Traditional Culture Encyclopedia - Hotel accommodation - What is the best hacker in the world doing in Beijing?

What is the best hacker in the world doing in Beijing?

Every summer, security experts and hackers from all over the world gather at the edge of the desert in Las Vegas to participate in Defcon, an international security event with a history of 26 years, which is called "Oscar in the security field". This year, Defcon made its first visit to Leaving Las Vegas, becoming the first DCCB(DEF CON CHINA Baidu).

If you wander around the Kuntai Hotel in Wangjing in the last two days, you may miss the mysterious "hacker" on the Internet. He might look like this. ...

Or it might look like this. ...

Little hacker only 13 years old

The car scene was demolished and the manufacturer's million-dollar bonus pool was "hacked"

There may be nothing more tense than the IT staff in Kuntai Hotel these two days. At 8 o'clock this morning, there was a long queue before the meeting officially started. At 8: 50, an early-arrived audience heard a burst of exclamation, went forward to ask and found that a participant cracked a machine on the spot ... It turned out that the hotel where the event was held suffered "accidental injury". Before the opening ceremony, the hackers were so amused that their guns went off.

Outside the venue, a cool red car caught the eye. Don't look at this, but tomorrow, it will be "shredded" by hackers and accept all-round hacker challenges from hardware to software.

From 2065438 to September 2006, the network security team of China and Tencent Cohen Lab successfully invaded Tesla Motors in a way of "remote and no physical contact", which is the first time in the world. In other words, technicians sitting in the office can directly control Tesla cars of others thousands of miles away.

However, these hackers' invasion is not malicious, but in the process of patching vulnerabilities, they help manufacturers find vulnerabilities and improve their security defense capabilities. They are called "white hat hackers". No, after Tesla was hacked by white-hat hackers, Elon Musk, CEO of Tesla, personally wrote a letter thanking Cohen Labs for submitting the vulnerability, and presented the highest honor badge representing Tesla's security research with the letter-"Tesla Security Challenge Badge". Musk said in the letter, "Tesla attaches great importance to research in the security field, and we are particularly grateful when researchers can help us improve the safety performance of our products."

At today's conference, more than one smart device and car internet manufacturer issued a hero recruitment order, and the prize pool was a million white-hat hackers looking for solutions to their devices.

Hacked version of "Eat Chicken" can get 300,000 bonus.

"Who invaded the equipment and gained control over air conditioners, electricity meters, etc. Will receive a bonus of50,000 yuan. " "unlock the door without physical contact, and the bonus is 65,438+10,000" ... In the "black village" area of the conference, it is remarkable to recruit experts who bring their own products "black" and "broken".

At the booth of a manufacturer who provides an in-vehicle Internet platform for automobile manufacturers, three hackers "swordsman" who came to challenge spent 1.5 hours and entered the first line of defense of vehicles-the cloud. "We are now in the cloud, and we can see some files in their system, but we can't control them." A hacker brother said.

"Looking forward to the emergence of the Great God, you can find technical loopholes for us and take away the bonus." The technician of the intelligent door lock told the governor that many hackers came to test the water today, but no one has successfully cracked their door locks for the time being.

In the next area, the BCTF station of Baidu International Cyber Security Technology Competition will be held in the next two days. Simply put, it is to stage a hacker version of the e-sports competition. This kind of offensive and defensive game was originally a traditional outdoor game in Europe and America. Later, the concept of "seizing the flag" was introduced into the information security attack and defense game. In the game, players need to solve problems or break through goals to win the flag.

Before the competition began, the governor learned about the form of the competition from hackers who had participated in previous similar competitions abroad: under the stage, hackers attacked each other with code as a weapon. On the stage, the "little whites" who don't know the technology can also see the translated battle results through the big screen, such as "A attacks B", "B effectively attacks C, and C loses points" and so on. The intensity is not inferior to Eat Chicken and the glory of the king.

It is reported that this year's DEF CON China introduced AI team for the first time, and will join other top teams at home and abroad in the final of hacker attack and defense to jointly fight the ban. In terms of prize pool, BCTF's prize money has reached one million, and the first prize will directly receive 300,000 yuan in cash.