The crew at Defcon is hard at work getting things ready for this year’s event, taking place over the first weekend in August. While the typical call for papers has been out for almost two months now, the extra space afforded by the RIO hotel has given the organizers a chance to shake things up a bit and try something new.
Along side the call for papers, they have issued a call for workshops. Since they have about 8 spare rooms on hand, they have decided to allow people who consider themselves a leader, ‘leet hacker, or ninja in their particular field to share their knowledge in a small (30 person) workshop setting.
The organizers are not strict on content, though it should be compelling. They cite examples such as teaching people to build an impenetrable Linux installation, PS3 hacking, or even helping people prep for a Ham radio license exam.
If you have something interesting to share with the community, be sure to swing by the Defcon site and get your application started!
As he does every year, [Joe Grand] gave a talk explaining the development process for Defcon 18 badges. We looked in on these when details started trickling out back in July. They feature a neat bit of tech in the form of an LCD that acts much like ePaper. It doesn’t take any electricity to hold the image, only to change the display. This is a valuable feature for a battery powered device and allowed him to get about 9 days of juice out of a CR2032. This year’s badges also used laser-etched Aluminum as a substrate.
We’ve embedded the talk after the break and found it interesting enough to watch the entire hour. If you’re more interested in the hacks that came out of the badge, we’ve put together a playlist of videos [Joe] took while at the conference.
Continue reading “A look back at DefCon 18 badges”
The details are out for the DefCon 18 badges. The new design has a lot of goodies packed into it, most notably a 128×32 LCD display. You can’t see it in the image above because it’s on the other side of the badge; the ribbon cable passes through a slit in the substrate to reach the connector on the back. The board has a mini-USB connector and is meant to get even the unseasoned novice up and running with some firmware tweaks. The Freescale processor (which is the same chip as last year’s badge) is running a bootloader that can be accessed and flashed using a terminal program. Yeah… impressive.
But it doesn’t stop with the component selection or firmware mastery, these badges are beautiful too. What you see above is the prototype, but the 7780 badges produced come in seven different flavors (as usual), laser etched on a PCB that uses Aluminum as the substrate. Line up all the badges side-to-side and you get a graphic art storyboard. [Joe] outdid himself this year, and he’s been nice enough to share the development details (PDF) which we spent way too much time drooling over.
Following up on their post about the new Defcon 17 badges, Wired recently posted some of the best badge hacks of the con. Among the hacks featured were an LED frequency meter hack, a sound seeking dirigible powered by three badges, and a wireless geiger counter random number generator that sent random numbers back to a laptop equipped with a zigbee card. Probably one of the most impressive hacks mentioned, the hack that won the badge hacking contest, was the LED equipped baseball cap modeled above by [Joe Grand], Defcon’s defacto badge designer.
The hacked badge is connected to the cap by an ethernet cable, where the LEDs pulse on and off in order to defeat facial recognition systems. The cap’s designer told Wired that he initially designed the cap in order to sneak into [Grand]’s room to steal the über badges under his protection. Needless to say, the winner doesn’t have to worry about stealing the badges anymore as he was awarded his own über badge at the award ceremony. While we’re not completely sure who pulled off this awesome hack, we congratulate you and all of the participants of the badge hacking contest on your fantastic hacks.
Update: We’ve confirmed that the badge contest winner was in fact [Zoz Brooks], [Grand]’s co-star on the popular Discovery channel show Prototype This. From all indications, his hack seems to be legitimate and not a clever idea, however we are still looking to confirm this. Also, even though Wired’s article stated that the dirigible was sound seeking, we have confirmed that it is sound avoiding. Thank’s to everyone in the comments for pointing these things out.
A fake ATM machine, set to capture ATM information was found at Defcon 17 in vegas this year. Its design has a tinted plastic window at the top which attendees noticed had a computer in it. It was quickly removed by the police. Is this an amazing coincidence? We doubt it. Someone probably knew exactly who was going to be there and either wanted to scam some hackers or just wanted to have some fun.
[Aaron] has been working at iweb hosting for about 5 years. When he started, the number of servers was small enough that managing them was fairly painless and could be done by just manually verifying that everything was operational. As the number of servers grew, this task became more and more difficult. They employed various methods of tracking problems, but found them all lacking in one way or another. They got an idea to build a Defcon status page based on all of the information collected about their server status. The page was built and all rejoiced. As with most projects, they just couldn’t leave it alone. Next, they built an android app to be able to see the defcon status from their phones. As cool as that was, they felt they needed to have yet another way to keep track. They What you see above is the prototype for the office defcon status display. It is extremely simple, using an Arduino (yes, we know, massive overkill) to receive status updates to change the display number. [Aaron] says that right now it is a mess, and you have to shield it from the light with your hands to see it, but it works. What should the next step be? A giant Alpha Numeric LED indicator? A nixie tube?
Defcon is upon us once again, and that can only mean one thing: new badge designs. Our friends over at Wired posted the picture above along with a description of this year’s new badge. Since our last post, there has been little new information released regarding the components used for the new badge. However, we now know that it utilizes a microphone and a full color LED along with the Freescale mc56f8006, an advanced digital signal processing microcontroller. [Grand], the badge designer, told Wired that while this year’s design is a bit simplified compared to last year’s design, it is not nearly as easy to hack. Just like last year, the functionality of the badge hasn’t been announced yet. We’re hoping for some kind of communicator. Be sure to check out Wired’s article if you want to see the high res pictures.