Recent from talks
Contribute something
Nothing was collected or created yet.
DEF CON
View on Wikipedia| Status | Active |
|---|---|
| Genre | Security Conference, Hacker Conference |
| Frequency | Annual |
| Venue | Varies |
| Locations | Las Vegas, Nevada |
| Country | United States |
| Years active | 32 |
| Inaugurated | June 9, 1993[1] |
| Founder | Jeff Moss |
| Previous event | August 7–10, 2025 |
| Attendance | Over 30,000 |
| Website |
|
| Part of a series on |
| Computer hacking |
|---|
DEF CON (also written as DEFCON, Defcon, or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.[3]
Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt, and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition in which teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as red team exercises).
Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, DHS (via CISA) and other agencies regularly attend DEF CON.[4][5] Some have considered DEF CON to be the "world's largest" hacker conference given its attendee size and the number of other conferences modeling themselves after it.
History
[edit]DEF CON was founded in 1993, by then 18-year-old Jeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a FidoNet protocol based hacking network from Canada.[6] The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEF CON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a telephone keypad, a reference to phreakers.[7] The official name of the conference includes a space in-between DEF and CON.
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success.[8] In 2019, an estimated 30,000 people attended DEF CON 27.[9]
For DEF CON's 20th Anniversary, a film was commissioned entitled DEF CON: The Documentary.[10] The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to COVID-19.[11]
In 2020, due to safety concerns over COVID-19 the DEF CON 28 in-person Las Vegas event was cancelled[12] and replaced with DEF CON Safe Mode,[13] a virtual event planned for the same August 6–9 dates as DC 28.
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via Twitch and Discord). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a 3rd party) were given a wristband which was required for entry into the conference areas.[14]
Components
[edit]Handles
[edit]Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder Jeff Moss' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the conference and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
Badges
[edit]
A notable part of DEF CON is the conference badge, which identifies attendees and ensures attendees can access conference events and activities. The DEF CON badge has historically been notable because of its changing nature, sometimes being an electronic badge (PCB), with LEDs, or sometimes being a non-electronic badge such as a vinyl record. Conference badges often contain challenges or callbacks to hacker or other technology history, such as the usage of the Konami Code in the DEF CON 24 badge, or the DEF CON 25 badge reverting to the look of the DEF CON 1 badge. DEF CON Badges do not (generally) identify attendees by name; however, the badges are used to differentiate attendees from others. One way of doing this has been to have different badges, a general conference attendee (HUMAN) badge, a Staff member (GOON), Vendor, Speaker, Press, and other badges. In addition, individuals and organizations have begun creating their own badges in what has become known as badgelife. These badges may be purchased in many cases, or earned at the conference by completing challenges or events. Some badges may give the holder access to after hours events at the conference. In 2018, the evolution of this came with what was termed "shitty addon's" or SAOs. These were miniature (usually) PCBs that connected to the official and other badges that may extend functionality or were just collected.[15][16]
Villages
[edit]Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village, Recon, Biohacking, lockpicking, ham radio, and the well known Social Engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.[17][18]
Internal Conferences
[edit]DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
- Queercon, a meetup of LGBTQ community.
- Linecon, any long line has the potential to turn into a con.
- QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
Workshops
[edit]Workshops are dedicated classes on various topics related to information security and related topics. Historical workshops have been held on topics such as Digital Forensics investigation, hacking IoT devices, playing with RFID, fuzzing and attacking smart devices.
Fundraising
[edit]Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation (EFF). The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
Contests
[edit]Within DEF CON there are many contests and events which range from, Capture the Flag, Hacker Jeopardy,[19] Scavenger Hunt,[20] Capture the Packet, Crash and Compile,[21] and Hackfortress[22] to name a few.
Black Badge
[edit]The Black Badge is the highest award DEF CON gives to contest winners of certain events. Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.[23]
In April 2017, a DEF CON Black Badge was featured in an exhibit[24] in the Smithsonian Institution's National Museum of American History entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System,[25] the winner of the DARPA 2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
Capture the flag
[edit]The first instance of the DEF CON CTF was held in 1996, at the 4th DEF CON, and has been held since then every year.[26] It's one of the few CTF in the attack/defense format. The prize of the winning team is a couple of black badges.[27]
| Year | DEF CON | Competing Teams | Organizers | Architecture | Platform | Winning Team |
|---|---|---|---|---|---|---|
| 1996 | 4 | Goons | AJ Reznor | |||
| 1997 | 5 | Goons | AJ Reznor | |||
| 1998 | 6 | Goons | SNI | |||
| 1999 | 7 | Goons | Ghetto Hackers | |||
| 2000 | 8 | Goons | Ghetto Hackers | |||
| 2001 | 9 | Goons | Multiple | Ghetto Hackers & digirev | ||
| 2002 | 10 | Ghetto Hackers | Redhat 6.2 | Digital Revelation | ||
| 2003 | 11 | 8 | Ghetto Hackers | OpenBSD | Anomaly | |
| 2004 | 12 | 8 | Ghetto Hackers | i386 | Windows | sk3wl0fr00t |
| 2005 | 13 | 8 | Kenshoto | i386 | FreeBSD 5.4 | shellphish |
| 2006 | 14 | 8 | Kenshoto | i386 | Solaris 10 | 1@stplace |
| 2007 | 15 | 8 | Kenshoto | i386 | FreeBSD | 1@stplace |
| 2008 | 16 | 8 | Kenshoto | i386 | FreeBSD | Sk3wl of Root |
| 2009 | 17 | 9 | DDTEK | i386 | FreeBSD | VedaGodz[29] |
| 2010 | 18 | 12 | DDTEK | i386 | FreeBSD & Debian | ACME Pharm[30] |
| 2011 | 19 | 12 | DDTEK | i386 | FreeBSD | European Nopsleders[31] |
| 2012 | 20 | 20 | DDTEK | i386 | FreeBSD | Samurai |
| 2013 | 21 | 20 | Legitimate Business Syndicate | armv7 | Linux | Plaid Parliament of Pwning |
| 2014 | 22 | 20 | Legitimate Business Syndicate | armv7 & i386 | Linux | Plaid Parliament of Pwning |
| 2015 | 23 | 15 | Legitimate Business Syndicate | MIPS, x86 & armv7 | Linux | DEFKOR |
| 2016 | 24 | 15 | Legitimate Business Syndicate | i386 | DECREE | Plaid Parliament of Pwning |
| 2017 | 25 | 15 | Legitimate Business Syndicate | cLEMENCy | cLEMENCy | Plaid Parliament of Pwning |
| 2018 | 26 | 24 | Order Of the Overflow | MIPS, x86 & armv7 | Linux | DEFKOR00T[32] |
| 2019 | 27 | 16 | Order Of the Overflow | x86, arm64, esoteric | Linux, iOS, Xbox | Plaid Parliament of Pwning[33] |
| 2020 | 28 | 16 | Order Of the Overflow | x86, esoteric | Linux | A*0*E[34] |
| 2021 | 29 | 16 | Order Of the Overflow | x86, microengine | Linux | Katzebin[35] |
| 2022 | 30 | 16 | Nautilus Institute | mixed | Maple Mallard Magistrates[36] | |
| 2023 | 31 | 12 | Nautilus Institute | mixed | Maple Mallard Magistrates[37] | |
| 2024 | 32 | 12 | Nautilus Institute | mixed | Maple Mallard Magistrates[38] |
Capture the Flag History
[edit]In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.[39]
In 2002, the company Immunix took part in the game under the moniker "immunex",[40] to benchmark the security of their Linux-based operating system, with modifications including StackGuard, FormatGuard, OpenWall's non-executable stack, SubDomain (the ancestor of AppArmor), ...[41] Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised.[42] It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.[43]
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.[44]
In 2008, the Sk3wl of Root team took advantage of a bug in the game (privilege dropping and forking were inverted), allowing them to have such a massive lead that they spent most of the CTF playing Guitar Hero.[45][46]
In 2009, it was announced[47] that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was the organizer.[27] "Hacking the top hacker contest seemed like a fun way to introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the DEF CON 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.[27]
In 2011, the team "lollerskaters dropping from roflcopters" used a 0day in FreeBSD (namely CVE-2011-4062[48]) to escape jails, causing havoc in the game's infrastructure.[49]
In 2016, the 15th edition of the CTF was done in partnership with the DARPA, as part of its Cyber Grand Challenge program, where teams wrote autonomous systems to play the game without any human interaction.[50]
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a middle-endian with 9 bits bytes CPU. With its specifications released only 24 hours before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.[51]
Groups
[edit]DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the 2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online.[52] DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.
Notable incidents
[edit]Following are a list of high-profile issues which have garnered significant media attention.
| Year | Description |
|---|---|
| 1999 | On July 10, 1999, the Cult of the Dead Cow hacker collective released Back Orifice 2000 (later discovered to be infected with the CIH virus) at DEF CON 7,[53] in what was, at the time, the largest presentation in DEF CON history. |
| 2001 | On July 16, 2001, Russian programmer Dmitry Sklyarov was arrested the day after DEF CON for writing software to decrypt Adobe's e-book format.[54] |
| 2005 | On July 31, 2005, Cisco used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the Cisco IOS used on routers.[55] |
| 2007 | In August 2007, Michelle Madigan, a reporter for Dateline NBC, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened.[56] A DEF CON source at NBC had tipped off organizers to Madigan's plans.[4] |
| 2008 | MIT students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston T subway.[57] However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the Computer Fraud and Abuse Act (CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares.[58][59] The court issued a temporary restraining order prohibiting the students from disclosing the material for a period of ten days, despite the fact the material had already been disseminated to DEF CON attendees at the start of the show. In 2008's contest "Race to Zero," contestants submitted a version of given malware which was required to be undetectable by all of the antivirus engines in each round. The contest concept attracted much negative attention.[60][61] |
| 2009 | WIRED[62] reported that an ATM kiosk was positioned in the conference center of the Riviera Hotel Casino capturing data from an unknown number of hackers attending the DEF CON hacker conference. |
| 2011 | Security company HBGary Federal used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference.[63] |
| 2012 | The director of the National Security Agency, Keith B. Alexander, gave the keynote speech.[64] During the question and answers session, the first question for Alexander,[64] fielded by Jeff Moss,[65] was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense."[64]
On March 12, 2013, during a United States Senate Select Committee on Intelligence hearing, Senator Ron Wyden quoted the 2012 DEF CON keynote speech and asked Director of National Intelligence James Clapper if the U.S. conducted domestic surveillance; Clapper made statements saying that there was no intentional domestic surveillance.[64] In June 2013, NSA surveillance programs which collected data on US citizens, such as PRISM, had been exposed. Andy Greenberg of Forbes said that NSA officials, including Alexander, in the years 2012 and 2013 "publicly denied–often with carefully hedged words–participating in the kind of snooping on Americans that has since become nearly undeniable."[64] |
| 2013 | On July 11, 2013, Jeff Moss posted a statement,[66] located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year."[67] This was the first time in the organization's history that it had asked federal authorities not to attend.[66] Actor Will Smith visited the convention to study the DEF CON culture for an upcoming movie role.[68] |
| 2016 | On August 4, 2016, DEF CON and DARPA co-hosted the 2016 Cyber Grand Challenge, a first-of-its-kind all-machine hacking tournament. Competing teams had to create a bot capable of handling all aspects of offense and defense with complete autonomy. Seven finalists competed for a US$2M grand prize.[69]
The winner of the Cyber Grand Challenge was "Mayhem", an AI created by ForAllSecure of Pittsburgh, Pennsylvania.[69][70] Mayhem then went on to participate in the previously humans-only DEF CON Capture the Flag Contest,[71] where it finished in last place, despite pulling ahead of human teams often in a contest for which it was not specifically designed. |
| 2017 | At the "Voting Machine Village" event, dozens of voting machines brought to the conference were breached.[72]
In September 2017, the Voting Machine Village produced "DEF CON 25 Voting Machine Hacking Village: Report on Cyber Vulnerabilities in US Election Equipment, Databases and Infrastructure" summarizing its findings. The findings were publicly released at an event sponsored by the Atlantic Council[73] and the paper went on to win an O'Reilly Defender Research Award.[74] Marcus Hutchins, better known online by his handle MalwareTech, the 23-year-old British security researcher who was credited with stopping the WannaCry outbreak was arrested by the FBI at the airport preparing to leave the country after attending DEF CON over his alleged involvement with the Kronos banking trojan.[75] |
| 2018 | In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award.[76] The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan. |
| 2020 | On May 8, 2020, the DEF CON in-person conference itself was cancelled[77] and virtualized due to COVID-19. DEF CON Safe Mode[78] was held August 6–9 online with a full roster of talks, villages, contests and events. |
| 2024 | On February 4, 2024, Caesar's Entertainment cancelled the contract with DEF CON without warning[79] with speculation that a ransomware attack[80] and bomb scare and subsequent evacuation[81] in 2023 were in part to blame. The conference was moved to the Las Vegas Convention Center as a result. |
Entertainment references
[edit]- DEF CON was also portrayed in The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
- A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by Winn Schwartau, demonstrates some of the early DEF CON culture.[82]
- A trip to DEF CON for a hacker showdown figures into the plot of The Signal. Director William Eubank came to Las Vegas and screened the film at DEF CON Movie Night.
- A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of Jason Bourne, the fifth film of the Bourne film series. The primary antagonist of the film, a fictionalized CIA director, played by Tommy Lee Jones, is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, NSA director Keith B. Alexander.
- In the Mr. Robot Season 3 opener "eps3.0_power-saver-mode.h" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. Sharp-eyed viewers will notice DEF CON's smiley-face-and-crossbones mascot Jack among the set decorations.
- Documentarian Werner Herzog included DEF CON in his 2016 film Lo and Behold, Reveries of the Connected World, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
Venues, dates, and attendance
[edit]Each conference venue and date has been extracted from the DEF CON archives for easy reference.[83]
| Conference Name | Venue | Duration | Year | Attendance |
|---|---|---|---|---|
| DEF CON 33 | Las Vegas Convention Center | August 7–10 | 2025 | ~26,000[84] |
| DEF CON 32 | Las Vegas Convention Center, and The Sahara[85] | August 8–11 | 2024 | N/A |
| DEF CON 31 | Caesars Forum, Flamingo, Harrah's Hotel, and Linq Hotel | August 10–13 | 2023 | ~25,000[citation needed] |
| DEF CON 30 | Caesars Forum, Flamingo, Harrah's Hotel, and Linq Hotel | August 11–14 | 2022 | ~25,000[citation needed] |
| DEF CON 29 | Paris Hotel and Bally's Hotel | August 5–8 | 2021 | ~8,700[citation needed] |
| DEF CON Safe Mode | Virtual event | August 6–9 | 2020 | N/A |
| DEF CON 28 | Planned Caesars Forum, Harrah's, The Linq, and Flamingo | August 6–9 | 2020 | 0[86] |
| DEF CON 27 | Paris Hotel, Bally's Hotel, Planet Hollywood, and Flamingo | August 8–11 | 2019 | ~30,000[9] |
| DEF CON China 1.0 | 751 D-Park | May 31–June 2 | 2019 | Unknown |
| DEF CON 26 | Caesars Palace and Flamingo | August 9–12 | 2018 | 28,000[87] |
| DEF CON China [Beta] | Kuntai Hotel (Beijing) | May 11–13 | 2018 | Unknown |
| DEF CON 25 | Caesars Palace | July 27–30 | 2017 | 25,000[88] |
| DEF CON 24 | Paris Hotel and Bally's Hotel | August 4–7 | 2016 | 22,000[89] |
| DEF CON 23 | Paris Hotel and Bally's Hotel | August 6–9 | 2015 | 16,000+[90] |
| DEF CON 22 | Rio Hotel & Casino | August 7–10 | 2014 | 16,000[91] |
| DEF CON 21 | Rio Hotel & Casino | August 1–4 | 2013 | 12,000[91] |
| DEF CON 20 | Rio Hotel & Casino | July 26–29 | 2012 | Unknown |
| DEF CON 19 | Rio Hotel & Casino | August 4–7 | 2011 | Unknown |
| DEF CON 18 | Riviera Hotel & Casino | July 30–August 1 | 2010 | Unknown |
| DEF CON 17 | Riviera Hotel & Casino | July 30–August 2 | 2009 | Unknown |
| DEF CON 16 | Riviera Hotel & Casino | August 8–10 | 2008 | 8,000[92] |
| DEF CON 15 | Riviera Hotel & Casino | August 3–5 | 2007 | Unknown |
| DEF CON 14 | Riviera Hotel & Casino | August 4–6 | 2006 | Unknown |
| DEF CON 13 | Alexis Park Resort | July 29–31 | 2005 | Unknown |
| DEF CON 12 | Alexis Park Resort | July 30–August 1 | 2004 | Unknown |
| DEF CON 11 | Alexis Park Resort | August 1–3 | 2003 | Unknown |
| DEF CON 10 | Alexis Park Resort | August 2–4 | 2002 | Unknown |
| DEF CON 9 | Alexis Park Resort | July 13–15 | 2001 | Unknown |
| DEF CON 8 | Alexis Park Resort | July 28–30 | 2000 | Unknown |
| DEF CON 7 | Alexis Park Resort | July 9–11 | 1999 | Unknown |
| DEF CON 6 | Plaza Hotel & Casino | July 31–August 2 | 1998 | Unknown |
| DEF CON 5 | Aladdin Hotel & Casino | July 11–13 | 1997 | Unknown |
| DEF CON 4 | Monte Carlo Resort and Casino | July 26–28 | 1996 | Unknown |
| DEF CON 3 | Tropicana Resort & Casino | August 4–6 | 1995 | Unknown |
| DEF CON 2 | Sahara Hotel and Casino | July 22–24 | 1994 | ~200 |
| DEF CON 1 | Sands Hotel and Casino | June 9–11 | 1993 | ~100 |
See also
[edit]- Black Hat Briefings
- Chaos Communication Congress (C3)
- Electronic voting
- Hack-Tic, a quadrennial European convention
- Hackers on Planet Earth (HOPE)
- Security BSides, a community supported conference with locations across the globe
- Summercon, the first American hacker conference, organized by members of Phrack
- ToorCon, a yearly hacker conference held in San Diego, California since 1999
References
[edit]- ^ "Def Con 1 Archive". Retrieved 2017-04-23.
- ^ "Defcon Onion Links". defcon.org.
- ^ "DefCon Beverage Cooling Contraption Contest". deviating.net. Archived from the original on 2024-08-15.
- ^ a b Zetter, Kim (3 August 2007). "Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape". Wired Blog Network. Retrieved 2007-08-15.
According to DefCon staff, Madigan had told someone she wanted to out an undercover federal agent at DefCon. That person in turn warned DefCon about Madigan's plans. Federal law enforcement agents from FBI, DoD, United States Postal Inspection Service and other agencies regularly attend DefCon to gather intelligence on the latest techniques of hackers.
- ^ "DEFCON 15 FAQ's". Retrieved 9 Feb 2011.
Lots of people come to DEFCON and are doing their job; security professionals, federal agents, and the press.
- ^ Tangent, The Dark. "DEF CON® Hacking Conference – About". www.defcon.org. Retrieved 2016-03-12.
- ^ "DEFCON about".
- ^ Jeff Moss (July 30, 2007). The Story of DEFCON. Retrieved 9 Feb 2011.
- ^ a b "Def Con 27 Transparency Report - DEF CON Forums". forum.defcon.org. Retrieved 2019-08-17.
- ^ DEFCON: The Documentary at IMDb
- ^ "Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled". The Register.
- ^ Newman, Lily Hay. "Defcon is Cancelled". Wired.
- ^ "DEF CON 28 Safe Mode FAQ".
- ^ "DEF CON 29 FAQ".
- ^ Oberhaus, Daniel (September 18, 2018). "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards". Vice Motherboard. Retrieved January 14, 2019.
- ^ McAllister, Neil (August 12, 2015). "Is this the most puzzling DEF CON attendee badge yet on record?". The Register UK. Retrieved January 14, 2019.
- ^ Molina, Brett (August 14, 2018). "11-year-old hacks replica of Florida state website, changes election results". USA Today. Retrieved January 14, 2019.
- ^ "Home". Aerospace Village.
- ^ "Hacker Jeopardy for DEF CON 28". www.dfiu.tv. Retrieved 2024-01-29.
- ^ "DEF CON Scavenger Hunt". DEF CON Scavenger Hunt. Retrieved 2024-01-29.
- ^ "DEF CON Crash and Compile Contest". crashandcompile.org. Retrieved 2024-01-29.
- ^ "Hackfortress". hackfortress.net. Retrieved 2024-01-29.
- ^ Tangent, The Dark. "DEF CON® Hacking Conference – Black Badge Hall of Fame". www.defcon.org. Retrieved 2016-03-12.
- ^ "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". americanhistory.si.edu. 20 April 2017.
- ^ "Mayhem Wins DARPA CGC". Archived from the original on 2019-02-15. Retrieved 2017-04-24.
- ^ Moss, Jeff. "DEF CON Hacking Conference - Capture the Flag Archive".
- ^ a b c d vulc@n of DDTek (2023). "A history of Capture the Flag at DEF CON".
- ^ "A Brief History of CTF". psifertex.github.io. Retrieved 2023-12-20.
- ^ "Diutinus Defense Techonologies Corp. / DC17". ddtek.biz. Retrieved 2023-12-27.
- ^ "Diutinus Defense Techonologies Corp. / DC18". ddtek.biz. Retrieved 2023-12-27.
- ^ "Diutinus Defense Techonologies Corp. / Home". ddtek.biz. Retrieved 2023-12-27.
- ^ "DEF CON CTF 2018". OOO — DEF CON CTF. Retrieved 2023-12-21.
- ^ "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
- ^ "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
- ^ "OOO — DEF CON CTF". OOO — DEF CON CTF. Retrieved 2023-12-21.
- ^ "CTFtime.org / DEF CON CTF 2022". CTFtime. Retrieved 2024-09-06.
- ^ "CTFtime.org / DEF CON CTF 2023". CTFtime. Retrieved 2024-09-06.
- ^ "CTFtime.org / DEF CON CTF 2024". CTFtime. Retrieved 2024-09-09.
- ^ Riley, Eller (2004). "Capture the Flag Games" (PDF).
- ^ "Defcon 9 - Capture The Flag Contest Network". 2001-07-09.
- ^ "4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download". slideplayer.com. Retrieved 2023-12-21.
- ^ Crispin, Cowan (May 2003). "Defcon Capture the Flag: defending vulnerable code from intense attack". DARPA Information Survivability Conference and Exposition. 2 (2003).
- ^ Ghettohackers. "Defcon 10 - Capture the Flag (CTF) contest".
- ^ The Ghetto Hackers (June 29, 2003). "Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11".
- ^ Jordan (2021-04-06), A Brief History of CTF, retrieved 2023-12-20
- ^ A Brief History of CTF - Jordan Wiens. 2018-03-28. Event occurs at 35:41.
- ^ "Diutinus Defense Techonologies Corp. / Home". 2011-05-14. Archived from the original on 2011-05-14. Retrieved 2023-12-21.
- ^ The FreeBSD Project (2011-09-28). "Buffer overflow in handling of UNIX socket addresses".
- ^ routardz. "Defcon 19 CTF - CTF Inside". Retrieved 2023-12-20.
- ^ "Cyber Grand Challenge (CGC) (Archived)". www.darpa.mil. Archived from the original on 2019-06-10. Retrieved 2023-12-20.
- ^ Unknown. "cLEMENCy - Showing Mercy". Retrieved 2023-12-20.
- ^ "Official forums social group section for DEF CON groups". DEF CON Forums. Retrieved 2023-02-25.
- ^ Nuttall, Chris (1999-07-13). "Back Orifice is child's play, say virus firms". BBC News. Retrieved 2024-10-21.
- ^ "Russian computer programmer arrested at hacker conference". CBC. 2001-07-19. Retrieved 2024-10-21.
- ^ Lamos, Rob (31 July 2005). "Exploit writers team up to target Cisco routers". SecurityFocus. Archived from the original on 2012-07-28. Retrieved 2004-07-31.
- ^ Cassel, David (4 August 2007). "Transcript: Michelle Madigan's run from Defcon". Tech.Blorge.com. Archived from the original on 2007-09-08. Retrieved 2007-08-15.
- ^ Lundin, Leigh (2008-08-17). "Dangerous Ideas". MBTA v DefCon 16. Criminal Brief. Retrieved 2010-10-07.
- ^ Jeschke, Rebecca (2008-08-09). "MIT Students Gagged by Federal Court Judge". Press Room. EFF.
- ^ Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology (United States District Court District of Massachusetts), Text.
- ^ "Race to Zero". Archived from the original on 2011-11-18. Retrieved 2008-06-09. Contest concept.
- ^ McMillan, Robert (April 2008). "Antivirus Vendors Slam Defcon Virus Contest". IDG News Service. Archived from the original on 2024-03-19. Retrieved 2024-03-19.
- ^ Zetter, Kim. "Malicious ATM Catches Hackers". Wired – via www.wired.com.
- ^ Fisher, Dennis; Roberts, Paul (August 10, 2011). "Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON". Business Security. Archived from the original on 2011-08-10.
- ^ a b c d e Greenberg, Andy. "Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)." Forbes. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted[...]"
- ^ Wagenseil, Paul. "Hackers Don't Believe NSA Chief's Denial of Domestic Spying." (Archive) NBC News. August 1, 2012. Retrieved on June 13, 2013.
- ^ a b Whitney, Lance. "Defcon to feds: 'We need some time apart'". CNET. July 11, 2013. Retrieved on July 12, 2013. [dead link]
- ^ Blue, Violet. "Feds 'not welcome' at DEF CON hacker conference". ZDNet. July 11, 2013. Retrieved on July 11, 2013.
- ^ Constantin, Lucian (2013-08-05). "Will Smith makes unexpected appearance at Defcon hacker conference". PCWorld. Retrieved 2024-10-21.
- ^ a b Pellerin, Cheryl. "Three Teams Earn Prizes in DARPA Cyber Grand Challenge". U.S. Department of Defense. Retrieved 2024-10-21.
- ^ "ForAllSecure | Mayhem Security | Application Security". ForAllSecure.
- ^ "DEF CON Capture the Flag Final Scores". blog.legitbs.net.
- ^ Joe Uchill (July 29, 2017). "Hackers breach dozens of voting machines brought to conference". The Hill. Thehill.com. Retrieved 2 August 2017.
- ^ "DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 | C-SPAN.org". C-SPAN.org. Retrieved 2017-12-08.
- ^ "O'Reilly Security Conference in NYC 2017 Defender Awards". conferences.oreilly.com. Retrieved 2017-12-08.
- ^ Hern, Alex; Levin, Sam (August 4, 2017). "Briton who stopped WannaCry attack arrested over separate malware claims". The Guardian. ISSN 0261-3077. Retrieved August 11, 2017.
- ^ @VotingVillageDC (6 March 2018). "WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…" (Tweet) – via Twitter.
- ^ "DEF CON 28 in-person conference is CANCELLED - DEF CON Forums". forum.defcon.org. Retrieved 2020-05-08.
- ^ "DEF CON Safe Mode archive site".
- ^ Thompson, Ian. "DEF CON is canceled! No, really this time – but the show will go on". The Register. Retrieved 12 September 2024.
- ^ Khaitan, Ashish (14 September 2023). "Caesars Ransomware Attack, MGM Hit Linked To DEFCON?". Retrieved 12 September 2024.
- ^ Thompson, Ian. "Bomb scare causes mass evacuation at DEF CON". The Register. Retrieved 12 September 2024.
- ^ Winn Schwartau. "Cyber Christ Meets Lady Luck" (PDF). Archived from the original (PDF) on 18 July 2011. Retrieved 9 Feb 2011.
- ^ "DEF CON® Hacking Conference – Show Archives". www.defcon.org. Retrieved 2016-04-09.
- ^ Moss, Jeff (August 21, 2025). "DC33 Attendance". Reddit. Retrieved September 12, 2025.
- ^ "DEF CON 32 Was Canceled. We Un-Canceled it". Retrieved 2024-02-04.
- ^ Newman, Lily Hay. "Defcon Is Canceled". Wired. ISSN 1059-1028. Retrieved 2023-02-25.
- ^ ""DEF CON Transparency"". August 2018. Retrieved 2018-10-28.
- ^ ""Voting Machine Hacking Village"" (PDF). September 2017. p. 4. Retrieved 2018-05-17.
- ^ ""Norton at DefCon"". September 2019. Archived from the original on 2020-06-25. Retrieved 2019-09-15.
- ^ ""Gray Tier Technologies at DEFCON23"". August 2015. Retrieved 2019-09-15.[permanent dead link]
- ^ a b Richard Byrne Reilly (2014-08-12). ""Black Hat and Defcon see record attendance — even without the government spooks"". Retrieved 2017-06-07.
- ^ "DEF CON 17 FAQ". Retrieved 2018-07-07.
Further reading
[edit]- " DEF CON's Moss: Undercover Reporter Damages 'Neutral Zone' Archived 2019-09-24 at the Wayback Machine." Information Week. August 6, 2007.
- Greenberg, Andy (August 10, 2023). "Teens Hacked Boston Subway Cards to Get Infinite Free Rides—and This Time, Nobody Got Sued". Wired. Retrieved 2023-08-10.
- Mills, Elinor. "NSA director finally greets DEF CON hackers." CNET. July 27, 2012.
- Newman, Lily Hay "To Fix Voting Machines, Hackers Tear Them Apart" WIRED August 1, 2017.
External links
[edit]DEF CON
View on GrokipediaHistory
Founding and Early Years
DEF CON was founded by Jeff Moss, known by the handle Dark Tangent, in 1993 as an informal gathering for members of online hacker communities he participated in, including a farewell event for a friend exiting the scene from the Platinum Net network.[8] The inaugural DEF CON 1 occurred from June 9 to 11, 1993, at the Sands Hotel & Casino in Las Vegas, Nevada, drawing approximately 100 attendees focused on technical discussions rather than commercial or institutional agendas.[9] [10] Presentations at the event covered emerging security concerns, including Dan Farmer's announcement of the Security Administrator Tool for Analyzing Networks (SATAN), a vulnerability scanning program; Mark Ludwig's talk on virus development; and sessions on UNIX security, computer privacy, and hacking ethics.[9] These early talks emphasized practical demonstrations and peer-to-peer knowledge sharing among participants from the hacker underground, without formal vetting or corporate sponsorship.%20-%20Audio.m4b) In its initial years, DEF CON expanded modestly but steadily, with DEF CON 2 held July 22–24, 1994, at the Sahara Hotel and Casino, attracting around 200 participants and introducing more structured elements like contests.[11] Subsequent editions shifted to larger venues, such as the Tropicana Hotel for DEF CON 3 (August 4–6, 1995) and the Monte Carlo Resort for DEF CON 4 (July 26–28, 1996), reflecting growing interest from security researchers and enthusiasts amid rising public awareness of cyber threats.[12] This period solidified the convention's reputation as a neutral forum for unfiltered discourse on vulnerabilities and defenses, distinct from government or industry-controlled events.[13]Expansion in the 2000s
During the 2000s, DEF CON transitioned from a niche underground gathering to a major annual event, with attendance surging into the thousands. DEF CON 8, held July 28–30, 2000, at the Alexis Park Resort in Las Vegas, drew more than 4,000 participants, reflecting sustained growth from its earlier years as a small hacker party.[14] This scale-up was accompanied by heightened media scrutiny and the presence of U.S. Defense Department representatives, signaling the convention's emerging role as a venue for both adversarial hacking demonstrations and security discussions.[15] Organizers adapted to the larger crowds by repurposing spaces like the DJ room for daytime presentations, underscoring logistical challenges from rapid expansion. The program's diversification contributed to this growth, with an increasing emphasis on specialized contests and technical demonstrations. By DEF CON 12 in 2004, events included the WiFi Shootout, where global enthusiasts competed in long-range wireless signal challenges, highlighting the convention's adaptation to emerging technologies like widespread WiFi adoption. Capture the Flag (CTF), formalized since DEF CON 4 in 1996, evolved further with more structured judging and international team participation, solidifying its status as a premier hacking competition that drew skilled competitors and observers.[5] These additions attracted a broader audience, including security professionals, while maintaining the core hacker ethos of hands-on vulnerability exploration and knowledge sharing. By the late 2000s, DEF CON's scale prompted venue shifts to accommodate demand, such as moving to the Riviera Hotel & Casino for DEF CON 16 in 2008, which hosted expanded talks on topics like network attacks and social engineering.[16] The event's reputation for unfiltered disclosures—often preceding vendor patches—fostered its growth amid rising cybersecurity awareness post-dot-com bust and early enterprise network threats.[17] This period also saw greater corporate and law enforcement engagement, though the community retained its independent, countercultural edge, prioritizing open technical exchange over commercial agendas.[18] Overall, the 2000s established DEF CON as the de facto gathering for the infosec world, with attendance and programming reflecting the field's maturation.Maturation and Institutionalization in the 2010s
During the 2010s, DEF CON underwent significant expansion, with attendance growing from approximately 10,000 at DEF CON 18 in 2010, hosted at the Riviera Hotel & Casino, to around 16,000 by DEF CON 22 in 2014.[19] [20] This surge prompted logistical adaptations, including a venue shift to the larger Rio All-Suite Hotel and Casino starting in 2011, where participation reportedly reached 17,000.[19] By mid-decade, crowds stabilized at 18,000 to 22,000 annually, reflecting broader interest from information security professionals amid rising cybersecurity awareness.[21] A key development was the proliferation of villages—dedicated, community-driven zones for specialized hacking activities—which formalized niche explorations and hands-on demonstrations. The Social Engineering Village debuted at DEF CON 18 in 2010, offering structured training in psychological manipulation techniques relevant to security testing.[22] Subsequent years saw additions like the Lock Picking Village by DEF CON 23 in 2015, emphasizing physical security challenges.[23] These villages enhanced organizational depth, enabling parallel programming tracks while preserving decentralized, volunteer-led operations. This period marked a shift toward greater institutional maturity, with expanded programming encompassing advanced contests like evolving Capture the Flag events and themed workshops on emerging threats such as SCADA systems and mobile vulnerabilities.[5] [24] Corporate and government attendees increased, blending hacker culture with professional networking, yet the conference maintained its independence under founder Jeff Moss (Dark Tangent), avoiding formal corporate sponsorships or centralized governance.[25] Such changes balanced scale with core principles, though critics noted strains on the event's original underground ethos from overcrowding and commercialization pressures.[19]Recent Developments and Shifts (2020s)
The COVID-19 pandemic prompted significant adaptations for DEF CON in 2020, with organizers canceling the in-person DEF CON 28 event originally scheduled for August 6–9 in Las Vegas and shifting to a fully virtual "Safe Mode" format, which was offered free to all participants to ensure broad accessibility amid health uncertainties.[26][27] In 2021, DEF CON 29 adopted a hybrid model, blending virtual sessions with limited in-person elements, reflecting ongoing caution while attempting to restore community engagement disrupted by the crisis.[28] DEF CON resumed primarily in-person operations with DEF CON 30 in August 2022, themed "Hacker Homecoming" and held semi-hybrid at the Las Vegas Convention Center from August 11–14, marking a return to large-scale physical gatherings after two years of pandemic constraints, though with updated COVID-19 protocols including masking recommendations in certain areas.[29] This shift facilitated renewed emphasis on hands-on villages and contests, but highlighted logistical strains from surging attendance, as the event's scale continued to expand into the tens of thousands.[28] Throughout the decade, villages evolved to address emerging threats, with the AI Village gaining prominence for workshops on artificial intelligence's dual role in offensive tools like phishing automation and defensive strategies, alongside simulations of adversarial attacks.[30] The Voting Village, active since 2017, intensified focus on election infrastructure vulnerabilities, hosting demonstrations of voting machine exploits and symposia countering disinformation, particularly relevant post-2020 U.S. elections and ahead of 2024 cycles, where researchers identified flaws in systems from multiple vendors without real-world deployment risks.[31][32] Newer additions like ship hacking sessions at DEF CON 33 in 2025 underscored growing attention to critical infrastructure, including maritime systems amid geopolitical tensions.[33] Organizational adjustments included enhanced transparency reporting on convention incidents since prior years, extending into the 2020s to address attendee safety and event management.[34] However, scale-related challenges surfaced, such as the 2024 badge production controversy, where overbudget costs exceeding 60% led to a stop-work order on a preproduction vendor amid disputes over charges, prompting debates on procurement and resource allocation.[35] By 2025, DEF CON refined group sanctioning processes to streamline village operations and reduce administrative burdens, aiming to sustain growth while managing complexity.[36] These developments reflect a broader maturation, balancing hacker autonomy with practical governance amid heightened scrutiny on cybersecurity's societal impacts.[37]Event Components
Core Schedule and Activities
DEF CON's core schedule spans four days, typically Thursday through Sunday in August, with initial registration and badge distribution on Thursday morning at designated hotels or convention centers in Las Vegas.[3] Badges, required for entry to talks and events, are collected in person and often feature interactive hardware elements.[3] Activities intensify on Friday, with formal programming running through Sunday.[38] The daily structure centers on technical presentations and talks delivered in multiple parallel tracks, commencing at 10:00 AM and extending to 17:30 or later.[38] These include main speaking tracks and specialized stages like the Creator Stage, where security researchers present findings on topics such as vulnerabilities, cryptography, and system exploits.[38] Sessions occur every 30 minutes to an hour, enabling attendees to navigate between tracks based on interest, though overlap requires prioritization.[38] The opening event features a welcome address by founder Jeff Moss, known as The Dark Tangent.[38] Hands-on workshops and demo labs supplement talks, offering practical sessions on tools and techniques, often with limited seating and prior registration.[39] Evenings transition to social and entertainment activities, including parties, music performances, and informal meetups that facilitate networking among hackers, professionals, and enthusiasts.[40] These extend late into the night, contrasting the structured daytime agenda and contributing to the event's informal, community-driven atmosphere.[40] The schedule concludes Sunday afternoon, followed by optional post-event training.[39]Villages and Themed Areas
Villages at DEF CON constitute specialized, community-driven zones that provide immersive environments for hands-on exploration of particular hacking disciplines, including workshops, demonstrations, and capture-the-flag-style challenges tailored to niche security topics. These areas operate semi-autonomously within the convention, allowing organizers to curate activities that emphasize practical skills over passive lectures, often featuring equipment loans, live hacking sessions, and peer-to-peer knowledge exchange. Villages emerged as a core component of DEF CON's structure in the mid-2000s, evolving from informal gatherings to formalized spaces that attract dedicated subcommunities and contribute to the event's reputation for fostering technical innovation in cybersecurity.[41][42][43] Prominent villages cover diverse domains, such as physical security, wireless communications, and biological interfaces. The Lockpicking Village, for instance, offers tools and training for bypassing mechanical locks, picks, and related hardware, promoting skills in physical penetration testing that have influenced professional locksmithing and security auditing practices.[43] Similarly, the Hardware Hacking Village concentrates on embedded systems, circuit board analysis, and device firmware extraction, providing soldering stations and components for attendees to prototype exploits or custom gadgets.[43] Other established villages target digital and interdisciplinary threats. The Wireless Village specializes in radio frequency protocols, spectrum analysis, and software-defined radio applications, with activities including signal interception and custom antenna builds to demonstrate vulnerabilities in IoT and cellular networks.[44] The Biohacking Village examines intersections of biology and technology, featuring DNA sequencing demos, implantable device security tests, and ethical discussions on genetic data privacy, drawing from advancements in synthetic biology.[22] The Car Hacking Village focuses on automotive electronics, such as CAN bus reverse engineering and keyless entry flaws, with real-vehicle teardowns that have informed industry standards for connected vehicles.[22]| Village | Focus Areas | Key Activities |
|---|---|---|
| AI Village | Artificial intelligence security, machine learning vulnerabilities | Model poisoning workshops, adversarial AI demos[22] |
| Blue Team Village | Defensive cybersecurity, incident response | Defensive CTF challenges, threat hunting simulations[44][45] |
| Adversary Village | Red team tactics, emulation of advanced persistent threats | Purple team exercises, supply chain attack simulations[46] |
Badges, Handles, and Participant Identification
DEF CON badges function as both entry credentials and interactive hardware artifacts central to participant engagement. Typically designed as printed circuit boards (PCBs) with artistic elements and embedded electronics, these badges have evolved since the early 2000s to include features like LEDs, RFID chips, and programmable components that attendees hack, modify, or compete with during the event.[48][49] For instance, the DEF CON 16 badge incorporated infrared-based file transfer capabilities between attendees, while later iterations featured multiplayer wireless games or mechanical elements like watches.[50][51] This "badgelife" subculture has spawned communities dedicated to badge design, reverse engineering, and custom gadgets, extending beyond official releases to unofficial variants produced by attendees.[48][52] Participant identification at DEF CON prioritizes pseudonymity to preserve anonymity, a core tenet of hacker culture. Attendees adopt "handles"—unique nicknames or aliases—instead of real names for all interactions, presentations, and networking, providing an additional layer of obfuscation against identity tracing.[53] This practice, rooted in historical hacker traditions, discourages the use of legal identities within the conference environment, with some participants further enhancing privacy through disguises like masks or fake beards.[53][54] While badge scans or ticket purchases may involve verifiable personal data for security and legal compliance, such information remains undisclosed in public discourse or event activities, reinforcing the event's emphasis on operational security over traceability.[54] Handles facilitate social and competitive dynamics without compromising privacy, often becoming long-term identifiers in the cybersecurity community. For example, prominent figures like the event founder are known exclusively by handles such as "Dark Tangent" in conference contexts.[53] This system contrasts with more formalized professional events, as DEF CON's structure actively resists real-name policies to mitigate risks like doxxing or surveillance, though evolving external pressures from law enforcement and corporate attendance have prompted debates on balancing anonymity with accountability.[54] Badges often incorporate spaces or digital fields for personalizing with handles, integrating identification seamlessly into the hardware ecosystem.[55]Workshops, Talks, and Fundraising Mechanisms
DEF CON features a variety of talks delivered across multiple tracks, including main speaking tracks and specialized stages such as the Creator Stage, where experts present on topics ranging from cybersecurity vulnerabilities to novel hacking techniques.[38] These presentations are scheduled over the core days of the event, typically spanning Friday through Sunday, with sessions starting as early as 10:00 AM and continuing into the evening.[38] Recordings of talks from past conferences, such as DEF CON 33, are archived on the official media server for public access, preserving content like demonstrations of social engineering tactics enhanced by AI tools.[56][57] Workshops at DEF CON emphasize practical, hands-on learning, often integrated into villages or dedicated sessions where participants engage with tools, simulations, and challenges.[58] For instance, villages like the Adversary Village host scheduled workshops on topics such as adversary emulation and red teaming, with sessions allocated specific time slots across multiple days.[59] Similarly, the Payment Village offers workshops on payment system security, including emulating magstripe technologies, complementing broader village activities like talks and contests.[60] These workshops differ from standard presentations by focusing on interactive demos and skill-building, such as approaching CTF-style challenges distinct from real-world hacking.[58] Fundraising at DEF CON primarily occurs through charity auctions tied to badge contests, where participants create custom badge replicas, and winning entries are auctioned to benefit organizations like Hackers for Charity.[61] This mechanism leverages attendee creativity to generate proceeds, with auctions emphasizing detail and innovation in badge designs.[61] Event organizers also discuss donation strategies publicly, allocating funds transparently to community initiatives after covering operational costs like setup.[62] These efforts support the volunteer-driven nature of the conference, directing revenue toward hacker community projects rather than institutional overhead.[62]Contests and Challenges
Capture the Flag Competitions
Capture the Flag (CTF) competitions at DEF CON originated in 1996 during DEF CON 4, establishing the event as one of the earliest formalized cybersecurity hacking contests. Initially structured with judges awarding points for exploits against flexible targets, the format evolved from chaotic early iterations to a more organized attack-defense model by DEF CON 10 in 2002, incorporating custom services on platforms like Red Hat 6.2 and limiting participation to eight teams.[5] Early winners included the AJ Reznor goons in 1996 and 1997, followed by the Ghettohackers' dominance from 1999 to 2001, with subsequent victors like Shellphish in 2005 and Vedagodz in 2009 highlighting the growing sophistication of participating teams.[5] The core format of DEF CON CTF finals employs an attack-defense structure, where teams of 5-10 members defend a shared network of vulnerable services—such as web applications, cryptographic modules, and custom binaries—while launching exploits against identical setups on opponents' networks to capture hidden flags verifying successful compromises.[63] Rules prohibit denial-of-service attacks, exploitation of administrative infrastructure or hypervisors, and sharing of flags or exploits, enforcing fair play within an isolated game environment typically hosted in a hotel ballroom like the Planet Hollywood Mezzanine.[63][64] Challenges span reverse engineering, web vulnerabilities (e.g., SQL injection), and remote code execution, with organizers like the Nautilus Institute automating scoring and concealing network layouts in recent years to prevent preemptive preparations.[5][65] Qualification occurs via an online event in spring, adopting a Jeopardy-style format of independent puzzle-solving across categories like forensics and cryptography, drawing hundreds of teams—such as 586 in one prior year—with the top performers advancing alongside select invitees to the finals.[66][67] Finals feature 10-15 teams competing over two to three days, with adaptive scoring in qualifiers decreasing point values based on solve frequency (starting at 500 points).[68] In the finals, teams earn attack points for each successful exploitation against rivals (scaled by the number of affected teams in timed rounds) and defense points for maintaining service uptime, often visualized in real-time via public scoreboards and streams like LiveCTF.[69] Prizes emphasize prestige over monetary rewards, with victors receiving black badges for lifetime DEF CON access and recognition as elite hackers, though the primary incentive remains competitive dominance.[70] Notable repeat champions include Carnegie Mellon University's Plaid Parliament of Pwning (PPP), which secured its ninth title at DEF CON 33 in August 2025, and the Maple Mallard Magistrates, who won DEF CON 30 and 31 with scores exceeding 6,000 points.[71][70] These competitions have influenced broader CTF standards, promoting hybrid formats and rigorous qualification to filter elite talent.[72]Black Badge and Elite Recognition
The Black Badge constitutes one of the most prestigious awards at DEF CON, granted exclusively to individuals or teams demonstrating exceptional skill in designated elite competitions. These contests, often including variants of Capture the Flag (CTF) and other high-difficulty challenges, evaluate participants' abilities in exploiting vulnerabilities, reverse engineering, and strategic defense under time constraints. Organizers designate specific events as Black Badge-eligible, with awards determined by unbeaten performance or top rankings, as outlined in DEF CON's official policy.[73][74] Recipients receive lifetime free admission to all future DEF CON conferences, a benefit that enhances the badge's value amid rising attendance fees and logistical demands. The award serves as a formal recognition of elite technical proficiency, distinguishing holders in professional cybersecurity circles where practical hacking expertise often outweighs formal credentials. For instance, in DEF CON 30 (2022), teams like Echelon secured Black Badges through CTF victories, highlighting the competitive intensity required.[75][76] A public Hall of Fame maintains records of Black Badge winners, preserving their contributions and fostering a legacy of innovation within the hacker community. While not every CTF or contest yields a Black Badge—decisions rest with DEF CON leadership based on event caliber—the designation underscores causal links between demonstrated prowess and broader impacts, such as advancing vulnerability disclosure practices. Controversial raffles or post-event distributions have occasionally sparked attendee feedback on transparency, though core awards remain tied to merit-based outcomes.[77][78]Domain-Specific Challenges
DEF CON villages host specialized challenges that target vulnerabilities in niche domains, complementing the broader Capture the Flag competitions by emphasizing hands-on exploitation in areas like hardware, industrial systems, and physical security. These events, often structured as CTFs or timed contests, draw participants to dissect real-world technologies, such as automotive electronics or cloud infrastructures, fostering skills in reverse engineering, forensics, and protocol analysis. At DEF CON 33 in August 2025, over 70 villages operated, many featuring such domain-tailored activities that award points, badges, or prizes based on successful breaches.[46][79] The Hardware Hacking Village CTF exemplifies physical and embedded systems challenges, requiring competitors to employ soldering, JTAG debugging, and firmware extraction on custom devices during sessions from 10:00 to 18:00 on Friday and Saturday. Participants tackle tasks like bypassing hardware protections or exploiting microcontrollers, with resources provided onsite for prototyping attacks.[80][81] Industrial control systems (ICS) challenges in the ICS Village CTF simulate attacks on critical infrastructure, involving protocol manipulation, SCADA system intrusions, and PLC reprogramming to disrupt virtual plants or extract data. Held via platforms like CTFd, these contests highlight vulnerabilities in operational technology, with teams competing to identify and exploit flaws in emulated environments.[80][82] Physical security domains feature contests like those in the Lockpicking Village and warl0ck gam3z CTF, where participants race to defeat locks, safes, and entry mechanisms using tools such as picks, decoders, and impression techniques, often incorporating digital forensics on associated electronics. These hands-on trials test mechanical weaknesses and hybrid phys-digital bypasses, with challenges escalating from basic padlocks to high-security models.[80] IoT-focused challenges in the IoT Village include live bug hunting and CTFs targeting device firmware, wireless protocols, and supply chain flaws, awarding Black Badges for top performers across four rounds. Competitors reverse-engineer smart devices, exploit Bluetooth or Zigbee stacks, and demonstrate remote compromises, underscoring pervasive risks in consumer and enterprise IoT ecosystems.[46][83] Cloud security contests, such as the Cloud Village's Jeopardy-style CTF spanning 2.5 days, challenge teams to breach multi-provider infrastructures (e.g., AWS, Azure) through misconfiguration exploits, IAM escalations, and serverless function hijacks, with categories progressing in difficulty to mimic enterprise-scale threats.[80][84] Other domains include automotive hacking in the Car Hacking Village CTF, probing CAN bus protocols and ECU firmware for takeover simulations, and password cracking in the Password Village, evaluating hash-breaking tools against modern defenses like bcrypt or Argon2. These specialized events not only reveal domain-specific weaknesses but also drive vendor patches through disclosed findings.[80][85]Communities and Participants
Attendee Profiles and Culture
DEF CON attracts a diverse array of participants, including cybersecurity professionals, ethical hackers, software engineers, IT specialists, red team and blue team operators, chief information security officers (CISOs), and national security officials.[86] Attendance has grown significantly, exceeding 30,000 individuals in recent years, encompassing both seasoned experts and newcomers from around the world.[87] Students and academics also participate, often through university programs, alongside independent researchers and technology enthusiasts.[88] The attendee base reflects a blend of private sector employees, government representatives, and hobbyists, with historical inclusion of federal agents despite occasional policy restrictions on their attendance.[89] This mix fosters interactions across skill levels and affiliations, from ethical hackers focused on responsible disclosure to policymakers engaging in roundtables.[90] While corporate and government presence has increased, the core remains rooted in independent and community-driven participants who prioritize technical curiosity over institutional agendas.[91] DEF CON's culture embodies "hacker summer camp," characterized by an informal, vibrant atmosphere that combines intense technical exploration with social camaraderie.[92] It emphasizes collaboration, knowledge sharing, and hands-on experimentation in villages, contests, and workshops, promoting values like openness, deep system understanding, and ethical investigation.[91] The event features late-night parties, movie screenings, and networking, but maintains a focus on substantive discussions and innovation, often countering overly commercialized security events.[93] This environment encourages mutual respect among diverse attendees, though it can overwhelm first-timers due to its scale and intensity.[40]Affiliated Groups and Networks
DEF CON supports a decentralized network of local chapters called DEF CON Groups, which operate as independent communities of cybersecurity practitioners, hackers, and technology enthusiasts in various cities worldwide.[94] These groups, often identified by a "DC" prefix followed by a numeric code derived from regional area codes or other locators (e.g., DC702 for Las Vegas or DC907 for Anchorage, Alaska), organize regular meetups, skill-sharing sessions, and events to sustain hacking culture between annual conferences.[95] [96] As of 2025, active DEF CON Groups span multiple U.S. states and international locations, including DCG Syracuse (New York), DC757 (Hampton Roads, Virginia), DCG Albany (New York), and DC35321 (Cork, Ireland).[96] [94] The groups emphasize grassroots collaboration, with participants contributing to local cybersecurity education and research without direct financial oversight from the central DEF CON organization, though they align with its ethos of open knowledge sharing.[97] Local chapters like DC702 host pre- and post-conference gatherings, such as casual meetups during DEF CON events, to build continuity in the community.[98] Beyond local chapters, DEF CON intersects with broader hacker networks through informal ties to international organizations like the Chaos Computer Club (CCC) in Germany, where members frequently participate in DEF CON activities and share techniques via cross-event collaborations, though no formal affiliation exists.[95] These connections facilitate knowledge exchange but remain ad hoc, relying on individual attendees rather than institutional partnerships. DEF CON Groups also integrate with virtual communities, such as DEF CON Groups VR, offering online spaces for remote participation in discussions and simulations.[99]Cybersecurity Impact
Vulnerability Discoveries and Fixes
DEF CON has facilitated numerous vulnerability disclosures through its villages, contests, and presentations, often leading to vendor patches and improved security practices. Participants in specialized villages, such as the Car Hacking Village and IoT Village, demonstrate exploits on real-world devices, prompting manufacturers to issue fixes. For instance, in 2015, researchers at the Car Hacking Village remotely exploited a Jeep Cherokee's systems via its Uconnect infotainment unit, hijacking controls over cellular networks; Fiat Chrysler Automobiles responded by recalling 1.4 million vehicles and deploying a software patch within days.[100] Similarly, Schneider Electric addressed vulnerabilities in its Modicon M340 programmable logic controllers (PLCs) disclosed at DEF CON 23 in 2015, which allowed attackers to modify code and disrupt industrial processes; the company released firmware updates to mitigate remote code execution risks.[101] In the realm of consumer software, a researcher at DEF CON 30 in 2022 disclosed two high-severity vulnerabilities in Zoom's macOS client (CVEs 2022-28762 and 2022-29217), enabling arbitrary code execution via malicious Meeting SDK plugins; Zoom patched these flaws in version 5.11.0 shortly after, confirming the issues allowed local privilege escalation without user interaction.[102] Voting Village demonstrations at DEF CON 26 in 2018 exposed flaws in election systems, including weak administrator passwords and unencrypted ballot data on machines from vendors like Diebold and ES&S; while immediate patches varied, the disclosures influenced U.S. election security reforms, such as enhanced federal guidelines for verifiable paper trails.[103] More recent efforts include the 2023 disclosure by Trellix researchers at DEF CON 31 of vulnerabilities in data center power management software like Schneider Electric's EcoStruxure and Siemens' Desigo, which could enable remote denial-of-service attacks on critical infrastructure; vendors issued advisories and patches to address the flaws in web interfaces and authentication mechanisms.[104] DEF CON's emphasis on responsible disclosure, often coordinated through villages' vulnerability disclosure programs, has accelerated fixes, though challenges persist with legacy systems in sectors like aerospace and maritime, where villages highlight unpatched exploits without always yielding public patches due to proprietary constraints.[105] These activities underscore DEF CON's role in bridging offensive research with defensive remediation, though efficacy depends on vendors' responsiveness and the absence of legal barriers to disclosure.Policy and Infrastructure Advancements
The DEF CON Voting Village, initiated in 2017, has exposed systemic vulnerabilities in U.S. election infrastructure, including remote code execution on voting machines from multiple vendors within two hours of the event's start in its inaugural year. These demonstrations, replicated annually, revealed persistent issues such as unpatched flaws dating to 2006 in machines used across states, prompting congressional attention and advocacy for risk-limiting audits and paper ballot requirements.[106] [107] While direct legislative causation remains debated, the village's findings informed the U.S. House's passage of the Secure Elections Act in 2018, mandating paper records and audits, and contributed to federal guidance from the Cybersecurity and Infrastructure Security Agency emphasizing auditable systems.[107] In critical infrastructure domains, the DEF CON Franklin project, launched in 2024 by DEF CON organizers in partnership with the University of Chicago's Cyber Policy Initiative and the National Rural Water Association, deploys hackers to test and fortify water utility systems against nation-state threats from actors like China and Iran.[108] By August 2025, participants identified exploitable weaknesses in industrial control systems across multiple U.S. utilities, yielding a "Hackers Almanac" resource for policymakers to prioritize defenses like network segmentation and anomaly detection.[109] This initiative addressed resource constraints in underfunded sectors, with early adopters like Waterbury, Connecticut, implementing hacker-recommended patches to enhance remote access controls and firmware integrity checks.[110] Policy @ DEF CON, formalized as a dedicated track by 2023, bridges technologists and government officials through panels on vulnerability disclosure and regulatory frameworks, fostering collaborations that influenced discussions on privatizing elements of the Common Vulnerabilities and Exposures program for greater stability amid federal funding uncertainties.[111] [112] Complementing this, the 2025 AI Cyber Challenge at DEF CON 33, backed by executive directives under President Trump, tested AI-driven tools for automated threat detection, advancing infrastructure resilience by integrating open-source models into national defense protocols.[113] These efforts underscore DEF CON's role in translating adversarial testing into actionable standards, though implementation lags due to interagency coordination challenges.[114]Broader Industry and Research Influences
DEF CON has shaped cybersecurity research by providing a venue for disclosing vulnerabilities that often inform subsequent peer-reviewed studies and industry benchmarks. Demonstrations in specialized villages, such as the Voting Village established in 2017, have exposed flaws in electronic voting machines from vendors like Election Systems & Software (ES&S), leading to detailed reports that document exploitable weaknesses in voter check-in systems and ballot marking devices, thereby influencing academic analyses of election integrity.[107] Similarly, the annual Hackers' Almanack compiles findings from DEF CON contests, including critical vulnerabilities in mobile voting products and physical security systems, which researchers reference to advance studies on supply chain risks and access controls.[115] The conference drives industry standards through its emphasis on practical, adversarial testing, exemplified by automotive security disclosures at events like DEF CON 33, where researchers revealed remote exploitation paths in vehicle systems, prompting vendors like Trustonic to enhance hardware root-of-trust mechanisms.[116] Contests promoting responsible disclosure, such as those in AI and critical infrastructure villages, have accelerated remediation timelines; for example, AI-driven vulnerability hunting has been shown to shorten patching from discovery to fix, contrasting with slower sectors like healthcare where averages exceed 400 days.[117][118] Initiatives like the DEF CON Franklin project, launched to secure U.S. water utilities, recruit ethical hackers for ongoing assessments, yielding volunteer networks and resources that bridge research gaps in public infrastructure defense against state-sponsored threats.[108] These efforts extend to AI red-teaming challenges, where participants identify prompt injection flaws in large language models, spurring industry-wide adoption of defensive AI tools and highlighting empirical advantages for defenders over attackers in emerging domains.[119][120]Controversies and Criticisms
Organizational and Logistical Failures
In February 2024, Caesars Entertainment abruptly terminated its 25-year contract with DEF CON for the 32nd conference, citing a strategic business change unrelated to the event's conduct, forcing organizers to secure the Las Vegas Convention Center as an alternative venue just months before the August dates. This incident exposed vulnerabilities in venue contracting reliability, as DEF CON staff had to rapidly pivot logistics including badge distribution and workshop arrangements to accommodate over 30,000 expected attendees.[121] The production of DEF CON 32 badges, priced at $460 each and based on Raspberry Pi Pico 2 hardware with a Game Boy emulator, overrun the budget by more than 60%, leading to a stop-work order and heated disputes with hardware designer Entropic Engineering and volunteer firmware developer Dmitry Grinberg. Organizers accused the team of unauthorized modifications, including Grinberg's addition of an Easter egg displaying Entropic's logo and a donation request after credits were removed; in response, Grinberg was physically escorted from a badge presentation stage during the event. Similar manufacturing and shipping delays plagued badge distribution in 2023, contributing to attendee frustration over pre-registration processes.[122] DEF CON's annual transparency reports document persistent logistical shortcomings, including multiple falling ceilings at venues in 2018 and 2019, unsecured doors in 2024, and recurring accessibility complaints such as difficulties for attendees with disabilities navigating crowded spaces or villages in 2022 and 2024. Emergency responses have also faltered, with instances like a fire evacuation due to an unattended package in 2023 and staff handling mistaken registration inquiries overwhelming operations in 2022. These issues underscore organizational strains from rapid growth and decentralized event management across multiple sites.[34]Ethical Debates on Hacking Practices
The DEF CON Ethics Village, introduced around DEF CON 26 in 2018, serves as a dedicated forum for examining ethical challenges in information security, highlighting the field's lack of codified professional standards akin to those in medicine or law.[22] Panels and presentations address practitioner responsibilities, including the moral obligations of security researchers in vulnerability handling and technology deployment. For example, discussions explore dilemmas faced by ethical hackers contributing to open-source tools that adversaries might repurpose for malicious ends, underscoring tensions between advancing defensive capabilities and unintended proliferation of offensive techniques.[123] A central debate revolves around vulnerability disclosure practices, pitting full public disclosure—often exemplified by DEF CON's live demonstrations—against coordinated responsible disclosure. Proponents of full disclosure argue that rapid, transparent revelation compels vendors to prioritize fixes, as evidenced by historical DEF CON talks like Barnaby Jack's 2010 ATM jackpotting demo, which exposed exploitable flaws and influenced industry hardening.[100] Critics, however, contend that such immediacy equips attackers with actionable exploits before mitigations, potentially exacerbating real-world harms; this view gained traction in critiques of DEF CON's Voting Village, where 2017 and 2018 hacks on election systems revealed ballot secrecy compromises but drew vendor accusations of aiding foreign adversaries by publicizing unpatched methods.[107][124] Further contention arises over offensive practices like "hack back" retaliation, debated in Ethics Village sessions as a potential necessity against persistent threats from state actors, such as China, despite legal prohibitions under frameworks like the U.S. Computer Fraud and Abuse Act.[125] Advocates frame it as pragmatic self-defense when defensive measures fail, citing empirical inefficacy of passive strategies against asymmetric attackers, while opponents highlight risks of escalation, misattribution, and erosion of international norms. These discussions reflect broader causal realities: hacking knowledge at DEF CON yields dual-use outcomes, driving cybersecurity advancements—such as post-Jeep hack recalls in 2015—but also enabling misuse absent robust ethical constraints.[100] Security researchers at the conference often emphasize empirical risk assessment over vendor assurances, prioritizing systemic resilience over deferred disclosures that may delay fixes.[126]Geopolitical Alignments and Alienation
DEF CON's hacker-centric ethos, rooted in skepticism toward centralized authority, has historically fostered tensions with governments, particularly during periods of heightened surveillance revelations. In July 2013, amid fallout from Edward Snowden's disclosures on NSA programs, organizers requested that U.S. federal employees, including law enforcement and intelligence personnel, refrain from attending DEF CON 21 to allow open discourse without perceived intimidation.[127] This stance reflected broader alienation within the community from state surveillance apparatuses, echoing cypherpunk principles of privacy and autonomy over institutional oversight.[128] Despite such frictions, DEF CON has pursued pragmatic alignments with U.S. government entities on specific cybersecurity challenges, bridging countercultural roots with national security imperatives. The annual Voting Village, launched in 2017, collaborates with election officials and vendors to expose vulnerabilities in voting systems, influencing policy like enhanced machine testing protocols ahead of U.S. elections.[129] Similarly, in 2023, the White House partnered with DEF CON for the largest public red-teaming exercise on AI biases, involving hundreds of attendees to probe large language models for flaws.[130] These initiatives position DEF CON as a contributor to U.S.-led defensive postures against cyber threats, including state-sponsored actors. Geopolitically, DEF CON's U.S.-based operations and participant demographics align it with Western interests, drawing scrutiny over foreign espionage risks. U.S. officials have expressed concerns about attendees from adversarial nations like China and Russia, who could exploit the conference for intelligence gathering on vulnerabilities or networking.[131] In 2014, amid escalating U.S.-China cyber tensions, agencies considered measures to restrict Chinese hackers' participation, citing patterns of economic espionage.[132] Recent events, such as 2025 demonstrations on maritime hacking amid Indo-Pacific rivalries, underscore DEF CON's implicit embedding in U.S. strategic priorities.[33] This evolution has alienated segments of the global hacker community wary of institutional co-optation. Critics, including former insiders, argue that partnerships with defense contractors and military entities erode DEF CON's anti-establishment purity, transforming it into an extension of empire rather than independent counterculture.[133] Such alignments risk estranging international participants from non-aligned or adversarial states, where attendance may invite domestic repercussions, while reinforcing barriers against state-affiliated actors perceived as threats.[131]Venues, Attendance, and Logistics
Historical Venues and Event Timing
DEF CON has been held exclusively in Las Vegas, Nevada, since its inception as the primary annual gathering for the hacker community. The first edition, DEF CON 1, took place from June 9 to 11, 1993, at the Sands Hotel and Casino, which has since been demolished. This initial event drew approximately 100 attendees and featured informal presentations and networking in a single hotel setting. Early subsequent conferences followed a similar model, utilizing individual Las Vegas Strip properties to accommodate growing participation, such as the Sahara Hotel and Casino for DEF CON 2. As attendance expanded into the thousands, venues shifted to larger or multiple hotel-convention combinations to handle contests, villages, and talks. For instance, DEF CON 11 in 2003 designated the Alexis Park Resort as the official host hotel. DEF CON 15 in 2007 was centered at the Riviera Hotel and Casino. Mid-2010s events often spanned Paris Las Vegas and Bally's, as with DEF CON 23 from August 6 to 9, 2015. By the late 2010s and 2020s, the scale necessitated distributed setups across several Caesars Entertainment properties, including DEF CON 27 from August 8 to 11, 2019, at Paris, Bally's, Flamingo, and Planet Hollywood.| DEF CON Edition | Dates | Primary Venue(s) |
|---|---|---|
| 1 (1993) | June 9–11 | Sands Hotel and Casino[9] |
| 11 (2003) | August 8–10 | Alexis Park Resort[134] |
| 15 (2007) | August 3–5 | Riviera Hotel and Casino[135] |
| 23 (2015) | August 6–9 | Paris and Bally's[136] |
| 27 (2019) | August 8–11 | Paris, Bally's, Flamingo, Planet Hollywood[12] |
| 30 (2022) | August 11–14 | Caesars Forum, Flamingo, LINQ, Harrah's[12] |
| 31 (2023) | August 10–13 | Caesars Forum, Flamingo, LINQ, Harrah's[12] |
| 32 (2024) | August 8–11 | Las Vegas Convention Center West Hall, Sahara Hotel[137] |
