DEFCON 201 Meet Up — February 2020 — Hackers Lonely Hearts Club

Image for post
Image for post

Date: February 21st, Friday

Time: 7:00 PM — 10:00 PM

Location: Sub Culture (260 Newark Ave, Jersey City, NJ)



Write.As [TOR]: http://writeas7pm7rcdqg.onion/defcon201/defcon-201-meet-up-february-2020-hackers-lonely-hearts-club

Hackaday: TBA


Welcome to the February 2020 DEFCON 201 Meet Up!

We just got done Shmoozing around and now it has come to this. For some, this is where you load up that dating sim and pour a glass of wine (or run it in wine), to others it’s where you spend a ton of money that you don’t have on that special someone. For us, it’s another meeting. Come down to cure your blue balls/ovaries where we will dig into Software Defined Radio, build some hardware projects and plan for an eventful PAX East in Boston.

About Our Venue:

Image for post
Image for post
Image for post
Image for post

We welcome you to Sub Culture at 260 Newark Ave in Jersey City. Five blocks from the Grove Street Path station and right on the NJ Transit Bus Stop; enjoy Free-Wifi, affordable (meat and vegan) food, power strips, video games on Raspberry Pi and sweet times! More information at

If you like to do a talk at our meet ups our collaborate with our staff and members in a project partnership shoot us a email at:


7:00pm — 7:45pm
Meet & Greet
7:45pm — 7:50pm
DEFCON 201 Annoucements & Code of Conduct — GI Jack, Sidepocket
7:50pm — 8:00pm
Why Pick Up “Artists” Are A Scam; A Social Engineer’s Perspective — Sidepocket
8:00pm — 8:45pm
An Introduction to Iot Pentetration Testing — Libertyunix
8:45pm — 9:55pm
Open Workshops Projects
9:55pm — 10:00pm


Lockpicking & Locksport — Sidepocket

Pwnagotchi & Wall Of Sheep — GI Jack

Pi-Hole Installation — Sidepocket


DEFCON 201 Annoucements & Code of Conduct

:..>DEFCON 201 will start with various updates about our activities in early 2020 and an overview of the Code of Conduct linked on our website.

:.> Bio: GI Jack is one of the Co-Founders of DEFCON 201. He might have seen a Ninja that had built their own hacker variant of Arch Linux known as Ninja OS. You might be able to also find this ninja at:

Why Pick Up “Artists” Are A Scam: A Social Engineer’s Perspective

:..>Like how Scientology has no actual Science or Scientific Method in it, Pick Up “Artistry” projects itself to be Social Engineering backed by Evolutionary Psychology…but it’s not. The crazy part is, there is some social engineering involved but NOT in the way you would think. In this talk, our speaker with disect various Pick Up Artist techniques including popular PUA online portals at the books “The Game” by Neil Strauss and “The Mystery Method” from PUA “master” Erik Von Markovik aka Mystery. This will demonstrate why these techinques do not work, the pyschological damage they cause, the bizzaro culture around this study and who it’s actually designed to social engineer. This talk will be prefaced by a TRIGGER WARNING as topics such as sexual harassment and stalking will be touched upon.

:..>Bio: A Co-Founder of DEFCON 201, an open group for hacker workshop projects in North East New Jersey, Sidepocket is constantly wanting to help people to get better at whatever they want to do and learn. He also has a history with NYC 2600, Radio Statler at Hackers on Planet Earth, Phone Losers of America, Museum of Urban Reclaim Spaces and The Yes Men. Find out more about DEFCON 201 at:

An Introduction to IoT Penetration Testing

:..>IoT devices are one of the biggest challenges for security professionals now and will continue to be in the future. The security of these devices is critical as more of these insecure devices come to market. As security professionals we need to have an idea how these devices effect our organization. In this talk we will explore the basic principles of IoT PenTesting, how to build an effective toolset, reverse engineering, and analyzing wireless signals with software defined radio.

:.>Bio: With 10+ years’ experience in Information Technology, Libertyunix has held positions in the field such as Red Team Analyst, Security Systems Specialist, and Red Team Penetration Tester. Libertyunix has extensive experience in offensive security techniques and defensive strategies. He is currently a professor at Drexel University researching cyber and information security. His research has explored topics such as digital forensics, red team penetration testing, deep learning, IoT, and software defined radio. His graduate research thesis demonstrated the effects physical security systems can play in penetration testing and security assessments. Outside of the zeros and ones Libertyunix is the coach of the USA Roller Sports Women’s Inline Hockey team winning the last 3 world championships.


Practicing Lockpicking & Locksport

:..>DEFCON 201 will have padlocks and professional practice tumblers provided by TOOOL to practice on. Fun and easy to learn for all ages and backgrounds with two expert instructors!

PWNagotchi & Wall Of Sheep

:..>Pwnagotchi is an A2C-based “AI” powered by bettercap and running on a Raspberry Pi Zero W that learns from its surrounding WiFi environment in order to maximize the crackable WPA key material it captures (either through passive sniffing or by performing deauthentication and association attacks). This material is collected on disk as PCAP files containing any form of handshake supported by hashcat, including full and half WPA handshakes as well as PMKIDs. We will be creating our own DEFCON 201 variant that will be part of a bigger project and need all hands on tech for its birth!

Also, we are working on a secret project invloving building a Wall of Sheep. Want to help or know what it is? Ask!

:..>What To Bring: A background in Javascript and Rasberry Pi 3 experience. If you can, bring your laptop with a GitHub account so we can collaborate. If anyone has a 3D Printer, PLEASE BRING IT! We will get you free food and booze!

Pi-Hole Installation

:..>Pi-hole is a Linux network-level advertisement and Internet tracker blocking application which acts as a DNS sinkhole (and optionally a DHCP server), intended for use on a private network. Pi-hole has the ability to block traditional website advertisements as well as advertisements in unconventional places, such as smart TVs and mobile operating system advertisements. We are going to install a Rasberry Pi running Pi-hole to the wireless network router at Sub Culture in a first of many hardenings to the venue’s cybersecurity.

:..>What To Bring: A background in either Rasberry Pi (such as NOOBS/Raspbian OS installation) and/or physical network cabling will be helpful but not required. Network configuriation and routing hacking will also be a plus.


:..>DEFCON 201 will expand into video media in late September. We will be launching various videos including an Introduction, Member Spotlights, Archived Lightning Talks, Tutorials, Directions and more on the DTube, Vimeo and YouTube Mirror platforms. We will also have downloadable copies on the DEFCON 201 NextCloud of select media for DEFCON 201 Members who want hard copies of videos. If you want to be in the Introduction, Member Spotlights or Archive Lighting Talks you can inquire into us about signing our DEFCON 201 Consent Forums and we will walk you through the process. Those who have not signed our DEFCON 201 Consent Forums during meetings will NOT be recorded in Video or Audio as per our policy. Furthermore, any instances of media recording photo/video/audio via DEFCON 201 Staff will be alerted to all president attendees beforehand prior to recording.


North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects!

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store