Almost 20 years and still hacking DEFCON. WHAT IS DEFCON A “hacker” conference Whitehat and Blackhat represented Sensationalized and misunderstood?

Slides:



Advertisements
Similar presentations
Grand Challenges for the Database Community Jim Gray Microsoft.
Advertisements

Why Do Classrooms Need to Change? Amy Chase Martin Howard Community College.
What I Did on My Summer Vacation? By Kimberly Lugo.
Safety Moment Distracted Driving. Safety Moment Distracted Driving.
Past Tenses Relationship of Past Events/Actions to Each Other
Computer Threats I can understand computer threats and how to protect myself from these threats.
The development of Internet A cow was lost in Jan 14th If you know where it is, please contact with me. My QQ number is QQ is one of the.
Android 4.0 ICS An Unified UI framework for Tablets and Cell Phones Ashwin. G. Balani, Founder Member, GTUG, Napur.
The Uses of White Hat Hacking Tyler Schumacher
An outline of the role of ACTIVE CITIZENSHIP at QE and the contribution that Governors can make.
On new years night we always stay up until 2:30 in the morning! First we go out to get snacks.
Trying to have an impact in Bulgaria and back in the US My fascinating experience so far… Nora Madjar Associate Professor, University of Connecticut Fulbright.
HOW 10 MINUTES A NIGHT CAN IMPROVE YOUR CHILD’S EDUCATION AND FUTURE Connecting with your student at home.
UniSA - a strategies workshop. Today’s program: (if of course, we have time for it all!!) Developing good tutor skills Tutorial dynamics Continuing.
Nicolas Cruz Regional Projects. Why Do Regional Projects? “Most Outstanding Chapter” Award Must complete 2 regional projects Cannot complete 2 in category.
11 Canal Center Plaza, Alexandria, VA T F Enterprise Computing Conference (ECC) Workshop Alma R. Cole,
What’s Going On? This is a “Capture The Flag” hacking contest Teams from a number of Universities/Institutions compete against each other Each team has.
 MeH  About  Advocacy  Logistics  Goons  Rules  Activities  Sponsors.
1 The Threatscape is evolving rapidly A.Prove capabilities? B.Exact revenge? C.Erode our confidence? D.Perpetrate fraud in the background via the contact.
Agenda Welcome: 19h Start: 19h30 Round table: 20h Networking: 21h.
President’s Forum and WSML 2012 Mobile Market Dynamics Deborah Clark, Dawn Davis, Brian Duckering, Marie Pettersson 1 “A Day in the Life of a Mobile Family”
OWC Collegiate High School Niceville, Florida Presented by Charla Cotton Amy Riddell Jump Start A Culture of Reading: Turning Students Into Readers.
By: Sultan & Aya. What is Community?  A community is a group of people living in a particular area. This group of people share the same environment,
K A R A Creations ARLIARLI Topic: Why facebook can be dangerous!!
Hands-on SQL Injection Attack and Defense Winter ICT Educator Conference Jan. 3-4, 2013.
I-Hack’08 International Hacking Competition “Details”
Information Systems and Internet Security Laboratory Kevin Chung.
Root-Fu ; Rise of the Ninjas Introduction to Root-Fu DCX -> interz0ne -> DC11 Show me the sploitage! Rants, Raves, and Moving Forward.
The Girl Scout Leadership Experience: It’s like driving a car!
The Girl Scout Leadership Experience: It’s like driving a car!
Guidebook 101 CACUBO Annual Meeting Guide is sponsored by Barnes & Noble College Step 1: Download Guidebook from Apple App Store or Android Marketplace.
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
Living Innovation Challenging the way we live!. Australia.
PARTY. Celebrity Guest Dave Chappelle will be at my party for two hours doing stand up comedy from 8:00 to 10:00pm.
Higher Education Policies; Challenges and Opportunities Prof Fathi Akkari Libya Open university.
Digital Education Show “The top two things employers look for, based on a survey conducted with 1800 CEOs: 1. Creativity 2. Adaptability” (Sir Ken Robinson)
Are you coming to the best party of the year??????? By:Shanoa Evans PD:6.
The Ur-Jauzi Theatre Group believes in the power of theatre as a tool for growth, understanding, integration and communication. Our aim is to use the.
Mission Computers Inc.  In 2013 ◦ 1,000,000,000 phones were hacked  because of ◦ lack of a secure password or ◦ no password at all Source:
This is going to be a chasing game were the mi6 have to catch the hackers They should be able to catch them in this quick car and little kids like quick.
Principles and Elements Putting Knowledge to Practice.
SoTL Conference 2015 Pre-conference workshop The lecture is definitely still alive, but is it well? Sonja Strydom.
 There are many android hack tool given on the internet that promises to give you best performance. But unfortunately most of the android hack tool are.
July House Meeting Sidney Graduate Community Tuesday, July 10 th 2007 Pacific.
AccessData User Summit 2016 April 5 th – 7 th, 2016 Lake Mary, FL iOS 9 and Android 6.
By: Collin Molnar. Overview  Intro to Android  Security basics  Android architecture  Application isolation  Application permissions  Physical access.
If there were an Olympic contest for talking, Shelley Stills would sweep the event.
Shopping Centre Management Conference technology – retail’s digital future - March 2015.
18-1 PRENTICE HALL ©2008 Pearson Education, Inc. Upper Saddle River, NJ FORENSIC SCIENCE An Introduction By Richard Saferstein.
The power of knowledge through my eyes By Tasha McDonald.
Learning From the Underground at Defcon Jonathan Taylor, CISSP Enterprise Security Engineer, Sutter Health Jesse D’aguanno.
Cyber intelligence made easy.
COMPUTER ENGINEERING.
Nature, Darwin and Bug Bounty Hunting
What is DefCon The road trip The conference The network
Cyber intelligence made easy.
Past Tenses Relationship of Past Events/Actions to Each Other
How to build a defense-in-depth
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
الإقراض وتحليل الإئتمان ( 10)
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
Decision Making Process
8th Grade Forensic Science T. Trimpe
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
Stable connection More secure More vulnerable to hacking Cheap set up costs Generally will have a good quality signal The connection is not as stable.
Mein Kampf My Struggle.
Image #1 Image Analysis: What do you think is going on in this picture? Which person, thing, or event does this image relate to (which Word Wall term)?
Matches and Lighters are not Toys!
Presentation transcript:

Almost 20 years and still hacking DEFCON

WHAT IS DEFCON A “hacker” conference Whitehat and Blackhat represented Sensationalized and misunderstood?

WHAT MAKES UP DEFCON Talks Workshops Contests Events Culture

TALKS “Traditional” security talks Android security Forensics Extreme/off the wall And That’s How I Lost My Eye Intro to Tamper-Evident Devices

WORKSHOPS These are more traditional SQL Injection WiFi Security Presentation Skills Car Hacking

CONTESTS Capture the Flag Badge Hacking Gringo Warrior Lock picking Spot the Fed Tamper Evident Alcoholic Ice Cream

EVENTS/ACTIVITIES Toxic BBQ Ninja Party Wall of Sheep Hacker Karaoke Mohawk-Con

CULTURE All the kids you picked on, as grown-ups Self-described as “curious” and “looking for a challenge” Dress Code Community Emphasis on connecting with others Support for charity Blood drive Be The Match EFF Hackers for Charity