Welcome to our 5th DEFCON 201 Meet Up!
Meet & Greet & GPG Key-Signing Party
Bring your projects and have your GPG Keys ready. If you don't know how PGP/GPG Encryption works, our Co-Founders will teach you how easy it is and teach you how to set up one right there in seconds!
DEFCON 25 (& Black Hat USA & BSides LV) Survival Guide
Keynote by Sidepocket (20 minutes)
July 25th to July 31st is “Hacker Summer Camp” a crazy week where three major conventions all happen around the same time on the Las Vegas Strip. Going for the first time ever to a hacker convention or a long time vet, we are going to get you up to speed on how to survive 37,000 hackers all in one building. Topics include what to bring, how to act, how to computer without getting 0wnd and detailed overviews of BSides Las Vegas, DEFCON and Black Hat USA in 2017! Bio: Sidepocket is an awful human being that for some reason people listen to. A Co-Founder of DEFCON 201, an open group for hacker workshop projects in North East New Jersey, he is constantly wanting to help people how to get better at whatever they want to do and learn. He also has a history with NYC 2600, Radio Statler at Hackers on Planet Earth, Phone Losers of America, Museum of Urban Reclaim Spaces and The Yes Men. Find out more about DEFCON 201 at: http://www.defcon201.org
Ransom From The Underground
Talk by XlogicX (30 minutes)
Now that the basics was covered by OWASP, XlogicX will take you into a world of advance features such as how exactly Rasomware is built and more advance attacks techniques malicious hackers use and how to prevent them. Plus, many surprise announcements! If you are unable to go to DEFCON 25 this year, you don’t want to miss this! Bio: XlogicX hacks at anything low level. He's unmasked sanitized IP addresses in packets (because checksums) and crafts his own pcaps with just xxd. He feeds complete garbage to forensic tools, AV products, decompression software, and intrusion detection systems. He made evil strings more evil (with automation) to exploit high consumption regular expressions. Lately he has been declaring war on assembly language (calling it too high-level) and doing all kinds of ignorant things with machine code. More information can be found on www.xlogicx.net
Petya/NotPetya: From The Trenches
Talk by SECON NJ (30 minutes)
Petya (and Not Petya WHAT A TWIST!) devastated many un-updated and unprotected Windows machines and system networks across the world. Take a look into how InfoSec keyboard warriors fought on the digital front lines as the attacks happened to find the solutions used to stop the attack and what the security community can learn from this. Bio: (ISC)2 New Jersey Chapter is a 501(c)(3) not-for-profit charitable organization. Our chapter’s mission is to disseminate knowledge, exchange ideas, and encourage community outreach efforts, for advancement of information security practice and awareness in our society. We also strive to provide enjoyable opportunities for professional networking and growth.
Burner Equipment: Phones, Tablets, Laptops
Workshop by Gi Jack (15 minutes)
Going to a hacker convention like DEFCON or are worried about people stalking and compromising your devices in public? You sound like a person who needs some burner equipment. A “burner” is a device that is configured to have all the information you need when on the go, without any information or paper trail about you and with preventions that if someone does compromise the device you and your privacy/data are not. Learn the many different ways to configure old phones (ANDROID) and desktops (LINUX) to build such valuable technology to bring out in the field. You Will Need: Old Smartphone/Tablet that can run ANDROID and/or any LAPTOP that can be installed with LINUX. Bio: GI Jack is one of the Co-Founders of DEFCON 201. He might have seen a Ninja that had built their own hacker variant of Arch Linux known as Ninja OS. You might be able to also find this ninja at: https://ninjaos.org/