2005 Called - They want their Lotus Notes password hashes back
Adventures in Bouncerland
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets
Anonymous and the Online Fight for Justice
Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations
APK File Infection on an Android System
Appearance Hacking 101: The Art of Everyday Camouflage
Attacking TPM Part 2: A Look at the ST19WP18 TPM Device
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
bbqSQL - Rapid Blind SQL Injection Exploitation
Before, During, and After
Beyond the War on General Purpose Computing: What's Inside the Box?
Bigger Monster, Weaker Chains: The National Security Agency and the Constitution
Black Ops
Blind XSS
Botnets Die Hard - Owned and Operated
Breaking Wireless Encryption Keys
Bruce Schneier Answers Your Questions
Builders vs. Breakers
Bureaucratic Denial of Service
Busting the BARR: Tracking “Untrackable” Private Aircraft for Fun & Profit
Bypassing Endpoint Security for $20 or Less
Can Twitter Really Help Expose Psychopath Killers' Traits?
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary
Closing Ceremonies
Connected Chaos: Evolving the DCG/Hackspace Communication Landscape
Cortana: Rise of the Automated Red Team
Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)
Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
Cryptohaze Cloud Cracking
Cyber Weapons, Castle Doctrine, and the Second Amendment
DC RECOGNIZE Awards
DDoS Black and White "Kungfu" Revealed
DEF CON 101
DEF CON Comedy Jam V, V for Vendetta
DEF CON Documentary Trailer
Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
Detecting Reflective Injection
DivaShark - Monitor your Flow
DIY Electric Car
Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
Drinking From the Caffeine Firehose We Know as Shodan
Drones!
Dr. Strangenerd: How I learned to collaborate and love the Maker Movement
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
Exchanging Demands
Exploit Archaeology: Raiders of the Lost Payphones
Following the Digital Footprints
Fun with Software Defined Radios
Fuzzing Online Games
<ghz or bust: DEF CON
Grepping the Gropers - Airport Security
Hacker + Airplanes = No Good Can Come Of This
Hacking Humanity: Human Augmentation and You
Hacking Measured Boot and UEFI
Hacking [Redacted] Routers
Hacking the Google TV
Hacking the hackers: How firm is your foundation?
Hammer: Smashing Binary Formats Into Bits
Hardware Backdooring is Practical
Hellaphone: Replacing the Java in Android
HF skiddies suck, don't be one, learn some basic python
How to Channel Your Inner Henry Rollins
How to Hack All the Transport Networks of a Country
How to Hack VMware vCenter Server in 60 Seconds
Improving Web Vulnerability Scanning
Interface Puncher
Into the Droid: Gaining Access to Android User Data
Introducing the Smartphone Pentesting Framework
Introduction to lockpicking and bypassing physical security
Intro to Digital Forensics: Tools & Tactics
Juice Jacking: Hacking the Defcon Attendee's Smartphones
Jukebox Jacking
Kevin Poulsen Answers Your Questions
KinectasploitV2: Kinect Meets 20 Security Tools
Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement
Looking Into The Eye Of The Meter
Making Lockpicks the Legion303 Way
Making Sense of Static - New Tools for Hacking GPS
Meet the EFF
Meet the Feds 1 - Law Enforcement
Meet the Feds 2 - Policy
MegaUpload: Guilty or Not Guilty?
More Projects of Prototype This!
Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
New Techniques in SQLi Obfuscation: SQL never before used in SQLi
NFC Hacking: The Easy Way
No More Hooks: Detection of Code Integrity Attacks
Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?
Off-Grid Communications with Android: Meshing the Mobile World
OPFOR 4Ever
Overwriting the Exception Handling Cache PointerDwarf Oriented Programming
Owned in 60 Seconds: From Network Guest to Windows Domain Admin
Owning Bad Guys {And Mafia} With Javascript Botnets
Owning One to Rule Them All
Owning the Network: Adventures in Router Rootkits
Panel: The Making of DEF CON 20
Passive Bluetooth Monitoring in Scapy
Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions
Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework
Prehack - How to create and/or prevent a backdoor during the design and development of a product
Programming Weird Machines with ELF Metadata
PWN'D by SIGINT: Applied TEMPEST
Q&A with the Men (and Women) in Black
Robots: You're Doing It Wrong 2
Safes and Containers: Insecurity Design Excellence
SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor
Screw the planet, hack the job!
Scylla: Because There's no Patch for Human Stupidity
Shared Values, Shared Responsibility
Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated
SIGINT and Traffic Analysis for the Rest of Us
Socialized Data: Using Social Media as a Cyber Mule
Sploitego - Maltego's (Local) Partner in Crime
Spy vs Spy: Spying on Mobile Device Spyware
SQL Injection to MIPS Overflows: Rooting SOHO Routers
SQL ReInjector - Automated Exfiltrated Data Identification
Stamp Out Hash Corruption! Crack All The Things!
Stiltwalker, Round 2
Subterfuge: The Automated Man-in-the-Middle Attack Framework
Taking Back Our Data - An Invitation To Discussion
TBA-sky1
TBA-sky2
TBA-sky3
Tenacious Diggity: Skinny Dippin' in a Sea of Bing
The Art of Cyberwar
The Art Of The Con
The Breach That Wasn't
The Cerebral Source Code
The Christopher Columbus Rule and DHS
The Darknet of Things, Building Sensor Networks That Do Your Bidding
The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet
The Devil is in the Details - Why the way you used to do Social Engineering Sucks
The End of the PSTN As You Know It
The Leverage of Language - Advanced Workflow Environment for Security Intelligence and Exposure Management
The Open Cyber Challenge Platform
The Paparazzi Platform: Flexible, Open-Source, UAS Software and Hardware
The Patsy Proxy - Getting Others To Do Your Dirty Work
The Safety Dance - Wardriving the Public Safety Band
Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future
Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol
Weaponizing the Windows API with Metasploit’s Railgun
We Have You by the Gadgets
Welcome & Making the DEF CON 20 Badge
Why You Should Not Get a CISSP
World War 3.0: Chaos, Control & the Battle for the Net
Your Network Sucks