Journal logo

DEF CON 31

A Journey From Top To Bottom

By MedjugorePublished 9 months ago 5 min read
Like
Know Your Meme. Source: https://shorturl.at/luzBU

After the end of the DEF CON 31: Hacker Conference 2023 | #1 Hacker Event, I started writing this «capture the event» forensics report at the Las Vegas Airport on 13/08.

Why squander the time during a return flight when the memories are still fresh?

  • Was the DEF CON stressful? Mostly exhausting. For my first time in Las Vegas and my first InfoSec convention, this experience has been out of proportion.
  • Had I expectations about the conference? Too much.
  • Was it useful? Yes even if it left me with mixed impressions.
  • Will I come back? No chance except if I do not foot the bill. Besides, nothing EDIFYING in Sin City. Best to visit the great countryside or a different state.

Let’s break it down.

@defcon artwork on the lobby corner display

Business as usual

To make the most of the event, you need to plan thoroughly and come early. It was 40 °C outside but the atmosphere inside the CON forum and hotels was adequately ventilated and cool.

The total attendance was around 30,000 hackers and the first day is known as the Linecoin. This is not a fork of Litecoin but a long line of people waiting to pay for their entries. I arrived at 7 am thinking it will be soon enough but it took two hours to pass the counter.

With so many “white, grey and black hat” hackers, pen-testers, government officials, technology industry professionals, spies, and newbies, turning off mobile Wi-Fi and Bluetooth once you step inside the Forum building is compulsory. As the saying runs: No technology that is connected to the Internet is unhackable.

You pay in cash unless you were able to pre-register online by credit card. There is no receipt for cash payment. However, you receive an impressive goodie badge with a hacker bag. It was the first time in the conference’s history that online payments were allowed. Attendees who paid online were jokingly booed by the DEF CON® “goons” (security members) when the excited crowds rushed to acquire some goodies and souvenirs.

The DEF CON follows another renowned hacking conference: Black Hat USA. Together both events make up a weekly hacker summer camp and both were founded by Jeff Moss (known as The Dark Tangent).

Jeff Moss (aka The Dark Tangent). Source: https://twitter.com/defcon

The DEF CON complete program is gigantic at the very least. The conference lasted from 10 to 13 August and encompassed a large array of cybersecurity topics from U.S. policy concerns to device hacking, capture the flag competitions, villages, workshops, interviews, and talks, … A dedicated app, HackerTracker, helps to navigate the number of opportunities and pick your preferred events.

Screenshots from the DEF CON Program on the hackertracker app

The Reality

The whole participation was wickedly disorganized. Many demos and practical shows were overcrowded. Many times it was simply not possible to take part in noteworthy challenges because of the long line. At the same timeslot, you could have five to six planned events with many of them already overbooked. This happened if you had the chance to walk fast to find the correct location in time. Due to the large number of attendees, the convention had been scattered among four sites (The Caesar’s Forum and three nearby hotels vast as super freighters). In Las Vegas, the city has been designed to make visitors walk a lot to get from point A to point B. Simply so that you peek at the many slot machines and give in to other blinking temptations.

After two days, the most realistic approach to build consisted in focusing on two to three events largely separated in their schedule and not too far away from each other. A colleague of mine confirmed that it has been only on the last day that the affluence dropped enough to enjoy the conference.

Not all was spoiled, fortunately. With my friends, I managed to attend a welcome speech by the Dark Tangent, an Android hacking session (quickly executed on a 2022 general public smartphone), an ID badge hacking presentation ( through relay attacks to hack ID tokens remotely), a worldwide vulnerability research talk, a “fireside chat” between Jeff Moss and the secretary for the Department of Homeland Security, a Whitehouse review on the state of Space Cybersecurity, a pen-testing lab for wireless networks, a CISA talk over the cyber warfare situation between the U.S. and its main rivals, chess games, lock-picking breaks, IA speech (if you can attend it), Capture the flag sessions, one bug-bounty hunter’s field (partially attended), live red and blue teams introduction/demonstration (difficult to attend), collection of humorous stickers, talking with professionals, newcomers, and foreigners at relax spaces, …

Chat between Jeff Moss and the DHS secretary. Source: https://twitter.com/defcon

One of the most memorable moments was the debate between the DHS secretary (Alejandro Mayorkas, a real politician subordinate towel boy) and Jeff. In short, the U.S. government acknowledged that it is technically impotent and needs help to address the internal U.S. divide and the competition/ conflicts with foreign powers like Russia and China. “We need your help” pleaded the DHS secretary (an attendee when on to say that it is to conduct surveillance on political opponents). Jeff quipped on the fact that a government official of such rank accepted to come in for the first time. Turn back the tides.

Final words

All in all, the motivation is strong among the hacker public, and cybersecurity opportunities are vast as well. The resources are simple to grasp for whom pursue a cyber position. Institutions, small businesses, and government departments, .. are all posting for such job openings. In spite of the messy organization, the DEF CON certainly brings value for skilled professionals or wannabe. People networking and the variety of talks positively guide attendees to the right opportunities.

Still, I did not need to take part in the DEF CON to know what to do next. The event can seem exaggerated and so security-obsessed it’s getting maddening. Also, this American way of displaying technologies is not suited for everyone. Whether or not you mind long queues and somewhat chaotic shows, you can hack your way through the event or watch video reports online:

https://www.youtube.com/user/DEFCONConference

https://www.youtube.com/@livectf/videos

https://twitter.com/defcon

For my part, I will now push to study and fulfill the OSCP certification (Offensive Security Certified Professional) that teaches penetration-testing methodologies. I am driven by the allure of intellectual challenge, curiosity, and the thrill of this new adventure. Even if I do not pass the exam, I want to be capable of successfully attacking and penetrating various live machines and providing evidence of practical penetration testing skills.

“Hackers tend to achieve greater success within organizations where employees feel undervalued, burdened with excessive workloads, and receive inadequate compensation. In such environments, it becomes less likely for individuals to pause and exercise caution before interacting with a phishing email.” James Scott

product reviewtravelsocial mediapoliticsindustryeconomy
Like

About the Creator

Medjugore

Writing and doddling on War comics, Deus Ex fanfiction, anatomy drawings, fantasy and sci fi digital paintings.

Reader insights

Be the first to share your insights about this piece.

How does it work?

Add your insights

Comments

There are no comments for this story

Be the first to respond and start the conversation.

Sign in to comment

    Find us on social media

    Miscellaneous links

    • Explore
    • Contact
    • Privacy Policy
    • Terms of Use
    • Support

    © 2024 Creatd, Inc. All Rights Reserved.