This is a group of rooms dedicated to teaching hacking, hardware engineering, encryption, etc., but focusing on a very particular demographic: kids.Īccording to its website, the Asylum typically caters to kids between the ages 8 and 16.īeyond giving kids the tools and skills to do their own hacking, r00tz also educates them about the role cybersecurity plays in their lives and in the world at large.Īnother point worth bringing up is that r00tz has an explicit goal of teaching hacking skills as a tool "for good". r00tz AsylumĪnother yearly event held within DEF CON is the r00tz Asylum. While supercomputers still have a long way to go before they can defeat human opponents, Mayhem does give life to the idea that competent, self-patching security systems are on the horizon. The result? Mayhem got 15th place out of 15 entrants. On August 5th-7th, Mayhem went up against some of the best competitive hacking teams in the country.
In this year's CGC, Mayhem defeated its machine opponents. Part of the team's reward for this victory (along with $2 million) was an invitation to pit Mayhem against humans at DEF CON's annual Capture the Flag competition. Mayhem is a supercomputer developed by the Pittsburgh-based team, ForAllSecure. In addition, some games also include "Jeopardy-style" rules, where the teams must solve a series of puzzle-like tasks-each unlocking the next-to earn points.
Hacker defcon Patch#
They must simultaneously patch their network to defend it from attack while also developing breaches for the opposing team's network.
Hacker defcon full#
In hacking, each team is given a network that is full of weaknesses. Of course, "Capture the Flag" means something different to hackers than it does to most people. "Mayhem" Supercomputer Competes with Humansįor the unfamiliar, the Cyber Grand Challenge (or CGC) is a yearly competition hosted at DEF CON by DARPA, first hosted in 2013. Other Village Talks (broken up into multiple "Village" segments, e.g., "IoT") from this year's event included updates on the FCC's cybersecurity activities, automated dorking, lessons from last year's Ashley Madison hack, cryptography in Python, reverse engineering RF drones, and introductions to various hacking tools and systems. Image courtesy of August (one of the four locks that Rose and Ramsey could not hack). According to the hackers, these companies declined to change their systems, even when faced with proof that they were easily breached.Įxample of a BLE lock.
Hacker defcon Bluetooth#
On top of proving the vulnerabilities of these locking mechanisms, the presentation also introduced open source hacking tools that could be used to hack both vanilla Bluetooth and BLE locks.īefore you become too outraged at Rose and Ramsey's goals in this presentation, you should be aware that they contacted 14 of the 16 companies that produced the locks regarding the vulnerabilities they found. That is to say, they picked 12 different BLE locks-from nearly half a mile away and using minimal equipment. The duo investigated 16 different BLE lock products and found issues with the security of 12 of them.
Hacker defcon professional#
Here are a few highlights, in case you missed them:Īnthony Rose, an electrical engineer, and Ben Ramsey, a professional information security expert, presented "Picking Bluetooth Low Energy Locks from a Quarter Mile Away". Cyber security experts and hackers alike came to the event to congregate with their peers and share information on the latest in the industry. Over 22,000 people attended this year's DEF CON. A roundup of stories and updates from this year's DEF CON hacking convention in Las Vegas, which was held in Las Vegas, August 4-7.