
DEFCON 12 - After the Hangover 135
DECula writes "Humphrey Cheung has written an excellent article for Tomshardware about what WAS Defcon 12. The combination of talks about a BlueSniper antenna and BlueSnarfing was a good match."
Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (4) How many times do we have to tell you, "No prior art!"
Hangover? (Score:5, Funny)
Re:Hangover? (Score:2, Funny)
That is much more likely given the ratio and complete inability for male nerds to get along with members of the opposite sex...
Re:Hangover? (Score:2)
I bet at least one guy accidentally married a hooker.
Re:Hangover? (Score:1)
Re:Hangover? (Score:2)
Re:Hangover? (Score:1, Offtopic)
Like Missouri?
no gay marriage (Score:1)
=D
Re:Hangover? (Score:2)
Perhaps this might help explain the opposition towards legalizing same-sex marriages...
Man (Score:3, Funny)
I mean, hell, you can't even describe it without USING A DAMNED ACRONYM.
Sheesh.
Re:Man (Score:5, Funny)
without USING A DAMNED ACRONYM
See the irony in the post?
Re:Man (Score:1)
Re:Man (Score:2)
Actually, no. It's not obvious. Click on my sig and read up on what irony is.
What he said isn't ironic...it's just funny.
Re:Man (Score:2)
Ok, apparently my post uses too many big words for you to handle it. Fine, then, don't read it...check the word over at dictionary.com, feel humiliated when you realize you're wrong, and then I'll accept your apology. :p
You probably already know you're wrong, though...I notice you posted AC.
Re:Man (Score:3, Funny)
See the irony in the post?
ACRONYM: A Contrived Reduction Of Nomenclature, Yielding Mnemonics.
Re:Man (Score:1)
Re:Man (Score:1)
Yes! Telecom [carrieraccessbilling.com] which is a superset of the networking acronyms from IT.
Re:Man (Score:1)
Re:Man (Score:2)
Re:what does... (Score:4, Informative)
Re:what does... (Score:5, Informative)
In the Government it stands for: DEFense CONdition or DEFense readiness CONditions
Wall of Sheep (Score:4, Funny)
Re:Wall of Sheep (Score:1)
Re:Wall of Sheep (Score:1)
Re:Wall of Sheep (Score:5, Informative)
The reason was there was a guy walking around with a "I F*** Sheep" Shirt. The guys thought that the people who sent cleartext passwords were like a herd of sheep. And the name stuck...
Humphrey Cheung
Editor - www.tomshardware.com
Webmaster - www.not5150.com (300+ Extreme Videos)
Re:Wall of Sheep (Score:1)
I suggest you hook up with some con veterans and not hang out with noobs.
Re:Wall of Sheep (Score:1, Informative)
Anyone who was a supposed "Veteran" would know that, I sat about 5 feet from that projector.
Re:Wall of Sheep (Score:2, Informative)
Here is a screenshot from the projecting laptop.
http://www.not5150.com/wallofsheep.png
Also if you RFTA'ed, You would see that I interviewed the guy who made and coded the wall.
Humphrey Cheung
Editor - www.tomshardware.com
Webmaster - www.not5150.com (300+ Extreme Videos)
Re:Wall of Sheep (Score:1)
I guess if you code the app. then you can call it whatever you want and insert your own personal jokes. That's the way it goes (and rightly so). For many of us it will continue to be the "Wall of Shame" whether it is a slick app. projected via laptop or scraps of paper pinned to the wall.
I'm wrong. You're right. U R 2 31337 4 M3.
Why no, I'm not old an bitter. Why do you ask?
SuicideGirls (Score:5, Funny)
Re:SuicideGirls (Score:2)
Re:SuicideGirls (Score:2)
They're better in person (Score:1)
Wait...where are.... (Score:5, Funny)
What? It's not that kind of convention?
Crap. That's not much of a convention at all then...
Spot the Fed error (Score:5, Funny)
slashdotted already? (Score:1)
Re:slashdotted already? (Score:2, Funny)
Re:slashdotted already? (Score:1)
Is there something stuck in my teeth?
Mirror (Score:1)
The 12th annual Defcon hacker convention was held at the Alexis Park Hotel in Las Vegas Nevada. For three days, hackers exchanged ideas, presented new and sometimes scary information and partied hard. More than a hundred speakers gave dozens of talks on computer security, hacking and privacy issues.
For a mere $80 attendees received access to the talks, contests and the after-hours parties. In this article we will cover some of the more interesti
Re:Mirror (Score:1)
Re:Mirror (continued) (Score:1)
Bluetooth Vulnerabilities
Hackers have found many flaws with Bluetooth devices. As these devices gain in popularity, the public needs to be made aware of vulnerability issues with the various Bluetooth devices such as phones, PDAs and wireless headsets.
Three of the most interesting attacks were Bluesnarfing, Bluetracking and Bluebugging. Bluesnarfing is attacking the Bluetooth device, usually a phone, to rip out information. Hackers can obtain phonebooks, calendars and stored SMS me
pictures (Score:5, Interesting)
What happens in Vegas, stays in Vegas.... (Score:2)
Re:pictures (Score:1)
Serious, You folks in states are doomed, those babes, they are not simply fat, they are not even ms.PEGGY fat, they are FAAAAAAAT HOGGY style. Fat all over the place, liquid belly, 3 chins and all
Russian porno sites dont even come close to that one, they got 3-5 fat chicks at max, and now it looks like they imported them from states. I have no idea what are you waiting for ? BAN mc.Donald at once. Or move to europe.
Is it just me.. (Score:1)
Fight! (Score:1, Interesting)
Re:Fight! (Score:5, Informative)
The fight was crazy. Basically the kid told the crowd to go to the Republican Convention and "Fuck up their shit" via any means possible. He told everyone to hack the website, use DDoS attacks, etc. He must be a fucking moron to start talking politics at a hacker convention.
Basically, the crowd got pissed at his anti-free speech talk and started giving him shit. Security cut the talk short, and the crowd mobbed the stage to start firing questions at this punk. Eventually, 1 guy got nose to nose with the speaker, which is when he was wisked away by security.
Re:Fight! (Score:1)
*shrug* Eh, can't help but troll to get modded funny....
Did you know...? (Score:3, Funny)
Team Tsunami (Score:5, Insightful)
One might doubt the wisdom of issuing sniper rifles and live ammunition to Counter Strike junkies.
Re:Team Tsunami (Score:2, Funny)
Good article (Score:5, Funny)
On the next page, the analisys [an error occurred while processing this directive], again, very dumb.
Overall, a good article. But in the next time, I think we could see [an error occurred while processing this directive]
Spot the Fed... (Score:5, Interesting)
Oh lord, the oh-no-it's-not-fun-it's-against-the-law crowd will come out on this one. Seriously though, know thine enemy, what good fortune that you can enjoy the company of said "enemy". Hell, the Defcon kids enjoy knowing the "Feds" are there and will be watching. This is the cat and mouse that i admire and enjoy.
i'm serious, good to see this tradition is still going strong. May both parties always be present, enjoy and learn....and i mean that, both parties. Happy hunting
Re:Spot the Fed... (Score:1)
Re:Spot the Fed... (Score:1)
Re:Spot the Fed... (Score:1)
Rifles (Score:4, Informative)
Re:Rifles (Score:4, Informative)
--
Carbolic
www.bluedriving.com [bluedriving.com]
Re:Rifles (Score:1)
Humphrey Cheung
Editor - www.tomshardware.com
Webmaster - www.not5150.com (300+ Extreme Videos)
Re:Rifles (Score:2)
Neither did I, since I was stuck in that endless line to get in. Fucking ridiculous.
Electronic Civil Disobedience speaker said WHAT??? (Score:2)
Anyone? Details, please!!
Re:Electronic Civil Disobedience speaker said WHAT (Score:1)
Re: (Score:3, Insightful)
Re:Electronic Civil Disobedience speaker said WHAT (Score:4, Insightful)
1) The best you can propose is a DDOS attack? I mean, come on! That's just stupid, and causes collateral network slowdowns as well... how about something useful, like getting into the servers, redirecting to other [georgewbush.org] websites or plain ol-fashioned defacing of main pages? A DDOS attack... it's just so lame...
2) The guy can't even write a decent call-to-arms. "undemocratic will of the people" ? Did someone proofread this crap?? ;-)
And no, I am not advocating that anyone should hack into any computer system, anywhere, because that would be wrong and illegal. No, really...
Besides, individual bodies actually showing up in person all at once would be much more convincing and newsworthy than a website being down for a few minutes. If you want to disrupt the convention, I'm guessing a whole bunch of protesters showing up in person would be more effective than shutting down a website.
Re: (Score:3, Insightful)
Re:Electronic Civil Disobedience speaker said WHAT (Score:1)
Although I can see the argument that some sort of electronic attack on the RNC cold be a valid form of civil disobedience
It's a valid form of stupidity. We all know that the feds are worried about something going down during the conventions. That's why the DNC had so much security. Electronic attacks are (like it or not) considered a form of terrorism. You're pissed at the c
VoIP Speech (Score:4, Funny)
Re:VoIP Speech (Score:1)
licutis
AirPwn (Score:5, Informative)
http://www.evilscheme.org/defcon/ [evilscheme.org]
At Defcon 12 this year my cow-orkers and I brought along a little piece of code called "airpwn." Airpwn is a platform for injection of application layer data on an 802.11b network. Although the potential for evil is very high with this tool, we decided to demonstrate it (and give it its first real field trial) on something nasty, but harmless (compared to say, wiping your hard-drive)
airpwn requires two 802.11b interfaces, one for listening, and another for injecting. It uses a config file with multiple config sections to respond to specific data packets with arbitrary content. For example, in the HTML goatse example, we look for any TCP data packets starting with "GET" or "POST" and respond with a valid server response including a reference to the canonical goatse image.
(Hugs toast!)
Re:AirPwn (Score:1)
Re:AirPwn (Score:2)
The tool injects the data in a way that isn't possible to block unless you drop packets from the server. Tunnel your traffic if you care.
(Hugs toast!)
Re:AirPwn (Score:2)
Re:AirPwn (Score:1)
Re:AirPwn (Score:2)
Especially by the Wall of Sheep.... that place was a virtual microsoft-haven.
I'm surprised no one did an all out Windows hack there and turn everyone into zombie systems controlled from a central point. That's the first thing that popped into my head when I saw so many ppl using Windows.
Re:AirPwn (Score:1)
If I was going to play games with people's wifi, I would have used a lighter touch: Only replace DoubleClick pix requests (if anyone doesn't have them blocked), only hit a particular browser program at a time, or just replace the Slashdot logo. :^) (Sugges
Knows what he's talking about (Score:2, Interesting)
Later that day, I talked to the fed who got nabbed in that spot the fed video [tomshardware.com]. He was running Kismet when he got called up. Others around him whispered "He can't be a fed, he's running Kismet". Don't be fooled. I think some of these fed types dig technology as much as any hacker.
The Bluesniper rifle by the guys at Flexilis is so cool - I built the bluetooth gear for them from the kits on
Miners strike (Score:2, Informative)
From the Article:
'The volume of information being seized for forensic analysis has mushroomed. It is not uncommon to see multiple terabytes of storage being examined. Agents said that some cases are approaching the petabyte range. Usually is because of emails and email attachm
The Challenge of Managing Petabytes of Storage (Score:1)
Challenge of Managing Petabytes of Storage
The great sucking noise of the expense of many Petabyte cases has got to be visible somewhere outside classified media.
Like I care, I pay taxes in more of a bananna republic, well I do care a little, just want to persuade someone else to do the spade work, while it is not part of my job, at which point I will become a lacky like everyone else, probability of selling out 99.9 percent and rising.
That does mean I have not crossed the line and it makes me 0.1% qu
Re:The Challenge of Managing Petabytes of Storage (Score:1)
60 IBM 3390 Model 3 disks.
Disks [ibm.com]
five StorageTek Powderhorn Automated Cartridge Systems. containing 6,000 tape cartridges.
tape library [storagetek.com]
And the problem is still not N complete, the more data there is the harder it is going to get, not being able to get wiretaps made the problem almost manageable. The right to silence was their luxury. At petabytes of data that is oh lots for every person on the planet.Lets all get with the careless talk.
I am being lazy the numbers are stagger
Dual Use Technologies (Score:1)
I remember reading that people are using blog analysis to track language development, presumably including cross blog information spread, so doing that with emails if you have everybodies might be an interesting academic exercise and it would be nice to know what the state of the art is, classifies and unclassified, and nicer to know what is hard and will be hard for the next 20 years.
At what point th
Electronic Civil Disobedience (Score:3, Informative)
Re:Electronic Civil Disobedience (Score:1)
From a quick seach on google groups
BlueJacking... (Score:1)
If you are able to get past the horrible English, that is.
http://www.net-cell.com/mp/index.html [net-cell.com]
defcon is the only place (Score:4, Funny)
Bluejacking (Score:2, Informative)
The KR1PT0 Car. (Score:3, Informative)
The bumper stickers are the best part.
SSH Attacks (Score:3, Interesting)
New competiton at DefCON 12 TCP/IP embedded device (Score:2)
The Lockpicking contest was raw skill as well.
LosT
Re:Where da white wimmen at? (Score:1, Redundant)
good ones here from DEFCON 12...
http://www.timekiller.org/gallery/SomeChick
Re:Where da white wimmen at? (Score:1)
Re:Where da white wimmen at? (Score:2)
Re:Where da white wimmen at? (Score:1)
Re:Where da white wimmen at? (Score:1)