I spent the week with over 20,000 hackers in Las Vegas — here's what I saw

Defcon is one of the largest hacker conferences in the world. Held over four days every August in Last Vegas, Defcon is now in it's 23rd year and is bigger — and scarier — than ever.

Advertisement

Now boasting an attendance of more than 20,000, I decided to venture out and see what all the fuss was about.

Needless to say, I was not disappointed.

IMG_0223.JPG
Darien Acosta
Advertisement

One last farewell to the New York City skyline from Newark Liberty Airport.

IMG_5727.JPG
Darien Acosta

Here's a partial view of the Grand Canyon from my flight.

IMG_0154.JPG
Darien Acosta
Advertisement

Defcon 23 is held at the Bally's and Paris Hotel Casino near Caesar's Palace.

Ballys in Las Vegas
Michael Dorausch/Flickr

During the conference, special keycards are provided at participating hotels.

View post on imgur.com.
Advertisement

In preparation for Defcon, the hotel provides special "If you see something, say something" training for its staff.

Buzz Session Planner: Defcon (Hacker Conference) Awareness Training. I stumbled across this at one of the hotels during Defcon.

This is the main conference area for panel talks. This gigantic space will be divided into three separate tracks.

IMG_0186.JPG
Darien Acosta
Advertisement

But first, attendees line up at 5 a.m. to purchase admission badges. Defcon operates on a cash-only basis — to prevent credit-card fraud — and there is no preregistration.

IMG_0169.JPG
Badges are $230, so with 20,000 attendees, the con organizers will carefully process around $4.6 million over three days. This makes for long lines. I waited 90 minutes ... this experience is affectionately known as Linecon. Darien Acosta

The line's integrity is maintained by lovely folks called Goons, Defcon's volunteer security force.

A photo posted by @monsieurharry on

Advertisement

This is the admissions package. Contents include a vinyl record badge, a newspaper schedule, stickers, and various CDs.

A photo posted by @rbrigby on

The badges, aka vinyl records, are worn around the neck using lanyards. This makes all conference-goers look like Flavor Flav from the hip-hop group Public Enemy.

Advertisement

Luckily, Flavor Flav approves.

View post on imgur.com.

Defcon banner art by official convention artist Mar Williams.

IMG_5742.JPG
Darien Acosta
Advertisement

Defcon hotel floor sticker art, also by Mar Williams.

IMG_0173.JPG
Darien Acosta

One of the cafes near the Paris Casino was designated for exclusive use by Defcon attendees.

IMG_0174.JPG
Darien Acosta
Advertisement

This is a typical line experience when attending scheduled talks. Defcon is so massive that a single individual can only attend a minute fraction of the available track talks, skytalks, village talks, contests, and workshops — not to mention any of the secret, invite-only gatherings.

IMG_0203.JPG
Darien Acosta

This is the "Medical Devices: Pwnage and Honeypots" talk given by Scott Erven and Mark Collao. When I arrived, only standing-room space remained.

IMG_0184.JPG
Darien Acosta
Advertisement

At the talk, I learned that many of General Electric's medical devices feature remote access capabilities that use default factory passwords, such as "bigguy."

IMG_0185.JPG
According to the speakers, GE claims this is not a real security problem because default passwords can be changed, but the speakers argue that, according to existing license agreements, if a medical provider changes the password, then the device is no longer eligible for troubleshooting — something akin to voiding a warranty. Default passwords are problematic because they can allow any knowledgeable patient to alter their morphine drip or an outside hacker to change the radiation setting on CT machines, exposing patients to harmful levels of radiation without a medical tech or doctor's knowledge. There is little precedent for dealing with these new problems. Darien Acosta

This is the Defcon Contest Area, in the Bally's Event Center.

IMG_5765.JPG
Darien Acosta
Advertisement

The Contest Area is home to the Packet, Car Hacking, and Data villages; Capture the Flag; OpenCTF; Mohawk-Con; and a music stage.

IMG_0244.JPG
Darien Acosta

Here's a guy inspecting a semi-disassembled SUV in the Car Hacking Village.

IMG_5777.JPG
Darien Acosta
Advertisement

Hackers could learn a lot about vulnerabilities in vehicles in the village.

IMG_0214.JPG
Darien Acosta

Some SUV parts.

IMG_5776.JPG
Darien Acosta
Advertisement

Someone removed and mounted the dashboard from a sedan.

A look inside the stripped car.

IMG_5771.JPG
Darien Acosta
Advertisement

IMG_5772.JPG
Darien Acosta

IMG_5774.JPG
Darien Acosta
Advertisement

IMG_0251.JPG
Darien Acosta

A Tesla Model S was also present at the Car Hacking Village, but mostly for show.

IMG_5769.JPG
Darien Acosta
Advertisement

Karaoke at the Car Hacking Village. This guy's singing Gary Numan's "Cars."

IMG_5801.JPG
♪ Here in my car / I feel safest of all / I can lock all my doors / It's the only way to live ♪ Darien Acosta

Capture the Flag is a hacking tournament comprised of 20 teams of eight who qualify in order to participate. The competition arguably attracts some of best hackers in the world.

IMG_5781.JPG
Darien Acosta
Advertisement

There is also an OpenCTF event, where anyone can participate.

IMG_5784.JPG
Darien Acosta

Folks participating in the OpenCTF contest.

IMG_5780.JPG
Darien Acosta
Advertisement

This is the FTC RoboKiller contest table, a $50,000 contest challenging programmers to create software to help consumers identify and kill illegal robocalls.

IMG_0223.JPG
Darien Acosta

Salvador Grec presents his talk "Creating REAL Threat Intelligence with Evernote" in the Packet Hacking Village.

IMG_5794.JPG
Darien Acosta
Advertisement

The epicenter of the Packet Hacking Village.

IMG_5796.JPG
Darien Acosta

The infamous Wall of Sheep is intended to shame conference-goers who exhibit poor computer security practices. For example, connecting to the WiFi network and logging into an unencrypted website will get you added to this list.

IMG_5793.JPG
Darien Acosta
Advertisement

Now over to the Emerging Technology Threats table.

IMG_5790.JPG
Darien Acosta

This is a SCADA system. Variations of these systems are used to monitor and control factory equipment, power plants, water treatment facilities, etc.

IMG_5786.JPG
Darien Acosta
Advertisement

All about Open Access 4.0.

IMG_5788.JPG
Darien Acosta

Not 100% sure, but this looks like a security keypad terminal connected to an Open Access 4.0 board.

IMG_5787.JPG
Darien Acosta
Advertisement

Mike Ryan and Richo Healey drink with the Defcon Goons during their "Hacking Electric Skateboards" talk.

IMG_5761.JPG
Darien Acosta

Mike Ryan and Richo Healey are able to hack — i.e., take command — of various skateboard models by jamming radio signals and broadcasting their own signals.

IMG_5762.JPG
Darien Acosta
Advertisement

At Defcon's Vendor Area, a wide variety of items can be legally purchased.

IMG_5752.JPG
Darien Acosta

Here's the Hak5 table. The giant pineapple advertises the infamous WiFi pineapple device, which broadcasts a WiFi honeypot (trap) that can be used for penetration testing (hacking).

IMG_5749.JPG
Darien Acosta
Advertisement

Hak5 also sells the Lan Turtle — a USB device which opens backdoors for hackers wishing to connect to a network remotely — and the Rubber Ducky USB key, which can be used to capture all text entered on a keyboard and more. Prices are reasonable.

IMG_5760.JPG
Darien Acosta

Lockpick sets are also for sale. Caveat emptor: Possession of lockpicks may be considered burglary tools in several US states.

IMG_5756.JPG
Darien Acosta
Advertisement

Free internet = giant antennas that can allow you to connect to your neighbor's open WiFi access point down the street.

IMG_5751.JPG
Darien Acosta

Vinyl stickers for decorating laptops.

IMG_5754.JPG
Darien Acosta
Advertisement

Books for sale.

IMG_0196.JPG
Darien Acosta

IMG_0197.JPG
Darien Acosta
Advertisement

Hackers for Charity is a nonprofit that's solving technology challenges for various other nonprofits and provides food, equipment, job training, and computer education to the world's poorest citizens.

IMG_5753.JPG
Darien Acosta

Meanwhile, back at the casino, someone set up a rouge WiFi access point, which was promptly removed by Goons and casino security.

imgur
Advertisement

This DARPA server contains more than 1,000 Xeon processors and runs software which algorithmically scans software for weak points and patches on the fly. This is probably the early stages of an artificial intelligence that is capable of attacking and defending computer networks autonomously.

IMG_5730.JPG
William Gibson fans should immediately think of I.C.E. Darien Acosta

The DARPA Cyber Grand Challenge is a $3.7 million prize competition that "seeks to create automatic defensive systems capable of reasoning about flaws, formulating patches, and deploying them on a network in real time."

IMG_5747.JPG
Darien Acosta
Advertisement

IMG_5748.JPG
Darien Acosta

You can read more about the DARPA Cyber Grand Challenge here

Here's a view of the "Chillout Room," a place to relax, eat, drink, and chat with fellow attendees while listening to Chillout music.

IMG_5731.JPG
Darien Acosta
Advertisement

At the ICS Village, there are industrial control system devices available for tinkering.

BTW: This is not actually a centrifuge for nuclear enrichment.

Some examples of controls that can be breached.

IMG_0213.JPG
Darien Acosta
Advertisement

During one of the ICS talks, someone caused a drum barrel to violently collapse under the pressure of a vacuum, providing a perfect demonstration of the potential real-world consequences of ICS tinkering.

The shock wave shook the room.

In the IoT Village, I learned about the various ways many Internet of Things devices can be hacked.

IMG_0202.JPG
Darien Acosta
Advertisement

At the BioHacking Village, I learned about the MinION, a $1,000 USB device by Nanopore Technologies, which is used to sequence DNA.

IMG_0193.JPG
Darien Acosta

At night, attendees can retreat to the 26th floor for musical entertainment at Defcon's Black-and-White Ball.

IMG_5738.JPG
Darien Acosta
Advertisement

The view from the party.

IMG_0190.JPG
Darien Acosta

Or attend any of the many private parties. As in life, attendees at Defcon chooses their own adventure.

IMG_0191.JPG
FYI: You may have to social engineer or bribe your way in. Darien Acosta
Advertisement
Close icon Two crossed lines that form an 'X'. It indicates a way to close an interaction, or dismiss a notification.