ToorCon

Last updated

ToorCon is San Diego's exclusive hacker conference that traditionally takes place in late September. Started originally by the San Diego 2600 user group, ToorCon was founded in 1999 by Benjamin Greenberg and David Hulton (h1kari). [1] [2] [3] The first year it was held at the University of California, San Diego's Price Center and was later moved to the San Diego Concourse for the 2nd [4] and 3rd year. [5] The 4th year was held at the Westin Gaslamp, [6] 5th and 6th at the Manchester Grand Hyatt, [7] the 7th to 13th conferences were held at the San Diego Convention Center, [8] and more recently the 14th to 20th conferences were held at the Westin Emerald Plaza in San Diego. [9]

Starting in 2007, ToorCon Seattle was held at Last Supper Club [10] and again in 2008, [11] Pioneer Square, Seattle, Washington. ToorCamp was first held in 2009 in an Eastern Washington abandoned missile silo, [12] and on the Washington state coast in 2012 [13] and 2014. [14] WorldToor 2012 was held in Antarctica on a cruise ship. [15]

ToorCon attracts many of the top leaders in the computer security community and has been known for its small-conference atmosphere, bringing together around 400 attendees annually. [16]

Talks at ToorCon range from device hacking and reverse engineering, to protocol analysis, cryptographic algorithms, and all-around security issues. Each year ToorCon has a particular theme to the talks, and is split into two opposing tracks. In 2006 the theme was "Bits and Bytes." [17] in 2005 the theme was "Smoke and Mirrors." [18]

Along with two parallel tracks that run over the course of ToorCon weekend, there are also vendor tables and games. Usually featuring at least one book publisher such as Syngress or No Starch Press, a hardware vendor, and a T-shirt printer. Capture the Flag is one of the recurring games over the weekend.

See also

Related Research Articles

In the field of computer security, independent researchers often discover flaws in software that can be abused to cause unintended behaviour; these flaws are called vulnerabilities. The process by which the analysis of these vulnerabilities is shared with third parties is the subject of much debate, and is referred to as the researcher's disclosure policy. Full disclosure is the practice of publishing analysis of software vulnerabilities as early as possible, making the data accessible to everyone without restriction. The primary purpose of widely disseminating information about vulnerabilities is so that potential victims are as knowledgeable as those who attack them.

DEF CON Annual hacker gathering in Las Vegas, Nevada

DEF CON is one of the world's largest and most notable hacker conventions, held annually in Las Vegas, Nevada. The first DEF CON took place in June 1993 and today many attendees at DEF CON include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, hardware modification, conference badges, and anything else that can be "hacked". The event consists of several tracks of speakers about computer- and hacking-related subjects, as well as cyber-security challenges and competitions. Contests held during the event are extremely varied, and can range from creating the longest Wi-Fi connection (aircrack-ng) to finding the most effective way to cool a beer in the Nevada heat.

WordPress is a free and open-source content management system (CMS) written in PHP and paired with a MySQL or MariaDB database. Features include a plugin architecture and a template system, referred to within WordPress as Themes. WordPress was originally created as a blog-publishing system but has evolved to support other web content types including more traditional mailing lists and forums, media galleries, membership sites, learning management systems (LMS) and online stores. One of the most popular content management system solutions in use, WordPress is used by 42.8% of the top 10 million websites as of October 2021.

Hackers on Planet Earth Conference series

The Hackers on Planet Earth (HOPE) conference series is a hacker convention sponsored by the security hacker magazine 2600: The Hacker Quarterly that until 2020 was typically held at Hotel Pennsylvania, in Manhattan, New York City. Occurring biennially in the summer, there have been twelve conferences to date with the most recent occurring July 20–23, 2018. HOPE 2020, originally planned to be held at St. John's University, was instead held as a nine-day virtual event from July 25 to August 2, 2020. HOPE features talks, workshops, demonstrations, tours, and movie screenings.

Black Hat Briefings Computer security conference

Black Hat Briefings is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and security professionals. The conference takes place regularly in Las Vegas, Barcelona, London, Abu Dhabi. The conference has also been hosted in Amsterdam, Tokyo, and Washington, D.C. in the past.

Summercon is one of the oldest hacker conventions, and the longest running such conference in the United States. It helped set a precedent for more modern "cons" such as H.O.P.E. and DEF CON, although it has remained smaller and more personal. Summercon has been hosted in cities such as Pittsburgh, St. Louis, Atlanta, Washington, D.C., New York City, Austin, Las Vegas, and Amsterdam. Originally run by Phrack, the underground ezine, and held annually in St. Louis, the organizational responsibilities of running Summercon were transferred to clovis in 1998 and the convention took place in Atlanta, dubbed 'Summercon X'.

Window Snyder Computer security expert

Mwende Window Snyder, better known as Window Snyder, is an American computer security expert. She has been a top security officer at Square, Inc., Apple, Fastly, Intel and Mozilla Corporation. She was also a Senior Security Strategist at Microsoft. She is co-author of Threat Modeling, a standard manual on application security.

Jeff Moss (hacker)

Jeff Moss, also known as Dark Tangent, is an American hacker, computer and internet security expert who founded the Black Hat and DEF CON computer security conferences.

Dan Kaminsky American computer security researcher (1979–2021)

Daniel Kaminsky was an American computer security researcher. He was a co-founder and chief scientist of WhiteOps, a computer security company. He previously worked for Cisco, Avaya, and IOActive, where he was the director of penetration testing. The New York Times labeled Kaminsky an "Internet security savior" and "a digital Paul Revere".

Bugtraq was an electronic mailing list dedicated to issues about computer security. On-topic issues are new discussions about vulnerabilities, vendor security-related announcements, methods of exploitation, and how to fix them. It was a high-volume mailing list, with as many as 776 posts in a month, and almost all new security vulnerabilities were discussed on the list in its early days. The forum provided a vehicle for anyone to disclose and discuss computer vulnerabilities, including security researchers and product vendors.

Hacker Halted is a global series of Computer and Information Security conferences presented by EC-Council. The objective of the Hacker Halted conferences is to raise international awareness towards increased education and ethics in IT Security. The event is currently in its 14th year. Also present at Hacker Halted is EC-Council's H@cker Halted | Academy, trainings and workshops led by EC-Council instructors and trainers.

Antisec Movement Hacking (computer security)

The Anti Security Movement is a movement opposed to the computer security industry. Antisec is against full disclosure of information relating to

A computer security conference is a convention for individuals involved in computer security. They generally serve as meeting places for system and network administrators, hackers, and computer security experts.

Mikko Hyppönen

Mikko Hermanni Hyppönen is a computer security expert and columnist. He is known for the Hyppönen Law about IoT security, which states that whenever an appliance is described as being "smart", it is vulnerable.

The Ada Initiative was a non-profit organization that sought to increase women's participation in the free culture movement, open source technology and open culture. The organization was founded in 2011 by Linux kernel developer and open source advocate Valerie Aurora and open source developer and advocate Mary Gardiner. It was named after Ada Lovelace, who is often celebrated as the world's first computer programmer, as is the Ada programming language. In August 2015, the Ada Initiative board announced that the organization would shut down in October 2015. According to the announcement, the Initiative's executive leadership decided to step down, and the organization was unable to find acceptable replacement leaders.

Full disclosure is a "lightly moderated" security mailing list generally used for discussion about information security and disclosure of vulnerabilities. The list was created on July 9, 2002 by Len Rose and was administered by Len Rose, who later handed it off to John Cartwright. After Len Rose shut down netsys.com, the list was hosted and sponsored by Secunia.

Valerie Aurora American computer scientist and activist

Valerie Anita Aurora is a software engineer and feminist activist. She was the co-founder of the Ada Initiative, a non-profit organization that sought to increase women's participation in the free culture movement, open source technology, and open source culture. Aurora is also known within the Linux community for advocating new developments in filesystems in Linux, including ChunkFS and the Union file system. Her birth name was Val Henson, but she changed it shortly before 2009, choosing her middle name after the computer scientist Anita Borg. In 2012, Aurora, and Ada Initiative co-founder Mary Gardiner, were named two of the most influential people in computer security by SC Magazine. In 2013, she won the O'Reilly Open Source Award.

Katie Moussouris is an American computer security researcher, entrepreneur, and pioneer in vulnerability disclosure, and is best known for her ongoing work advocating responsible security research. Previously a member of @stake, she created the bug bounty program at Microsoft and was directly involved in creating the U.S. Department of Defense's first bug bounty program for hackers. She previously served as Chief Policy Officer at HackerOne, a vulnerability disclosure company based in San Francisco, California, and currently is the founder and CEO of Luta Security.

IOActive is an independent computer security services firm active in several areas. They are known for reporting high severity security vulnerabilities in a variety of products. IOActive has offices in Seattle, London, Dubai and Madrid. IOActive has done researches on smart cities and the transportation and technology that connects them, and has worked with Global 500 companies in multiple industries.

References

  1. "Bugtraq: New way to pay in advance for ToorCon '99 in San Diego, California". seclists.org. Retrieved 2019-06-13.
  2. "Bugtraq: Announcing First Annual ToorCon". seclists.org. Retrieved 2019-06-13.
  3. "InfoconDB". infocondb.org. Retrieved 2019-06-13.
  4. "Bugtraq: Announcing Second Annual TooRcon Computer Security Expo". seclists.org. Retrieved 2019-06-13.
  5. "vuln-dev 2001/05: ToorCon 2k++ Call for Speakers". lists.jammed.com. Retrieved 2019-06-13.
  6. Schinto, Jeanne; June 19; 2003. "Computer outlaws at downtown San Diego's Bristol Hotel". www.sandiegoreader.com. Retrieved 2019-06-13.CS1 maint: numeric names: authors list (link)
  7. "pen-test 2003/08: TOORCON 2003 CALL FOR PAPERS CLOSING". lists.jammed.com. Retrieved 2019-06-13.
  8. "ToorCon 7 [LWN.net]". lwn.net. Retrieved 2019-06-13.
  9. Lu, Kai (2017-09-18). "A Wrap Up of ToorCon 19 at San Diego". Fortinet Blog. Retrieved 2019-06-13.
  10. "Toorcon rocks – Robert Hensing's Blog". blogs.technet.microsoft.com. Retrieved 2019-06-13.
  11. "ToorCon Seattle 2008 - Day 2 Review - The Informer by Dan Griffin" . Retrieved 2019-06-13.
  12. "Toorcamp: Taking the Hack Underground - Mine the Harvest". 4 July 2009. Retrieved 2019-06-13.
  13. Greenberg, Andy. "Robots, Codebreaking and S'mores: Welcome To Summer Camp For Supergeeks". Forbes. Retrieved 2019-06-13.
  14. "How geeks go camping: Drones, lasers and more from ToorCamp 2014". GeekWire. 2014-07-30. Retrieved 2019-06-13.
  15. "WorldToor" . Retrieved 2019-06-13.
  16. "Top Ten InfoSec Events of 2019". Cybersecurity Conferences 2019 – 2020. Retrieved 2019-06-13.
  17. "ToorCon 2006: Bits & Bites". 2006-08-21. Archived from the original on 2006-08-21. Retrieved 2019-06-13.
  18. "ToorCon 2005: About TC7". 2005-09-24. Archived from the original on 2005-09-24. Retrieved 2019-06-13.