{"id":13164,"date":"2018-08-22T09:10:05","date_gmt":"2018-08-22T17:10:05","guid":{"rendered":"http:\/\/www.palada.net\/index.php\/2018\/08\/22\/news-6931\/"},"modified":"2018-08-22T09:10:05","modified_gmt":"2018-08-22T17:10:05","slug":"news-6931","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2018\/08\/22\/news-6931\/","title":{"rendered":"Badgelife: A Defcon 26 retrospective"},"content":{"rendered":"<p><strong>Credit to Author: Jean Taggart| Date: Wed, 22 Aug 2018 16:03:18 +0000<\/strong><\/p>\n<p>One more year gone, one more <a href=\"https:\/\/en.wikipedia.org\/wiki\/DEF_CON\" target=\"_blank\" rel=\"noopener\">Defcon<\/a> completed.<\/p>\n<p><a href=\"https:\/\/www.defcon.org\/\" target=\"_blank\" rel=\"noopener\">Defcon<\/a> is the longest-running security conference in existence and one that I have been attending since Defcon 18. It is an opportunity to see and interact in real life with industry peers that would forever remain a digital persona otherwise. It is the place where you hear about the newest attack techniques, the coolest hacks, and the most spectacular security failures. A giant melting pot of hackers, security professionals, various three-letter agency employees, lawyers, students, black hats, grey hats, white hats, IT admins, help desk warriors, journalists, activists, reversers, cypherpunks, scary pentesting voodoo red team experts, and stoic blue team defenders.<\/p>\n<p>Defcon is the conference of conferences. There&#8217;s even a LineCon, consisting of the impromptu discussions that take place while waiting to register or waiting to get into a room to see a presentation. And let&#8217;s not forget HallCon, where you strike up a conversation with random strangers and never, not once, have them roll their eyes when you start talking about security.<\/p>\n<p>Villages, such as the LockPick village, exist where volunteers demonstrate just how illusionary the protection a physical lock provides. Then there are various hardware hacking villages, where routers, Wi-Fi repeaters, or anything containing a small computer is picked apart. Soldering irons abound, and disassembling is encouraged. Warranties are gleefully broken and tamper mechanisms are ignored or defeated in an undetectable manner. There&#8217;s the car hacking village, drone hacking, the social engineering events. The list goes on and on in a cornucopia of coolness.<\/p>\n<p>And let&#8217;s not forget the swag. Oh the swagiest of swag! Epic t-shirts, cool and weird stickers, army backpacks with a bajillion pockets, personalized hotel cards,\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Challenge_coin\" target=\"_blank\" rel=\"noopener\">challenge coins<\/a>, and the crown jewel of them all&#8230;<strong>The coveted unofficial electronic badges.<\/strong><\/p>\n<p><span id=\"more-25238\"><\/span><\/p>\n<p>Defcon has the best badges\u2014in part out of necessity, I theorize. How do you combat counterfeit badges when the vast majority of your attendees know about <a href=\"https:\/\/en.wikipedia.org\/wiki\/Card_printer\" target=\"_blank\" rel=\"noopener\">plastic card printers,<\/a>\u00a0have a passing familiarity with photo editing software, and perhaps a flexible moral code?<\/p>\n<div id=\"attachment_25242\" style=\"width: 462px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25242\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/defcon-7\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7.jpg\" data-orig-size=\"602,800\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"defcon 7\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7-226x300.jpg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7-452x600.jpg\" class=\"wp-image-25242 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7-452x600.jpg\" alt=\"\" width=\"452\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7-452x600.jpg 452w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7-226x300.jpg 226w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/defcon-7.jpg 602w\" sizes=\"auto, (max-width: 452px) 100vw, 452px\" \/><\/p>\n<p class=\"wp-caption-text\">An example of an early Defcon badge. (Photo acquired on the Internet)<\/p>\n<\/div>\n<p>You step up your game. Early examples were embossed, then made of laser-cut plexiglass, and even metal! Very soon, functionality was thrown into the mix. It started slowly, with blinking LEDs, and rapidly progressed. As badges started including crypto challenges, greater and greater functionality was added. The rationale behind this enhancement was to foster collaboration between attendees with different skill sets when attempting to solve the puzzles contained within.<\/p>\n<p>As badge functionality grew,\u00a0enterprising conference attendees started modifying them. The Defcon 16 badge included a &#8220;<a href=\"https:\/\/en.wikipedia.org\/wiki\/TV-B-Gone\" target=\"_blank\" rel=\"noopener\">TV-B-GONE<\/a>&#8221; function, to the great chagrin of the Las Vegas restaurants and sports bars owners. A Defcon 17 attendee even added a <a href=\"https:\/\/www.youtube.com\/watch?v=3lzvi9prqho\" data-rel=\"lightbox-video-0\" target=\"_blank\" rel=\"noopener\">Breathalyzer<\/a> to his badge.<\/p>\n<div id=\"attachment_25243\" style=\"width: 507px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25243\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/older_badges\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges.png\" data-orig-size=\"1502,1813\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"older_badges\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges-249x300.png\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges-497x600.png\" class=\"wp-image-25243 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges-497x600.png\" alt=\"\" width=\"497\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges-497x600.png 497w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges-249x300.png 249w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/older_badges.png 1502w\" sizes=\"auto, (max-width: 497px) 100vw, 497px\" \/><\/p>\n<p class=\"wp-caption-text\">Official Defcon badges of yesteryears.<\/p>\n<\/div>\n<p>Eventually, the Defcon organizers settled into a cadence. One year was a crypto challenge with an artistic style of badge; the alternating year an electronic one. This was probably a logistical decision, as the electronic badges became more and more intricate, requiring longer and longer development time due to their complexity.<\/p>\n<p>Around this time, Defcon attendees witnessed the birth and rise of unofficial Defcon badges. Built by attendees, these unofficial badges became the most sought-after object to wear around your neck: a prestigious status symbol, confirming your &#8220;leet-ness.&#8221; A visual confirmation that had the guile necessary to acquire them. You knew the right people, or had the skills to create your own.<\/p>\n<div id=\"attachment_25246\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25246\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/unofficial\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890.jpeg\" data-orig-size=\"1512,2016\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;6&quot;}\" data-image-title=\"unofficial\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890-450x600.jpeg\" class=\"wp-image-25246 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890-450x600.jpeg\" alt=\"\" width=\"450\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial-e1534885879890.jpeg 1512w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p class=\"wp-caption-text\">Unofficial Defcon badges, including: the Whiskey Pirates badge, a MK1 Bender badge, the Ides of Defcon, and a VoidDC24 badge.<\/p>\n<\/div>\n<p>Defcon 26 saw a veritable explosion of unofficial badges, as more and more groups of enterprising con attendees started making their own badges with a dizzying array of features. Here is a selection of unofficial badges acquired this year.<\/p>\n<div id=\"attachment_25247\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25247\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/unofficial_dc26\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989.jpeg\" data-orig-size=\"1512,2016\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;6&quot;}\" data-image-title=\"unofficial_dc26\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989-450x600.jpeg\" class=\"wp-image-25247 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989-450x600.jpeg\" alt=\"\" width=\"450\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/unofficial_dc26-e1534891405989.jpeg 1512w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p class=\"wp-caption-text\">A DC801 badge, a Furcon Badge, a Fale badge, a Linecon2018 badge, and an LHC badge.<\/p>\n<\/div>\n<p>With the explosion of unofficial badges, a standard was developed known as the &#8220;<a href=\"https:\/\/hackaday.io\/project\/52950-defcon-26-shitty-add-ons\" target=\"_blank\" rel=\"noopener\">SAO.<\/a>&#8221; This standard allowed for add-on mini badges that were much easier to make and gave the opportunity to less experienced badge makers to wet their feet. These mini badges also allowed for much brisker badge trading, as they tended to be simpler in design and scope.<\/p>\n<div id=\"attachment_25248\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25248\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/sao1\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869.jpeg\" data-orig-size=\"1512,2016\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;6&quot;}\" data-image-title=\"sao1\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869-450x600.jpeg\" class=\"wp-image-25248 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869-450x600.jpeg\" alt=\"\" width=\"450\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao1-e1534893349869.jpeg 1512w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p class=\"wp-caption-text\">A custom red-eyed pickle Rick SAO made by @reanimationxp @tr_h and @ssldemon<\/p>\n<\/div>\n<div id=\"attachment_25249\" style=\"width: 460px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"25249\" data-permalink=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/attachment\/sao2\/\" data-orig-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973.jpeg\" data-orig-size=\"1512,2016\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;8&quot;}\" data-image-title=\"sao2\" data-image-description=\"\" data-medium-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973-225x300.jpeg\" data-large-file=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973-450x600.jpeg\" class=\"wp-image-25249 size-large\" src=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973-450x600.jpeg\" alt=\"\" width=\"450\" height=\"600\" srcset=\"https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973-450x600.jpeg 450w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973-225x300.jpeg 225w, https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/sao2-e1534893331973.jpeg 1512w\" sizes=\"auto, (max-width: 450px) 100vw, 450px\" \/><\/p>\n<p class=\"wp-caption-text\">A selection of the SAO mini badges acquired through trade, beverage exchange, or monetary transactions.<\/p>\n<\/div>\n<p>All of these are but a small sampling of what was available. The project I was involved with was Defcon Drone badge (Hi Bl1n7!) and our team frantically flashed badge operating systems and assembled kits into the late hours of the night. I got to learn about the <a href=\"https:\/\/learn.sparkfun.com\/tutorials\/what-is-an-arduino\" target=\"_blank\" rel=\"noopener\">Arduino IDE<\/a>\u00a0as I flashed the base firmware on the Kickstarter pledged badge packages. I also took the opportunity to hone my soldering skills and repair electronics. The suite where all these activities took place was most thoroughly equipped with microscopes, soldering stations, classic sci-fi movies in the background, and a bevy of delicious snacks!<\/p>\n<p>Defcon is what you make of it, and this year I elected to make it all about the badge life. You can find out more about badgelife <a href=\"https:\/\/hackaday.com\/2018\/08\/20\/badgelife-the-hardware-demoscene\/\" target=\"_blank\" rel=\"noopener\">here<\/a>, courtesy of Hackaday.<\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/\">Badgelife: A Defcon 26 retrospective<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n<p><a href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><strong>Credit to Author: Jean Taggart| Date: Wed, 22 Aug 2018 16:03:18 +0000<\/strong><\/p>\n<table cellpadding='10'>\n<tr>\n<td valign='top' align='center'><a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/' title='Badgelife: A Defcon 26 retrospective'><img src='https:\/\/blog.malwarebytes.com\/wp-content\/uploads\/2018\/08\/blog_featured-e1534874240545.jpeg' border='0'  width='300px'  \/><\/a><\/td>\n<\/tr>\n<tr>\n<td valign='top' align='left'>Another year, another Defcon. In this retrospective, we take a look at the crown jewel of Defcon swag: badges. Reminisce with us about the coolest badges ever made and traded.<\/p>\n<p>Categories: <\/p>\n<ul class=\"post-categories\">\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/conferences-security-world\/\" rel=\"category tag\">Conferences<\/a><\/li>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/category\/security-world\/\" rel=\"category tag\">Security world<\/a><\/li>\n<\/ul>\n<p>Tags: <a href=\"https:\/\/blog.malwarebytes.com\/tag\/badgelife\/\" rel=\"tag\">badgelife<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/defcon\/\" rel=\"tag\">defcon<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/defcon-badges\/\" rel=\"tag\">Defcon badges<\/a><a href=\"https:\/\/blog.malwarebytes.com\/tag\/sao\/\" rel=\"tag\">SAO<\/a><\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/' title='Badgelife: A Defcon 26 retrospective'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\/security-world\/2018\/08\/badgelife-a-defcon-26-retrospective\/\">Badgelife: A Defcon 26 retrospective<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/blog.malwarebytes.com\">Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[19279,10756,13346,19280,19281,10497],"class_list":["post-13164","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-badgelife","tag-conferences","tag-defcon","tag-defcon-badges","tag-sao","tag-security-world"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13164","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=13164"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/13164\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=13164"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=13164"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=13164"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}