skip to main content

DEF CON China Hacking Conference

VILLAGES

VILLAGES

English | 中文


Lockpick Village

DEF CON Lockpicking Village image

Want to tinker with locks and tools the likes of which you’ve only seen in movies featuring police, spies, and secret agents? Then come on by the Lockpick Village, run by The Open Organization Of Lockpickers, where you will have the opportunity to learn hands-on how the fundamental hardware of physical security operates and how it can be compromised.

The Lockpick Village is a physical security demonstration and participation area. Visitors can learn about the vulnerabilities of various locking devices, techniques used to exploit these vulnerabilities, and practice on locks of various levels of difficultly to try it themselves.

Experts will be on hand to demonstrate and plenty of trial locks, pick tools, and other devices will be available for you to handle. By exploring the faults and flaws in many popular lock designs, you can not only learn about the fun hobby of sport-picking, but also gain a much stronger knowledge about the best methods and practices for protecting your own property.

Car Hacking Village

car hacking village logo

Car Hacking Village is an interactive, hands-on village with the goal of teaching village goers what car hacking is, introducing village goers to the tools of car hacking, and working with hackers to create a community of car hackers at DEF CON China.

Recon Village

Recon Village is an Open Space with Talks, Live Demos, Workshops, Discussions, CTFs with a common focus on Reconnaissance. The village is meant for professionals interested in areas of Open Source Intelligence (OSINT), Threat Intelligence, Reconnaissance, and Cyber Situational Awareness, etc. with a common goal of encouraging and spreading awareness around these subjects.

Hardware Hacking Village

hardware hacking village logo

Come join us for hardware hacking, teaching, learning, and exploration.

Lots of prizes to go around, and lots of puzzles to learn new things or show off your skills.

Packet Hacking Village

packet hacking village image

The Packet Hacking Village is where you’ll find network shenanigans and a whole lot more. PHV welcomes all DEF CON attendees and there is something for every level of security enthusiast. This village was created to help enlighten attendees through education and awareness while focusing on defense and blue team techniques.

Blue Team Village

For many, DEF CON epitomizes hacking which traditionally involves an offensive mentality. However, in recent years, attacks have become trivially easy to exploit in any environment meaning that effective defense has been difficult. Defenders have to deal with legacy, politics, and resource constraints and typically have less public information on how to best protect their environment when compared to the red side. This leaves defenders at DEF CON feeling a bit left out with most, if not all, of the content favoring red. This village is a DEF CON paradigm shift providing an area where Blue Teams can gather, learn basic and advanced defensive techniques, swap war stories, and have fun.

Blue Team Village at DEF CON (BTV) promotes defensive security knowledge and its dissemination throughout the greater DEF CON community. At the BTV, you’ll find valuable information on defensive security from the very basic 101-level concepts through the latest, most advanced techniques we can get past NDAs. We also have contests, so you can prove your skills in securing systems -- and perhaps even show some of those red teamers what’s what.

Biometrics Identification Village

Biometrics Identification village image

In biometrics identification village, you will learn how biometric identification technology works. Such technology includes fingerprint, iris, face, and vein recognition etc., You will also learn how to circumvent the authentications based on these biometrics by simply spoofing the sensors. We will bring our hacking methods to the audience by breaking down the sensor devices, capturing and faking the biometric characteristics.

Chip-Off Village

VXRL is founded by a group of passionate security researchers and white-hat hackers in Hong Kong. Our team has deep expertise in software and hardware security, and we have hands-on domain knowledge in several vertical industries. Our mission is to make the cyberspace a safe place for the future.

During the chip-off village, visitors shall have an opportunity to remove the embedded emmc chip from the devices and re-solder on the small circuit board. And our experts will demonstrate how to attack the IoT/mobile devices to obtain privilege and gain access control as well as the data stored. We will also introduce some inexpensive JTAG/ISP and chip-off equipments on-site and for your testing.

AI Village

The AI Village at DEFCON is a place where experts in AI and security (or both!) can come together to learn and discuss the use, and misuse, of artificial intelligence in traditional security. Artificial Learning techniques are rapidly being deployed in core security technologies like malware detection and network traffic analysis, but their use has also opened up a variety of new attack vectors against the systems that use them. Using techniques such as Generative Adversarial Networks, would-be attackers could target non-traditional platforms, such as deep learning based image recognition systems used in self driving cars. These same attack methods could be leveraged to extract confidential training data from a deployed model itself, adding another layer of privacy and security risks to an ever-growing list of concerns.

The AI Village will explore these issues and encourage open discussion for possible solutions (and any interesting attacks the attendees can come up with). For those who would rather learn through practice, a practice workshop session will also be available. 

Come participate in introductory workshops where you can learn how to use (and misuse!) machine learning models as part of your arsenal. Talks include:

- A discussion of the recently released report on the Malicious Use of AI
- Red-teaming machine learning systems using adversarial techniques
- Vulnerabilities of machine learning tools