The ONE!

One Schedule to Rule them All!


Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 30.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org

Have a good time at DEF CON 30!


Index of DEF CON 30 Activities


Maps List

Maps Browser

Detailed Village Info

Villages Table

Hour by Hour list of happenings, start at the top, or go to a specific day.
Schedule
 - Thursday  - Friday  - Saturday  - Sunday

Sorted list of all the Speakers Names linked to their talk's description.
Speaker List

Sorted list of all the Talk's titles linked to the talk description.
Talk Title List

Talk lists for each Village, start at the alphabetic top, or go to a specific Village.
Village Talk List
    AIV - APV - ASV - AVV - BHV - BICV - BTV - CHV - CLV - CON - CPV - DC - DCGVR - DDV - DL - GHV - HHV - HRV - ICSV - IOTV - LPV - MIV - PHV - PLV - PSV - PT - PWV - PYV - QTV - RCV - RFV - RHV - ROV - RTV - SEV - SKY - SOC - TEV - VMV - WS

Descriptions and Info for all the talks.
Talk Descriptions

Contests Table
Contests

Demolabs Table
Demolabs

Workshops Table
Workshops

Paid Trainings Table
Paid Trainings

DEF CON 30 Vendors
Vendors

The latest news from defcon.org
DEF CON News

The answer to your questsions about DEF CON overall and for this year.
DEF CON FAQ

DEF CON 30 FAQ

DEF CON .org Links

Combined Schedule Sources

Interesting Links

Guides/Tips/FAQs

Maps List



Overview of the Hotels in the area of DEF CON 30
Click on image to view full size



Full floorplan of the Caesars Forum Convention Space
Click on image to view full size



Closeup of the floorplan for the Caesars Forum, Forum Ballroom
Click on image to view full size



Closeup of the floorplan for the Caesars Forum, Summit Ballroom
Click on image to view full size



Closeup of the floorplan for the Caesars Forum, Academy Ballroom
Click on image to view full size



Closeup of the floorplan for the Caesars Forum, Alliance Ballroom
Click on image to view full size




Full floorplan for Flamingo
Click on image to view full size



Closeup of the floorplan for the Flamingo, Corporate Convention Center, Third floor
Click on image to view full size



Closeup of the floorplan for the Flamingo, Executive Converence Center, Lower LeveL
Click on image to view full size




Full floorplan for Harrahs
Click on image to view full size




Full floorplan for Linq
Click on image to view full size


Detailed Village Info


AIV - Artificial Intelligence Village


AIV Village: Talk List
Home Page: https://aivillage.org/
Sched Page: https://aivillage.org/defcon30/
DC Forums Page: https://forum.defcon.org/node/239784
DC Discord Chan: https://discord.com/channels/708208267699945503/732733090568339536
Location: Caesars Forum - Summit 220->236 (AI Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 19:00 - Sun: 10:00 - 14:00
Social Media Links:
   TW @aivillage_dc
   TI @aivillage
   YT link
   DC https://discord.com/invite/GX5fhfT

A.I Village
DC29 Forum: https://forum.defcon.org/node/236553
Returning for DC 30!

https:// aivillage.org/

DEF CON Discord Channel

AI Village Icon



Artificial Learning techniques are becoming more prevalent in core security technologies like malware detection and network traffic analysis. Its use has opened up new vectors for attacks against non-traditional targets, such as deep learning based image recognition systems used in self driving cars. There are unique challenges in defending and attacking these machine learning systems that the security community needs to be made aware of. This AI Village will introduce DEF CON attendees to these systems and the state of the art in defending and attacking them. We will provide a setting to educate DEF CON at large through workshops and a platform for researchers in this area to share the latest research.

Our main focus is on expanding the hands-on activities that attendees can participate in. This year, attendees will create a realistic face using StyleGAN, learn how to generate text, and attack a discriminatory resume screening program. We'll also have talks via CFP, and workshops: both introductory ML for beginners and intermediate/advanced on Facial Recognition/Adversarial ML. We are planning three contests inside the village: one as a standard CTF, another on evading a malware classifier (Ember), and a final realtime panel of Deepfaked DarkTangent's answering personal questions and giving opinions on life, the universe, and everything!
Return to Index

APV - AppSec Village


APV Village: Talk List
Home Page: https://www.appsecvillage.com/
Sched Page: https://www.appsecvillage.com/events/dc-2022
DC Forums Page: https://forum.defcon.org/node/240922
DC Discord Chan: https://discord.com/channels/708208267699945503/790973922949726228
Location: Flamingo - Sunset-Twilight Ballroom (Appsec Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 14:00
Social Media Links:
   TW @AppSec_Village
   LI @appsecvillage
   YT https://www.youtube.com/c/AppSecVillage
   DC https://discord.gg/5XY8qYXd7R
The first three AppSec Villages were a resounding success. We learned that whether in person or online, our AppSec community is fantastic. We are pumped to be back bigger and better. Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner, making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village. Software runs the world. Everything from IoT, medical devices, the power grid, smart cars, voting apps - all of it has software behind it. Such a variety of topics will be reflected in our cadre of guest speakers representing all backgrounds and walks of life. AppSec Village welcomes all travelers to choose from talks by expert community members, an all AppSec-focused CTF, contests that challenge your mind and your skillz, and more. Bring your thirst for knowledge and passion for breaking things, and your visit to AppSec Village will be a thrill!
Return to Index

ASV - Aerospace Village


ASV Village: Talk List
Home Page: https://aerospacevillage.org/
Sched Page: https://aerospacevillage.org/events/upcoming-events/def-con-30/def-con-30-schedule/
DC Forums Page: https://forum.defcon.org/node/240500
DC Discord Chan: https://discord.com/channels/708208267699945503/732393044363444264
Location: Caesars Forum - Forum 112-117 (Aerospace Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @secureaerospace
   LI @aerospace-village
   TW @hack_a_sat
   DC https://discord.gg/gV4EWuk
AppSec Village Icon


twitter: @AppSec_Village
Website: https://www.appsecvillage.com/
CFP Link: https://sessionize.com/appsec-village-dc30/

The first three AppSec Villages were a resounding success. We learned that whether in person or online, our AppSec community is fantastic. We are pumped to be back bigger and better.

Come immerse yourself in everything the world of application security has to offer. Whether you are a red, blue, or purple teamer, come learn from the best of the best to exploit software vulnerabilities and secure software. Software is everywhere, and Application Security vulnerabilities are lurking around every corner, making the software attack surface attractive for abuse. If you are just an AppSec n00b or launch deserialization attacks for fun and profit, you will find something to tickle your interest at the AppSec Village.

Software runs the world. Everything from IoT, medical devices, the power grid, smart cars, voting apps - all of it has software behind it. Such a variety of topics will be reflected in our cadre of guest speakers representing all backgrounds and walks of life.

AppSec Village welcomes all travelers to choose from talks by expert community members, an all AppSec-focused CTF, contests that challenge your mind and your skillz, and more. Bring your thirst for knowledge and passion for breaking things, and your visit to AppSec Village will be a thrill!
Return to Index

AVV - Adversary Village


AVV Village: Talk List
Home Page: https://adversaryvillage.org/index.html
Sched Page: https://adversaryvillage.org/adversary-events/DEFCON-30/
DC Forums Page: https://forum.defcon.org/node/239787
DC Discord Chan: https://discord.com/channels/708208267699945503/865456992101466192
Location: Flamingo - Sunset-Scenic Ballroom (Adversary Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @AdversaryVillag
   IG @AdversaryVillage
   LI @adversaryvillage
   FB @AdversaryVillage
   TI @AdversaryVillage
   DC https://discord.gg/GDB3rC7KYz
   YT link
Adversary Village
DC29 Forum: https://forum.defcon.org/node/236942
Returning for DC 30!
Adversary Village Icon



Website: https://adversaryvillage.org
Twitter: https://twitter.com/AdversaryVillag

Adversary Village is a community initiative which purely focuses on Adversary simulation/emulation, threat/APT emulation, Breach and adversarial attack simulation, supply chain security simulation, adversary tactics, life, adversary philosophy, survival skills and Purple teaming.Adversary Village will be organizing technical talks, workshops, live demos, Adversary Wars CTF, panel discussions and other hands-on activities on adversary simulation, emulation and purple teaming.

This is different from any of what has been covered in the existing villages, because our focus is on simulation of the actions of a threat actor or an adversary and this being simulated here. As this domain matures, we anticipate active participation from enterprises, as such simulations would help immensely towards internal capacity building from having a "live fire" training opportunity. An increasing number of researchers too are focusing on building tools and techniques for simulation of various adversarial actions against an organization or Supply chain, instead of actual real-world exploitation.
The goal of the Adversary Village would be to build a vendor neutral open security community for the researchers and organizations, who are putting together new means and methodologies towards the simulation/emulation of adversary tactics then purple teaming.

Adversary Wars CTF
Adversary Village will be hosting a CTF named "Adversary Wars", where the participants will have to pose as adversaries and simulate adversarial actions against each element of the dummy target organization.
Our end-goal is to build a CTF platform for adversary simulation/emulation knowledge sharing and exercises.
Adversary Wars would have real world simulation CTF scenarios and challenges, where the adversaries can simulate attacks and learn new attack vectors, TTPs, techniques, etc.
There would be combined exercises which include different levels of threat/adversary emulation and purple teaming.

Adversary Simulator booth
Adversary Simulator booth has hands-on adversary emulation plans specific to a wide variety of threat-actors, these are meant to provide the participant/visitor with a better understanding of the Adversary tactics.
This is a volunteer assisted activity where anyone, both management and technical folks can come-in and experience different categories of simulation, emulation and purple scenarios. Adversary Simulator booth will be having a lab environment focused on recreating enterprise infrastructure, aimed at simulation and emulating various adversaries. Visitors will be able to view, simulate and control various TTPs used by adversaries.
The simulator is meant to be a learning experience, irrespective of whether one is hands-on with highly sophisticated attack tactics or from the management.

Return to Index

BHV - Bio Hacking Village


BHV Village: Talk List
Home Page: https://www.villageb.io/
Sched Page: https://www.villageb.io/2022bhvspeakers
DC Forums Page: https://forum.defcon.org/node/239958
DC Discord Chan: https://discord.com/channels/708208267699945503/735273390528528415
Location: Flamingo - Laughlin I,II,III (Biohacking Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @dc_bhv
   LI @biohacking-village
   YT http://youtube.com/biohackingvillage
   TI @biohackingvillage
   DC https://discord.gg/Q8ubDb5
   SP link
Click image for larger versionName:	image_2500.pngViews:	1379Size:	34.0 KBID:	239961

https://villageb.io/
DEF CON Discord Channel
CFP Link: https://www.villageb.io/speaker-lab

Growing from seeds of demand, the Biohacking Village emerged at DEF CON to deliver action-oriented reinvention of the safety and security of health care. THE BIOHACKING VILLAGE , a 501(c)3 organization, is uniquely poised to inform global conversations in health care cybersecurity research. Representing voices who see ‘code’ as genetics, ‘subroutines’ as organic processes, and ‘programs’ as life itself the BHV has grown to become an expansive and inclusive, hands-on playground for the entire biomedical ecosystem - patients, clinicians, hackers, manufacturers, regulators, hospital administrators, and others seeking healthier futures through meaningful technology. This nimble community delivers hands-on, strident learning labs to influence in health care, industry, and manufacturing.

We bring the biomedical ecosystem to DEF CON in five ways:
DEVICE LAB : The highly-collaborative environment builds health care, connecting security researchers, manufacturers, clinicians, and regulators, to learn from each other and develop skills, codifying best practices and paths for high fidelity cyber safety.

SPEAKER LAB: Speakers foster critical thinking, problem solving, human interaction literacy, ethics debates, creativity, and collaboration. Subject matter experts and researchers share the future of their research, reflecting the biological technologies and emerging threats.

CATALYST LAB: Providing interaction with thought leaders from the medical device and citizen science communities through training and hands-on workshops and solutions design, to cover the entirety of the biomedical device and security ecosystem.

CAPTURE THE FLAG: Featuring the virtual learning environment of St. Elvis Hospital, the CTF offers protocol, regulatory, and biological challenges to access and assess vulnerabilities in real devices.

TABLE TOP EXERCISES: Discussion-based sessions of increasing complexity and difficulty regarding vulnerabilities in a series of Machiavellian healthcare industry scenarios.
Attached Files
Return to Index

BICV - Blacks in Cybersecurity


BICV Village: Talk List
Home Page: https://www.blacksincyberconf.com/bic-village
Sched Page: https://www.blacksincyberconf.com/bic-village
DC Forums Page: https://forum.defcon.org/node/239775
Location: Flamingo - Sunset-Twilight Ballroom (Blacks In Cybersecurity Village) - Map
Hours: Fri: 10:00 - 16:00 - Sat: 10:00 - 16:00
Social Media Links:
   TW @BlackInCyberCo1
   IG @blackincyberconf
   TI @blacksincybersecurity
   YT link
   LI @blackincyberconference
   PT @blacksincybersecurity
   FB @blackincyberconf
Blacks In Cybersecurity (B.I.C) Village
PAST FORUM (not for this year:) DC29 Forum: https://forum.defcon.org/node/236946
Returning for DC 30!
https://www.blacksincyberconf.com/bic-village
Icon or Logo for BIC Village




The Blacks In Cybersecurity (BIC) Village seeks to bring culturally diverse perspectives to the holistic Cybersecurity community; by way of a series of talks and a capture the flag event.

In providing these activities, we believe that we can normalize the discussion of deficiency and prejudices in Cybersecurity literacy, education and development that ultimately impact the progress and development of the field.

Our village programming is also designed to highlight Black experiences, innovations in the field, Black culture and Black history which is designed to encourage more diverse hobbyists and professionals to engage and contribute to this conference and the greater Cybersecurity and Hacker/Maker communities.
Return to Index

BTV - Blue Team Village


BTV Village: Talk List
Home Page: https://blueteamvillage.org/
Sched Page: https://dc30.blueteamvillage.org/call-for-content-2022/schedule/#
DC Forums Page: https://forum.defcon.org/node/239776
DC Discord Chan: https://discord.com/channels/708208267699945503/732454317658734613
Location: Flamingo - Savoy Ballroom (Blue Team Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @BlueTeamVillage
   TI @blueteamvillage
   YT https://www.youtube.com/c/blueteamvillage
   DC https://discord.com/invite/blueteamvillage
Blue Team Village
DC29 Forum: https://forum.defcon.org/node/236558
Returning for DC30!
Blue Team Village Icon/image



https://blueteamvillage.org/

DEF CON Discord Channel


We're still standing for our fourth DEF CON! Coming through the looking glass to showcase the defensive side of hacking, Blue Team Village is where you can find out all the multifarious facets of what it means to be a defender. You'll be able to teach and learn about the various ways to keep people safe - and how to subvert attacker expectations to turn their methods back on them.

You'll also be able to find community and mentor-ship within the defensive hacking paradigm, allowing you to find your path within this specialization to learning new skills and refining your old ones.

If you're looking for a community of like-minded hackers with a tendency towards forensics, threat hunting, and other blue-aligned topics, come celebrate the art of defensive hacking with us!


Return to Index

CHV - Car Hacking Village


CHV Village: Talk List
Home Page: https://www.carhackingvillage.com/
Sched Page: https://www.carhackingvillage.com/talks
DC Forums Page: https://forum.defcon.org/node/240928
DC Discord Chan: https://discord.com/channels/708208267699945503/732722838942777474
Location: Caesars Forum - Forum 124-128 (Car Hacking Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 12:00
Social Media Links:
   TW @CarHackVillage
   DC https://discord.gg/JWCcTAM
Click image for larger versionName:	image_586.pngViews:	991Size:	319.9 KBID:	240930


Twitter: @CarHackVillage
Website: https://carhackingvillage.com/


Learn, hack, play. The Car Hacking Village is an open, collaborative space to hack actual vehicles that you don't have to worry about breaking! Don't have tools? We'll loan you some. Never connected to a car? We'll show you how. Don't know where the controllers are? We'll show you how to take it apart. Want to learn more about automotive hacking and cyber security? Check out our talks. Want to hack mobility scooters? Yes! We'll do that to. Also, check out the CHV CTF.

Visit carhackingvillage.com for the latest information.

Return to Index

CLV - Cloud Village


CLV Village: Talk List
Home Page: https://cloud-village.org/
Sched Page: https://cloud-village.org/#talks
DC Forums Page: https://forum.defcon.org/node/239788
DC Discord Chan: https://discord.com/channels/708208267699945503/732733373172285520
Location: Flamingo - Sunset-Scenic Ballroom (Cloud Village) - Map
Hours: Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @cloudvillage_dc
   YT https://www.youtube.com/cloudvillage_dc
   DC https://discord.gg/EygUDJABee
Cloud Village
DC29 Forum: https://forum.defcon.org/node/236948
Returning for DC30!
https://cloud-village.org/

DEF CON Discord Channel

Cloud Village Icon



With the industry shifting towards cloud infrastructure at a rapid speed, the presence of an open platform to discuss and showcase cloud research becomes a necessity.

Cloud village is an open platform for researchers interested in the area of cloud security. We plan to organize talks, tool demos, CTF and workshops around Cloud Security and advancements.
We will open Call for Papers/Workshops/Tools as soon as we get an approval from DEF CON.

Our CTF will be a jeopardy style 2.5 days contest where participants will have to solve challenges around Cloud infrastructure, security, recon, etc. These challenges will cover different cloud platforms including AWS, GCP, Azure, Digital Ocean, etc. We will also reward our top 3 teams with awards.
Return to Index

CON - Contests


CON Village: Talk List

Return to Index

CPV - Crypto Privacy Village


CPV Village: Talk List
Home Page: https://cryptovillage.org/
Sched Page: https://cryptovillage.org/
DC Forums Page: https://forum.defcon.org/node/239777
DC Discord Chan: https://discord.com/channels/708208267699945503/732734002011832320
Location: Flamingo - Sunset-Vista Ballroom (Crypto Privacy Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @cryptovillage
   SL https://cryptovillage.slack.com/
   YT link
   TI @cryptovillage
Crypto & Privacy Village (CPV)
DC29 Forum: https://forum.defcon.org/node/236562
Returning for DC30!
Click image for larger versionName:	image_601.jpgViews:	889Size:	19.7 KBID:	239822



https://cryptovillage.org/
https://twitter.com/cryptovillage

DEF CON Discord Channel


At the Crypto & Privacy Village (CPV) you can learn how to secure your own systems while also picking up some tips and tricks on how to break classical and modern encryption. The CPV features workshops and talks on a wide range of cryptography and privacy topics from experts. We'll also have an intro to crypto talk for beginners, crypto-related games, the infamous CPV puzzle, a key-signing party, privacy-related art installations, and other great events like the Gold Bug Crypto Privacy Contest.

The CPV discusses the interesting intersection of privacy and technology as well as building privacy enhancing technologies. We are able to dig into the nitty gritty details of cryptography and give high level crypo intros for those who might feel intimidated by it. We also discuss and hack on major topics and issues: facial recognition technology, license plate readers, privacy enhancing clothing, crypto backdoor laws.

Return to Index

DC - DEF CON Talks


DC Village: Talk List
Home Page: https://defcon.org/html/defcon-30/dc-30-index.html
Sched Page: https://defcon.org/html/defcon-30/dc-30-schedule.html
Social Media Links:
   TW @defcon
   FB @defcon
   YT https://www.youtube.com/user/DEFCONConference
         http://www.reddit.com/r/defcon
   IG @wearedefcon
   DC https://discord.gg/defcon

Return to Index

DCGVR - DEF CON Groups VR


DCGVR Village: Talk List
Home Page: https://www.dcgvr.org/
Sched Page: https://www.dcgvr.org/DCGVR_Event_-_DEF_CON_30_Schedule.pdf
DC Forums Page:
Social Media Links:
   TW @DCGVR
   TI @defcon_groups
   DC https://discord.gg/bsX4QXf3rD

Return to Index

DDV - Data Duplication Village


DDV Village: Talk List
Home Page: https://dcddv.org/
Sched Page: https://dcddv.org/dc30-talk-schedule
DC Forums Page: https://forum.defcon.org/node/239778
DC Discord Chan: https://discord.com/channels/708208267699945503/732732641694056478
Location: Flamingo - Exec Conf Ctr - Lake Meade and Valley of Fire (Data Duplication Village) - Map
Hours: Thur: 16:00 - 19:00 - Fri: 10:00 - 17:00 - Sat: 10:00 - 17:00 - Sun: 10:00 - 11:00
Social Media Links:
   TW @DDV_DC
Data Duplication Village
DC29 Forum: https://forum.defcon.org/node/236520
Returning for DC30!
Data Duplication Village Icon



Check the schedule and/or dcddv.org for the most up-to-date information.

DEF CON Discord Channel


It's true, the Data Duplication Village is back for DC 30! We have all the bits and bytes available from infocon.org packed up into nice, neat packages. If you're looking for something to fill up all your unused storage, may I recommend a nice hash table or two with a side of all of the DefCon talks? This is a "free-to-you" service where we're providing you direct access to terabytes of useful data to help build those skills.

HOW IT WORKS
DEF CON will provide a core set of drive duplicators as well as data content options. We accept 6, 8, and 10TB drives on a first come, first served basis and duplicate 'till we can no longer see straight. Bring in your blank SATA3 drives - check them in early - to get the data you want. Come back in about 24 hours to pick up your data-packed drive. Space allowing, we'll accept drives all the way through until Saturday morning - but remember, it's FIFO!

WHAT IS AVAILABLE - Three drives:
  1. 6TB drive 1-3: Updated archive of infocon.org plus other "direct from DT" content, built on last years collection and always adding more for your data consuming appetite.
  2. 6TB drive 2-3: freerainbowtables.com GSM A51 and MD5 hash tables (Tables 1-2) with about 404 gigs free
  3. 6TB drive 3-3: more rainbowtables, lanman, mysqlsha1, ntlm, and some word lists (Tables 2-2) with about 136 gigs free


The DC 29 content will be posted at dcddv.org once finalized

WHAT YOU NEED
* 6TB SATA3 512e format 7200rpm drive - one for each source you want

If you want a full copy of everything you will need three drives.
You can bring back last year's drive(s) to be wiped / updated (you should remove any 2018 stickers).

WHEN TO BE THERE
Data Duplication Village Hours:

- Thursday, August 11, 16:00 - 19:00 (drop off only)
- Friday, August 12, 10:00 - 17:00
- Saturday, August 13, 10:00 - 17:00
- Sunday, August 14, 10:00 - 11:00 (last chance pickup only)

- Space permitting, last drop off is Saturday at 3:00pm.
- Last chance pickup is Sunday from 10:00 to 11:00.

We're working on a method to post completed ticket ranges to https://dcddv.org and https://twitter.com/DDV_DC

SIDE NOTES

THAT'S ALL?
But wait - there's more! A few years ago, we made our our stretch goal a reality to provide a pick-and-pull datastore in the DDV. We expect to do it bigger and better this year! Dark Tangent and KnightOwl l post the up-to-date details in the DC Forum thread and you are encouraged to ask any questions you have there as con approaches.

. Photo image of people at past Data Duplication VIllage

. Photo image of hard disks in a data duplication device

. Photo image of many hard drives on a table

.

Return to Index

DL - DEF CON DemoLabs


DL Village: Talk List
Home Page: https://forum.defcon.org/node/239774

Return to Index

GHV - Girls Hack Village


GHV Village: Talk List
Home Page: https://www.blackgirlshack.org/girlshackvillage
DC Forums Page: https://forum.defcon.org/node/240890
Location: Flamingo - Virginia City III (Girls Hack Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @girlshackvllg
   IG @blackgirlshack
Click image for larger version  Name:	image0.jpg Views:	2 Size:	72.1 KB ID:	240892




Girls Hack Village seeks to bring gender diverse perspectives of the contributions, perspectives, and issues facing women/girl hackers. It is a space to discuss issues affecting girls in cybersecurity and will include Talks, Workshops, and Discussions Panels. We are looking to have a village for womxn in ethical hacking fields that differ from organizations by focusing specifically on the experience of women as a diverse minority in cybersecurity.

Our village is designed to highlight the contributions and experiences of girls in cybersecurity. Women are underrepresented in cybersecurity and our goal is to highlight the female experience in Cybersecurity. Women are traditionally underrepresented at defcon and the girlshackvillage will give attendees the opportunity to learn about cybersecurity and hacking in a gender friendly place.

We will use the Discord to disseminate information during the village open hours and for Q&A during the discussion panel.

Twitter: https://twitter.com/girlshackvllg
Website: https://www.blackgirlshack.org/girlshackvillage
Return to Index

HHV - Hardware Hacking and Solder Skills Village


HHV Village: Talk List
Home Page: https://dchhv.org/
Sched Page: https://dchhv.org/schedule/schedule.html
DC Forums Page: https://forum.defcon.org/node/239785
DC Discord Chan: https://discord.com/channels/708208267699945503/732728536149786665
Location: Flamingo - Exec Conf Ctr - Red Rock VI, VII, VII (Hardware Hacking Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @DC_HHV

Hardware Hacking and Soldering Skills Village
DC29 Forum: https://forum.defcon.org/node/236591
Returning for DC30!


https:// dchhv.org/

DEF CON Discord
Hardware Hacking and Soldering Skills Village Icon



Every day our lives become more connected to consumer hardware. Every day the approved uses of that hardware are reduced, while the real capabilities expand.

Come discover hardware hacking tricks and tips regain some of that capacity, and make your own use for things! We have interactive demos to help you learn new skills. We have challenges to compete against fellow attendees. We have some tools to help with your fever dream modifications. Come share what you know and learn something new.

We are two villages in one. We run a large number of tables for soldering when in person, and to allow people to understand that hardware is more than soldering we run the Hardware Hacking Village as embedded / reversing / hardware things other than soldering.
Return to Index

HRV - Ham Radio Village


HRV Village: Talk List
Home Page: https://hamvillage.org/
Sched Page: https://hamvillage.org/dc30/index.html
DC Forums Page: https://forum.defcon.org/node/239779
DC Discord Chan: https://discord.com/channels/708208267699945503/732733631667372103
Location: Flamingo - Virginia City I (Ham Radio Village Exams) - Map
Hours: Fri: 09:00 - 18:00 - Sat: 09:00 - 18:00 - Sun: 10:00 - 12:00
Social Media Links:
   TW @HamRadioVillage
   TI @HamRadioVillage
   DC https://discord.gg/hrv
Ham Radio Village & Exams
DC29 Forum: https://forum.defcon.org/node/236589
Returning for DC30!
Ham Radio VIllage and Exam Icon



https://hamvillage.org/

DEF CON Discord Channel


Ham radio isn’t just what your grandpa does in the shed out back. Radios are an important piece of technology we use everyday, and amateur (“ham”) radio has been at the forefront of its development since day one -- we are some of the original hardware hackers! DIY, exploration, and sharing has always been a vital part of our community and the goal of Ham Radio Village is to nurture this growth into the next generation with all of the amazing people at DEF CON.

Our village will have demos, talks, presentations, contests, and of course, license exams!

So come visit Ham Radio Village to learn more about the hobby, including how antennas work (and how to build your own), how to actually use that software defined radio sitting on the shelf, how to trackdown a rogue transmitter with a handheld radio, and how you can _legally_ transmit 1,500 Watts into the airwaves after taking a simple multiple-choice test!

One of the unique things about ham radio is that it goes deep into the theory and science of radio. This knowledge unlocks a whole new level of understanding about why and how radios work and radio waves propagate. With just about everything containing some sort of radio these days, this information can help us better research, attack, and defend all things that emit RF. For example: Just about anyone can build an antenna with simple hardware; having an understanding of the fundamentals allows you to troubleshoot and tune the performance of that antenna to pick up the exact signals you want while filtering out the rest.

Return to Index

ICSV - Industrial Control Systems Village


ICSV Village: Talk List
Home Page: https://www.icsvillage.com/
Sched Page: https://www.icsvillage.com/schedule-def-con-30
DC Forums Page: https://forum.defcon.org/node/239780
DC Discord Chan: https://discord.com/channels/708208267699945503/735938018514567178
Location: Caesars Forum - Alliance 314 - 319 (ICS Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @ICS_Village
   LI @icsvillage
   YT link
   TI @ics_village
ICS Village
DC29 Forum: https://forum.defcon.org/node/236565
Returning for DC30!
ICS Village Icon




https://www.icsvillage.com/

DEF CON Discord Channel



Mission.
ICS Village is a non-profit organization with the purpose of providing education and awareness of Industrial Control System security.
• Connecting public, industry, media, policymakers, and others directly with ICS systems and experts.
• Providing educational tools and materials to increase understanding among media, policymakers, and the general population.
• Providing access to ICS for security researchers to learn and test.
• Hands on instruction for industry to defend ICS systems.

Why.
High profile Industrial Controls Systems security issues have grabbed headlines and sparked changes throughout the global supply chain. The ICS Village allows defenders of any experience level to understand these systems and how to better prepare and respond to the changing threat landscape.

Exhibits.
Interactive simulated ICS environments, such as Hack the Plan(e)t and Howdy Neighbor, provide safe yet realistic examples to preserve safe, secure, and reliable operations. We bring real components such as Programmable Logic Controllers (PLC), Human Machine Interfaces (HMI), Remote Telemetry Units (RTU), actuators, to simulate a realistic environment throughout different industrial sectors. Visitors can connect their laptops to assess these ICS devices with common security scanners, network sniffers to sniff the industrial traffic, and more!
Return to Index

IOTV - Internet Of Things Village


IOTV Village: Talk List
Home Page: https://www.iotvillage.org/
Sched Page: https://www.iotvillage.org/defcon.html
DC Forums Page: https://forum.defcon.org/node/239789
DC Discord Chan: https://discord.com/channels/708208267699945503/732734565604655114
Location: Caesars Forum - Alliance 311, 320 (IoT Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @iotvillage
   TW @ISEsecurity
   TW @Villageidiotlab
   LI @iotvillage
   TI @iotvillage
   YT https://www.youtube.com/c/IoTVillage/videos
   DC https://discord.gg/tmZASSpNnP
IoT Village
DC29 Forum: https://forum.defcon.org/node/236567
Returning for DC30!
IoT Village Icon



https://www.iotvillage.org/
Follow both ISE ( @ISEsecurity )
IoT Village (
@IoTvillage) on Twitter for updates.

DEF CON Discord Channel



IoT Village advocates for advancing security in the Internet of Things (IoT) industry through bringing researchers and industry together. IoT Village hosts talks by expert security researchers, interactive hacking labs, live bug hunting in the latest IoT tech, and competitive IoT hacking contests. Over the years IoT Village has served as a platform to showcase and uncover hundreds of new vulnerabilities, giving attendees the opportunity to learn about the most innovative techniques to both hack and secure IoT. IoT Village is organized by security consulting and research firm, Independent Security Evaluators (ISE) , and the non-profit organization, Village Idiot Labs (VIL) . Watch IoT Village In Action to get an idea of our content and our attendees.

Keep an eye out for The IoT RED ALERT Contest.
Check out the official IoT Village Store for all your IoT Village swag!

Return to Index

LPV - Lock Pick Village


LPV Village: Talk List
Home Page: https://www.toool.us/
Sched Page: https://bit.ly/LPVSchedule2022
DC Forums Page: https://forum.defcon.org/node/240931
DC Discord Chan: https://discord.com/channels/708208267699945503/732734164780056708
Location: Caesars Forum - Summit 203-204, 235 (Lock Pick Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @toool
   TI @toool_us
   YT https://youtube.com/c/TOOOL-US
Click image for larger version  Name:	image_599.png Views:	0 Size:	45.8 KB ID:	240933



Website: https://toool.us/
Discord: https://discord.com/channels/7082082...34164780056708

Want to tinker with locks and tools the likes of which you've only seen in movies featuring secret agents, daring heists, or covert entry teams?

Then come on by the Lockpick Village, run by The Open Organization Of Lockpickers, where you will have the opportunity to learn hands-on how the fundamental hardware of physical security operates and how it can be compromised.

The Lockpick Village is a physical security demonstration and participation area. Visitors can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Experts will be on hand to demonstrate and plenty of trial locks, pick tools, and other devices will be available for you to handle. By exploring the faults and flaws in many popular lock designs, you can not only learn about the fun hobby of sport-picking, but also gain a much stronger knowledge about the best methods and practices for protecting your own property.
Return to Index

MISC - Misc


MISC Village: Talk List

Return to Index

MIV - MisInformation Village


MIV Village: Talk List
Home Page: https://defcon.misinfocon.com/
Sched Page: https://defcon.misinfocon.com/#agenda
DC Forums Page: https://forum.defcon.org/node/242022
Location: Caesars Forum - Summit 220->236 (Misinformation Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00
Social Media Links:
   TW @MisinfoVillage
   TW @misinfocon
[Details to be changed later: This is what I have so far:] Click image for larger versionName:	Misinformation Village Small Logo.jpgViews:	462Size:	100.4 KBID:	242025

[]

The Misinformation Village aims to present a comprehensive overview of misinformation tactics, current campaigns, potential methods for defense and inoculation, and discussions of current and future campaigns. We seek to define, identify, understand, address, and combat misinformation, as well as strengthen online content credibility and information quality.

Site: https://defcon.misinfocon.com/
Twitter: @misinfovillage

[]
Return to Index

MUS - Music


MUS Village: Talk List
Home Page: https://defconmusic.org
Sched Page: https://defconmusic.org/sched.txt
Social Media Links:
   TW @defcon_music
   YT link
   TI @defcon_music
   TI @defcon_chill
Music Link All the Things: https://www.twitch.tv/defcon_music https://www.twitch.tv/defcon_chill http://www.defconmusic.org/
Return to Index

PHV - Packet Hacking Village


PHV Village: Talk List
Home Page: https://www.wallofsheep.com/
Sched Page: https://www.wallofsheep.com/pages/dc30
DC Forums Page: https://forum.defcon.org/node/239781
DC Discord Chan: https://discord.com/channels/708208267699945503/708242376883306526
Location: Caesars Forum - Academy 411-414, 420 (Packet Hacking Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @wallofsheep
   FB @wallofsheep
   YT https://youtube.com/wallofsheep
   TI @wallofsheep
   PS https://www.periscope.tv/wallofsheep
Packet Hacking Village
DC29 Forum: https://forum.defcon.org/node/236737
Returning for DC30!
Packet Hacking VIllage Icon




https://www.wallofsheep.com/

DEF CON Discord Channel


Packet Hacking Village

The Packet Hacking Village is an experience like no other. We are one of the longest-standing DEF CON villages, and we wear that honor with pride. The Packet Hacking Village is a place where everyone can take away some knowledge, whether they are a threat hunter, pentester, or an enthusiastic newcomer. We provide exciting events, live music, competitions with awesome prizes, and learning opportunities for all levels.

Wall of Sheep

The Wall of Sheep is an entertaining and interactive demonstration of what happens when network users let their guard down.

People don’t always think about internet safety in a practical sense. Even seasoned industry professionals get careless and believe that technology will passively protect them. The Wall of Sheep puts these assumptions to the test, and shows that when people let their guard down, anything can happen - and often does.

We monitor the DEF CON network, waiting for users to log into their email, web sites, or other network services without the protection of encryption. Once found, we post redacted yet identifiable information on the Wall of Sheep as a good-natured reminder that security matters, and someone is always watching.

Capture The Packet

The time for those of hardened mettle is drawing near; are you prepared to battle?
Compete in the world’s most challenging cyber defense competition based on the Aries Security cyber range. Tear through hundreds of bleeding-edge challenges, traverse a hostile enterprise-class network, and diligently analyze the findings to escape unscathed. Glory and prizes await those who emerge victorious from this upgraded labyrinth.

While Capture The Packet can easily scale for users of every level, for DEF CON we pull out all the stops and present our most fiendishly difficult puzzles. Capture The Packet has been a DEF CON Black Badge event for over 10 years, and we don’t plan on stopping. This event attracts the best of the best from around the world to play – are you ready to show us what you’ve got?

Packet Detective & Packet Inspector

DEF CON regularly attracts fresh talent in the Information Security field. Packet Detective and Packet Inspector engage experienced professionals and newcomers alike with hands-on, volunteer supported exercises.

These challenges promote critical thinking, teach core security tools, build professional cybersecurity skillsets, and inspire attendees towards larger Capture The Flag (or Packet!) style events.

Packet Detective and Packet Inspector are a great way for folks of all experience levels to learn under the eye of our skilled volunteers. Whether it’s time to brush up on skills or time to launch a new career, this is the best place to start.

Walkthrough Workshops

Walkthrough Workshops offer hands-on training at a self-guided pace. In these workshops, attendees take a deep dive into some of the most relevant subjects in cybersecurity with subject matter experts standing by to assist. Every year we bring new topics to the table, and our team of experts from all walks of life provide mentoring to guide the way.

WosDJCo

At the Packet Hacking Village, we work hard to create a unique mood and vibe. The Wall of Sheep DJ Company (WoSDJCo) brings music and atmosphere into the mix. Our goal is to help everyone have a good time while staying entertained and motivated. Stop by and enjoy the smooth beats and deep vibes of musical hackery.

The Packet Hacking Village is where you’ll find network shenanigans and a whole lot more. There’s exciting events, live music, competitions with awesome prizes, and tons of giveaways. PHV welcomes all DEF CON attendees and there is something for every level of security enthusiast from beginners to those seeking a black badge. Wall of Sheep gives attendees a friendly reminder to practice safe computing through strong end-to-end encryption. PHV Speakers, Workshops, and Walkthrough Workshops delivers high quality content for all skill levels. Packet Detective and Packet Inspector offers hands-on exercises to help anyone develop or improve their Packet-Fu. WoSDJCo has some of the hottest DJs at con spinning live for your enjoyment. Finally... Capture The Packet, the ultimate cyber defense competition that has been honored by DEF CON as a black badge event for seven of the eight years of it’s run.
Return to Index

PLV - Policy Village


PLV Village: Talk List
Sched Page: https://forum.defcon.org/node/242912
DC Village Page:
DC Forums Page: https://forum.defcon.org/node/241813
Location: Caesars Forum - Summit 224-227 (Policy@DEFCON.org) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @DEFCONPolicy
Policy@DEFCON
https://www.defcon.org/html/links/dc-policy.html


Hackers are early users and abusers of technology, and that technology is now critical to modern life. As governments make policy decisions about technology Hackers, researchers and academics need to be part of that conversation before decisions are made, not after policies are implemented. To do that DEF CON is a place for everyone on the policy and technology spectrum to interact, learn from each other, and improve technology.

Policy will build connections across and between technical and policy experts and provide opportunities for attendees interested
in learning more about how policy and technology intersect and to examine the challenges at this intersection.

Our Policy program will consist of Main stage presentation and panels, daytime sessions in our policy track, and some
evening lounges that will provide an off the record and more intimate setting to have policy-focused conversation

Return to Index

PSV - Physical Security Village


PSV Village: Talk List
Home Page: https://www.physsec.org/
Sched Page: https://www.physsec.org/
DC Forums Page: https://forum.defcon.org/node/240734
DC Discord Chan: https://discord.com/channels/708208267699945503/732732893830447175
Location: Caesars Forum - Summit 201-202 (Physical Security Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @bypassvillage
   TI @bypassvillage
Logo1


https://bypassvillage.org/
Click image for larger version  Name:	LockBypassVillageLogo_HD.png Views:	0 Size:	33.2 KB ID:	240741



Expect hours of operation at DEF CON:
* Friday: 11:00-18:00
* Saturday: 10:00-19:00
* Sunday: 10:00-13:00

The Physical Security Village (formerly the Lock Bypass Village) explores the world of hardware bypasses and techniques generally outside of the realm of cyber-security and lockpicking. Come learn some of these bypasses, how to fix them, and have the opportunity to try them out for yourself.

We’ll be covering the basics, like the under-the-door-tool and latch slipping attacks, as well as an in depth look at more complicated bypasses. Learn about elevator hacking, attacking alarm systems at the sensor and communication line, and cut-away and display models of common hardware to show how it works on the inside.

Looking for a challenge? Show us you can use lock bypass to escape from a pair of standard handcuffs in under 30 seconds and receive a prize!

How will you or your village contribute a new perspective to the content at DEF CON?

The Physical Security Village (formerly the Lock Bypass Village) is almost 100% hands on and is one of the only villages that has content about physical security. We strive to develop new content on a yearly basis to retain the interest of new and existing participants. This year we will be rebuilding all of our door displays to improve the production value, we will also have new displays that capture elevator security, double doors (with a deadbolt), forcible entry, some content on Access controls/Wiegand/RFID cloning, and other subjects.
-
Door Display Lines of people ready practicing bbypssing mounted locks


- ELectronic door mag-stripe


- Door Displays


- Example Talk, Speaker Karen


- Logo


-
Return to Index

PT - Paid Training


PT Village: Talk List
Home Page: https://defcontrainings.myshopify.com/collections/all

Return to Index

PWV - Password Village


PWV Village: Talk List
Home Page: https://passwordvillage.org/
Sched Page: https://passwordvillage.org/schedule.html
DC Forums Page: https://forum.defcon.org/node/240939
DC Discord Chan: https://discord.com/channels/708208267699945503/732733760742621214
Location: Caesars Forum - Summit 218-219 (Password Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @PasswordVillage
   TI @passwordvillage
   YT link
Click image for larger versionName:	image_2536.jpgViews:	677Size:	57.0 KBID:	240941


Twitter: https://twitter.com/passwordvillage
Website: https://passwordvillage.org/

The Password Village provides training, discussion, and hands-on access to hardware and techniques utilized in modern password cracking, with an emphasis on how password cracking relates to your job function and the real world . No laptop? No problem! Feel free to use one of our terminals to access a pre-configured GPGPU environment to run password attacks against simulated real-world passwords. Village staff and expert volunteers will be standing by to assist you with on-the-spot training and introductions to Hashcat, as well as other FOSS cracking applications. Already a password cracking aficionado? Feel free to give a lightning talk, show off your skills, help a n00b learn the basics, or engage in riveting conversation with other password crackers.
Return to Index

PYV - Payment Village


PYV Village: Talk List
Home Page: https://www.paymentvillage.org/
DC Forums Page: https://forum.defcon.org/node/240942
DC Discord Chan: https://discord.com/channels/708208267699945503/732733473558626314
Location: Virtual - Payment Village
Hours: Fri: 10:00 - 15:00
Social Media Links:
   TW @paymentvillage
   TI @paymentvillage
   YT link
[Image to be added later]

Twitter: https://twitter.com/paymentvillage
Website: https://www.paymentvillage.org/
Youtube: https://www.youtube.com/c/PaymentVillage

Payment technologies are an integral part of our lives, yet few of us know much about them. Have you ever wanted to learn how payments work? Do you know how criminals bypass security mechanisms on Point of Sales terminals, ATM’s and digital wallets?

Payment technologies are an integral part of our lives, yet few of us know much about them. Have you ever wanted to learn how payments work? Do you know how criminals bypass security mechanisms on Point of Sales terminals, ATM’s and digital wallets? Come to the Payment Village and learn about the history of payments. We’ll teach you how hackers gain access to banking endpoints, bypass fraud detection mechanisms, and ultimately, grab the money!

Return to Index

QCV - Queercon


QCV Village: Talk List
Home Page: https://www.queercon.org/
Social Media Links:
   TW @Queercon
   FB @126504813280
   DC https://discord.com/invite/jeG6Bh5

Return to Index

QTV - Quantum Village


QTV Village: Talk List
Home Page: https://www.quantumvillage.org/
DC Forums Page: https://forum.defcon.org/node/240893
Location: Caesars Forum - Summit 217 (Quantum Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @quantum_village
Click image for larger versionName:	Qvillagejpg.jpgViews:	754Size:	11.5 KBID:	240895


Village's twitter Handle: @quantum_village

Official web address/URL: https://quantumvillage.io/

CFP Link: Coming Soon.

Have you heard about ‘Q-Day’? Or perhap had someone tell you that ‘Quantum is coming!’ - well, they were right! Quantum Village is here! QV is a place to Engage, Explore, Discover, and Discuss ‘Quantum Information Science & Technology’ (QIST) from the hacker’s point of view. Free from ‘quantum woo’ and sales pitches we have activities, talks, seminars, badges, stickers, and more for people to learn about this new and fast growing part of tech. From talks for experts to workshops for the newbie, if you want to get quantum aware we have something for you!

Return to Index

RCV - Recon Village


RCV Village: Talk List
Home Page: https://www.reconvillage.org/
Sched Page: https://reconvillage.org/talks/
DC Forums Page: https://forum.defcon.org/node/239782
DC Discord Chan: https://discord.com/channels/708208267699945503/732733566051418193
Location: LINQ - 3rd flr - Social B and C (Recon Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @ReconVillage
   FB @reconvillage
Recon Village
Returning for DC30!
DC29 Forum: https://forum.defcon.org/node/236958
Recon VIllage Icon



Website: https://reconvillage.org/
Twitter: https://twitter.com/reconvillage /
DEF CON Discord Channel
Recon Village is an Open Space with Talks, Live Demos, Workshops, Discussions, CTFs, etc. with a common focus on Reconnaissance. The core objective of this village is to spread awareness about the importance of reconnaissance, open-source intelligence (OSINT), and demonstrating how even small information about a target can cause catastrophic damage to individuals and organizations.

We will have our Jeopardy Style OSINT CTF Contest again. The challenges will be around harvesting information about target organizations, their employee's social media profiles, their public svn/gits, password breach dumps, darknet, paste(s), etc. followed by active exploitation, bug hunting, investigation, and pentest scenarios of virtual targets. All the target organizations, employees, servers, etc. will be created by our team and hence will not attract any legal issues.

Similar to the last year, there will be Awesome rewards for CTF winners, along with free t-shirts, stickers, village coins, and other schwag which attendees can grab and show off.
Return to Index

RFV - Radio Frequency Village


RFV Village: Talk List
Home Page: https://rfhackers.com/
Sched Page: https://rfhackers.com/calendar
DC Forums Page: https://forum.defcon.org/node/240934
DC Discord Chan: https://discord.com/channels/708208267699945503/732732595493666826
Location: Flamingo - Eldorado Ballroom (Radio Frequency Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @rfhackers
   TW @rf_ctf
         link
   DC https://discordapp.com/invite/JjPQhKy
Click image for larger versionName:	image_1794.jpgViews:	800Size:	6.1 KBID:	240936


Site: https://rfhackers.com/
Discord: https://discord.com/channels/7082082...32595493666826

(Formerly the Wireless Village)
Returning for DC30!

RF Hackers Sanctuary presents: The Radio Frequency Village at DEF CON .

After 14 years of evolution, from the WiFi Village, to the Wireless
Village, RF Hackers Sanctuary presents: The Radio Frequency Village at
DEF CON.

The Radio Frequency Village is an environment where people come to learn about the security of radio frequency (RF) transmissions, which includes wireless technology, applications of software defined radio (SDR), Bluetooth (BT), Zigbee, WiFi, Z-wave, RFID, IR and other protocols within the usable RF spectrum. As a security community we have grown beyond WiFi, and even beyond Bluetooth and Zigbee.

The RF Village includes talks on all manner of radio frequency command and control as well as communication systems. While everyone knows about the WiFi and Bluetooth attack surfaces, most of us rely on many additional technologies every day. RF Hackers Sanctuary is supported by a group of experts in the area of information security as it relates to RF technologies. RF Hackers Sanctuary’s common purpose is to provide an environment in which participants may explore these technologies with a focus on improving their skills through offense and defense. These learning environments are provided in the form of guest speakers, panels, and Radio Frequency Capture the Flag games, to promote learning on cutting edge topics as it relates to radio communications. We promise to still provide free WiFi.

https://rfhackers.com/the-crew

Speaker and contest schedule can be found on our website:
https://rfhackers.com/calendar

Co-located with the RF Village is the RF Capture the Flag. Come for
the talks, stay for the practice and the competition.
Return to Index

RHV - Retail Hacking Village


RHV Village: Talk List
Home Page: https://retailhacking.store/
Sched Page: https://retailhacking.store/schedule.html
DC Forums Page: https://forum.defcon.org/node/240887
Location: Caesars Forum - Alliance 310, 320 (Retail Hacking Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @RetailHacking
   DC https://discord.gg/DxG4Uj7WZV
Click image for larger version  Name:	Logo_V4.png Views:	0 Size:	1.8 KB ID:	242050




Have you ever wondered about the inner workings of point of sale systems, remote pricing handsets, and wireless wheel locking systems?

Then the Retail Hacking Village is for you!

Here you can test and hack various retail devices - all in the name of security research.

CFP: https://retailhacking.store/events.html
Twitter: https://twitter.com/RetailHacking
Return to Index

ROV - Rogues Village


ROV Village: Talk List
Home Page: https://foursuits.co/roguesvillage
Sched Page: https://foursuits.co/roguesvillage
DC Forums Page: https://forum.defcon.org/node/239786
DC Discord Chan: https://discord.com/channels/708208267699945503/732732701144121434
Location: LINQ - 3rd flr - Evolution (Rogues Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @RoguesVillage
   TI @roguesvillage
   TW @foursuits_co
   YT https://www.youtube.com/c/foursuits

Returning for DC30!
DC29 Forum: https://forum.defcon.org/node/236741
https://www.foursuits.co/roguesvillage
https://twitter.com/RoguesVillage

DEF CON Discord Channel
Rogues Village icon or logo


Rogues Village is a place to explore alternative approaches and uses for security concepts, tools, and techniques by looking to non-traditional areas of knowledge. Incorporating expertise from the worlds of magic, sleight of hand, con games, and advantage play, this village has a special emphasis on the overlap between Social Engineering, Physical Security, and Playful Mischief.

Because we specialize in non-traditional approaches, Rogues Village can be an excellent entry point for people with a less established background in the security space. By introducing and engaging with existing topics in innovative, relatable, and frequently hands-on ways, they can become easier for people to approach and pick up for the first time.

Additionally, we are one of the few villages with a view that explicitly extends beyond the security space, meaning our perspective will necessarily include influences, ideas, and inspirations that are unique to Rogues Village.
Return to Index

RTV - Red Team Village


RTV Village: Talk List
Home Page: https://redteamvillage.io/
Sched Page: https://redteamvillage.io/schedule
DC Forums Page: https://forum.defcon.org/node/240944
Location: Flamingo - Mesquite Ballroom (Red Team Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00
Social Media Links:
   TW @RedTeamVillage_
   YT https://www.youtube.com/redteamvillage
   TI @redteamvillage
   DC https://discord.gg/redteamvillage
[Image to be added later]

Twitter: https://twitter.com/RedTeamVillage_
Website: https://redteamvillage.io/

CFP: Coming Soon!

The Red Team Village is focused on training the art of critical thinking, collaboration, and strategy in offensive security. The RTV brings together information security professionals to share new tactics and techniques in offensive security. Hundreds of volunteers from around the world generate and share content with other offensively minded individuals in our workshops, trainings, talks, and conferences.


Return to Index

SEV - Social Engineering Village


SEV Village: Talk List
Home Page: https://www.se.community/
Sched Page: https://www.se.community/village-schedule/
DC Forums Page: https://forum.defcon.org/node/240918
DC Discord Chan: https://discord.com/channels/708208267699945503/732733952867172382
Location: LINQ - 3rd flr - Social A (Social Engineering Community) - Map
Hours: Fri: 10:00 - 19:00 - Sat: 10:00 - 19:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @sec_defcon
[Image/Logo/Iconography coming later]

The Social Engineering Community is formed by a group of individuals who have a passion to enable people of all ages and backgrounds interested in Social Engineering with a venue to learn, discuss, and practice this craft. We plan to use this opportunity at DEF CON to present a community space that offers those elements through panels, presentations, research opportunities, and contests in order to act as a catalyst to foster discussion, advance the craft and create a space for individuals to expand their network. SEC Village plans to accomplish the above by bringing together passionate individuals to have a shared stake in building this community.

For more information on our village stay tuned by following us at: https://twitter.com/sec_defcon


Twitter: https://twitter.com/sec_defcon
Website: https://www.se.community/
Call for Papers is open: https://www.se.community/events/presentations/

Return to Index

SKY - SkyTalks - 303


SKY Village: Talk List
Home Page: https://skytalks.info/
Sched Page: https://skytalks2022.busyconf.com/schedule
DC Forums Page: https://forum.defcon.org/node/242039
Location: LINQ - BLOQ (SkyTalks 303) - Map
Hours: Fri: 08:30 - 18:30 - Sat: 08:30 - 18:30 - Sun: 08:30 - 14:00
Social Media Links:
   TW @dcskytalks
   FB @Skytalks
303 Skytalks


Since DEF CON 16, Skytalks has been proud to bring you Old School DEF CON in a non-recorded, off-the-record track. Talks include technical deep dives, off-the-beaten path discussions, name-and-shame rants, cool technology projects, and plenty of shenanigans. We pride ourselves on a simple creed: “No recording. No photographs. No bullshit.

Twitter: @dcskytalks
Website: https://skytalks.info
Schedule: https://skytalks.info/schedule/

[]
Return to Index

SOC - Social Activities: Parties/Meetups


SOC Village: Talk List

Return to Index

TEV - Tamper Evidence Village


TEV Village: Talk List
DC Forums Page: https://forum.defcon.org/node/240937
Location: Summit BR 201-205, 235 Summit-Forum Pre-Fun 3 - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 13:00


Tamper-evident" refers to a physical security technology that provides evidence of tampering (access, damage, repair, or replacement) to determine authenticity or integrity of a container or object(s). In practical terms, this can be a piece of tape that closes an envelope, a plastic detainer that secures a hasp, or an ink used to identify a legitimate document. Tamper-evident technologies are often confused with "tamper resistant" or "tamper proof" technologies which attempt to prevent tampering in the first place. Referred to individually as "seals," many tamper technologies are easy to destroy, but a destroyed (or missing) seal would provide evidence of tampering! The goal of the TEV is to teach attendees how these technologies work and how many can be tampered with without leaving evidence.

The Tamper-Evident Village includes the following contests and events:
(A change to this content may appear soon.)
Return to Index

VMV - Voting Village


VMV Village: Talk List
Sched Page: https://docs.google.com/document/d/1LTO2ixHwILtW8W6xJsBAFzAGTnxUGDxZgxzDVkcsT1Q/edit
DC Forums Page: https://forum.defcon.org/node/239783
DC Discord Chan: https://discord.com/channels/708208267699945503/732733881148506164
Location: Caesars Forum - Alliance 313-314, 320 (Voting Village) - Map
Hours: Fri: 10:00 - 18:00 - Sat: 10:00 - 18:00 - Sun: 10:00 - 15:00
Social Media Links:
   TW @votingvillagedc
   YT link
Voting Village
Returning for DC30!
DC29 Forum: https://forum.defcon.org/node/236962
Voting Village Icon



https://twitter.com/votingvillagedc
https://www.youtube.com/channel/UCnD...3sO8chqS5MGvwg

DEF CON Discord Channel


Voting Village explores voting machines, systems, and databases and works to promote a more secure democracy.

Return to Index

WS - DEF CON Workshops


WS Village: Talk List
Home Page: https://forum.defcon.org/node/239773

Return to Index

Speaker List


CCEE
CCEE
CFE
CFE
1st Lt Kevin Bernert
3ncr1pt3d
A.Krontab
ギンジー🐾ターラノー
Éanna Doyle
Aaditya Purani
Aakinn Patel
Aaron DeVera
Aaron Myrick
Aaron Rosenmund
Abdul Alanazi
Abhijith B R
Abraxas
Adam 'pi3' Zabrocki
Adam Dobell
Adam Dobell
Adam Hickey
Adam Hickey
AdanZkx
Adrian Wood
Adrien Ogee
Adrien Ogee
Aeva Black
Aimee Reyes
AJ King
Alberto Herrera
Alex Lomas
Alex Martirosyan
Alex Tereshkin
Alexandre Sieira
Alexandrine Torrents
Alexandrine Torrents
Alexis Goldstein
Alexis Hancock
Alh4zr3d
Alisha Kloc
Alison N
Alison N
Alissa Knight
Alissa Torres
Allan Friedman
Allen Baranov
Alshlon Banks
Andrés Arrieta
Andrea Downing
Andrea Downing
Andres Meza
Andrew Costis
Andrew Green
Andrew Klein
Andrew Logan
Andrew Sutters
Andy Grunt
Ankur Tyagi
Anthony "Cx01N" Rose
Anthony "Cx01N" Rose
Anthony Hendricks
Anton Ovrutsky
Antonio Piazza
Apurv Singh Gautam
Archwisp
Arik
Arikia Millikan
Arikia Millikan
Arnaud Soullie
Arnaud Soullie
aromond
Asaf Gilboa
Ashlee Benge
Assistant Professor Drew Springall
Assistant Professor Drew Springall
atlas
Avi Zajac
Avi Zajac
aviditas
aviditas
aviditas
Aviv Sasson
Ayan Islam
Ayan Islam
Ayyappan Rajesh
B
Barrett Darnell
Ben Barnea
Ben Gardiner
Ben Gelman 
Ben Hawks
Ben Hughes
Ben Kurtz
Ben Opel
Ben Sadeghipour
Benjamin Hendel
Benny Zeltser
Berk Can Geyikçi
Berkelly Gonzalez
Bill Graydon
Bill Graydon
Bill Graydon
Bill Woodcock
Billy Jheng
Biolux
Birhanu Eshete
Bradán Lane
Brandon Bailey
Brandon Enright
Brenton Morris
Brenton Morris
Brian Markham
Brian Pendleton
Brian Pendleton
Brianna McClenon
Brigadier General Teri (Terin) D. Williams
Bryan C. Geraghty
Bryson Bort
Bryson Bort
Bryson Bort
burninator
Burninator
Caleb Davis
Calli Schroeder
Cam
Capt Elijah Williams
CaptHz
Carey Parker
Carlos Galán
Carolyn Majane
Carson Zimmerman
Cas Van Cooten
Casey Ellis
Casey O'Brien
Cassandra Bailey
Cassandra Young (muteki)
Cassandra Young (muteki)
Cat Self
Cathy Gellis
Cathy Gellis
CerealKiller
Cesare Pizzi
Cezary Cerekwicki
Ch33r10
Chantel Sims aka Root
Cheryl Biswall
Chet Hosmer
Chet Hosmer
ChocolateCoat
ChocolateCoat
ChocolateCoat
Chris Dickson
Chris Forte
Chris Greer
Chris Inglis
Chris Kubecka
Chris Kubecka
Chris Kubecka
Chris Painter
Chris Poore
Chris Richardson
Chris Rock
Chris Romeo
Chris Thompson
Christian "quaddi" Dameff MD
Christian "quaddi" Dameff MD
Christine Fossaceca
Christine Reid
Christophe Tafani-Dereeper
Christopher Cottrell
Christopher Forte (isaidnocookies)
Christopher Panayi
Christopher Peacock
Christopher Poore
Christopher Robinson
CISA Staff
CodexMafia
ColdwaterQ
Connor Morley
Corellium
Corey Ball
Corey Ball
Corey Ball
Cory Doctorow
Cory Wolff
Cory Wolff
Corynne McSherry
Corynne McSherry
CountZ3r0
CountZ3r0
CountZ3r0
Craig Stevenson
Crane Hassold
Crystal Phinn
CTRL/rsm
Cyb3rHawk
Cybelle Oliveira
CyberQueenMeg
Cyrena Jackson
D4rkm4tter
D4rkm4tter
dadabots
Dagan Henderson
Daly Barnett
Damian Grant
Dan Borges
Dan Nagle
Daniel Chen
Daniel Crowley
Daniel Feichter
Daniel Garrie
Daniel Goga
Daniel Goga
Daniel Goga
Daniel Isler
Daniel Jensen
Daniel Prizmant
Daniel Roy
Danny D. Henderson Jr (B4nd1t0)
Danny Quist
Darwin Salazar
Dave Burke
Dave Burke
David Brearley
David Forscey
David Hunt
David Joseph
David McGrew
David Mitchell
David Rogers
Dawn Cappelli
Dazza Greenwood
Dean Lawrence
Dean Lawrence
Dean Lawrence
Dean Lawrence
Dean Lawrence
DEF CON Goons
DEF CON Policy Dept
Deneen Defiore
Dennis Skarr
Deral Heiland
Deral Heiland
Deral Heiland
Deviant Ollam
DHS Staff
Diego Capriotti
Dikla Barda
DJ Scythe
DJ St3rling
DJ UNIT 77 [ 0077 : 0077 ]
djdead
djdead
djdead
djdead
djdead
djdead
djdead
djdead
djdead
Dominic “Cryillic” Cunningham
Don C.Weber
Dongsung Kim
DotOrNot
Dr. Amanda Minnich 
Dr. Bramwell Brizendine
Dr. Diane Maye Zorri
Dr. Josef Schmid
Dr. McGrew
Dr. Meisam Eslahi
Dual Core
Duane Michael
Dylan Baklor
Ebony Pierce
Ebony Pierce
Ege F
Ege F
Ege F
Eigentourist
Eijah
Eirick Luraas
Eirick Luraas
El Kentaro
El Kentaro
Elad Rapoport
Elizabeth Biddlecome
Elizabeth Biddlecome
Emil Vaagland
Emma Best
Emma Best
Eran Segal
Eric Belardo
Eric Escobar
Eric Escobar
Eric Escobar
Eric Mair
Eric Mill
Erie Meyer
Erin Cornelius
Erin Miller
Erwin
Esther Matut
Ethan Michalak
Ethan Michalak
Ethan Michalak
Ethan Michalak
Ethan Michalak
Eugene Lim
Eugene Lim
Eugene Lim
evadsnibor
ExtremePaperClip
ExtremePaperClip
ExtremePaperClip
ExtremePaperClip
Eyitayo Alimi
Eytan Tepper
Fahmida Rashid
Felipe Espósito
Fernando Perera
Filipi Pires
Flangvik
Fletcher Heisler
Florian Lukavsky
Four Suits Co
Four Suits Co
Four Suits Co
Four Thieves Vinegar Collective
Frank Duff
FuzzyNop
Göktay Kaykusuz
GACWR Team
GACWR Team
Gadi Evron
Gal Sadeh 
Gal Zror
Game Tech Chris
Garrett Jares
Gary Kessler
Gary Kessler
Gaurav Keerthi
Gaurav Keerthi
Gauthier Sebaux
Gavin Klondike 
Gavin Klondike 
Gavin To
George Karantzas
Georges-Axel Jaloyan
Giglio
Gilmar Esteves
Gina Rosenthal
Ginny Fahs
Girls Hack Village Staff
Gonzalo Munilla Garrido
Griffin Francis
Grifter
Grim0us
Grim0us
Guillaume Ross
Guillermo Christensen
Guy Barnhart-Magen
Guy Barnhart-Magen
GyledC
Hadrien Barral
Hanz Dwight
Hardik Shah
Harini Kannan 
Harley Geiger
Harri Hursti
Harry Mourtos
Heckseven
Hellacopta
Henry Haswell
hoodiePony
Hristiana Petkova
Huajiang "Kevin2600" Chen
Hyrum Anderson 
Ian Davila
Ian Vitek
Iceman
Icetre Normal
ICSNick - Nicklas Keijser
Igal Flegmann
Inaae Kim
India McKinney
Ionut Cernica
Irene Mo
Irfan Hemani
Irfan Hemani
Irvin Lemus
Irvin Lemus
Isabel Straw
Itzik Kotler
Ivo de Carvalho Peixinho
J9
Jabbles
Jack Cable
Jack Wells
Jackie Bow
Jacob Baines
Jake "Hubbl3" Krasnov
Jake Labelle
Jake Labelle
Jake Williams
Jake Williams
Jake Williams
James Harrison
James Harrison
James Howe
James Kettle
James McKee
James Pavur
James Pavur
Jamie Friel
Jamie Williams
Jamie Williams
Jamie Williams
Jaquar Harris
Jared Dygert
Jason Healey
Jason Healey
Jason Healey
Jason Johnson
Jasper Insinger
Jax
Jay Chen
Jay Chen
Jay Lagorio
Jay Turla
Jay Yee
Jay Yee
Jay Yee
Jay Yee
Jay Yee
Jayesh Singh Chauhan
Jayesh Singh Chauhan
Jayson E. Street
Jean-Michel Amblat
Jeff “r3plicant” Tully MD
Jeff “r3plicant” Tully MD
Jeffrey Hofmann
Jen Easterly
Jen Ellis
Jen Ellis
Jenko Hwong
Jenna Sherman
Jennifer Mathieu
Jennifer Mathieu
Jeongho Yang
Jeremy Hong
Jeremy Linden
Jeremy Miller
Jeremy Miller
Jerome Lovato
Jess
Jesse Michael
Jessica Afeku
Jessica Dheere
Jessica Smith
Jeswin Mathai
Jeswin Mathai
JHaddix
Ji Su Yoo
Jillian Simons
Jim Manico
Jim Shaver
Jimi Allee
Jimmy Wylie
Jivesx
Joe Grand
Joe Schottman
Joe Slowik
Joe Slowik
Joe Vest
John Bryk
John Hammond
John Midgley
John Orleans
Jon Christiansen
Jon Clay
Jon Marler
Jonas Bülow Knudsen
Jonathan Bar Or
Jonathan Fischer
Jonathan Fischer
Jonathan Leitschuh
Jonathan Lusky
Jonathan Tomek
Jonghyuk Song
Jonghyuk Song
Jordan Wiens
Jorge Acevedo Canabal
Jos Wetzels
Jose Pico
Jose Pizarro
Joseph Ravichandran
Josephine Hollandbeck
Josh Stroschein
Joshua Corman
Jovonni Pharr
Jovonni Pharr
Judge Taylor
Judge Taylor
juju43
juju43
Jules Rigaudie
Junyuan Zeng
Justin Elze
Justin Gardner
Justin Hutchens 
Justin Rhinehart
Justin Rhinehart
Justin/InkRF
K1ng_Cr4b
Kaileigh McCrea
Kairie Pierce
Kaitlyn Handleman
Kaitlyn Handleman
Kalev Leearu
Kamel
Kampf
Kampf
Kampf
Kampf
Kampf
Kampf
Kampf
Kampf
Kampf
Kamron Talebzadeh
Karen Ng
Karen Ng
Karen Ng
Karen Ng
Karen Ng
Karen Ng
Karen Ng
Karl Fosaaen
Karl Koscher
Kartheek Lade (@0xh3nry)
Kassandra Pierre
Kat Fitzgerald
Kate Bertash
Kate Bertash
Kathrin Spendier
Kathy Satterlee
Katie Moussouris
Katie Whiteley (Mkfactor)
Katorah Williams
Keenan Skelly
Keith E. Sonderling 
Keith Meyers
Ken Gannon
Ken Munro
Ken Munro
Ken Pyle
Ken Pyle
Kennashka DeSilva
Kenneth Geers
Kent Britain WA5VJB
Kenzie Dolan
Kevin Chapman
Kevin Clark
Kevin Lai
Kim Zetter
Kimberly Mentzell
Kostas
Kristen Cotten
Krisz Klink
Kurt Opsahl
Kyle Avery
Kyle Wiens
KyleHaxWhy
l00sid
l00sid
l0ngrange
Langston Clement (aka sh0ck)
Langston Clement (aka sh0ck)
Langston Clement (aka sh0ck)
Lars Skjorestad
Larsbodian
Larsbodian
Lauren Proehl
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lee McWhorter
Lennert Wouters
Leo Nendza
Leonard Bailey
Leonard Bailey
Levone Campbell
Li Siwei
Lily Newman
Linton Wells
Lior Kolnik
LitMoose
Liz Wharton
Logan Arkema
Louis Barrett
Louis Rossmann
Lucas Bonastre
Luiz Eduardo
Luke Richards (Wbbigdave)
Luke Richards (Wbbigdave)
Maggie Mayhem
Magician Kody Hildebrand
Magician Kody Hildebrand
Magician Kody Hildebrand
Magik Plan
Magnus Stubman
Makayla Ferrell
Malcolm Galland
Mari Galloway
Mariam Elgabry
Marissa Costa
Mark C
Mark C
Mark C
Mark Jackson
Mark Morowczynski
Mark Werremeyer
Martin Doyhenard
Martin Sohn Christensen
Martin Vigo
Mary Brooks
Mary Chaney
Mass Accelerator
MasterChen
MasterChen
Matt Cheung
Matt Cheung
Matt Holland
Matt Mosley
Matt Nash
Matt Scheurer
Matthew Canham
Matthew Freilich
Matthew Guariglia
Matthew Handy
Mauricio Tavares
Mauricio Velazco
Mauro Eldritch
Max Garrett
Maxime Meignan
Maxwell Dulin
Meg Egan
Meg King
Melanie Chan
Melanie Chan
Melanie Chan
Melanie Chan
Melanie Chan
Melissa Miller
Melissa Miller
Melvin Langvik
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Merin MC
Miana E Windall
Micah Hoffman
Micah Turner
Michael Aguilar (v3ga)
Michael Bargury
Michael Bargury
Michael Epping
Michael Kouremetis
Michael Kouremetis
Michael Kouremetis
Michael Kouremetis
Michael Kouremetis
Michael Messner
Michael Mitchell
Michael Mitchell
Michael Mitchell
Michael Moore
Michael Moore
Michael Pelosi
Michael Register
Michael Ross
Michael Solomon
Michael Whiteley (Mkfactor)
Mickey Shkatov
Micsen
Miguel Gallego Vara
Mike Campanelli
Mike Guirao
Mike Kijewski
Mike Mittelman
Mike Raggo
Mike Walker
Minh Duong
Miriam Lorbert
Miss Jackalope
Misstech
Mixæl S. Laufer
Mixæl S. Laufer
Mixæl S. Laufer
Mohammed Shine
Monique Head
Monique Head
Moritz Abrell
Muhammad ALifa Ramdhan
Musaed Bin Muatred
n0x08
N∅thing
N∅thing
nas_bench - Nasreddine Bencherchali
Nate Pelz
Nate Young
Nathan Case
Nathan Chung
Nathan Kirkland
Nathan Smith
Nathaniel Quist
Neal Pollard
Nestori Syynimaa
Nestori Syynimaa
Neumann Lim (scsideath)
Nevada Romsdahl
Nick Ascoli
Nick Ascoli
Nick Baker
Nick Dorion 
Nick Gobern
Nick Powers
Nick Vidal
Nick Vidal
Nicolas Boeckh
Nicole Chi
Nicole Tisdale
Nicole Tisdale
Nikita Kurtin
Nina Alli
Nina Kollars
Niru Raghupathy
Nishant Sharma
Nishant Sharma
Noam Dahan
Noam Dahan
Noam Dahan
nohackme
NPC Collective
Ochuan Marshall
Octavio Galland
Octavio Gianatiempo
Oded Vanunu
Ohad Zaidenberg
Olaf Hartong
Oleg Lerner
Olivia Stella
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omar Santos
Omenscan
Omenscan
Omenscan
Omenscan
Omenscan
Omri Misgav
Open Research Institute
Open Research Institute
Open Research Institute
Ophir Harpaz
Or Yair
Orange Tsai
Osasu Dorsey
PankleDank
Pascal Eckmann
Patrick McNeil
Patrick Wardle
Patrick Wardle
Patrik Neu
Paul Flynn
Paul Laîné
Paul Roberts
Paul Young
Paula González Nagore
Pedro Cabrera
Per Thorsheim
Pete Cooper
Pete Cooper
Peter Stephens
Phil Young
Philippe Laulheret
Phillip Wylie
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
Pie & Darren
plug
Preslav Nakov
Preslav Nakov
Professor Rogers
Quantum Village Team
Quantum Village Team
Quentin Kaiser
Rachel Mann
Rachel See
Rachna Umraniya
RADM John Mauger
Rae Baker
Ragnhild “Bridget“ Sageng
Rahul J
Raker
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Ralph May
Raunak Parmar
Ray “Senpai” Morris
Rebecca Ash
Rebekah Skeete
Rebekah Skeete
Rebekah Skeete
redteamwynns
Remi Escourrou
Rex Guo
RF Hackers Village Staff
RF Hackers Village Staff
RF Hackers Village Staff
Rhyner Washburn
Ricardo Sanchez
Ricardo Sanchez
Ricardo Sanchez
Rich
Richard Thieme
Richard Zak
Richard Zak
Rick Martinez Herrera
Rick Osgood
Rick White
Ricky Banda
Rishal Dwivedi
Robert Fitzpatrick
Robyn Lundin
Rod Soto
Rodrigo Montoro
Roger Dingledine
Rohan Durve
Rojan Rijal
Roman Zaikin
Ron Ben Yitzhak
Ron Taylor
Ron Taylor
Ron Taylor
Ron Taylor
Ron Taylor
Ron Taylor
Ron Taylor
Ronald Broberg
Ronald Broberg
Ronny Thammasathiti
Rotem Bar
Roy Erlich
Roy Stultiens
Rudy Mendoza
Russ Handorf
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
Rusty
RxGamble
Ryan Ashley
Ryan J Chapman
Ryan Kovar
Ryan M. Montgomery
Ryan Rix
Ryan Westman
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
s1gnsofl1fe
Safa Shahwan Edwards
Salma Taoufiq
Sam Bent
Sam Bowne
Sam Bowne
Sam Curry
Sam Quinn
Saman Fatima
Samantha Jennings
Samuel Erb
SamunoskeX
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sandra Stibbards
Sanjeev Mahunta
Sanne Maasakkers
Santiago Kantorowicz
Santiago Kantorowicz
Sara-Jayne Terp
Sarthak Taneja
Saurabh Chaudhary
Scotch and Bubbles
Scott Brink
Scott Brink
Scott Brink
Scott Brink
Scott Small
Scott Small
Scribbles
Sean Sullivan
Sean Wilson
Sean Zadig
Sebastian Stein
Seeyew Mo
Segun Ebenezer Olaniyan
Seongsu Park
Sergei Frankoff
Seth Kintigh
Seth Kintigh
Seth Kirschner
Seth McKinnis
Shannon McHale
Sharon Brizinov
Shawn Thomas
Shea Nangle
Shellt3r
Sherrod DeGrippo
Shubham Dubey
Sick Codes
sidepocket
Siebren Kraak
Skittish & Bus
Slammer Musuta
Slava Makkaveev
Solomon Sonya
Solomon Sonya
Sonju Walker
Soohwan Oh
Soohwan Oh
SooYun Chung
Sophia D'Antoine
Spicy Wasabi
Squiddy
stacksmashing
Starlink
Starlink
Stefan Stephenson-Moe
Stephan Wampouille
Stephanie Barnes
Stephanie G.
Stephanie G.
Stephen Eckels
Stephen Kofi Asamoah
Steve Colenzo
Steve Povolny
Steve Thomas
Steven Collins
Steven Flores
Stewart Scott
Stewart Scott
Suchi Pahi
Sudipto Rakshit 
Sven Cattell
Sven Cattell
Swapneel Mehta
T. Halloway
TAIKOPROJECT
Tanisha O'Donoghue
Tanisha O'Donoghue
Tarek Abdelmotaleb
Tavoo
Taylor Kulp-Mcdowall 
Ted Harrington
Tennisha Martin
Tennisha Martin
Tennisha Martin
Tennisha Martin
Tense Future
Teoderick Contreras
Teresa Green
Teresa Merklin
Terrestrial Access Network
Tessa Cole
Tessa Cole
Tessa Cole
The Dark Tangent
The Dark Tangent
The Dark Tangent
The Dark Tangent
Thijs Alkemade
Thomas Cervoni
Thomas Diot
Thomas Roth
Tillson Galloway
Tim Chase
Tim MalcomVetter
Timothy Weston
Timothy Weston
TJ Null
Todd Keller
Tom Dohrmann
Tom McGuire
Tomer Bar
Toni de la Fuente
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
TOOOL
Tracy Z. Maleeff
Tracy Z. Maleeff
Tracy Z. Maleeff
Tracy Z. Maleeff
Trapezoid
Travis Juhr
Trevor Timmons
Trey Herr
Trey Herr
TRIODE
Tristan Miller
ttheveii0x
ttheveii0x
Tyler
Tyson B. Meadors
Tyson B. Meadors
Tyson B. Meadors
tzachi(Zack) zorenshtain
Uchi Uchibeke
Uchi Uchibeke
Ulf Frisk
Utku Yildirim
Valencia Robinson
Valencia Robinson
Victor Graf
Vikram Sharma
Vikram Sharma
Vincent "Vinnybod" Rose
Vincent "Vinnybod" Rose
Vivek Nair
Vivek Nair
Vivek Ponnada
Vivek Ponnada
VWave
Wes Gavins
Wes Lambert
Wes Lambert
Wes Lambert
Wesley Altham (aka Wesrl)
Wesley Andrews
Wesley Thurner
Whitney Merrill
Wietze Beukema
Will Baggett
Will Baggett
Will Kline
Will Pearce
Will Pearce
Will Pearce
Will Schroeder
Will Schroeder
Winn Schwartau
Winnona DeSombre
Winnona DeSombre
Woody
Woongjo choi
Xan North
Xan North
Xavier Gerondeau
Xray
Yael Grauer
Yan Shoshitaishvili
Yan Zhu
Yatia Hopkins
Yatia Hopkins
Yesterday & Tomorrow
Yolan Romailler
Ytcracker
Yuvaraj Govindarajulu 
Z3NPI
Zac Shannon
Zac Staples
Zac
Zac
Zachary Minneker
Zachary Minneker
Zebbler Encanti Experience
Zhouhan Chen
zr0

Talk List


'Damn the exploits! Full speed ahead!' How naval fleet tactics redefine cyber operations - AVV
"The Man" in the Middle - BICV
(Not-So-Secret) Tunnel: Digging into Exposed ngrok Endpoints - RCV
[T]OTPs are not as secure as you might believe - CPV
404! Memory Holing and the SEO Warping of Human History - MIV
A Capitalist approach to hospital security - BHV
A dead man’s full-yet-responsible-disclosure system - DC
A few useful things to know about AI Red Teams  - AIV
A Light in Darkness: Child Predator Hunting through OSINT, Dark Web Sleuthing & Linguistic Analysis - RCV
A Policy Fireside Chat with Jay Healey - DC
A Policy Fireside Chat with the National Cyber Director - DC
A ransomware actor looks at the clouds: attacking in a cloud-native way - CLV
A System for Alert Prioritization - AIV
A Telco Odyssey. 5G SUCI-Cracker & SCTP-Hijacker - RFV
AADInternals: The Ultimate Azure AD Hacking Toolkit - DL
Abortion Tech - SKY
Access Undenied on AWS - Troubleshooting AWS IAM AccessDenied Errors - CLV
Access Undenied on AWS - DL
Ad it up: To minimize mis- and dis-information, we must reshape the ad tech business, not regulate speech - MIV
Addressing the gap in assessing (or measuring) the harm of cyberattacks - PLV
Advanced Packet Wrangling with tcpdump - DCGVR
Adversary Booth - AVV
Adversary Booth - AVV
Adversary Booth - AVV
Adversary Booth - AVV
Adversary Booth - AVV
Adversary Wars CTF - AVV
Adversary Wars CTF - AVV
Adversary Wars CTF - AVV
AES-GCM common pitfalls and how to work around them (PRE-RECORDED) - CPV
Agility Broke AppSec. Now It's Going to Fix It. - APV
AI Music Tutorial and Show - AIV
AI Trojan Attacks, Defenses, and the TrojAI Competition - AIV
AI Village + RTV Panel: The Use of AI/ML in Offensive Security Operations - RTV
AI Village Closing Remarks - AIV
AI Village CTF Results and Q&A - AIV
AI Village Keynote - AIV
All information should be free (except the brain data you want to keep in your head)  - BHV
All Roads leads to GKE's Host : 4+ Ways to Escape - DC
alsanna - DL
Amazon Web Services Aerospace and Satellite Jam - ASV
Amazon Web Services Aerospace and Satellite Jam - ASV
An introduction to quantum algorithms - QTV
Analyzing PIPEDREAM: Challenges in testing an ICS attack toolkit. - DC
Android, Birthday Cake, Open Wifi... Oh my! - SKY
Antennas for Surveillance - RFV
Arcade Party - SOC
⚠️ Not all contests listed (yet) ⚠️ - CON
Ask an Airport CISO - ASV
Assessing Cyber Security ROI: Adversary simulation and Purple teaming - AVV
Attack and Defend with Adversary Emulation - AVV
Attack and Defend with the Command and Control (C2) Matrix - RTV
Attack Surface Management Panel - RCV
Attacks on Tiny Intelligence - AIV
Attribution and Bias: My terrible mistakes in threat intelligence attribution - BTV
AutoDriving CTF - CON
Automate Detection with Machine Learning  - AIV
Automate Detection with Machine Learning  - AIV
Automated Debugging Under The Hood - Building A Programmable Windows Debugger From Scratch (In Python) - WS
Automated Trolling for Fun and No Profit - SKY
Automating Insecurity in Azure - CLV
Automotive Ethernet Fuzzing: From purchasing ECU to SOME/IP fuzzing - DC
Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More - DC
AWS Metadata Privilege Escalation - DCGVR
AWSGoat : A Damn Vulnerable AWS Infrastructure - DL
AzureGoat: Damn Vulnerable Azure Infrastructure - DL
Back to School! Hello RSA... and beyond! - CPV
Backdooring Pickles: A decade only made things worse - DC
Backdoors & Breaches, Back to the Stone Age! - BTV
Badrats: Initial Access Made Easy - DL
Balancing the Scales of Just-Good-Enough - AVV
Basic Blockchain Forensics - SKY
Better Policies for Better Lives: Hacker Input to international policy challenges - PLV
Betting on Your Digital Rights: EFF Benefit Poker Tournament - CON
Beverage Cooling Contraption Contest (BCCC) - CON
BIC Village Capture The Flag  - CON
Biohacking Using SDR When You Don’t Know What You’re Doing - RFV
Biometrics system hacking in the age of the smart vehicle - CHV
Black & White Ball - Entertainment - SOC
Black in Cybersecurity Research and Education: The Experience of one Black Girl's Journey through Graduate School - GHV
Black-Box Assessment of Smart Cards - DC
BlanketFort Con - SOC
Blue Team Village Closing Ceremony - BTV
Blue Team Village Opening Ceremony - BTV
Blue Teaming Cloud: Security Engineering for Cloud Forensics & Incident Response - BTV
BlueTeam Village Party - SOC
Boeing ARINC 429 Airplane Challenge and CTF - ASV
Boeing ARINC 429 Airplane Challenge and CTF - ASV
Botnet Workshop - PHV
Botnet Workshop - PHV
Botnet Workshop - PHV
Brazil Redux: Short Circuiting Tech-Enabled Dystopia with The Right to Repair - DC
Breaking the Intelligence Cycle - how to tailor intelligence function to your needs? - BHV
BrokenbyDesign: Azure | Get started with hacking Azure - CLV
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling - DC
Building Adversary Chains Like an Operator - AVV
Building the Cybersecurity Workforce Pipeline: How to Recruit and Educate the Next Generation of Cyber Warriors - DCGVR
Building Your Own Satellite Ground Station - ASV
BURP Suite, Forensics Tools & 0-day Exploit Development. - IOTV
Bypass 101 - PSV
Bypass 101 - PSV
Bypass 101 - PSV
Bypass 102 - PSV
Bypass 102 - PSV
California CyberSecurity Institute Space Grand Challenge - ASV
Call for Evidence: Informing the Biological Security Strategy - BHV
CANalyse 2.0 : A vehicle network analysis and attack tool. - CHV
canTot - a CAN Bus Hacking Framework to Compile Fun Hacks and Vulnerabilities - CHV
Capture The Packet Finals - CON
Capture The Packet Main Rounds - CON
Capture The Packet Preliminaries - CON
Capture The Packet Preliminaries - CON
Capturing Chaos: Harvesting Environmental Entropy - CPV
Car Hacking Village CTF - CON
Car Hacking Village CTF - CON
Car Hacking Village CTF - CON
Careful Who You Colab With: Abusing Google Colaboratory - DCGVR
Catch the Cheat - ROV
CatPhish Automation - The Emerging Use of Artificial Intelligence in Social Engineering - AIV
Challenges in Control Validation - BTV
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chillout Lounge (with entertainment) - SOC
Chromebook Breakout: Escaping Jail, with your friends, using a Pico Ducky - DC
CICD security: A new eldorado - WS
CISA and Idaho National Lab Escape Room - ICSV
CISA and Idaho National Lab Escape Room - ICSV
CISA and Idaho National Lab Escape Room - ICSV
Closing a Security Gap in the Industrial Infrastructure Ecosystem: Under-Resourced Organizations - ICSV
Cloud Defaults are Easy Not Secure - CLV
Cloud Sandboxes for Security Research - Noirgate - CLV
Cloud Threat Actors: No longer cryptojacking for fun and profit - SKY
Cloud Village Closing Note - CLV
Cloud Village Opening Note - CLV
CMD+CTRL - CON
Cognitive Security in Theory and Practice - MIV
Cognitive Security: Human Vulnerabilities, Exploits, & TTPs - MIV
Cold Calls - SEV
Cold Calls - SEV
Combatting sexual abuse with threat intelligence techniques - SKY
Computer Hacks in the Russia-Ukraine War - DC
Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet - PLV
Container and Kubernetes Offense - RTV
Container and Kubernetes Offense - RTV
Container and Kubernetes Offense - RTV
Contest Closing Ceremonies & Awards - DC
Control Acquisition Attack of Aerospace Systems by False Data Injection - ASV
Control Validation Compass – Threat Modeling Aide & Purple Team Content Repo - DL
Control Validation Compass: Intelligence for Improved Security Validation - AVV
Crash and Compile - Contest Stage - CON
Crash and Compile - Contestant Setup - CON
Crash and Compile - Qualifications - CON
Crash and Compile + Hack3r Runway - CON
Creating and uncovering malicious containers. - WS
Creating More Black Hackers: Growth Systems for Cybersecurity Enthusiasts - BICV
CRITICAL FINDING: Lessons Learned from Dozens of Industrial Network Architecture Reviews - ICSV
Crossing the KASM -- a webapp pentest story - DC
Cryptle: a secure multi-party Wordle clone with Enarx - CPV
Cryptocurrency: A Bridge Across the Digital Divide - BICV
Cryptosploit - CPV
CTF 101: Breaking into CTFs (or “The Petting Zoo” - Breaking into CTFs) - WS
CTF Announcement - QTV
Cyber Attack Trends in 2022 - DCGVR
Cyber Physical Lab Environment for Maritime Cyber Security - ICSV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Resilience Bootcamp - RTV
Cyber Star Card Game Tutorial - ASV
Cyber Star© Competition Presented by The Space ISAC - ASV
Cyber Threats Against Aviation Systems: The Only Threat Briefing You Really Need - ASV
CyberPeace Builders - DL
D0 N0 H4RM: A Healthcare Security Conversation (Lounge) - PLV
Déjà Vu: Uncovering Stolen Algorithms in Commercial Products - DC
Dancing Around DRM - SKY
DARKNET-NG - CON
DARKNET-NG - CON
DARKNET-NG - CON
Data security and privacy in application security - APV
Dazed and Seriously Confused: Analysis of Data Voids & the Disinformation Landscape of Central Asia - MIV
DC30 Ham Radio Fox Hunt Contest - CON
DC30 Ham Radio Fox Hunt Contest - CON
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup - SOC
DC702 Pwnagotchi Party - SOC
DCGVR - Social Hour - DCGVR
DCGVR - Welcome reception 👋 - DCGVR
DDS Hack-the-Microgrid - ICSV
DDS Hack-the-Microgrid - ICSV
DDS Hack-the-Microgrid - ICSV
DDS Space Signal Lab - ASV
DDV (Data Duplication Village) starts accepting drives for duplication - DDV
DDV open and accepting drives for duplication - DDV
DDV open and accepting drives for duplication - DDV
Deadly Russian Malware in Ukraine - SKY
Deanonymization of TOR HTTP hidden services - DC
Debate - PQC, don't we have better things to do? - QTV
Debate - QKD - QTV
Decolonizing Cybersecurity - BICV
Deescalate the overly-permissive IAM - CLV
DEF CON 30 Chess Tournament - Mandatory Sign-up - CON
DEF CON 30 Chess Tournament - CON
DEF CON Bike Ride "CycleOverride" - SOC
DEF CON Closing Ceremonies & Awards - DC
DEF CON Holland DC3115 & DC3120 Group Meetup - SOC
DEF CON MUD - CON
DEF CON’s Next Top Threat Model - CON
DEF CON’s Next Top Threat Model - CON
Defaults - the faults. Bypassing android permissions from all protection levels - DC
DEFCON Demonstrations and Presentations by Open Research Institute at RF Village - RFV
DEFCON Demonstrations and Presentations by Open Research Institute at RF Village - RFV
DEFCON Demonstrations and Presentations by Open Research Institute at RF Village - RFV
Defeating Moving Elements in High Security Keys - DC
Defensive 5G - DL
DEI in Cybersecurity (Breaking through the barrier, behind the barrier... behind the barrier) - BICV
Denial, Deception, and Drinks with Mitre Engage - SOC
Departmenf of Defense 5G Telemedicine and Medical Training: The Future of Healthcare the Remote Warrior - BHV
Describing Maritime Cyber work roles Using the NICE Framework - ICSV
Detecting the "Fake News" Before It Was Even Written, Media Literacy, and Flattening the Curve of the COVID-19 Infodemic - MIV
DFIR Against the Digital Darkness: An Intro to Forensicating Evil - WS
Dig Dug: The Lost Art of Network Tunneling - WS
Digging into Xiaomi’s TEE to get to Chinese money - DC
Digital Forensics and Voting Machines - VMV
Digital Skeleton Keys - We’ve got a bone to pick with offline Access Control Systems - DC
Dip Your Toes in Infrastructure Testing: A Hands on Workshop Focusing on the Things CTF's Don't Teach - RTV
DIY Medicine With Unusual Uses for Existing FDA-Approved Drugs - BHV
DIY Restraint Breaking - ROV
Do Not Trust the ASA, Trojans! - DC
Doing the Impossible: How I Found Mainframe Buffer Overflows - DC
Dominion ImageCast X CVEs and reflections on CVD for election systems - VMV
Don't Blow A Fuse: Some Truths about Fusion Centres - SKY
Don’t be trusted: Active Directory trust attacks - AVV
Doors, Cameras, and Mantraps. Oh, my! - LPV
Down The Rabbit Hole: 10 Lessons Learned from a Year in the Trenches - AVV
Dozier Drill Tournament - LPV
Drag us to Wonder Bad: a tale of how to be good people by capturing credentials and 2FA - AVV
Dragon Tails: Supply-side Security and International Vulnerability Disclosure Law - DC
Drone Hack - IOTV
Drone Hack - IOTV
Drone Hack - IOTV
Drones and Civil Liberties - ASV
EDR detection mechanisms and bypass techniques with EDRSandBlast - DL
Edutainment: A gateway into the field of Cybersecurity & Online safety for girls. - GHV
EFF Tech Trivia - CON
EFF: Reproductive Justice in the Age of Surveillance - SOC
Election Cyber Security in the National Guard - VMV
Election Forensics - VMV
Election Security Bridge Building - PLV
ElectroVolt: Pwning popular desktop apps while uncovering new attack surface on Electron - DC
Elevators 101 - PSV
Elevators 101 - PSV
EMBA - Open-Source Firmware Security Testing - DL
Emerging Technical Cyber Policy Topics - PLV
Emoji Shellcoding: 🛠️, 🧌, and 🤯 - DC
Empire 4.0 and Beyond - DL
emulation-driven reverse-engineering for finding vulns - DC
Eradicating Disease With BioTerrorism - SKY
Ethical considerations in using digital footprints for verifying identities for online services - RHV
Ethics, morality & the law - SEV
Evading Detection: A Beginner's Guide to Obfuscation - WS
Even my Dad is a Threat Modeler! - BTV
Examining the urgency of gendered health misinformation online through three case studies - MIV
Exotic data exfiltration - AVV
Exploitation in the era of formal verification: a peek at a new frontier with AdaCore/SPARK - DC
Exploiting 802.11n Narrow Channel Bandwidth Implementation in UAV - RFV
Exploits and Dragons - DCGVR
Exploring Ancient Ruins to Find Modern Bugs: Discovering a 0-Day in an MS-RPC Service - DC
Exploring Fruadsters Persuasion Strategies on Employment Databases - GHV
Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS. - DC
Exploring Unprecedented Avenues for Data Harvesting in the Metaverse - CPV
Exposing aberrant network behaviors within ICS environments using a Raspberry Pi - ICSV
Faking Positive COVID Tests - BHV
False Dealing - ROV
Fantom5 SeaTF CTF - ICSV
Fantom5 SeaTF CTF - ICSV
Fantom5 SeaTF CTF - ICSV
FARA and DOJ’s Approach to Disinformation - MIV
Final Boarding Call for Cyber Policy Airlines Flight 443 - ASV
Finding Crypto: Inventorying Cryptographic Operations - CPV
Finding Hidden Gems In Temporary Mail Services - RCV
Finding Security Vulnerabilities Through Fuzzing - WS
Fireside Chat - MIV
Fireside Chat - MIV
Fireside Policy Chats - PLV
Fireside Policy Chats - PLV
Fireside Policy Chats - PLV
Fireside Policy Chats - PLV
First Year in Cyber - GHV
FISSURE: The RF Framework - DL
Flying Under Cloud Cover: Built-in Blind Spots in Cloud Security - CLV
Forcible Entry 101 - PSV
Forgery & Document Replication - ROV
Formalizing Security Assessment for Uncrewed Aerial Systems - ASV
FOX STEED: Analysis of a Social Media Identity Laundering Campaign - RCV
Free Amateur Radio License Exams - HRV
Free Amateur Radio License Exams - HRV
Free Amateur Radio License Exams - HRV
Friends of Bill W - SOC
Friends of Bill W - SOC
Friends of Bill W - SOC
Friends of Bill W - SOC
Friends of Bill W - SOC
Friends of Bill W - SOC
Friends of Bill W - SOC
FROM ZERO TO HERO IN A BLOCKCHAIN SECURITY - WS
From Zero To Sao … Or, How Far Does This Rabbit Hole Go? - HHV
Fun with bookmarks: From someone who spends way too much time on Twitter - DCGVR
Generative Art Tutorial - AIV
Geo-Targeting Live Tweets - SKY
Getting naughty on CAN bus with CHV Badge - CHV
Getting on the air: My experiences with Ham radio QRP - HRV
Getting started with Meshtastic - RFV
Ghost Guns: Rapidly acquiring, constructing or improvising firearms - SKY
Gird your loins: premise and perils of biomanufacturing - BHV
Girls Hack Village 90’s House Party - SOC
Girls Hack Village Introduction - GHV
Girls Hack Village Meetup: Shoot Your Shot Networking Event - SOC
Glitched on Earth by humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal - DC
Glitter nail polish vs the Evil Maid, the Story - Spoiler: The maid wins. - DCGVR
Global Challenges, Global Approaches in Cyber Policy - DC
GOTHCON (#DCGOTHCON) - SOC
Grover's Search - a worked example - QTV
Hack Fortress - CON
Hack Fortress - CON
Hack the Airfield with DDS - ASV
Hack the Airfield with DDS - ASV
Hack the Airfield with DDS - ASV
Hack the Airport with Intelligenesis - ASV
Hack the Airport with Intelligenesis - ASV
Hack the Airport with Intelligenesis - ASV
HACK THE HEMISPHERE! How we (legally) broadcasted hacker content to all of North America using an end-of-life geostationary satellite, and how you can set up your own broadcast too! - DC
Hack the Plan[e]t CTF - ICSV
Hack the Plan[e]t CTF - ICSV
Hack the Plan[e]t CTF - ICSV
Hack-A-Sat Aerospace PiSat Challenge - ASV
Hack-A-Sat Aerospace PiSat Challenge - ASV
Hack-A-Sat Digital Twin Workshop - ASV
Hack-A-Sat Digital Twin Workshop - ASV
Hack-A-Sat Digital Twin Workshop - ASV
Hack-A-Sat Team - ASV
Hack3r Runw@y  - CON
Hack3r Runw@y  - CON
Hackable Book Signing - IOTV
Hacked by Raspberia: Simulating a nationally disruptive attack by a non-existent state actor - AVV
Hacker Flairgrounds - SOC
Hacker Jeopardy - SOC
Hacker Jeopardy - SOC
Hacker Karaoke - SOC
Hacker Karaoke - SOC
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
HackerOps - RTV
Hackers Help Make My Airline Secure - ASV
Hacking & Defending Blockchain Applications - APV
Hacking 8+ million websites - Ethical dilemmas when bug hunting and why they matter - APV
Hacking APIs: How to break the chains of the web - RTV
Hacking APIs: How to break the chains of the web - RTV
Hacking APIs: How to break the chains of the web - RTV
Hacking Aviation Policy - PLV
Hacking Diversity - GHV
Hacking Ham Radio: Dropping Shells at 1200 Baud - HRV
Hacking Hashcat - PWV
Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE) - DC
Hacking law is for hackers - how recent changes to CFAA, DMCA, and global policies affect security research - PLV
Hacking Operational Collaboration - PLV
Hacking Product Security Interviews - IOTV
Hacking Product Security Interviews - IOTV
Hacking The Farm: Breaking Badly Into Agricultural Devices. - DC
Hacking the Metal 2: Hardware and the Evolution of C Creatures - WS
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hacking WebApps with WebSploit Labs - RTV
Hallway Monitor Party - Entertainment - SOC
Hallway Monitor Party - Entertainment - SOC
Hallway Monitor Party - Entertainment - SOC
Ham Nets 101 - HRV
Ham Radio is not just for Dinosaurs, Why hackers need an amateur radio license - DCGVR
Hand On Mainframe Buffer Overflows - RCE Edition - WS
Handcuffs and how they work - LPV
Hands on hacking labs - IOTV
Hands on hacking labs - IOTV
Hands on hacking labs - IOTV
Hands on Hardware Hacking – eMMC to Root - IOTV
Hands on Hardware Hacking – eMMC to Root - IOTV
Hands on Hardware Hacking – eMMC to Root - IOTV
Hands-on Hacking of Reinforcement Learning Systems - AIV
Hands-On TCP/IP Deep Dive with Wireshark - How this stuff really works - WS
Hands-on threat modeling - APV
HardWired - PHV
HardWired - PHV
HardWired - PHV
Have a Software Defined Radio? - Design and make your own antennas - RFV
Healthcare Policy != Policy - BHV
Heavyweights: Threat Hunting at Scale - BTV
Helpful Principles in Adversarial Operations - AVV
Heroes vs Villians, a SEC Youth Challenge - SEV
Heroes vs Villians, a SEC Youth Challenge - SEV
Heroes vs Villians, a SEC Youth Challenge - SEV
Hidden Payloads in Cyber Security - GHV
Hide and Seek: Why do you need OpSec? - GHV
History of Russian Cyber & Information Warfare (2007-Present) - MIV
History of the weaponization of social media - MIV
hls4ml - Open Source Machine Learning Accelerators on FPGAs - DL
Honey Pot Workshop - PHV
Honey Pot Workshop - PHV
Honey Pot Workshop - PHV
Horusec - Brazilian SAST help World - BTV
Hospital Under Siege - CON
Hospital Under Siege - CON
Hospital Under Siege - CON
House of Heap Exploitation - WS
How a weirdly shaped piece of metal pulls cat memes out of thin air - RFV
How getting a free phone got me to report critical vulns affecting millions of Android devices - DCGVR
How long do hard drives and SSDs live, and what can they tell us along the way? - DDV
How Most Internal Networks are Compromised: A Set of Common Active Directory Attacks and How to Perform Them from Linux - RTV
How Most Internal Networks are Compromised: A Set of Common Active Directory Attacks and How to Perform Them from Linux - RTV
How Most Internal Networks are Compromised: A Set of Common Active Directory Attacks and How to Perform Them from Linux - RTV
How Most Internal Networks are Compromised: A Set of Common Active Directory Attacks and How to Perform Them from Linux - RTV
How my High School Creative Writing Class Helped Me Become a Better Incident Responder - DCGVR
How Russia is trying to block Tor - DC
How to be the Best Adversary Simulator - AVV
How to Build DIY Lifesaving Medical Devices - BHV
How to do Cloud Security assessments like a pro in only #4Steps - CLV
How to find 0-days in your “memory safe” stack? - APV
How To Get MUMPS Thirty Years Later (or, Hacking The Government via FOIA'd Code) - DC
How to have an extraterrestrial conversation. Active METI Principles and Hackathon! - BHV
How to Leverage MDS2 Data for Medical Device Security - BHV
How to Respond to Data Subject Access Requests - CPV
How to Start and Run a Group - DCGVR
How to stop Surveillance Captalism in Healthcare - BHV
Human Chip Implants - RHV
Human Chip Implants - RHV
Hundreds of incidents, what can we share? - SKY
Hunting Bugs in The Tropics - DC
Hunting for Spacecraft Zero Days Using Digital Twins - ASV
Hunting Malicious Office Macros - BTV
Hybrid Phishing Payloads: From Threat-actors to You - WS
I know what you ate last summer - RHV
I’m not Keylogging you! Just some benign data collection for User Behavior Modeling - AIV
ICS Village Charity BBQ - ICSV
ID theft insurance - The Emperor’s new clothes? - CPV
Imagining a cyber policy crisis: Storytelling and Simulation for real-world risks - PLV
Implementing E2E multi-client communication (for fun, work or profit) - what could go wrong? - APV
Imposter Syndrome- The Silent Killer of Motivation - GHV
Improving International Vulnerability Disclosure: Why the US and Allies Have to Get Serious - PLV
Improving security posture of MacOS and Linux with Azure AD - BTV
Industry 4.0 and the MTS of the Future – Convergence, Challenges and Opportunities [[MARITIME]] - ICSV
Information Confrontation 2022 - A loud war and a quiet enemy - MIV
Information Confrontation 2022 – A loud war and a quiet enemy - RCV
Information Operations - VMV
Injectyll-Hide: Build-Your-Own Hardware Implants - HHV
Injectyll-HIDe: Pushing the Future of Hardware Implants to the Next Level - DL
Integrating mileage clocking and other hacking equipment into a vehicle simulator rig - CHV
Internal Server Error: Exploiting Inter-Process Communication with new desynchronization primitives - DC
International Government Action Against Ransomware - PLV
INTERNET WARS 2022: These wars aren't just virtual - SKY
Intro guide to keyfob hacking - RFV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Introducing the Abusability Testing Framework (V1) - CPV
Introduction to Aircraft Networks and Security Design Considerations - ASV
Introduction to Azure Security - WS
Introduction to Cryptographic Attacks - WS
Introduction to IOS Reverse Engineering with Frida - GHV
Introduction to Software Defined Radios and RF Hacking - WS
IoT Village CTF (the CTF formally known as SOHOplessly Broken) - CON
IoT Village CTF (the CTF formally known as SOHOplessly Broken) - CON
IoT Village CTF (the CTF formally known as SOHOplessly Broken) - CON
IoT Village CTF Challenges - IOTV
IoT Village CTF Challenges - IOTV
IoT Village CTF Challenges - IOTV
IoT Village CTF Creator's Contest - CON
Jailed By a Google Search Part 2: Abortion Surveillance in Post-Roe America - CPV
Juicing & Marking Cards - ROV
Keeping Beer Cold: Attackers, ICS and Cross-Sector Defense - ICSV
Keeping Your Distance: Pwning  RFID Physical Access Controls From 6FT and Beyond - RFV
Keynote - DCGVR
Killer Hertz - DC
KQL Kung Fu: Finding the Needle in the Haystack in Your Azure Environments - CLV
Kubernetes Capture The Flag - CON
Kubernetes Capture The Flag - CON
Last chance to pick up drives at the DDV - DDV
Latest and Greatest in Incident Response - BTV
LATMA - Lateral movement analyzer - AIV
Lawyers Meet - SOC
Layer 7 matters at Layers 2/3 : Appsec on Network Infrastructure - APV
Leading the Way - GHV
Leak The Planet: Veritatem cognoscere non pereat mundus - DC
Learn at Tamper-Evident Village - TEV
Learn at Tamper-Evident Village - TEV
Learn at Tamper-Evident Village - TEV
Learn The Game, Play The Game, Change the Game - GHV
Lend me your IR's! - BTV
Less SmartScreen More Caffeine – ClickOnce (Ab)Use for Trusted Code Execution - DC
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS - DC
Linux Threat Detection with Attack Range - AVV
Linux Trainer - PHV
Linux Trainer - PHV
Linux Trainer - PHV
Literal Self-Pwning: Why Patients - and Their Advocates - Should Be Encouraged to Hack, Improve, and Mod Med Tech - DC
Lost and Found Department Open (Generally) - DC
Lost and Found Department Open (Generally) - DC
Lost and Found Department Open (Generally) - DC
Low Code High Risk: Enterprise Domination via Low Code Abuse - DC
LSASS Shtinkering: Abusing Windows Error Reporting to Dump LSASS - DC
Machine Learning Security Evasion Competition Launch - AIV
Making the most of Microsoft cloud bug bounty programs: How I made in $65,000 USD in bounties in 2021 - CLV
Making Your SOC Suck Less - BTV
Malicious memory techniques on Windows and how to spot them - BTV
Malware Emulation Attack Graphs - AVV
Malware Hunting - Discovering techniques in PDF malicious - BTV
Maritime Hacking Boundary Adventure - ICSV
Maritime Hacking Boundary Adventure - ICSV
Mass Disinformation Operations - How to detect and assess Ops with OSINT & SOCMINT tools and techniques - MIV
Master Class: Delivering a New Construct in Advanced Volatile Memory Analysis for Fun and Profit - WS
Master of Puppets: How to tamper the EDR? - AVV
Medeco cam lock exploit "an old attack made new again" - LPV
Medical Device Hacking: A hands on introduction - BHV
Meet Lucy - QTV
Meet the Digital Lab at Consumer Reports - SOC
Meet the EFF - SOC
Meet the Feds: CISA Edition (Lounge) - PLV
Meet the Feds: DHS Edition (Lounge) - PLV
Memento Vivere: A connected light installation on cerebral (dys)function - BHV
Memfini - A systemwide memory monitor interface for linux - DL
Memorial Room Open - DC
Memorial Room Open - DC
Memorial Room Open - DC
Merch (formerly swag) Area Open -- README - DC
Merch (formerly swag) Area Open -- README - DC
Merch (formerly swag) Area Open -- README - DC
Mercury - DL
Metal and Fire... Copying Keys via Mold and Cast Tactics - LPV
Mitigating vulnerabilities in two-factor authentication in preventing account takeover - RHV
Modern techniques used by Advanced Persistent Threat actors for discovering 0-day vulnerabilities - AVV
Movie Night Double Feature - Arrival & Real Genius - SOC
Movie Night Double Feature - The Conversation & The 13th Floor - SOC
Movie-Style Hardware Hacking - HHV
Moving Regulation Upstream - An Increasing focus on the Role of Digital Service Providers - PLV
Multi-Stakeholder Online Harm Threat Analysis - MIV
My First Hack Was in 1958 (Then A Career in Rock’n’Roll Taught Me About Security) - DC
Natural Disasters and International Supply Chains: Biomedical and Pharmaceutical Review - BHV
Navigating the High Seas When Dealing with Cybersecurity Attack - ICSV
Near and Far: Securing On and Off Planet Networks at JPL - ASV
Network Hacking 101 - WS
NetworkOS Workshop - PHV
NetworkOS Workshop - PHV
NetworkOS Workshop - PHV
Neurodiversity in Cybersecurity: Find Your Competitive Advantage! - BICV
New Frontiers in GitHub Secret Snatching - RCV
Night of the Ninjas - Entertainment - SOC
Nimbly Navigating a Nimiety of Nimplants: Writing Nim Malware Like The Cool Kids - AVV
No bricks without clay - Data Fusion and Duplication in Cybersecurity - DDV
No Code Security Review - What should I review in applications without code? - APV
No-Code Malware: Windows 11 At Your Service - DC
Not All Who Wander Are Lost: Using OSINT for a Fulfilling Travel Experience - RCV
Not Feeling Yourself: User Spoofing and Other Disinformation Exploits - MIV
NPM, “Private” Repos, and You - RCV
OAuth-some Security Tricks: Yet more OAuth abuse - CLV
Obsidian CTH Live: Killchain 1 Walkthrough - BTV
Obsidian CTH Live: Killchain 3 Walkthrough - BTV
Obsidian CTH: Go Phish: Visualizing Basic Malice - BTV
Obsidian CTH: Hunting for Adversary's Schedule - BTV
Obsidian CTH: Sniffing Compromise: Hunting for Bloodhound - BTV
Obsidian CTH: The Logs are Gone? - BTV
Obsidian CTI: Generating Threat Intelligence from an Incident - BTV
Obsidian CTI: Operationalizing Threat Intelligence - BTV
Obsidian Forensics: Creating a custom Velociraptor collector - BTV
Obsidian Forensics: Kill Chain 1 Endpoint Forensics Walkthrough - BTV
Obsidian Forensics: Kill Chain 3 Endpoint Forensics Walkthrough - BTV
Obsidian Forensics: KillChain1 - Adventures in Splunk and Security Onion - BTV
Obsidian Forensics: KillChain3 - Continued Adventures in Splunk and Security Onion - BTV
Obsidian Forensics: The Importance of Sysmon for Investigations - BTV
Obsidian Forensics: Using Chainsaw to Identify Malicious Activity - BTV
Obsidian Live: Eating the Elephant 1 byte at a Time - BTV
Obsidian Live: May We Have the OODA Loops? - BTV
Obsidian REM: Long Walks On The Beach: Analyzing Collected PowerShells - BTV
Obsidian REM: Phishing In The Morning: An Abundance of Samples! - BTV
Obsidian: IR - Final Reporting Made Exciting* - BTV
Obsidian: IR - It all starts here, scoping the incident - BTV
Obsidian: IR - Mise En Place for Investigations - BTV
Obsidian: IR - OODA! An hour in incident responder life - BTV
Octopus Game - Final 8 Phase - CON
Octopus Game - Individual Phase - CON
Octopus Game - On-site Sign-in (Mandatory) - CON
Octopus Game - Recruitment/Registration - CON
Off the grid - Supplying your own power - HRV
Offensive Application Security for Developers... - APV
Offensive Cyber Industry Roundtable - PLV
Ohm, how do I get into ICS? - ICSV
Old Malware, New tools: Ghidra and Commodore 64, why understanding old malicious software still matters - DC
Oli: A Simpler Pi-Star Replacement - HRV
ONCD Cybersecurity Strategy Workshop - PLV
Once More Unto the Breach: Federal Regulators' Response to Privacy Breaches and Consumer Harms - CPV
One Bootloader to Load Them All - DC
One Low, Two Informational: Why Your Pentest Findings are so Boring - APV
OopsSec -The bad, the worst and the ugly of APT’s operations security - DC
OPAQUE is Not Magic - CPV
Open Panel: War Driving Rig Makers Meetup - RFV
Open Source Zero Trust Security using Ory Keto - VMV
OpenCola. The AntiSocial Network - DC
Opening Remarks on the State of AI & Security  - AIV
OpenTDF - DL
Opportunity Fuels Grit - GHV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OSINT Skills Lab Challenge - RTV
OT:ICEFALL - Revisiting a decade of OT insecure-by-design practices - ICSV
Out of the Abyss: Surviving Vulnerability Management - BHV
Owned or pwned? No peekin' or tweakin'! - CPV
Packet Detective - PHV
Packet Detective - PHV
Packet Detective - PHV
Packet Inspector - PHV
Packet Inspector - PHV
Packet Inspector - PHV
Packet Sender - DL
Panel - "So It's your first DEF CON" - How to get the most out of DEF CON, What NOT to do. - DC
Panel - DEF CON Policy Dept - What is it, and what are we trying to do for hackers in the policy world? - DC
Panel: AI and Hiring Tech - AIV
Panel: Ask-a-ham - HRV
Pause…Push,Pass, Pivot - GHV
Payment Hacking Challenge - PYV
Payment Hacking Challenge - PYV
Payment Hacking Challenge - PYV
Payment Hacking Challenge - PYV
PCILeech and MemProcFS - DL
Pen Test Partner Power Hour - ASV
Pen Test Partners A320 Simulator - ASV
Pen Test Partners A320 Simulator - ASV
Pen Test Partners A320 Simulator - ASV
Pen Test Partners A320 Simulator - ASV
Pen Test Partners A320 Simulator - ASV
Pentesting Industrial Control Systems 101: Capture the Flag! - WS
Perimeter Breached! Hacking an Access Control System - DC
Phishing for Your Next Cyber Opportunity - GHV
Phishing with Empathy: Running Successful Phishing Campaigns without Making Enemies and Irritating People - SEV
Phishing With Phineas (Again) - Steroid Boosted Hack Recreation Workshop - RTV
Phonerator, an advanced *valid* phone number generator for your OSINT/SE needs - RCV
Phreaking 2.0 - Abusing Microsoft Teams Direct Routing - DC
Physical Security Bypasses - PSV
Physical Security Village - PSV
Physical Security Village - PSV
Physical Security Village - PSV
Picking Pockets, Picked Apart - ROV
Picking Pockets, Picked Apart - ROV
PII: The Privacy Zombie - CPV
Pilots and Hackers Meetup - SOC
Pivoting, Tunneling, and Redirection Master Class - WS
Please deposit 30c: A history of payphone locks that lead to one of the most secure locks ever made. - LPV
PMR - PT & VA Management & Reporting - DL
Positive Identification of Least Significant Bit Image Steganography - CPV
Power Flow 101 for hackers and analysts - ICSV
PQC in the Real World - QTV
Practical Dark Web Hunting using Automated Scripts - BTV
PreAuth RCE Chains on an MDM: KACE SMA - DC
Prizes announced for HHV Rube Goldberg Machine, Make Your Own Use Contest, and Bring the Other Half - HHV
Process injection: breaking all macOS security layers with a single vulnerability - DC
Project Obsidian: Panel Discussion - BTV
Protect Our Pentest Tools! Perks and Hurdles in Distributing Red Team Tools - PLV
Protect/hunt/respond with Fleet and osquery - WS
Prowler Open Source Cloud Security: A Deep Dive Workshop - CLV
PSA: Doorbell Cameras Have Mics, Too - CPV
Psychological Reverse Shells - SEV
pTFS Presents: Mayhem Industries - Outside the Box - CON
pTFS Presents: Mayhem Industries - Outside the Box - CON
pTFS Presents: Mayhem Industries - Outside the Box - CON
Pulling Passwords out of Configuration Manager: Practical Attacks against Microsoft's Endpoint Management Software - DC
Purple Teaming & Adversary Emulation in the Cloud with Stratus Red Team - CLV
Purple Teaming for Auditors and the Business - AVV
Pursuing Phone Privacy Protection [WORKSHOP] - CPV
Pwning Alarm Wires - PSV
Pwning Lazy Admins - DCGVR
Pwning RFID From 6ft Away - PSV
Pwning RFID From 6ft Away - PSV
Python vs Modern Defenses - AVV
QC 101 workshop - QTV
Qemuno – An uninvited guest - AVV
QML/QNLP workshop/showcase - QTV
Quantini Time - QTV
Quantum Hardware Hacking - QTV
Quantum Life: Burning Chrome Side Chat - QTV
Quantum Snake Oil? What Ailments Can It Cure? - ASV
Quantum Village Opening Ceremony - QTV
Queercon Mixer - SOC
Queercon Mixer - SOC
Queercon Mixer - SOC
Queercon Party - SOC
Quiet Recon: Gathering everything you need with LDAP and native AD services  - RTV
Quiet Recon: Gathering everything you need with LDAP and native AD services  - RTV
Radical inclusivity and intersectionality in the biohacking world - BHV
Radio Frequency Capture the Flag - CON
Ransomware ATT&CK and Defense - BTV
Red Alert ICS CTF - CON
Red Alert ICS CTF - CON
Red Alert ICS CTF - CON
Red Balloon Failsat Challenges - ASV
Red Balloon Failsat Challenges - ASV
Red Balloon Failsat Challenges - ASV
Red Team Village CTF Finals Part 2 - CON
Red Team Village CTF Qualifiers Part 1 - CON
Red Team Village CTF Qualifiers Part 1 - CON
Red Team Village CTF Qualifiers Part 2 - CON
Red Team Village Keynote Panel - RTV
Red Teaming the Open Source Software Supply Chain - PLV
Reflections on 9 Years of CPV - CPV
RegEx Trainer - PHV
RegEx Trainer - PHV
RegEx Trainer - PHV
Remote Exploitation of Honda Cars - CHV
Research and Cold Calls - SEV
Research and Deliverables on Utilizing an Academic Hub and Spoke Model to Create a National Network of ICS Institutes - ICSV
Research Calls - SEV
ResidueFree - DL
Resumé Review and Career Guidance Session - ASV
Resumé Review and Career Guidance Session - ASV
Return-Oriented Policy Making for Open Source and Software Security - PLV
Reversing An M32C Firmware – Lesson Learned From Playing With An Uncommon Architecture - HHV
Reversing the Original Xbox Live Protocols - DC
RF CTF Kick Off Day 1 - RFV
RF CTF Kick Off Day 2 - RFV
RF CTF Out-brief - RFV
RFCommotion - Invisible Serial Ports Flying Through the Air - CHV
RFID Hacking 101 - PSV
RFID Hacking 101 - PSV
RFID Hacking 101 - PSV
Right Hand, Meet Left Hand: The Cybersecurity Implications of Non-Cybersecurity Internet Regulation (Community Roundtable) - PLV
RingHopper – Hopping from User-space to God Mode - DC
Rip and tear - RFV
RoboSumo - HHV
Rock the Cash Box - RHV
Running Rootkits Like A Nation-State Hacker - DC
Running system tests with active authn/z - APV
S.O.S How Sharing Our Stories Will Save Cybersecurity - GHV
Safecracking for Everyone - LPV
Satellite Eavesdropping with DDS - ASV
Satellite Eavesdropping with DDS - ASV
Satellite Eavesdropping with DDS - ASV
Save The Environment (Variable): Hijacking Legitimate Applications with a Minimal Footprint - DC
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All - DC
Scanning your way into internal systems via URLScan - RCV
Secrets of an Advantage Player - ROV
Secure by Design - Facilities design cybersecurity - BHV
Securing and Standardizing Data Rights Requests with a Data Rights Protocol - CPV
Securing Industrial Control Systems from the core: PLC secure coding practices - WS
Securing Smart Contracts - WS
Securing the Future of Aviation CyberSecurity - ASV
Securing Web Apps - WS
Security at Every Step: The TL;DR on Securing Your AWS Code Pipeline - CLV
Security Concerns of the Medical Laboratory - DCGVR
Security like the 80's: How I stole your RF - CHV
Security Misconfigurations in the Cloud - "Oh Look, something fluffy, poke, poke, poke" - CLV
Self No-Fly Area Designing for UAV - ASV
SharpSCCM - DL
Shopping for Vulnerabilities - How Cloud Service Provider Marketplaces can Help White and Black Hat Vulnerability Research - CLV
Sign of the Times: Exploiting Poor Validation of AWS SNS SigningCertUrl - CLV
SimPPL: Simulating Social Networks and Disinformation - MIV
Smart Black Box Fuzzing of UDS CAN - CHV
So long, PBKDF2! The end of password-based key derivation - PWV
Social Engineering as a career panel - SEV
Social Engineering Community Village Mixer - SEV
Social Engineering the People you Love - SEV
Socially Engineering the Social Engineers: Understanding Phishing Threats by Engaging with Actors - SEV
Solana JIT: Lessons from fuzzing a smart-contract compiler - DC
Sonic scanning: when fast is not fast enough - RCV
Space Jam: Exploring Radio Frequency Attacks in Outer Space - DC
Space Station Sapians: Health is out of this world - BHV
Space ISAC: Protecting Our Space Assets - ASV
SpaceX & Starlink Satellite Internet - RFV
SpaceX & Starlink Satellite Internet - RFV
Spear Vishing / VoIP Poisoning - Maritime and Land - ICSV
SquarePhish - Phishing Office 365 using QR Codes and Oauth 2.0 Device Code Flow - CLV
Stalking Back - RCV
Start now or else! A perspective on transitioning organizations to PQC - QTV
Starting Threat Hunting with MITRE ATT&CK Framework - DCGVR
State of the Model - BICV
Staying Afloat in a Tsunami Of Security Inflormation - GHV
Stop worrying about Nation-States and Zero-Days; let's fix things that have been known for years! - ICSV
STrace - A DTrace on windows reimplementation. - DC
Surviving and Designing for Survivors - CPV
svachal + machinescli - DL
Take Your Security Skills From Good to Better to Best! - BTV
Taking a Dump In The Cloud - DC
Taking Down the Grid - SKY
Taking MITRE ATT&CK for ICS to Sea - ICSV
Tales from the trenches - why organizations struggle to get even the basics of OT asset visibility & detection right. - ICSV
TBD - GHV
Tear Down this Zywall: Breaking Open Zyxel Encrypted Firmware - DC
That's No Moon -- A Look at the Space Threat Environment - ASV
The "Why" of Lock Picking - LPV
The aftermath of a social engineering pentest. - Are we being ethically responsible?” - SEV
The Art of Modern Malware Analysis: Initial Infection Malware, Infrastructure, and C2 Frameworks - WS
The Big Rick: How I Rickrolled My High School District and Got Away With It - DC
The Bug Hunters Methodology – Application Analysis Edition v1.5 - RCV
The Call is Coming From Inside The Cluster: Mistakes that Lead to Whole Cluster Pwnership - DC
The Chaos of Coding with Language Models - AIV
The COW (Container On Windows) Who Escaped the Silo - DC
The CSRF Resurrections! Starring the Unholy Trinity: Service Worker of PWA, SameSite of HTTP Cookie, and Fetch - DC
The Dark Tangent & Mkfactor - Welcome to DEF CON & The Making of the DEF CON Badge - DC
The deadly state of surveillance capitalism in healthcare - CPV
The DFIR Report Homecoming Parade Panel - BTV
The Emerging Space - Cyber Warfare Theatre - ASV
The Evil PLC Attack: Weaponizing PLCs - DC
The Exploding Wireless Attack Surface: Policy considerations for a rapidly changing electromagnetic spectrum environment - PLV
The Future of Collecting Data from the Past: OSINT Now and Beyond - RCV
The GACWR Story: Building a Black Owned Cyber Range - BICV
The Geopolitical Implications of the Escalation and Weaponization of GPS and AIS Spoofing [[MARITIME]] - ICSV
The Gold Bug – Crypto and Privacy Village Puzzle - CON
The Gold Bug – Crypto and Privacy Village Puzzle - CON
The hitchhacker’s guide to iPhone Lightning & JTAG hacking - DC
The hybrid strategies of autocratic states: narrative characteristics of disinformation campaigns in relation to issues of a scientific-health nature - MIV
The Internet’s role in sanctions enforcement: Russia/Ukraine and the future - DC
The Journey From an Isolated Container to Cluster Admin in Service Fabric - DC
The Last Log4Shell Talk You Need - BICV
The least secure biometric lock on Earth? - LPV
The least secure biometric lock on Earth - PSV
The Log4J Rollercoaster - from an incident response perspective - APV
The Multiverse of Madness: Navigating the 50-State Approach to Privacy and Security - CPV
The PACMAN Attack: Breaking PAC on the Apple M1 with Hardware Attacks - DC
The Perfect Storm: Deception, Manipulation, and Obfuscation on the High Seas - ICSV
The Purple Malware Development Approach - WS
The Quantum Tech Showcase: From QKD to QRNG Demo - QTV
The Richest Phisherman in Colombia - SKY
The Richest Phisherman in Colombia - RCV
The Right Way To Do Wrong: Physical security secrets of criminals and professionals alike - LPV
The Schemaverse Championship - Practice Round - CON
The Schemaverse Championship - CON
The Simple, Yet Lethal, Anatomy of a Software Supply Chain Attack - APV
The State of Election Security Training - VMV
The Television News Visual Explorer: Cataloging Visual Narratives & Lending Context - MIV
The USCG's Maritime Cybersecurity Strategy [[maritime]] - ICSV
The Use of AI/ML in Offensive Security Operations - AIV
The Way of The Adversary - AVV
TheAllCommander - DL
Thinking About Election Security: Annual Debrief (Community Roundtable) - PLV
This one time, at this Hospital, I got Ransomware - SKY
Threat Hunt Trilogy: A Beast in the Shadow! - BTV
Threat hunting? Ain’t nobody got time for that... - BICV
Three Time's a Charm: Our Experience at the Public Hacking Trials of the Brazilian Election Systems - VMV
Thrice Is Nice: Evaluating the Ukrainian Power Events from BlackEnergy to Industroyer2 - ICSV
Thursday Opening Party - Entertainment - SOC
Tools for Fighting Disinformation - MIV
Tor: Darknet Opsec By a Veteran Darknet Vendor & the Hackers Mentality - DC
Toto, I’ve a feeling we’re not on a VPN anymore - CPV
Toxic BBQ - SOC
Trace Labs OSINT Search Party CTF - Announce CTF Grand Prize Winners - CON
Trace Labs OSINT Search Party CTF - CTF Platform Open for Submissions - CON
Trace Labs OSINT Search Party CTF - Sign-ups - CON
Trace me if you can: Bypassing Linux Syscall Tracing - DC
Tracking Military Ghost Helicopters over our Nation's Capital - DC
Tracking Scams and Disinformation by Hacking Link Shorteners - MIV
Trailer Shouting: Talking PLC4TRUCKS Remotely with an SDR - DC
Truly Maligned: How Disinformation Targets Minority Communities to Create Voter Suppression - VMV
Truthsayer: Make a remote lie detector and become irresistible on Zoom calls - SEV
UFOs, Alien Life, and the Least Untruthful Things I Can Say. - DC
unblob - towards efficient firmware extraction - DL
Uncovering multi-platform misinformation campaigns with Information Tracer - MIV
Understanding AIS Protocols and the GRACE Console [[Maritime]] - ICSV
Understanding CAN Bus and the GRACE Console [[Maritime]] - ICSV
Understanding Modbus TCP and the GRACE Console [[Maritime]] - ICSV
Understanding, Abusing and Monitoring AWS AppStream 2.0 - CLV
United We Stand - VMV
us-east-1 Shuffle: Lateral Movement and other Creative Steps Attackers Take in AWS Cloud Environments and how to detect them - CLV
Uwb Security Primer: Rise Of A Dusty Protocol - HHV
Vajra - Your Weapon To Cloud - DL
Vendor Area Open - DC
Vendor Area Open - DC
Vendor Area Open - DC
Verbal Steganography Re-Loaded - ROV
VETCON - SOC
Village Areas Open (Generally) - DC
Village Areas Open (Generally) - DC
Village Areas Open (Generally) - DC
Vishing Competition (SECVC) - LIVE CALLS - SEV
Vishing Competition (SECVC) - LIVE CALLS - SEV
Vishing Competition (SECVC) - LIVE CALLS - SEV
Vishing Competition (SECVC) - LIVE CALLS - SEV
Voldrakus: Using Consent String Steganography to Exfiltrate Browser Fingerprinting Data - CPV
Voter Targeting, Location Data, and You - SKY
Vulnerability Assessment of a Satellite Simulator - ASV
Wakanda Land - DL
Walk This Way: What Run D.M.C. and Aerosmith Can Teach Us About the Future of Cybersecurity - DC
Wall of Sheep - PHV
Wall of Sheep - PHV
Wall of Sheep - PHV
Wardriving 101 - or How I Learned to Stop Worrying and Love Bad Fuel Economy and High Gas Prices - RFV
WarTime AppSec - APV
We Promise Not to Brick It... But If We Do... - ICSV
Weaponizing Windows Syscalls as Modern, 32-bit Shellcode - DC
Weather Proofing GCP Defaults - CLV
Web Monetization: A privacy-preserving and open way to earn from Content - MIV
Web Shell Hunting - BTV
Welcome and Introduction - AVV
What is the Info Sec Color Wheel? - GHV
What your stolen identity did on its CoViD vacation - SKY
When (Fire)Fox Gets Angry! A Web Browser for Red Teamers - DCGVR
When The "IT" Hits The Fan, Stick To the Plan - BICV
When you're too competitive for your own good - RFV
Where there's a kiosk, there's an escape - BHV
Who Contains the “Serverless” Containers? - CLV
Who doesn’t like a little Spice? Emulation Maturity, Team Culture and TTPs - AVV
Whose Slide Is It Anyway? (WSIIA) - SOC
Why aren’t you automating? - ICSV
Why did you lose the last PS5 restock to a bot Top-performing app-hackers business modules, architecture, and techniques - DC
Why Organizations Must Consider Crypto Agility - QTV
Wind Energy Cybersecurity: Novel Environments facing Increased Threats - ICSV
Windows Defence Evasion and Fortification Primitives - WS
WIPS/WIDS Evasion for Rogue Access Points - RFV
Wireless Keystroke Injection (WKI) via Bluetooth Low Energy (BLE) - DC
Workshop Overflow - ROV
Workshop: Intro to CTF - GHV
Workshop: Mobile Penetration Testing w Corellium - GHV
Workshop: Network Penetration Testing w HyperQube - GHV
Workshop: Protect the Pi - GHV
Xavier Memory Analysis Framework - DL
XR for Literally Everything, Everywhere, All at Once - BHV
XR Technology Has 99 Problems and Privacy is Several of Them (PRE-RECORDED) - CPV
YARA Rules to Rule them All - BTV
You Have One New Appwntment - Hacking Proprietary iCalendar Properties - DC
You’re <strike>Muted</strike>Rooted - DC
Your Amateur Radio License and You - HRV
Zero Trust - GHV
Zuthaka: A Command & Controls (C2s) integration framework - DL

DEF CON News




DEF CON 30 China Virtual Party!

Posted 8.11.22

DEF CON 30 china party image

Our hacker friends in China are having a VR party for DEF CON 30 with a big, beautiful virtual meeting space and media shared from the show. Big thanks to Baidu for putting that party together! The DEF CON spirit of discovery and community is a truly global thing and we’re grateful to all of you for making DEF CON what it is.

Join us for DEF CON 30 online!

Posted 8.11.22

DEF CON HDA logo image

The DEF CON Discord is open ( discord.gg/defcon ). You can hang out in virtual LineCon, try out the offerings of one of our hybrid villages and meet DEF CON family from around the world.

The DEF CON Groups have a VR hangout going on throughout DEF CON. Learn what DCGs across the globe are up to, maybe even find a group near you to join so you can keep that DEF CON vibe all year! The info you need to get involved is here: https://www.dcgvr.org/DEF_CON_Groups_AltspaceVR_-_Quick Guide_v1.6.pdf and you can join in on the fun with or without a VR headset. You can even watch the event live on Twitch: twitch.tv/defcon_groups .

Follow our YouTube channel ( DEFCONConference ) for video updates from DC30 all weekend. We’ve upped our content game this year and we’ll be sharing a bunch of interviews and contest content.

So even if you’re not onsite, you can still get some DEF CON into your 2022, and we’ll save you a place in LineCon for 2023.

HDA Infopack is Live!

Posted 8.4.22

DEF CON HDA logo image

Many thanks to @A_P_Delchi for the DEF CON 30 HDA Infopack ! This helpful guide for Hackers with Disabilities has venue maps, tips for traveling between venues and a concise explanation of DEF CON's HDA provisions. Let's look out for each other, and if you see a way we can improve our accessibility, let us know!

DEF CON Transparency Report Update

DEF CON transparency report image

In preparation for DEF CON 30, we’ve updated the transparency report on the DEF CON website. While you’re there, take a moment to re-familiarize yourself with the code of conduct . We don’t have a ton of rules, but we take the ones we have very seriously.

DEF CON 30 Speaking Schedule is Live!

DEF CON schedule web page image

‘Tis the season, hackerfolk. DEF CON is almost here and all four tracks of the main speaker schedule are live on the website! Visit the Schedule page to start your planning. Our valiant CFP Review Board has put together a strong list of presentations over a wide array of subjects. We’re sure you’ll find plenty of interest.

Feel free to tweet at us about the talks you want to see, and feel equally to free to get hyped. Less than a month now, people.

Floorplan Maps are Live, Room Block discount Ends Soon!

DEF CON dinging service bell image

The floorplan maps for DEF CON 30 have been added to the Venue page of the DC30 website. Take a peek and plot your course, it's just a few short weeks now.

The DEF CON 30 room rate discount closes July 15 - so book soon to take advantage of the price break! Our room block in Caesars is full, but many others still have price breaks available.

Book a Room for DEF CON 30 Here !

COVID Clarification for DEF CON 30

DEF CON Masked Jack logo image

Just so there’s no confusion, DEF CON 30 will require masks, same as last year. We thank everyone for keeping each other safe last year, and we can’t wait to get the gang together responsibly just a few short weeks from now.

Original DEF CON 30 Covid Policy post from May.

First Batch of DEF CON 30 speakers is Live!

DEF CON 30 computer pattern image

Friendly DEF CON 30 announcement - the first bunch of speakers are selected and available for your perusal on the DEF CON forums. Congrats to everyone already selected. Keep your eyes on this space for more selections!

DEF CON Training Site is Live!

DEF CON training whiteboard image

DEF CON Trainings registration is LIVE! Right after DEF CON 30, we're excited to offer these intensive 2 day classes with a certificate of completion. First come, first served so don't procrastinate.Class descriptions and reg information are at defcontrainings.myshopify.com .

Weekend Updates! CTF Quals news, and New SE Community Q&A Today!

nautilus institute tweet image

CTF News
CTF Quals are almost here (May 28 at 0000 UTC) and the CTF Chat on the DEF CON discord is already open!

From @NautilusCTF :
#defcon quals chat on the Defcon discord is open. Come visit us in #ctf-discussion-text to ask all the important questions, like “when is web?” and “this challenge is too hard unlock another one”

Time is short to get to the Nautilus Institute Website and register your team for CTF quals!



S E community promo image

SE Community Q&A Today!
Join Social Engineering Community Village cofounders @JC_SoCal and @sn0ww to talk all about what kind of events the Social Engineering Community has in store for DEF CON 30. They'll be live on Twitch answering your questions at 5pm EDT Friday the 27th at twitch.tv/se_community . See you there!

The Black and White Ball is Back!

Black and white ball promo image

A little announcement about DEF CON 30's Black and White Ball: the best-dressed entrants will get some to enter early and enjoy a few free drinks before we let everyone else in. So look sharp - more details to come.

DEF CON Movie Night: 3 Days of the Condor

3 days of the condor poster image

Join us Saturday the 21st at 8pm PDT for Sydney Pollack's 1975 spy thriller 'Three Days of the Condor'. Robert Redford plays a CIA researcher on the run and Ma Bell plays herself. We'll be hiding out in the DEF CON Discord (discord.gg/defcon) under the code name movie-night-text.

Check out Policy @ DEF CON!

DEF CON 30 policy image

Policy matters. The world has never been so connected, and mighty forces contend for the right to shape our digital lives. DEF CON believes the hacker community needs a voice in that process. To help people learn, connect and get involved with the leading edge of tech policy, we offer ‘ Policy @ DEF CON ’. We’ll have presentations, panels, and off-the-record evening lounges. Get yourself up to speed on the issues, connect with some of the players and maybe even get involved. The future is what we make it!

The DEF CON 30 Website is live!

DEF CON 30 website screen shot image

Good news, everyone! The DEF CON 30 official website is officially LIVE and DEF CON season is officially IN EFFECT. Bookmark it for a handy place to check out all of the DC30 infoz as they roll in. Check the calendar, jump into the forums, book a room - it’s all in one place.

Now that we’ve reached cruising altitude, you are free to shimmy excitedly around the cabin.

Let’s GoOOoo!

COVID Updates for DEF CON 30

DEF CON Masked Jack logo image

DEF CON 30 is getting closer, and that means we’re starting to get questions about Covid-19 protocols for the in-person event. Here’s the current state of play.

Some things have changed since DC29. The US has largely stopped checking vaccine status for entry to indoor events, owing at least partly to the knowledge that the vaccines serve more to prevent severe disease than to curtail transmission. COVID-19 testing is now mostly done privately with widely available at-home kits.

But most things haven’t changed. There are still new variants on the move. There are still spikes in transmission and hospitalization. Masks are still the most effective way to protect people in indoor events.

Barring a major change in the situation, we will not check proof of vaccination, but we will keep last year's mask requirement in place for DEF CON 30. Protecting the community is our first priority, and we want to make sure that everyone is as safe as we can make them. Everyone includes the healthy, the vulnerable and those who have immune compromised loved ones they need to protect.

Thank you for all you did to protect each other last year, and with your help we’ll do it again this year.

Training Coming to DEF CON 30, Call for Training is Open!

DEF CON Training logo image

The wait is over - we’re ready to announce the Call for Trainers!

This year we’re adding DEF CON Training – intensive, two-day courses of study aimed at building specific skills. In some cases, these courses will even carry a certification. The Trainings will be held August 15-16, the Monday and Tuesday after DEF CON.

We’re looking for unique, technical, and practical presentations from trainers with deep knowledge of their subject. If that’s you, we’re offering:

- 50/50 split of the gross income.
- Optional test where students demonstrate their skill for a certificate.

All the info you need to apply is on the Call for Training page. Get your applications in early – we look forward to seeing what you’ve got to share.

New Payment Option for DEF CON 30!

DEF CON 30 logo image

DEF CON is a cash-at-the-door kind of conference. Paying in cash helps protect your privacy, and search warrants can't vacuum up PII we don't collect. You will always be able to lay down US dollars in the reg line and collect your badge.

Still, the experience of DC29 taught us a few things. Some of our attendees work DEF CON into their business travel schedule, and the option to pre-reg with a credit card over the web made things much easier for them. Some of our attendees need to manage a group purchase, or want a more detailed receipt.

For everyone who fits into those categories, we’re happy to announce that we’re keeping the option of online registration. Starting Monday, March 28th, you’ll be able to use shop.defcon.org to buy your ticket and get your receipt. We hope the online option makes the process more streamlined for those who need it. We thank people for their patience and feedback as we navigate the changing landscape.

The price for DEF CON 30 is $360, with a processing fee of $9.66 added to online orders.

Fine print: Currently we cannot provide beachballs and pizza to the online purchasing experience. For that, you’re gonna need LineCon.

DEF CON Movie Night: Dark Star!

DEF CON Movie Night: Dark Star poster image

DEF CON Movie Night this Saturday will feature some more 70s sci-fi with John Carpenter’s ‘Dark Star’ from ’74. Join us 3-19 at 8pm PDT in the #defcon discord ( discord.gg/defcon ). We’ll be in the movie-night-text channel.

Villages for DEF CON 30!

DEF CON 30 villages update image

The list of DEF CON 30 villages on the Forums has been updated! Stop by to check out the full complement of village goodness we're offering this year. Comment, like, subscribe, volunteer to help out - but mostly get amped. #defcon30approaches.

Coming soon: Call for Training!

DEF CON 30 logo image

We’re excited to announce something new on the menu for DC 30 - DEF CON Training! We’re launching a lineup of intense two-day trainings taking place August 15-16 in the same venue, and we’re looking for trainers!

WHAT: DEF CON We’re seeking Trainers for two-day training sessions right after DEF CON 30.

WHEN: August 15-16, the Monday and Tuesday after DEF CON 30.

WHERE: Same location, the Caesars Forum.

WHY: For DEF CON attendees who love our free Workshop series but wish they could get an even deeper, more focused dive and maybe even a certificate. Like everything we do at DEF CON, we hope it will help to build and strengthen the hacker community and spread the kind of knowledge that makes the world more open and secure.

DEF CON Training will offer two-day paid training courses in the $1-$3k price range. We’re looking for unique, technical, and practical presentations from trainers with deep knowledge of their subject. If that’s you, we’re offering:

- 50/50 split of the gross income.
- Optional test where students demonstrate their skill for a certificate.

Interested? We will launch the Trainer submission form later this month! If you have questions, drop us a line at info@defcon.org.

The Dark Tangent

More DEF CON 30 Calls Opening!

DEF CON 30 logo image

Good news, everyone! We have more calls open for DEF CON 30!

Call for Parties and Meetups : your dreams of throwing an epic party at DEF CON 30 are within your reach! If you have a solid concept to wrap some next level festivities around, get at us. The best ideas will get space and support. Details here: Call for Parties

Call for Music : we’re gonna need some tunes. Lots of tunes. This call is for established acts and bedroom Beethovens alike. We’re looking for live performers, so if you’ve got the stuff that puts the dip in our hip and the glide in our stride, get to the Call for Music and let us know.

Call for Vendors : we’re always looking for new hacker gear and accessories to share with the community. Get your cool swag in front of a pretty savvy and curious audience by applying here at the Vendor Application

New Calls Open for DEF CON 30!

DEF CON 30 logo image

You know how you can tell it’s DEF CON season? The Calls. When you hear the distinctive warble of the DEF CON Content calls, you know what’s up. It’s like the first robin of spring, if robins were cooler and more hacker-focused.

Today we’re opening three more DEF CON 30 Calls:

Call for Papers
The big one. If you want to speak at DEF CON 30, it’s time to get your submission together. As always, we’re looking for fresh, technical content and the sooner you get it in, the better your chances. We can offer suggestions to help you get over the finish line, time permitting. Fortune favors the bold, so don’t delay.

Call for Workshops
The very popular workshop series is back for DEF CON 30. Some topics need a more time and involvement than a main-stage talk can offer. The workshops are an amazing way to share your in-depth, hands-on content with the DEF CON community.

Demo Labs
Get your open source project in front of the knowledgable, curious humans of DEF CON. Get valuable feedback, find accomplices and raise your project’s profile. We provide the floor space and the audience, you provide the timely submission.

The DEF CON machine is revving up, and DC30 will be here before you know it. Don’t miss your chance to get involved. The community is waiting to see what you’ve got to share.

A Warm Welcome to the Next CTF Organizer Team: Nautilus Institute!

DEF CON CTF Organizer Nautilus image

Big DEF CON 30 CTF update! Following several years of exemplary service by the Order of the Overflow, our world-famous Capture the Flag contest is under new management. The care and feeding of this year’s CTF is in the worthy and capable hands of the Nautilus Institute!

From Nautilus Institute:

Ahoy DEF CON and CTF communities!

We are the Nautilus Institute. We have been chosen, from a very respectable pool of applicants, to steer the DEF CON CTF ship starting in 2022. We are thankful for this honor, and hope to navigate straight and true no matter what waters lie ahead.

We’re a bit light on details, while we prepare for this year’s DEF CON CTF Qualifiers May 28-29, but we hope to flag you down with more information soon! Please follow us on twitter at https://twitter.com/Nautilus_CTF and keep a look out on our website at https://nautilus.institute .

Sea you soon,

@•̂≈


For the boldest and best prepared, glory awaits. Godspeed.

DEF CON Movie Night: Primer!

DEF CON movie night primer poster image

DEF CON movie night rolls on with ‘Primer’. Joins us on the DC discord Saturday 8pm PST for what has to be the most brainmelting time travel movie that could possibly be shot for $7000. Bring a cork board and a few different colors of yarn. We’ll be waiting for you in the movie-night-text channel.

DEF CON Movie Night: Tank Girl!

DEF CON movie night tank girl poster image

This week’s DEF CON movie night will feature the very weird ‘Tank Girl’ from 1995. Join us Saturday, 8pm PST in the movie-night-text channel of the DEF CON discord for a glimpse at what the apocalypse looked like from the more innocent viewpoint of the mid 90s. Bring your own water.

DEF CON New Year's Eve!

DEF CON New Year's Eve image

DEF CON is doing a small New Year's Eve event on the DEF CON discord. There will be several hangouts and contests to participate in. We’ll have music, a Kubernetes CTF, A Ham radio CTF, some Hacker Karaoke, movie watchalongs and more. We’ll have the full rundown on defcon.org and we’ll update in the NYE Forum threads. Join us in welcoming 2022 - can't wait to see you!

DEF CON 29 Transparency Report

DEF CON 29 Transparency Report image

The full DEF CON Transparency Report for DEF CON 29 is now available. Our deepest thanks to everyone who reported issues to us and also to the people on staff who tracked down and handled those issues. It's a community effort, and it's good to see the progress we're making.

DEF CON Ornament Now Available!

DEF CON 2021 ornament image

The holiday season is upon us - time to spruce up your place with some festive hacker accents. This is the only official DEF CON ornament . Accept no substitutes. Suitable for all celebrations and a welcome addition to any decor.

Enter the DEF CON 30 Artwork Contest!

DEF CON 30 THEME image

Now that the DEF CON 30 Theme is out there in the world, it’s time to go pencils up on the DEF CON Art Contest!

This year’s theme is ‘Hacker Homecoming’ , and you can read all about it on the DEF CON Forums. It’s a theme meant to celebrate our community’s much awaited reunion next August. It’s also meant to reference the 30th Anniversary we’re celebrating, which is a pretty big deal for a hacker conference.

So if you’ve got some art skills, you’ve got a luxurious 7+ months to get your take on the theme in to us. There’s so much time between now and the June 1 deadline that you could probably learn a brand new art style in which to make your submission. You can drop as many submissions to pictures@defcon.org as you want, so enter early and often.

### Theme:

We are looking for artwork that reflects a spirit of community and reunion. We’re looking for art that combines the 90’s hacker aesthetic of DEF CON’s history and our tribe’s 21st century future. We’re looking for your vision and vibes.

We hope you’ll take in the information in the style guide , but we hope that you’ll use that as a launching pad and not a set of limits. We want to see where you can take these ideas.

### Guidelines:

300 DPI. Convert type to outlines where applicable. Trust your instincts - we’re looking for genuine energy, not technical perfection. We want to share and amplify the artists in our community. If tlhat’s you, get your ideas down. If that’s not you yet, could it be? You’ve got a few months to find out.

Entries will be placed on the DEF CON Forums for voting, and there will be prizes. There will also be gratitude, and opportunities to inspire others with your special way of seeing the world. We can’t wait to see what you’ll make!

DEF CON 30 Theme: Hacker Homecoming

DEF CON 30 THEME image

This has been a crazy couple of years.

A global pandemic turned DEF CON 28 into DEF CON Safe Mode. Some easing of the restrictions and some strict attendance rules gave us a hybrid con for DC29. An improvement, to be sure, but something short of a full DEF CON experience.

We want DEF CON 30 to have the energy of a reunion. We’ll be back togeher in a brand spanking new venue. We’ll be thirty years old - an amazing milestone for a hacker conference under any circumstances. In honor of all that, we’re calling DEF CON 30 ‘Hacker Homecoming’.

The first reason is that it’s literally a return home. After two years of separation, we’re looking forward to having more of our family under one roof, under the Vegas late summer sun.

There’s also a North American tradition called ‘Homecoming’. Secondary schools and colleges invite luminary alums back for a big celebration of the school’s history and a toast to its future. We intend to do just that for DC30. We’ll have some surprise guests from DEF CON’s illustrious past on hand to talk about the amazing places their life has taken them since joining the DC Community. We’ll also be laying out some of the map forward from our 30th Anniversary.

So please join us in the Caesar’s Forums if you can, and on the Discord if you can’t. Maybe even pack a fancy outfit for the homecoming dance. It’s high time for a reunion.

Design Inspiration

This year’s theme is about celebrating the past and getting geeked about the future, so we’re looking for smooth integration of old school hacker stylee with future vibes.

We took the color palette inspiration from arguably the most iconic DEF CON image of all time: the rooftop photo from DEF CON 1.

The photo is amazing for any number of reasons, but the most important is that even though it screams early 90s hacker culture, it also shows some of the essence of what DEF CON is even in the 2020s. It’s still a gathering of extraordinary digital misfits going Voltron in the Vegas night.

The fonts were also selected to be like a homecoming celebration, with some reverence for the past, some excitement about the future. The past is represented by the very 90s CityPop and Geom and the future by the futristic minimalism of Open Sans.

Homework

As always, we’ll be sharing movies, books, music and other random media to get you in the right frame of mind for maximum DEF CON. This year we’re even giving you an extra few months to get through the syllabus. Watch the DEF CON site for additions to all the lists. Pencils UP!

Movies:
Sneakers
The Imitation Game
Zero Days

Books:
The Shockwave Rider
The Cuckoo’s Egg
Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground
The Cult of the Dead Cow

The DEF CON 30 Call for Contests and Events is OPEN!

DEF CON 30 CTF call for contest and events image

DEF CON 30 is going to be a big deal, and we’re full speed ahead on planning. If you’ve got a stellar idea for a contest, this is your moment. Take advantage of the early opening to turn your idea into a real DEF CON Experience. The extra lead time helps us work with you to get the best ideas across the finish line, but only if you take advantage and get your submissions in.

You can read the rules and requirements on the Call for Contests Page . You can check the DC29 Contest forum for an idea of what we’ve accepted in the past.

Let’s see what you’ve got percolating out there, DEF CON fam. Let’s take DC30 up a notch.

Happy Halloween from DEF CON

DEF CON halloween 2021 image

DEF CON 30: Open and Upcoming Calls

DEF CON 30 Calls image

The DEF CON 30 Call for Villages is already open! To see if your fave is already accepted, check out the Villages forum for DEF CON 30 ! Don't see what you want on the current list? Maybe that's your cue to submit a proposal !

For the truly ambitious, there is still a call open for the coveted title of CTF organizers ! Only a little over two weeks left to put in your proposal to be the future of DEF CON Capture the Flag!

On the horizon very soon will be the Call for Contests! Polish those proposals for new DEF CON contests now and be ready for the call!

We only turn 30 once. Let's do it big!

DEF CON 30 Call for Villages has Opened!

DEF CON 30 CTF call for villages image

DEF CON 30 may seem a long way off, but it’s never too soon to start planning. Especially for something as close to the heart of the DEF CON experience as Villages.

As always, we’re looking for new villages that will create welcoming, hands-on spaces for congoers to sharpen their skills, learn something new and maybe even find their newest obsession.

Space (both physical and metaphorical) is limited. Early submissions have increased chances of success. If the concept is strong but needs work, we can help but only if we have enough time.

You’ll want to famailiarize yourself with the requirements and submission guidelines at https://defcon.org/html/defcon-30/dc-30-cfv.html first. If you can meet the preconditions, and you have a stellar idea to propose, that’s the universe telling you it’s go time. Rise to meet your moment.

We can’t wait to see what’s on your mind.

CTF Call for Organizers is Officially Open!

DEF CON 30  CTF call for organizers image

The mighty and venerable Order of the Overflow is retiring from organizing the DEF CON CTF, and the torch must be passed. This means a rare opportunity for you, CTF enthusiasts.

Are you ready to create the next generation of elite CTF tournaments? Do you have the skill and creativity to elevate the game for the world’s best players? The drive to see your ideas through to completion? If this is you, it’s time for us to talk.

The lowdown is at https://defcon.org/html/links/dc-ctf-cfo.html . Get familiar, submit the CTF you want to see in the world. For the chosen, glory awaits.

Live Music from DEF CON 29 is Posted!

DEF CON 29 live music image

The live music from DEF CON 29 is now available on the DEF CON Media Server! Whether you missed the party in Vegas or you just need a gang of .flac bops for your earbuds, media.defcon.org has you covered.

Get some, shake your groove things and pass it on.

Car Hacking and Blue Team Village Talks from DEF CON 29!

DEF CON 29 video update talks image

More DEF CON 29 Village videos on the DEFCONConference YouTube channel - this time it's the Blue Team Village and The Car Hacking Village ! Please enjoy and share with everyone you think could gain from the information.

More Village Talks from DEF CON 29!

DEF CON 29 video update talks image

The Village talks deluge continues, with talks from IoT Village , Blacks in CyberSecurity Village , and Aerospace Village all ready to stream to your heart's content on YouTube! As always, enjoy and pass it on.

In-person Talks from DEF CON 29 Now Live on YouTube!

DEF CON 29 in-person talks image

The in-person talks from DEF CON 29 are now live on the DEF CON YouTube Channel! Time to catch up on some mighty fine panels and unique content you had to be in Vegas to see..UNTIL NOW!

Press Page Updated for DEF CON 29!

DEF CON 29 press roundup image

DEF CON 29 was about two weeks ago - thanks again to everyone who helped make a success of it both in person and online. We’ve updated the press page to include a bunch of later-breaking stories. Watch this space for a list of write ups!

Adversary Village Talks are Live!

DEF CON 29 logo image

More DEF CON 29 goodies for your enjoyment - the talks from Adversary Village are live on our YouTube channel ! Binge away - more Village goodness to come!

DEF CON 29 Contest results So Far!

DEF CON 29 logo image

Congratulations to everyone who participated in any of the DEF CON 29 contests. Getting in the ring is 90 percent of the magic, and we hope that everyone had fun, learned something and met cool new people.

The contest results we have so far have been posted, and we'll be updating the page as we get more in!

Thanks for a Great DEF CON 29!

DEF CON 29 logo image

The past few years have been crazy, but you can’t stop the signal, even with global cataclysm. We are so happy to be reunited with so many of our friends, both here in Las Vegas and in the virtual con space. It’s good to be together.

Thank you for your support through everything. Your unending enthusiasm sustains our work and the DEF CON community never disappoints. Thanks for following the stricter rules the pandemic made necessary. Thanks for being kind and patient with each other and with us as we navigate the swiftly changing landscape.

Next year is a big anniversary for DEF CON, and we’re already at work planning how to make the big 3-0 memorable. Here’s to next year reuniting even more of us.

In the meantime, keep in touch with us on the DEF CON Discord server. Join a local DC Group, or start one. Stay safe and healthy. DEF CON hearts you.

Interviews from DEF CON 29!

DEF CON 29 press roundup image

We’d like to shout out newly minted Photogoon Alex Chaveriat aka ‘Silk’ who spent his DEF CON 29 racing around the con floor finding cool projects to interview people about. If you follow the DC social media feeds you’ve probably seen some of his work this year. Thanks to everyone who gave him some time, and thanks to Alex for putting out so much quality stuff so quickly. Alex Chaveriat on YouTube

DEF CON 29 Press roundup!

DEF CON 29 press roundup image

We're on the last day of DEF CON 29, both in the virtual and physical worlds. There's so much going on it's easy to miss a few things. Here's a brief listing of some of the press coverage of our events this year.

AND!XOR’s DEF CON 29 Electronic Badge Is An Assembly Puzzle
Hackaday

Hands On: DEF CON 29 Badge Embraces The New Normal
Hackaday

Black Hat USA 2021 and DEF CON 29: What to expect from the security events
Tech Republic

Privacy Without Monopoly: DEFCON 29
EFF

We Have Questions for DEF CON's Puzzling Keynote Speaker, DHS Secretary Mayorkas
EFF

Hands-On: Whiskey Pirates DC29 Hardware Badge Blings With RISC-V
Hackaday

#DEFCON: Hacking RFID Attendance Systems with a Time Turner
infosecurity

#DEFCON: Why Social Media Security is Election Security
infosecurity

#DEFCON: A Bad eBook Can Take Over Your Kindle (or Worse)
infosecurity

#DEFCON: Ransomware Moves from Nuisance to Scourge
infosecurity

Black Hat USA 2021 & DefCon 29: Hybride IT-Security-Konferenzen starten in Kürze
Heise.de

The Cybersecurity 202: The year’s biggest cybersecurity conferences are back, but limited
The Washington Post

DEF CON 29 Badge Update (The Firmware Kind)!

DEF CON 29 badges image

In case you didn't know, you can head over to defcon.org/signal for a link to updated badge firmware and instructions! We hope you enjoy DEF CON 29, In-person, or from wherever you may be!

DEF CON 29 In-person Pre-Registration is Closed!

DEF CON 29 registration closed image

The DEF CON 29 pre-reg at shop.defcon.org is now closed. You can still get a badge with cash payment onsite while they last, and you can purchase the Human+ Discord role directly on our Discord ( discord.gg/defcon ) or at plus.defcon.org Thanks to everyone for supporting DEF CON this year, whether you’re attending virtually or here with us in Las Vegas. DEF CON ❤️ U. Tomorrow it begins!

Get the DEF CON 29 Soundtrack!

DEF CON 29 Soundtrack image

Get a head start on DEF CON 29 with this year’s Original Soundtrack! It’s waiting for you on the DEF CON media server right now. Like, right now. You have your assignment.

media.defcon.org/DEF CON 29/

Hackers with Disabilities Guide for DEF CON 29!

HDALogo image

Thanks to @A_P_Delchi and Hackers with Disabilities for creating this helpful accessibility guide to DC29 . Don’t hesitate to reach out if we can help maximize your DEF CON, either through goons or via social media.


Return to Index
© 1992-2022 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

DEF CON 30 FAQ


FREQUENTLY ASKED QUESTIONS


When & Where will DEF CON be?

Aug. 11-14, 2022 at Caesars Forum + Flamingo, Harrah's and Linq in Las Vegas!


Can I book my hotel in Las Vegas now – and how should I do that?

Yes, hotel reservations are being accepted. In order to help us fill our room block with our contracted hotels please book under the DEF CON group room registration.


What is DEF CON doing for DC30, and how can I attend?

DEF CON 30 will be a semi-hybrid event this year, we will give hackers a choice in how they wish to experience DEF CON but we are returning at full operating capacity. What do we mean by semi-hybrid? We will be hosting our full con in-person in Las Vegas and our approved villages and contests will be contributing additional online content within the official DEF CON Discord. All Online content will be similar to the 2020 & 2021 cons. Our official talks will be streamed via DCTV on our Twitch, and several contests and villages will be providing unique online immersive contests and presentations.

To see what happenings are currently planning to be in-person, hybrid, or virtual only please visit https://forum.defcon.org/node/239768


How much will DEF CON cost?

The price to attend DEF CON in-person will be $360 USD. You may not attend in-person without purchasing a badge. Attending virtual on our Discord will be free, and those with Human+ will have more permissions and access.

You can support DEF CON and upgrade your account by purchasing the Human Plus role.


Can I register for in-person DEF CON online?

Update: Online sales have closed. DC 30 badges can now be purchased with cash at the door.

Yes. DEF CON is a cash-at-the-door kind of conference. Paying in cash helps protect your privacy, and search warrants can't vacuum up PII we don't collect. You will always be able to lay down US dollars in the reg line and collect your badge. Still, the experience of DC29 taught us a few things. Some of our attendees work DEF CON into their business travel schedule, and the option to pre-reg with a credit card over the web made things much easier for them. Some of our attendees need to manage a group purchase, or want a more detailed receipt.

For everyone who fits into those categories, we’re happy to announce that we’re keeping the option of online registration. You’ll be able to use shop.defcon.org to buy your ticket and get your receipt. We hope the online option makes the process more streamlined for those who need it. We thank people for their patience and feedback as we navigate the changing landscape. The price for DEF CON 30 is $360, with a processing fee of $9.66 added to online orders.


Can I buy a DEF CON badge with Black Hat?

Yes, it will be an option when you check out at Black Hat.


How do I participate in virtual DEF CON?

For the virtual portion of DEF CON you will need a Discord account.
You can find detailed instructions on getting on the DEF CON Discord server here. There is a FAQ for Humans on Discord as well.

You can support DEF CON and upgrade your account by purchasing the Human Plus role that gives you more permissions than the free "Human" role. Connect to the DEF CON Discord Server: https://discord.gg/DEFCON

To see what happenings are currently planning to be in-person, hybrid, or virtual only please visit https://forum.defcon.org/node/239768


What if I don't want a Discord Account?

While we don't think you'll get the full experience, all of our content will be released via YouTube and put on the DEF CON Media Server. The Talks for DEF CON will be released during the con on the DEF CON YouTube and Twitch channels.


Will there be Uber Badges again?

Our annual tradition of awarding black "Uber" badges for CTF and other select contests, will continue, for in-person events only. To make sure that attendees are playing contests with the full hacker spirit we don't announce which contests qualify for an Uber Badge ahead of the contest (aside from the Official CTF) . We want to see how well each contest operates, and how players perform, so those decisions aren't made until Sunday of the con. Check out the registry of past black badge winners!


Where can I find more info on the DEF CON CTF?

DEF CON CTF Qualifiers May 28-29. Please follow Nautilus CTF on twitter at https://twitter.com/Nautilus_CTF and keep a look out on their CTF website at https://nautilus.institute. For a little history on the contest check out the CTF History page.


I have a black badge, do I need to pre-register?

No, just show up on site and go to inhuman registration. The rules governing the use of Black Badges are available on the Black Badge Policy Page. If you notice any errors or omissions in the list, please contact us at info@defcon.org. Congratulations to everyone who's earned a Black Badge and good luck to all who seek one.


What will capacity look like for the in-person event?

Capacity is currently capped at each given space’s fire code standard capacity. In case of changing health and safety recommendations, limits will be reviewed and revised at the direction of Southern Nevada Health District (SNHD) and there will be dedicated support onsite to ensure our policies are being followed.


What health measures/protocols is DEF CON taking to ensure a safe environment on-site?

DEF CON is working closely with Caesars Entertainment hotels to provide a safe and healthy experience for all. We will comply with whatever safety measures are required of us.


Will I be required to wear a mask?

Yes. Barring a major change in the situation, we will not check proof of vaccination, but we will keep last year's mask requirement in place for DEF CON 30. Protecting the community is our first priority, and we want to make sure that everyone is as safe as we can make them. Everyone includes the healthy, the vulnerable and those who have immune compromised loved ones they need to protect.

Masks requirements include:


The following do not fulfill the mask requirements:


Thank you for all you did to protect each other last year, and with your help we'll do it again this year.


What's DEF CON's official theme for DEF CON 30?

We want DEF CON 30 to have the energy of a reunion. We’ll be back together in a brand spanking new venue. We’ll be thirty years old - an amazing milestone for a hacker conference under any circumstances. In honor of all that, we’re calling DEF CON 30 ‘Hacker Homecoming’. More info on our official theme is here: https://defcon.org/html/links/dc-news.html#dc30theme


Where can I get more information about what's happening?

Check out the following DEF CON Sites & Social Media.

Forums
Groups
Discord
Twitter
Facebook
Reddit
DEF CON YouTube channel
DEF CON Twitch
DEF CON Music Twitch
DEF CON Media Server of all past conference materials


Return to Index
© 1992-2022 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

DEF CON FAQ


Frequently asked questions about DEF CON



What is DEF CON?

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.



How did DEF CON start?

Originally started in 1993, it was a meant to be a party for member of "Platinum Net", a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I'll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can't remember. Why not invite everyone on #hack? Good idea!



Where did the name come from?

The short answer is a combination of places. There as a SummerCon in the summer, a HoHoCon in the winter, a PumpCon during Halloween, etc. I didn't want any association with a time of year. If you are a Phreak, or just use your phone a lot you'll notes "DEF" is #3 on the phone. If you are into military lingo DEF CON is short for "Defense Condition." Now being a fan of the movie War Games I took note that the main character, David Lightman, lived in Seattle, as I do, and chose to nuke Las Vegas with W.O.P.R. when given the chance. Well I knew I was doing a con in Vegas, so it all just sort of worked out.

There are several resources that will give you an idea of what DEF CON is all about.

DEF CON Press: through the prism of the media
DEF CON Groups: Local groups that meet
DEF CON Media Server: DC 1 to the present, captured
Google: always a good research starting point
Just remember, DEF CON is what you make of it.



When and where is DEF CON?

DEF CON is generally in the last week of July or first week of August in Las Vegas. DEF CON 30 will be held August 11th through August 14th. We are gauging interest on what degree of where. Many people arrive a day early, and many stay a day later.


Isn't there a DEF CON FAQ already?

Yes, an unofficial one. It's quite humorous, sometimes informative, and DEF CON takes no responsibility for its content. It can be found at http://defcon.stotan.org/faq/



What are the rules of DEF CON?

Physical violence is prohibited. Harassment of any kind is prohibited. We don't support illegal drug use. Minors should be accompanied by their parent(s) or guardian(s). Please refrain from doing anything that might jeopardize the conference or attendees such as lighting your hair on fire or throwing lit road flares in elevators. DEF CON Goons are there to answer your questions and keep everything moving. Hotel security is there to watch over their property. Each has a different mission, and it is wise to not anger the hotel people. Please be aware that if you engage in illegal activities there is a large contingency of feds that attend DEF CON. Talking about how you are going to bomb the RNC convention in front of an FBI agent is a Career Limiting Move!

You can view the DEF CON Code of Conduct at https://defcon.org/html/links/dc-code-of-conduct.html.



Is DEF CON cancelled?

No.



What is there to do at DEF CON?

DEF CON is a unique experience for each con-goer. If you google around you'll find dozens of write-ups that will give you an idea of what people have experienced at DEF CON. Trust write-ups more than media articles about the con. Some people play capture the flag 24x7, while many people never touch a computer at DEF CON. Some people see every speech they can, while others miss all speeches. Other activities include contests, movie marathons, scavenger hunts, sleep deprivation, lock picking, warez trading, drunken parties, spot the fed contest, the official music events. Because DEF CON is what the attendees make of it, there are more events than even we are aware of. Half the fun is learning what happened at DEF CON after the fact!



I'm not a hacker, should I go to DEF CON?

Many people have different definitions of what is a ‘hacker’. I would recommend looking at previous years speeches, and write-ups from past attendees - this should give you a good idea if DEF CON is for you. This hacker FAQ might give you some insight into the matter as well. If you do not have any technical interests, DEF CON is probably not for you. Sure there is a lot of socializing you can do, but technology and hacking is the core of the con.



Do criminals go to DEF CON?

Yes. They also go to high school, college, work in your workplace, and the government. There are also lawyers, law enforcement agents, civil libertarians, cryptographers, and hackers in attendance. Ssshhh. Don't tell anyone.



What are Goons?

They are the staff at DEF CON. They have many roles including safety, speaker coordination, vendor room coordination, network operations, et cetera... Please try to be helpful to them if they make requests of you. If any goon tells you to move, please do so immediately as there may be safety issues they are attempting to address.



How can I help out or become a Goon?

The staff at DEF CON has grown organically. All positions have some degree of trust associated with them, so typically new goons are ‘inducted’ by friends of existing goons. There are many random points when goons need help and may ask people for help, generally for helping move stuff or other tasks that don't require high amounts of trust or unsupervised work. Just because you help out doesn't make you a goon. If you really want to be a goon, talk with one and see how much work they actually do (Hint: you may want to enjoy being at DEF CON, not working full-time at it). One year the network group got a new Goon when a networking engineer was needed, and he came to the rescue. The intent behind the goons is not to be elitist, but to have a network of trusted people who can help run the conference - please do not feel upset if you are not chosen to be a goon.



How can I help or participate?

DEF CON is not a spectator sport! Before the con, during, and after there are chances for you to get involved. Before the con you can read about the contests and maybe sign up for one like Capture the Flag. There are artwork contests for shirts and posters. You can practice your lock pick skills, or just get your laptop all locked down and ready to do battle. Organize your .mp3s. Check out the DEF CON Forums to see what other people are up to. If you want to create your own event, you can do that as well - you will not get official space or sanctions, but virtually every official event at DEF CON started out as an unofficial event.



I would love to see XYZ event, how do I make this happen?

Virtually all events at DEF CON were conceived by the attendees. The DEF CON forums are a great place for recruiting help for an event you want to put on, and making sure your efforts aren't being duplicated. If it doesn't require resources from DEF CON (space, namely) you generally don't have to ask anyone’s permission. Most events are unofficial until they've been going on for a couple of years. Please let us know if you have an idea for an event, we may help facilitate or promote it. Email [suggestions at DEF CON dot org] to keep us in the loop.



How can I speak at DEF CON?

You can submit a response to our CFP (call for papers). All entries are read and evaluated by a selection committee. We would love to have your submission. The call for papers usually opens in January and closes mid-May.



I'm press, how do I sign up, why can't I get in for free (I'm just doing my job)?

Please email press[at]defcon[d0t]org if you wish press credentials. Lots of people come to DEF CON and are doing their job; security professionals, federal agents, and the press. It wouldn't be fair to DEF CON attendees if we exempted one group from paying. If you are a major network and plan on doing a two minute piece showing all the people with blue hair, you probably shouldn't bother applying for a press pass - you won't get one. If you are a security writer or from a real publication please submit, and someone will respond with an answer.



I want to sell stuff, how do I do this?

If you want a space in our vendor area, you need to apply. Because of limited space and our attempt to have a diversity of vendors, you may not be able to get a booth. It is wise to think of staffing issues - if you are one person do you want to spend your entire time behind a vendors booth?



What are the different price rates?

Everyone pays the same: The government, the media, the ‘well known hackers’, the unknown script kiddies. The only discount is for Goons and speakers, who get to work without paying for the privilege.



How much is admission DEF CON, and do you take credit cards?

The price for DEF CON 30 is USD$360 cash at the door. We do this for a number of reasons. Paying in cash protects your privacy and we can’t be forced to hand over records we don’t collect. Still, offering online registration for DEF CON Safe Mode taught us we had some attendees who really benefit from the option for things like group orders and expense report requirements.

For those attendees who need a credit card option we’ll continue to offer online ticket sales at shop.defcon.org. There is a $9.66 processing fee for these online transactions. We hope this makes things easier for the community members who need it.



Does my underage child need a badge?

Children under the age of 8 will not need to purchase a badge.



Can I get a discount on DEF CON badges?

DEF CON charges one price regardless of your social status or affiliation. Please know that we depend on attendee income to pay the costs of the conference and don't have sponsors to help defray the expenses.

We sometimes get requests for discounts [students, veterans, children], unfortunately we don't want to try and validate if you are a current student, look at your ID to determine your age, decode military discharge papers, etc.

If you really want to attend DEF CON for free then do something for the con.

You could:
Submit a CFP and be an accepted speaker or workshop instructor.
Work on a contest, event, or village.
Qualify for CTF/Contests that include entry.
Find a team to become a Goon newbie.
Contribute to content, or perform some entertainment.


I need a letter of invite for my visa application, how do I get that?

In most cases, DEF CON can send a signed letter of invite, usually within a few short business days once we have all the info. If you also require verification of housing, we can put you in touch with someone to help you get your hotel stay organized, let us know if you need that.

Along with your request, please email us the following to info(at)defcon(.)org

Name as is on passport:
Passport number:
Country of issue:
Date of issue:
Date of expiration:
Country of origin:


DEF CON is too expensive, how can I afford it?

DEF CON is cheaper than many concerts, and certainly cheaper than many shows in Vegas. Many people have made an art and science out of coming to DEF CON very cheaply. Here are a couple of tips.

Travel: Buy airfare in advance, go Greyhound, Carpool, hitch-hike. (Note: this may be dangerous and/or illegal.)
Lodging: Share rooms - some people have up to 10 people they share a room with, find a hotel cheaper than the one that the conference is scheduled at, stay up for three days, etc. (note: this can be hazardous to your health.)
Food: Pack food for your trip, go off site to find food, eat in your hotel rooms, and look for cheap Vegas food at Casinos. (Look for deals and specials that are trying to get you in the door to gamble.)
Booze: You don't need to drink. Brew your own and bring it. (It's been done.)
Entrance: Admission can be saved, mow some lawns. Try to go to another 4 day event for cheaper than this that offers so much. We have increased the fees slowly over the years, but also the amount and quality of events have increased.

Inevitably people will try to do some math and pretend that DT gets rich each DEF CON - they seem to lack the ability to subtract.



How many people typically attend DEF CON?

There have been roughly 25-28k attendees in the last few (pre-COVID) years of DEF CON. DEF CON 27 had a record showing with approximately 30,000.



Is there a network at DEF CON?

Why yes, DEF CON is FULLY network-enabled. Now that we've perfected the art of a stable hacker con network, we're ascending to a higher level - we're providing you a network that you feel SAFE in using! Since DEF CON 18 we're WPA2 encrypted over-the-air, with a direct trunk out to the Internet. No peer-to-peer, no sniffing, just straight to the net (and internal servers). We'll provide login credentials at Registration. We know the LTE airwaves will be saturated so we're putting our own cred on the line to give you a net that even we would put our own mobile phones on.

If you're feeling frisky, we'll still have the traditional "open" network for you - bring your laptop (we'd recommend a clean OS, fully patched--you know the procedure) because we don't police what happens on that net. Share & enjoy!



What is the age limit?

People have brought children to DEF CON - it is not recommended to do this unless you are going to constantly supervise them. It is generally an ‘adult’ atmosphere (language, booze, et cetera). If you've never been to DEF CON, you may want to refrain from bringing your children (unless they are demanding that you bring them). While there are no age limits, we have consistently cooperated with parents and/or private investigators who are looking for children that ‘ran away from home’ to go to DEF CON. You will have to be 21 to reserve a room.



What is a DEF CON "Black Badge"?

The Black Badge is the highest award DEF CON gives to contest winners of certain events. CTF winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.



How can I get a hold of DT? I tried to mail him and haven't seen a response yet.

DT doesn't dislike you, isn't trying to hurt your feelings, and bears you no ill will. The fact is he gets an unmanageable load of mail continually. Mailing him again may elicit a response. Try mailing FAQ (at) DEFCON.ORG if you have a general question that isn't answered here or in the forums.



Is it hot in Vegas?

Yes. Bring sunscreen (high SPF), do not fall asleep near the pool (lest you wake up to sunburn), and do not walk far in the sun unless you are experienced in dealing with extreme heat. The sun is dangerous in Las Vegas. Sleeping in lawn chairs is a sure way to wake up to severe burns in the morning when that bright yellow thing scorches your skin. Drink plenty of water and liquids - remember that alcohol will dehydrate you.



What should I bring?

It depends on what you're going to do at DEF CON. This is discussed in quite some depth on the unofficial DC FAQ, as well as a thread in the DC Forums. You may want to bring fancy (or outrageously silly) clothes for the official Music events, on Friday and Saturday nights, where everyone shows off nifty attire.



How much do rooms cost, and how do I reserve a room?

The DEF CON 30 group room registration is now live! We have room rates at seven hotels, until they run out of rooms in our block.

Follow this link: https://book.passkey.com/go/SHDEF2

Do not worry if the form doesn't immediately show the discounted rate. To verify that you're getting our price you can mouse over the dates you've selected or begin the checkout process.


How much is internet access?

We are looking into this. Free (and possibly more dangerous) internet access is available in the convention area.



Will the hotels broadcast the speeches on their cable system?

DEF CON TV has succcessfully streamed all tracks to all the hotels, and a couple of tracks out to the internet, for several years now. We don't expect this will change!



Will we have DEF CON branded poker chips?

You will have to attend DEF CON to find out.



Will conference attendees have entire floors of hotel rooms to themselves?

Probably not. The hotel is very cooperative in attempting to centralize the DEF CON attendees, for their convenience and ours, but there will be non-DEF CON attendees in hotel rooms next to us.



This FAQ didn't answer my questions, or was unclear, how can I get further information?

Check out the DEF CON Forums to ask follow up questions.


Return to Index
© 1992-2022 DEF CON Communications, Inc. All Rights Reserved | DEF CON Policies | DMCA Information

Links to DEF CON 30 related pages


[an error occurred while processing this directive]

Map Browser


Links

DEF CON . org Links

DEF CON Main page
DEF CON 30 Home Page
DEF CON Recent News
DEF CON FAQ
DEF CON 30 FAQ
DEF CON 30 Venue
DEF CON 30 Schedule
DEF CON 30 Entertainment
DEF CON 30 Policy
DEF CON 30 Training Home
DEF CON 30 Training List
DEF CON CTF Nautilus Institute, Twitter @Nautilus_CTF
DEF CON YouTube channel, prev years talks

DEF CON      Forum Calendar
DEF CON 30 Planning Forum page
DEF CON 30 Hackers with Disabilities HDA Infopack

DEF CON 30 Speakers & Presentations Forum page
DEF CON 30 Villages Forum page
DEF CON 30 Contests Forum page
DEF CON 30 Parties & Gatherings & Events Forum page
DEF CON 30 Demolabs Forum page
DEF CON 30 Workshops Forum page - Registration opened on July 5 at Noon PDT! - All Workshops are Sold Out!
DEF CON 30 Paid Training Forum page - These occur the 2 days following DEF CON

Thanks to the InfoBooth crew for providing access to their backend database. <claps> to their hard work!

Villages Info Table

Each Village, as it's name may imply, specializes in a topic or aspect of security or computers.

One Page All Villages list with descriptions
DEF CON 30 All Villages Forum page

You may need to scroll to the right to see all info

Village Name
Home Page
Map Schedule Forum
Link
Social Media
Links
Adversary Village Map Sched Forum TW @AdversaryVillag
IG @AdversaryVillage
LI @adversaryvillage
FB @AdversaryVillage
TI @AdversaryVillage
DC https://discord.gg/GDB3rC7KYz
YT link
Aerospace Village Map Sched Forum TW @secureaerospace
LI @aerospace-village
TW @hack_a_sat
DC https://discord.gg/gV4EWuk
AppSec Village Map Sched Forum TW @AppSec_Village
LI @appsecvillage
YT https://www.youtube.com/c/AppSecVillage
DC https://discord.gg/5XY8qYXd7R
Artificial Intelligence Village Map Sched Forum TW @aivillage_dc
TI @aivillage
YT link
DC https://discord.com/invite/GX5fhfT
Bio Hacking Village Map Sched Forum TW @dc_bhv
LI @biohacking-village
YT http://youtube.com/biohackingvillage
TI @biohackingvillage
DC https://discord.gg/Q8ubDb5
SP link
Blacks in Cybersecurity Map Sched Forum TW @BlackInCyberCo1
IG @blackincyberconf
TI @blacksincybersecurity
YT link
LI @blackincyberconference
PT @blacksincybersecurity
FB @blackincyberconf
Blue Team Village Map Sched Forum TW @BlueTeamVillage
TI @blueteamvillage
YT https://www.youtube.com/c/blueteamvillage
DC https://discord.com/invite/blueteamvillage
Car Hacking Village Map Sched Forum TW @CarHackVillage
DC https://discord.gg/JWCcTAM
Cloud Village Map Sched Forum TW @cloudvillage_dc
YT https://www.youtube.com/cloudvillage_dc
DC https://discord.gg/EygUDJABee
Crypto Privacy Village Map Sched Forum TW @cryptovillage
SL https://cryptovillage.slack.com/
YT link
TI @cryptovillage
Data Duplication Village Map Sched Forum TW @DDV_DC
DEF CON Groups VR Sched TW @DCGVR
TI @defcon_groups
DC https://discord.gg/bsX4QXf3rD
Girls Hack Village Map Forum TW @girlshackvllg
IG @blackgirlshack
Ham Radio Village Map Sched Forum TW @HamRadioVillage
TI @HamRadioVillage
DC https://discord.gg/hrv
Hardware Hacking
Solder Skills Village
Map Sched Forum TW @DC_HHV
Industrial Control Systems Village Map Sched Forum TW @ICS_Village
LI @icsvillage
YT link
TI @ics_village
Internet Of Things Village Map Sched Forum TW @iotvillage
TW @ISEsecurity
TW @Villageidiotlab
LI @iotvillage
TI @iotvillage
YT https://www.youtube.com/c/IoTVillage/videos
DC https://discord.gg/tmZASSpNnP
Lock Pick Village Map Sched Forum TW @toool
TI @toool_us
YT https://youtube.com/c/TOOOL-US
MisInformation Village Map Sched Forum TW @MisinfoVillage
TW @misinfocon
Packet Hacking Village Map Sched Forum TW @wallofsheep
FB @wallofsheep
YT https://youtube.com/wallofsheep
TI @wallofsheep
PS https://www.periscope.tv/wallofsheep
Password Village Map Sched Forum TW @PasswordVillage
TI @passwordvillage
YT link
Payment Village Forum TW @paymentvillage
TI @paymentvillage
YT link
Physical Security Village Map Sched Forum TW @bypassvillage
TI @bypassvillage
Policy Village Map Sched Forum TW @DEFCONPolicy
Quantum Village Map Forum TW @quantum_village
Radio Frequency Village Map Sched Forum TW @rfhackers
TW @rf_ctf
      link
DC https://discordapp.com/invite/JjPQhKy
Recon Village Map Sched Forum TW @ReconVillage
FB @reconvillage
Red Team Village Map Sched Forum TW @RedTeamVillage_
YT https://www.youtube.com/redteamvillage
TI @redteamvillage
DC https://discord.gg/redteamvillage
Retail Hacking Village Map Sched Forum TW @RetailHacking
DC https://discord.gg/DxG4Uj7WZV
Rogues Village Map Sched Forum TW @RoguesVillage
TI @roguesvillage
TW @foursuits_co
YT https://www.youtube.com/c/foursuits
SkyTalks - 303 Map Sched Forum TW @dcskytalks
FB @Skytalks
Social Engineering Village Map Sched Forum TW @sec_defcon
Tamper Evidence Village Map Forum
Voting Village Map Sched Forum TW @votingvillagedc
YT link


Combined Schedules of DEF CON, Villages, and everything else DC30


Hacker Tracker - Android and IOS - the official DEF CON schedule app
The ONE! - A consolidated DEFCON 30 schedule in multiple file formats - html, PDF, CSV, ICAL, epub, mobi, Google calendar
info.defcon.org - the official DEF CON InfoBooth site


Vendors attending DEF CON


One Page All Vendors list with descriptions

The Vendor room is in Caesars Forum - Forum Ballroom, 130-132, 134

Board Source
Capitol Technology University
Carnegie Mellon University
Cryptocurrency Hackers
EFF
Girls Hack Village
Hacker Warehouse
Hackerboxes
Hackers for Charity
Hak5
HotWAN
Keyport
Miscreants
No Starch Press
OWASP
Phys Sec Village Store
Scam Stuff
Shadowvex
The Calyx Institute
The Tor Project
TOOOL
Xcape, Inc.
Zero Tier


Contests Info

Various contests, some lasting all 4 days of DEF CON, some short time on stage

One Page All Contests list with descriptions
DEF CON 30 All Contests Forum page

You may need to scroll to the right to see all info

Alpac@tack
Contest Info
Auto Driving CTF
Contest Info
Betting on Your Digital Rights: EFF Benefit Poker Tournament
Contest Info
Beverage Cooling Contraption Contest
Contest Info
Capture The Packet
Contest Info
Car Hacking CTF
Contest Info
CMD+CTRL at DEF CON 30
Contest Info
Crack Me If You Can
Contest Info
Crash and Compile
Contest Info
Creative Writing Short Story Contest
Contest Info
Darknet-NG
Contest Info
DEF CON 30 Chess Tournament.
Contest Info
DEF CON Capture the Flag
Contest Info
DEF CON Kubernetes Capture the Flag (CTF)
Contest Info
DEF CON MUD
Contest Info
DEF CON Red Team CTF
Contest Info
DEF CON Scavenger Hunt
Contest Info
DEF CONs Next Top Threat Model
Contest Info
Defcon Ham Radio Fox Hunting Contest
Contest Info
EFF Tech Trivia
Contest Info
Hack Fortress
Contest Info
Hack the Plan[e]t
Contest Info
Hack3r Runw@y
Contest Info
Hacker Jeopardy
Contest Info
Hospital Under Seige
Contest Info
IoT CTF Creators Challenge
Contest Info
IoT Village Hacking CTF
Contest Info
Octopus Game
Contest Info
Packet Detective & Packet Inspector
Contest Info
pTFS Presents: Mayhem Industries – Outside the Box
Contest Info
Radio Frequency Capture the Flag
Contest Info
Red Alert ICS CTF
Contest Info
SE Community (SEC) Vishing Competition / #SECVC
Contest Info
Social Engineering Community (SEC) Youth Challenge
Contest Info
Sticker Design Contest
Contest Info
The BIC Village Capture the Flag
Contest Info
The Gold Bug
Contest Info
The Hack-n-Attack Hacker Homecoming Heist
Contest Info
The Schemaverse Championship
Contest Info
The TeleChallenge
Contest Info
Tin Foil Hat Contest
Contest Info
Trace Labs OSINT Search Party CTF
Contest Info
Whose Slide Is It Anyway
Contest Info


Demolabs Info

Brief demonstrations for people to show off their project.

One Page All Demolabs list with descriptions
DEF CON 30 All Demolabs Forum page

You may need to scroll to the right to see all info

AADInternals: The Ultimate Azure AD Hacking Toolkit - Nestori Syynimaa
Demolabs Info
Access Undenied on AWS - Noam Dahan
Demolabs Info
alsanna - Jason Johnson
Demolabs Info
AWSGoat: A Damn Vulnerable AWS Infrastructure - Jeswin, Sanjeev
Demolabs Info
AzureGoat: Damn Vulnerable Azure Infrastructure - Nishant, Rachna Learn/teach/practice Azure pentesting.
Demolabs Info
Badrats: Initial Access Made Easy - Kevin, Dominic
Demolabs Info
Control Validation Compass – Threat Modeling Aide & Purple Team Content Repo - Scott Small
Demolabs Info
CyberPeace Builders - Adrien Ogee
Demolabs Info
Defensive 5G - Eric Mair, Ryan Ashley A 4.5G/5G test infrastructure using COTS hardware and OS software.
Demolabs Info
EDR detection mechanisms and bypass techniques with EDRSandBlast - Thomas Diot, Maxime Meignan
Demolabs Info
EMBA - Open-Source Firmware Security Testing - Messner, Eckmann
Demolabs Info
Empire 4.0 and Beyond - V. Rose, A. Rose
Demolabs Info
FISSURE: The RF Framework - Christopher Poore
Demolabs Info
hls4ml - Open Source Machine Learning Accelerators on FPGAs - Hawks, Meza
Demolabs Info
Injectyll-HIDe: Pushing the Future of Hardware Implants to the Next Level - Fischer, Miller
Demolabs Info
Memfini - A systemwide memory monitor interface for linux - Shubham Dubey, Rishal Dwivedi
Demolabs Info
Mercury - David McGrew, Brandon Enright
Demolabs Info
OpenTDF - Paul Flynn, Cassandra Bailey
Demolabs Info
Packet Sender - Dan Nagle
Demolabs Info
PCILeech and MemProcFS - Ulf Frisk, Ian Vitek
Demolabs Info
PMR - PT & VA Management & Reporting - Alanazi, Bin Muatred
Demolabs Info
ResidueFree - Logan Arkema
Demolabs Info
SharpSCCM - Chris Thompson, Duane Michael
Demolabs Info
svachal + machinescli - Ankur Tyagi
Demolabs Info
TheAllCommander - Matthew Handy
Demolabs Info
unblob - towards efficient firmware extraction - Kaiser, Lukavsky
Demolabs Info
Vajra - Your Weapon To Cloud - Raunak Parmar
Demolabs Info
Wakanda Land - Stephen Kofi Asamoah
Demolabs Info
Xavier Memory Analysis Framework - Solomon Sonya
Demolabs Info
Zuthaka: A Command & Controls (C2s) integration framework - Lucas Bonastre, Alberto Herrera
Demolabs Info


Workshops Info

Longer, more detailed, hands on, lasting half a day.
These have limited seating.
Workshop Registration Opened July 5 Noon PDT - All Workshops are Sold Out!

EventBrite DEF CON Workshops signup page

One Page All Workshops list with descriptions
DEF CON 30 All Workshops Forum page

You may need to scroll to the right to see all info

SOLD OUT - Creating and uncovering malicious containers - Adrian Wood, David Mitchell, and Griffin Francis
Workshop Info
SOLD OUT - Evading Detection: A Beginner's Guide to Obfuscation - Anthony Rose, Jake "Hubbl3" Krasnov, Vincent "Vinnybod" Rose
Workshop Info
SOLD OUT - Pentesting Industrial Control Systems 101: Capture the Flag! - Arnaud Soullie, Alexandrine Torrents
Workshop Info
SOLD OUT - Securing Industrial Control Systems from the core: PLC secure coding practices - Arnaud Soullie, Alexandrine Torrents
Workshop Info
SOLD OUT - Pivoting, Tunneling, and Redirection Master Class - Barrett Darnell, Wesley Thurner
Workshop Info
SOLD OUT - Hands-On TCP/IP Deep Dive with Wireshark - Chris Greer
Workshop Info
SOLD OUT - CTF 101: Breaking into CTFs... - Christopher Forte, Robert Fitzpatrick
Workshop Info
SOLD OUT - Hacking the Metal 2: Hardware and the Evolution of C Creatures - Eigentourist
Workshop Info
SOLD OUT - Dig Dug: The Lost Art of Network Tunneling - Eijah, Cam
Workshop Info
SOLD OUT - Protect/hunt/respond with Fleet and osquery - Guillaume Ross, Kathy Satterlee
Workshop Info
SOLD OUT - Finding Security Vulnerabilities Through Fuzzing - Hardik Shah
Workshop Info
SOLD OUT - Hybrid Phishing Payloads: From Threat-actors to You - Jon Christiansen, Magnus Stubman
Workshop Info
SOLD OUT - The Art of Modern Malware Analysis - Josh Stroschein, Ryan J Chapman, Aaron Rosenmund
Workshop Info
SOLD OUT - Introduction to Cryptographic Attacks - Matt Cheung
Workshop Info
SOLD OUT - The Purple Malware Development Approach - Mauricio Velazco, Olaf Hartong
Workshop Info
SOLD OUT - House of Heap Exploitation - Maxwell Dulin, Zachary Minneker, Kenzie Dolan, Justin drtychai Angra
Workshop Info
SOLD OUT - DFIR Against the Digital Darkness: An Intro to Forensicating Evil - Michael Solomon, Michael Register
Workshop Info
SOLD OUT - Introduction to Azure Security - Nishant Sharma, Jeswin Mathai
Workshop Info
SOLD OUT - Hand On Mainframe Buffer Overflows - Phil Young, Jake Labelle
Workshop Info
SOLD OUT - CICD security: A new eldorado - Remi Escourrou, Xavier Gerondeau, Gauthier Sebaux
Workshop Info
SOLD OUT - Introduction to Software Defined Radios and RF Hacking - Rich
Workshop Info
SOLD OUT - Windows Defence Evasion and Fortification Primitives - Rohan Durve, Paul Laîné
Workshop Info
SOLD OUT - FROM ZERO TO HERO IN A BLOCKCHAIN SECURITY - Roman Zaikin, Dikla Barda, Oded Vanunu
Workshop Info
SOLD OUT - Securing Web Apps - Sam Bowne, Elizabeth Biddlecome, Irvin Lemus, Kaitlyn Handelman
Workshop Info
SOLD OUT - Securing Smart Contracts - Sam Bowne, Elizabeth Biddlecome, Irvin Lemus, Kaitlyn Handleman
Workshop Info
SOLD OUT - Automated Debugging Under The Hood... - Sergei Frankoff, Sean Wilson
Workshop Info
SOLD OUT - Master Class: Delivering a New Construct in Advanced Volatile Memory Analysis for Fun and Profit - Solomon Sonya
Workshop Info
SOLD OUT - Network Hacking 101 - Victor Graf and Ben Kurtz
Workshop Info


Paid Training Info

2 day training sessions on the Mon and Tue after DEF CON. There will be an additional cost for these.

One Page All Paid Training list with descriptions
DEF CON 30 All Paid Training Forum page
DEF CON 30 Training Signup Pages

You may need to scroll to the right to see all info

Defender's Guide to Securing Public Cloud Infrastructures - Abhinav Singh
Paid Training Info
Pragmatic API Exploration - Aubrey Labuschagne (William) & Marianka Botes
Paid Training Info
TCP/IP Deep Dive for Ethical Hackers – Featuring Wireshark - Chris Greer
Paid Training Info
Zero 2 Emulated Criminal: Intro to Windows Malware Dev - Dahvid Schloss
Paid Training Info
Customizable Binary Analysis: Using angr to its full potential - Fish Wang & Audrey Dutcher
Paid Training Info
A Practical Approach to Breaking & Pwning Kubernetes Clusters - Madhu Akula
Paid Training Info
- Offensive IoT Exploitation
Paid Training Info
Practical Secure Code Review - Seth Law & Ken Johnson
Paid Training Info


Open Calls

VillageCall For Info
AI Village Twitter Call 4 Volunteers
303/SkyTalks Village Twitter Call 4 Volunteers
Blue Team Village Twitter Call 4 Volunteers
Crypto & Privacy Village Twitter Call 4 volunteers
Data Duplication Village Call for Volunteers
DC Groups VR Event Twitter Call 4 Submissions, closes July 15
Lock Pick Village Twitter Call 4 Content
Physical Security Village Calls for Proposals, Exhibits, Volunteers, closes July 16
Twitter call 4 Papers, Exhibits, Volunteers
Twitter Volunteer Perks
Twitter call 4 Displays
Quantum Village Twitter call 4 Participation
Recon Village Twitter call 4 Volunteers
Red Team Village Twitter call 4 Volunteers
Twitter call 4 Workshops
Twitter call 4 Sponsors
Retail Hacking Village Calls for Talks, Staff


Villages Waiting for Calls or no Calls

Internet Of Things Village
Packet Hacking Village
Password Village
Payment Village
Policy Village
Tamper Evident Village


Villages with Completed Calls

DEF CON Call for Papers closed May 1
DEF CON Call for Demo Labs closed May 1
DEF CON Call for Workshops closed May 1
DEF CON Call for Parties & Meetups closed April 30
DEF CON Call for Training closed May 16
DEF CON Call for Music closed June 1
303 / SkyTalks Call for Presentations closed May 31
Adversary Village Call For Papers closed May 15
Aerospace Village Call For Everything closed June 3
AppSec Village Call For Papers closed May 10
Artificial Intelligence Village Twitter Call 4 Papers closed June 22
Bio Hacking Village calls for Equipment, Papers, Workshops closed April 30
Blacks in Cybersecurity Call for papers closed June 1
Blue Team Village Call for Content closed May 15
Car Hacking Village Twitter Call 4 Papers closed June 24
Cloud Village Call for Papers, Volunteers, Sponsors closed June 5
Crypto & Privacy Village Call for Presentations and Workshops closed June 26
Data Duplication Village Call for Papers closed June 26
Girls Hack Village Call for proposal closed June 15
Ham Radio Village Calls for Papers Staff VEs closed July 24
Hardware Hacking and Soldering Skills Village Calls for Papers and Volunteers closed June 17
Industrial Control Systems ( ICS ) Village Twitter Call 4 Papers closed June 24
MisInformation Village Call for Proposals closed July 3
Radio Frequency Village Twitter call 4 Papers closed July 4
Recon Village Twitter call 4 Papers closed June 27
Rogues Village Call for Papers closed June 30
Social Engineering Village Calls, CFP, CFC, CFV, CFR closed June 3, June 3, June 3, July 1
Voting Machine Village Twitter call 4 Papers closed June 13


Non-Village Call Fors

DCFurs 2022 website - Call For Presentations
Mental Health Hackers and their Call for Papers
@defcongroups VR Event, Twitter Call For VR Talks
BlanketFortCON Twitter Call for DJs


Other Interesting Links

@defconparties - calendar
defconmusic - Schedule/News from the DC Artists & Entertainment ( A&E ) Department
defcon DEFCONorg Twitch stream
defconmusic DEF CON Entertainment Twitch stream
defconmusic YouTube channel
DCTV - DEF CON TV: Twitch streams and Hotel TV channels
#badgelife spreadsheet of unofficial badges for DC30
@qumqats Twitter List of Village accounts to assist in watching Village happenings

Other cons during #SummerHackerCamp
Blackhat @BlackHatEvents FB Black Hat Events
BSides Las Vegas @BSidesLV FB @BSidesLV
Queercon @Queercon FB @queercon
The Diana Initiative @Dianainitiative FB @dianainitiative

Guides/Tips/FAQs

How to Survive Def Con 2022
OpSec For DEF CON 30
DCG 201 Hacker Double Summer 2022 Guides
Birds of a Feather-Resources for 2022 Hacker Summer Camp
Lonely Hackers Club - DEF CON n00b guide  -  reddit thread
The Lost Policymaker's Guide to Hacker Summer Camp
Holon DEF CON 30 Preparation
DEF CON: The Survival Guide
Preparing for "Hacker Summer Camp"

General / previous years
DEF CON for N00bs
JK-47 - BSidesLV & DEFCON Conference Tips
Just another DEF CON guide
HACKER SUMMER CAMP 2018 GUIDE
On Attending DefCon


Thanks for your interest in this post/page. I hope it was useful to you.

Production of this post/page is not affiliated with DEFCON 30.

Use at your own risk.

For the latest info while at DC30 please check the info booths and screens.

If you notice any problems or something is missing in this post/page please let me know. Constructive comments and additional info is welcome.

Have a good DEFCON 30!

email: qumqats@outel.org
Twitter: @qumqats