The ONE!

One Schedule to Rule them All!

Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 29.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to

Have a good time at DEF CON 29!

Index of DEF CON 29 Activities

Maps and detailed Village Info

Hour by Hour list of happenings, start at the top, or go to a specific day.
 - Thursday  - Friday  - Saturday  - Sunday

Sorted list of all the Speakers Names linked to their talk's description.
Speaker List

Sorted list of all the Talk's titles linked to the talk description.
Talk Title List

Talk lists for each Village, start at the alphabetic top, or go to a specific Village.
Village Talk List

Descriptions and Info for all the talks.
Talk Descriptions

The latest news from

The answer to your questsions about DEF CON overall and for this year.

Links to DEF CON 29 related pages

Maps and detailed Village Info

Full map of both Ballys's and Paris

Closeup view of activities at Paris

Full Map

Closeup view of activities at Bally's

Full Map
Closeup of Ballys' Resort/Indigo Tower 26'th floor and Jubilee Tower 2/3 floors

Full Map

AVV - Adversary Village

AVV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 11:00 - 21:00 - Sat: 10:00 - 21:00 - Sun: 10:00 - 17:00
Social Media Links:
   TW @AdversaryVillag
   IG @AdversaryVillage
   LI @adversaryvillage
   FB @AdversaryVillage
   TI @AdversaryVillage
   YT link

The "Adversary Village" is a community torqued combat readiness platform purely focused on Adversary simulation, emulation tactics, Simulation CTFs, Supply chain security attack tactics, Adversary Tactics and urban survival skills.

This is different from any of what has been covered in the existing villages because our focus is on simulation of the actions of a threat actor or an adversary and this being simulated here.

As this domain matures, we anticipate active participation from enterprises as such simulations would help immensely towards internal capacity building from having a "live fire" training opportunity. An increasing number of researchers too are focusing on building tools and techniques for simulation of various adversarial actions against an organization or Supply chain, instead of actual real-world exploitation.The goal of the Adversary Village would be to build an open Security community for the researchers and organizations, who are putting together new means and methodologies towards the simulation/emulation of adversary tactics.

Return to Index

ASV - Aerospace Village

ASV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 16:00 - Sat: 10:00 - 16:00
Social Media Links:
   TW @secureaerospace
   LI @aerospace-village
   TW @hack_a_sat

The Aerospace Village at DEF CON will encompass all aspects of the aerospace sector ranging from airports, air traffic management, aircraft and space.

The aviation and space industries, security researchers, and the public share a common goal: safe, reliable, and trustworthy aviation and space operations. For too long, negative perceptions and fractured trust on all sides have held back collaboration between the aviation, space, and security researcher communities that has advanced safety, reliability, and security of other industries. As the traditional domains of aviation safety and cybersecurity increasingly overlap, more effective collaboration between stakeholders ensures we will be safer, sooner, together.

Through the Aerospace Village, the security research community invites industry leaders, researchers and academia interested in aviation and space security, safety, and resilience to attend, understand, collaborate together to achieve our common goals. Empathy and understanding build common ground, while acts and words likely to increase division between these two communities undermine these efforts. The Aerospace Village welcomes those who seek to improve aviation and space security, safety, and resilience through positive, productive collaboration among all ecosystem stakeholders.

Our Goal
The Aerospace Village is a volunteer team of hackers, pilots, and policy advisors who come from the public and private sectors. We believe the flying public deserves safe, reliable, and trustworthy air travel which is highly dependent on secure aviation and space operations.

Our Mission
Create, sustain, and grow an inclusive community focused on aerospace cybersecurity;

Inspire the next generation of aerospace cybersecurity leaders; Promote and develop aerospace cybersecurity expertise and knowledge.

The Aviation Village will do this by:
- Building connections, trust, and understanding among all Village participants. - Developing aerospace security skills among DEF CON attendees through workshops and hands-on activities. - Promoting constructive dialog through talks and interaction.?

Return to Index

AIV - AI Village

AIV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 09:00 - 17:00 - Sat: 09:00 - 17:00 - Sun: 09:00 - 14:00
Social Media Links:
   TW @aivillage_dc
   TI @aivillage
   YT link

Artificial Learning techniques are becoming more prevalent in core security technologies like malware detection and network traffic analysis. Its use has opened up new vectors for attacks against non-traditional targets, such as deep learning based image recognition systems used in self driving cars. There are unique challenges in defending and attacking these machine learning systems that the security community needs to be made aware of. This AI Village will introduce DEF CON attendees to these systems and the state of the art in defending and attacking them. We will provide a setting to educate DEF CON at large through workshops and a platform for researchers in this area to share the latest research.

Our main focus is on expanding the hands-on activities that attendees can participate in. This year, attendees will create a realistic face using StyleGAN, learn how to generate text, and attack a discriminatory resume screening program. We'll also have talks via CFP, and workshops: both introductory ML for beginners and intermediate/advanced on Facial Recognition/Adversarial ML. We are planning three contests inside the village: one as a standard CTF, another on evading a malware classifier (Ember), and a final realtime panel of Deepfaked DarkTangent's answering personal questions and giving opinions on life, the universe, and everything!

Return to Index

APV - AppSec Village

APV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @AppSec_Village
   LI @appsecvillage

The first two AppSec Villages were a resounding success. We learned that whether in person or online, our AppSec community is fantastic. We are pumped to be back bigger and better.

Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner, making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.

Software runs the world. Everything from IoT, medical devices, the power grid, smart cars, voting apps - all of it has software behind it. Such a variety of topics will be reflected in our cadre of guest speakers representing all backgrounds and walks of life.

AppSec Village welcomes all travelers to choose from talks by expert community members, an all AppSec-focused CTF, contests that challenge your mind and your skillz, and more. Bring your thirst for knowledge and passion for breaking things, and your visit to AppSec Village will be a thrill!

Like in the previous villages (but better this time), we will focus our efforts on hands-on activities and practical learning activities. We are planning workshops, interactive demos, step-by-step guided walkthroughs, CTF for AppSec beginners, and a reversed CTF for level builders.

Return to Index

BCV - Blockchain Village

BCV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 17:30 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:30
Social Media Links:
   TW @BCOSvillage

Blockchain Village is a 'Not for Profit' event organized as a part of Information Security conferences like DEF CON. Primary focus of Blockchain village is to promote, research, development & knowledge sharing around security of blockchain technology and applications of blockchain in the field of information security.

The village organizes hands-on workshops, contests, discussions and talks by & for the community members. The event, its members and supporters form across the world love to share the best research & latest content with our awesome community.

This year at Blockchain Village we bring back Capture-The-Coin contest running in parallel with more hands on workshops (Mathematical and Practical) along with cutting edge Talks-n-Tools, noteworthy Demos-n-Discussions, all focused on security of Blockchains and Distributed Applications.

Join us at DEF CON 29 as we celebrate the power + potential of Distributed applications, enabled by Blockchain technology.

Return to Index

BICV - Blacks in Cybersecurity

BICV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00
Social Media Links:
   TW @BlackInCyberCo1
   IG @blackincyberconf
   TI @blacksincybersecurity
   LI @blackincyberconference
   PT @blacksincybersecurity
   FB @blackincyberconf

The Blacks In Cybersecurity (BIC) Village seeks to bring culturally diverse perspectives to the holistic Cybersecurity community; by way of a series of talks and a capture the flag event.

In providing these activities, we believe that we can normalize the discussion of deficiency and prejudices in Cybersecurity literacy, education and development that ultimately impact the progress and development of the field.

Our village programming is also designed to highlight Black experiences, innovations in the field, Black culture and Black history which is designed to encourage more diverse hobbyists and professionals to engage and contribute to this conference and the greater Cybersecurity and Hacker/Maker communities.

Return to Index

BHV - Bio Hacking Village

BHV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @dc_bhv
   LI @biohacking-village
   TI @biohackingvillage
   SP link

Growing from seeds of demand, the Biohacking Village emerged at DEF CON to deliver action-oriented reinvention of the safety and security of health care. THE BIOHACKING VILLAGE, a 501(c)3 organization, is uniquely poised to inform global conversations in health care cybersecurity research. Representing voices who see code as genetics, subroutines as organic processes, and programs as life itself the BHV has grown to become an expansive and inclusive, hands-on playground for the entire biomedical ecosystem - patients, clinicians, hackers, manufacturers, regulators, hospital administrators, and others seeking healthier futures through meaningful technology. This nimble community delivers hands-on, strident learning labs to influence in health care, industry, and manufacturing.

We bring the biomedical ecosystem to DEF CON in four ways:

Device Lab
A high-collaboration, hands-on learning environment builds trust and trustworthiness across multidisciplinary voices in healthcare, connecting security researchers, manufacturers, hospitals, and regulators in an experiential learning laboratory that encourages cross-pollination and real-world skills development. Device Lab research benefits patients and manufacturers by providing valuable, high-fidelity feedback on established, new, and developing devices.

Speaker Lab
Connection starts with shared experiences. Speakers at BHV have walked the walk - from their adventures in garage science to the emerging threats they uncover to next generation solutions and next level care. Full Stack Biotechnologists, security researchers, regulators, clinicians, citizen scientists, patients, and engineers enlighten and inspire BHV attendees through creative and collaborative discussions around emerging technologies and threats, novel work in biologics, security architectures, and the opportunities inside the interdisciplinary nature of healthcare.

Catalyst Lab
The worlds largest, meatiest problems cross through the BHV and the Catalyst Lab works to convene thought leaders, hacktivists, and manufacturers working in the biomedical industry to investigate the solutions of best fit and provide a series of tabletops for training, hands-on workshops, and solutions design that covers the entirety of the biomedical device and security ecosystem.

Capture The Flag
Hackers work to defend a hospital under siege, racing against the clock. The immersive, learn by doing environment challenges hackers to use their skills to anticipate, defend, and recover, as their adversary escalates their attacks throughout the game.

Return to Index

BTV - Blue Team Village

BTV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @BlueTeamVillage
   TI @blueteamvillage

We're still standing for our fourth DEF CON! Coming through the looking glass to showcase the defensive side of hacking, Blue Team Village is where you can find out all the multifarious facets of what it means to be a defender. You'll be able to teach and learn about the various ways to keep people safe - and how to subvert attacker expectations to turn their methods back on them.

You'll also be able to find community and mentor-ship within the defensive hacking paradigm, allowing you to find your path within this specialization to learning new skills and refining your old ones.

If you're looking for a community of like-minded hackers with a tendency towards forensics, threat hunting, and other blue-aligned topics, come celebrate the art of defensive hacking with us!

Return to Index

CHV - Car Hacking Village

CHV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 16:30 - Sat: 10:00 - 16:30
Social Media Links:
   TW @CarHackVillage

Learn, hack, play. The Car Hacking Village is an open, collaborative space to hack actual vehicles that you don't have to worry about breaking! Don't have tools? We'll loan you some. Never connected to a car? We'll show you how. Don't know where the controllers are? We'll show you how to take it apart.

Hybrid event this year: We'll be in-person in Las Vegas and Virtual. Check out CarHackingVillage or @CarHackVillage for up-to-date information.

Want to learn more about automotive hacking and cyber security? Check out our talks.

Want to hack mobility scooters? Yes! We'll do that to.

Also, check out the CHV CTF.

Return to Index

CAHV - Career Hacking Village

CAHV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @HackingCareer

This isnt just getting the next job, it is building, shifting, and presenting skills and capabilities to keep reaching the next level of where you want to go.

In 2020, studies showed that in the hacking community over 45% did not know how to find a job. Post pandemic with unemployment rising, this number has increased to 55%. These studies also show that many hackers do not know the next step in their career. From other studies, hackers have stated that they dont know the top ways to find a job and worse, how to plan the next step in their career. While we talk about the talent shortages, we are not equipping our community with the knowledge, skills, and expertise to sustain their career search and development.

Career Hacking village provides opportunities to build out your career plan and get through the next steps. We have workshops on plan development, resume refinement, identifying mentors, and practice interviews. We will complement this with one-on-one meetings with recruiters for resume review and career mentors for frank conversations about career search and development. New this year will be adding in Mock Interviews to finetune the virtual interviewing process.

The CAHV brings the opportunity to work with the one aspect of tech careers that wont run in the cloud - getting past recruiters and building a career that lets people match their passions with opportunities. No two paths are exactly the same.

From presentations that focus on key aspects of career search and career development to discussions with community career advisors these activities will help community members re-examine their overall career goals and tactics.

Return to Index

CLV - Cloud Village

CLV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 13:20
Social Media Links:
   TW @cloudvillage_dc

With the industry shifting towards cloud infrastructure at a rapid speed, the presence of an open platform to discuss and showcase cloud research becomes a necessity.

Cloud village is an open platform for researchers interested in the area of cloud security. We plan to organize talks, tool demos, CTF and workshops around Cloud Security and advancements. We will open Call for Papers/Workshops/Tools as soon as we get an approval from DEF CON.

Our CTF will be a jeopardy style 2.5 days contest where participants will have to solve challenges around Cloud infrastructure, security, recon, etc. These challenges will cover different cloud platforms including AWS, GCP, Azure, Digital Ocean, etc. We will also reward our top 3 teams with awards.

Return to Index

CCV - Cryptocurrency Village

CCV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @DEFCONCCVillage

Cryptocurrency is a digital form of peer-to-peer money that is exchanged on decentralized networks independent of any central authority and is cryptographically secured. Networks operate under a set of programmatic rules, which maintains the immutability of a public ledger and ensures against double-spending. Although Bitcoin, Ethereum, and Dogecoin are the most well-known cryptocurrencies, other projects like Monero seek to address scalability, privacy, and censorship resistance in innovative ways.

The Cryptocurrency Village brings together leading experts in the area to explore substantive issues regarding the current state of blockchain technologies, regulatory landscape, and the general cryptocurrency ecosystem. The village hosts keynote talks, panels, workshops, networking events, and parties.

Return to Index

CPV - Crypto Privacy Village

CPV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @cryptovillage
   YT link
   TI @cryptovillage
   YT link

At the Crypto & Privacy Village (CPV) you can learn how to secure your own systems while also picking up some tips and tricks on how to break classical and modern encryption. The CPV features workshops and talks on a wide range of cryptography and privacy topics from experts. We'll also have an intro to crypto talk for beginners, crypto-related games, the infamous CPV puzzle, a key-signing party, privacy-related art installations, and other great events.

The forum for the Gold Bug Crypto Privacy Contest is located here:

The CPV discusses the interesting intersection of privacy and technology as well as building privacy enhancing technologies. We are able to dig into the nitty gritty details of cryptography and give high level crypo intros for those who might feel intimidated by it. We also discuss and hack on major topics and issues: facial recognition technology, license plate readers, privacy enhancing clothing, crypto backdoor laws.

Return to Index

DDV - Data Duplication Village

DDV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Thur: 16:00 - 19:00 - Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 11:00
Social Media Links:

It's true, the Data Duplication Village is back for DC 29! We have all the bits and bytes available from packed up into nice, neat packages. If you're looking for something to fill up all your unused storage, may I recommend a nice hash table or two with a side of all of the DefCon talks? This is a "free-to-you" service where we're providing you direct access to terabytes of useful data to help build those skills.

DEF CON will provide a core set of drive duplicators as well as data content options. We accept 6, 8, and 10TB drives on a first come, first served basis and duplicate 'till we can no longer see straight. Bring in your blank SATA3 drives - check them in early - to get the data you want. Come back in about 24 hours to pick up your data-packed drive. Space allowing, we'll accept drives all the way through until Saturday morning - but remember, it's FIFO! It will be a first come, first served to duplicate 'till we drop. Bring labeled 6TB SATA blank drives, and submit them in the queue for the data you want. Come back in 14-24 hours to pick up your data-packed drive. Space allowing, the last drop-offs will be no later than Saturday afternoon and the last drives will run overnight with the final pickup time at 11:30am.

WHAT IS AVAILABLE - Three drives:
6TB drive 1-3: Updated archive of plus other "direct from DT" content, built on last years collection and always adding more for your data consuming appetite. 6TB drive 2-3: GSM A51 and MD5 hash tables (Tables 1-2) with about 404 gigs free 6TB drive 3-3: more rainbowtables, lanman, mysqlsha1, ntlm, and some word lists (Tables 2-2) with about 136 gigs free

The DC 29 content will be posted at once finalized


If you want a full copy of everything you will need three drives. You can bring back last year's drive(s) to be wiped / updated (you should remove any 2018 stickers).

Data Duplication Village Hours:

We're working on a method to post completed ticket ranges to and

Be aware that we cleared all the Vegas area stores of every single 6TB drive last year we did this so plan ahead and get them now! Duplicating a 6TB (About 5.46 usable) drive at an average of 120 Megabytes a second comes out to just under 14 hours per drive. With all about 16 duplicators going, we can duplicate about 95 drives concurrently. We're expect to push about 11GB per second out to the drives for 72 hours straight. We did 335 drives for DC24 and we're hoping to do even more at DC25! We are expecting more total duplicator capacity than last year!

But wait - there's more! At DC27, we made our our stretch goal a reality to provide a pick-and-pull datastore in the DDV. We expect to do it bigger and better this year!

Return to Index

HTSV - Hack the Sea Village

HTSV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @hack_the_sea

Hack The Sea Village 3.0, Deep Dive, will be an opportunity for DEF CON attendees to explore the world of underwater robotics, seasteading communities, and hacking with maritime industrial control systems (ICS) and operational technology (OT) through hands-on CTFs, show-and-tells with gear and tools, talks, and hackathon style contests.

With this year's focus on undersea technology, especially robotics and UUV/ROVs we will provide attendees an opportunity to explore the "last frontier" on Earth.

Return to Index

HRV - Ham Radio Village

HRV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Sat: 11:00 - 16:45 - Sun: 11:00 - 16:45
Social Media Links:
   TW @HamRadioVillage
   TI @HamRadioVillage

Ham radio isnt just what your grandpa does in the shed out back. Radios are an important piece of technology we use everyday, and amateur (ham) radio has been at the forefront of its development since day one -- we are some of the original hardware hackers! DIY, exploration, and sharing has always been a vital part of our community and the goal of Ham Radio Village is to nurture this growth into the next generation with all of the amazing people at DEF CON.

Our village will have demos, talks, presentations, contests, and of course, license exams!

So come visit Ham Radio Village to learn more about the hobby, including how antennas work (and how to build your own), how to actually use that software defined radio sitting on the shelf, how to trackdown a rogue transmitter with a handheld radio, and how you can legally transmit 1,500 Watts into the airwaves after taking a simple multiple-choice test!

One of the unique things about ham radio is that it goes deep into the theory and science of radio. This knowledge unlocks a whole new level of understanding about why and how radios work and radio waves propagate. With just about everything containing some sort of radio these days, this information can help us better research, attack, and defend all things that emit RF. For example: Just about anyone can build an antenna with simple hardware; having an understanding of the fundamentals allows you to troubleshoot and tune the performance of that antenna to pick up the exact signals you want while filtering out the rest.

Return to Index

HHV - Hardware Hacking and Soldering Skills Village

HHV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 09:30 - 18:00 - Sat: 08:30 - 16:30 - Sun: 09:00 - 15:30
Social Media Links:

Every day our lives become more connected to consumer hardware. Every day the approved uses of that hardware are reduced, while the real capabilities expand.

Come discover hardware hacking tricks and tips regain some of that capacity, and make your own use for things! We have interactive demos to help you learn new skills. We have challenges to compete against fellow attendees. We have some tools to help with your fever dream modifications. Come share what you know and learn something new.

We are two villages in one. We run a large number of tables for soldering when in person, and to allow people to understand that hardware is more than soldering we run the Hardware Hacking Village as embedded / reversing / hardware things other than soldering.

Return to Index

ICSV - IndustrialControlSystems Village

ICSV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @ICS_Village
   LI @icsvillage
   YT link
   TI @ics_village

ICS Village is a non-profit organization with the purpose of providing education and awareness of Industrial Control System security. Connecting public, industry, media, policymakers, and others directly with ICS systems and experts. Providing educational tools and materials to increase understanding among media, policymakers, and the general population. Providing access to ICS for security researchers to learn and test. Hands on instruction for industry to defend ICS systems.

High profile Industrial Controls Systems security issues have grabbed headlines and sparked changes throughout the global supply chain. The ICS Village allows defenders of any experience level to understand these systems and how to better prepare and respond to the changing threat landscape.

Interactive simulated ICS environments, such as Hack the Plan(e)t and Howdy Neighbor, provide safe yet realistic examples to preserve safe, secure, and reliable operations. We bring real components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), Remote Telemetry Units (RTU), actuators, to simulate a realistic environment throughout different industrial sectors. Visitors can connect their laptops to assess these ICS devices with common security scanners, network sniffers to sniff the industrial traffic, and more!

The Village provides workshops, talks, and training classes.

Return to Index

IOTV - InternetOfThings Village

IOTV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 21:15 - Sat: 10:00 - 21:00
Social Media Links:
   TW @iotvillage
   TW @ISEsecurity
   TW @Villageidiotlab
   LI @iotvillage
   TI @iotvillage

IoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE), and the non-profit organization, Village Idiot Labs (VIL).

The IoT RED ALERT Contest forum is located here:

Check out the official IoT Village Store for all your IoT Village swag!

Watch IoT Village In Action to get an idea of our content and our attendees.

Return to Index

LBV - Lock Bypass Village

LBV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 09:00 - 19:00 - Sat: 09:00 - 19:00 - Sun: 09:00 - 17:00
Social Media Links:
   TW @bypassvillage
   TI @bypassvillage

The Lock Bypass Village explores the world of hardware bypasses and techniques generally outside of the realm of cyber security and lockpicking. Come learn some of these bypasses, how to fix them, and have the opportunity to try them out for yourself.

Well be covering the basics, like the under-the-door-tool and latch slipping attacks, as well as an in depth look at more complicated bypasses. Learn about elevator hacking, attacking alarm systems at the sensor and communication line, and cut-away and display models of common hardware to show how it works on the inside.

Looking for a challenge? Show us you can use lock bypass to escape from a pair of standard handcuffs in under 30 seconds and receive a prize!

The lock bypass village is almost 100% hands on and is one of the only villages that has content about physical security. We strive to develop new content on a yearly basis to retain the interest of new and existing participants. This year we will be rebuilding all of our door displays to improve the production value, we will also have new displays that capture elevator security, double doors (with a deadbolt), forceable entry, some content on Access controls/Wiegand/RFID cloning, and other subjects.

Return to Index

LPV - Lock Pick Village

LPV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @toool
   TI @toool_us

Want to tinker with locks and tools the likes of which you've only seen in movies featuring secret agents, daring heists, or covert entry teams?

Then come on by the Lockpick Village, run by The Open Organization Of Lockpickers, where you will have the opportunity to learn hands-on how the fundamental hardware of physical security operates and how it can be compromised.

The Lockpick Village is a physical security demonstration and participation area. Visitors can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Experts will be on hand to demonstrate and plenty of trial locks, pick tools, and other devices will be available for you to handle. By exploring the faults and flaws in many popular lock designs, you can not only learn about the fun hobby of sport-picking, but also gain a much stronger knowledge about the best methods and practices for protecting your own property.

Return to Index

PHV - Packet Hacking Village

PHV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 14:00 - 18:00 - Sat: 14:00 - 18:00
Social Media Links:
   TW @wallofsheep
   FB @wallofsheep
   TI @wallofsheep

The Packet Hacking Village is where youll find network shenanigans and a whole lot more. Theres exciting events, live music, competitions with awesome prizes, and tons of giveaways. PHV welcomes all DEF CON attendees and there is something for every level of security enthusiast from beginners to those seeking a black badge. Wall of Sheep gives attendees a friendly reminder to practice safe computing through strong end-to-end encryption. PHV Speakers, Workshops, and Walkthrough Workshops delivers high quality content for all skill levels. Packet Detective and Packet Inspector offers hands-on exercises to help anyone develop or improve their Packet-Fu. WoSDJCo has some of the hottest DJs at con spinning live for your enjoyment. Finally... Capture The Packet, the ultimate cyber defense competition that has been honored by DEF CON as a black badge event for seven of the eight years of its run.

Return to Index

PWV - Password Village

PWV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 19:00 - Sat: 10:00 - 15:00 - Sun: 12:00 - 13:00
Social Media Links:
   TW @PasswordVillage
   TI @passwordvillage
   YT link

Have you ever been curious about password cracking, but were too embarrassed to admit you don't know anything about it? Have you seen the news about major password data breaches, but failed to see what all the fuss is about? Have you always wanted to implement password auditing at your organization, but you didn't know where to begin? Or do you feel like password cracking could not ever possibly relate to your job function? Does the prospect of discovering a unique intersection between human psychology, mathematics, information security, and high-performance computing arouse you? If you answered 'yes' to any of these questions, or if you just really fucking love password cracking, then the first-ever Password Village at DEF CON is right for you!

The Password Village provides training, discussion, and hands-on access to hardware and techniques utilized in modern password cracking, with an emphasis on how password cracking relates to your job function and the real world . No laptop? No problem! Feel free to use one of our terminals to access a pre-configured GPU environment to run password attacks against simulated real-world passwords. Village staff and expert volunteers will be standing by to assist you with on-the-spot training and introductions to Hashcat, as well as other FOSS cracking applications.

Already a password cracking aficionado? Feel free to give a lightning talk, show off your skills, help a n00b learn the basics, or engage in riveting conversation with other password crackers. Regardless of whether you're just a little hash-curious, a veteran cracker still relying on rainbow tables, a novice desiring to learn more, or an expert eager to share, we guarantee there will be something for everyone at the Password Village!

Return to Index

PYV - Payment Village

PYV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @paymentvillage
   TI @paymentvillage
   YT link

Payment technologies are an integral part of our lives, yet few of us know much about them. Have you ever wanted to learn how payments work? Do you know how criminals bypass security mechanisms on Point of Sales terminals, ATMs and digital wallets? Come to the Payment Village and learn about the history of payments. Well teach you how hackers gain access to banking endpoints, bypass fraud detection mechanisms, and ultimately, grab the money!

We're covering top notch topics of payment security, which is the intersection of RE, hardware, appsec domains related to money flows. This year we will be glad to provide more hands-on and tasks for participants, and we already have a few requests for talks and interest for our Village.

Return to Index

RCV - Recon Village

RCV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 16:45 - Sat: 10:00 - 16:05
Social Media Links:
   TW @ReconVillage
   FB @reconvillage

Recon Village is an Open Space with Talks, Live Demos, Workshops, Discussions, CTFs, etc. with a common focus on Reconnaissance. The core objective of this village is to spread awareness about the importance of reconnaissance, open-source intelligence (OSINT), and demonstrating how even small information about a target can cause catastrophic damage to individuals and organizations.

Recon Village appeared at DEF CON 25, 26, 27, 28 as well as DEF CON China Beta and 1.0 and we received an overwhelming response from speakers, CTF/HackAThon participants, and attendees.

We strive to make Recon Village even better this time and are expecting more active participation from the attendees. It will be really great if we can get at least the same size space (or bigger) as we got in DEFCON 27.

We will be opening 'Call For Papers and Workshops' on 22nd March 2021.

We will have our Jeopardy Style OSINT CTF Contest throughout the Village timings. Based on the feedback from last year, we plan to make the CTF more challenging this year. The challenges will be around harvesting information about target organizations, their employee's social media profiles, their public svn/gits, password breach dumps, darknet, paste(s), etc. followed by active exploitation, bug hunting, investigation, and pentest scenarios of virtual targets. All the target organizations, employees, servers, etc. will be created by our team and hence will not attract any legal issues.

Similar to the last year, there will be Awesome rewards for CTF winners, along with free t-shirts, stickers, village coins, and other schwag which attendees can grab and show off.

Guess what! our Badge will also be more interesting this time and as usual, it will be free. P.S. We will not be selling our badges.

Return to Index

RFV - RF Village

RFV VillageTalk List:
Home Page:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @rfhackers
   TW @rf_ctf

After 14 years of evolution, from the WiFi Village, to the Wireless Village, RF Hackers Sanctuary presents: The Radio Frequency Village at DEF CON.

The Radio Frequency Village is an environment where people come to learn about the security of radio frequency (RF) transmissions, which includes wireless technology, applications of software defined radio (SDR), Bluetooth (BT), Zigbee, WiFi, Z-wave, RFID, IR and other protocols within the usable RF spectrum. As a security community we have grown beyond WiFi, and even beyond Bluetooth and Zigbee.

The RF Village includes talks on all manner of radio frequency command and control as well as communication systems. While everyone knows about the WiFi and Bluetooth attack surfaces, most of us rely on many additional technologies every day.

RF Hackers Sanctuary is supported by a group of experts in the area of information security as it relates to RF technologies. RF Hackers Sanctuarys common purpose is to provide an environment in which participants may explore these technologies with a focus on improving their skills through offense and defense. These learning environments are provided in the form of guest speakers, panels, and Radio Frequency Capture the Flag games, to promote learning on cutting edge topics as it relates to radio communications. We promise to still provide free WiFi.

Speaker and contest schedule can be found on our website:

Co-located with the RF Village is the RF Capture the Flag. Come for the talks, stay for the practice and the competition.

Return to Index

RGV - Rogues Village

RGV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 14:00
Social Media Links:
   TW @RoguesVillage
   TI @roguesvillage
   TW @foursuits_co
   IG @foursuits_co

Rogues Village is a place to explore alternative approaches and uses for security concepts, tools, and techniques by looking to non-traditional areas of knowledge. Incorporating expertise from the worlds of magic, sleight of hand, con games, and advantage play, this village has a special emphasis on the overlap between Social Engineering, Physical Security, and Playful Mischief.

Because we specialize in non-traditional approaches, Rogues Village can be an excellent entry point for people with a less established background in the security space. By introducing and engaging with existing topics in innovative, relatable, and frequently hands-on ways, they can become easier for people to approach and pick up for the first time.

Additionally, we are one of the few villages with a view that explicitly extends beyond the security space, meaning our perspective will necessarily include influences, ideas, and inspirations that are unique to Rogues Village.

Return to Index

SLV - Security Leaders Village

SLV VillageTalk List:
Home Page:
DC Forums Page:
Social Media Links:
   TW @securityleader2

Security Leaders Village

Many of us who started out learning how technology worked through the security community now have leadership roles. There are many of us who don't wear the title of suit well, however we're in these positions. There are also quite a few of us who aspire to these roles and responsibilities, and don't know where to go. The goals of this village are to provide better support to security leaders who did not take the traditional career path, and to assist those currently on their path to achieve more.

We have not paid attention to how the hacker community has developed a significant amount of leaders. They are responsible for the safety and security of much of our critical infrastructure, including finance, healthcare, energy, and transportation. This village recognizes and realizes that, and gives these leaders the tools they need to further succeed. It's also there to develop a new generation.

Return to Index

SEV - Social Engineering Village

SEV VillageTalk List:
Home Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   FB @socialengineerinc
   TW @humanhacker
   LI @social-engineer

Virtual SEV will be the one stop shop for all your SE needs during DEF CON. We will have a Social Engineering Capture for the Flag for Teens, we are planning another SECTF4Kids and we are working on a brand new competition for virtual SEV for all the rest of us. We plan on having a few speeches and Q&A sessions all about social engineering. Come and hang out with us, virtually of course.

Return to Index

VMV - Voting Machine Village

VMV VillageTalk List:
Sched Page:
DC Forums Page:
DC Discord Chan:
Social Media Links:
   TW @votingvillagedc
   YT link

Looking forward to #DEFCON29 Aug. 5-8, 2021! Voting Village explores voting machines, systems, and databases and works to promote a more secure democracy.

Return to Index

SOC - Social Activities: Parties/Meetups

SOC VillageTalk List:

Return to Index

MUS - Music

MUS VillageTalk List:
Home Page:
Sched Page:
Social Media Links:
   TW @defcon_music
   YT link
   TI @defcon_music
   TI @defcon_chill

Music Link All the Things:

Return to Index

WS - DEF CON Workshops

WS VillageTalk List:
Home Page:

Return to Index

DL - DEF CON DemoLabs

DL VillageTalk List:
Home Page:

Return to Index

DC - DEF CON Talks

DC VillageTalk List:
Home Page:
Sched Page:
Social Media Links:
   TW @defcon
   FB @defcon
   IG @wearedefcon

Return to Index

CON - Contests

CON VillageTalk List:

Return to Index

QCV - Queercon

QCV VillageTalk List:
Home Page:
Social Media Links:
   TW @Queercon
   FB @126504813280

Return to Index

MISC - Misc

MISC VillageTalk List:

Return to Index

Speaker List

Graduate Student
_hyp3ri0n aka Alejandro Caceres
Özkan Mustafa AKKUŞ
Aaron Guzman
Aaron Rosenmund
Abhijith B R
Abhijith B R
Abishek Gupta
Acid T
Adam 'pi3' Zabrocki
Adam Schaal
Adversary Village Team
Agent X
AI Village Organizers
AI Village Organizers
AI Village Organizers
Alex "Jay" Balan
Alex "RedWedgeX" Hoffman
Alex Hoekstra
Alex Lomas
Alex Manners
Alex Matrosov
Alex Pearlman
Alexander Heinrich
Alexander Klimburg
Alexander Vigovskiy
Alexandre Sieira
Alexei Kojenov
Alexei Kojenov
Alfonso Ruiz Cruz
Alissa Knight
Alissa Knight
Allan Cecil - dwangoAC
Allan Cecil - dwangoAC
Allan Tart
Alton Crossley
Alyssa Miller
Amelie Koran
Amelie Koran
Ami Luttwak
Amir Shaked
Amit Elazari
Anahit Tarkhanyan
Anant Shrivastava
Andrea Downing
Andy Dennis
Andy Piazza
Ang Cui
Anita Nikolich
Anna Szeto
Anthony "Cx01N" Rose
Anthony "Cx01N" Rose
Anthony Hendricks
Anthony Hendricks
Anthony Hendricks
Anthony Kava
Anto Joseph
Anze Jensterle
Arjun Gopalakrishna
Arnold Holzel
Aseem Jakhar
Atul Nair
August Cole
Austin Allshouse
Avinash Jain
Babak Javadi
Bailey Bercik
Barak Hadad
Barak Sternberg
Barb Byrum
Barton Rhodes
Bassem Helmy
Batuhan Sancak
Ben (Innismir)
Ben Bornholm
Ben Bornholm
Ben Gardiner
Ben Gardiner
Ben Gardiner
Ben Gardiner
Ben Hughes
Ben Nassi
Ben S
Benjamin Kurtz
Benjamin Kurtz
Bill "Woody" Woodcock
Bill Graydon
Bill Hatzer
Blind Hacker JoeB
Bob Sullivan
Bradán Lane
Bradán Lane
Bradán Lane
Brandon Bailey
Brian Behlendorf
Brian Hong
Brian Martin
Brian Satira
Brianna Lennon
Bruce Schneier
Bruce Schneier
Bryan Fields
Bryce Kerley
Byeongcheol Yoo
Camille Eddy
Capt Aaron Bolen
Carlos Polop
Carsten Schürmann
Cassandra Young
Cat Self
Cat Self
Cat Self
Cedric Owens
Chad Rikansrud (Bigendian Smalls)
Chad Seaman
Charles Fracchia
Charles Rumford
Chen Cao
Chen Gour-Arie
Cheryl Biswas
Cheryl Biswas
Cheryl Biswas
Chester Hosmer
Chloe Messdaghi
Chris Greer
Chris Odom
Chris Silvers
Chris Sistrunk
Chris Sperry
Christian Dameff
Christina Lekati
Christopher Hadnagy
Christopher Russell
Christopher Von Reybyton
Christopher Wade
Chuanda Ding
Chuck McAuley
Claire Vacherot
Clay (ttheveii0x)
Clay (ttheveii0x)
Cliff Neve
Colin Cantrell
Colin H
Constantine Macris
Constantine Macris
Cory Doctorow
Craig Gidney
Dabao Wang
Dan Borges
Dan Borges
Dan Gunter
Dan Hastings
Dan Petro - AltF4
Dan Petro - AltF4
Daniel "Rasta" Duggan
Daniel Chen
Daniel Crowley
Daniel Garrie
Daniel Isler
Daniel Prizmant
Daniel Roy
Danny D. Henderson Jr
Danny McPherson
Danyelle Davis
Dark Tangent
Dark Tangent
Dark Tangent
Dark Tangent
Darren Cofer
Dave Lewis
David Cass
David Dworken
David Etue
David Hunt
David Kennedy
David Patten
David Strachan
Deb Herrity
Declyn S.
Deep Therapy
DEF CON Policy Panel
DEF CON Policy Panel
DEF CON Policy Panel
Dennis Giese
Dennis Skarr
Dhillon ‘L33tdawg’ Kannabhiran
Dieter Sarrazyn
Dikla Barda
Dikla Barda
Dimitry "Op_Nomad" Snezhkov
Dimitry "Op_Nomad" Snezhkov
Dimitry "Op_Nomad" Snezhkov
Dimitry "Op_Nomad" Snezhkov
DJ Pie & Darren
DJ Pie & Darren
DJ Pie & Darren
DJ Pie & Darren
DJ St3rling
Dmitrijs Trizna
Don C. Weber
Don Hatfield
Dr. McGrew
Dylan Barker
Dylan The Magician
Ed McGrady
Eddie Perez
Eden Stroet
Eden Stroet
Eden Stroet
Elad Ciuraru
Elizabeth Biddlecome
Elizabeth Biddlecome
Elizabeth Biddlecome
Elizabeth Schweinsberg
Elizabeth Wharton
Elonka Dunin
Emanuel Rodrigues
Eran Segal
Erez Yalon
Eric Betts
Eric Escobar
Eric Escobar
Eric Escobar
Eric Fey
Eric Gershman
Eric Goldstein
Eric Perakslis
Erick Galinkin
Erik Steringer
Erin Browning
Ernie Bio
Eugene Lim
Eugene Neelou
Eyal Karni
Fatih Ozavci
Faye Francy
Federico Lucifredi
Federico Lucifredi
Federico Lucifredi
Felipe Duarte
Felipe Pr0teus Espósito
Francesco Piccoli
Francisco Cabañas
Frank Duff
Frank Pound
Fred Mastrippolito
Gabby Raymond
Gal Kaufman
Gal Nagli
Garrett Schumacher
Gary Kessler
Gary Kessler
Gary Kessler
Gavin Klondike
Gavin Klondike
Gavin Klondike
Gert-Jan Bruggink
Gil Biton
Ginny Spicer
Glenice Tan
Gokul Alex
Grant Ongers (rewtd)
Grant Romundt
Gregg Horton
Guillaume Fournier
Guillermo Christensen
H I Sutton
Hao Xing
Harri Hursti
Harri Hursti
Harshal Tupsamudre
Harshit Agrawal
Hash Salehi
Hector Cuevas Cruz
Helio Sant'ana
Henry Hill
Henry Hill
Henry Hill
Henry Hill
Henry Hill
Huajiang "Kevin2600" Chen
Hutch (Justin Hutchens)
Hyrum Anderson
Ian Coldwater
Ian Vitek
Icetre Normal
Igal Flegmann
Igal Flegmann
Ionut Cernica
Irvin Lemus
Irvin Lemus
Irvin Lemus
Izar Tarandach
Jacob Baines
Jake "Hubbl3" Krasnov
Jake Williams
Jakub Botwicz
James Dolan
James Kettle
James McKee (punkcoder)
James Pavur
Jamie Williams
Jamil Jaffer
Jan Gorzny
Jared Dygert
Jared Stroud
Jason Hopper
Jason Whelan
Javier Perez
Jay Turla
Jay Turla
Jean Francois Maes
Jeff 'R3plicant' Tully
Jeff Dileo
Jenko Hwong
Jennifer DeTrani
Jennifer Goldsack
Jennifer Haverman
Jeremy Brown
Jesse Michael
Jessica Hoffman
Jessilyn Dunn
Joe Billingsley
Joe Schottman 
Joe Slowik
Joe Vest
Joel Isaac
John Bambenek
John Curry
John Ellis
John Felker
John McCombs
John Stoner
John the Greek
Jon Marler
Jon Szymaniak
Jonas Bülow Knudsen
Jordan Sessler
Jordan Sessler
Jorge Orchilles
José Hernandez
Jose Barajas
Jose Garduno
Joseph Gabay
Josh Marks
Josh McIntyre
Josh Stroschein
Joshua Jebaraj
Joshua Smailes
Josie Long
Joy Ho
Juan Escobar
Julia Atkinson
Juneau Jones
Juneau Jones
Junyuan Zeng
Justin Ehrenhofer
Justin Perdok
Kadan Stadelmann
Kaitlyn Handelman
Kaitlyn Handelman
Kaitlyn Handelman
Kala Kinyon
Karan Aditya Ghoshal
Karl Fosaaen
Karl Lovink a.k.a. Cyb0rg42
Katie Whiteley
Katie Whiteley
Kavisha Sheth
Keith Chapman
Kelley Edwards
Kelly Kaoudis
Ken Kato
Ken Pyle
Kendra Albert
Kevin Chen
Kevin Hood
Kevin Jones
Kevin Leffew
Kevin Skoglund
Kimberley Tam
Kirsten Renner
Klaus Schmeh
Kris Silvers
Kristy Westphal
Kristy Westphal
Krisz Klink
Kurits Kopf
Ladislav Baco
Larry Grossman
Laura Abbott
Lauren Zabierek
Leeloo Granger
Lennert Wouters
Leonardo Viveiros
Liana McCrea
Lily Newman
Lisa Forte
Lock Noob
Louigi Verona
Louigi Verona
Luca Bongiorni
Lucas Bonastre
Lucia Savage
Luis Ángel Ramírez Mendoza
Luis Gomes
Madhu Akula
Madhu Akula
Maggie Morganti
Magik Plan
Magno Logan DELETE ME
Magno Logan
Manabu Niseki
Manu Zacharia
Marc Smeets
Maretta Morovitz
Margaret Fero
Mariam Elgabry
Marian Novotny
Mark Loveless
Mark Morowczynski
Mars Cheng
Martin Doyhenard
Martin Ingesen
Mary Ann Hoppa
Mary Brooks
Mathieu Stephan
Mathy Vanhoef
Matt Gaffney
Matt Gaffney
Matt McMahon
Matt Nash
Matthew Bryant
Matthew Coles
Matthew Eidelberg
Matthew Gracie
Matthew Luallen
Maurice Turner
Maurice Turner
Mauricio Tavares
Mauricio Velazco
Mauro Cáseres Rozanowski
Mauro Cáseres Rozanowski
Max Campos
Maxwell Dulin
Mazin Ahmed
Mazin Ahmed
Meadow Ellis
Mehmet Onder Key
Mehow Powers
Meisam Eslahi
Merin MC
Merin MC
Merin MC
Merin MC
Mert Can Kilic
Michael Chien
Michael Lewellen
Michael Long
Michael Murray
Michael Raggo
Michael Raggo
Michael Register
Michael Schloh von Bennewitz
Michael Solomon
Michael Whiteley
Michael Whiteley
Michael Wylie
Michael Wylie
MIchelle Holko
Mickey Shkatov
Mike Cohen
Mike Kiser
Mike Kiser
Mike Spicer
Mila Paul
Minzhi He
Mishaal Khan
Miss Jackalope
Mitch Parker
Mixæl Laufer
Mixmaster Morris
Mixmaster Morris
Mohammed Aldoub
Monero Sound
Moritz Thomas
Nadir Akhtar
Nadir Akhtar
Nathan Case
Nathan Kirkland
Neumann (aka scsideath)
Nia Johnson
Nicholas Childs
Nick Ashworth
Nick Draffen
Nick Roy
Nick Roy
Nico "Socks" Smith
Nico Leidecker
Nina Alli
Nina Lowe
O'Shea (sirmudbl00d)
Ochaun Marshall
Oded Vanunu
Oded Vanunu
Ohad Zaidenberg
Olivia Stella
Omar Santos
Orange Tsai
Parbati Kumar Manna
Patrick Ross
Patrick Wardle
Paul de Souza
Paul Vixie
Paz Hameiri
Peace Barry
Pedro Umbelino
Peiyu Wang
Peter Kacherginsky
Peter Manev
Phil Eveleigh
Philippe Delteil
Phillip Wylie
Pia Zaragoza
Preston Pierce
Preston Thomas
PW Singer
Quinten Bowen
Railgun Team
Rami McCarthy
Rebecca Lynch
Renzon Cruz
Rex Guo
Reza Soosahabi
Ria Cheruvu
Ria Cheruvu
Rich Harang
Richard Henderson
Richard Thieme AKA neuralcowboy
Richard Thieme AKA neuralcowboy
Rick Altherr
Ricky Banda
Rion Carter
Ritu Gill
Rob Suárez
Robert Wagner
Rod Soto
Rod Soto
Rodrigo "Sp0oKeR" Montoro
Roman Zaikin
Roman Zaikin
Ron Stoner
Ron Stoner
Ronald Broberg
Rotem Bar
Roy Davis
Roy Feng
Rumman Chowdhury
Rumman Chowdhury
Rusty Hodge
Rusty Hodge
Ryan Chapman
Ryan Elkins
Ryan Holeman
Ryan M
Ryan MacDougall
s1gns of l1fe
s1gns of l1fe
Sagar Samtani
Sagar Samtani
Sagi Sheinfeld
Salvador Mendoza
Sam Bowne
Sam Bowne
Sam Bowne
Samir Bhagwat
Samuel Kimmons
Samuel Kimmons
Sang-Oun Lee
Sanne Maasakkers
Sara Cladlow
Sara Cladlow
Sara Cladlow
Sarah Fluchs
Sarang Noether
Sarang Noether
Sarang Noether
Scotch & Bubbles
Sebastiaan Provost
Sebastian Bay
Secret Network Team
Selmon Yang
Sergey Chubarov
Seth Kintigh
Shannon Lantzky
Shantanu Khandelwal
Sharon Brizinov
Sheila A. Berta
Shinchul Park
Shir Tamari
Shubham Jain
Sick Codes
Sick Codes
Slava Makkaveev
Sounil Yu
Stan Bar
Stefan Stephenson-Moe
Stefano Meschiari
Stella Biderman
Stephan Wampouille
Stephen Pullum
Steve Luczynski
Steve Luczynski
Steve Wood
Steven Seeley
Steven Yang
Storj Team
Suha Sabi Hussain
Sunny Wear
Surya Teja Masanam
Susan Greenhalgh
Sylvain Afchain
Sylvain Baubeau
Tal Leibovich
Tamas K Lengyel
Tan Kee Hock
Tanya Janca
Tatyana Bolton
Ted Harrington
Tennisha Martin
Tense Future
Teri Williams
Terrestrial Access Network
Thom Dixon
Thomas Bristow
Thomas Hicks
Thomas Pace
Thomas Roth
Tianze Ding
Tilottama Sanyal
Tilottama Sanyal
Tim Faraci 
Tim Jensen (EapolSniper)
Tim Schulz
Tim Yardley
Timur Yunusov
Tino aka Paladin316
Tod Beardsley
Tom Mouatt
Tom Van Goethem
Tom VanNorman
Tomer Bar
Tomer Bar
Tony Virelli
Trenton Ivey
Tushar Verma
Tyler Gardner
Uri Katz
Utku Sen
Vahagan Vardanyan
Vandana Verma Sehgal
Vasant Chinnipilli
Vee Schmitt
Vic Harkness
Vic Harkness
Vic Huang
Victor Hanna
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vincent Yiu
Vivek Nair
Vivek Ponnada
Waylon Grange
Wendy Edwards
Wendy Edwards
Wes Lambert
Wes Lambert
Wesley McGrew
Will Pearce
Will Thomas
William Vermaak
Wu Ming
Yaara Shriki
Yaara Shriki
Yakov Shafranovich
Yaniv Agman
Yaron Zinar
Yaz Khoury
Yesterday & Tomorrow
Yogesh Ojha
Yuebin Sun
Yuhao Weng
Yuval Avrahami
Zachary Minneker
Zebbler Encanti Experience
Zekai Wu
Zhiniang Peng
Zhipeng Huo
Zoltán Balázs

Talk List

.GOV Doppelgänger: Your Häx Dollars at Work - RCV
"Ask a Ham" Q&A - HRV
"The Poisoned Diary": Supply Chain Attacks on Install scripts - APV
"Who Bears the Risk?" Why a Market Incentives Perspective is Critical to Protecting Patients from Cyber Threats - BHV
(CANCELED) Discord Closing Ceremonies - DC
(Replay) Racketeer Toolkit. Prototyping Controlled Ransomware Operations - DC
(Replay) UFOs: Misinformation, Disinformation, and the Basic Truth - DC
(Tool Demo) ImproHound - Identify AD tiering violations - AVV
(Tool Demo) New generation of PEAS - AVV
(Tool Demo) Prelude Operator - AVV
(Tool Demo) PurpleSharp: Automated Adversary Simulation - AVV
(Tool Demo) Red Team Credentials Reconnaissance (OLD with a TWIST) - AVV
(Tool Demo) Tenacity: An Adversary Emulation Tool for Persistence - AVV
(Workshop) - Integrating DAST tools into developers' test process - APV
(Workshop) From zero to hero: creating a reflective loader in C# - AVV
(Workshop) Tradecraft Development in Adversary Simulations - AVV
*nix Processes. Starting, Stopping, and Everything In Between - PHV
0-Days & Nat 20's - CVSSv3 Through the Lens of Dungeons & Dragons - APV
1.21 Gigawatts! Vulnerabilities in Solar Panel Controllers - IOTV
2021 - Our Journey Back To The Future Of Windows Vulnerabilities and the 0-days we brought back with us - DC
40 cores and a CPU - BICV
5 years of IoT vulnerability research and countless 0days - A retrospective - IOTV
A Cohort of Pirate Ships - BHV
A Deep Dive Into Supply Chain Vulnerabilities: And How SecDevOps Can Save the Day - APV
A Deep Dive on Vulnerability Disclosure for Election Systems - VMV
A Discussion with Agent X - DC
A Journalist’s Perspective on Fake News - VMV
A Lazy r2 Solve of @mediumrehr Challenge 6 - HHV
A Lazy r2 Solve of @mediumrehr Challenge 6 - HHV
A Lazy r2 Solve of @mediumrehr Challenge 6 - HHV
A new class of DNS vulnerabilities affecting many DNS-as-Service platforms - DC
A-ISAC CTF -- Pre-registration Required - ASV
A-ISAC CTF -- Pre-registration Required - ASV
A&E Pool Party! - SOC
A&E Pool Party! - SOC
A&E Pool Party! - SOC
A&E Pool Party! - SOC
“Alexa, have you been compromised?” — Exploitation of Voice Assistants in Healthcare (and other business contexts) - IOTV
Abusing SAST tools! When scanners do more than just scanning - DC
ADSB Demo and Paper Airplanes - ASV
ADSB Demo and Paper Airplanes - ASV
Advanced Wireless Attacks Against Enterprise Networks - WS
Adventures in MitM-land: Using Machine-in-the-Middle to Attack Active Directory Authentication Schemes - DC
Adventures in Pro Bono Digital Forensics Work - BTV
Adversary Infrastructure Tracking with Mihari - RCV
Adversary Village Closing Ceremony - AVV
Adversary Village Keynote - AVV
Adversary Village Kick-off - AVV
AI Policy Talk: "An AI Security ISAC" and "An AI Playbook" - AIV
AIAA CubeSat Hacking Workshop - Virtual Lab #1 - ASV
AIAA CubeSat Hacking Workshop - Virtual Lab #2 - ASV
AIAA CubeSat Hacking Workshop - Virtual Lab #3 - ASV
AIAA CubeSat Hacking Workshop - Virtual Lab #4 - ASV
AIAA CubeSat Hacking Workshop - World Premier of the videos - ASV
AIS Protocol Internals (Abridged) - HTSV
AIS Tools Demo (DEF CON) - HTSV
AIS Tools - DL
Algorithmic Ethics Bug Bounty Contest Announcement - AIV
Amateur Radio Digital Modes Primer - HRV
Amateur Radio Mesh Networking: Enabling Higher Data-rate Communications - HRV
An Introduction to RF Test Equipment - HRV
Analysis 101 and 102 for the Incident Responder - WS
Analysis 101 and 102 for the Incident Responder - WS
Antenny - ASV
Antenny - ASV
Approaches to Attract, Develop, and Retain an Industrial Cybersecurity Workforce - ICSV
AppSec 101: A Journey from Engineer to Hacker - APV
AppSec Quiz Time! - APV
AppSec Quiz Time! - APV
AppSec Quiz Time! - APV
AppSec Village Capture the Flag Ends - APV
AppSec Village Capture the Flag Starts - APV
APT Hunting with Splunk - PHV
APT: A Short History and An Example Attack - AVV
Are Barcodes on Ballots Bad?  - VMV
Are We Still Doing it? 10 Locksport Hobbies that go Beyond Lock Picking - LPV
ARINC 429 Lab - ASV
ARINC 429 Lab - ASV
Assless Chaps: a novel combination of prior work to crack MSCHAPv2, fast (or why MSCHAPv2 is so broken, it’s showing it’s whole ass) - RFV
At least ten questions for “Bad HIPPA Takes” (@BadHIPPA), 2021’s best tweeter on privacy, pandemic, and snark. - BHV
ATM Transaction Reversal Frauds (And how to fight them) - PYV
Attack and Detect with Prelude Operator and Security Onion - BTV
Attacking Modern Environments Series: Attack Vectors on Terraform Environments - CLV
Attacking Modern Environments Series: Attack Vectors on Terraform Environments - APV
AutoDriving CTF - CON
Automated Tear Machines - PYV
AWS cloud attack vectors and security controls - CLV
Azure Active Directory Hacking Wars - CLV
BADASS Meetup (Virtual) - SOC
BCOS Village Contest Overview - BCV
Beetlejuice: The Lessons We Should Have Learned For ICS Cybersecurity - ICSV
Beverage Cooling Contraption Contest - CON
Biohacking Village CTF: Hospital Under Siege (Pre-Qual) (Pre-registration required) - BHV
Biohacking Village Welcome Keynote - BHV
Biohacking Village Wrap-Up - BHV
Black Box Challenges - IOTV
Black Box Challenges - IOTV
Black Cyber Exodus: The Mis-Education (Certification) of Black Cyber - BICV
Blacks in Cybersecurity CTF - CON
Blockchain as a Threat Modeling Thinking Tool - BCV
Blockchain Security Tools - BCV
BLUEMONDAY Series – Exploitation & Mapping of vulnerable devices at scale through self-registration services (DATTO/ EGNYTE/ SYNOLOGY/ MERAKI/ GEOVISION) - IOTV
Bobby Pins, More Effective Than Lockpicks? - LPV
Bottom-Up and Top-Down: Exploiting Vulnerabilities In the OT Cloud Era - ICSV
Breaking Future Crypto Custody - BCV
Breaking Historical Ciphers with Modern Algorithms - CPV
Breaking Secure Bootloaders - DC
Breaking TrustZone-M: Privilege Escalation on LPC55S69 - DC
Bring Your Own Print Driver Vulnerability - DC
BTV Presents: Forensics Station - Workshop 1 - BTV
BTV Presents: Malware Station - Maldoc Workshop - BTV
BTV Presents: Threat Report Roulette - BTV
BTV Presents: Welcome to #IRLIFE. A live IR TableTop Panel - BTV
Bug bounty Hunting Workshop - WS
Bug Hunter's Guide to Bashing for a Car Hacking Bug Bash or Contest - CHV
Build Automotive Gateways with Ease - CHV
Building an ICS Firing Range (in our kitchen): Sharing Our Journey & Lessons Learned (so you don’t have to) - ICSV
Bundles of Joy: Breaking macOS via Subverted Applications Bundles - DC
C2Centipede: APT level C2 communications for common reverse HTTP shell tools - AVV
California Cyber Innovation Challenge CTF -- Pre-registration Required - ASV
Can I Make My Own Social Threat Score? - RCV
Can’t Stop the Code: Embrace the Code - APV
Car Hacking + Bug Hunting Field Guide for Appsec Hackers - APV
Car Hacking CTF - CON
Career Hacking: Tips and Tricks to Making the Most of your Career - CAHV
Catching (and Fixing) an Unlimited Burn Vulnerability - BCV
Caught you - reveal and exploit IPC logic bugs inside Apple - DC
Central bank digital currency, threats and vulnerabilities - DC
Certified Ethereum Professional (CEP) Overview - BCV
Chillout Lounges - DC
Chillout Lounges - DC
Chillout Lounges - DC
Chillout Lounges - DC
Chinese Military Bioweapons and Intimidation Operations: Part III - BHV
Cloud security for healthcare and life sciences - BHV
Cloud Security Orienteering - CLV
Cloud Village CTF - Registration - CLV
Cloud Village CTF - CLV
Coindroids - CON
Collecting CANs: a Bridge Less Traveled - ASV
Colorful AppSec - APV
Commercial Transportation: Trucking Hacking - CHV
Community Roundtable - (De)Criminalizing Hacking Around the Globe - DC
Community Roundtable - 10 years after SOPA: where are we now? - DC
Community Roundtable - If only you knew - DC
Community Roundtable - Implementing Cyber Solarium Commission Policy - DC
Community Roundtable - RANSOMWARE: Combatting Ransomware on a Global Stage / The realities of responding to ransomware - DC
Community Roundtable - Supply Chain in the COVID Era - DC
Community Roundtable - Thinking About Election Security - DC
Community Roundtable - Toward a Global IoT Code of Practice - DC
Community Roundtable - Volunteer Hacker Fire Department - DC
Community Roundtable - We can build it. We have the technology. So why aren't we? - DC
Community Roundtable - We need to talk about Norm – Discussions on International cyber norms in diplomacy - DC
Community Roundtable - Zero Trust, Critical Software, and a Cyber Safety Review Board - DC
Consider the (Data) Source - ICSV
COSTA (Coinbase Secure Trait Analyzer) - BCV
Cotopaxi - DL
CPDLC: Man-in-the-middle attacks and how to defend against them - ASV
Crippling the Grid: Examination of Dependencies and Cyber Vulnerabilities - ICSV
Cross-document messaging technology, how to hack it, and how to use it safely. - APV
Crossover Episode: The Real-Life Story of the First Mainframe Container Breakout - DC
Cryptocurrency Trivia! - CCV
CSP is broken, let’s fix it - APV
CSPM2CloudTrail - Extending CSPM Tools with (Near) Real-Time Detection Signatures (Lightning Talk) - CLV
CybatiWorks Mission Station Workshop - ICSV
Cyber Defense Matrix in Healthcare - BHV
Cyber in the Under Sea - HTSV
Cyber Operations and Operational Wargames on Port Infrastructure - HTSV
Cyber Risk Management in the MTS - HTSV
Cyber-SHIP Lab Talk and Demo - HTSV
Darknet-NG - CON
Darknet-NG - CON
Darknet-NG - CON
Data Duplication Village - Last Chance Pickup Only - DDV
Data Duplication Village - Open for dropoff only - DDV
Data Duplication Village - Open - DDV
Data Duplication Village - Open - DDV
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup - SOC
Decoding NOAA Weather Sat Signals - ASV
Deep Space Networking - ASV
Deep Space Networking - ASV
DEF CON Bike Ride - CON
DEF CON Closing Ceremonies, Black Badge Ceremonies - DC
DEF CON Human Registration (Badge Pickup) and Vaccine Check Processing Open - DC
DEF CON Human Registration (Badge Pickup) and Vaccine Check Processing Open - DC
DEF CON Human Registration (Badge Pickup) and Vaccine Check Processing Open - DC
DEF CON Human Registration (Badge Pickup) Open - DC
DEF CON Movie Night - Tron - DC
DEF CON Movie Night - Upgrade - DC
Defeating Physical Intrusion Detection Alarm Wires - DC
Defending against nation-state (legal) attack: how to build a privacy-protecting service in the era of ubiquitous surveillance - DC
Defending IoT in the Future of High-Tech Warfare - IOTV
Defending the Unmanned Aerial Vehicle: Advancements in UAV Intrusion Detection - ASV
DeFi Must Change or Hacks Will Accelerate - BCV
Depthcharge - DL
Designing a C2 Framework - AVV
Detecting Attackers Using Your Own Sensors with State Estimation - ICSV
Detection Challenges in Cloud Connected Credential Abuse Attacks - CLV
Developing Aerospace Security Training 3D Models - ASV
DevSecOps: Merging Security and Software Engineering - APV
DEX trading without leaking your identity: RAILGUN - CCV
DFDs Ain't That Bad - APV
Digital Forensics and Incident Response Against the Dark Arts: The Battle of Malicious Email and Downloaders - WS
Discord Practice Net - HRV
Do No harm; Health Panel : Live version - A DEF CON Policy Panel - DC
Do We Really Want to Live in the Cyberpunk World? - ICSV
Do you like to read? I know how to take over your Kindle with an e-book - DC
Do You Really Own Your NFTs? - BCV
Don't Dare to Exploit - An Attack Surface Tour of SharePoint Server - DC
Don’t fear the BUS, it won’t run you over. - ASV
Doors, Cameras, and Mantraps OH MY! - LPV
DoS: Denial of Shopping – Analyzing and Exploiting (Physical) Shopping Cart Immobilization Systems - DC
Drone Security Research Series – Ep6 Hacking with drones - ASV
Drunk Hacker History - CON
eBPF, I thought we were friends! - DC
EFF Tech Trivia - CON
Empire - DL
Encryption for Developers - APV
ESP8266, do you know what's inside your IoT? - RFV
Ethereum Hacks & How to Stop Them - BCV
Ethics at the Edge: IoT as the Embodiment of AI for Rampant Intelligence Actuation - IOTV
Evading Detection a Beginner's Guide to Obfuscation - WS
Evaluating Wireless Attacks on Real-World Avionics Hardware - ASV
Everything is a C2 if you're brave enough - AVV
Evils in the DeFi world - BCV
Exploiting Blue Team OPSEC failures with RedELK - AVV
Exploiting the O365 Duo 2FA Misconfiguration (Lightning Talk) - CLV
Extension-Land: exploits and rootkits in your browser extensions - DC
Extracting all the Azure Passwords - CLV
F**k You, Pay Me - Knowing your worth and getting paid - CAHV
Federal Perspective on Aerospace Cybersecurity - ASV
Finding Hidden Gems via URL Shortener Services - RCV
Fireside Chat - August Cole - ICSV
Fishing or Hunting - BHV
Flash Loans Demystified - BCV
Forensicating Endpoint Artifacts in the World of Cloud Storage Services - BTV
Fortifying ICS - Hardening and Testing - ICSV
Frack - DL
Frag, You’re it - Hacking Laser Tag - RFV
Friends of Bill W. - SOC
Friends of Bill W. - SOC
Friends of Bill W. - SOC
Friends of Bill W. - SOC
Friends of Bill W. - SOC
Friends of Bill W. - SOC
Friends of Bill W. - SOC
From CTF to CVE - CHV
From On-Prem to the Cloud - Hybrid AD attack path - AVV
From Zero to Hero in Web Security Research - WS
From Zero to Hero in Web Security Research - WS
Fuzzing CAN / CAN FD ECU's and Network - CHV
Fuzzing Linux with Xen - DC
Fuzzing NASA Core Flight System Software - ASV
Game Theory: Understanding and Strategy and Deception - AVV
Getting Started with Decentralized Object Storage - CCV
Getting started with low power & long distance communications - QRP - HRV
Git Wild Hunt - DL
Glitching RISC-V chips: MTVEC corruption for hardening ISA - DC
Gold Bug Q&A - CPV
Gone Apple Pickin': Red Teaming macOS Environments in 2021 - DC
Gothcon 2021 (Virtual) - SOC
Gothcon 2021 - SOC
Hack the Conspiracies - VMV
Hack the hackers: Leaking data over SSL/TLS - DC
Hack the Sea Cabana Party - HTSV
Hack the Wind - HTSV
Hack-A-Sat 2: The Good, The Bad and the Cyber-Secure - ASV
Hack-A-Sat2 Satellite Platform - ASV
Hack-A-Sat2 Satellite Platform - ASV
Hack3r Runw@y - CON
Hack3r Runw@y - CON
Hacker Flairgrounds - SOC
Hacker Jeopardy - CON
Hacker Jeopardy - CON
Hacker Karaoke (Virtual) - SOC
Hacker Karaoke (Virtual) - SOC
HACKERS INTO THE UN? Engaging in the cyber discussions on war & peace - DC
Hacking G Suite: The Power of Dark Apps Script Magic - DC
Hacking Humans with AI as a Service - DC
Hacking the Apple AirTags - DC
Hacking the Metal: An Introduction to Assembly Language Programming - WS
Hacking the Metal: An Introduction to Assembly Language Programming - WS
Hacking to Save Democracy: What Technologists Need to Know About Election Administration - VMV
Hacking Your Career: The Options - CAHV
HACMS Live Demo - ASV
HACMS Live Demo - ASV
Ham Radio Exams - HRV
Ham Radio Exams - HRV
Ham Radio Exams - HRV
Ham Radio Village Closing Commentary - HRV
Hands-On TCP Deep Dive with Wireshark - PHV
Hardware Hacking 101: Rogue Keyboards and Eavesdropping Cables - HHV
Hardware Hacking 101: Rogue Keyboards and Eavesdropping Cables - HHV
Hardware Hacking 101: Rogue Keyboards and Eavesdropping Cables - HHV
Hardware Wallet Show and Tell - CCV
Healthcare Innovation With People of All Abilities - BHV
Hi! I'm DOMAIN\Steve, please let me access VLAN2 - DC
High Turnout, Wide Margins - VMV
High-Stakes Updates | BIOS RCE OMG WTF BBQ - DC
Holistic View of a Flight with Crowd Sourced Data - ASV
House of Heap Exploitation - WS
How Bias and Discrimination in Cybersecurity will have us locked up or dead - BICV
How do you ALL THE CLOUDS? - BTV
How expensive is quantum factoring, really? - CPV
How I broke into Mexico City's justice system application and database - APV
How I defeated the Western Electric 30c - LPV
How I got COVID in a RedTeam: Social engineering and physical intrusion for realistic attack simulations. - AVV
How I use a JSON Deserialization 0day to Steal Your Money On The Blockchain - DC
How to Contact the ISS with a $30 Radio - HRV
How to Not Miss The Point: Reflections on Race, Health, and Equity - BHV
How to Weaponize RLAs to Discredit an Election - VMV
How vigilant researchers can uncover APT attacks for fun and non profit - RCV
HTTP/2: The Sequel is Always Worse - DC
Hunting Evil with Wireshark - PHV
Hunting for AWS Exposed Resources - CLV
Hybrid PhySec tools - best of both worlds or just weird? - LPV
I know who has access to my cloud, do you? - BTV
I know who has access to my cloud, do you? - CLV
I used AppSec skills to hack IoT, and so can you - IOTV
I used AppSec skills to hack IoT, and so can you - APV
ICS Cyber Threat Intelligence (CTI) Information Sharing Between Brazil and the United States - ICSV
ICS Intrusion KillChain explained with real simulation - ICSV
ICS Jeopardy - ICSV
Identifying Excel 4.0 Macro strains using Anomaly Detection - AIV
Identifying toxic combinations of permissions in your cloud infrastructure - CLV
In Space, No One Can Hear You Hack - ASV
In-person broadcast via demolabs - HTSV
Inspecting Signals from Satellites to Shock Collars - WS
Instrument and Find Out: Writing Parasitic Tracers for High(-Level) Languages - DC
Internet Protocol (IP) - PHV
Internet-of-Ingestible-Things Security by Design - BHV
Intro to high security locks and lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro To Lockpicking - LPV
Intro to ML Workshop - AIV
Intro to ML Workshop - AIV
Intro to ML Workshop - AIV
Intrusion Analysis and Threat Hunting with Suricata - PHV
IoT devices as government witnesses: Can IoT devices ever be secure if law enforcement has unlimited access to their data? - IOTV
IoT Testing Crash Course - IOTV
IoT Village Capture the Flag (CTF) - IOTV
IoT Village Capture the Flag (CTF) - IOTV
IoT Village Capture the Flag (CTF) - IOTV
IoT Village Labs - IOTV
IoT Village Labs - IOTV
IoT Village Labs - IOTV
It Takes a Village (and a generous grant): Students Performing ICS Security Assessments - ICSV
It takes a village: Why you should join the Biohacking Village - BHV
Judging by the Cover: Profiling & Targeting Through Social Media - SEV
Keeping Your Information Security Policy Up to Date - VMV
Key Duplication - It's not just for the movies! - LPV
Key Note – The Three Amigos: Money Laundering, Cryptocurrencies, and Smart Contracts - BCV
Keynote - PW Singer - ICSV
Kickoff Remarks (recorded in-person in Las Vegas) - VMV
Kubernetes Goat - Kubernetes Security Learning (Tool Demo) - CLV
Kubernetes Goat - DL
Kubernetes Security 101: Best Practices to Secure your Cluster (Workshop) - CLV
Kubestriker - DL
Law School for Lockpickers - LPV
Lawyers Meet - SOC
Learning to Hack Bluetooth Low Energy with BLE CTF - WS
LED Light Lunacy! - IOTV
Lego Spike Hub - ASV
Lego Spike Hub - ASV
Less Jaw Work, More Paw Work: Why We Need to Start “Doing” Cyber - HTSV
Let the bugs come to me - how to build cloud-based recon automation at scale - RCV
Lets Get Real About The Future State of Healthcare - BHV
Leveraging NGFWs for Threat Hunting - BTV
Leveraging SBOMs to Enhance ICS Security - ICSV
Lightning talk: Autonomous lateral movement - AVV
Lightning Talk: Differential Privacy and Census Data - CPV
Linux Binary Analysis w/ Strace - PHV
Look at me, I'm the Adversary now: Introduction to Adversary Emulation and its place in Security Operations - AVV
Lost In Space: No-one Can Hear Your Breach (Choose Wisely) - ASV
MacOs Workshop - Hunt for Red Apples: Ocean Lotus Edition Part 2 - BTV
MacOs Workshop - Hunt for Red Apples: Ocean Lotus Edition Part1 - BTV
Make Them Want To Tell You: The Science of Elicitation - SEV
Making the DEF CON 29 Badge - DC
Making the Leap - Changing Careers - CAHV
MAVSH> Attacking from Above - DC
Meetup: Certification Processes (UL, FCC, etc.) - HHV
Meetup: Legacy Hardware - HHV
Meetup: OSS ASIC - HHV
Meetup: PCB Proto and Rework - HHV
Meetup: Some HHV challenges - HHV
Meetup: Some HHV challenges - HHV
Meetup: Some HHV challenges - HHV
Meetup: Sourcing Parts & The Global Parts Shortage - HHV
Microsoft ML Security Evasion Competition Details - AIV
Mind the Gap - Managing Insecurity in Enterprise IoT - IOTV
MIPS-X - The next IoT Frontier - IOTV
MITRE Engage: A Framework for Adversary Engagement Operations - PHV
Modern Authentication for the Security Admin - BTV
Modern Malware Analysis for Threat Hunters - WS
Monero After Party - CCV
Monero Scaling Opportunities and Challenges - CCV
Mooltipass - DL
Music - Abstrct - MUS
Music - Acid T - MUS
Music - CTRL/RSM - MUS
Music - CTRL/rsm - MUS
Music - Deep Therapy - MUS
Music - DJ St3rling - MUS
Music - Dr. McGrew - MUS
Music - FuzzyNop - MUS
Music - FuzzyNop - MUS
Music - Icetre Normal - MUS
Music - Krisz Klink - MUS
Music - Magik Plan - MUS
Music - mattrix - MUS
Music - Miss Jackalope - MUS
Music - n0x08 - MUS
Music - Nina Lowe - MUS
Music - Ohm-i - MUS
Music - Scotch & Bubbles - MUS
Music - Tense Future - MUS
Music - Terrestrial Access Network - MUS
Music - Thaad - MUS
Music - Yesterday & Tomorrow - MUS
Music - Z3NPI - MUS
Music - Zebbler Encanti Experience - MUS
My other car is your car: compromising the Tesla Model X keyless entry system - CHV
National Service Panel - CAHV
Network Analysis with Wireshark - WS
Never a dill moment: Exploiting machine learning pickle files - AIV
New Face, Who Dis? Protecting Privacy in an Era of Surveillance - CPV
New Hampshire SB43 Forensic Audit - VMV
New Phishing Attacks Exploiting OAuth Authentication Flows - DC
No Aggregation Without Representation - BHV
No Key? No PIN? No Combo? No Problem! P0wning ATMs For Fun and Profit - DC
Not so Passive: Vehicle Identification and Tracking via Passive Keyless Entry - CHV
Offensive Golang Bonanza: Writing Golang Malware - DC
Old MacDonald Had a Barcode, E-I-E-I CAR - DC
Onions In the Cloud Make the CISO Proud (Workshop) - CLV
Open Bridge - DL
Open-Source Vaccine Developer Kits (VDKs) with RaDVaC - BHV
OpenSOC Blue Team CTF - CON
OpenSOC Blue Team CTF - CON
Operation Bypass: Catch My Payload If You Can - AVV
OSINT and the Hermit Kingdom. Leveraging online sources to learn more about the worlds most secret nation - RCV
OSINT for Sex Workers - RCV
OSINT Tales: What the Public Knows About Russia’s New Mega-Submarine - HTSV
Over-the-air remote code execution on the DEF CON 27 badge via Near Field Magnetic Inductance or World’s first NFMI exploitation, sorta or OTARCEDC27NFMIOMGWTFBBQ - DC
OWASP & CSA IoT: Impacting Medical Security - BHV
Panel discussion: Adversary simulation, emulation or purple teaming - How would you define it? - AVV
Panel discussion: Is Adversary Emulation Too ___ For You? - AVV
Panel discussion: Resilient cyber space: The role of hacker and security communities - AVV
ParseAndC - DL
Pentesting 101 - IOTV
Pentesting 101 - IOTV
People Hunting: A Pentesters Perspective - RCV
Phantom Attack: Evading System Call Monitoring - DC
Phish Like An APT - AVV
Piecing Together Your Personal Privacy Profile - CPV
PINATA: PIN Automatic Try Attack - DC
Playing God: How ambiguities in state and federal breach notification laws give lawyers too much discretion in deciding whether or not to disclose potential data breaches - CPV
Playing with FHIR: hacking and securing healthcare APIs - BHV
PMapper - DL
Poking bots for fun and profit in the age of asynchronous stuff - APV
Policy Debrief - Global Cyber Capacity Building - triple challenge or triple opportunity? - DC
Policy Debrief - Myths and Legends of Section 230 - DC
Polyswarm Talk - BCV
Potential Pitfalls Protecting Patient Privacy - AIV
Preventing Sandwich Attacks on DeFi Protocols using Recurrent and Recursive Zero Knowledge Proofs - BCV
Privacy on Public Blockchains with SGX - CCV
Privacy Without Monopoly: Paternalism Works Well, But Fails Badly - DC
ProxyLogon is Just the Tip of the Iceberg, A New Attack Surface on Microsoft Exchange Server! - DC
PunkSPIDER and IOStation: Making a Mess All Over the Internet - DC
QueerCon Party - SOC
QueerCon Party - SOC
QueerCon Party - SOC
Racing cryptoexchanges or how I manipulated the balances - PYV
Racketeer Toolkit. Prototyping Controlled Ransomware Operations - DC
Ransomeware’s Big Year – from nuisance to “scourge”? - DC
Ransomware ATT&CK and Defense with the Elastic Stack - BTV
RCE via Meow Variant along with an Example 0day - PHV
Ready, fire aim: Hacking State and Federal Law Enforcement Vehicles - CHV
Recon Village Keynote - RCV
Red Alert ICS CTF - CON
Red Alert ICS CTF - CON
Red Team Village CTF - Closing Ceremony - CON
Red Team Village CTF - Finals Part 1 - CON
Red Team Village CTF - Finals Part 2 - CON
Red Team Village CTF - Qualifier Prizes and Announcements - CON
Red Team Village CTF - Qualifiers Part 1 - CON
Red Team Village CTF - Qualifiers Part 2 - CON
Red vs Blue vs Green : The ultimate battle of opinions (or is it) - BHV
Remote Adversarial Phantom Attacks against Tesla and Mobileye - CHV
Remote Ham Radio Exams - HRV
Remote Ham Radio Exams - HRV
Remotely Rooting Charging Station for fun and maybe profit - CHV
reNgine - DL
Replication as a Security Threat: How to Save Millions By Recreating Someone Else’s Model - AIV
Representation Matters - IOTV
Response Smuggling: Pwning HTTP/1.1 Connections - DC
Retired but not forgotten – A look at IFEs - ASV
Reverse Supply Chain Attack - A Dangerous Pathway To Medical Facilities’ Networks - IOTV
RF Propagation and Visualization with DragonOS - RFV
Risks of ML Systems in Health Care: The Real Story - AIV
Robo Sumo On site - HHV
Robots with lasers and cameras (but no security): Liberating your vacuum from the cloud - DC
Robustness of client-side scanning for illegal content detection on E2EE platforms - AIV
Rotten code, aging standards, & pwning IPv4 parsing across nearly every mainstream programming language - DC
RTV/AIV Red Teaming AI Roundtable - AIV
Ruse - DL
Safecracking for Everyone! - LPV
Safety Third: Defeating Chevy StabiliTrak for Track Time Fun - CHV
Scaling AppSec through Education - APV
Scaling Blockchains: A Novel Approach - BCV
Scaling static analysis for free: add additional codebases with a single line of code and no money - APV
Scaling Up Offensive Pipelines - AVV
Scope X: Hunt in the Ocean! - BTV
Scripts and Tools to Help Your ICS InfoSec Journey - ICSV
SE Team vs. Red Team - SEV
Sea Pods - HTSV
SeaTF, Pirate Hat, and Salty Sensor Results, Closing Statements - HTSV
Secrets of Social Media PsyOps - VMV
SECTF4Kids (Pre-Registration Required) - SEV
Secure Coding Tournament CTF - CON
Secure messaging over unsecured transports - WS
Securing the Internet of Biological Things - BHV
Security Investigations with Splunk - PHV
Seeing the Forest Through the Trees – Foundations of Event Log Analysis - PHV
Seeing Through The Windows: Centralizing Windows Logs For Greater Visibility - PHV
Selling Yourself as a Security Professional - CAHV
Shell Language Processing (SLP) - AIV
Shift Left Using Cloud: Implementing baseline security into your deployment lifecycle - CLV
Shutter - DL
Siembol - DL
Signed, Sealed, Delivered: Abusing Trust in Software Supply Chain Attacks - APV
Signed, Sealed, Delivered: Comparing Chinese APTs behind Software Supply Chain Attacks - AVV
Sla(sh*t)ing happens when you stake - BCV
Sleight of ARM: Demystifying Intel Houdini - DC
Smart Meters: I'm Hacking Infrastructure and So Should You - ICSV
Sneak into buildings with KNXnet/IP - DC
So What? The CFAA after Van Buren - CPV
So You Want to OPSEC, Eh? - RCV
Social Media Security = Election Security - VMV
Solitude - DL
SPARROW: A Novel Covert Communication Scheme Exploiting Broadcast Signals in LTE, 5G & Beyond - DC
Spectrum Coordination for Amateur Radio - HRV
State of Cryptocurrency Ransomware AMA - CCV
Staying Fresh While the Feds Watch: Changes in Government Surveillance and Why it Matters - CPV
Steal This Drone: High-Assurance Cyber Military Systems - ASV
Strategic Trust and Deception in the Internet of Things - IOTV
Structured Analytical Techniques for Improving Information Security Analyses - BTV
Subtle and Not So Subtle Ways to Lose Your Cryptocurrency - BCV
Summer of Fuzz: MacOS - APV
Surviving 51% Attacks on Blockchains - BCV
Surviving DeFi: How to Prevent Economic Attacks - BCV
Table Top Exercise - Deus Ex Machina (Pre-registration Required) - BHV
Taking Apart and Taking Over ICS & SCADA Ecosystems: A Case Study of Mitsubishi Electric - DC
TEMPEST radio station - DC
The Action Plan for Cyber Diversity! - BICV
The Agricultural Data Arms Race: Exploiting a Tractor Load of Vulnerabilities In The Global Food Supply Chain - DC
The Antenny Board Design and Fabrication Saga: Sweat and Tears Along the Supply Chain - ASV
The Basics of Breaking BLE - Part 2: Doing More With Less - RFV
The Big Cleanup: Tackling The Remnants of Systematic Discrimination in the Tech Industry - BICV
The Black Box and the Brain Box: When Electronics and Deception Collide - HHV
The Black Box and the Brain Box: When Electronics and Deception Collide - HHV
The Black Box and the Brain Box: When Electronics and Deception Collide - HHV
The Bug Hunter’s Recon Methodology  - RCV
The Coat Hanger Talk: A Noob's Look Into the Thieves World - LPV
The Coming AI Hackers - AIV
The Coming AI Hackers - AIV
The Curious case of knowing the unknown - APV
The Digital Physiome - How wearables can (and are) transforming healthcare - BHV
The Fault in Our Stars - Attack vectors for APIs using AWS API Gateway Lambda Authorizers - CLV
The Hangar – Cocktail Making Event - ASV
The Innocent Lives Foundation: A Beacon of Light in a Dark World - SEV
The Journey of Establishing IoT Trustworthiness and IoT Security Foundation - IOTV
The Joy of Reverse Engineering: Learning With Ghidra and WinDbg - WS
The Little Things - BHV
The Mechanics of Compromising Low Entropy RSA Keys - DC
The Neuroscience of Magic (Registration required) - RGV
The Next Critical Infrastructure: Understanding the Bioeconomy - BHV
The OPSEC of Protesting - BICV
The PACS-man Comes For Us All: We May Be Vaccinated, but Physical Access Control Still Sucks - DC
The Real History of Adversarial Machine Learning - AIV
The Real Story on Patching Medical Devices - BHV
The Security of Your Digital DNA, from Inception to Death - BHV
The State of AI Ethics - AIV
The threat hiding in daylight: Police Monitoring legislation and individual privacy in chat - CPV
The Unbelievable Insecurity of the Big Data Stack: An Offensive Approach to Analyzing Huge and Complex Big Data Infrastructures - DC
The War for Control of DNS Encryption - PHV
The Way of The Adversary - AVV
The Wild West of DeFi Exploits - BCV
This is what we thought would happen in 2021 - BTV
This Job Ad Sucks - CAHV
Threat Modeling for Space Hitchhikers - ASV
Time Turner - Hacking RF Attendance Systems (To Be in Two Places at Once) - DC
Timeless Timing Attacks - DC
Tin Foil Hat Contest - CON
Top 10 BOGUS Biometrics! - RGV
Top 20 Secure PLC Coding Practices - ICSV
Toward a Collaborative Cyber Defense and Enhanced Threat Intelligence Structure - ICSV
Towards Understanding the Unlimited Approval in Ethereum - BCV
Toxic BBQ - SOC
Trace Labs OSINT Search Party CTF - Award Ceremony - CON
Trace Labs OSINT Search Party CTF - Briefing - CON
Trace Labs OSINT Search Party CTF - CON
Tracee - DL
Trailblazing the AI for Cybersecurity Discipline: Overview of the Field and Promising Future Directions - AIV
Tricks for the Triage of Adversarial Software - BTV
Triptych - CCV
True Story: Hackers in the Aerospace Sector - ASV
Truth, Trust, and Biodefense - BHV
Tryptich Talk - BCV
Twitter Ethics Bug Bounty: Winners and Wrap-up - AIV
Twitter Q&A regarding Top 10 BOGUS Biometrics! - RGV
UFOs: Misinformation, Disinformation, and the Basic Truth - DC
Unboxing the Spacecraft Software BlackBox – Hunting for Vulnerabilities - ASV
Uncomfortable Networking - BTV
Uncovering covert network behaviors within critical infrastructure environments - BTV
Understanding common Google Cloud misconfiguration using GCP Goat - CLV
Understanding Space in the Cyber Domain - ASV
Understanding Space in the Cyber Domain - ASV
UPnProxyPot: fake the funk, become a blackhat proxy, MITM their TLS, and scrape the wire - DC
US Coast Guard 2021 Cyber Strategic Outlook - HTSV
USBSamurai - DL
Use a PortaProg to flash, dump, and test ISP and UPDI chips - HHV
Use a PortaProg to flash, dump, and test ISP and UPDI chips - HHV
Use a PortaProg to flash, dump, and test ISP and UPDI chips - HHV
Use DNS to detect your domains are abused for phishing - BTV
Using Barq to perform AWS Post-Exploitation Actions - CLV
Using OSINT to Aid in Human Trafficking and Smuggling Cases - RCV
Using Passive DNS for gathering Business Intelligence - RCV
Using SE to create insider threats and win all the things - SEV
Using UAV in Military Zone Areas by GPS Spoofing with RF Devices - RFV
Vampire the Masquerade (Party) - SOC
VDP in aviation: Experiences and lessons learnt as a researcher - ASV
Velociraptor - Dig Deeper - BTV
Venator: Hunting & Smashing Trolls on Twitter - RCV
Vetcon Meetup (Hybrid) - SOC
Voting Village Keynote Remarks - VMV
Voting Village Logistical Information Broadcast (Discord, Youtube, Twitch) - VMV
Vulnerability Exchange: One Domain Account For More Than Exchange Server RCE - DC
Vulnerability Inheritance - Attacking companies and scoring bounties through 3rd party integrations - APV
Walkthrough of DC 28 HHV Challenges - HHV
Walkthrough of DC 28 HHV Challenges - HHV
Walkthrough of DC 28 HHV Challenges - HHV
War Story Bunker - SOC
Warping Reality - creating and countering the next generation of Linux rootkits using eBPF - DC
Watch Out! And just skip the packer - BTV
Web App Penetration Testing Workshop - PHV
Welcome Note - BCV
Welcome Note - BCV
Welcome to AI Village - AIV
Welcome To DEF CON - Dark Tangent & Making the DEF CON 29 Badge - DC
Welcome to Discord - DC
Welcome to Gold Bug - CPV
Welcome. A Short Tour of Good and Bad AI in 2021 - AIV
What happens when businesses decide to enroll cryptocurrency cards - PYV
What Is Zero Knowledge - CCV
What Machine Learning Can and Can't Do for Security - BTV
When nothing goes right, push left. Designing logs for future breach investigations - APV
When Penetration Testing Isn’t Penetration Testing At All - IOTV
Where We’re Going We Don’t Need Labels: Anomaly Detection for 2FA - AIV
Who's Afraid of Thomas Bayes? - AIV
WhoC - Peeking under the hood of CaaS offerings - CLV
Whose Slide Is It Anyway - CON
Why does my security camera scream like a Banshee? Signal analysis and RE of a proprietary audio-data encoding protocol - DC
Why don’t we have IoT, daddy? - BICV
Why Hacking Voters Is Easier Than Hacking Ballots - VMV
Wibbly Wobbly, Timey Wimey – What's Really Inside Apple's U1 Chip - DC
WiFi Kraken Lite - DL
WiFi Kraken Lite - DL
WiFi Kraken Lite - DL
Will Secure Element Really Help Strengthen the Security of Cryptocurrency Wallets? - BCV
Windows Forensics 101 (Beginner) - BTV
Windows Internals - WS
Windows Internals - WS
Windows Server Containers are Broken - Here's How You Can Break Out - CLV
Wireless Odyssey or why is the federal government permitting devices with wireless networking capability in federally certified voting machines? - VMV
Wireshark for Incident Response & Threat Hunting - BTV
Workshop & CTF: Practical Cryptographic Attacks - CPV
Workshop on Microsoft Counterfit - AIV
Workshop: Practically Protecting Phone Privacy (Pre-registration required) - CPV
Worming through IDEs - DC
Wrap Up - AIV
Writing Golang Malware - WS
Year of Mentoring: BTV’s Meet-a-Mentor Turns One - BTV
Yeet the leet with Osquery (Effective Threathunting Without Breaking Bank ) - BTV
You're Doing IoT RNG - IOTV
You're Doing IoT RNG - DC
Your House is My House: Use of Offensive Enclaves In Adversarial Operations - DC
Your Infrastructure is Encrypted: Protecting Critical Infrastructure from Ransomware - ICSV
Zuthaka - DL


DEF CON 29 Press roundup!

Posted 8.8.21

DEF CON 29 press roundup image

We're on the last day of DEF CON 29, both in the virtual and physical worlds. There's so much going on it's easy to miss a few things. Here's a brief listing of some of the press coverage of our events this year.

AND!XOR’s DEF CON 29 Electronic Badge Is An Assembly Puzzle

Hands On: DEF CON 29 Badge Embraces The New Normal

Black Hat USA 2021 and DEF CON 29: What to expect from the security events
Tech Republic

Privacy Without Monopoly: DEFCON 29

We Have Questions for DEF CON's Puzzling Keynote Speaker, DHS Secretary Mayorkas

Hands-On: Whiskey Pirates DC29 Hardware Badge Blings With RISC-V

#DEFCON: Hacking RFID Attendance Systems with a Time Turner

#DEFCON: Why Social Media Security is Election Security

#DEFCON: A Bad eBook Can Take Over Your Kindle (or Worse)

#DEFCON: Ransomware Moves from Nuisance to Scourge

Black Hat USA 2021 & DefCon 29: Hybride IT-Security-Konferenzen starten in Kürze

The Cybersecurity 202: The year’s biggest cybersecurity conferences are back, but limited
The Washington Post

DEF CON 29 Badge Update (The Firmware Kind)!

Posted 8.5.21

DEF CON 29 badges image

In case you didn't know, you can head over to for a link to updated badge firmware and instructions! We hope you enjoy DEF CON 29, In-person, or from wherever you may be!

DEF CON 29 In-person Pre-Registration is Closed!

Posted 8.4.21

DEF CON 29 registration closed image

The DEF CON 29 pre-reg at is now closed. You can still get a badge with cash payment onsite while they last, and you can purchase the Human+ Discord role directly on our Discord ( ) or at Thanks to everyone for supporting DEF CON this year, whether you’re attending virtually or here with us in Las Vegas. DEF CON ❤️ U. Tomorrow it begins!

Get the DEF CON 29 Soundtrack!

Posted 8.4.21

DEF CON 29 Soundtrack image

Get a head start on DEF CON 29 with this year’s Original Soundtrack! It’s waiting for you on the DEF CON media server right now. Like, right now. You have your assignment. CON 29/

Hackers with Disabilities Guide for DEF CON 29!

Updated 8.2.21

HDA Logo image

Thanks to @A_P_Delchi and Hackers with Disabilities for creating this helpful accessibility guide to DC29 . Don’t hesitate to reach out if we can help maximize your DEF CON, either through goons or via social media.

DEF CON 29, Now With More Free Black Hat!

Updated 7.30.21

Black Hat Logo image

Arriving early in Vegas? Check out Black Hat’s Arsenal and Business Hall for free!

This year, we’ve partnered with our friends at Black Hat to offer a free Black Hat Business Pass to all Def Con In-Person Badge holders. The pass would normally cost $250, but if you fill out their form here, you can get in for free. You’ll just need to show your DEF CON confirmation receipt when you pick up you Black Hat Business Hall pass over at Mandalay Bay.

Black Hat Business Hall hours:
Wednesday, August 4, 10:00 AM - 6:00 PM
Thursday, August 5, 10:00 AM - 4:00 PM

Here’s the full URL for registering:

DEF CON 29 Badges in the Wild!!

Updated 7.23.21

DEF CON 29 badge image

#Badgesighting! #DEFCON29 human badges for Virtual have started to arrive! Join the forums badge hacking thread to compare notes, pictures, and discover puzzles: #badgelife

DEF CON 29 Short Story Contest Winners!

Updated 7.23.21

DEF CON 29 Short story contest image

Congratulations to the winners of the DEF CON 29 Short Story Contest!

In FIRST place we have "Networks" by Gwisinkoht!
In SECOND place is "Repository Upload" by Alfred Rowdy!
People's Choice award goes to "FAICT" by Serum!

for the full post: #DEFCON

DEF CON 29 In-person Pre-Reg Closes July 29th! Onsite Cash Sales limited!

DEF CON 29 Pre registratiom image

Notice for #defcon29 in-person attendees: Online registration closes July 29. That's your last chance to buy a guaranteed badge. After that it's cash at the door, but please know that we’ve only got about 1,000 spaces for cash customers.

To be certain you get in, registering online by the 29th is your best bet. We don’t want to turn anyone away but we will once we reach capacity. Please consider pre-reg at if you don't want to YOLO it at the door.

Masks and proof of vaccination remain 100% required.

DEF CON 29 Virtual Badges Sold Out! Human Plus coming soon for Discord

DEF CON 29 logo image

We’ve sold out of badges for online-only attendees. The Human Plus role on the DEF CON Discord ( ) will be available to purchase soon on the server itself. In the meantime, remember to log in to the Discord to get familiar with the layout and say hi to everyone in the #LineCon channel!

The Policy Dept. is Back for DEF CON 29!

DEF CON 29 policy image

DEF CON is pleased to announce the return of the Policy Department for DEF CON 29. This means more content for attendees (both in-person and virtual) interested in buidling bridges between the worlds of hackers and policymakers. The Evening Lounge format is back, too! We’ll be posting all the Policy updates at The DEF CON 29 Policy Page , so if this is your thing, make sure to bookmark it and check back often.

Workshops Page is Live!

DEF CON 29 workshops image

Workshops are back for DEF CON 29! We’ve got a wide variety of topics from a great roster of presenters, all of which you can peruse at your leisure on the Workshops page .

If you find a workshop that you want in on, you can sign up starting at 0900 PDT on Tuesday July 6. Seats generally fill quickly, so consider some pre-game finger stretches and warming up your mouse with some light gaming.

It’s July, people. We’re in the home stretch!

Time is Running Out to Vaccinate for DEF CON 29!

DEF CON 29 calendar icon image

Friendly reminder - if you’re planning to get vaccinated in order to join us for DEF CON 29 in Vegas, there’s only about 5 weeks left until the con. You need about that long from the first shot for the full effect (depending on vendor, of course) so you should get things started.

Vote in the DEF CON 29 Artwork Contest!

DEF CON 29 art contest entries image

Help us judge the entries to the DEF CON 29 Art contest! Your vote decides the community choice award - so don’t let the results be decided without your input! You can see the lineup in the DEF CON Forums at and you can vote for as many as your heart desires. Shout out to everyone who shared their work!

DEF CON 29 Virtual Badges Sold Out! But Wait...

DEF CON 29 logo image

DEF CON 29 update update:

Good news, everyone! We have re-opened badge sales for virtual attendees! The gods of the supply chain have smiled on our undertaking and blessed us with additional stock. Take advantage at !

DEF CON 29 update:

We've sold out of the virtual attendee badges for DEF CON 29. Thank you to all the remote attendees who supported us by ordering a badge. Online attendees can still support DEF CON by purchasing a Human+ code at .

DEF CON 29 Announcement from DT!

DEF CON 29 DT speaking image

DEF CON 29 in-person update from The Dark Tangent:

In-person DC29 is a GO. Attendance numbers have been cautiously predicted, badge orders are in, conference space footprint is confirmed. Planning at full tilt. Read the whole thing on DT’s blog .

DEF CON 29 Speaker Page is Live!

DEF CON 29 speaker page image

The first batch of the DEF CON 29 Speaker lineup is live, people. It’s up there on the DC29 website, just waiting to inform your Con decision-making. Don’t let it shine there in vain. Click on over, have a look-see. Get informed, get inspired, and most importantly get amped. DEF CON 29 is just over the horizon now. Hope we’ll see all of you there.

DEF CON 29 Workshops Announced on the Forums!

DEF CON 29 Workshops announce image

DEF CON 29 Update! You can now read all about the the Workshops accepted for DEF CON 29 over on the forums. It's coming together, people.

NOW OPEN! Pre-register for DEF CON 29! UPDATED!

DEF CON 29 CTF New Swag image

The moment has arrived! You can reserve your badge for DEF CON in Vegas or the DEF CON online-only event right now at . Your pre-purchase allows us to accurately predict attendance, and it guarantees you a physical badge and secures your space if the venue is forced to restrict capacity. We thank you for your support and flexibility – hard numbers are the only way we can responsibly make a physical DEF CON happen this year.

Cash at the door will still be honored for as long as spaces last, but there is a chance we’ll have to turn away cash customers if we reach capacity for our venues.

For everyone who can’t be with us in person, the Safe Mode option continues over on Discord and we expect to start mailing out badges in early July.

We’ve got an FAQ page for all of your questions , and you can always get in touch with us at Thank you again for the support - we can’t wait for August 5!

Update! Pricing Chart:

DEF CON 29 CTF Pre Reg image

DEF CON 29 is our first hybrid con, and the first time we’ve had more than one price for badges. It’s caused a few questions. To answer them, we’ve created this handy price comparison chart .

If you bought your badge through Black Hat, you’ve purchased the $300 onsite option. If you haven’t signed up yet, badges are available at . To upgrade to Human+ status on the Discord, visit .

Thank you so much for supporting DEF CON in this crazy time – we can’t wait to be together again in August.

New DEF CON 29 Swag in our Shop!

DEF CON 29 CTF New Swag image

We’ve got some sparkly new DEF CON 29 items in the store! Official Tees in both fitted and straight cut, hoodies and a sticker set. Support DEF CON and get your look right - it’s a win/win.


DEF CON 29 CTF Quals Results! Congrats PPP!

DEF CON 29 CTF Quals Scoreboard image

The DEF CON 29 quals are complete, the mighty PPP have won the day, and many other teams have qualified. Congratulations to the Plaid Parliament of Pwning and a hearty thank you to all the other teams who participated. Check out the results and challenges !

DEF CON 29 CTF Quals are this Weekend!

DEF CON 29 CTF Flag image

Friendly DEF CON 29 CTF reminder - this weekend the mighty Order of the Overflow is hosting the Qualifier event! It’s not often that the path to glory comes into such sharp focus - be ready to meet your destiny. Godspeed to all of the teams who will be battling it out for 48 straight beginning UTC 00:00 May 1st. The information you need is at and @oooverflow , the courage you need has been inside you all along.

DEF CON 29 is closer than it has ever been. Just let yourself feel it.

DEF CON 29: The Plan So Far

DEF CON 29 pixel con image

I am announcing this now because the longer we wait and gather data the harder it will be for everyone to make plans, so we are announcing our intentions to kick things off.

DEF CON 29 will be a hybrid conference, partially in-person, and partially online. DEF CON will not be a “normal” con, but more like DEF CON “Different.” The situation we face this year is unique and will require us to do things differently, simplify our plans, and in a fast-moving environment be flexible to change.

Read the rest of the Dark Tangent's DEF CON 29 Announcement

DEF CON 29 Theme and Artwork Contest!

DEF CON 29 theme image

It’s official. DEF CON season has arrived. DEF CON 29 will be happening this August in one form or another and that means it’s time to announce the theme!

The theme for DEF CON 29 is (imagine a drum roll here) ‘You Can’t Stop the Signal’.

The signal can be a few things. It’s the powerful force that draws DEF CON together as a community, across miles, across years, even in global lockdown. It can be the magnet that draws us to the people trying to solve the same puzzles we are, who want to learn how everything works as much as we do. And it’s how we instinctively know that the technology we live with can be better, and we are the ones to figure out how.

We’ve put together a style guide that lays out a bunch of our inspirations for this year, from visual aesthetic to music, to movies and books. We hope it inspires you in whatever you’re creating for DC29, and we hope it gives you the same powerful sense of community and possibility that we feel.

The style guide also governs the Art Contest , so if you're artistically inclined we hope you'll find a nugget or two in there to inspire your entries. We look forward to seeing what you come up with and we thank you for being the kind of amazing, unstoppable community that keeps us coming back.

DEF CON 29 Call for Everything Spotlight—Call for Music and Soundtrack!

DEF CON 29 Call for Music image

Musicians! Friendly reminder that our DEF CON 29 Call for Music and Soundtrack is open until June 1. If you want to get your sweet sweet choons in front of the DC29 crowd, get up on it!l

DEF CON 29 Call for Everything Spotlight—Call for Contests!

DEF CON 29 Call for Everything image

The DEF CON 29 Call for Everything Spotlight for today is on Call for Contests!

Wanna get your contest into DC29? It’s easy.

1. Have the most incredible idea
2. Submit via the link below
3. See dream realized. Be a legend.

Complete info and guidelines:

DEF CON 29 Call for Everything!

DEF CON 29 Call for Everything image

DEF CON 29 approaches. It looms. Darn near impends. Be still, and you can hear it – the DEF CON Call for Everything ringing though the air.

The CfE is when DEF CON throws open the doors and invites everyone’s best proposals in for a visit. Speaking proposals, ideas for vilages, prospective demo labs, contests, trainings, music, art - literally everything. You write up all the delightful things you want to share with the community, and we find a way to bring the best of them to life at DEF CON.

The Call for Everything page lists all the ways you can participate in the creation of the next DEF CON, along with the relevant details and deadlines, including some new questions intended to get your thoughts on whether this year’s con should be in-person, online or some of both.

So visit the CfE page, read the guidelines, and get your best ideas together. Let’s DO this thing!

Return to Index
© 1992-2021 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information


Masks and Vaccination will be required at DEF CON 29 this year, thanks to the complications of COVID-19.

While the virtual portion will largely be the same as DEF CON Safe Mode, in-person DEF CON 29 will be guided by safety and number of attendees.

Vaccination and wearing a mask while in the DEF CON space will be required. No exceptions. Persons who are not vaccinated, including unvaccinated children, will not be admitted.

Vaccinations will be validated by a 3rd party, independent company provided by DEF CON. You must provide an original, signed, vaccination card, with the final dose dated no later than July 22nd, 2021. Photocopies and digital pictures of vaccination cards will not be accepted for anyone, to include Goons and Humans, for entrance to DC29. Once the vaccination record has been verified, participants will receive a wrist band that must be worn at all times during DC29. Participants may then proceed to badge registration to process their barcodes and receive their DC29 Human badge.

Badges may be picked up for others, but the bearer will still need to pass through the vaccination validation and receive a wrist band before they enter the con.

Masks requirements include:

The following do not fulfill the mask requirements:

The guidelines for in-person gatherings is constantly in flux and we will update our faq on policies and processes, when they will best reflect the most current guidelines that will be necessary during DEF CON.


What is DEF CON doing, and how can I attend?

DEF CON 29 will be a hybrid event this year, we will give hackers a choice in how they wish to experience DEF CON. We will host both an in-person experience in Las Vegas and a virtual con on our official Discord just as we did for DEF CON safe mode in 2020.

Starting mid May we will sell badges online for the conference that we should ship the beginning of July.

For the virtual portion of DEF CON You will need a Discord account.
You can find detailed instructions on getting on the DEF CON Discord server here. There is a FAQ for Humans on Discord as well.

You can support DEF CON and upgrade your account by purchasing the Human Plus role that gives you more permissions than the free "Human" role. Join with the DEF CON Discord Server signup link:

If you choose to attend via the DEF CON discord, you will have access to all the online content and pre-recorded talks. There will be contests, villages, DJs, and live chats with hackers all over the globe. You will need to get on the DEF CON Twitch too, for live streamed talk Q&A sessions, evening fireside talks and evening contests. Not to mention the live entertainment and select in-person only villages, events, and contests. Our annual tradition of awarding black badges "Uber" badges for CTF and other select contests, will continue, for in-person events only.

To see what happenings are currently planning to be in-person, hybrid, or virtual only please visit

Can I buy a DEF CON badge with Black Hat?

Yes, it will be an option when you check out at Black Hat.

How much will DEF CON cost?

The price to attend DEF CON in-person will be $300 USD. You may not attend in-person without purchasing a badge. Attending virtual on our Discord will be free, and those with Human+ will have more permissions and access.

You can support DEF CON and upgrade your account by purchasing the Human Plus role.

What if I don't want a Discord Account?

While we don't think you'll get the full experience, all of our content will be released via YouTube and put on the DEF CON Media Server. The Talks for DEF CON will be released during the con on the DEF CON YouTube and Twitch channels.

I have a black badge, do I need to pre-register?

No, just show up on site with your vax card and go to inhuman registration.

Will the content be the same at the in-person event and the virtual event?

Not exactly, there will be unique elements to each, the official DEF CON talks content will be the same for both with the exception of impromptu Q&A or meet and greets. Villages and Contest content may differ, not all events will be held in a hybrid format. See for a list.

What will capacity look like for the in-person event?

Capacity is currently capped at a maximum of 80% of a given space’s fire code standard capacity. Limits will be reviewed and revised at the direction of Southern Nevada Health District (SNHD) and there will be dedicated support onsite to ensure our policies are being followed.

Will DEF CON limit attendance?

YES. If we are near capacity we will limit pre-registration. In the best interest of attendee comfort and safety we would limit attendance to ensure that proper distancing is maintained and locally mandated capacity limits are adhered to. It is recommended that you secure a badge with us when we open the badge pre-registration process.

What health measures/protocols is DEF CON taking to ensure a safe environment on-site?

DEF CON is working closely with Caesar's Entertainment hotels to provide a safe and healthy experience for all. All attendees and staff will need to be vaccinated and wearing a mask. We will comply with whatever safety measures are required of us.

Currently all of the hotel guidelines that we have gathered are located in the Hotel FAQ.

How do I prove I was vaccinated?

Vaccinations will be validated by a 3rd party, independent company provided by DEF CON. You must provide an original, signed, vaccination card, dated no later than July 22nd, 2021. Photocopies and digital pictures of vaccination cards will not be accepted for anyone, to include Goons and Humans, for entrance to DC29. Once the vaccination record has been verified, participants will receive a wrist band that must be worn at all times during DC29. Participants may then proceed to badge registration to process their barcodes and receive their DC29 Human badge.

What about lines, etc?

Line con, queuing for registration or talks, swag, etc, will have to be planned for in new ways , and the guidelines for gatherings will be in flux for a little while. Just expect "social distanced line con" for the in-person event.

Will I be required to wear a mask? Will medical exceptions be allowed?

Masks will be required for all participants except while eating or drinking, or if presenting as a DEF CON main stage speaker. If you are unable to wear face coverings due to medical reasons, please consider attending virtually.

How will DEF CON maintain social distancing?

Social distancing measures may include distanced seating in event rooms, traffic lanes in the hallways, larger rooms, more strategic areas for food and drinks, dedicated entry and exit points, and more. There will be dedicated support onsite to ensure our rules are being followed.

One of the big visible changes is that we have removed all in-person speaking tracks. Because we don't know how many people are planning to attend we couldn't design the floor plan. By releasing the talks online allows us to complete the floor plan and have attendees focus more on village and events.

Will food be served and what will that look like?

Chill out lounges and other food service may look a little different than previous years in order to adhere to safety measures, but we intend to provide for purchase take away options in a pre-packaged format. No buffet sneezes to worry about.

When & Where will DEF CON be?

August 5, 2021 - August 8, 2021 (Thursday to Sunday)
DEF CON will be located within the Paris and Bally's Hotel and Casinos in Las Vegas, Nevada USA.

Can I book my hotel in Las Vegas now – and how should I do that?

Yes, hotel reservations are being accepted. In order to help us fill our room block with our contracted hotels please book under the DEF CON group room registration.

What happens if DEF CON has to cancel the in-person event or is shut down - can I get a refund?

With the current outlook on vaccine estimations we think that hosting DEF CON in Las Vegas is going to happen, but we know a global pandemic is out of our control. In the event we have to cancel the in-person con we will switch your badge type to "virtual", refund you the difference in price (excluding postage) and mail you your badge, just like we are doing for everyone ordering a virtual-only badge.

Where can I get more information about what's happening?

Check out the following DEF CON Sites & Social Media.
DEF CON YouTube channel
DEF CON Twitch
DEF CON Music Twitch

What's DEF CON's official theme for DEF CON 29?

Glad you asked, our official 2021 theme is "Can't stop the signal." For more information Check out out our DEF CON 29 Theme Guide.

This all sounds great, so how can I contribute to DEF CON this year?

We've always said "DEF CON is what you make it.", and we belive that. If you've got a good idea or want to participate, check out the link for this year's call for everything.

Return to Index
© 1992-2021 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information


Frequently asked questions about DEF CON

What is DEF CON?

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.

How did DEF CON start?

Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!

Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.

There are several resources that will give you an idea of what DEF CON is all about.

DEF CON Press: through the prism of the media
DEF CON Groups: Local groups that meet
DEF CON Media Server: DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.

When and where is DEF CON?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 29 will be held August 5th through August 8th. We are gauging interest on what degree of where. Many people arrive a day early, and many stay a day later.

Isn't there a DEF CON FAQ already?

Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It can be found at

What are the rules of DEF CON?

Physical violence is prohibited. Harassment of any kind is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!

You can view the DEF CON Code of Conduct at

Is DEF CON cancelled?

No, but DEF CON is planning to perform a risk assessment to help us decide, ideally by sometime in April, if we should hold a physical "last known good configuration" conference in Las Vegas for 2021. We would adhere to all health and safety guidelines, so the better we can understand them the more informed our assessment will be.

What is there to do at DEF CON?

DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!

I'm not a hacker, should I go to DEF CON?

Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.

Do criminals go to DEF CON?

Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.

What are Goons?

They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.

How can I help out or become a Goon?

The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.

How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.

I would love to see XYZ event, how do I make this happen?

Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.

How can I speak at DEF CON?

You can submit a response to our CFP (call for papers). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in January and closes mid-May.

I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.

I want to sell stuff, how do I do this?

If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?

What are the different price rates?

Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.

How much is admission DEF CON, and do you take credit cards?

The price for DEF CON 29 is TBA. For reference, DEF CON 27 (in person) cost $300 USD Cash for all four days. Do we take credit cards? Are you JOKING? No, we only accept cash - no checks, no money orders, no travelers checks. We don't want to be a target of any State or Federal fishing expeditions.

Does my underage child need a badge?

Children under the age of 8 will not need to purchase a badge.

Can I pre-register for DEF CON?

No. We used to do this a long time ago, but found that managing the registration list, and preventing one 'Dr. Evil' from impersonating another 'Dr. Ev1l' too much of a hassle. Seeing how we would only take cash in the first place, and things becomes time consuming and easy to abuse. Cash at the door works every time.

Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.

I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:

DEF CON is too expensive, how can I afford it?

DEF CON is cheaper than many concerts, and certainly cheaper than many shows in Vegas. Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.

Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.)
Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: Admission can be saved, mow some lawns. Try to go to another 4 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.

Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.

How many people typically attend DEF CON?

There have been roughly 25-28k attendees in the last few years of DEF CON. DEF CON 27 had a record showing with approximately 30,000.

Is there a network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!

What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 21 to reserve a room.

What is a DEF CON "Black Badge"?

The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.

How can I get a hold of DT? I tried to mail him and haven't seen a response yet.

DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.

Is it hot in Vegas?

Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.

What should I bring?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.

How much do rooms cost, and how do I reserve a room?

The DEF CON 29 group room registration is now live! We have room rates at seven hotels, until they run out of rooms in our block.

Follow this link:

Do not worry if the form doesn't immediately show the discounted rate. To verify that you're getting our price you can mouse over the dates you've selected or begin the checkout process.

How much is internet access?

We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.

Will the hotels broadcast the speeches on their cable system?

DEF CON TV has succcessfully streamed all tracks to all the hotels, and a couple of tracks out to the internet, for several years now. We don't expect this will change!

Will we have DEF CON branded poker chips?

You will have to attend DEF CON to find out.

Will conference attendees have entire floors of hotel rooms to themselves?

Probably not. The hotel is very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.

This FAQ didn't answer my questions, or was unclear, how can I get further information?

Check out the DEF CON Forums to ask follow up questions.

Return to Index
© 1992-2021 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

Links to DEF CON 29 related pages


DEF CON . org

Main DEFCON site
DEFCON 29 Home Page
DEFCON 29 Schedule and Speakers
DEF CON 29 Workshops page
DEF CON 29 Vendors page
DEF CON 29 Demolabs Forums page
DEF CON 29 Parties Forum page
DEF CON 29 Villages Forum page
DEF CON 29 Contests Forum page

Thanks to the InfoBooth crew for providing access to their backend database. <claps> to their hard work!


Other Interesting Links

@defconparties - calandar
defconmusic - Schedule
DEF CON 29 badge firmware
#badgelife spreadsheet of unofficial badges for DC29
DEF CON is Cancelled party challange

Other cons during #SummerHackerCamp
Blackhat @BlackHatEvents FB Black Hat Events
BSides Las Vegas @BSidesLV
r00tz Asylum @r00tzasylum
Queercon @Queercon FB @queercon
The Diana Initiative @Dianainitiative FB @dianainitiative


The Lost Policymaker's Guide to Hacker Summer Camp
Lonely Hackers Club - DEF CON n00b guide  -  reddit thread
Preparing for "Hacker Summer Camp"
General / previous years
DEF CON for N00bs
JK-47 - BSidesLV & DEFCON Conference Tips
Just another DEF CON guide
On Attending DefCon