Events


Wednesday 09:00


Wednesday 15:00


Wednesday 20:00



Thursday 10:30


Opening Remarks

Prime Dome

Thursday 11:00


Making and Breaking Hardware

Origins of the Hacker Ethos - Prime Dome

Unlike software, the basic language of hardware -- physics -- has not changed since the beginning of time as we know it. The notion that "hardware is hard" is more a function of society's changing mores around intellectual freedom, ownership norms...

Thursday 12:00


Let Them Eat Crème Brûlée!

Presented by Taylor Streetman and Jacob Graves - Prime Dome

As we all know crème brûlée is the backbone of any good hacker
camp. The only problem is that there is never enough to go
around, making for an elitist experience that only the lucky few
get to enjoy.

Until now!!!

Join us as we scale crè...

Monogram Drink Coaster with OlyMEGA

Branding Wood Coasters with Science - Maker Stage

Ever wanted to monogram your wooden goods but can’t justify the expense of a custom branding iron, an indistinguishable effect can be achieved by applying a strong solution of ammonium chloride, for instance using a foam rubber stamp, followed by ...

On heating, ammonium chloride decomposes into ammonia gas and strong hydrochloric acid (NH4Cl → NH3 + HCl). Ammonia diffuses away into the atmosphere, leaving the strong acid behind, which burns the wood. The resulting chemical burn is identical to a heat burn in most respects.

Thursday 13:00


Finding secrets in source code with TruffleHog

Prime Dome

Developers frequently commit secrets to source code, and sometimes push secrets to package managers. These secrets often leak out into the public either through accidental source code disclosure, or intentional source code disclosure. TruffleHog i...

In the interest of full disclosure, I did give this talk at Bsides SF 2018

Resources:
https://github.com/dxa4481/truffleHog

# Finding secrets in source code with TruffleHog
===================

## intro
----------
Prior to me releasing truffleHog, there where a lot of folks pushing secrets managment solutions, but not many tools available for cleaning up code that wasn't conforming to proper secrets managment. I'll give an overview of how I struggled at my job to find secrets committed, and how I saw other companies struggling with the same issues.

I'll also show how much code is left in the past. Version control keeps history of old commits, which often contain secrets not in the current version of the source code.

## The tech
----------

I'll talk about what technologies I use to power truffleHog. Entropy detection, and grep based rules. I'll explain the advantages and disadvantages to both. I'll also explain how a large percentage of the secrets identified were found in old commits, not in the current branch of code. I'll show off a few examples of successful runs of the code, and I'll explain how I'd use the tool in different scenarios. I...

Car Hacking Camp - By the Car Hacking Village

Around Camp

Car Hacking Camp.

Here at the CHV-CHC we want you to bring your car so we/you can hack it. Are goal will be to send commands to the vehicle to enable lights and sounds. When we've done enough vehicles, we will enable a Car Disco. Controlling...

FABRICation

How to sew pretty much anything - Music & Events

Do you want custom clothing, or the perfect backpack, or a matrix screensaver print slipcover for your bitcoin mining rig? Do you want to make it yourself? After this talk you'll know enough to go practice your sewing skills, design your own patte...

This session will share the basic skills and principles I use to sew items ranging from custom clothing to hiking gear to plushies of my favorite programming language's mascot:

* Identifying different types of fabric and choosing a good one for the project at hand
* Best and worst ways to attach materials to each other
* How to make your own sewing pattern
* How to turn a self-made paper pattern into a cloth item

I'll provide you with the tools and materials to practice these skills on a simple sewing project.

Thursday 14:00


Social Engineering Tech Education

Tricking your friends and family into becoming hackers - Prime Dome

Most people don't care how computers work, which leads to questionable legislation and a cultural disregard for privacy and security. In this talk we explore tricks to get "normal" people to take an interest in tech, start to think like a hacke...

Most people don't care how computers work -- ask them why and many will legitimately describe a creepy dude sitting in a dark basement typing 1s and 0s. This is the sort of indifference that leads us into a cyberpunk dystopia.

How can we get "normal" people to care about how technology works? This talk explores what we've learned in tricking over 30,000 uninterested students to get excited about programming, electronics, and cyber security. We'll discuss hacks to overcome barriers most people have to learning, and ways to inspire hacker-like thinking in the general population.

Thursday 15:00


Hardware REverse Psychology

How to think like a designer when reverse engineering hardware - Music & Events

Designing circuits and laying out a printed circuit board (PCB) can be a complicated and intensive process. It also happens to be a very expensive process as well, which is why there are many shortcuts and tricks that design engineers use to cut d...

Swarm Intelligence and Augmented Reality

Prime Dome

What do a flock of starlings, a colony of warrior ants, and a hundred-person flash mob all have in common? Swarm intelligence, the behavior of decentralized systems, is a concept that we can apply to human systems to unlock their potential. Swarmi...

Pongolyn explores swarm intelligence through augmented reality gaming, where she coordinates hundreds of agents under cover of secrecy to walk, bike, drive, climb, snowshoe, boat, fly, hack, and engineer their way to remote locations in order to score points for the game. In this talk, she shows how to apply social engineering strategies to groups of individuals with the goal of achieving a collective intelligence that is greater than the sum of its parts.

Solar Cell workshop - Day 1

Theory and design of your solar project - Maker Stage

Come build your dream solar power panel to do whatever you want.

The solar cell workshop will discuss the basics of designing solar powered systems and give you the chance to build your own practical solar project. Participants will be supplied with approximately 10 watts worth of 3 x 6 solar cells and limited numbers of voltage converters and other items that might be useful in creating your solar application. Do you want to make a charger for your phone or maybe even cover your laptop or tablet with solar cells? Bring your ideas, soldering irons and anything else you think you might need for your project. We'll see who comes up with the cleverest ideas. Participants, please bring $10 cash for materials.

Thursday 16:00


Getting Shells From Javascript

Prime Dome

A few new features of Javascript that have come out in the last couple years have made it easier for sophisticated threat actors to craft Javascript payloads that target internal network vulnerabilities.

These vulnerabilities are more tradition...

Fun with high voltage

Maker Stage

In this workshop you will learn about how to use high voltage to make wood burnings called lichtenberg figures. Everyone will get real world experience working with high voltage.

We are going to learn about the science behind this process as well as the safety measures you should take when working with high voltage.

Thursday 17:00


Threat Modeling

Prime Dome

This presentation will shed some light on the threat modeling process for applications, dip into some network threat modeling, and hopefully give you some tools to make threat modeling easier.

Threat modeling is an engineering discipline you can use to help you identify threats, attacks, vulnerabilities, and countermeasures that are relevant to your particular application/system and its environment. Many times, we would like to work with project teams to document the threats and their countermeasures, but project teams find threat modeling too difficult or teams get lost in the details and hurt their project timelines.

This presentation will shed some light on the threat modeling process for applications, dip into some network threat modeling, and hopefully give you some tools to make threat modeling easier.

Ham Test

Music & Events

AF7MH, K7FP, NQ1E, and some other accredited volunteers hold a LaurelVEC ham radio session. It's completely free, and we offer Technician, General, and Extra exams.

Thursday 18:00


Thursday 20:00


Thursday 21:00


Origami DJ

Music & Events

Thursday 22:00


Spiegel MC

Music & Events

Thursday 23:30


DJ Joey Lawrence

Music & Events

Friday 10:00


Woodgas Demonstration Project

Around Camp

Did you know you can run a gasoline generator off of wood? Come see this simple design and watch it in operation.

In ToorCamp 2016 we built a simple woodgas generator out of two garbage cans and successfully ran a 1500watt gas generator off of it. This year we're going to continue to tinker with it and see if we can do stuff like burn uncut 2x4's as fuel. This will be setup on the volleyball court and demonstrations will happen in the mornings.

Friday 11:00


Sub-Turing Machines: The End of Unknown Unknowns

How to apply LangSec principles to everything you see - Prime Dome

LangSec, or language-theoretic security, has very little to do with the language in which you write your software and everything to do with how that software deals with its input and output. Let's talk about how to apply it to a few real-world pr...

Falcon talks about LangSec and also about Shadytel's new phone switch - designed from the ground up based on LangSec principles of sub-Turing operation. The talk will start by clearing up some common misconceptions about language-theoretic, such as the idea that it requires you to write your programs using specially-designed languages. Then, we'll get into some actual designs - talking about LangSec's primary use as a design methodology for interchange formats, and considering some LangSec rules to add to JSON and even XML to make them safer. We'll discuss some of the bugs that could have never been, and why they could have never been.

But then, we'll get into the reasons why this methodology can only be applied with care and a full understanding of what is going on. We'll consider emergent complexity, using Shadytel's awkward gear designs as an example of how LangSec isn't going to save us from having to threat model or from having to consider formal properties like closure under composition.

Friday 12:00


Nanofabrication at home

HOWTO build an atomically sharp tungsten electron emitter - Prime Dome

Have you ever wanted an FEG-SEM but were worried about coming up with thousands of dollars to replace the electron emitter every year? Here is my method for making atomically sharp tungsten electron emitters at your hackerspace using simple tools.

Without an electron source, scanning electron microscopes are just a pile of expensive junk. Cold cathode FEG SEMs require a tungsten emitter tip about half a nanometer wide, which can cost several thousand dollars to replace. Believe it or not, it is possible to manufacture them yourself using a few homemade tools and common supplies.

I will present my method for making emitter tips, and a gallery of images made with homemade emitters.

Mini CodeDay (Kids Workshop)

Music & Events

Pitch ideas, form teams, and build a cool game or app of your own design! No experience necessary! (Targeted to younger Toorcon attendees, but anyone is welcome to attend.)

CodeDay is an event where people of all skill levels get together to build creative and fun games and apps. Attendees of all skill levels are welcome: we just ask that experienced attendees choose an ambitious project for their skill level. Projects are judged on creativity and personal difficulty, although there are no prizes.

This is a great event for younger ToorCamp attendees, although attendees should be at least 6 or 7. Laptop required. An intro-level side-workshop will be provided after kickoff for newer coders.

Friday 13:00


Pride Parade!

by Beerocracy - Around Camp

Oscilloscope Music

Prime Dome

Solar Cell workshop - Day 2

Build your solar project - Maker Stage

Come build your dream solar power panel to do whatever you want.

The solar cell workshop will discuss the basics of designing solar powered systems and give you the chance to build your own practical solar project. Participants will be supplied with approximately 10 watts worth of 3 x 6 solar cells and limited numbers of voltage converters and other items that might be useful in creating your solar application. Do you want to make a charger for your phone or maybe even cover your laptop or tablet with solar cells? Bring your ideas, soldering irons and anything else you think you might need for your project. We'll see who comes up with the cleverest ideas. Participants will be required to pay a $10 fee for materials.

Friday 13:30


Friday 14:00


DIY OSC Debug Multitool App

Near-Universal device and application debugging tool using OSC - Prime Dome

How to use the versatile OSC protocol to create your own context-sensitive on-the-fly debug UI for hardware and software projects.

Open Sound Control is a lightweight and versatile open source communication protocol that belongs in every maker's toolkit.

In this talk, I explore how I created a general purpose debugging tool using OSC. Network enabled diy devices or apps can push a UI configuration to the debug app. The result is an on-demand debug tool that adapts to your needs.

I'll be covering the basics of OSC as well as giving a quick glimpse into using Unreal's Motion Graphics toolkit (which is what the UI uses on the debug app).

I would then love to open it up to conversation on how to add a security layer light enough to be implemented on microcontrollers.

Friday 15:00


You Are Only Human

(how to treat yourself and others that way) - Prime Dome

People to go into tech tend to want to focus on the concrete - but the first step in hacking a system is understanding it. You are only human - and all your friends are only human, too. If you want to make great things, you're going to need a team...

This talk will go into tools and methods for:

a) recognizing when you're being a human instead of a robot
b) how to get out of your own way when problem-solving
c) how to build relationships with people rather than harshing on them
d) how the "soft skills" can make you stronger technically
e) demonstrations of why and how emotional labor is real work
f) honest self-reflection
g) building effective models of others

The presentation will include handy checklists!

Car Hacking Camp - By the Car Hacking Village

Around Camp

Car Hacking Camp.

Here at the CHV-CHC we want you to bring your car so we/you can hack it. Are goal will be to send commands to the vehicle to enable lights and sounds. When we've done enough vehicles, we will enable a Car Disco. Controlling...

Friday 16:00


Building and sailing a 12 foot sailboat

Prime Dome

My journey to build and sail a 12 foot live aboard sailboat from a pile of CNC cut plywood, a few gallons of epoxy and a lot of stress.

In August 2014, I lived in Port Townsend, WA with my 68yr old father and 18yr old sun. We turned a pile of CNC-cut plywood into a hull. Over the course of the next year and over 1000 hours later, I finished the boat in a garage. The talk will cover the construction and sailing techniques, including
- plywood eggshell style construction
- mixing and working with epoxy
- sanding epoxy
- filleting corners with epoxy
- more sanding of epoxy
- waterproofing plywood
- construction and materials selection to avoid corrosive salt water
- boat electrical wiring (complete with wiring diagram)
- sail rigging
- tent sewing
- learning to sail again

A friend of mine sailed a sister ship around Tierra del Fuego — some of the worst weather in the world — for 6 weeks.

You Mom's New Hotness: Threat Intelligence

The Three Laws of Vanilla Ice Threat Intelligence Thermodynamics - Music & Events

Threat intelligence is the new (old) hotness. Brief but scintillating history of threat intelligence in cyber and how your mother is involved. Even briefer (but still as interesting) discussion of the business of the TI industry. Workshop class...

Workshop class is a survey of open source resources and a fun little demonstration of how to automate TI IOCs and stuff. Stop - integrate in an automation fashion TI into the defense-in-depth architecture. Collaborate - cross the boundaries between IR analysts and TH/TI analysts. Listen - Evolve from reactive to reactive and proactive.

Fun with high voltage

Maker Stage

In this workshop you will learn about how to use high voltage to make wood burnings called lichtenberg figures. Everyone will get real world experience working with high voltage.

We are going to learn about the science behind this process as well as the safety measures you should take when working with high voltage.

Friday 17:00


gr-iridium: Under the hood

Demodulating 1000 frames/s from space - Prime Dome

gr-iridium is free software to capture and demodulate data from the Iridium satellite network. This talk dives under the hood of gr-iridium and shows how it can capture and demodulate 1000 frames per second on an 8 year old quad core machine.

Iridium was launched at the end of the 90s. Back in the day it was considered extremely difficult to intercept because of the large bandwidth and constantly changing doppler shift. With the rise of Software Defined Radio and more capable general purpose computers this is not the case any more.

This talk dives deeper into the structure of gr-iridium and shows how GNURadio can be used to receive very bursty and fast changing signals, something it is traditionally not very good at. It will also give you some basic understanding of the math behind demodulating a PSK signal in complex baseband.

It will not cover the higher layer parts of our work on Iridium. If you are interested you can always have a look at our presentations at HOPE (https://www.youtube.com/watch?v=cvKaC4pNvck) and 33C3 (https://media.ccc.de/v/32c3-7154-iridium_update)

Getting to Blinky

Learn to design your own digital firefly - Maker Stage

This is an in-person, hands-on version of "Getting To Blinky", an online course series that has taught thousands to use the free and open source electronics CAD program, KiCad. This would be a "digital firefly" version of that course which showcas...

This workshop will cover the entire process of creating a PCB from scratch using KiCad, the open source electronics CAD program.

In the first part of the workshop we will go over the "why" of creating PCBs, including some very very basic electronics concepts. More importantly, we will go over the realties of creating PCBs and why the creators care about certain factors.

Then we will dive into using KiCad, including creating a schematic. This segment will be about creating a simple electronics circuit that represents the electrical connections on the final product. This will also allow us to list the actual part numbers for creating physical devices later on.

Finally we will associate those schematic symbols and their net connections into the layout portion of the program, which moves the design from the theoretical realm into the physcial realm (well, on a screen). This will allow us to design the physical representation of the PCB, which will later be sent off for fabrication. At this stage we will also pull in artistic design elements to make the PCB look better.

The output from this process will be a set of design files that can be sent off to be manufactured. F...

Cracking Hashes Workshop - Beginner

Using Hashcat and John to recover passwords. - Music & Events

Sit down and teach the basics for password cracking using Hashcat and John the Ripper. Bring a laptop (or desktop) with a GPU, and we can get started on doing some basic password cracking.

We will also do some basic Wireless attacks for WPA2, a...

This will be a 2 hour workshop on cracking passwords. Each particpant should bring a laptop that they have root or Administrator access on so we can install Hashcat and John The ripper.

Friday 18:00


Project Ladon (fka Hackerboat) Sail On

Prime Dome

Since last Toorcamp, we've made major advances in building a robot sail boat capable of crossing oceans and circumnavigating the world. As a warm-up, we're going to enter the Microtransat trans-Atlantic autonomous sailboat race.

Come see our progress since last Toorcamp.

Friday 19:00


Sing Like a Pop Star

Music & Events

Learn the one 'secret' that all pop stars use to sing their songs higher than normal people.

Have you ever noticed that most pop singers can sing really high? They are using a relatively simple trick to sing in the upper octaves that you can use too. We will learn this technique and other very basic techniques to take your singing to the literally the next level. Once you learn this, you will be able to sing many more pop songs that were previously out of your range. We will practice what we learn in a sing along party where you can show off your new skills.

Liverstrong

Upping Your Game with the Cause of and Solution To All of Life's Problems - Around Camp

"Liverstrong" is a motto coined by Infosec Crumudgeon, BSides founder, and all-around-wonderful soul Jack Daniel. Being Liverstrong is not simply about the alcohol quantity in your evening or the B.A.C. levels in your bloodstream. No, as you will ...

At hacker cons last year, Deviant and friends brought you gustatory delights in “The Hotel Room Gourmet” and the audience was treated to cooking advice, hardware demonstrations, and free noms! This talk is the counterpoint to "The Hotel Room Gourmet.“

"Liverstrong" is a motto coined by Infosec Crumudgeon, BSides founder, and all-around-wonderful soul Jack Daniel. Being Liverstrong is not simply about the alcohol quantity in your evening or the B.A.C. levels in your bloodstream. No, as you will learn in this workshop, the Liverstrong lifestyle comes from diligent training, sharp knowledge, and a discerning palate.

This workshop will step people through some of the basics of booze, distinguishing good offerings from poor ones, discerning flavor notes, DIY liquor hacks, and of course demonstrating the creation of outstanding cocktails. Just like last year, audience participation will encouraged!

ToorCamp Stupid Hackathon

Prime Dome

You are cordially invited to the second biennial ToorCamp Stupid Hackathon. The Stupid Hackathon presents an opportunity to create the most useless, dangerous and/or variously unwise things you can imagine.

Join us for team formation and registration, Find us Friday evening at Prime Dome to register and find group-mates; preformed groups are also welcomed.

Trophies will be awarded Saturday evening for categories made up on the spot; Best in Show will receive venture funding.

Previous Affiliated Stupid Hackathon:
https://wiki.toorcamp.org/index.php?title=Stupid_Shit_No_One_Needs_%26_Terrible_Ideas_Hackathon

Previous Unaffiliated Stupid Hackathons:
NYC: http://www.stupidhackathon.com/
Toronto: http://stupidhacktoronto.com/
San Francisco: http://stupidhackathon.github.io/
Berlin: http://stupidhackathon.de/

Friday 20:00


Friday 21:00


Origami DJ

Music & Events

ANSI Drink and Draw

at Beerocracy - Around Camp

Friday 22:00


DJ Zach Archer

Music & Events

Friday 23:00


Jerobeam Fenderson: Oscilloscope Music

TeraHash Party - Music & Events

Music videos and visual effects try to capture and enhance the feeling of the music you're listening to, but what if the visuals actually were the music? Jerobeam Fenderson blends audio and visual with his mind-blowing experience called Oscillosco...


Saturday 12:00


Carving with a Maslow CNC

Music & Events

This will be a walk through of working up a graphic, and converting it into the 2.5D G-Code needed to to drive a Maslow CNC router.

Demystifying statically linked ELF security mitigations-- with binary instrumentation techniques

Static ELF's and ASLR/RELRO mitigations - Prime Dome

ELF executables are often statically linked for COTS binaries to avoid dependency issues and to keep things simple. After all, why not build a binary as statically linked? ASLR and RelRO (read-only relocations) are two extremely important binary m...

ELF executables are often statically linked for COTS binaries to avoid dependency issues and to keep things simple. After all, why not build a binary as statically linked? ASLR and RelRO (read-only relocations) are two extremely important binary mitigation techniques that are presently incompatible with statically linked binaries. This talk presents the surprisingly dangerous attack surface of statically linked executables and a solution that demonstrates working ASLR and RELRO with statically linked executables using binary instrumentation techniques. The software RelroS and static2dyn will be presented as innovative solutions that temporarily resolve these issues until the glibc developers can take the time to add the support into 'ld', and 'gcc'. During this talk we will cover many of the intricacies of statically linked executables, the vulnerable data structures that are being used internally, and how we can instrument the ELF headers and the code in such a way that we actually get RelRO and ASLR working with static binaries.

Saturday 13:00


Entropy

Prime Dome

Entropy is a measurement of the amount of randomness in a system. All systems need entropy to run in a secure fashion. We'll do a deep dive into entropy; what entropy is, how it's used, and how it's generated and kept in a pool in the linux kernel...

Saturday 13:15


Out of the Bag with OlyMEGA Members

Drawstring Backpack Kit - Music & Events

Make Your Own Drawstring Bag/Backpack

We will show how to make your own drawstring bag which can double as a small backpack. We will use a sewing machine with a one step buttonhole to create it. After the sewing is complete we will set grommets then string it up. We will have kits available for purchase if you want to make your own. Now it's time to put it in the bag.

Saturday 13:30


Demystifying the state of machine learning: why are machines still stupid? … or are they?

Prime Dome

We grossly underestimate just how much multidimensional data we process as a human, for years, that contributes to conscious as well as subconscious, automated learning, in addition to contextual and background knowledge human have gathered evolut...

Saturday 14:00


The Currency of Thought

Prime Dome

How do people actually think? This talk will argue that language is intimately associated with how we think and that current AI approaches are grossly misguided.

When you are solving a problem, how are you doing that? What is that little conversation going on in your conscious mind and just how are we doing that? This talk will explore the idea that we use language as the currency for thought. Language is what enables the exchange of ideas within your head and without a language, you literally wouldn't be able to 'think'. We will explore how this could work and how it compares to current AI approaches and why they are simply wrong.

Saturday 14:30


Developers, developers, developers.

When DevOps Fails to secure. - Prime Dome

In the last year, I’ve found some pretty stupid security mistakes. Blatantly overlooked controls, or flat out lazy system admins. I will show real-world examples of misuse & abuse, and improper data handling of passwords inside application code. W...

Saturday 15:00


Using Publically Available Data to Find Bad and Do Good.

Maker Stage

Stratva's recent heatwave exposure has raised consciousness of metadata and it's role in privacy. Come for a exploration of what OSINT can do for identifying critical infrastructure vulnerabilities and the implications to public safety.

Using publically available feeds, we'll do cross correlation and explore hypothesis about public safety, vulnerabilities in critical infrastructure, and access patterns. We'll explore real world implications, both through upcoming Cascadia fault earthquakes and through prior disasters. We'll discuss how this data can increase public safety and trends as we go forward.

Developing a Linux Rootkit

kernel internals & subversive techniques - Prime Dome

Rootkits, the most pervasive of backdoors, are the final step in post-exploitation. This talk will tour the fundamentals of Linux kernel development and the anatomy of an LKM rootkits by building one from scratch. The talk will explore the blackha...

Saturday 15:30


The Big, Bad, Cõc Cõc

Tales from a rather suspicious Vietnamese browser - Prime Dome

Pause for a second and consider the immense amount of incredibly sensitive personal data that flows through browsers. Sure we have things like the same origin policy that partitions browser data between different origins and helps protect us from ...

For the uninitiated, this may be the first time you've ever heard of Cõc Cõc. We didn't have any idea of its existence until recently when we paid a "totally legitimate advertisement affiliate" to drive traffic to one of our IPv6 honeypots. As the firehose of "totally legitimate traffic" ran through our site we noticed a significant number of user agents sporting the coc_coc user agent string. From there we dove down a bit of a rabbit hole and learned quite a few things about this lesser-known browser:

- The Cõc Cõc browser is mega cross-platform (even Windows phones!)
- It's based off of a Chromium fork
- The company behind Cõc Cõc was founded through a $100mm Russian investment
- Instead of syncing your browser settings by logging in with Google you can log in with Facebook!
- The browser reports ~50% market share in Vietnam
- The browser has an embedded BitTorrent client (peer-to-peer communications, anyone?)
- The browser has functionality that enables direct downloading of streamed media
- Many of these browsers are providing "totally legitimate traffic" through "totally legitimate advertising affiliates"
- Vietnamese media reports the Cõc Cõc organization as hom...

P4wnP1 build

raspi/hacking box - Music & Events

This class will be about building your own hacking tools in the physical and software world. We will be focusing on building the P4wnP1 on a raspi zero and using a hat to give you direct connect to usb without odd cables. We will be discussing the...

You will need the following items to complete this workshop.
1. Raspi Zero can be wireless or not (suggest wireless)
2. 32 gb micro usb card
3. usb-a pi zero hat
4. papirus e-ink optional (https://www.adafruit.com/product/3335)
4. laptop to build it on.
Here is a list that is an affiliate link for OlyMEGA a local hackerspace in Olympia Wa.
https://amazon.com/ideas/amzn1.account.AEG5SOSXTNBV5SITBN4KGQ3EM6UQ/1UKYXTYMC7Y4F?ref=idea_share

This class is based upon the work of mame82 and his creation p4wnp1 https://github.com/mame82/P4wnP1.

This tool is very similar to the rubber ducky and the bash bunny from hak5. We will explore adding an PaPyrus e-ink display and additional buttons to the hardware side and then work on ideas to make the software reflect the new functionality. Soldering will be required.

Saturday 16:00


Addressing PTSD in the Body

When it's not just your brain that's a bag of cats - Prime Dome

Recently diagnosed with complex PTSD, I've been approaching my brain and body like I would an engineering problem. I'll walk through my symptoms, the core feeling of feeling unsafe that I found, and the body-based therapies that have worked, with ...

My major research and hacking problem in the last twelve months has been my own brain and body. When the brain is reminded of a traumatic event that hasn't been processed properly, it downregulates the parts that handle speech, memory, visual imagination, and emotional self control, which makes it difficult to work, hack, maintain social relationships, and engage with the sources of trauma directly in talk therapy. I approached my recovery as an exercise in troubleshooting and I found most of the real root causes of the bugs were in my body, not my mind.

Fun with high voltage

Maker Stage

In this workshop you will learn about how to use high voltage to make wood burnings called lichtenberg figures. Everyone will get real world experience working with high voltage.

We are going to learn about the science behind this process as well as the safety measures you should take when working with high voltage.

Saturday 16:30


Lightning Talks!

Prime Dome

This year our long time friend of the conference and badass hacker Richard Johnson will be organizing and MC'ing the lightning talks! If you are interested in presenting one, make sure to get in contact with Rich to get included by emailing richin...

Saturday 17:30


ToorCamp Stupid Hackathon

Award Ceremony - Prime Dome

You are cordially invited to the second biennial ToorCamp Stupid Hackathon. Compete to create the most useless, dangerous and/or variously unwise things you can imagine.

You are cordially invited to the second biennial ToorCamp Stupid Hackathon. The Stupid Hackathon presents an opportunity to create the most useless, dangerous and/or variously unwise things you can imagine.

Join us Saturday evening for project demonstrations and an award ceremony. Trophies will be awarded for categories made up on the spot; Best in Show will receive venture funding.

slinging micropython & OLED

Music & Events

Micropython Hardware class using the ESP8266 (nodeMcu package).
We'll wirelessly edit and launch python scripts that test ultrasonic distance sensors, spit out letters and numbers on a cute 0.96" OLED display, and radiate WS2812 LEDs.

Micropython Hardware class using the ESP8266 (nodeMcu package)
Micropython is all the rage now that $4 microprocessors running at 80mhz are fast enough to interpret the language. We'll wirelessly access the ESP8266 using the web based python console known as webRepl and blink WS2812 LEDs, read proximity sensors, and program OLED displays. We'll skip all the boring tutorials and start editing/breaking functional python sketches. Bring your text editor.

https://www.instagram.com/p/Bha6Yn0hBzK
https://www.instagram.com/p/BMzIMvThnmA (bring your own blowfish)

Class includes a fist full of hardware for $30
- nodeMcu ESP8266 uController
- breadboard
- 0.96" OLED i2C display
- WS2812 addressable LEDs
- ultrasonic proximity sensnor
- touch sensor
- fist full of random parts (jumpers, pins, daggers)

Class size: 15

Saturday 18:30


Closing Remarks

Prime Dome

Come see the winners of Titanium Chef, The Stupid Hackathon, and other events around camp. We'll also be giving an overview of our camp infrastructure and thanking everyone who helped make the camp possible!

Saturday 22:00


DJ Keith Myers & Friends

AWS Party - Music & Events

Sunday 11:00