From Surf Wiki (app.surf) — the open knowledge base
DEF CON
Annual hacker gathering in Las Vegas, Nevada
Annual hacker gathering in Las Vegas, Nevada
| Field | Value | ||||
|---|---|---|---|---|---|
| name | |||||
| logo_alt | DEF CON Logo | ||||
| image | Defcon.jpg | ||||
| status | Active | ||||
| frequency | Annual | ||||
| country | United States | ||||
| years_active | |||||
| first | |||||
| genre | Security Conference, Hacker Conference | ||||
| venue | Varies | ||||
| location | Las Vegas, Nevada | ||||
| prev | August 7–10, 2025 | ||||
| founder_name | Jeff Moss | ||||
| attendance | Over 30,000 | ||||
| website | * | ||||
| * <ref>{{cite web | title | Defcon Onion Links | url=https://defcon.org/#onionlinks | website=defcon.org | language=en}} |
DEF CON (also written as DEFCON, Defcon, or DC) is a hacker convention held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer and hacking-related subjects, as well as cyber-security challenges and competitions (known as hacking wargames). Contests held during the event are extremely varied and can range from creating the longest Wi-Fi connection to finding the most effective way to cool a beer in the Nevada heat.
Other contests, past and present, include lockpicking, robotics-related contests, art, slogan, coffee wars, scavenger hunt, and Capture the Flag. Capture the Flag (CTF) is perhaps the best known of these contests and is a hacking competition in which teams of hackers attempt to attack and defend computers and networks using software and network structures. CTF has been emulated at other hacking conferences as well as in academic and military contexts (as red team exercises).
Federal law enforcement agents from the FBI, DoD, United States Postal Inspection Service, DHS (via CISA) and other agencies regularly attend DEF CON.{{cite web | access-date = 9 Feb 2011
History
Founding
DEF CON was founded in 1993, by then 18-year-old Jeff Moss as a farewell party for his friend, a fellow hacker and member of "Platinum Net", a FidoNet protocol based hacking network from Canada. The party was planned for Las Vegas a few days before his friend was to leave the United States, because his father had accepted employment out of the country. However, his friend's father left early, taking his friend along, so Jeff was left alone with the entire party planned. Jeff decided to invite all his hacker friends to go to Las Vegas with him and have the party with them instead. Hacker friends from far and wide got together and laid the foundation for DEF CON, with roughly 100 people in attendance.
The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEF CON). In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEF CON. However, to a lesser extent, CON also stands for convention and DEF is taken from the letters on the number 3 on a telephone keypad, a reference to phreakers. The official name of the conference includes a space in between DEF and CON.
Though intended to be a one-time event, Moss received overwhelmingly positive feedback from attendees, and decided to host the event for a second year at their urging. The event's attendance nearly doubled the second year, and has enjoyed continued success. For example, in 2019, an estimated 30,000 people attended DEF CON 27.
Documentary
DEFCON: The Documentary For DEF CON's 20th Anniversary, a film was commissioned entitled DEF CON: The Documentary. The film follows the four days of the conference, events and people (attendees and staff), and covers history and philosophy behind DEF CON's success and unique experiences.
DEF CON China
DEF CON China In January 2018, the DEF CON China Beta event was announced. The conference was held May 11–13, 2018 in Beijing, and marked DEF CON's first conference outside the United States. The second annual DEF CON China was canceled due to concerns related to COVID-19.
COVID-19
DEF CON Safe Mode In 2020, due to safety concerns over COVID-19 the DEF CON 28 in-person Las Vegas event was cancelled and replaced with DEF CON Safe Mode, a virtual event planned for the same August 6–9 dates as DC 28.
In 2021, DEF CON 29 was held on August 5–8 in-person in Las Vegas and virtually (via Twitch and Discord). In-person attendees were required to wear masks in conference areas and to show proof of COVID-19 vaccination. Attendees with verified vaccine records (verified by a third party) were given a wristband which was required for entry into the conference areas.
Components
Handles
Attendees at DEF CON and other Hacker conferences often utilize an alias or "handle" at conferences. This is in keeping with the hacker community's desire for anonymity. Some known handles include DEF CON founder Jeff Moss' handle of "Dark Tangent". A notable event at DEF CON is DEF CON 101 which starts off the conference and may offer the opportunity for an individual to come up on stage and be assigned a handle by a number of members of the community.
Badges

Villages

Villages are dedicated spaces arranged around a specific topic. Villages may be considered mini conferences within the con, with many holding their own independent talks as well as hands-on activities such as CTFs, or labs. Some villages include Aerospace Village, Car Hacking Village, IoT Village, Recon, biohacking, lockpicking, ham radio, and the well known social engineering and vote hacking villages. In 2018 the vote hacking village gained media attention due to concerns about US election systems security vulnerabilities.
Internal conferences
DEF CON has its own cultural underground which results in individuals wanting to create their own meetups or "cons" within DEF CON. These may be actual formal meetups or may be informal. Well known cons are:
- Queer Con, a meetup of LGBTQ community members.
- Linecon; any long line has the potential to turn into a con.
- QuietCon, a meetup to hang out or talk quietly away from the hustle and bustle of the rest of the conference attendees.
Workshops
Workshops are dedicated classes on various topics related to information security and related topics. Workshops have been held on topics such as digital forensics investigation, hacking IoT devices, playing with RFID, fuzzing, and attacking smart devices.
Fundraising
Since DEF CON 11, fundraisers have been conducted for the Electronic Frontier Foundation (EFF). The first fundraiser was a dunk tank and was an "official" event. The EFF now has an event named "The Summit" hosted by the Vegas 2.0 crew that is an open event and fundraiser. DEF CON 18 (2010) hosted a new fundraiser called MohawkCon.
Parties
Social groups and companies also organize unofficial parties during DEF CON, including some large and extravagant events, although fewer in later years. A party in 2012 featured a private cell phone network operated from a van, the NinjaTel Van.
Contests

Within DEF CON there are many contests and events, including Capture the Flag, Hacker Jeopardy, Scavenger Hunt, Capture the Packet, Crash and Compile, and Hackfortress.
Black Badge
The Black Badge is the highest award DEF CON gives to contest winners of certain events. Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners. The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEF CON for life, potentially a value of thousands of dollars.
In April 2017, a DEF CON Black Badge was featured in an exhibit in the Smithsonian Institution's National Museum of American History entitled "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity". The badge belongs to ForAllSecure's Mayhem Cyber Reasoning System, the winner of the DARPA 2016 Cyber Grand Challenge at DEF CON 24 and the first non-human entity ever to earn a Black Badge.
Capture the Flag
The first instance of the DEF CON Capture the Flag (CTF) contest was held in 1996, at the 4th DEF CON, and has been held since then every year. It is one of few CTFs in an attack/defense format. The prize of the winning team is a couple of black badges.
Capture the Flag history

In 1996, the first DEF CON CTF was organized, with a couple of servers for participants to hack, and judges to decide if a machine has been hacked, and award points accordingly.
In 2002, the company Immunix took part in the game under the moniker "immunex", to benchmark the security of their Linux-based operating system, with modifications including StackGuard, FormatGuard, OpenWall's non-executable stack, SubDomain (the ancestor of AppArmor), ... Confident in their defense capabilities, they even opened access to their servers to other teams, and even spent some time taunting them. The team got the second place, and all their services deployed on their Immunix stack were never compromised. It was also the first year the contest had an organiser-provided services infrastructure connected to a real-time scoreboard.
In 2003, the game had become so popular that a qualification round was introduced, with the previous winner automatically qualified.
In 2008, the Sk3wl of Root team took advantage of a bug in the game (privilege dropping and forking were inverted), allowing them to have such a massive lead that they spent most of the CTF playing Guitar Hero.
In 2009, it was announced that "Diutinus Defense Technology Corp" (DDTEK) would be the new organisers, but nobody knew who they were. It was revealed at the end of the game that the team playing as sk3wl0fr00t was the organizer. "Hacking the top hacker contest seemed like a fun way to introduce ourselves to CTF organization. The yells of "bullshit" from CTF teams during the DEF CON 17 awards ceremony were very gratifying." said vulc@n, a member of DDTEK, on the topic.
In 2011, the team "lollerskaters dropping from roflcopters" used a 0day in FreeBSD (namely CVE-2011-4062) to escape jails, causing havoc in the game's infrastructure.
In 2016, the 15th edition of the CTF was done in partnership with the DARPA, as part of its Cyber Grand Challenge program, where teams wrote autonomous systems to play the game without any human interaction.
In 2017, the Legitimate Business Syndicate came up with their very own CPU architecture called cLEMENCy: a middle-endian with 9 bits bytes CPU. With its specifications released only 24 hours before the beginning of the CTF, it was designed with the explicit goals of both surprising the teams, and leveling the playing field by breaking all their tools.
| Year | DEF CON | Competing Teams | Organizers | Architecture | Platform | Winning team |
|---|---|---|---|---|---|---|
| 1996 | 4 | Goons | AJ Reznor | |||
| 1997 | 5 | Goons | AJ Reznor | |||
| 1998 | 6 | Goons | SNI | |||
| 1999 | 7 | Goons | Ghetto Hackers | |||
| 2000 | 8 | Goons | Ghetto Hackers | |||
| 2001 | 9 | Goons | Multiple | Ghetto Hackers & digirev | ||
| 2002 | 10 | Ghetto Hackers | Redhat 6.2 | Digital Revelation | ||
| 2003 | 11 | 8 | Ghetto Hackers | OpenBSD | Anomaly | |
| 2004 | 12 | 8 | Ghetto Hackers | i386 | Windows | sk3wl0fr00t |
| 2005 | 13 | 8 | Kenshoto | i386 | FreeBSD 5.4 | shellphish |
| 2006 | 14 | 8 | Kenshoto | i386 | Solaris 10 | 1@stplace |
| 2007 | 15 | 8 | Kenshoto | i386 | FreeBSD | 1@stplace |
| 2008 | 16 | 8 | Kenshoto | i386 | FreeBSD | Sk3wl of Root |
| 2009 | 17 | 9 | DDTEK | i386 | FreeBSD | VedaGodz |
| 2010 | 18 | 12 | DDTEK | i386 | FreeBSD & Debian | ACME Pharm |
| 2011 | 19 | 12 | DDTEK | i386 | FreeBSD | European Nopsleders |
| 2012 | 20 | 20 | DDTEK | i386 | FreeBSD | Samurai |
| 2013 | 21 | 20 | Legitimate Business Syndicate | armv7 | Linux | Plaid Parliament of Pwning |
| 2014 | 22 | 20 | Legitimate Business Syndicate | armv7 & i386 | Linux | Plaid Parliament of Pwning |
| 2015 | 23 | 15 | Legitimate Business Syndicate | MIPS, x86 & armv7 | Linux | DEFKOR |
| 2016 | 24 | 15 | Legitimate Business Syndicate | i386 | DECREE | Plaid Parliament of Pwning |
| 2017 | 25 | 15 | Legitimate Business Syndicate | cLEMENCy | cLEMENCy | Plaid Parliament of Pwning |
| 2018 | 26 | 24 | Order Of the Overflow | MIPS, x86 & armv7 | Linux | DEFKOR00T |
| 2019 | 27 | 16 | Order Of the Overflow | x86, arm64, esoteric | Linux, iOS, Xbox | Plaid Parliament of Pwning |
| 2020 | 28 | 16 | Order Of the Overflow | x86, esoteric | Linux | A0E |
| 2021 | 29 | 16 | Order Of the Overflow | x86, microengine | Linux | Katzebin |
| 2022 | 30 | 16 | Nautilus Institute | mixed | Maple Mallard Magistrates | |
| 2023 | 31 | 12 | Nautilus Institute | mixed | Maple Mallard Magistrates | |
| 2024 | 32 | 12 | Nautilus Institute | mixed | Maple Mallard Magistrates |
Groups
DEF CON Groups are worldwide, local chapters of hackers, thinkers, makers and others. DEF CON Groups were started as a splinter off of the 2600 meetup groups because of concerns over politicization. Local DEF CON groups are formed and are posted online. DEF CON Groups are usually identified by the area code of the area where they are located in the US, and by other numbers when outside of the US e.g., DC801, DC201. DEF CON Groups may seek permission to make a logo that includes the official DEF CON logo with approval.
Notable incidents
Following are a list of high-profile issues which have garnered significant media attention.
| Year | Description | 1999 | 2001 | 2005 | 2007 | 2008 | 2009 | 2011 | 2012 | 2013 | 2016 | 2017 | 2018 | 2020 | 2024 | |||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| On July 10, 1999, the Cult of the Dead Cow hacker collective released Back Orifice 2000 (later discovered to be infected with the CIH virus) at DEF CON 7, in what was, at the time, the largest presentation in DEF CON history. | ||||||||||||||||||||
| On July 16, 2001, Russian programmer Dmitry Sklyarov was arrested the day after DEF CON for writing software to decrypt Adobe's e-book format. | ||||||||||||||||||||
| On July 31, 2005, Cisco used legal threats to suppress Mike Lynn from presenting at DEF CON about flaws he had found in the Cisco IOS used on routers.{{cite web | url = http://www.securityfocus.com/news/11263 | title = Exploit writers team up to target Cisco routers | work = SecurityFocus | date = 31 July 2005 | access-date = 2004-07-31 | last = Lamos | first = Rob | archive-date = 2012-07-28 | archive-url = https://web.archive.org/web/20120728132402/http://www.securityfocus.com/news/11263 | url-status = dead | ||||||||||
| In August 2007, Michelle Madigan, a reporter for Dateline NBC, attempted to secretly record hackers admitting to crimes at the convention. After being outed by DEF CON founder Jeff Moss during an assembly, she was heckled and chased out of the convention by attendees for her use of covert audio and video recording equipment. DEF CON staff tried to get Madigan to obtain a press pass before the outing happened.{{cite web | last=Cassel | first=David | url=http://tech.blorge.com/Structure:%20/2007/08/04/transcript-michelle-madigans-run-from-defcon/ | title=Transcript: Michelle Madigan's run from Defcon | work=Tech.Blorge.com | date=4 August 2007 | access-date=2007-08-15 | url-status=dead | archive-url=https://web.archive.org/web/20070908114514/http://tech.blorge.com/Structure%3A%20/2007/08/04/transcript-michelle-madigans-run-from-defcon/ | archive-date=2007-09-08 | url = http://blog.wired.com/27bstroke6/2007/08/media-mole-at-d.html | title = Dateline Mole Allegedly at DefCon with Hidden Camera – Updated: Mole Caught on Tape | Wired Blog Network]] | date = 3 August 2007 | access-date = 2007-08-15 | |||||
| MIT students Zack Anderson, R.J. Ryan and Alessandro Chiesa were to present a session entitled "The Anatomy of a Subway Hack: Breaking Crypto RFIDS and Magstripes of Ticketing Systems." The presentation description included the phrase "Want free subway rides for life?" and promised to focus on the Boston T subway. However, the Massachusetts Bay Transit Authority (MBTA) sued the students and MIT in United States District Court in Massachusetts on August 8, 2008, claiming that the students violated the Computer Fraud and Abuse Act (CFAA) by delivering information to conference attendees that could be used to defraud the MBTA of transit fares.{{cite court | litigants=Massachusetts Bay Transit Authority v. Zack Anderson, RJ Ryan, Alessandro Chiesa, and the Massachusetts Institute of Technology | court=United States District Court District of Massachusetts | url=http://cryptome.org/mbta-v-zack/01-complaint.pdf | |||||||||||||||||
| WIRED reported that an ATM kiosk was positioned in the conference center of the Riviera Hotel Casino capturing data from an unknown number of hackers attending the DEF CON hacker conference. | ||||||||||||||||||||
| Security company HBGary Federal used legal threats to prevent former CEO Aaron Barr from attending a panel discussion at the conference. | ||||||||||||||||||||
| Jeff Moss]], was "Does the NSA really keep a file on everyone, and if so, how can I see mine?" Alexander replied "Our job is foreign intelligence" and that "Those who would want to weave the story that we have millions or hundreds of millions of dossiers on people, is absolutely false…From my perspective, this is absolute nonsense." | ||||||||||||||||||||
| On July 11, 2013, Jeff Moss posted a statement, located on the DEF CON blog, titled "Feds, We Need Some Time Apart". It stated that "I think it would be best for everyone involved if the feds call a 'time-out' and not attend DEF CON this year." This was the first time in the organization's history that it had asked federal authorities not to attend. Actor Will Smith visited the convention to study the DEF CON culture for an upcoming movie role. | ||||||||||||||||||||
| last=Pellerin | first=Cheryl | title=Three Teams Earn Prizes in DARPA Cyber Grand Challenge | url=https://www.war.gov/News/News-Stories/Article/Article/906931/three-teams-earn-prizes-in-darpa-cyber-grand-challenge/ | access-date=2024-10-21 | website=U.S. Department of Defense}} | |||||||||||||||
| At the "Voting Machine Village" event, dozens of voting machines brought to the conference were breached. | ||||||||||||||||||||
| In March 2018, the DEF CON Voting Machine Hacking Village was awarded a Cybersecurity Excellence Award. The award cites both the spurring of a national dialog around securing the US election system and the release of the nation's first cybersecurity election plan. | ||||||||||||||||||||
| On May 8, 2020, the DEF CON in-person conference itself was cancelled and virtualized due to COVID-19. DEF CON Safe Mode was held August 6–9 online with a full roster of talks, villages, contests and events. | ||||||||||||||||||||
| On February 4, 2024, Caesar's Entertainment cancelled the contract with DEF CON without warning with speculation that a ransomware attack and bomb scare and subsequent evacuation in 2023 were in part to blame. The conference was moved to the Las Vegas Convention Center as a result. |
Entertainment references
- DEF CON was also portrayed in The X-Files episode "Three of a Kind" featuring an appearance by The Lone Gunmen. DEF CON was portrayed as a United States government–sponsored convention instead of a civilian convention.
- A semi-fictionalized account of DEF CON 2, "Cyber Christ Meets Lady Luck", written by Winn Schwartau, demonstrates some of the early DEF CON culture.
- A trip to DEF CON for a hacker showdown figures into the plot of The Signal. Director William Eubank came to Las Vegas and screened the film at DEF CON Movie Night.
- A fictionalized version of DEF CON called "EXOCON" is the setting for the climax of Jason Bourne, the fifth film of the Bourne film series. The primary antagonist of the film, a fictionalized CIA director, played by Tommy Lee Jones, is a keynote speaker at the event, mimicking DEF CON 20's controversial keynote speaker, NSA director Keith B. Alexander.
- In the Mr. Robot Season 3 opener "eps3.0_power-saver-mode.h" Elliot and Darlene visit a qualifying tournament for the DEF CON Capture the Flag (CTF) contest. DEF CON's smiley-face-and-crossbones mascot Jack is visible among the set decorations, and the scene is accompanied musically by a track from DEF CON 24's official soundtrack; 'Razorgirl' by Dubvirus.
- Documentarian Werner Herzog included DEF CON in his 2016 film Lo and Behold, Reveries of the Connected World, a film described as a "playful yet chilling examination of our rapidly interconnecting online lives".
Venues, dates, and attendance
Each conference venue and date has been extracted from the DEF CON archives for easy reference.
| Conference Name | Venue | Duration | Year | Attendance | ||||||
|---|---|---|---|---|---|---|---|---|---|---|
| DEF CON 33 | Las Vegas Convention Center | August 7–10 | 2025 | last=Moss | first=Jeff | title=DC33 Attendance | date=August 21, 2025 | url=https://www.reddit.com/r/Defcon/comments/1mwli4l/comment/na04vz4/ | website=Reddit | access-date=September 12, 2025}} |
| DEF CON 32 | Las Vegas Convention Center, and The Sahara | August 8–11 | 2024 | N/A | ||||||
| DEF CON 31 | Caesars Forum, Flamingo, Harrah's Hotel, and Linq Hotel | August 10–13 | 2023 | ~25,000 | ||||||
| DEF CON 30 | Caesars Forum, Flamingo, Harrah's Hotel, and Linq Hotel | August 11–14 | 2022 | ~25,000 | ||||||
| DEF CON 29 | Paris Hotel and Bally's Hotel | August 5–8 | 2021 | ~8,700 | ||||||
| DEF CON Safe Mode | Virtual event | August 6–9 | 2020 | N/A | ||||||
| DEF CON 28 | Planned Caesars Forum, Harrah's, The Linq, and Flamingo | August 6–9 | 2020 | 0 | ||||||
| DEF CON 27 | Paris Hotel, Bally's Hotel, Planet Hollywood, and Flamingo | August 8–11 | 2019 | ~30,000 | ||||||
| DEF CON China 1.0 | 751 D-Park | May 31–June 2 | 2019 | Unknown | ||||||
| DEF CON 26 | Caesars Palace and Flamingo | August 9–12 | 2018 | url=https://www.defcon.org/html/links/dc-transparency.html | title="DEF CON Transparency" | date=August 2018 | access-date=2018-10-28}} | |||
| DEF CON China [Beta] | Kuntai Hotel (Beijing) | May 11–13 | 2018 | Unknown | ||||||
| DEF CON 25 | Caesars Palace | July 27–30 | 2017 | url=https://www.defcon.org/images/defcon-25/DEF%20CON%2025%20voting%20village%20report.pdf | title="Voting Machine Hacking Village" | date=September 2017 | access-date=2018-05-17 | page=4}} | ||
| DEF CON 24 | Paris Hotel and Bally's Hotel | August 4–7 | 2016 | url=https://us.norton.com/internetsecurity-emerging-threats-norton-at-defcon.html | title="Norton at DefCon" | date=September 2019 | access-date=2019-09-15 | archive-date=2020-06-25 | archive-url=https://web.archive.org/web/20200625162807/https://us.norton.com/internetsecurity-emerging-threats-norton-at-defcon.html | url-status=dead}} |
| DEF CON 23 | Paris Hotel and Bally's Hotel | August 6–9 | 2015 | url=https://graytier.com/blog/gray-tier-technologies-at-defcon23/ | title="Gray Tier Technologies at DEFCON23" | date=August 2015 | access-date=2019-09-15}} | |||
| DEF CON 22 | Rio Hotel & Casino | August 7–10 | 2014 | url=https://venturebeat.com/2014/08/12/black-hat-and-defcon-see-record-attendance-and-thats-not-even-counting-the-spies/ | author=Richard Byrne Reilly | title="Black Hat and Defcon see record attendance — even without the government spooks" | date=2014-08-12 | access-date=2017-06-07}} | ||
| DEF CON 21 | Rio Hotel & Casino | August 1–4 | 2013 | 12,000 | ||||||
| DEF CON 20 | Rio Hotel & Casino | July 26–29 | 2012 | Unknown | ||||||
| DEF CON 19 | Rio Hotel & Casino | August 4–7 | 2011 | Unknown | ||||||
| DEF CON 18 | Riviera Hotel & Casino | July 30–August 1 | 2010 | Unknown | ||||||
| DEF CON 17 | Riviera Hotel & Casino | July 30–August 2 | 2009 | Unknown | ||||||
| DEF CON 16 | Riviera Hotel & Casino | August 8–10 | 2008 | url=https://www.defcon.org/html/defcon-17/dc-17-faq.html | title=DEF CON 17 FAQ | access-date=2018-07-07}} | ||||
| DEF CON 15 | Riviera Hotel & Casino | August 3–5 | 2007 | Unknown | ||||||
| DEF CON 14 | Riviera Hotel & Casino | August 4–6 | 2006 | Unknown | ||||||
| DEF CON 13 | Alexis Park Resort | July 29–31 | 2005 | Unknown | ||||||
| DEF CON 12 | Alexis Park Resort | July 30–August 1 | 2004 | Unknown | ||||||
| DEF CON 11 | Alexis Park Resort | August 1–3 | 2003 | Unknown | ||||||
| DEF CON 10 | Alexis Park Resort | August 2–4 | 2002 | Unknown | ||||||
| DEF CON 9 | Alexis Park Resort | July 13–15 | 2001 | Unknown | ||||||
| DEF CON 8 | Alexis Park Resort | July 28–30 | 2000 | Unknown | ||||||
| DEF CON 7 | Alexis Park Resort | July 9–11 | 1999 | Unknown | ||||||
| DEF CON 6 | Plaza Hotel & Casino | July 31–August 2 | 1998 | Unknown | ||||||
| DEF CON 5 | Aladdin Hotel & Casino | July 11–13 | 1997 | Unknown | ||||||
| DEF CON 4 | Monte Carlo Resort and Casino | July 26–28 | 1996 | Unknown | ||||||
| DEF CON 3 | Tropicana Resort & Casino | August 4–6 | 1995 | Unknown | ||||||
| DEF CON 2 | Sahara Hotel and Casino | July 22–24 | 1994 | ~200 | ||||||
| DEF CON 1 | Sands Hotel and Casino | June 9–11 | 1993 | ~100 |
References
References
- "Def Con 1 Archive".
- "Defcon Onion Links".
- "DefCon Beverage Cooling Contraption Contest".
- Tangent, The Dark. "DEF CON® Hacking Conference – About".
- "DEFCON about".
- {{cite video. Jeff Moss]]. (July 30, 2007). "The Story of DEFCON". link
- "Def Con 27 Transparency Report - DEF CON Forums".
- "DEFCON: The Documentary".
- "Coronavirus claims new victim: 'DEF CON cancelled' joke cancelled after DEF CON China actually cancelled".
- "Defcon is Cancelled".
- "DEF CON 28 Safe Mode FAQ".
- "DEF CON 29 FAQ".
- Oberhaus, Daniel. (September 18, 2018). "A History of Badgelife, Def Con's Unlikely Obsession with Artistic Circuit Boards".
- McAllister, Neil. (August 12, 2015). "Is this the most puzzling DEF CON attendee badge yet on record?".
- Evenchick, Eric. (2013-08-04). "DEF CON: Tamper Evidence, Contests, And Embedded Talks".
- Molina, Brett. (August 14, 2018). "11-year-old hacks replica of Florida state website, changes election results".
- "Home".
- Oberhaus, Daniel. (2016-08-11). "Def Con Has Always Been Straight, White, and Male, But It’s Finally Changing".
- Finkle, Jim. (2012-07-31). "Def Con hackers go mainstream but still love to party".
- Franceschi-Bicchierai, Lorenzo. (2021-04-16). "The World’s Largest Hacking Conferences Are Back IRL This Summer".
- Sakellariadis, John. (2023-08-12). "For U.S. officials, the world’s largest hacking conference isn’t all fun and games".
- "Hacker Jeopardy for DEF CON 28".
- "DEF CON Scavenger Hunt".
- "DEF CON Crash and Compile Contest".
- "Hackfortress".
- Tangent, The Dark. "DEF CON® Hacking Conference – Black Badge Hall of Fame".
- (20 April 2017). "Innovations in Defense: Artificial Intelligence and the Challenge of Cybersecurity".
- "Mayhem Wins DARPA CGC".
- Moss, Jeff. "DEF CON Hacking Conference - Capture the Flag Archive".
- vulc@n of DDTek. (2023). "A history of Capture the Flag at DEF CON".
- Riley, Eller. (2004). "Capture the Flag Games".
- (2001-07-09). "Defcon 9 - Capture The Flag Contest Network".
- "4/23/ Immunix & Defcon: Defending Vulnerable Code From Intense Attack Crispin Cowan, Ph.D Seth Arnold, Steve Beattie, Chris Wright WireX and John. - ppt download".
- Crispin, Cowan. (May 2003). "Defcon Capture the Flag: defending vulnerable code from intense attack". DARPA Information Survivability Conference and Exposition.
- Ghettohackers. "Defcon 10 - Capture the Flag (CTF) contest".
- The Ghetto Hackers. (June 29, 2003). "Announcing Capture the Flag - Root Fu - Vegas 2003 @ DefCon 11".
- Jordan. (2021-04-06). "A Brief History of CTF".
- (2018-03-28). "A Brief History of CTF - Jordan Wiens".
- (2011-05-14). "Diutinus Defense Techonologies Corp. / Home".
- The FreeBSD Project. (2011-09-28). "Buffer overflow in handling of UNIX socket addresses".
- routardz. "Defcon 19 CTF - CTF Inside".
- "Cyber Grand Challenge (CGC) (Archived)".
- Unknown. "cLEMENCy - Showing Mercy".
- "A Brief History of CTF".
- "Diutinus Defense Technologies Corp. / DC17".
- "Diutinus Defense Technologies Corp. / DC18".
- "Diutinus Defense Technologies Corp. / Home".
- "DEF CON CTF 2018".
- "OOO — DEF CON CTF".
- "OOO — DEF CON CTF".
- "OOO — DEF CON CTF".
- "CTFtime.org / DEF CON CTF 2022".
- "CTFtime.org / DEF CON CTF 2023".
- "CTFtime.org / DEF CON CTF 2024".
- "Official forums social group section for DEF CON groups".
- Nuttall, Chris. (1999-07-13). "Back Orifice is child's play, say virus firms".
- (2001-07-19). "Russian computer programmer arrested at hacker conference".
- Lundin, Leigh. (2008-08-17). "Dangerous Ideas". Criminal Brief.
- Jeschke, Rebecca. (2008-08-09). "MIT Students Gagged by Federal Court Judge". [[Electronic Frontier Foundation.
- "Race to Zero".
- McMillan, Robert. (April 2008). "Antivirus Vendors Slam Defcon Virus Contest". IDG News Service.
- Zetter, Kim. "Malicious ATM Catches Hackers".
- (August 10, 2011). "Legal Threat Pushes Former HBGary Federal CEO Out Of DEFCON". Business Security.
- Greenberg, Andy. "[https://www.forbes.com/sites/andygreenberg/2013/06/06/watch-top-u-s-intelligence-officials-repeatedly-deny-nsa-spying-on-americans-over-the-last-year-videos/ Watch Top U.S. Intelligence Officials Repeatedly Deny NSA Spying On Americans Over The Last Year (Videos)]." ''[[Forbes]]''. June 6, 2013. Retrieved on June 11, 2013. "Eight months later, Senator Ron Wyden quoted[...]"
- Wagenseil, Paul. "[https://web.archive.org/web/20160306025944/http://www.nbcnews.com/id/48429672/ns/technology_and_science-security/t/hackers-dont-believe-nsa-chiefs-denial-domestic-spying/#.UbnytdiaKSo Hackers Don't Believe NSA Chief's Denial of Domestic Spying]." ([https://web.archive.org/web/20160306025944/http://www.nbcnews.com/id/48429672/ns/technology_and_science-security/t/hackers-dont-believe-nsa-chiefs-denial-domestic-spying/ Archive]) [[NBC News]]. August 1, 2012. Retrieved on June 13, 2013.
- Whitney, Lance. "[http://news.cnet.com/8301-1009_3-57593225-83/defcon-to-feds-we-need-some-time-apart/ Defcon to feds: 'We need some time apart']". [[CNET]]. July 11, 2013. Retrieved on July 12, 2013. {{Dead link. (August 2025)
- [[Violet Blue. Blue, Violet]]. "[https://www.zdnet.com/article/feds-not-welcome-at-def-con-hacker-conference/ Feds 'not welcome' at DEF CON hacker conference]". [[ZDNet]]. July 11, 2013. Retrieved on July 11, 2013.
- Constantin, Lucian. (2013-08-05). "Will Smith makes unexpected appearance at Defcon hacker conference".
- Pellerin, Cheryl. "Three Teams Earn Prizes in DARPA Cyber Grand Challenge".
- "ForAllSecure | Mayhem Security | Application Security".
- "DEF CON Capture the Flag Final Scores". blog.legitbs.net.
- Joe Uchill. (July 29, 2017). "Hackers breach dozens of voting machines brought to conference". [[Thehill.com]].
- "DEF CON Hacking Warns Voting Machines Vulnerability, Oct 10 2017 {{!}} C-SPAN.org".
- "O'Reilly Security Conference in NYC 2017 Defender Awards". conferences.oreilly.com.
- (August 4, 2017). "Briton who stopped WannaCry attack arrested over separate malware claims". [[The Guardian]].
- (6 March 2018). "WOW! Congrats to the @defcon Team, recently honored for its innovative #VotingVillage concept & the continued debat…".
- "DEF CON 28 in-person conference is CANCELLED - DEF CON Forums".
- "DEF CON Safe Mode archive site".
- "DEF CON is canceled! No, really this time – but the show will go on". The Register.
- (14 September 2023). "Caesars Ransomware Attack, MGM Hit Linked To DEFCON?".
- "Bomb scare causes mass evacuation at DEF CON". The Register.
- Winn Schwartau. "Cyber Christ Meets Lady Luck".
- "Mr. Robot". Tunefind.
- "DEF CON® Hacking Conference – Show Archives".
- Moss, Jeff. (August 21, 2025). "DC33 Attendance".
- "DEF CON 32 Was Canceled. We Un-Canceled it.".
- Newman, Lily Hay. "Defcon Is Canceled".
- (August 2018). ""DEF CON Transparency"".
- (September 2017). ""Voting Machine Hacking Village"".
- (September 2019). ""Norton at DefCon"".
- (August 2015). ""Gray Tier Technologies at DEFCON23"".
- Richard Byrne Reilly. (2014-08-12). ""Black Hat and Defcon see record attendance — even without the government spooks"".
- "DEF CON 17 FAQ".
This article was imported from Wikipedia and is available under the Creative Commons Attribution-ShareAlike 4.0 License. Content has been adapted to SurfDoc format. Original contributors can be found on the article history page.
Ask Mako anything about DEF CON — get instant answers, deeper analysis, and related topics.
Research with MakoFree with your Surf account
Create a free account to save articles, ask Mako questions, and organize your research.
Sign up freeThis content may have been generated or modified by AI. CloudSurf Software LLC is not responsible for the accuracy, completeness, or reliability of AI-generated content. Always verify important information from primary sources.
Report