• 2
  • 2005 Called - They want their Lotus Notes password hashes back

    Willard Dawson
    Fri, 11:00 - 11:50
    Skytalks
  • A
  • Adventures in Bouncerland

    Nicholas J. Percoco, Sean Schulte
    Sun, 12:00 - 12:50
    Track 2
  • An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets

    James Kirk
    Fri, 15:00 - 15:50
    Track 1
  • Anonymous and the Online Fight for Justice

    Gabriella Coleman, Mercedes Haefer, Marcia Hofmann, Jay Leiderman, Amber Lyon, Gráinne O'Neill
    Sat, 17:00 - 17:50
    Track 2
  • Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations

    Michael Perklin
    Fri, 17:00 - 17:50
    Track 1
  • APK File Infection on an Android System

    Bob Pan
    Fri, 10:30 - 10:50
    Track 4 / Turbo
  • Appearance Hacking 101: The Art of Everyday Camouflage

    Valerie Thomas
    Fri, 12:00 - 12:50
    Skytalks
  • Attacking TPM Part 2: A Look at the ST19WP18 TPM Device

    Chris Tarnovsky
    Fri, 15:00 - 15:50
    Track 3
  • B
  • Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing

    Chris Conley
    Fri, 13:30 - 13:50
    Track 4 / Turbo
  • bbqSQL - Rapid Blind SQL Injection Exploitation

    Scott Behrens, Ben Toews
    Sun, 15:00 - 15:50
    Track 4 / Turbo
  • Before, During, and After

    Dead Addict, Gail Thackeray
    Fri, 11:20 - 11:50
    Track 1
  • Beyond the War on General Purpose Computing: What's Inside the Box?

    Cory Doctorow
    Sat, 10:00 - 10:50
    Track 3
  • Bigger Monster, Weaker Chains: The National Security Agency and the Constitution

    Alex Abdo, James Bamford, William Binney, Jameel Jaffer
    Sat, 15:00 - 15:50
    Track 2
  • Black Ops

    Dan Kaminsky
    Sat, 16:00 - 16:50
    Track 5 / Penn & Teller
  • Blind XSS

    Adam Baldwin
    Fri, 17:30 - 17:50
    Track 4 / Turbo
  • Botnets Die Hard - Owned and Operated

    Richard J. Enbody, Aditya K. Sood
    Sat, 12:00 - 12:50
    Track 3
  • Breaking Wireless Encryption Keys

    DaKahuna
    Thu, 10:00 - 10:50
    Track 1
  • Bruce Schneier Answers Your Questions

    Bruce Schneier
    Sat, 11:00 - 11:50
    Track 2
  • Builders vs. Breakers

    Jonathan Claudius, Matt Konda
    Sat, 15:00 - 15:50
    Skytalks
  • Bureaucratic Denial of Service

    Chema Alonso, Luis Delgado
    Sat, 16:00 - 16:50
    Skytalks
  • Busting the BARR: Tracking “Untrackable” Private Aircraft for Fun & Profit

    Dustin Hoffman, Semon Rezchikov
    Sat, 17:00 - 17:50
    Track 1
  • Bypassing Endpoint Security for $20 or Less

    Phil Polstra
    Fri, 16:00 - 16:50
    Track 3
  • C
  • Can Twitter Really Help Expose Psychopath Killers' Traits?

    Chris Sumner, Randall Wald
    Sun, 14:00 - 14:50
    Track 1
  • Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data

    Catherine Crump, Toby Kohlenberg, Christopher Soghoian, Ashkan Soltani, Ben Wizner
    Fri, 11:00 - 12:50
    Track 3
  • Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary

    Shawn Henry
    Fri, 14:00 - 14:50
    Track 5 / Penn & Teller
  • Closing Ceremonies

     
    Sun, 17:30 - 18:50
    Track 1
  • Connected Chaos: Evolving the DCG/Hackspace Communication Landscape

    Anarchy Angel, blakdayz, Nick Farr, Dave Marcus
    Sat, 16:00 - 16:50
    Track 2
  • Cortana: Rise of the Automated Red Team

    Raphael Mudge
    Fri, 12:00 - 12:50
    Track 5 / Penn & Teller
  • Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)

    Tom Perrine
    Sat, 10:00 - 10:50
    Track 4 / Turbo
  • Crypto and the Cops: the Law of Key Disclosure and Forced Decryption

    Marcia Hofmann
    Fri, 14:00 - 14:50
    Track 2
  • Cryptohaze Cloud Cracking

    Bitweasil
    Sat, 12:00 - 12:50
    Track 5 / Penn & Teller
  • Cyber Weapons, Castle Doctrine, and the Second Amendment

    Jonathan Claudius, Alexander Heid, Roamer, Rod Soto
    Sat, 17:00 - 17:50
    Skytalks
  • D
  • DC RECOGNIZE Awards

     
    Sun, 13:00 - 13:50
    Track 2
  • DDoS Black and White "Kungfu" Revealed

    Alan Chung, Anthony Lai, Tony Miu, Kelvin Wong
    Sat, 15:00 - 15:50
    Track 3
  • DEF CON 101

    AlxRogan, Flipper, HighWiz, Lockheed, LoST, Pyro, Roamer
    Thu, 13:00 - 13:50
    Track 1
  • DEF CON Comedy Jam V, V for Vendetta

    James Arlen, Rob Graham, Christofer Hoff, David Maynor, Rich Mogull, David Mortman, Larry Pesce
    Fri, 15:00 - 16:50
    Track 2
  • DEF CON Documentary Trailer

     
    Fri, 11:00 - 11:20
    Track 1
  • Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2

    Moxie Marlinspike
    Sat, 10:00 - 10:50
    Track 5 / Penn & Teller
  • Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network

    Svetlana Gaivoronski, Dennis Gamayunov
    Fri, 16:00 - 16:20
    Track 4 / Turbo
  • Detecting Reflective Injection

    Andrew King
    Fri, 15:00 - 15:50
    Track 5 / Penn & Teller
  • DivaShark - Monitor your Flow

    Robert Deaton
    Fri, 17:00 - 17:20
    Track 4 / Turbo
  • DIY Electric Car

    Dave Brown
    Sat, 12:00 - 12:50
    Track 1
  • Don't Stand So Close To Me: An Analysis of the NFC Attack Surface

    Charlie Miller
    Fri, 13:00 - 13:50
    Track 3
  • Drinking From the Caffeine Firehose We Know as Shodan

    Dan Tentler
    Fri, 14:30 - 14:50
    Track 4 / Turbo
  • Drones!

    Chris Anderson
    Fri, 14:00 - 14:50
    Track 1
  • Dr. Strangenerd: How I learned to collaborate and love the Maker Movement

    Mar, Matt Yoder
    Sun, 16:00 - 16:50
    Skytalks
  • E
  • Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole

    Ang Cui
    Fri, 10:00 - 10:20
    Track 4 / Turbo
  • Exchanging Demands

    Peter Hannay
    Sat, 15:00 - 15:50
    Track 4 / Turbo
  • Exploit Archaeology: Raiders of the Lost Payphones

    Josh Brashars
    Sat, 11:00 - 11:50
    Track 4 / Turbo
  • F
  • Following the Digital Footprints

    Allen Weiss
    Sun, 11:00 - 11:50
    Skytalks
  • Fun with Software Defined Radios

    Rick Farina, Jason N00bz, Jason Raj
    Sun, 09:00 - 09:50
    Skytalks
  • Fuzzing Online Games

    Elie Bursztein, Patrick Samy
    Sun, 14:00 - 14:50
    Track 2
  • <
  • <ghz or bust: DEF CON

    Atlas
    Sat, 14:00 - 14:50
    Track 1
  • G
  • Grepping the Gropers - Airport Security

    Crypt0s
    Sat, 12:00 - 12:50
    Skytalks
  • H
  • Hacker + Airplanes = No Good Can Come Of This

    Brad Haines
    Sat, 16:00 - 16:50
    Track 1
  • Hacking Humanity: Human Augmentation and You

    Christian Dameff, Jeff Tully
    Sat, 11:00 - 11:50
    Track 1
  • Hacking Measured Boot and UEFI

    Dan Griffin
    Sat, 14:00 - 14:50
    Track 3
  • Hacking [Redacted] Routers

    FX, Greg
    Sun, 13:00 - 13:50
    Track 4 / Turbo
  • Hacking the Google TV

    Tom Dwenger, Amir Etemadieh, CJ Heres, Dan Rosenberg
    Sun, 15:00 - 15:50
    Track 2
  • Hacking the hackers: How firm is your foundation?

    LoST
    Thu, 16:00 - 16:50
    Track 1
  • Hammer: Smashing Binary Formats Into Bits

    Dan Hirsch, Meredith L. Patterson
    Fri, 17:00 - 17:50
    Skytalks
  • Hardware Backdooring is Practical

    Jonathan Brossard
    Sat, 13:00 - 13:50
    Track 3
  • Hellaphone: Replacing the Java in Android

    John Floren
    Sat, 13:00 - 13:50
    Track 4 / Turbo
  • HF skiddies suck, don't be one, learn some basic python

    Terrence Gareau
    Thu, 15:00 - 15:50
    Track 1
  • How to Channel Your Inner Henry Rollins

    Alberto García Illera, Jayson E. Street
    Fri, 13:00 - 13:20
    Track 4 / Turbo
  • How to Hack All the Transport Networks of a Country

     
    Sun, 16:00 - 16:50
    Track 1
  • How to Hack VMware vCenter Server in 60 Seconds

    Alexander Minozhenko
    Fri, 15:30 - 15:50
    Track 4 / Turbo
  • I
  • Improving Web Vulnerability Scanning

    Dan Zulla
    Sun, 11:00 - 11:50
    Track 3
  • Interface Puncher

    Will Vandevanter
    Sat, 13:30 - 13:50
    Skytalks
  • Into the Droid: Gaining Access to Android User Data

    Thomas Cannon
    Sat, 12:00 - 12:50
    Track 4 / Turbo
  • Introducing the Smartphone Pentesting Framework

    Georgia Weidman
    Sun, 15:00 - 15:50
    Skytalks
  • Introduction to lockpicking and bypassing physical security

    Dr. Tran
    Thu, 17:00 - 17:50
    Track 5 / Penn & Teller
  • Intro to Digital Forensics: Tools & Tactics

    Robert Imhoff-Dousharm, Ripshy
    Thu, 11:00 - 11:50
    Track 1
  • J
  • Juice Jacking: Hacking the Defcon Attendee's Smartphones

    Robert Rowley
    Fri, 10:00 - 10:50
    Skytalks
  • Jukebox Jacking

    Antitree, JustBill
    Sun, 10:00 - 10:50
    Skytalks
  • K
  • Kevin Poulsen Answers Your Questions

    Kevin Poulsen
    Sun, 14:00 - 14:50
    Track 3
  • KinectasploitV2: Kinect Meets 20 Security Tools

    Jeff Bryner
    Sun, 11:00 - 11:50
    Track 2
  • L
  • Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement

    Greg Conti, Woody Hartzog, Lisa Shay
    Fri, 16:00 - 16:50
    Track 1
  • Looking Into The Eye Of The Meter

    Cutaway
    Sun, 12:00 - 12:50
    Track 1
  • M
  • Making Lockpicks the Legion303 Way

    Steve Pordon
    Fri, 15:00 - 15:50
    Skytalks
  • Making Sense of Static - New Tools for Hacking GPS

    Colin Beighley, Fergus Noble
    Fri, 10:00 - 10:50
    Track 3
  • Meet the EFF

    Peter Eckersley, Hanni Fakhoury, Eva Galperin, Marcia Hofmann, Kurt Opsahl, Trevor Timm
    Fri, 12:00 - 12:50
    Track 2
  • Meet the Feds 1 - Law Enforcement

    Leon Carroll, Jim Christy, Andy Fried, Jon Iadonisi, Rich Marshall, David McCallum, Justin Wykes
    Sat, 12:00 - 12:50
    Track 2
  • Meet the Feds 2 - Policy

    Rod Beckstrom, Jim Christy, Jerry Dixon, Robert E. Joyce, Mischel Kwon, Rich Marshall, Riley Repko, Marcus Sachs, Mark Weatherford, Dr. Linton Wells II
    Sat, 13:00 - 13:50
    Track 2
  • MegaUpload: Guilty or Not Guilty?

    Jennifer Granick, Jim Rennie
    Fri, 11:00 - 11:50
    Track 2
  • More Projects of Prototype This!

    Joe Grand, Zoz
    Sat, 13:00 - 13:50
    Track 1
  • N
  • Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors

    Dan Petro
    Fri, 15:00 - 15:20
    Track 4 / Turbo
  • New Techniques in SQLi Obfuscation: SQL never before used in SQLi

    Nick Galbreath
    Fri, 16:30 - 16:50
    Track 4 / Turbo
  • NFC Hacking: The Easy Way

    Eddie Lee
    Fri, 14:00 - 14:50
    Track 3
  • No More Hooks: Detection of Code Integrity Attacks

    Corey Kallenberg, Xeno Kovah
    Sun, 11:00 - 11:50
    Track 4 / Turbo
  • Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit

    Darkred
    Fri, 11:30 - 11:50
    Track 4 / Turbo
  • Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?

    Matthew Duggan
    Fri, 12:00 - 12:20
    Track 4 / Turbo
  • O
  • Off-Grid Communications with Android: Meshing the Mobile World

    Jeff Robble, Josh Thomas
    Sat, 14:00 - 14:50
    Track 4 / Turbo
  • OPFOR 4Ever

    Tim Maletic, Christopher E. Pogue
    Sun, 10:00 - 10:50
    Track 3
  • Overwriting the Exception Handling Cache PointerDwarf Oriented Programming

    Rodrigo Rubira Branco, Sergey Bratus, James Oakley
    Sat, 16:00 - 16:50
    Track 3
  • Owned in 60 Seconds: From Network Guest to Windows Domain Admin

    Zack Fasel
    Sun, 15:00 - 15:50
    Track 3
  • Owning Bad Guys {And Mafia} With Javascript Botnets

    Chema Alonso, Manu
    Sat, 11:00 - 11:50
    Track 3
  • Owning One to Rule Them All

    Dave DeSimone, David Kennedy
    Fri, 13:00 - 13:50
    Track 5 / Penn & Teller
  • Owning the Network: Adventures in Router Rootkits

    Michael Coppola
    Sun, 12:00 - 12:50
    Track 4 / Turbo
  • P
  • Panel: The Making of DEF CON 20

     
    Fri, 13:00 - 13:50
    Track 2
  • Passive Bluetooth Monitoring in Scapy

    Ryan Holeman
    Fri, 11:00 - 11:20
    Track 4 / Turbo
  • Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions

    Michael Baucom, Andrew Gavin, Charles Smith
    Fri, 16:00 - 16:50
    Track 5 / Penn & Teller
  • Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework

    egyp7
    Sun, 12:00 - 12:50
    Track 3
  • Prehack - How to create and/or prevent a backdoor during the design and development of a product

    Headless Chook, Shane Kemper
    Fri, 09:00 - 09:50
    Skytalks
  • Programming Weird Machines with ELF Metadata

    Sergey Bratus, Rebecca Shapiro
    Sat, 14:00 - 14:50
    Track 5 / Penn & Teller
  • PWN'D by SIGINT: Applied TEMPEST

    Random Devious, Phantomworks, Skunkworks
    Sun, 13:00 - 13:50
    Skytalks
  • Q
  • Q&A with the Men (and Women) in Black

    Priest
    Sat, 14:00 - 14:50
    Track 2
  • R
  • Robots: You're Doing It Wrong 2

    Katy Levinson
    Sun, 10:00 - 10:50
    Track 2
  • S
  • Safes and Containers: Insecurity Design Excellence

    Tobias Bluzmanis, Matt Fiddler, Marc Weber Tobias
    Fri, 17:00 - 17:50
    Track 3
  • SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor

    Wesley McGrew
    Sun, 11:00 - 11:50
    Track 1
  • Screw the planet, hack the job!

    AlxRogan, Lockheed, Roamer
    Thu, 14:00 - 14:50
    Track 1
  • Scylla: Because There's no Patch for Human Stupidity

    Carlos Alberto Rodriguez, Sergio Valderrama
    Fri, 14:00 - 14:20
    Track 4 / Turbo
  • Shared Values, Shared Responsibility

    General Keith B. Alexander
    Fri, 12:00 - 12:50
    Track 1
  • Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated

    Kevin Bankston, Matt Blaze, Jennifer Granick
    Fri, 10:00 - 10:50
    Track 2
  • SIGINT and Traffic Analysis for the Rest of Us

    Matt Blaze, Sandy Clark
    Sun, 10:00 - 10:50
    Track 1
  • Socialized Data: Using Social Media as a Cyber Mule

    Timothy Mullen
    Fri, 11:00 - 11:50
    Track 5 / Penn & Teller
  • Sploitego - Maltego's (Local) Partner in Crime

    Nadeem Douba
    Sun, 15:00 - 15:50
    Track 1
  • Spy vs Spy: Spying on Mobile Device Spyware

    Michael Robinson, Chris Taylor
    Sat, 16:00 - 16:50
    Track 4 / Turbo
  • SQL Injection to MIPS Overflows: Rooting SOHO Routers

    Zachary Cutlip
    Sun, 14:00 - 14:50
    Track 4 / Turbo
  • SQL ReInjector - Automated Exfiltrated Data Identification

    Andrea London, Jason A. Novak
    Sun, 16:00 - 16:50
    Track 4 / Turbo
  • Stamp Out Hash Corruption! Crack All The Things!

    Jonathan Claudius, Ryan Reynolds
    Sat, 11:00 - 11:50
    Track 5 / Penn & Teller
  • Stiltwalker, Round 2

    DC-949
    Fri, 16:00 - 16:50
    Skytalks
  • Subterfuge: The Automated Man-in-the-Middle Attack Framework

    Christopher Shields, Matthew Toussain
    Sun, 16:00 - 16:50
    Track 3
  • T
  • Taking Back Our Data - An Invitation To Discussion

    Mark Smith
    Fri, 18:00 - 18:50
    Skytalks
  • TBA-sky1

     
    Fri, 13:00 - 13:50
    Skytalks
  • TBA-sky2

    Timothy Mullen
    Fri, 14:00 - 14:50
    Skytalks
  • TBA-sky3

    Rob Bird, Luke McOmie
    Sat, 11:00 - 11:50
    Skytalks
  • Tenacious Diggity: Skinny Dippin' in a Sea of Bing

    Francis Brown, Rob Ragan
    Sun, 13:00 - 13:50
    Track 1
  • The Art of Cyberwar

    Kenneth Geers
    Fri, 13:00 - 13:50
    Track 1
  • The Art Of The Con

     
    Fri, 17:00 - 17:50
    Track 2
  • The Breach That Wasn't

    Sam Bowne
    Sat, 13:00 - 13:25
    Skytalks
  • The Cerebral Source Code

    Siviak
    Thu, 12:00 - 12:50
    Track 1
  • The Christopher Columbus Rule and DHS

    Mark Weatherford
    Fri, 10:00 - 10:50
    Track 5 / Penn & Teller
  • The Darknet of Things, Building Sensor Networks That Do Your Bidding

    Anch, Omega
    Sat, 17:00 - 17:50
    Track 4 / Turbo
  • The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet

    Andy Fried, Paul Vixie
    Sat, 17:00 - 17:50
    Track 3
  • The Devil is in the Details - Why the way you used to do Social Engineering Sucks

    Noah Beddome
    Sat, 09:00 - 09:50
    Skytalks
  • The End of the PSTN As You Know It

    William Borskey, Karl Feinauer, Jason Ostrom
    Sat, 13:00 - 13:50
    Track 5 / Penn & Teller
  • The Leverage of Language - Advanced Workflow Environment for Security Intelligence and Exposure Management

    Conrad Constantine
    Sun, 14:00 - 14:50
    Skytalks
  • The Open Cyber Challenge Platform

    Linda C. Butler
    Fri, 12:30 - 12:50
    Track 4 / Turbo
  • The Paparazzi Platform: Flexible, Open-Source, UAS Software and Hardware

    CIFO, Dotaero, Esden, Misterj
    Sun, 16:00 - 16:50
    Track 2
  • The Patsy Proxy - Getting Others To Do Your Dirty Work

    Dan Crowley, Jennifer Savage
    Sat, 10:00 - 10:50
    Skytalks
  • The Safety Dance - Wardriving the Public Safety Band

    Brad Antoniewicz, Robert Portvilet
    Sat, 15:00 - 15:50
    Track 1
  • Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future

    Richard Thieme
    Sat, 10:00 - 10:50
    Track 1
  • U
  • Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol

    Martin Gallo
    Sat, 15:00 - 15:50
    Track 5 / Penn & Teller
  • W
  • Weaponizing the Windows API with Metasploit’s Railgun

    David Maloney
    Sun, 13:00 - 13:50
    Track 3
  • We Have You by the Gadgets

    Toby Kohlenberg, Mickey Shkatov
    Sun, 10:00 - 10:50
    Track 4 / Turbo
  • Welcome & Making the DEF CON 20 Badge

     
    Fri, 10:00 - 10:50
    Track 1
  • Why You Should Not Get a CISSP

    Timmay
    Sat, 14:00 - 14:50
    Skytalks
  • World War 3.0: Chaos, Control & the Battle for the Net

    Rod Beckstrom, Joshua Corman, Michael Joseph Gross, Dan Kaminsky, Jeff Moss
    Sat, 10:00 - 10:50
    Track 2
  • Y
  • Your Network Sucks

    Anch
    Sun, 12:00 - 12:50
    Skytalks