DEF CON

DEF CON is one of the oldest continuously running hacker conventions around, and also one of the largest.

Many of the attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be “cracked.”

The event consists of several tracks of speakers about computer- and cracking-related subjects, as well as social events and contests in everything from creating the longest Wi-Fi connection and cracking computer systems to who can most effectively cool a beer in the Nevada heat.

p

Conference information

Days until the next conference

Day(s)

:

Hour(s)

:

Minute(s)

:

Second(s)

Location

Bally’s Las Vegas Hotel & Casino
South Las Vegas Boulevard
Las Vegas, NV
United States

Paris Las Vegas
South Las Vegas Boulevard
Las Vegas, NV
United States

Conference program

The conference program can be viewed here.

News

  • 22-10-2014 | DEF CON 22 materials archive RSS is live – Read more

Paris Las Vegas

Bally's Las Vegas Hotel & Casino

Articles

Social-Engineer, Inc. releases annual report on DEF CON 22 Social Engineering Capture the Flag (SECTF) Contest

27-10-2014 | The SECTF contest is conducted to raise awareness of the growing threat social engineering poses and to provide a live demonstration of specific techniques commonly used by malicious attackers to siphon information from unsuspecting targets. Read more

5 Security trends from Defcon 2014 - The largest hacker conference

13-08-2014 | I believe I am more of a builder than a hacker but still this is one of the event which draws me every year. It is a great way to keep an eye of what’s happening in the world of hacking and provides some valuable insights on how tomorrow could look like. Read more

Available videos

DEF CON 17: MetaPhish

DEF CON 17: MetaPhish

This talk will focus on building a phishing framework on top of Metasploit that pentesters can use to automate phishing and increase their overall capabilities.

Toying with barcodes

Toying with barcodes

Ever wondered what is in these blocks of squares on postal packages, letters and tickets?

DEF CON 14: US-VISIT: Raping personal privacy since 2004

DEF CON 14: US-VISIT: Raping personal privacy since 2004

In this talk, the technology and capabilities of US-VISIT will be explained in detail; weaknesses in the system will be explored, and the consequences of such a system will be considered.

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

DEF CON 17: Hijacking web 2.0 sites with SSLstrip

Many websites mix secure and insecure content on the same page this makes it possible to steal all the data entered on such a page easily, using Moxie Marlinspike’s new SSLstrip tool. I will give a brief explanation and demonstration of the technique.

Owning bad guys (and mafia) with JavaScript botnets

Owning bad guys (and mafia) with JavaScript botnets

In this talk MITM schemas in anonymous services are discussed. Attendees will see how easily a botnet using JavaScript can be created to analyse that kind of connections and some of the actions people behind those services are doing.

DEF CON 13: Google hacking for penetration testers

DEF CON 13: Google hacking for penetration testers

Johnny Long reveals basic and advanced search techniques, basic and advanced hacking techniques, multi-engine attack query morphing, and zero-packet target foot printing and recon techniques.

DEF CON 19: Hacking and forensicating an Oracle database server

DEF CON 19: Hacking and forensicating an Oracle database server

David Litchfield is recognized as one of the world’s leading authorities on database security.

DEF CON 17: Abusing Firefox Addons

DEF CON 17: Abusing Firefox Addons

This talk details how we have abused some of the most popular and recommended Firefox addons, with previously unreleased vulnerabilities. Demos will cover remote code execution, local file disclosure and other tailored Firefox Addon exploits.

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

DEF CON 18: Your ISP and the Government: Best Friends Forever 1/3

Although many companies claim to care about end-user privacy, none seem to be willing to compete on the extent to which they assist or resist the government in its surveillance activities. This talk will pierce the veil of secrecy surrounding these practices.

DEF CON 16: Forensics is ONLY for Private Investigators

DEF CON 16: Forensics is ONLY for Private Investigators

This is a talk about the struggles of becoming a Private Investigator and what the laws are for computer forensics going forward.

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

DEF CON 19: Defeating wired 802.1x with a transparent bridge using Linux

Using Linux and a device with 2 network cards, I will demonstrate how to configure an undetectable transparent bridge to inject a rogue device onto a wired network that is secured via 802.1x using an existing authorized connection.

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

DEF CON 20: Demorpheus: Getting rid of polymorphic shellcodes in your network

In this presentation we propose an approach and hybrid shellcode detection method, aimed at early detection and filtering of unknown 0-day exploits at the network level.

DEF CON 17: Making fun of your malware

DEF CON 17: Making fun of your malware

This talk evenly distributes technical knowledge and humor to present the funniest discoveries related to malware authors and the fight against their code.

Attacking SMS. It’s no longer your BFF

Attacking SMS. It’s no longer your BFF

This talk will conclude with a proof-of-concept web application demo that demonstrates the techniques and issues mentioned as well as thoughts for solving the next generation of spam.

Building the DEF CON Network

Building the DEF CON Network

We will cover on how the DEF CON network team builds a network from scratch, in three days with very little budget.

Battery firmware hacking

Battery firmware hacking

Charlie Miller will take an in depth look at a common embedded controller used in a battery and reverse engineer the firmware.

Asymmetric Digital Warfare

Asymmetric Digital Warfare

This talk will is intended to understand where and how the digital conflicts are conducted today but we will dig deeply into the future.