
Updated #DefCon 33 presentation materials have been posted to the https://media.defcon.org server. As more content is ready we will post updates.
Updated #DefCon 33 presentation materials have been posted to the https://media.defcon.org server. As more content is ready we will post updates.
A journey of a thousand miles begins with a single pick.
A journey of a thousand miles begins with a single pick.
Updated #DefCon 33 presentation materials have been posted to the https://media.defcon.org server. As more content is ready we will post updates.
Thank you to everyone who attended my #Meshtastic talk at #HOPE, focused on building your own nodes & emerging attacks demonstrated at #Defcon!
If you didn't catch it, it was recorded here: https://www.youtube.com/live/zxgoACKKH30?si=kbd3JDryZBfrAHd1&t=63
Several people were arrested during an undercover operation targeting child sex predators in Nevada. One of them is Tom Alexandrovich, who turns out to be the Executive Director of the Israel Cyber Directorate. The child predator was released.
I believe the security community must denounce this person and be banned from the conferences, including BlackHat and DefCon.
@fr0gger since, unfortunately, you are in the picture with this person (LinkedIn account of him was deleted already), and you have a good reputation within our community, would be super cool if you'd take a lead and get in touch with the BlackHat/DefCon organizers.
#BlackHat#BHUSA#BlackHatUSA2025#Cybersecurity#ThreatIntelligence#DefCon#Israel#DEFCON33#TomAlexandrovich
This research by Marek Tóth presented at #DEFCON is good. The vulnerability he discusses is real.
However, exploiting it requires the attacker to compromise a website and add phantom workflows to it that the victim doesn't notice as suspicious. Not impossible, but also IMO not likely unless you visit shady websites frequently.
Personally, I do not think the likelihood is high enough to disrupt my existing workflows to protect against the attack.
#clickjacking #infosec
https://marektoth.com/blog/dom-based-extension-clickjacking/
Several people were arrested during an undercover operation targeting child sex predators in Nevada. One of them is Tom Alexandrovich, who turns out to be the Executive Director of the Israel Cyber Directorate. The child predator was released.
I believe the security community must denounce this person and be banned from the conferences, including BlackHat and DefCon.
@fr0gger since, unfortunately, you are in the picture with this person (LinkedIn account of him was deleted already), and you have a good reputation within our community, would be super cool if you'd take a lead and get in touch with the BlackHat/DefCon organizers.
#BlackHat#BHUSA#BlackHatUSA2025#Cybersecurity#ThreatIntelligence#DefCon#Israel#DEFCON33#TomAlexandrovich
Burning, man
「 DEF CON attendees appeared to pay little attention to the human rights atrocities committed by CACI while resting their Vegas-priced beverages on a table prominently displaying the company’s backlit logo 」
https://jackpoulson.substack.com/p/when-counterculture-and-empire-merge
Yet another amazing time at #DEFCON.
Shout out to all the cool people I was able to spend time with.
Thank you to @thegibson for... all the things.
Lots of awesome stuff at #defcon this year, lots to improve too. Feel like I’m aging out, but also excited for its future.
Which brings me to part two, MeshMarauder.
An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.
MeshMarauder will demostrate:
- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages
The scale of meshtastics avoidance of building security into the design is pretty epic.
It allows for the formation of an entire mesh just for MITMing it.
This ONE liner here in the PKI attack means that once a node gets poisoned the key we created is based on the MAC so -anyone- who knows your MAC can read your MITM'd traffic.
When attackers run mesh marauder against the DEFCON 33 firmware they are all working together. Anyone in range can read the MITM'd DMs.
https://github.com/datapartyjs/meshmarauder/blob/channel-chat/src/lorapipe-raw-packet.mjs#L191-L193
So when it's this easy to get a MITM going things like making posts in public chats as anyone you want feels kinda low key.
But I do hope that extended warranty works out, everyone seems pretty concerned about them.
Which brings me to part two, MeshMarauder.
An open source tool demonstrating proof-of-concept exploits against the DEFCON 33 Meshtastic firmware.
MeshMarauder will demostrate:
- Tracking user activity on any mesh regardless of encryption usage
- Hijack all meshtastic user profile metadata
- Change any users public key
- Send messages as any user in channel chats that appear authentic
- MITM direct messages
The Cybertiger lurks during #DEFCON, waiting for his moment to strike with trivia questions! Join EFF for Tech Trivia at the Contest Stage at 19:00 tonight: https://www.eff.org/event/tech-trivia-def-con-33
Shuttle from Tuscany to #defcon with the door closed. I still appreciate this
A space for Bonfire maintainers and contributors to communicate