DEFCON 201 Online Meet Up — May 2020 — Mind Games

Image for post
Image for post

Date: May15th, Friday

Time: 7:00 PM EST — ????

Location: ONLINE (SEE BELOW)

Meet-Up: https://www.meetup.com/DEFCON201/events/270121378/

Facebook: https://www.facebook.com/events/278502606615075/

Write.As [TOR]: http://writeas7pm7rcdqg.onion/defcon201/defcon-201-online-meet-up-may-2020-mind-games

Hackaday: https://hackaday.io/page/7164-defcon-201-online-meet-up-may-2020-mind-games

::DEFCON 201 — CODE OF CONDUCT::

Welcome to the May 2020 DEFCON 201 Meet Up!

April Showers were suppose to bring in May Flowers but it seems like it just brought in more COVID-19, a Polar Vortex and Murder Horents. To continue the suck that is the year 2020, we continue to develop our live-stream platform with in addition to these monthly meetings also offering interactive weekly hacker programming for our livestreaming platforms. This month we are focusing on the May is Mental Health Awareness Month, something that has been getting DDoSed since the Coronavirus Pandemic and offering a jam packed meeting from phone phreaking, blue teaming on Wikipedia, Capture The Flag Tests and more! We also finally got our Twitter back after we were so 1337 that the platform confused us for a Федеральная служба безопасности Российской Федерации spam-bot sleeper cell. Oh, also, DEF CON is cancled!

For those catching us on Twitch, DEFCON 201 will be using Tiltify to raise funds for Fred Hutch, one of the top ten biomedical research institutions that has reacted with unprecedented speed and cooperation to curb the threat of the novel coronavirus and the disease it causes, COVID-19. They are using the coronavirus DNA crowd-sourced from scientists around the world, experts at Fred Hutch and the University of Basel in Switzerland are tracking how the virus is changing as it moves through people and countries. They’re sharing their data on their open source platform, Nextstrain.org and scientists and public health officials around the world are using it to monitor the pandemic and slow the spread of infection. This is part of our efforts as hackers to fight the devastation caused by COVID-19!

Live Streams:

Twitch: https://www.twitch.tv/defcon201live

dLive: https://dlive.tv/defcon201

YouTube: https://www.youtube.com/channel/UCYDQaOHbK5trRU2CDgb0qSg

EMAIL US TO INQUIRE FOR VIDEO CONFERENCING LINK!

If you like to do a talk at our meet ups our collaborate with our staff and members in a project partnership shoot us a email at:

INFO {at} DEFCON201 [DOT] ORG

.::AGENDA & SCHEDULE::.

ALL TIMES ARE EASTERN STANDARD (EST)
6:15pm — 7:00pm
Pre-Show :: Black Hat Webcast Series — Stalkerware: Solutions for Mitigating its Impact on Privacy and Security
7:00pm — 7:05pm
DEFCON 201 Annoucements & Code of Conduct — GI Jack, Sidepocket
7:05pm — 7:30pm
Mental Health Hackers: Contents Under Pressure — Amanda Berlin
7:30pm — 7:40pm
WikiLoop Battlefield — Xinbenlv
7:40pm — 7:50pm
Hardening Your Face Against COVID-19 With DYI Face Masks — Kira Waszak, Atomic Penguin
7:50pm — 8:00pm
Phreaking Out The Northern Pacific Switched Telecommunications Network — DC4US
8:00pm — ???
Open Workshops Projects + Drinking + Games

.::OPEN PROJECTS::.

DC201 Hacker Show & Tell — Everyone

Folding@Home VS Coronavirus (Team: 241960) — GI Jack, Everyone

DEF CON CTF Qualifier 2020 — Everyone

JackBox Party Pack 3 Online Games — Everyone

.::LIGHTNING TALKS::.

Pre-Show :: Black Hat Webcast Series — Stalkerware: Solutions for Mitigating its Impact on Privacy and Security

:..>With the sudden and massive shift to users working remotely, individuals and businesses are exposed to privacy and security vulnerabilities more than ever. Nefarious applications such as stalkerware and spouseware are putting people and enterprises increasingly at risk.

In this webcast, EFF’s Director of Cybersecurity, Eva Galperin examines her research into the market in stalkerware, spouseware, and other nefarious applications that are being deployed to attack our sense of privacy and security.

She will reveal possible activist, technical, and legal approaches to fighting stalkerware and give an overview of how the fight is going so far.

:..>Bio: Eva Galperin aka Evacide is EFF’s Director of Cybersecurity and the head of EFF’s Threat Lab. Prior to 2007, when she came to work for EFF, Eva worked in security and IT in Silicon Valley and earned degrees in Political Science and International Relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world.

DEFCON 201 Announcements & Code of Conduct

:..>DEFCON 201 will start with various updates about our activities in early 2020, our post Corona Virus Pandemic measures and an overview of the Code of Conduct linked on our website.

Mental Health Hackers: Contents Under Pressure

:..>Mental Health Hackers are a group of information security professionals passionate about helping others. Their mission is to educate tech professionals about the unique mental health risks faced by those in our field — and often by the people who we share our lives with — and provide guidance on reducing their effects and better manage the triggering causes. They also aim at providing support services to those who may be susceptible to related mental health issues such as anxiety, depression, social isolation, eating disorders, etc. In this talk they will explain how they foster conversations about mental health problems in the InfoSec community, how they provide support and information to how to recognize, manage, and conquer mental illness, the unique challenges and situations faced by the hacker community’s social and work enviroments and how mental health is being exastrubated with the COVID-19 Pandemic.

:..>Bio: Amanda Berlin aka InfoSystir is a Sr. Incident Detection Engineer for Blumira and the CEO and owner of the nonprofit corporation Mental Health Hackers. She is the author for a Blue Team best practices book called “Defensive Security Handbook: Best Practices for Securing Infrastructure” with Lee Brotherston through O’Reilly Media. She is a co-host on the Brakeing Down Security podcast and writes for several blogs. She has spent over a decade in different areas of technology and sectors providing infrastructure support, triage, and design. She now spends her time creating as many meaningful alerts as possible. Amanda is an avid volunteer and mental health advocate. She has presented at a large number of conventions, meetings and industry events. Some examples of these are: DerbyCon, O’Reilly Security, GrrCon, and DEFCON. While she doesn’t have the credentials or notoriety that others might have, she hopes to make up for it with her wit, sense of humor, and knack for catching on quick to new technologies.

WikiLoop Battlefield

:..>Originated from Google, Project WikiLoop is an umbrella program for a series of technical projects intended to contribute datasets and toolings from the technical industry back to the open knowledge world. WikiLoop Battlefield is an open-source, crowd-sourced counter vandalism tool for Wikipedia and Wikidata.org. Built on web technology, WikiLoop Battlefield allows a quick launch from either desktop or mobile phone without needing to install resident software. Its objective is to reduce the barrier for Wikipedians wishing to assist in patrolling Wikipedia revisions. In this DEFCON Group meetup, we will present the WikiLoop Battlefield and give a brief introduction to the roadmap of Project WikiLoop overall.

:.>Bio: Bio: Zainan Victor Zhou aka Xinbenlv is a tech lead and software engineer at Google. He leads the Project WikiLoop efforts, and is the author and primary developer of WikiLoop Battlefield. Zainan specializes in full stack development, big data, machine learning and technical projects involving community engagement. Zainan is also an active open source developer and Wikipedia editor.

Hardening Your Face Against COVID-19 With DYI Face Masks

:..>Thanks to mass panic buying, proper PPE equiment mainly face masks for both medical and civilian personel have become harder to find. In this COVID-19 crisis, many are forced to create their own. In this short video and show & tell, two amazing seamstresses will show off how they made their own home made masks that meat PPE standards, one with carbon filters and one that works as a barrier for air particles and how you can obtain them or build them yourself.

:..>Bios:

Kira Waszak is a mother, performer, Singer, sculpture, creative problem solver, lover, designer. Find her at her modeling page: https://officialcrimsonrose.com/

Atomic Penguin is a nerd, a gamer, and five penguins stuffed into a human suit.

Phreaking Out The Northern Pacific Switched Telecommunications Network

:..>The Northern Pacific Switched Telecommunications Network is a peer-to-peer VoIP network started in 2018 based purely on previous Bell System standards and practices. It is a very well structured network with real live 24/7 operators and tons of trunks where you can blue box till you are blue in the face. Conceived as an alternative and supplement to C*NET, NPSTN today is a fully-fledged VOIP telephone network for phone phreaks and telephone collectors with over 80 members in 10 countries. This talk will go into detail on how NPSTN is able to connect network-operated coin telephones without any major hardware modification to the phone itself, other than just a zip-tie on the coin relay to make coins fall straight into the vault instead of waiting in the hopper. This includes the development of the special asterisk code to detect coin-denomination tones that allows anyone to get their payphone on NPSTN to just connect it to a channel bank or VoIP ATA set a few settings on the ATA. This presentaiton will conclude into the Open Project segment with a live demo of the NPSTN Coin toll ticketing system.

:..>Bio: DC4US a 17 year old phone phreak from Winter Springs, Florida. He spends most of his time red boxing payphones in West Virginia, finding diverters and extenders, wardialing and scanning, exploring the whole U.S. PSTN, beige boxing, and social engineering central office technicians to creating test lines for him that they probably shouldn’t. His biggest claim to fame was walking straight up to the courtest Mickey Mouse phone in guest services and, in front of many people, bypassed there toll restriction and called long distance out of a Walt Disney World’s DMS-100 and listening to some intercept messages some 1,000 miles away on a phone meant to only call within the same LATA until he was approached by Disney Theme Park & Resort Security who was wondering why somebody was on the phone for an hour seemingly dialing numbers in rapid succession. He started NPSTN ( the Northern Pacific Switched Telecommunications Network) in 2018 and it quickly matured after that thanks to his friends Naveen Albert and Brian Clancy, who unfortunately passed away this year due to terminal illness.

.::OPEN PROJECTS::.

DEFCON 201 Hacker Show & Tell

:..>DEFCON 201 members will be given the section immediately after the Lightning Talks to show off the various projects that they have been working on. We have had heads up on some awesome stuff being worked on that will be showing up for the very first time so you don’t want to miss this on live-stream!

:..>What You’ll Need: If you want to get in on the action, just bring any hardware or software program you are working on. For hardware, make sure you have a camera with decent resolution. For software, make sure your screen sharing function is working. For interaction, make sure you have your microphone on your computer or headset in working order.

Folding@Home VS Coronavirus

:..>Folding@home (FAH or F@h) is a distributed computing project for simulating protein dynamics, including the process of protein folding and the movements of proteins implicated in a variety of diseases. Currently F@h is simulating the dynamics of COVID-19 proteins to hunt for new therapeutic opportunities. We want to contribute and you can help! Join the DEFCON 201 Folding@Home Team: 241960

:..>What You’ll Need: Download and run Folding@home for Windows/Mac/Linux, ideally on your highest performance system with a GPU and join our F@h Team 241960: https://foldingathome.org/start-folding/

DEF CON CTF Qualifier 2020

:..>This Friday, starting on May 15th at 8:00 PM EST, we invite all DEFCON 201 Members, Attendees and Fans to help us hack the DEF CON CTF Qualifier 2020! If you are new to Online CTF, we will help you get set up and walk you thorugh some of the challenges. Then you can log in anytime after to April 15th 8:00 PM EST until April 17th 8:00 PM EST to continue our CTF conquest! To learn more about the CTF, please follow this link: https://medium.com/@defcon201/defcon-201-online-ctf-practice-challenge-def-con-ctf-2020-qualifier-may-15th-may-17th-8d93c7d49c6d?source=friends_link&sk=347c2245cc5d952d57ca3ec6816b99b4

:..>What To Bring: Any laptop will do. Ideally you want to load it full of Information Security Red Team and Blue Team tools, look at Kali Linux, Parrot OS, Pentoo or Black Arch for ideas. You can also harden your Mac or use Windows SubSystem. To participate online, you will need a Discord Account and to join our Discord at this link: https://discord.gg/PGgPNEF

Jackbox Party Pack 3 Online Games

:..>During our live-stream, we will be offering to join us in various online games in Jackbox Party Pack 3! The threequel to the party game phenomenon features the deadly quiz show Trivia Murder Party, the say-anything sequel Quiplash 2, the surprising survey game Guesspionage, the t-shirt slugfest Tee K.O., and the sneaky trickster game Fakin’ It. Use your phones or tablets as controllers, and play with up to 8 players, plus an audience of up to 10,000!

:..>What To Bring: To join in the gameplay, simply use the web browser on your desktop or smartphone — no app needed! Head to JackBox.TV and enter the Room Code that will be displayed on the live-stream and repeated in the chatroom. If you get in, follow the instructions on the live-stream and phone!

::END OF LINE::

North East New Jersey DEFCON Group Chapter. Dirty Jersey Represent! We meet at Sub Culture once a month to hack on technology projects! www.defcon201.org

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store