Workshop Registration Open

There’s many great workshops going on at ToorCamp this year, but most have limited attendance. To reserve your spot in a workshop, make sure to register for it ahead of time! Most workshops are free but some require a fee to help cover materials so make sure to paypal your instructor with the fee to confirm your reservation. For workshops that don’t sell out we’ll also be processing sign-ups at the info desk at the camp, but it’s highly encouraged to sign up ahead of time.

Register for a Workshop!

ToorCamp One Month Away!

In case you haven’t made up your mind on whether or not to come to ToorCamp, we want to help you make your decision. Here’s some articles about the last event to check out!


“Welcome to ToorCamp, a five-day retreat where some of America’s most elite hackers, technologists and DIY deviants escape civilization in order to rebuild it from scratch, leapfrogging the pedestrian present directly into a postapocalyptic science fiction future.”


“filled with a sense of disbelief that it’s over, a giddy excitement as I scheme ways to apply what I’ve learned, and the definite intention to be first ticket holder on the list for next year’s ToorCamp event.”


“This is the second time Toorcamp has been run, and it’s clear that both the organizers and attendees know how to throw an awesome stateside hacker camp.”


“The ToorCon crew is dedicated to throwing some of the most unique and extreme hacker / computer security conferences in the world.”


“Unlike some other conferences there were no VIP parties, or
overpriced workshops, no elitism, pretentiousness or artifice,
everyone was equal, respectful and humble.”

Screen Shot 2014-06-09 at 9.13.14 PMHak5

“an epic Hacker Camp hosting the most some of the nations most creative hackers, makers, movers and shakers”

Pre-Register Now!

There’s only 3 weeks left to register so start making your plans and pre-register, apply to run a campsite, or submit a talk today before it’s too late!

ToorCon 15 Reception

Our reception tonight is at the pool deck on the 3rd Floor. Follow the signs for the Ivory Room. Saturday and Sunday’s events will be on the Second Floor. You’ll need to use the elevators to get up. We’ll see you all soon!

Let the Hackers Learn

Schools don’t teach hacking, and the internet hides it for both profit, and fear of punishment. This makes learning, in a legal way, very difficult; so we developed a site where anyone can create any security related challenge they want. This talk is about how we keep our server safe and secure while letting our users make any mistake they want so they can teach the world about all the web based exploits.

John Irwin
I love to break things and love to learn. I graduated from the University of Washington with a bachelors in Informatics. I have experience working in IT, and am currently employed at Security Innovation as a Security Engineer.

Adventures with weird machines thirty years after “Reflections on Trusting Trust”

It’s been thirty years since Ken Thompson’s famous “Reflections on Trusting Trust” (well, 29, but what’s an off-by-one?). Back then, few hackers expected to actually encounter a planted bug, and now we speculate what commonly used software might not have them. But, if we somehow managed to eliminate all bugs, could we then trust software? We believe that the answer is “not really”: bugs are a part of the problem but by far not all of it.

Any complex enough input is indistinguishable from bytecode for a “weird” virtual machine hiding in the parser. Unless we radically redesign data formats, telling what data could do when fed to software is much harder than it needs to be. For code, of course, it’s known to be undecidable, but it may surprise you how many “tables” are as good as code: for example, so are ELF relocations + dynamic symbols, and so are IDT+GDT+TSS for an ia32 processor (no instructions needed for a Turing-complete computation). This talk will summarize two years of our explorations with @BxSays and @JulianBangert of such “weird machine” programming environments, and what these weird machines mean for “Trusting Trust” beyond bugs.

Sergey Bratus
Sergey Bratus believes that hacking has become a distinct computing research and engineering discipline: while academia focuses on abstractions, models, and frameworks, hackers expose “weird machines” inside actual systems, and show how much unexpected computation power they are capable of. On his day job as a Research Assistant Professor at Dartmouth College, he is extremely fortunate to work with brilliant students who hack ELF, DWARF, 802.11, 802.15.4, and many other nice things.