The ONE!

One Schedule to Rule them All!


Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 28.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org

Have a good time at DEF CON 28!


Index of DEF CON 28 Activities


Locations Legends and Info
Schedule   - Thursday  - Friday  - Saturday  - Sunday
Speaker List
Talk Title List
Village Talk List
    AEV - AIV - ASV - BCV - BHV - BTVT1 - BTVW1 - BTVW2 - CHV - CLV - CNE - CPV - CRV - DC - DCG - DL - ENT - ETV - FSL - HHV - HRV - HTS - ICS - IOT - LBV - LPV - MOV - PAYV - PHVT - PHVW - POV - PWDV - RCV - RGV - RTV - SEV - VMV - WLV
Talk Descriptions
DEF CON News
DEF CON 28 FAQ
DEF CON FAQ
Links to DEF CON 28 related pages


Locations Legends and Info

AIV = Artifical Intellegence Village
      Location: #aiv-general-text

ASV = AppSec Village
      Location: #asv-general-text

AEV = AeroSpace Village
      Location: #av-lounge-bar-text

BCV = Blockchain Village
      Location: #bcv-general-text

BHV = Bio Hacking Village
      Location: #bhv-general-text

BTVT  = Blue Team Village Talks
BTVW = Blue Team Village Workshops
      Location: #btv-general-text

CHV = Car Hacking Village
      Location: #chv-welcome-text

CLV = Cloud Village
      Location: #cloudv-general-text

CNE = Contests and Events
     

CPV = Crypto Privacy Village
      Location: #cpv-general-text

CRV = Career Hacking Village
      Location: #cahv-general-text

DC = DEF CON Talks
     

DCG = DEF CON Groups
      Location: #dcg-stage-voice

DDV = Data Duplication Village
      Location: #ddv-general-text

DL = DEF CON DemoLabs
     

ENT = Entertainment ( Music )
     

ETV = Ethics Village
      Location: #ev-general-text

FSL = Fireside Lounge
      Location: #fireside-lounge-voice

HHV = Hardware Hacking Village
      Location: #hhv-infobooth-text

HRV = Ham Radio Village
      Location: #ham-general-text

HTS = Hack The Sea
      Location: #htsv-general-text

ICS = Industrial Control Systems Village
      Location: #ics-general-text

IOT = Internet Of Things Village
      Location: #iotv-general-text

LBV = Lock Bypass Village
      Location: #lbpv-social-text

LPV = Lockpicking Village
      Location: #lpv-general-text

MOV = Monero Village
      Location: #mv-general-text

PHVT = Packet Hacking Village Talks
PHVW = Packet Hacking Village Workshops
Wall of Sheep
      Location: #phv-infobooth-text
PAYV = Payment Village
      Location: #pay-labs-text
PWDV = Password Village
      Location: #pwdv-general-text
POV = Policy Village
      Location: #pol-general-text
RCV = Recon Village
      Location: #rv-general-text
RGV = Rogue's Village
      Location: #rov-announcements-text
RTV = Red Team Village
      Location: #rtv-briefings-text

SEV = Social Engineering Village
      Location: #sev-general-text

Vendors Area
      Vendors Discord channel #vendors

VMV = Voting Machine Village
      Location: #vmhv-general-text

WLV = Wireless Village
      Location: #wv-general-text


Speaker List


Anders Fogh
Anders Fogh
Özkan Mustafa Akkus
Aaron Cornelius
Aaron Soto
Abi Hassen
ac0rn
Adam Mashinchi
Adam Mashinchi
Adam Pennington
Adama Ibrahim
Aditi Joshi
AI Village Journal Club
AI Village Organizers
Ajin Abraham
Akira Takahashi
Al Burke
Aleksei Stennikov
Alex Lomas
Alex Lomas
Alex Lomas
Alex Zaheer
Alexander Korotin
Alexandre Beaulieu
Alexandre Sieira
Alexis Hancock
Ali Abdollahi
Ali Abdollahi
Ali Abdollahi
Allan Stojanovic
Allan Tart
Allen Baranov
Allie Barnes
Allie Hansen
Allie Mellen
Allison Donovan
Alvaro Folgado Rueda
Alvaro Munoz
Alyssa Miller
Amèlie Koran
Amber Graner
Amelie Koran
Amit Elazari
Amy Abernethy
Anahit Tarkhanyan
Andrea Downing
Andrea Matwyshyn
Andrew Chu
Andrew Tierney
Ankur Chowdhary
Anna McAbee
Anthony DiFranco
Anthony Rose
April C Wright
Apurv Singh Gautam
Ariel Schön
Arkadiy Litvinenko
Ash Luft
atlas 0f d00m
Austin Marck
Austin Marck
Austin Scott
Avi Zajac
Avi Zajac
Avi Zajac
ayoul3
Barak Schoster
Barak Sternberg
Ben Bornholm
Ben Bornholm
Ben Brook
Ben Dubow
Ben Gardiner
Ben Gardiner
Ben Hughes
Ben Hughes
Benjamin Hovland
Besim Altinok
Bianca Lewis
Bill Demirkapi
Bill Graydon
Bob Wheeler
bombnav
bombnav
Brandon Bailey
Brandon Martinez
Brenda So
Brent Stone
Brent White / B1TK1LL3R
Brig. Gen. William Hartman
Bryson Bort
Bryson Bort
Bryson Bort
C. Nadal
C8 (John Hammond)
Caleb Gardner
Can Demirel
Cannibal
Casey Bourbonnais / ADAM_915
Casey John Ellis
Casey John Ellis
Cathy Gellis
Cecilie Wian
cemaxecuter
Ch33r10
Ch33r10
chaintuts
Chet Hosmer
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chris Abella
Chris Gammell
Chris Krebs
Chris Krebs
Chris Kubecka
Chris Kubecka
Chris Nevin
Chris Nevin
Chris Pimlott
Chris Poore
Chris Wysopal
Christian “quaddi” Dameff
Christian “quaddi” Dameff
Christian Schneider
Christopher Cottrell
Christopher Wade
Chuanda Ding
Colin Cantrell
Colin Estep
comathematician
Comm. Geoffrey Starks
Comm. Rohit Chopra
Connor Morley
Cooper Quintin
Cordero Alexander Delgadillo
Corey Ham
corvusactual
CRob
CRob
Cynthia Kaiser
d1dymu5
Dan Kimmage
Dan Salloum
Dani Goland
Dani
Daniel Gruss
Daniel Gruss
Daniel Miessler
Daniel Roy
Daniel Roy
Daniel Ward
David Bernal Michelena
David Imbordino
David J. Bianco
David Kane-Parry
David Robinson
David Sopas
David Waldrop
Dena Medelsohn
Denise Giusto Bilic
Derrick (CanBusDutch)
Devabhaktuni Srikrishna
Dewank Pant
Dhruv Verma
Diane Janosek
Diane Vavrichek
Diego F. Aranha
Dor Yardeni
Dr Lorenz Adlung
Dr Mohammed Aamir Ali
Dr Steven J. Murdoch
Dr Will Roper
Dr. Catherine Ullman
Dr. Daniel Kim
Dr. Daniel Kim
Dr. Daniel Kim
Dr. Francisco "ArticMine" Cabañas
Dr. Gary Kessler
Dr. Khatuna Mshvidobadze
Dr. Mike Rushanan
Dr. Nina Kollars
Dr. Sarah Blossom Ware
drhyrum
Dylan Ayrey
Dylan The Magician
Ece Gumusel
Eduardo Arriols
Eirick Lurass
Eivind Arvesen
Elie Bursztein
Elizabeth Biddlecome
Elliot
Emilie St-Pierre
Emilio Couto
Emilio Couto
Emily Stamm
Enrico Pozzobon
Erdener Uyan
Eric Escobar
Eric Escobar
erickgalinkin
Erik Hunstad
Erin Miller
Ethics Village Staff
Etizaz Mohsin
Eva Galperin
Evan Anderson
EvilMog
EvilMog
Eyal Itkin
F. Novaes
Fabian Landis
Farith Pérez Sáez
Farith Pérez Sáez
Farith Perez
Fathom5
Federico Lucifredi
Federico Lucifredi
Feng Xiao
Forrest Fuqua
Forrest Senti
Forrest Senti
Fran Ramirez
Francesco Gringoli
Franchesca Spektor
Franchesca Spektor
Franchesca Spektor
Fredrick "Flee" Lee
FreqyXin
Gökberk Gülgün
Gabriel Ryan
Gal Zror
Garrett Enoch
Gokul Alex
Graham Bleaney
Grant Romundt
Gregg Horton
GTKlondike
Gui Michel
Guillermo Buendia
hackingdave
Hadrien Barral
Hank Leininger
Hank Leininger
Hannah Zhao
Hanno Böck
Harley Geiger
Harri Hursti
Harshad Sathaye
Harshad Sathaye
haydnjohnson
Holger Unterbrink
Huajiang "Kevin2600" Chen
I. Shaheem
Ibad Shah
Iceman
idk
Infenet
Infenet
Infenet
Infenet
Irvin Lemus
Ismail Melih Tas
J. DeBlois
Jack Baker
Jack Cable
Jack Cable
Jack McDowell
Jack Mott
Jack
Jackie Speier
Jaime
Jaime
Jaime
Jake “Hubbl3” Krasnov
Jake Labelle
Jake Smith
Jakub Botwicz
James Harrison
James Pavur
James Pavur
Jared Dygert
Jarrod Overson
Jason Haddix
Jason Williams
Javad Dadgar
Javier F. Patiño García
Jay Angus
Jayson E. Street
Jeff “r3plicant” Tully
Jeff “r3plicant” Tully
Jeff Troy
Jeff Troy
Jen Ellis
Jen Goldsack
Jenai Marinkovic
Jenko Hwong
Jeremi M Gosney (epixoip)
Jeremi M Gosney (epixoip)
Jesse Michael
Jessica Wilkerson
Jeswin Mathai
Ji Su Yoo
Ji Su Yoo
Ji Su Yoo
Jiska Classen
João Morais
Jody Westby
Joe Billingsley
Joe Schottman
Joe Schottman
Joe Slowik
Joe Slowik
John Craig
John Felker
John Odum
John the Greek
Jonathan Helmus
Jonathan Stines
Jorge Orchilles
Jorge Orchilles
José Hernandez
Jose Miguel Gómez-Casero Marichal
Jose Rodriguez
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Josh Marks
Josh McIntyre
Josh O'Connor
Josh Stroschein
Josh
Joshua Maddux
Joshua Saxe
Juan Francisco
Julia Reinhardt
Julian Suleder
JunWei Song
Justin Hutchens (“Hutch”)
Justin Paglierani
Kürşat Oğuzhan Akıncı
Kaitlyn Handleman
Kamel Ghali
Kamel Ghali
Kamel Ghali
Kamel Ghali
Karl Koscher
Kat Fitzgerald
Kat Fitzgerald
Kate Venable
Katelyn Bowden
Katie Doroschak
Katie Noble
Katie Noble
Katie Noble
Kaustubh Padwad
Kaylin Trychon
Kelley Robinson
Kelley Robinson
Ken Munro
Ken Munro
kennwhite
Kevin Leffew
Kim Wyman
Kimber Dowsett
Kirsten Renner
Kris Jones
Kris Rides
Kris Rides
Kubilay Ahmet Kucuk
KunYu Chen
Kurt Opsahl
Kyle Benac (aka @B3nac)
Kyle Erickson
Ladislav B
Larry Lewis
Laurin Weissinger
Lawrence Rowell
Lee Wangenheim
Leigh-Anne Galloway
Leisel Bogan
Lennart Koopmann
Leron Gray
Levi
Lisa Bradley
Lisa Bradley
Litmoose
Litmoose
Liz Popiak
Liz Wharton
lmeyerov
Louis Nyffenegger
Lucia Savage
Luis Ángel Ramírez Mendoza (@larm182luis)
Luis Ángel Ramírez Mendoza (@larm182luis)
Luis Ángel Ramírez Mendoza (@larm182luis)
M. DeBlois
M. Tibouchi
Mário Areias
Maddie Stone
Madhu Akula
Maggie MacAlpine
Mangatas Tondang
Mansi Sheth
Mansi Sheth
Marcelo Sacchetin
Marie
Marina Krotofil
Maritza Johnson
Mark Bereza
Mark Morowczynski
Mark Nesbitt
Marleigh Farlow
Marten Mickos
Martin Abbatemarco
Martin Strohmeier
Martinet Lee
Master Chen
Matt Blaze
Matt Cheung
Matt Duren
Matt Eidelberg
Matt Gaffney
Matt Luongo
Matt Murray
Matt Smith
Matt Toth
Matt Weir
Matt Weir
Matthew Byrdwell
Matthew Creel
Matthew Creel
Matthew Gaffney
Matthew Masterson
Mattie Gullixson
Mattie Gullixson
Mauricio Velazco
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mazin Ahmed
Megan DeBlois
Mehmet D. Ince
Menaka BaskerPillai
Mert Can Coşkuner
Mert Can Coşkuner
Michael A. Specter
Michael Antonino
Michael Mimo
Michael Roberts
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Stay
Michael Vanguardia
Michael Wylie
Michael Wylie
Michael Wylie
Michael Wylie
Michael Wylie
Michelle Holko
Mickey Shkatov
Mike Cohen
Mike Lemley
Mike Murray
Mike Raggo
Minga
Minga
Mintynet
Mintynet
Minzhi He
Mitchell Parker
Mixæl Swan Laufer
Mohammad-Reza Zamiri
Mohit Gupta
Mohsan Farid
Monero Village Team
Moshe Kol
Muteki
N∅thing
N∅thing
Nadav Erez
NahamSec
Nahid Farhady
Nahid Farhady
Nailah Mims
Najla Lindsay
nash
Natali
Nate DeNicola
Nathalie Feyt
Neil M
Netspooky
Nick Jones
Nicky Keeley
Nicolas MATTIOCCO
Nicole Chi
Nicole Chi
Nicole Chi
Nils Weiss
Nimit Sawhney
Nimrod Kor
Nina Alli
Nishant Sharma
Nishant Sharma
Noa Novogroder
nohackme
Octavio Fernandez
Oleksandr Mirosh
Olivier Bilodeau
Olivier Bilodeau
Omar Ωr
Omar Ωr
Omar Ωr
Omar Santos
Omar Santos
Omar Santos
Omenscan
Omikron
Otis
Pablo Breuer
Pablo Gonzalez
PacketSqueezins
Pam Melroy
Parker Wiksell
Parsia Hakimian
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Patrick Kiley
Patrick Kiley
Patrick Kiley
Patrick Wardle
Paul Amar
Paul Marrapese
Paul Melson
Paulo Silva
Pedro Umbelino
peiyu wang
Peleg Hadar
Per Thorsheim
Per Thorsheim
Pete Anderson
Pete Cooper
Pete Cooper
Pete Keenan
Pete Radloff
Peter Kacherginsky
Peter Kacherginsky
Peter
Petros Koutroumpis
Philipp Krenn
Phillip Marlow
Phillip Marlow
Phillip Wylie
Plug
Plug
Plug
Poming Lee
Porter Adams
Preston Thomas
R. Jason Cronk
Rémi Géraud-Stewart
Rachel Bozeman
Rachel Lamp
Radu Motspan
Rand0h
Randy Brito
Randy Talley (CISA)
Ray Doyle
rehr
rehr
rehr
rehr
rehr
rehr
rehr
Reza Dorosti
Riana Pfefferkorn
Rick Hansen
Rik van Duijn
Rim Boujnah
Robert Leale (CarFuCar)
Robert Leale (CarFuCar)
Robert Leale (CarFuCar)
Robert Wagner
Roberto Rodriguez
Roberto Rodriguez
Rod Soto
Rogues Village Team
Rogues Village Team
Roman Vitkovitsky
Ron Stoner
Ron Wyden
Rory Mir
Roy Wattanasin
Russell Mosley
Ruth Barbacil
Ryan Elkins
Ryan Rubin
Ryan Slama
Ryoichi Teramura
Ryosuke Uematsu
Sahir Khan
Sajal Thomas
Sam Bowne
Sam Bowne
Sam Bowne
Sam Croley (Chick3nman)
Sam Croley (Chick3nman)
Samir
Samuel Gasparro
Sang-Oun Lee
Sanjana Sarda
Sarang
Scoubi
Scoubi
Sean Metcalf
Sebastian Banescu
Serkan Temel
Seth Carmody
Setu Parimi
Seungjoo
sgp
Shay Nehmad
Shlomi Oberman
Shogo Nakao
ShortTie
ShortTie
ShortTie
ShortTie
Shruti Lohani
Shusei Tomonaga
Sidd Gejji
Simon Weckert
Slava Makkaveev
Spencer Cureton
Spencer Gietzen
Stanislas Molveau
Stephanie Singer
Stephen Gerling
Steve Newell
Steven Bernstein
Suhyeon Lee
Susan Greenhalgh
Suzanne Schwartz
Tanner Barnes (aka @_StaticFlow_)
Tatsuya Katsuhara
Teejay
Tejaswa Rastogi
The Dark Tangent
The Dark Tangent
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Red Dragon
TheDrPinky
Thomas Hayes
Tim Brom
Tim Doomsday
Tim Wadhwa-Brown
Tim Yardley
TimDotZero
Timur Yunusov
Tod Beardsley
Tom
Tomer Bar
Tomoaki Tani
Tony M Lambert
Tony Virelli
Tracy Rosenberg
Travis LeBlanc
Travis Palmer
Trevor Stevado t1v0
Trey Keown
Troy Brown
ttheveii0x
Tyler Boykin
Uri Rivner
Utku Sen
Utku Sen
Vahid Behzadan
Valentina Palacín
Vandana Verma Sehgal
Vandana Verma Sehgal
Vee Schmitt
Veronica
Veronica
Vic Harkness
Victor Fang
Victor Gomez
Vidya Murthy
Vidya Murthy
Vincent “Vinnybod” Rose
Viral Maniar
Vyrus
Walter Cuestas
Wes Lambert
Wes Lambert
Wesley Neelen
Whitney Champion
wytshadow
Xavier Ashe
Xavier Ashe
Xiang Wen Kuan
Y. Yarom
Yamila Levalle
Yannick Le Ray
Yong-Bee
Younghoo Lee
Yuchao (Alex) Zhang
Yusuf Henriques
Z. Anderson
Zach Singleton
zeefeene
zh4ck
Zhanna Malekos Smith
Zhipeng Huo

Talk List


"SECRETS ARE LIES, SHARING IS CARING, PRIVACY IS THEFT."- A Dive into Privacy Preserving Machine Learning - AIV
10,000 Dependencies Under The Sea: Exploring and Securing Open source dependencies - ASV
21 Jump Server: Going Bastionless in the Cloud - CLV
2FA in 2020 and Beyond - ASV
40,000 Leagues UUV Death Match - HTS
5 Quick Wins for Improving your ICS Cybersecurity Posture - ICS
50 Shades of Sudo Abuse - RTV
7 Phases of Smart Contract Hacking - BCV
747 Walkthrough From A Hacker's Perspective - AEV
A Basic Ham Station Setup - HRV
A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven - DC
A Deeper Dive Into ILS And ADS-B Spoofing - AEV
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning - DC
A Heaven for Hackers: Breaking a Web Security Virtual Appliances - ASV
A Lawyer's Reflections on Elections - VMV
A N00b's Intro to Building Your Own Lab (Beginner) - BTVW2
A Panel with the Feds on Election Security - VMV
A Policy Approach to Resolving Cybersecurity Problems inthe Election Process - VMV
A View From The Cockpit: Exploring Pilot Reactions To Attacks On Avionic Systems - AEV
Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT - DC
Acid T - ENT
Adding new features by manipulating CAN bus - CHV
Advanced APT Hunting with Splunk - PHVW
Advancing Medical Device Security – How collaboration between providers, manufacturers, and pen testers is advancing what’s possible with security. - BHV
Aerospace Village Badge - AEV
AI vs. Airplanes and IT-Security: What Security Regulations Teach Us About AI Governance - AIV
All Aboard the CAN Bus… or Motorcycle - CHV
All of the threats: Intelligence, modelling and hunting through an ATT&CKers lens - RTV
AMA w/@hackingdave & @kennwhite - POV
AMA w/Policymakers - POV
Ambly, the Smart Darknet Spider  - RCV
An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - BTVW2
An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - BTVW2
Analysis of the Attack Data Collected During Mobile Voting Pilots - VMV
Android Application Exploitation - RTV
Android Bug Foraging - ASV
Android Malware Adventures - RTV
API (in)Security TOP 10: Guided tour to the Wild Wild World of APIs - ASV
Applied Ca$h Eviction through ATM Exploitation - DC
Applying Pysa to Identify Python Security Vulnerabilities - ASV
APRS: Automatic Packet Reporting System Demo - HRV
APTs <3 PowerShell and Why You Should Too - RTV
Architecting Modern Payment Gateways in .Net core with Azure - PAYV
Ask the EFF/Meet the EFA - FSL
Assembling VULNtron: 4 CVEs that Turn a Teleconference Robot into a Spy - IOT
Attacking and Defending Blockchain Nodes - BCV
Attacking Flight Management Systems: This Is Your Captain Speaking, We Have A Small Problem! - AEV
Attacking the Helmsman - CLV
ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project - RTV
Automating Threat Hunting on the Dark Web and other nitty-gritty things - RTV
Automotive Ethernet for the rest of us - CHV
Automotive Ethernet for the rest of us - CHV
Automotive In-Vehicle Networks - CHV
Automotive In-Vehicle Networks - CHV
Autonomous Security Analysis and Penetration Testing (ASAP) - RTV
Azure AD Logs for the Blue Team (Intermediate) - BTVW1
Baby's First 100 MLSec Words - AIV
Back to the future: Computer science and systems biology  - RTV
Bad Active Directory (BAD) - PHVW
Badge Clinic - MOV
Badge Clinic - MOV
Basic OSINT: Mining Personal Data - DCG
Be Like Water: What Bruce Lee Can Teach Us About AppSec - ASV
Before J1939: A J1708/J1587 Protocol Decoder - CHV
Beyond Root: Custom Firmware for Embedded Mobile Chipsets - DC
Blackmail, Extortion and the Ethics of Disclosure - ETV
Blockchain for Cyber Defense: Will it be as good as you think? - BCV
Blue Team Village & Red Team Village Panel - BTVT1
Bluetooth Security in Automotive - CHV
Bluetooth Security in Automotive - CHV
Bobby Pins, More Effective Than Lockpicks? - LPV
Breakdown Of The FAA's Privacy ICAO Address Program - AEV
Breaking the Attack Chain - RTV
Build a Raspberry AIS - HTS
Building a Microcontroller Bitcoin Address Generator - BCV
Building a Physical Testbed for Blackstart Restoration under Cyber Fire - ICS
Building BLUESPAWN: An Open-Source, Active Defense & EDR Software (Intermediate) - BTVT1
Building Connections Across The Aviation Ecosystem - AEV
Building Teams in the New Normal - CRV
Burnout is real - RCV
But I Still Need A Job! - CRV
Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks - DC
Bypassing in Mobile Network From Red-Team Points of View - RTV
Bytes In Disguise - DC
CAN be super secure: Bit Smashing FTW - CHV
Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - CLV
Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - ASV
Car (to Cloud) Talk: Using MQTT for Car Hacking - CHV
Car (to Cloud) Talk: Using MQTT for Car Hacking - CHV
Carnivore (Microsoft External Attack Tool) - DL
Carnivore (Microsoft External Attack Tool) - DL
Catch Me if You Can - RTV
Chairman Benjamin Hovland, US Election Assistance Commission - VMV
Checklist For Aviation Vulnerability Disclosure: Don't Go It Alone - AEV
Chinese Military Labratory Mission + COVID-19 - BHV
ChupaCarBrah: Open Source Hardware and Software for Interacting with your Vehicle CAN Bus - CHV
CIRCO v2: Cisco Implant Raspberry Controlled Operations - DL
CIRCO v2: Cisco Implant Raspberry Controlled Operations - DL
Closing Ceremonies - DC
Closing Note - CLV
Closing talk - MOV
Cloud Frontier - CLV
Cloud host base strategy by staging defensive tools for Threat Hunting and Forensics - CLV
Cloud Security Monitoring on a Dime Store Budget (Beginner) - BTVW2
Cloud Village CTF - CLV
Cloud-Native Attack Detection and Simulation. - CLV
Cluster fuzz! - CHV
Cluster fuzz! - CHV
CMAP: Open Source Vehicle Services Mapping Tool for noobs - CHV
Combining notebooks, datasets, and cloud for the ultimate automation factory - RTV
Confessions of an Offensive ICS Cyber Security Researcher - ICS
Cons and Careers - CRV
Cotopaxi: IoT Protocols Security Testing Toolkit - DL
COVID 1984_ Propaganda and Surveillance during a Pandemic - RCV
Cracking at Extreme Scale: The Evolution of Hashstack (Rebroadcast) - PWDV
Cracking at Extreme Scale: The Evolution of Hashstack - PWDV
Creating a decentralized storage for Kubernetes with Tardigrade and Velero - BCV
Critical Aerospace Cybersecurity: How Hacking And Designing Aerospace Systems Is Changing - AEV
Cryptocurrencies have superusers? - BCV
Cybersecurity informed consent for medical devices - BHV
Cybersecurity Lessons Learned From Human Spaceflight - AEV
Cybersecurity Meets Aviation Regulation - AEV
Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI (Intermediate) - BTVW1
D0 N0 H4RM: A Healthcare Security Conversation - FSL
Data Analysis for Detection Research Through Jupyter Notebooks 101 (Beginner) - BTVW2
DAY1 KEYNOTE: The Trust Talks - BHV
DAY2 KEYNOTE: Understanding DIYBio and Community Labs - A Social Science Approach - BHV
DAY3 KEYNOTE: Why is Security Hard? - BHV
Decentralization in a Centralized world - MOV
Decentralized Finance (DeFi) - ready for prime time ? - BCV
Deep Dive into Adversary Emulation - Ransomware Edition - RTV
DEF CON Groups Panel - DCG
Defending Your UNIX Hosts (Intermediate) - BTVW1
Demystifying Modern Windows Rootkits - DC
Deploying Pi-hole: More Than an Ad Blocker (Beginner) - BTVW1
Detecting Fake 4G Base Stations in Real Time - DC
Detecting hand-crafted social engineering emails with a bleeding-edge neural language model - AIV
Detecting The Not-PowerShell Gang (Intermediate) - BTVT1
Differential Privacy..more important than ever in the world of Covid-19 - CPV
Digital Health Technologies in the NIH All of Us Research Program - BHV
Discovering Cloud File Storage Artifacts - CLV
Discovering ELK The First Time - Lessons Learned Over 2 Years (Beginner) - BTVT1
Discovering Hidden Properties to Attack Node.js ecosystem - DC
Discussion: What makes a good ham radio operator? - HRV
Dissecting Wireless Privacy In Aviation - AEV
DIY Diabetics and a Million Boluses - BHV
Dj St3rling - ENT
DNS New World Order, version 1.4: QuadX! DoH! DoT! Da Fuq? - DCG
DNS Privacy - CPV
DNSSECTION: A practical attack on DNSSEC Zone Walking - DC
Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise - DC
Don't Be Silly - It's Only a Lightbulb - DC
Don't Ruck Us Again - The Exploit Returns - DC
Don’t Go Postal Over Mail In Voting - VMV
Doors, Cameras, and Mantraps OH MY! - LPV
Dos, Donts and How-Tos of crypto building blocks using Java - CPV
Double Spending in BSV, is it Possible? - BCV
DragonOS - How I kept busy during COVID19 - WLV
Drinks with Recruiters - CRV
Dumpster Fires: 6 Things About IR I Learned by Being a Firefighter - PHVT
EFF Tech Trivia Pub Quiz - CNE
Election Security - POV
Electronic Ballot Return Standards & Guidelines - VMV
Emulating an Adversary with Imperfect Intelligence - RTV
Entrepeneurial Adventures: What It Takes to Start A Company - CRV
Enumerating Cloud File Storage Gems - RTV
ERPwnage - a red team approach to targeting SAP - RTV
European regulatory trends for Artificial Intelligence: same impact on US as GDPR? - CPV
Evil Genius: Why you shouldn't trust that keyboard - RTV
Evil Printer: How to Hack Windows Machines with Printing Protocol - DC
Executing Red Team Scenarios with Built-in Scenario Place - RTV
Experimental Aviation, Risks And Rewards - AEV
exploit insecure crypto wallet - BCV
Exploiting Key Space Vulnerabilities in the Physical World - DC
Exploiting Spacecraft - AEV
Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research - IOT
Faults in our Pi Stars: Security Issues and Challenges in Deep Reinforcement Learning - AIV
Fear and Loathing in Payment Bug Bounty - PAYV
Fear, Uncertainty, and Doubt about Human Microchip Implants - CPV
Federal Communications Commission - ETV
Federal Trade Commision - ETV
Fighting a Virus with a Spreadsheet (Beginner) - BTVT1
File Encryption For Actual Humans - CPV
Film Festival: Project Immerse: A Deepfake Paranoid Thriller - CNE
Film Festival: Project Immerse: A Deepfake Paranoid Thriller - CNE
Finding and Exploiting Bugs in Multiplayer Game Engines - DC
Fireside Chat with Dr. Amy Abernethy and Adama Ibrahim - BHV
Fireside Chat: All about Section 230, the EARN IT Act, and What They Mean for Free Speech and Encryption - CPV
Food and Drug Administration - ETV
From Barista to Cyber Security Pro, Breaking the Entry Level Barrier - CRV
From Blackbox to Automotive Ransomware - CHV
From Discovery to Disclosure - RTV
From Printers to Silver Tickets or Something (Rebroadcast) - PWDV
From Printers to Silver Tickets or Something - PWDV
Fundamentals of Diagnostic Requests over CAN Bus - CHV
Fundamentals of Diagnostic Requests over CAN Bus - CHV
Future Proofing Your Career - CRV
General Aviation (GA) Electronic Flight Bags (EFB) - AEV
Getting Advanced with Hashcat (Rebroadcast) - PWDV
Getting Advanced with Hashcat - PWDV
Getting Shells on z/OS with Surrogat Chains - DC
Getting Started – Building an IoT Hardware Hacking Lab - IOT
Getting Started with Hashcat (Rebroadcast) - PWDV
Getting Started with Hashcat - PWDV
Getting started with the Intervillage badge - MOV
Ghosting the PACS-man: New Tools and Techniques - WLV
Google Maps Hacks - RGV
Government Espionage on a School Lunch Budget - DCG
GPS Spoofing 101 - AEV
Graylog: An Introduction Into OpenSOC CTF Tools - BTVT1
Grey Hat SSH: SShenanigans - RTV
Guerrilla Red Team: Decentralize the Adversary - RTV
Hack the SeaPod - HTS
Hack the SeaPod - HTS
Hack-a-Fax - VMV
Hack-A-Sat Closing Segment - AEV
Hack-A-Sat End Of Day Recap - AEV
Hack-A-Sat Friday Recap - AEV
Hack-A-Sat Kickoff Segment - AEV
Hack-A-Sat Launch Party - AEV
Hacker Jeopardy - CNE
Hacker Jeopardy - CNE
HackerBox 0057 Build Session - HHV
HackerBox 0057 Build Session - HHV
Hackers And ISACS - AEV
Hacking Aerospace Cybersecurity Regulation - AEV
Hacking Airplane Air To Ground (A2G) Systems - AEV
Hacking Democracy II: On Securing an Election Under Times of Uncertainty and Upheaval - VMV
Hacking like Paris Hilton 14 years later - and still winning! - CPV
Hacking Ludicrous Mode on a Tesla (moar powerr!) - CHV
Hacking Security Leadership - CRV
Hacking smart-devices for fun and profit: From exploiting my smart-home into controlling thousands of smart-devices around the world - IOT
Hacking TESLA Model 3 - NFC Relay Revisited - CHV
Hacking the Hybrid Cloud - DC
Hacking the Insulin Supply Chain To Save Lives - BHV
Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices - DC
Hacking traffic lights - DC
Hacking with Skynet - How AI is Empowering Adversaries - AIV
Hacking Zoom: a Hacker's Journey into Zoom Security - RTV
Hackium: a browser for web hackers - ASV
Ham Radio USA License Exams (Friday) - HRV
Ham Radio USA License Exams (Saturday) - HRV
Ham Radio USA License Exams (Sunday) - HRV
Hardware hacking 101: There is plenty of room at the bottom - HHV
Hardware hacking 101: There is plenty of room at the bottom - HHV
Hashes; Smothered, Covered, and Scattered: Modern Password Cracking as a Methodology - RTV
Have my keys been pwned? - API Edition - RTV
Heightened Election Security Risks Admist the Pandemic - VMV
Hella Booters: Why IoT Botnets Aren't Going Anywhere - IOT
High Security Wafer Locks - An Oxymoron? - LPV
Houston, we CAV a problem - CHV
How Blue Penetrates You - CLV
How COVID19 Changed Our Understanding of Cyber Disaster Medicine - BHV
How I defeated the Western Electric 30c - LPV
How Independent Security Researchers work with Medical Device Manufacturers - The Bad, The Ugly & The Great (BUG) - BHV
How to get rights for hackers - IOT
How to Grow a Brain in a Jar - Neuroengineering 101 - BHV
How to hack SWIFT, SPID, and SPEI with basic hacking techniques (from a Red Team Perspective) - RTV
How to Start a Movement: Hackers Edition - ETV
How to store sensitive information in 2020? - CPV
How we recovered $XXX,000 in Bitcoin from an encrypted zip file - DC
Hunting for Blue Mockingbird Coinminers - RCV
Hybrid PhySec tools - best of both worlds or just weird? - LPV
Hyperlocal Drift detection with Goko: Finding abusers of your Dataset - AIV
IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP) - CLV
Icetre Normal - ENT
ICS Village CTF Kick-Off - ICS
Identifying and fixing out-of-gas errors in smart contracts with smart fuzzing - BCV
Identity Crisis: the mad rise of online account opening fraud - PAYV
ILS and TCAS Spoofing Demonstration - AEV
Importing vector graphics in to EagleCAD - HHV
In search of the perfect UPnP tool - IOT
In theory, there is no difference between theory and practice - CRV
Incident Response and the ATT&CK Matrix (Beginner) - BTVW2
Incident Response Panel - BTVT1
Indicators of Emulation (Intermediate) - BTVT1
Indicators of Emulation: Extra Spicy Adversary Emulation - RTV
Industrial Cybersecurity in Mexico - ICS
Infodemic: Threat models for patient communities on social networks - BHV
Initial Compromise through Web Side - RTV
Inside the Mind of a Threat Actor: Beyond Pentesting - RTV
Intro to DC603 - DCG
Intro to DC858 - DCG
Intro to high security locks and lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Introducing DropEngine: A Malleable Payload Creation Framework - RTV
Introducing Melbourne DCG by Allen and Friends - DCG
Introducing the Meet a Mentor Program - BTVT1
Introduction To ACARS - AEV
Introduction to Malware Analysis & Response (MA&R) (Beginner) - BTVW1
Introduction to U-Boot Interaction and Hacking - IOT
Introduction to WiFi Security - WLV
Intrusion Analysis and Threat Hunting with Open Source Tools - PHVW
IoT Hacking Stories in Real Life - IOT
IoT Honeypots and taming Rogue appliances - IOT
IoT Under the Microscope: Vulnerability Trends in the Supply Chain - IOT
jeopardize - DL
jeopardize - DL
John Odum, Montpelier, VT - VMV
Journal Club Live! Fawkes FR - AIV
JWT Parkour - ASV
Key Duplication - It's not just for the movies! - LPV
Key Ingredients for the Job Interviews (Virtual or Face-2-Face) - CRV
Key Note - State of Blockchain Security - BCV
Keynote Remarks: Representative Jackie Speier - VMV
Keynote Remarks: Senator Ron Wyden - VMV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote - ICS
Keystone to the Kingdom - LPV
Kibana: An Introduction Into OpenSOC CTF Tools - BTVW1
Kicking Devices and Taking CVEs : The Zoomer’s Guide to Hacking Shit - IOT
Killer Robots Reconsidered - ETV
Knock knock, who's there? Identifying assets in the cloud - RTV
Kubernetes Container Orchestration Security Assessment - ASV
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment - RTV
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage - CPV
Lateral Movement and Privilege Escalation in GCP; Compromise any Organization Without Dropping an Implant - DC
Law School for Lockpickers - LPV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learning to Use Logic Analyzers - IOT
Least privilege using infrastructure as code - CLV
Length 15 & No Change. Implementing NIST SP800-63B for real (Rebroadcast - PWDV
Leveraging the critical YARA skills for Blue Teamers (Beginner) - BTVW1
Live Q&A with Special Guests Regarding "Kill Chain" - VMV
Live SE Q&A - SEV
localghost: Escaping the Browser Sandbox Without 0-Days - ASV
Locha Mesh: Monero off-the-grid - MOV
Low Value Indicators For High Value Decisions (Intermediate) - BTVT1
Low-Cost VHF Receiver: Eavesdropping Pilot/Controller Communication - AEV
Making Breach and Attack Simulation Accessible and Actionable with Infection Monkey - from IT to the C-suite - RTV
Making Next Generation Drugs at Home - BHV
Making sense of EMV card data – decoding the TLV format - PAYV
Making Targeted Wordlists (Rebroadcast) - PWDV
Making Targeted Wordlists - PWDV
MalConfScan with Cuckoo - DL
Mechanizing the Methodology: Automating Discovery, Testing, and Alerting using Recon/Testing Tools and Amazon SES - RTV
Media Analysis of Disinformation Campaigns - PHVT
Medical Device Vulnerability Disclosure - BHV
Medical Technology: How do we unfuck things - BHV
MedICS - BHV
Meetup: 3H: Hardware Happy Hour - HHV
Meetup: Certification Processes (UL, FCC, etc.) - HHV
Meetup: Legacy Hardware - HHV
Meetup: OSS ASIC - HHV
Meetup: PCB Proto and Rework - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Sourcing Parts - HHV
Meetup: Sourcing Parts - HHV
Meetup: Wearables - HHV
Mica Husky - ENT
Mis/Dis Information & Democracy - POV
Misbehavior Detection for V2X communication - CHV
Misinformation & Covid - AIV
Miss Jackalope - ENT
Mission Kill: Process Targeting in ICS Attacks - ICS
MITM - The Mystery In The Middle. An Introduction To The Aircraft Information Systems Domain - AEV
MITRE ICS ATT&CK - ICS
ML Security Evasion Competition 2020 - AIV
Mobile Security Framework - MobSF - DL
Modeling systematic threat: testing on mainnet fork - BCV
Models of Privacy Norms - ETV
Modern Red Team Tradecraft - Informing Defenders by Evolving Your Attackers - RTV
Monero Wallet Basics: Sending, Receiving, Proving - MOV
Monetary Maximalism and Millennial Finance - Building Decentralized Tooling to Empower Everyone - BCV
Movie Stream - Lost World - DC
NAND Flash – Recovering File Systems from Extracted Data - IOT
National Service Panel: Career Opportunities Supporting the Country - CRV
Next level stalker ware - CPV
Ninjula - ENT
No Question: Teamviewer, Police and Consequence (Beginner) - BTVT1
No Tech Talks - CNE
O365Squatting (Intermediate) - BTVT1
OBD and what we CAN do with it - CHV
OBD and what we CAN do with it - CHV
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing - RTV
Office Drama on macOS - DC
On the insecure nature of turbine control systems in power generation - ICS
onkeypress=hack(); - HHV
onkeypress=hack(); - HHV
Online Ads as a Recon and Surveillance Tool - CPV
Online Banking Security - PAYV
Online Voting: Theory and Practice - CPV
Only takes a Spark - Popping a shell on a 1000 nodes - DC
Open Live Chat for all Speakers or another talk on Ethics of Moderation - ETV
Open Office Q&A w/ Monero Research Lab's Sarang - MOV
Open Ventilator Remote Monitoring Project - BHV
Open-Source Tools for Hunting and Practical Intelligence (Intermediate) - BTVW1
Opening Remarks: Getting The Aerospace Village To Take-Off - AEV
Opening Remarks - AIV
Operationalizing Cyber Norms: Critical Infrastructure Protection - ICS
Osquery: An Introduction Into OpenSOC CTF Tools - BTVW1
OSTWERK Initiative - HRV
OU having a laugh? - RTV
Our journey into turning offsec mindset to developer's toolset - ASV
OuterHaven - The UEFI Memory Space Just Itching to be Misused (Intermediate) - BTVT1
Outs, Forces, and Equivoque: A treatise on how Magicians speak - RGV
OWASP API Top 10 - DCG
Packet Acquisition: Building the Haystack - PHVT
Pandemic In Plaintext - IOT
Panel: The Joy of Coordinating Vulnerability Disclosure - RTV
Password cracking beyond 15 characters and under $500 - RTV
PathWell: Dynamic Password Strength Enforcement (Rebroadcast) - PWDV
PathWell: Dynamic Password Strength Enforcement - PWDV
PatrOwl - Red flavour of SOC automation - RTV
Peeling Back the Layers and Peering Through the Clouds with Security Onion - CLV
Performance - RGV
Performance - RGV
Phirautee - DL
Pickpocketing @ Home - RGV
Playing with Electricity: Hacking into Distribution Companies - ICS
Porcupine: Rapid and robust tagging of physical objects using DNA with highly separable nanopore signatures - BHV
PoS Terminal Security Uncovered - PAYV
PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - ICS
PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - CHV
Practical Advice on Threat Hunting Panel - BTVT1
Practical PCFG Password Cracking (Rebroadcast) - PWDV
Practical PCFG Password Cracking - PWDV
Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based Audit & Attack Tool - DC
Practice 'Net' via Discord - HRV
Product Cybersecurity: Secure Airplane Development Lifecycle - AEV
Proposed Mitigation Measures to Address a Disruption Such as The Economic Impact of COVID -19 on Transaction Capacity and Fees in Monero - MOV
Protecting Elections with Data Science -- A Tool for 2020 and Beyond - VMV
Purple On My Mind: Cost Effective Automated Adversary Simulation (Intermediate) - BTVT1
PWN The World - RTV
Pwn2Own Qualcomm compute DSP for fun and profit - DC
Pwning Your Resume - CRV
PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - DL
PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - DL
Quantum Computers & Cryptography - CPV
Quark Engine - An Obfuscation-Neglect Android Malware Scoring System (Beginner) - BTVT1
Ransom in the Cloud - CLV
Realistic Trends in Vulnerability based on Hacking into Vehicle - CHV
Red Team Village Announcements and Remarks - RTV
Red Team Village Closing Ceremony and Announcement of Winners of CTF and CyberWraith  - RTV
Red Team Village CTF - Finals - RTV
Red Team Village CTF - Prequal - RTV
Red Team Village Opening Remarks - RTV
Red Teaming: Born from the Hacker Community - RTV
Redefining patient safety in the digital era - BHV
redlure - DL
redlure - DL
RedTeamOps - Managing Red Team Infrastructure as a Red Teamer - RTV
Remediation Framework - Auto respond to AWS nightmares. - CLV
Remote Online Balloting Delivery and Marking Options and Security Considerations for Absentee Voting During the COVID-19 Pandemic - VMV
Result of Longer Passwords in Real World Application (Rebroadcast) - PWDV
Result of Longer Passwords in Real World Application - PWDV
Reverse Engineering the Tesla Battery Management System for Moar Powerrr! - DC
Reversing with Dynamic Data Resolver (DDR) – Best practice (Advanced) - BTVT1
Reviewing MS08-067, Illustration Of An Old Chapter - RTV
Rights You Can’t Exercise Can’t Protect You: Privacy by Design, Dark Patterns, and Cultural Context - CPV
Rogues adventure & the intervillage badge - RGV
Rogues Village Introduction - RGV
Room for Escape: Scribbling Outside the Lines of Template Security - DC
Running an appsec program with open source projects - ASV
Russian Cyber Threats in The Pandemic Era - BHV
SaaSpocalypse - The Complexity and Power of AWS Cross Account Access - CLV
Safecracking for Everyone! - LPV
Satellite Orbits 101 - AEV
Saving Yourself from Microsoft: It's by design - DCG
Secretary Kim Wyman, Washington - VMV
Secure Your Code — Injections and Logging - ASV
Securing AND Pentesting the Great Spaghetti Monster (k8s) - RTV
Securing the COSMOS: How to operate and secure a validator - BCV
Security Focused Operating System Design - BCV
Security of Election Systems: A contract case study in progress - ETV
See Something, Say Something - VMV
Shadowvex - ENT
Shrek, Juggs, and Toxic Trolls: a BADASS discussion about Online Sexuality and Hacktivism - FSL
Single Board Computers in Amateur Radio - HRV
Skittish & Bus - ENT
So You Got an SDR: Common Signals and the Wiki - HRV
Sounds Legit: Why you shouldn't trust that speaker - RTV
Spectra—New Wireless Escalation Targets - DC
Spectrum: An End-to-End Framework for ML-based Threat Monitoring and Detection - AIV
Speed 2: The Poseidon Adventure – When Cruise Ships Go Wrong - HTS
Starkiller - DL
Starkiller - DL
STARTTLS is Dangerous - CPV
Static analysis of Infrastructure as code: Terraform, Kubernetes, Cloudformation and more! - CLV
Stepped on a Nail - IOT
Subxian - ENT
Suricata: An Introduction Into OpenSOC CTF Tools - BTVW1
Take Down the Internet! With Scapy - PHVT
Talking to Satellites - HRV
Talking To Satellites - 101 - AEV
TechCongress - ETV
tense future - ENT
Terrestrial Access Network - ENT
The Art of Balancing: A Burnout Talk - RTV
The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections - VMV
The Basics Of Breaking BLE v3 - WLV
The Bug Hunter’s Methodology - RTV
The DevOps & Agile Security Toolkit - ASV
The Elephant in the Room: Burnout - ASV
The future of IoT Security “Baselines,” Standards, and Regulatory Domain - IOT
The Individual Contributor to Tech Executive, or There and Back Again - CRV
The Journey of ICS Project Files - Visibility and Forensics to Exploitation - ICS
The Joy of Coordinating Vulnerability Disclosure - IOT
The K0BAK Rover Van - HRV
The Norwegian Blue: A lesson in Privacy Engineering - CPV
The Student Roadmap to Becoming A Penetration Tester - RTV
The Underestimated Threat Vector: Homogeneity - BHV
The Vulnerability That Gmail Overlooked and Enabling Threat Hunting - PHVT
The Worst Mobile Apps - PHVT
This year's village badge - MOV
Threagile - Agile Threat Modeling with Open-Source Tools from within Your IDE - ASV
Threat Hunting with the Elastic Stack (Beginner) - BTVW2
Threat Modelling the Death Star - ASV
Ticketing To Takeoff: An Airport Hacking Choose Your Own Adventure - AEV
Total E(A)gression - RTV
Towards an Institutional Review Board for Biohackers - BHV
Tracer FIRE 9 (Intermediate) - BTVW1
Trends in the online card payment security - PAYV
Tricky Bundles: Smarter Dependency Management for I2P-Bundling Applications - MOV
Trust And Truth In Space Situational Awareness - AEV
Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры - RTV
Turning Telemetry and Artifacts Into Information (Intermediate) - BTVW1
Twitter Word Phrequency - RCV
Twitter’s Tax Day Disaster: The Beginning (and End) of Mainstream Crypto Scams - BCV
U.S. Privacy and Civil Liberties Oversight Board Member - ETV
Understanding Cyber-Attacks and Their Implications to Democratic Regimes - VMV
Understanding the Threat: Malicious Software, Malicious Actors, and the Promise of Connected Medical Technology - DCG
Velociraptor: An Introduction Into OpenSOC CTF Tools - BTVW1
Verifiable Delay Functions for preventing DDoS Attacks on Ethereum 2.0 - BCV
Veteran Transition Tips - CRV
Village Closing Commentary - HRV
Village Opening Remarks - HRV
Violent Python 3 - PHVW
Vivisecting PowerPC - ICS
Vote @ Home Workshop - ETV
Vote-from-home? Review of Election Security on Remote Voting in Response to COVID-19 - VMV
Vulnerability Discovery - Tips for Surviving and Thriving - ICS
War By Other Means: How Influence Operations Undermine Democracy - VMV
War Story Bunker - CNE
Weaponized XSS - Moving Beyond Alert(1) - RTV
Web Shell Hunting - Part 1 - ASV
Web Shell Hunting - Part 2 - ASV
Welcome and Kick-Off - VMV
Welcome Speech - MOV
Welcome to DEF CON Safe Mode - DC
Welcome to the Payment Village - PAYV
What college kids always get wrong, the art of attacking newbies to blueteam - RTV
What I Learned Trying To Hack A 737 - AEV
What if we had TLS for phone numbers? An introduction to SHAKEN/STIR - CPV
What the Shuck? Layered Hash Shucking (Rebroadcast) - PWDV
What the Shuck? Layered Hash Shucking - PWDV
What's up with proposed privacy legislation and how to influence the debate - BHV
When TLS Hacks You - DC
Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks - DC
Who needs spyware when you have COVID-19 apps? A look at global trends and what to do about it. - CPV
Who’s secure, who’s not, & who makes that choice - ASV
Whose Slide is It Anyway - CNE
wicked wardriving with gps and glonass - WLV
Wireless Blue Team - WLV
Wireless Village Fireside Talk - WLV
Wireshark for Incident Response & Threat Hunting (Beginner) - BTVW2
Wireshark for Incident Response & Threat Hunting - PHVW
Workshop: Let's Talk About Abusability Testing - CPV
Workshop: Let's Talk About Abusability Testing - CPV
Workshop: Let's Talk About Abusability Testing - CPV
Writing Wireshark Plugins for Security Analysis - PHVW
Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah? - RTV
Yacht PWNed - HTS
Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Time Replay Session Instantiation Attacks - RTV
You're Adversary Within - The Golden Age of Insider Threats - RTV
You're not the money printer, or why we need to separate coinbase rings - MOV
Your connected world isn't yours anymore! - Remote IoT attacks and data exfiltration. - IOT
Zebbler Encanti Experience - ENT
Zeek: An Introduction Into OpenSOC CTF Tools - BTVW1
Zero Trust - A Vision for Securing Cloud and Redefining Security - RTV

DEF CON News


DEF CON Discord: https://discord.gg/defcon

DEF CON 28 SAFE MODE Artwork Contest Winners!

DEF CON Safe Mode Rita Tu Artwork Contest image DEF CON Safe Mode Hannah Diaz Artwork Contest image

We want to offer our heartfelt thanks to everyone who entered the DEF CON Safe Mode Art Contest. We’re always amazed at the level of talent in this community.

This year’s runner up is a stylish meditation on the profusion of connectivities that characterize modern life by Rita Tu.

Much like Highlanders, however, in the end there can be only one. This year’s highlander is @hannahdiazart. The entry has both wide-eyed discovery (very on theme) and boxes full of random electronics (super relatable). Also a robot dinosaur. It communicates something about the hacker spirit that is both warm and life-affirming.

Congratulations to Hannah and Rita and thanks again to everyone who participated.

SAFE MODE Content is Live!

DEF CON Safe Mode DT Welcome image

To get the party started, we’re releasing a bunch of the content early. Over on the media server , we’ve got all of the main stage talks and materials, the soundtrack, demo labs, art, CTF, music - take what you like. Completists out there, we see you. There’s a very thicc torrent file as well. Take some time to watch the talks you’ve been waiting for at your leisure, so you’re ready for the live Q&A sessions starting Thursday. This will be the first DEF CON where you won’t have to pick between main stage talks and the rest of the show, so take advantage. If you had plans, we apologize.

So close now!

Upgrade to Human Plus, and Show your Support!

DEF CON Safe Mode Human Plus image

DEF CON Safe Mode is almost here! We hope you’re as excited as we are. For everyone looking to support DEF CON in this unusually difficult time, we have a new option for you to consider - Human PLUS.

Safe Mode is free to all Humans, but you can upgrade to Human Plus for $20 USD on the DEF CON Discord for a few upgraded privileges. You get stuff like the ability to post pics and links, change your nick, access to Plus only chill out rooms and the good feeling that you’ve helped keep DEF CON alive until we meet again in Vegas. The information is all spelled out on https://defcon.org/dc-safemode-plus.html .

Your support makes DEF CON possible, and we appreciate all the encouragement and enthusiasm you’ve brought to this first-time online event. Thanks for sticking with us - we can’t wait until we get to do it again in person. DEF CON hearts you.

DEF CON Safe Mode Villages Are Live!

DEF CON Safe Mode Demo Labs image

More DEF CON Safe Mode News - The Villages Page is LIVE ! Check out the 30 (!) villages that are taking part and start planning your Con. Links are provided to the appropriate DEF CON forum nodes for each village and the various info you’ll need to participate. We’re almost there, people. #getpsyched!

Demo Labs are Back for Safe Mode!

DEF CON Safe Mode Demo Labs image

The ever-popular DEF CON Demo Labs are returning for #defconsafemode! Support open-source hotness and the work of your fellow hackers and maybe even get some inspiration for your own projects. The full list of offerings is live on the DEF CON Demo Labs Page !

Check out the DEF CON Safe Mode Speaker Page and Schedule!

DEF CON Safe Mode Corona Jack image

It’s #defconsafemode alert time again! The main track talk schedule and speaker page for #defcon28 is now #live! Permission to get psyched is #granted. More announcements on the way!

This. Is. Happening.

DEF CON Safe Mode Music Lineup!

DEF CON Safe Mode badge image

Here at the DEF CON Research Institute, we’ve been working hard to unlock the perfect blend of mind-expanding content and sweaty dancefloor abandon that makes the perfect Con experience. You’ll be happy to know that we’re applying that research to the #defconsafemode experiment.

Friday and Saturday night, we’ll be providing tasty beats from the likes of Miss Jackalope, Skittish and Bus and Ninjula. Head over to the Safe Mode Entertainment Page for the complete lineup.

DEF CON Safe Mode Badges are Here!

DEF CON Safe Mode badge image

The DEF CON Safe Mode badge is here! This year’s model is created by the inimitable LostboY, veteran DEF CON badge and Mystery Challenge creator. While the physical format may be unfamiliar to the youngest among you, seasoned players will recognize it as a ‘cassette tape’ - an analog recording format consisting of a ribbon of magnetic tape and a plastic housing to keep your dirty fingers away from said tape. More on the DEF CON Safe Mode Badge Page

DEF CON Safe Mode Link Roundup!

DEF CON Safe Mode glitch smiley Logo image

DEF CON Safe Mode is almost here! If you’re just getting around to checking out the offerings, here’s a little roundup of the stuff you need to know.

Visit the Forums: The planning for the many events of DEF CON Safe Mode is all happening on the DEF CON Forums. Whether you want to register for an event, offer to help out with a village, or just get a start on planning your DC weekend, you can find the relevant thread in the DC28 planning forum .

#Badgelife is still in effect: The DEF CON community creates a lot of really amazing badges, many of which are available for sale and/or trade. You can catch up with the community badges on the DEF CON Forums #badgeleife thread . You can also follow the hashtag #badgelife on Twitter and Instagram.

Of course, DEF CON has a badge this year, too. We’ll be announcing it quite soon. It’s the creation of returning puzzle master LosT (@1o57), so you’ll want to set aside some time to unock its mysteries.

Swag: If you’re wondering how to get your hands on DEF CON Safe Mode swag this year, we’ve got you covered over on the DEF CON eBay store !

So dive in! Get yourself set up on Discord and Twitch, fire up the DEF CON stream on soma fm for some musical inspiration and get your mind right. DEF CON 28 will be upon us before you know it.

NEW Safe Mode Swag in the Shop!

DEF CON Safe Mode Hoodies and Pins image

We’ve got some brand new #DEFCONSafeMode items available at the DEF CON eBay store - a very cool pin, new flag, and a new tee and hoody with our beloved Jack in #glitchmode. Tighten up your Zoom game with a fresh new look!

Badgelife on the DEF CON Forums!

DEF CON short story contest image

Attention #Badgelife enthusiasts - the #DEFCONForums has a dedicated thread for people who want to talk badges , including #safemode badges. Share, swap, sell, window-shop - join the conversation!

DEF CON Short Story Contest Still Open! Only One Week Left!

DEF CON short story contest image

Reminder to all the hacker scribes out there - the DEF CON Safe Mode Short Story Contest closes July 1! Don't let procrastination rob you of your chance at glory and fabulous prizes!

Check Out the Con Calendar!

DEF CON Conference Calendar

DEF CON Safe Mode Reminder:

We’re keeping a calendar over on the DEF CON Forums with all the deadlines for content. As a bunch of these deadlines are imminent, it’s worth throwing a bookmark down on it. While you’re there you can also get involved in all sorts of planning discussions - your help and feedback are a big part of making this happen. Don’t miss the opportunity to help shape DEF CON Safe Mode.

New DEF CON is Canceled Swag Up on our eBay Store!

DEF CON SAFE MODE swag image

Swag alert! The DEF CON store has a ton of new #DEFCONisCanceled goodies for your delectation. The much requested mask is here, along with hats, pins and stickers. Thanks to everyone for your support while we construct #defconsafemode - stay tuned for even more new swag items in the coming days! Stay safe, and stay in touch.

DEF CON SAFE MODE Village Activity is Growing!

DEF CON SAFE MODE image

DEF CON Safe Mode is growing fast - check out these links to some of the Villages that are signing up to take part! New CFPs are opening up by the day. But don't stop there - jump into the forums and join the discussion. Your feedback is a crucial part of creating a great Con, so join us as we build this thing out. Exciting, ain't it?

From IOT Village: >> https://twitch.tv/iotvillage << Make sure to follow IoT Village on Twitch to get updates about our talks that go live on May 28th and 29th along with the talks that will be hosted there later this year for our @defcon CFP!!!
https://twitter.com/iotvillage/status/1262574224855744514?s=21

From Crypto and Privacy Village (@CryptoVillage) : We're back! Our Call for Participation is officially open! For details on the Crypto & Privacy Village: Glitched CFP - check out our site!
https://twitter.com/CryptoVillage/status/1263184313861865473

From ICS Village: Submit your CFP @defcon for the Village!
https://twitter.com/ICS_Village/status/1265653986230763520

From the Voting Village: Reminder: @defcon Voting Machine Hacking Village @VotingVillageDC speaker track CFP is OPEN!Call for Papers deadline June 12, 2020, at 5:00 PM PT
More information : https://forum.defcon.org/node/232527#post232527

DEF CON eBay Store is Back!

DEF CON swag store image

The DEF CON eBay store is back online! Thanks for bearing with us while we got everything sorted out. DEF CON Safe Mode merchandise (and all other DC merch, for that matter) will be available only on the DEF CON eBay store.

Stay tuned for new #defconiscanceled items, stay safe, and stay in touch with us on the DEF CON FORUMS!

2020 DEF CON CTF Quals Results!

Order of the Overflow logo image

Congratulations to A*O*E, the winners of the DEF CON Safe Mode CTF Qualifiers, and our heartfelt thanks to the amazing team at Order of the Overflow for hosting a great event.

This year's @defcon Quals are over, but you don't have to stop yet! The scoreboard has been made static and the challenges are still available! Everyone can see challenge info, interact with the challenges (they'll stay up for a few days) and check the flags they can retrieve!/

https://scoreboard.oooverflow.io/#/
@oooverflow

2020 DEF CON CTF Quals are about to go live!

Order of the Overflow logo image

The moment has arrived - the DEF CON CTF Quals are happening TODAY! Winner gets a seat at the DEF CON Safe Mode CTF event and a shot at everlasting glory. We wish the best of luck to all the contestants. Stay up to date with all the CTF updates by following our brilliant hosts, Order of the Overflow.

Godspeed, one and all.

https://www.oooverflow.io/
@oooverflow

DEF CON Safe Mode Swag Update - Women's Shirts Added

DEF CON is Canceled Women's Redacted shirt image

We’ve updated the DEF CON Safe Mode Swag page with Women’s cut shirts.

We’re gratified by the response from the hacker community and we’re working to create more options for commemorating #defconsafemode. Keep checking our site for updates. Thanks for your patience.

DEF CON 28 has entered Safe Mode.

DEF CON 28 Covid-19 image

The ‘DEF CON is canceled’ meme has crossed over into real life, courtesy of COVID-19. In early March we had hopes that things would be stable by August. That is no longer realistic. Currently there’s no way to gather everyone together and keep them safe, so The Dark Tangent has decided to cancel the in-person event.

We will try an experiment this year - an online DEF CON. Please read The Dark Tangent’s more detailed thoughts on the situation and then head over to the Forums to get involved . There is a DEF CON Safe Mode FAQ that should help to answer common questions.

We wish there was better news, but we hackers are a resilient bunch. Stay healthy, stay safe, and stay in touch so we can all be together virtually this August 6-9 and again for DEF CON 29 in person.


Return to Index

DEF CON 28 FAQ


DEF CON 28 Safe Mode FAQ


Is DEF CON 28 really canceled?

Yes, for really real this time. For the health and safety of our community, the decision has been made to put DEF CON 28 into “safe-mode with networking”. The DEF CON in-person conference scheduled August 6-9, 2020 has been canceled.

See the announcement here: https://forum.defcon.org/node/232005

Black Hat USA also has an update to their plans. Details here: https://www.blackhat.com/us-20/updates.html


How do I find out about virtual events?

Even though our in-person Las Vegas event is canceled, we will run DEF CON 28 Safe Mode August 7-9 (Friday through Sunday) with 101 orientation Thursday - all of it remote. We will use the DEF CON Forums to coordinate all the various ways for you to participate. That is where everyone can announce their plans, do signups, post pictures and videos and get people involved.

Then on August 6th we will open the DEF CON discord.gg/defcon server up for everyone to join and start their con experience!


Will there be any SWAG?

Always.


What happens with my hotel reservation?

If you made a reservation within the official DEF CON hotel block (Caesars Palace, Harrahs, Linq, Flamingo, Planet Hollywood, Paris, Bally's, Cromwell), your reservation will automatically be canceled by Caesars Entertainment and you will be notified by email. If you made a reservation outside of our DEF CON group block, please contact the hotel directly to cancel your reservation.


What about DEF CON 29?

DEF CON 29 is scheduled for August 5-8, 2021. You can reserve DEF CON 29 hotel rooms now.


What about my DEF CON 28 content submission?

DEF CON 28 on-site is officially canceled, however DEF CON talks, workshops, demo labs, and training CFPs submissions will be processed on schedule as originally planned.


Will I get feedback on my content submission(s)?

Yes, please review the details in your status email for feedback information. CFP, training, workshops and demo labs status emails should all arrive as originally planned in the first weeks of June, if not earlier. We will post an update via official DEF CON accounts when all applications have been notified.


Will my DEF CON 28 application be considered valid for DEF CON 29?

No, you will have to submit a fresh form when the DEF CON 29 calls for content open. Too much time will have passed and we want to make sure you have made updates to keep it fresh.


Will there be a virtual talk track? What about demo labs, workshops or training?

We don't know yet, but are reviewing options internally. If your application meets our standard criteria for acceptance we will communicate options with you directly.


What about Honorariums for virtual content?

Payment Honorariums, badge(s) or check(s), will still be honored for talks, workshops, demo labs, and training. Honorariums in form of entry Badge(s) will carry over for DEF CON 29 in 2021, but travel and accommodations will not.


I'm a contest, event, village, etc., how can I share content?

We plan to organize everything here on the DEF CON Forums, and then on August 6th we will open the DEF CON discord.gg/defcon server up for everyone to join and start their con experience! DEF CON Safe Mode will then run August 7-9 (Friday through Sunday) with 101 orientation Thursday.

Content organizers that want to run a virtual event, contest, or party are encouraged to use the DEF CON Forums as a hub to connect with attendees and share plans. Since last year we have added photo albums, video upload support, along with a mobile app. If you wish to have a forums presence please read the rules, create an account, and get started. We recommend reading the forums planning announcement too.

For the DEF CON DISCORD: Everyone who organizes content could have their own discord category to control and manage. Content creators can moderate what they want in their category; streaming, files, 10 different chat channels, whatever. We will help you do this.


What if I'm a party, meetup, or event organizer?

If you come up with an alternative virtual event, zoom meeting, AR chat, etc please notify us and coordinate via the DEF CON Forums. We will have an open call for hosted parties and social activities to build a calendar of events with links. We would love to hear from you.


I'm a vendor, what's next?

Please check your email for a direct mail from our Vendors department. To participate in the 2021 event, you will need to submit a DC29 vendor application. Call for DC29 vendors will open February 1st, 2021. Please contact vendors(at)defcon(d0t)org directly if you've questions.


I'm an Entertainer or Musician, what about my application?

re you interested in a remote performance or contributing music for our DEF CON is Canceled album? We would love to hear from you. Those who've already applied, we will be in touch. If you have any questions please email us at info(at)defcon(d0t)org.


Is there a DEF CON Is Canceled theme song?

Yes, from the DEF CON 25 Audio CD, 01 - Skittish and Bus - DEF CON Is Canceled.m4a

You can download the whole album from media.defcon.org.
DEF CON 25 Music CD - aac 224k/
DEF CON 25 Music CD - flac/
DEF CON 25 Music CD - opus 384k/


I have a question that's not answered.

If you have a question not answered here you can email Info(at)defcon(d0t)org, we will connect you with the right team. You may also reach out directly to the DEF CON contact that relates to your need, you can find contact info for most everyone and anything on "Calls for Everything".


Return to Index

DEF CON FAQ


Frequently asked questions about DEF CON



What is DEF CON?

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.



How did DEF CON start?

Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!



Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.

There are several resources that will give you an idea of what DEF CON is all about.

DEF CON Press: through the prism of the media
DEF CON Groups: Local groups that meet
DEF CON Media Server: DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.



When and where is DEF CON?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 28 will be held August 6th through August 9th at a the brand new Caesars Forum in Las Vegas, as well as Flamingo, Linq, and Harrah's. Many people arrive a day early, and many stay a day later.


Isn't there a DEF CON FAQ already?

Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It can be found at http://defcon.stotan.org/faq/



What are the rules of DEF CON?

Physical violence is prohibited. Harassment of any kind is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!

You can view the DEF CON Code of Conduct at https://defcon.org/html/links/dc-code-of-conduct.html.



Is DEF CON cancelled?

Sadly, DEF CON 28 in-person is cancelled due to COVID-19. Check out DEF CON Safe mode w/ networking for our virtual offerings.



What is there to do at DEF CON?

DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!



I'm not a hacker, should I go to DEF CON?

Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.



Do criminals go to DEF CON?

Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.



What are Goons?

They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.



How can I help out or become a Goon?

The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.



How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.



I would love to see XYZ event, how do I make this happen?

Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.



How can I speak at DEF CON?

You can submit a response to our CFP (call for papers). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in January and closes mid-May.



I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.



I want to sell stuff, how do I do this?

If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?



What are the different price rates?

Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.



How much is admission DEF CON, and do you take credit cards?

The price for DEF CON 28 is TBA. For reference, DEF CON 27 cost $300 USD Cash for all four days. Do we take credit cards? Are you JOKING? No, we only accept cash - no checks, no money orders, no travelers checks. We don't want to be a target of any State or Federal fishing expeditions.



Does my underage child need a badge?

Children under the age of 8 will not need to purchase a badge.



Can I pre-register for DEF CON?

No. We used to do this a long time ago, but found that managing the registration list, and preventing one 'Dr. Evil' from impersonating another 'Dr. Ev1l' too much of a hassle. Seeing how we would only take cash in the first place, and things becomes time consuming and easy to abuse. Cash at the door works every time.



Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.


I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:


DEF CON is too expensive, how can I afford it?

DEF CON is cheaper than many concerts, and certainly cheaper than many shows in Vegas. Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.

Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.)
Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: Admission can be saved, mow some lawns. Try to go to another 4 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.

Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.



How many people typically attend DEF CON?

There have been roughly 25-28k attendees in the last few years of DEF CON. DEF CON 27 had a record showing with approximately 30,000.



Is there a network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!



What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 21 to reserve a room.



What is a DEF CON "Black Badge"?

The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.



How can I get a hold of DT? I tried to mail him and haven't seen a response yet.

DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.



Is it hot in Vegas?

Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.



What should I bring?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.



How much do rooms cost, and how do I reserve a room?

The DEF CON 28 group room registration is now live! We have room rates at seven hotels, until they run out of rooms in our block.

Follow this link: https://book.passkey.com/go/SHDEF0

Do not worry if the form doesn't immediately show the discounted rate. To verify that you're getting our price you can mouse over the dates you've selected or begin the checkout process.


How much is internet access?

We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.



Will the hotels broadcast the speeches on their cable system?

DEF CON TV has succcessfully streamed all tracks to all the hotels, and a couple of tracks out to the internet, for several years now. We don't expect this will change!



Will we have DEF CON branded poker chips?

You will have to attend DEF CON to find out.



Will conference attendees have entire floors of hotel rooms to themselves?

Probably not. The hotel is very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.



This FAQ didn't answer my questions, or was unclear, how can I get further information?

Check out the DEF CON Forums to ask follow up questions.


Return to Index

Links to DEF CON 28 related pages


Links

DEF CON . org

Main DEFCON site
DEFCON 28
DEFCON 28 FAQ
DEFCON      FAQ
DEFCON 28 Schedule and Speakers pages
DEFCON 28 Contest & Events
DEFCON 28 Demolabs Schedule
DEFCON 28 Entertainment
DEFCON 28 Villages


village info derived from the following pages
DEF CON 28 Villages page
DEF CON 28 Villages Forum page
Thanks to the InfoBooth crew for providing access to their backend database. <claps> to their hard work!

Villages

Village Name Forum
Link
DC Village
Desc
Discord Chan Soc Media
Links
AI Village Forum AIV Desc #aiv-general-text
TW @AIvillage_DC
AeroSpace Village
Hack-A-Sat
Forum AEV Desc #av-lounge-bar-text
TW @SecureAerospace
TW @Hack-A-Sat
AppSec Village Forum ASV Desc #asv-general-text
TW @AppSec_Village
YT AppSec Village
BioHacking Village Forum BHV Desc #bhv-general-text
TW @DC_BHV
YT Biohacking Village
TI biohackingvillage
BlockChain Village Forum BCV Desc #bcv-general-text
TW @BCOSvillage
Blue Team Village Forum BTV Desc #btv-general-text
TW @BlueTeamVillage
TI BlueTeamVillage
Car Hacking Village Forum CHV Desc #chv-welcome-text
TW @CarHackVillage
Career Hacking Village Forum CRV Desc #cahv-general-text
TW @HackingCareer
Cloud Village Forum CSV Desc #cloudv-general-text
TW @cloudvillage_dc
Crypto and Privacy Village Forum CPV Desc #cpv-general-text
TW @CryptoVillage
TI cryptovillage
SL cryptovillage
YT Crypto and Privacy Village
Data Duplication Village Forum DDV Desc #ddv-general-text
TW @DDV_DC
Ethics Village Forum ETV Desc #ev-general-text
TW @EthicsVillage
Hack The Sea Forum HSV Desc #htsv-general-text
TW @hack_the_sea
Ham Exams Forum HRV Desc #ham-general-text
@DC_Ham_Exams
Ham Radio Village Forum HRV Desc #ham-general-text
TW @HamRadioVillage
TI hamradiovillage
Hardware Hacking Village
Solder Skills Village
Forum HHV Desc #hhv-infobooth-text
TW @DC_HHV
ICS Village Forum ICS Desc #ics-general-text
TW @ICS_Village
YT ICS Village
TI ics_village
IoT Village Forum IOT Desc #iotv-general-text
TW @IOTvillage
TW @ISEsecurity
TW @Villageidiotlab
TI iotvillage
Lock Bypass Village Forum LBV Desc #lbpv-social-text
TW @bypassvillage
Lockpick Village Forum LPV Desc #lpv-general-text
TW @toool
TI toool_us
Monero Village Forum MOV Desc #mv-general-text
TW @MoneroVillage
TI MoneroVillage
YT Monero Community
Workgroup

Password Village Forum PWDV Desc #pwdv-general-text
Payment Village
Forum
PAYV Desc
#pay-labs-text TW @paymentvillage
YT Payment Village
TI paymentvillage
Packet Hacking Village Forum PHV Desc #phv-infobooth-text TW @WallOfSheep
FB @WallOfSheep
Recon Village Forum RCV Desc #rv-general-text TW @ReConVillage
FB @ReConVillage
Red Team Village Forum RTV Desc #rtv-briefings-text
TW @VillageRedTeam
YT Red Team Village
TI redteamvillage
DC Red Team Village
Rogues Village
Forum RGV Desc #rov-announcements-text TW @RoguesVillage
TI RoguesVillage
Social Engineering Village Forum SEV Desc #sev-general-text
TW @HumanHacker
FB SocialEngineerInc
Voting Machine Village Forum VMV Desc #vmhv-general-text
TW @VotingVillageDC
Wireless Village Forum WLV Desc #wv-general-text
TW @WiFi_Village
DC Wireless Village

Other Interesting Links

Other cons during #SummerHackerCamp
Blackhat @BlackHatEvents FB Black Hat Events
BSides Las Vegas @BSidesLV
r00tz Asylum @r00tzasylum
Queercon @Queercon FB @queercon
The Diana Initiative @Dianainitiative FB @dianainitiative

#DEFCONSAFEMODE #BadgeLife Tracker

Guides/Tips/FAQs

Lonely Hackers Club - DEF CON n00b guide  -  reddit thread
DEF CON for N00bs
The Lost Policymaker's Guide to Hacker Summer Camp
Preparing for "Hacker Summer Camp"
General / previous years
JK-47 - BSidesLV & DEFCON Conference Tips
Just another DEF CON guide
HACKER SUMMER CAMP 2018 GUIDE
On Attending DefCon