Saturday, October 14, 2023
HomeCyber SecurityHackers Come Dwelling to Vibrant Group

Hackers Come Dwelling to Vibrant Group


DEF CON — Las Vegas — Halls full of hackers lined up for hours for his or her likelihood to hone their expertise on the most recent tech, helped alongside by a volunteer military of so-called “goons” — it was a hopeful place to be final weekend throughout DEF CON 30.

Everybody wore masks so even the immunocompromised might take part. There was a pattern towards specializing in utilizing hacker powers to guard the inhabitants from utility breaches, sensible automobile accidents, misinformation, and extra. Giving the whole convention its reputational edge have been rooms buzzing with info and the type of immediacy and efficiency that made it really feel nearly subversive — punk rock, even.

Listed below are only a few of the highlights Darkish Studying occurred to seek out among the many organized chaos that was DEF CON 30.

1. Merch Insanity

The longest traces, by many hours, have been these to get the most recent DEF CON-branded merchandise. Whereas some used the time to refuel with snacks, others put a little bit extra thought into the break within the motion. Take Brad Lindsley, who made his personal “Linecon Bag” with a mounted gaming display screen and controllers for 4 gamers.

“I used to be ready in line for hours at one other DEF CON and I used to be fascinated by what I’d wish to do in line,” he instructed Darkish Studying.

brad_lindsley_line_con_bag.jpg
Brad Lindsley exhibits off his Linecon bag. (Photograph by Becky Bracken for Darkish Studying)

2. IoT Village

DEF CON 30 hackers additionally had the choice to ply their expertise on dozens of Web of Issues (IoT) units, together with the Emergency Broadcast System and a Globecomm satellite tv for pc system, due to the work of TIVO Trevor and the remainder of the crew, who spent the final 90 days constructing the IoT frequent management framework (CCF).

Trevor mentioned that this yr the IoT Village made the choice to shift its emphasis due to the shifting menace panorama that now focuses on infrastructure and different IoT units.

“We have moved away from SOHO (small places of work/house places of work) to IoT this yr,” he instructed Darkish Studying.

TIVO_trevor_at_IoT_village.jpg
TIVO Trevor on the DEF CON 30 IoT Village. (Photograph by Becky Bracken for Darkish Studying)

3. Sink This Battleship

There have been too many contests happening throughout DEF CON 30 to rely. One huge one was a model of Seize the Flag referred to as “Can You Sink the Ship?” placed on by Fathom5, which challenged groups of hackers to carry down their ship coaching module. The kickoff was preceded by various guidelines laid out by Fathom5 CTO David Burke, who included an instruction to not tinker with the hoses beneath: “Please do not spray hydraulic fluid in all places across the room.”

can_you_sick_the_ship.jpg
Burke explains the bottom guidelines of the competition. (Photograph by Becky Bracken for Darkish Studying)

4. Different Challenges Accepted

Different, much less elaborate contests included a group of Seize the Flag variations, Crimson Crew challenges, and even a DEF CON Scavenger Hunt.

contest_village_leaderboard.jpg
One of many many contest leaderboards projected across the DEF CON Contest Village. (Photograph by Becky Bracken for Darkish Studying)

5. The Voting Village

Famous voting-machine researcher Harri Hursti, representing the Election Integrity Basis, introduced in a group of voting machines presently in use throughout the US for hackers and conspiracy theorists alike to check out and problem their safety.

Darkish Studying bumped into a bunch of hackers giving one of many US voting machines a cautious look. Requested in the event that they thought they may be capable to crack into it, one of many group responded, “I do not know if we are able to, however it’s enjoyable factor to play with.”

voting_machine_hackers.jpg
Voting machine hackers, from L to R: Wkampbel, Segzf4ult, Cole Knight, James, Semifour. (Photograph by Becky Bracken for Darkish Studying)

6. The Signage

Even the signage unfold out round DEF CON 30 was flair-forward, with an array of intelligent quips, dazzling digital renderings, and simply straight-up artwork. Right here is simply the tiniest style of what was on show.

chill_out_room.jpg
The Chill Out Room at DEF CON had an elaborate stage for DJs and performances. (Photograph by Becky Bracken for Darkish Studying)
wash_your_inputs.jpg
Signage on the lock-picking space at DEF CON. (Photograph by Becky Bracken for Darkish Studying)
wall_projection.jpg
Wall projection over essential DEF CON 30 entrance. (Photograph by Becky Bracken for Darkish Studying)

7. Mind Hacking & Misinformation

A whole village at this yr’s DEF CON was devoted to misinformation. With phishing and social engineering nonetheless driving so many profitable cyberattacks, Dr. Matthew Canham of Past Layer 7 gave a presentation on cognitive safety, which basically means blocking attackers from compromising the mind itself. From optical illusions to situations like Cambridge Analytica’s apply of constructing psychographic profiles to focus on victims, mind hacks are right here and getting extra subtle, in response to Dr. Canham.

misinformation_village.jpg
Misinformation Village info display screen previous to Dr. Canham’s presentation. (Photograph by Becky Bracken for Darkish Studying)

8. The Traditions

This yr was Michael Bargury’s debut on the DEF CON stage. That meant that earlier than he kicked off his presentation about codeless malware, the CTO and cofounder of Zenity (and Darkish Studying columnist) engaged in a DEF CON custom… he did a shot, alongside together with his “goon” who gave the introduction. After a number of seconds and only one wince whereas the liquor went down, Bargury was formally inaugurated into the DEF CON speaker’s membership and able to go.

no_code_maleare.jpg
Bargury takes the rostrum following his inaugural shot of braveness. (Photograph by Becky Bracken for Darkish Studying)



Supply hyperlink

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -
Google search engine

Most Popular

Recent Comments