - Flamingo 3rd Flr - Virginia City Rm
Where's My Browser? Learn Hacking iOS and Android WebViews - WS - Linq 4th Flr - Icon C
WHID Injector: Hot To Bring HID Attacks to the Next Level - DL - Table 4 - Caesars Promenade Emperor's Level - Outside Track 1
WhiteRabbit: Combining Threat Intelligence Public Blockchain Data and Machine Learning to go Down the “Dirty Money” Rabbit Hole - RCV - Caesars Promenade Level - Florentine BR 1,2
Who Controls the Controllers—Hacking Crestron IoT Automation Systems - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Whose Slide is it Anyway? - Contest - Contest Stage
WiFi Beacons will give you up - HHV - Caesars Pool Level - Forum 17-21
Winning a SANS 504 CTF without winning a SANS CTF - RCV - Caesars Promenade Level - Florentine BR 1,2
WiPi-Hunter—It Strikes against Illegal Wireless Network Activities (Detect and active response) - DL - Table 1 - Caesars Promenade Emperor's Level - Outside Track 1
Women, Wisdom, & Wine @ DEF CON 26 by IOActive - Meetup - Caesars - Palace Suites
Worms that fight back: Nematodes as an antidote for IoT malware - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
wpa-sec: The Largest Online WPA Handshake Database - PHV - Caesars Promenade Level - Neopolitan BR
You can run, but you can't hide. Reverse engineering using X-Ray. - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
You may have paid more than you imagine—Replay Attacks on Ethereum Smart Contracts - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
You'd better secure your BLE devices or we'll kick your butts ! - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
You're just complaining because you're guilty: A DEF CON Guide to Adversarial Testing of Software Used In the Criminal Justice System - DC - Track 2 - Caesars Promenade South - Octavius BR 12-24
Your Bank's Digital Side Door - DC - Track 101 - Flamingo 3rd Flr - Sunset BR
Your Peripheral Has Planted Malware—An Exploit of NXP SOCs Vulnerability - DC - Track 1 - Caesars Emperor's Level - Palace BR
Your Smart Scale is Leaking More than Your Weight - IOT - Caesars Promenade Level - Turin/Verona/Trevi Rms
Your Voice is My Passport - DC - Track 3 - Caesars Pool Level - Forum BR 1-11,25
Your Watch Can Watch You! Gear Up for the Broken Privilege Pitfalls in the Samsung Gear Smartwatch - DC - Track 1 - Caesars Emperor's Level - Palace BR

DEF CON News


DEF CON 26 Torrents!

DEF CON torrent image

Ready to ingest some more DEF CON 26 media? Go ahead and unhinge your cyber-jaws and fire up our new torrent and magnet links. We’ve got the DEF CON 26 Original Soundtrack, the DEF CON 26 Presentations and the additional material from the Workshops.

Grab a link, guzzle the content and enjoy it at your leisure.

DEF CON 26 Music Soundtrack
magnet:?xt=urn:btih:beedc5c36e8ba3981edfc946fac8c84e304ece9f&dn=DEF%20CON%2026%20music&tr=https://tracker.defcon.org/announce

DEF CON 26 Presentations
magnet:?xt=urn:btih:aafec09a5fa1c9fe75d062a1a39c5fa030a83f39&dn=DEF%20CON%2026%20presentations&tr=https://tracker.infocon.org/announce

DEF CON 26 Workshops
magnet:?xt=urn:btih:1d78f8158a4a505fbfc25e62c390e50358026aa7&dn=DEF%20CON%2026%20workshops&tr=https://tracker.defcon.org/announce

The regular, non-magnetic links are under DEF CON 26 on media.defcon.org.

We now return you to your regularly scheduled programming.

DEF CON 26 CD!

DEF CON 26 album art image

Let’s set the mood, people. Head over to the DEF CON media server for the whole OST Soundtrack to DEF CON 26 in several delicious digital flavors for your downloading pleasure. If you’re BT inclined, there’s a torrent file in there too.

Here’s the stellar lineup of future favorite jams we’ve assembled for you.

Skittish & Bus - OTP
Dual Core - Apex Predator (featuring Tribe One)
T-4-2 - Digital Boyz
ISHI - Diamond Door (Left-Right Remix)
The TroubleShooters - This World
Haaj - Reactor Containment
FWLR & JELO - Even The Noble Shall Fall
MC Frontalot - Colonel, Panic!
MODERNS - Figuratives (DEF CON Edit)
Ascendant - Source Transmission
Mikal kHill - Mouser's Back
Icommitfelonies - Hashdump
Haaj - Gamma Rays

If you run through all of this and it’s still not Thursday morning, please continue pregaming with the DEF CON channel at SOMAFM. http://somafm.com/defcon/.

It’s almost here, luminous humans of the DEF CONiverse. Our reunion is at hand.

DEF CON 26 WiFi Reg is Live!

DEF CON 26 wifi registration image

The DEF CON 26 WiFi Reg page is live, with all the info you need to securely log in to the wireless network on the DEF CON conference areas.

Please read carefully - there's new cert information and there are pretty explicit instructions for your specific OS.

It's not a trap.

DEF CON 26 ATTENDEE REPORTED INCIDENT POLICY

DEF CON 26 goon image

As a followup to my last post we realized that if we were hoping people would emulate our policies at other conferences we may as well release our attendee incident reporting policy as well. The version given to all the DEF CON Goons is the same as below but also includes confidential reporting phone numbers.

ATTENDEE REPORTED INCIDENT POLICY

DEF CON does not tolerate harassment of any kind, be it racial, sexual, physical, political, intellectual, or emotional. Every Goon shall take each report by an attendee seriously, and not dismiss any of them. Never turn an attendee away. It is not a Goon’s duty to judge anything that an attendee says, regardless of opinions of the attendee, the person they’re reporting, or the reported issue itself.

Reported/Observed Harassment or Assault
When an attendee reports harassment or assault to any Goon follow this procedure:

1. Get a second Goon to be with you to listen to the report.
2. Have one goon contact a SOC goon via the SOC Contact Procedures
3. Make a warm hand off with the attendee to the SOC Department.
4. Let the SOC conduct their investigation and handle the incident from there.
5. Be available to answer any questions from the SOC or venue security.

Interaction with Social and Traditional Media
DO NOT SHARE photos or videos. Please let the responding SOC GOONS know if you have any video or pictures, they may end up being evidence, but out of context could cause problems.

During or after an incident, you may be asked to comment on the situation. DO NOT make any comments to reporters, and do not post about the incident on social media. As a Goon, the media will treat anything you say as an official statement from DEF CON. Commenting prematurely before we understand the situation could cause more confusion or reveal identities that should remain confidential so please refrain from speculating and work with SOC / PRESS to help them understand what happened.

Refer all media inquiries to the DEF CON Press Department (press@defcon.org or send them to the press room)

DEF CON 26 Support Resources!

DEF CON 26 hotline image

In my last post about the DEF CON Code of Conduct, I mentioned that I wanted to make sure that the community had all the tools necessary to get involved and report problems when they arise.

In this post, my last before the con, I'll talk about some of the new efforts we are deploying for DEF CON 26. It will be our first year for some of these, so we are looking for feedback. You will notice a theme of transparency, appropriate given the theme of this year's con!

NEW WAYS TO REPORT ISSUES: The DEF CON Support Hotline

You can reach DEF CON staff during normal hours of operation (8am to 4am) to anonymously report any behavior violating our code of conduct or to find an empathic ear by calling +1 (725) 867-7255. Trained community volunteers will be standing by to help any attendees.

You can still report issues by going to any Info Booth or talking to any SOC Goon, but sometimes you may not want to be walking around in person with a problem, and so this year we have added a phone option.

NEW SUPPORT RESOURCES:

We are collaborating with several organizations including Kick at Darkness, The Rape Crisis Center Las Vegas, and the Nevada Coalition to End Domestic and Sexual Violence to provide expert resources for survivors, including dedicated support for LGBTQ+. When you call the Hotline you will reach DEF CON community Goons trained to help in these areas.

NEW WAYS TO IDENTIFY GOONS:

In the past there has been some confusion by attendees with what Goon they were actually talking with.

New for DEF CON 26 Goons should all have visible patches with their nickname on them so it is easier to remember who you talk to about what. The name patches should be attached to the front of the Goon's lanyards and be more visible than the back of a shirt that might be covered by a backpack.

Please use the name on the patch if you have any feedback on Goons, good or bad. Feedback can be sent to feedback@defcon.org, written and dropped off at registration, or if serious enough called into the Hotline.

MORE DETAILED TRANSPARENCY REPORT:

Based on the positive community response to our closing ceremony transparency report, we plan to do this every year and hope other conferences do as well.

As people get comfortable reporting issues I expect the numbers to increase, and only by facing these issues head on can we hope to prevent them. It requires courage to speak truth to power, or to report something that is unpleasant in your community, but together we can make things better.

See everyone soon!

The Dark Tangent

DEF CON 26 Hacker Tracker!

DEF CON 26 hacker tracker image
A must have for your burner phone - the DEF CON Hacker Tracker puts all the talks, contests, events and parties all in one easy-to-navigate package. It’s available in both android and Apple flavors and it’s free.

Media Treats for DEF CON 26!

DEF CON 26 video image

Less than 2 weeks to DEF CON 26 - how about a little treat to get you in the mood? Head over to the DEF CON Media Server for a sweet video and a single from DEF CON favorites Skittish and Bus, straight from the DC26 Soundtrack.

Get hyped, fam. We're in the home stretch.

DEF CON Code of Conduct

DEF CON Policy image

When I designed the updated DEF CON Code of Conduct in 2015, I had a few goals in mind. Make it simple to understand, express in broad strokes what kind of behavior is not acceptable, and don't be too specific.

I wanted it to act as a template for other conferences, if they chose to do so. It was legally reviewed by our outside law firm and a specialist. In 2018, it's looking like it may get seriously crash tested.

The Code of Conduct assumes people are acting in good faith and not creating intentionally elaborate, dishonest or disingenuous claims of harm. "Ah ha! This is where the bad actors will attack the CoC" you may be thinking.

As a conference of hackers, our CoC is intentionally flexible: like a spoon in the matrix. We describe generally what is not acceptable as opposed to trying to enumerate 42 different bad behaviors.

Besides the CoC, DEF CON has several structural factors that are to our advantage when dealing with people intent on disruption. This is not our first conference, and as such we have a department dedicated to dealing with this problem. We have also had time to plan with hotel and casino security should we need their involvement. We take this issue very seriously and choose to err on the side of removing people, rather than allow them to spoil the conference for those who just want to contribute in a positive way.

Finally, I have always said that DEF CON is what you make of it. I want to make sure our community has all the tools necessary to identify and report unacceptable behavior. Together, we will have all the pieces in place to act quickly and professionally, no matter what the issue is.

The Dark Tangent

DEF CON 26 Vendor List!

DEF CON Parties image

The official list of Vendors for DEF CON 26 is live on the website. There's a pretty wide variety of books, gear and swag to check out, along with some fun newer stuff like nootropics. Get familiar.

Party at DEF CON 26!

DEF CON Parties image

Many people love parties. Facts.

If you are one of those party-loving people, this update will fill up your smile tank. The Parties and Meetups Page is LIVE! Use it to learn all about the DC 26 party/meetup scene. Then, when the time is right, party with other partiers. Or meet up with people who share your interests.

Go get your life. It's all the best.

DEF CON 26 Speaking Schedule is Live!

DEF CON Speaking Schedule image

Attention DEF CON-goers! The speaker schedule is official and live! Wait no more - find out who’s speaking about what, where and when. Commence planning. Engage stoked mode. Countdown imminent.

Friends of Bill W at DEF CON 26

DEF CON cFriends of Bill W. image

For all those Friends of Bill W. looking for a meeting, or just a quiet moment to regroup from the Vegas of it all, we have you covered. There are meetings throughout DEF CON - Noon and five pm Thursday through Saturday and Noon on Sunday. The location is the same as last year, in Office 4 Behind the DEF CON Info Booth.

Stop by and refresh yourself. We'll be here.

Contests and Events at DEF CON 26 posted!

DEF CON contests and events image

Now that you’ve had a whole day to absorb the epic Village list, we’ve got some more goodies for you. The Contests and Events page is now LIVE, and it’s also quite a bit to take in. Ranging from the straightforward elegance of the Tin Foil Hat Challenge to the complexity of an Industrial Control Systems CTF competition, there’s contests here for just about any hacker discipline, and every level of skill or experience. Contests are also a great way for the shyer among us to beat the icebreaker blues and get right into some fun with a bunch of likeminded strangers.

The more extroverted attendees can still opt for a Charity Mohawk or the cringetastic glory of Hacker Karaoke.

Block off a little time for pre-con recon and make a plan to make sure you get to sample widely from the smorgasbord of C&E offerings.

Our reunion draws ever closer, fam. Get amped.

So Many Villages!

DEF CON villages image

DEF CON 26 is less than a month away, and the DC26 Villages page is live and ready for your attention! Bring a snack, though - there’s a lot of villages this year. Twenty-eight (28!) villages, covering a pretty staggering array content.

Internet of Things
Crypto and Privacy
Wireless
Biohacking
R00tz Asylum
Hardware Hacking
Lockpicking
Social Engineering
Tamper Evident
Data Duplication
DEAF CON
Voting Machine Hacking
Recon
AI
Soldering Skills
DroneWarz
VX (Chip-Off)
Mobile Museum of Vintage Technology
Ethics
Laser Cutting
Cannabis
CAAD (Competition on Adversarial Attacks and Defenses)
Blue Team
Car Hacking
Packet Hacking
Industrial Control Systems
Skytalks
Monero/BCOS


Chances are there’s a few things in that list you want to level up on.

As always, the Villages are generated by the interest and effort of DEF CON Community members looking to share their interests and obsessions with you. Come through and show them some love and learn something new. If your obsession isn’t represented, maybe it’s time to write up a proposal for DEF CON 27!

Demo Labs for DEF CON 26 Posted!

DEF CON demolabs image

More DEF CON 26 goodies for your perusal – Demo Labs are Live! You should take a moment to check out the lineup, and set aside some time to visit when you’re at the Con. In addition to being a cool way to see what your fellow hackers are working on, it’s an opportunity to offer your expertise, meet potential collaborators and help push the community forward.

Demo Labs are interactive, so, you know, interact.

Just over a month, people!

DEF CON 26 Workshops!

DEF CON Speaker List image

Another milestone on the Road to DEF CON 26! The workshops page is live on the DEF CON site. Registration is still a ways off - July 8, to be precise, but now is the perfect time to get yourself familiar with the offerings. The spots traditionally fill up pretty quick, so be ready to claim your seat when the light turns green next month, maybe even consider a few backups.

It’s officially summertime in our host hemisphere - the season of DEF CON has begun!

The Entire lineup of DEF CON 26 Talks is Live!

DEF CON Speaker List image

DEF CON family, the time of our reunion approaches. In just a few days, summer arrives in the Northern Hemisphere. The pages of the calendar turn, ever closer to August. Today comes the surest sign - the DEF CON 26 speaker list is live on DEFCON.org.

The wait is over - dig into the list to start your conference planning! We’re proud of the lineup we’ve created this year, and we think whatever your particular itch you’ll find some talks and panels that scratch it for you.

We’d also like to take a moment to thank the undersung heroes of the Selection Committee. They devote crazy amounts of time and energy to working through hundreds and hundreds of proposals to make sure the best ones make it to the top of the pile. They work hard, they make us great and they deserve your appreciation.

It’s almost here, hacker fam. Can you feel it?

DEF CON 26 Link Roundup!

DEF CON 26 link roundup image

The Recon Village is hosting a hackathon at DEF CON 26! If you like the idea of working on an OSINT/Recon tool with fun strangers and copious energy drink consumption, get your info/signup on at the link.

Friendly reminder that the Data Duplication Village has a CFP that's open until June 15th. Which is super soon, so if you're looking to speak there we suggest haste and focus.

The Social Engineering Village has its speaker schedule posted already! The season of the Con is most assuredly on. Check out who's gonna be dropping science on the hacking of humans, and make your plans accordingly.

For those of you who like a little 'pew-pew-pew' in your Vegas adventures, good news! The DEF CON shoot returns for DC26 - and registration is open. You can get the rules, schedule and location over at deviating.net.

Stay tuned as DEF CON 26 continues to coalesce.

DEF CON 26 Entertainment Announcement: Juno Reactor!

DEF CON 26 Juno Reactor image

DEF CON believes in balance. For all the forebrain overstimulation we provide by day, we provide an antidote at night - a carefully curated beat menu to work out your funky lizard underbrain.

To that end, we are so proud to announce that some of those healing beats will be provided to you by the mighty, mighty Juno Reactor! You know Juno (government name: Ben Watkins) from decades of sonic bad-assery that includes the high-energy proto-trance of his debut ‘Transmissions’, the beat science of 2004’s ‘Labyrinth' and wildly cinematic soundscapes that adorn projects like ‘The Matrix Trilogy’, ‘2017 Gran Tourismo’ and ‘Drive’.

This performance will be hot on the heels of the June release of ‘The Mutant Theater’ - expect serious rhythm and highly interactive stage show that’s been described as ‘Labyrinth meets Barbarella’.

Check out Juno Reactor’s work. Get excited. This is gonna be special.

DEF CON 26 CTF Quals Write Ups!

DEF CON 26 CTF Update image

Now that the DEF CON 26 CTF Quals are complete, here's a roundup of some of the first challenge write-ups to appear in the wild. Please read them, learn from them, and share them. If you don't participate in the CTF yet, let them inspire you to throw your hat into the ring.

"It's a Me" Challenge:
https://raywang.tech/2018/05/14/DEF-CON-Quals-2018-It-s-a-Me/

iPwn Kit:
https://gist.github.com/ChiChou/e3a50f00853b2fbfb1debad46e501121
https://gist.github.com/saelo/0a85f22c8a02f3a314661edd715900d3

Mario and Racewars:
https://github.com/toomanybananas/ctf_solutions/tree/master/defcon/2018

PoW as a Service:
https://github.com/kpcyrd/defcon26-pow

sbva:
https://github.com/…/20…/DEF_CON_Quals_2018/sbva/sbva_web.md

Signature Dishes:
https://hackmd.io/s/B1An6UL0M

smcauth:
https://blog.vero.site/post/shellql

DEF CON 26 CTF Quals Winners!

DEF CON 26 CTF Update image

Congratulations to Samurai for winning the hotly contested DEF CON 26 CTF Quals! Our thanks also to the luminous humans of Order of the Overflow for putting on such a fun event! Check out the scoreboard for all the rankings!

See all those qualified at the big show- DC26!

Halfway through DEF CON 26 CTF Quals!

DEF CON 26 CTF Update image

You can follow the action at the DEF CON 26 CTF Quals on this convenient scoreboard provided by the fine humans of The Order if the Overflow. So you should.

DEF CON 26 CTF Quals this Weekend!

DEF CON CTF image

Reminder: there’s a CTF qualification event this weekend:

#DEFCONQUALS2018 will be held 00:00 UTC on May 12th for 48 hours. Glory awaits for the brave and the skilled. Get in the arena!

register.oooverflow.io

DEF CON 26 Homework: Critical Thinking Edition!

DEF CON you are being lied to image DEF CON undercover economist image DEF CON public opinion image

More Reading Homework for DEF CON 26!

Another way to keep dystopia at bay: question everything. Widen your information funnel. Examine the framing. Check your sources.

In the spirit of DEF CON 26’s theme “1983: The View from Dystopia’s Edge”, we offer some homework reading with a focus on critical thinking.

First up, the delightful “You are Being Lied To”. It’s compiled by the redoubtable Russ Kick of the legendary first version of disinfo.com, and it’s a sage, provocative collection of bite-size think pieces from all over the cognitive map. The only through line is that many of your assumptions are garbage. Start anywhere, and let it shift your paradigm.

https://archive.org/details/media_You_Are_Being_Lied_To

“The Undercover Economist” is Tim Harford’s wry take on the basics of economic theory, with a special emphasis on the strange and counterintuitive ways the tangled forces of the economy affect your daily reality.

The final assignment for today is Walter Lippmann’s ‘Public Opinion’. Written almost a century ago, “Public Opinion” is an eerily incisive and prescient take on the way your opinions are crafted and slipped into your head while your attention is elsewhere. Less dated than you think, and packed with meaty insights for the ‘post-truth’ era. Prepare to question how (and why) you know everything you think you know.

http://www.gutenberg.org/ebooks/6456

Happy reading! Stay tuned for more assignments in the coming days.

Roundup of DEF CON Updates!

DEF CON CTF image

Early bird reg for DEF CON China [beta] has now closed. Online reg remains open for those who prefer it, but please be aware that the standard DEF CON method of paying at the door works just fine.

The passing of one major deadline doesn’t mean you have no reason to stay up all night sweating over a presentation idea. Many of the DEF CON 26 open calls closed May 1, but there are still  villages and events still wide  open for submissions. For example:

The brand-new Ethics Village (ethicsvillage.org) is accepting talk submissions until June 22.

Car Hacking Village (carhackingvillage.com) is still open.

Hardware hacking village is looking for talks, art and demos. Check their forum thread for more info.

Crypto and Privacy Village is open until June 15 (Cryptovillage.org)

AI Village CFP closes June 15 (https://goo.gl/forms/g50hhGITiOWEbo002)

Follow @defcon for village announcements as we get them!

Got a clever youngling you’re thinking of bringing along to DEF CON 26? Social Engineering Village has SE Capture the Flag contests for kids and teens - Find all the details at social-engineer.com!

CTF Quals Registration for DEF CON 26 is Now Open!

DEF CON CTF image

DEF CON Quals CTF 2018 registration is now open! https://register.oooverflow.io

#DEFCONQUALS2018 will be held 00:00 UTC on May 12th for 48 hours. Glory awaits for the brave and the skilled. Get in the arena!

New Soldering Skills Village at DEF CON 26!

DEF CON ssv image

Announcing new for DEF CON 26, the Soldering Skills Village! The SSV will focus purely on soldering and making at DEF CON while the HHV will focus on bringing more hardware hacking resources than ever before!

The change-up is beneficial for everyone, it means both villages can get quiet and well-lit spaces. It also means the two volunteer groups can better support the DEF CON community in their own ways. Both villages will maintain an open share of knowledge and volunteers between them. The SSV and HHV will coexist at DEF CON and provide the most that they can to all DEF CON attendees!

Also: Got something you want to show off, teach, or blab on about? Let us know about it! Shoot an email to [email]l33tbunni@dchhv.org[/email] Now accepting submissions for demos, talks, art, anything hardware you want to show off!

More info at https://www.dchhv.org

Space Announcement for DEF CON 26!

DEF CON Flamingo image

DEF CON 26 is getting close and now is the time to let everyone in on some big changes we've got in store. We've accepted a record number of villages and are growing the number of workshops from last year. To hold all this goodness we are growing to include the Flamingo hotel.

TL/DR

- DEF CON has has accepted more villages than ever before and needs to grow.
- DEF CON is spreading to two hotels, Caesars Palace and the Flamingo.
- This lets us do more stuff + evening pool parties.

The PLAN:
For DEF CON 26 we will try something we have never done - Split the con between two hotels! No, not like Paris + Ballys, they are connected. I'm talking Caesars Palace and the Flamingo across the street.

"That's Crazy!" you say. "Why do we need that much space?" you say. Check this out: The number of villages will almost double from last year to about 25. Parties should increase. More contests are under development. DEF CON needs space to support all the awesome projects from the community and I'd really like to throw some pool parties. That is all now possible.

In the next month you will hear more specifics but I want to answer some questions here:

- How will the space be split? The Flamingo will hold some of the "destination" events to relieve pressure off of Caesars Palace. Current planning includes Workshops, DEF CON 101 track, some villages and contests, a chill out space, pool parties, and more once we finish planning.

- Will there be DC TV at the Flamingo? Yes DC TV will be in the Flamingo and as many other hotels as we can wire. A more definitive list soon, but we are building on what we did last year.

- If you ran a village or contest last year you should count on the same or more space you got last year. If you are running a first time event we will work to meet all of your needs. If you want even more space or a dedicated spot at the Flamingo we can work on making that happen.


Return to Index

DEF CON 26 FAQ


This FAQ was created to help answer some questions you may have about this years DEF CON. If you need more info or questions regarding DEF CON please check out the general DEF CON FAQ list. Available here: https://www.defcon.org/html/links/dc-faq/dc-faq.html


When and where is DEF CON 26?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 26 will be held August 9-12, 2018, at Caesars Palace in Las Vegas. Many people arrive a day early, and many stay a day later. Again this year we will have some things running on Thursday.


Is DEF CON 26 canceled?

No.


How much is admission?

$280.00 USD, Cash for all four days. Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege. We only accept cash - no checks, no money orders, no travelers checks. We don't want to be a target of any State or Federal fishing expeditions.


Can I pre-register for DEF CON?

No.


How many people will be there?

Last year we had more than 22,000 people at DEF CON! The last few years, attendence has been in the 18-20k range.


How much do rooms at Caesars Palace cost, and how do I reserve a room?

The DEF CON rate is available at the following hotels: Caesars Palace, Paris, Bally's, Flamingo and Quad. Check out the DEF CON 26 Venue page for all the details!


I can't afford that.

Try the Ride and Room sharing threads on the Forums.

You may also want to visit your Local DEF CON Groups meeting and see who you might want to bunk up with. It's important to mention you should use good judgment when sharing a room and consider who is sleeping next to you and who has access to your belongings. That said, there are a lot of great people looking to save a buck or pinch a penny, good luck.


Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.


I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:


How much is internet access in the rooms of Caesars Palace?

We'll let you know soon. Internet access is available for free in the convention area.


Is there a free network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the 3G airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!


What about the smoking policy?

Due to the Clean Air Act in Las Vegas, the Vendor Area, Speaking rooms, and Hallways will be completely non-smoking in order to comply with the law. The Hotel will have designated smoking areas clearly posted.


What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You must be 18 years of age or older to reserve a hotel room and to check-in. A valid ID is required upon check-in. DEF CON 26 will have enforcement of the 21 or older rule in certain "private" parties with possible bouncers at the doors checking IDs. This is generally the rule in all areas where alcohol is being served. However, DEF CON does not take responsibility for anything potentially indecent or offensive your minor may witness or participate in. The underage attendee is the responsibility of his or her guardian or themselves.

The presentations are open to all ages. Observation of contests as they take place on the contest floor is open to all ages.

Competition in some contests may have age restrictions due to laws. There is plenty fun to be had without booze and gambling! There is a discussion regarding fun for those under 21 on the forums. https://forum.defcon.org/showthread.php?t=8232


I want to speak, how do I give a talk?

GREAT! We are looking for and give preference to: unique research, new tool releases, Ø-day attacks (with responsible disclosure), highly technical material, social commentaries, and ground breaking material of any kind. Want to screen a new hacking documentary or release research? Consider DEF CON. To submit a speech, read the Announcement and complete the DEF CON 26 Call for Papers Form: https://www.defcon.org/html/defcon-26/dc-26-cfp-form.html CFP forms and questions should get mailed to: talks/at/defcon.org


When does the CFP Close? Can I get an Extension?

DEF CON 26 Call For Papers will close on May 1, 2018.


How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Below is a list of this years contests and events. This list may not be complete so check the forums to see what people are up to.

Go to the forums for more info on Contests and Events: https://forum.defcon.org/forum/defcon/dc26-parties-socialgatherings-events-contests


How do I become a Vendor?

If you want a space in our vendor area, you need read the FAQ and apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?


I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please check out the DEF CON 26 Press Registration page if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.


What should I bring to DEF CON?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the Black and White Balls, annual Friday and Saturday night events where everyone shows off nifty attire. SWAG is Always recommended, people LOVE to trade! You never know when or where a t-shirt with your .org will come in handy. Government SWAG is a hot commodity, however, DT wishes to pillage those goods first! Its generally a good idea if you are a pale geek to have some sunscreen at the top of your list. Other honorable mentions are: Blister preventions, Band-aids, Gel shoe inserts, Personal cooling devices, Pain relievers and antacids, Bottle openers, Personal voice recorders, water filters, and last but not least an Alibi.


This FAQ didn't answer my questions, or was unclear, how can I get further information?

Please visit: https://www.defcon.org for previous conference archives, information, and speeches. Updated announcements will be posted to news groups, security mailing lists and this web site.

https://forum.defcon.org/ for a look at all the events and contests being planned for DEF CON 26. Join in on the action.

https://www.defcon.org/defconrss.xml for news and announcements surrounding DEF CON. Also check out our Twitter, Facebook, and G+ accounts for up to the minute news.


Return to Index

DEF CON FAQ


Frequently asked questions about DEF CON



What is DEF CON?

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.



How did DEF CON start?

Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!



Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.

There are several resources that will give you an idea of what DEF CON is all about.

DEF CON Press: through the prism of the media
DEF CON Pics: visual evidence, thousands of pictures, some NSFW
DEF CON Groups: Local groups that meet
DEF CON Media archives: Speeches from DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.



When and where is DEF CON?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 26 will be held August 9th through August 12th at Caesars Palace in Las Vegas. Many people arrive a day early, and many stay a day later.

New in 2018, we are doing a DEF CON [Beta] Event in Beijing, China May 11-13! Check out the Call for Papers!


Isn't there a DEF CON FAQ already?

Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It can be found at http://defcon.stotan.org/faq/



What are the rules of DEF CON?

Physical violence is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!



Is DEF CON cancelled?

No.



What is there to do at DEF CON?

DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!



I'm not a hacker, should I go to DEF CON?

Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.



Do criminals go to DEF CON?

Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.



What are Goons?

They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.



How can I help out or become a Goon?

The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.



How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.



I would love to see XYZ event, how do I make this happen?

Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.



How can I speak at DEF CON?

You can submit a response to our CFP (call for papers). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in March and closes mid-May.



I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.



I want to sell stuff, how do I do this?

If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?



What are the different price rates?

Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.



How much is admission DEF CON, and do you take credit cards?

DEF CON 26 will cost $280 USD Cash for all four days. Do we take credit cards? Are you JOKING? No, we only accept cash - no checks, no money orders, no travelers checks. We don't want to be a target of any State or Federal fishing expeditions.



Can I pre-register for DEF CON?

No. We used to do this a long time ago, but found that managing the registration list, and preventing one 'Dr. Evil' from impersonating another 'Dr. Ev1l' too much of a hassle. Seeing how we would only take cash in the first place, and things becomes time consuming and easy to abuse. Cash at the door works every time.



Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.


I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:


DEF CON is too expensive, how can I afford it?

DEF CON is cheaper than many concerts, and certainly cheaper than many shows in Vegas. Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.

Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.) Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: $280 can be saved, mow some lawns. Try to go to another 3 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.

Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.



How many people typically attend DEF CON?

There have been roughly 18,000-22,000 attendees in the last few years of DEF CON. DEF CON 25 had a record showing with well over 23,000.



Is there a network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!



What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 18 to reserve a room.



What is a DEF CON "Black Badge"?

The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.



How can I get a hold of DT? I tried to mail him and haven't seen a response yet.

DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.



Is it hot in Vegas?

Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.



What should I bring?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.



How much do rooms at Caesars Palace cost, and how do I reserve a room?

The DEF CON 26 group room registration is now live! We have room rates at six hotels, until they run out of rooms in our block.

You may either follow this link: https://resweb.passkey.com/go/SCDEF7

Do not worry if the form doesn't immediately show the discounted rate. To verify that you're getting our price you can mouse over the dates you've selected or begin the checkout process.


How much is internet access in the rooms of Caesars Palace?

We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.



Will Caesars Palace broadcast the speeches on their cable system?

More info as to the content will be available as planning ensues.



Will we have DEF CON branded poker chips?

You will have to attend DEF CON to find out.



Will conference attendees have entire floors of hotel rooms to themselves?

Probably not. The hotel is very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.



This FAQ didn't answer my questions, or was unclear, how can I get further information?

There is a forum discussion thread in which you can ask follow up questions.


Return to Index

Links to DEF CON 26 related pages


Links

DEF CON . org

Main DEFCON site
DEFCON 26
DEFCON 26 Planning Forums
DEFCON 26 [Official / Unofficial] [Parties / Social Gatherings / Events / Contests] Forums
DEFCON 26 FAQ
DEFCON      FAQ
DEFCON 26 Recent News
DEFCON 26 Schedule and Speakers pages
DEFCON 26 Villages
DEFCON 26 Vendors
DEFCON 26 Parties & Meetups
DEFCON 26 Contest & Events
DEFCON 26 DemoLabs Schedule
DEFCON 26 Workshops Schedule
DEFCON 26 Entertainment

Villages with talks

AI Village   -  T  @AIvillage_DC
BioHacking Village   -  T  @DC_BHV
BlockChain Open Security Village   -  T  @BCOSvillage
Blue Team Village   -  T  @BlueTeamVillage
Car Hacking Village   -  T  @CarHackVillage
Crypto and Privacy Village   -  T  @CryptoVillage
Data Duplication Village   -  T  @DDV_DC
Ethics Village   -  T  @EthicsVillage
Hardware Hacking Village   -  T  @DC_HHV
ICS Village   -  T  @ICS_Village
IoT Village   -  T  @ISEsecurity   -  T  @IOTvillage
Puff Hack Village   -  T  @puffhackvillage
Recon Village   -  T  @ReConVillage   -  FB  @ReConVillage
303 SkyTalks Home   -  T  @DCSkyTalks   -  FB  @DCSkyTalks
Social Engineering Village   -  T  @HumanHacker
Voting Machine Hacking Village   -  T  @VotingVillageDC
Packet Hacking Village/Wall of Sheep   -  T  @WallOfSheep   -  FB  @WallOfSheep
Wireless Village   -  T  @WiFi_Village

Villages without known talks

Badge Makers Community Area - part of the Hardware Hacking Village
CAAD Village   -  T  @GeekPwn
Deaf Con   -  T  @_DEAFCON_
Drone Warz VIllage   -  T  @Drone_Warz
Laser Cutting Village
DEFCON Law Village   -  T  @DefConLaw
Lockpick Village   -  T  @toool
Mobile Museum
Soldering Skills Village
Tamper Evident Village
VX Chip-Off Village   -  T  @vxresearch
Vet Con   -  T  @VetConActual

Other Interesting Links

The Diana Initiative - Celebrating diversity, women in InfoSec, and how to pursue a career in information security and technology
defconparties Google calendar
Chris Magistrado's Party list - Twitter Announcement
Blackhat, BSidesLV and DEF CON Parties 2018
List of unofficial DEF CON badges and SAOs
DEF CON Media Server thumbnails

Guides/Tips/FAQs

JK-47 - BSidesLV & DEFCON Conference Tips
Unofficial Defcon FAQvt4
DEF CON for N00bs [non-fiction]
Just another DEF CON guide
HACKER SUMMER CAMP 2018 GUIDE

calibre ebook managment