What is BruCON
BruCON is an annual security and hacker(*) conference providing two days of an interesting atmosphere for open discussions of critical infosec issues, privacy, information technology and its cultural/technical implications on society. Organized in Belgium, BruCON offers a high quality line up of speakers, security challenges and interesting workshops. BruCON is a conference by and for the security and hacker(*) community.
The conference tries to create bridges between the various actors active in computer security world, included but not limited to hackers(*), security professionals, security communities, non-profit organizations, CERTs, students, law enforcement agencies, etc…..
(*)Hackers are “persons who delight in having an intimate understanding of the internal workings of a system, computers and computer networks in particular.” People who engage in illegal activities like unauthorized entry into computer systems are called crackers and don’t have anything to do with hacking. BruCON doesn’t promote any illegal activities and behavior. Many hackers today are employed by the security industry and test security software and systems to improve the security of our networks and applications. In addition, for the younger generations, we want to create some awareness and interest in IT students to learn more about IT Security.
How did BruCON start?
BruCON is organized as a non-profit event by volunteers. A group of security enthusiasts decided that it was time for Belgium to have its own security and hacker conference. A lot of countries around the world have this kind of conferences to discuss and present research on computer security and related subject matters. We want to unite people who share the same passion and support the Belgian (research) communities, with BruCON as a yearly highlight. We are not professional organizers and started this as a non-profit organization. We all have full time jobs and dedicate a lot of our free time to this project. Everyone is welcome to join us and help!!
When is BruCON?
BruCON Spring Trainings will be between 18 and 20 April 2018. Our regular training track will be hosted between 1 and 3 October and our conference on 3, 4 and 5 October 2018.
0x0A is the Hexadecimal notation for 10, and this is the 10th BruCON edition.
Training and conference overlap?
For our anniversary edition, BruCON 0x0A will be 3 days, starting on the 3rd of October with retro talks (= Top 7 speakers from 9 years of BruCON). Students attending a 3-day training will be able to buy a conference ticket at a reduced price and attend the regular conference on Thursday and Friday.
If you are worried about missing out on the retro talks, as always, we will be streaming, recording and publishing every talk presented at BruCON.
Where can I get updates about BruCON?
Besides this website we regularly post news and updates on social media. You can find them on the bottom om the page.
You can also subscribe on our mailinglist.
What are the rules of BruCON?
The most important one is: don’t be a dick.
Also read our Anti-Harassment Policy.
What's happening at BruCON?
BruCON offers a presentation track and workshops by very interesting and bright people bringing some of the most recent material in security research. The attendees of the conference can help us shape the event. We welcome anyone with some innovative research, a tool or just to present an interesting website to give a lightning talk or a workshop. If you want to give an additional workshop or need some space for your project, please contact us.
What is Hacking?
The term ‘hacker’ has been misrepresented in popular media for a long time: “Hacking has nothing to do with criminal activities such as identity theft and electronic trespassing! Rather, it [hacker] has been coined at the Massachusetts Institute of Technology (MIT) as a term for curious individuals for whom every device or piece of software is full of exciting challenges to develop potential improvements or discover alternative uses.”
“Anyone who remembers the childhood curiosity and excitement of taking apart radios and other devices to find out how they work is a good example of what is considered a hacker!”
There are a lot of different forms of hacking, most if which don’t even involve computers. So computer hacking is only a subset of this. Computer hacking is the practice of modifying computer hardware and software to accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking activities are often called hackers.
Computer hacking is most common among teenagers and young adults, although there are many older hackers as well. Many hackers are true technology buffs who enjoy learning more about how computers work and consider computer hacking an “art” form. They often enjoy programming and have expert-level skills in one particular program. For these individuals, computer hacking is a real life application of their problem-solving skills. It’s a chance to demonstrate their abilities, not an opportunity to harm others.
Since a large number of hackers are self-taught prodigies, some corporations actually employ computer hackers as part of their technical support staff. These individuals use their skills to find flaws in the company’s security system so that they can be repaired quickly. In many cases, this type of computer hacking helps prevent identity theft and other serious computer-related crimes.
Computer hacking can also lead to other constructive technological developments, since many of the skills developed from hacking apply to more mainstream pursuits. For example, former hackers Dennis Ritchie and Ken Thompson went on to create the UNIX operating system in the 1970s. This system had a huge impact on the development of Linux, a free UNIX-like operating system.
In comparison to those who develop an interest in computer hacking out of simple intellectual curiosity, some hackers have less noble motives. Hackers who are out to steal personal information, change a corporation’s financial data, break security codes to gain unauthorized network access, or conduct other destructive activities are normally called “crackers” or “blackhats”!!! This type of computer hacking can earn you a trip to a prison for several years and we don’t approve of this kind of behaviour.
Can you help me "hack" the facebook/gmail/... account of my "girlfriend"?
Of course … NOT, you didn’t read or understood the F.A.Q. Please go away.
Will there be hackers at BruCON?
We hope so!!! Many people have different definitions of what is a ‘hacker’. The only one we don’t agree with is the mass media definition of ‘Hackers’ meaning criminals that deface websites and break into networks also correctly known as ‘crackers’. “Hackers build things, crackers break them”. For us, examples of great hackers are Linus Torvalds or Steve Wozniak who built the first Apple computer in his garage using parts from Radioshack.
Although security vulnerabilities in software are also discussed during BruCON, today this is called security research or white-hat hacking to improve our software and infrastructure. Read more about the term “hacking” and how it evolved in the last 25 years in this great Wired article or have a look at this documentary Hackers are people too.
How can I help or participate?
We would love your help!
If you want to give us a hand, check our Volunteers page.
How can I speak at BruCON
We do Call For Papers before the conference, see our CFP page for more info.
BruCON is too expensive, how can I afford it?
We did our best to keep prices as low as possible so everyone could attend. We are not making any money out of this. We always open a limited amount of Early bird tickets, for the quick deciders.
If it’s still too much for your budget, there are lots of ways to cut down costs. Find someone to share a room with, pack your own food for the trip etc… Organize a party to collect some money, … You can also always Volunteer and get in for free in exchange for some manual labor.
Why are there no student tickets?
Student pricing is available again for a limited number of visitors. If however you are too late the normal ticket price is kept extremely low. With meals included, we believe this is a great price for everyone!!! We will continue to keep prices low and this wouldn’t be possible without your help and the help from our many volunteers.
What is the difference between personal and business tickets?
Personal tickets are for people who buy the tickets themselves. If you company pays for your entrance, please purchase a business ticket.
Doing it this way, allows us to keep the conference affordable for everyone!
Is there network at BruCON?
Of course not! We are going back to medieval times for this conference!
There will be internet.
BruCON is kindly asking our visitors not to do anything that might jeopardise this event. BruCON and its members takes no responsibility regarding the illicit use of the network and internet access.
However, we have a CERT (Computer Emergency Response Team). If you suspect any illegal activity, you can contact us and we will take the necessary actions together with the Belgacom Network Team.
Email: cert at brucon dot org
What should I bring?
That depends on what you want to do at the conference. Bringing a laptop, a power bank, your smartphone and something to take notes on might be a good idea if you want to attend workshops or other activities.
Most workshops require you to bring your own laptop.
Network survival rules
Here are a few survival tips:
- If possible bring a dedicated device to the conference with a fresh & limited set of (fully patched) applications and data.
- Don’t bring confidential data with you and keep your USB sticks away from other participants.
- If you bring your regular device, perform a full backup of your data and restore them after the conference.
- Always encrypt everything! Your disks, as well as your network data (VPN, SSH tunnelling) and avoid unsecured protocols (POP3, IMAP, HTTP-auth, …) like the plague. Do not trust anybody! Be prepared for the worst!
As a security measure and to avoid ARP cache poisoning you can set the MAC address of the gateway statically (static ARP). The gateway IP address and MAC address will be announced later
- On windows the command to set static arp: arp -s IP MAC
- On linux the command to set static arp: (sudo) arp -i eth0 -s IP MAC
Due to the open and unencrypted wireless network available, there are huge risks that people will try to tap your communications with the Internet during the conference. BruCON cannot be held responsible for the loss of confidentiality or potential disclosure of information you transmit over it.
Will there be food at BruCON?
Yes, we offer breakfast and lunch at the conference. This is included in the entrance price, making the conference very affordable.
Will there be Club Mate?
Of course! Our caffeine levels need to be kept high by this delicious beverage!
What is the best Belgian beer?
All of them? Maybe we have a surprise for you at the bar for the anniversary edition?
What is the best remedy for a hangover?
Don’t drink too much beer the day before. ?
We are promoting some aspects of Belgium like our good Chocolate and fine Beers. Enjoy but use in moderation.
The FAQ didn't answer my question 🙁
Get in touch with us via our Contact page!