

Workshops, villages, and parties are also part of DEF CON. CTF has been used as a model at other hacking conferences, as well as in academic and military settings (as red team exercises).
Blackhat defcon conference 2018 software#
The most well-known of these competitions is Capture the Flag, which is a hacking competition in which teams of hackers seek to assault and defend computers and networks using software and network structures. Lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt, and Capture the Flag (CTF) are among the other contests. DEF CON is famed for its contests, which range from constructing the longest Wi-Fi connection to figuring out the best way to cool a drink in the Nevada heat. The conference features many speaker tracks covering a wide range of computer and hacking issues, cyber-security challenges, and competitions known as hacking wargames. DEF CON, founded in 1993 by Jeff Moss, is today regarded as one of the world’s most prominent and well-known computer security conferences.Ĭomputer security specialists, journalists, lawyers, federal government personnel, security researchers, students, and hackers are among those who attend the event.ĭEF CON serves as a forum for the newest innovations in software, computer architecture, hardware modification, conference badges, and anything else that can be “hacked.” It is also known as DEFCON, Defcon, or DC. DEF CON is an annual hacker convention held in Las Vegas, Nevada.
