DEF CON 101
Hacking Management: From Operations to Command
The Ninjaneers: Getting started in Building Your Own Robots for World Domination.
Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play
Intro to Web Application Hacking
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
The Secret Life of SIM Cards
DragonLady: An Investigation of SMS Fraud Operations in Russia
Offensive Forensics: CSI for the Bad Guy
Pwn'ing You(r) Cyber Offenders
MITM All The IPv6 Things
HTTP Time Bandit
How to use CSP to stop XSS
So You Think Your Domain Controller is Secure?
Getting The Goods With smbexec
Abusing NoSQL Databases
Examining the Bitsquatting Attack Surface
Please Insert^W Inject More Coins
Do-It-Yourself Cellular IDS
BoutiqueKit: Playing WarGames with expensive rootkits and malware
Android WebLogin: Google's Skeleton Key
Building an Android IDS on Network Level
Defeating SEAndroid
Doing Bad Things to 'Good' Security Appliances
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
Data Evaporation from SSDs
GoPro or GTFO: A Tale of Reversing an Embedded System
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
Reality Hackers
gitDigger: Creating useful wordlists from public GitHub repositories
Made Open: Hacking Capitalism
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
Combatting Mac OSX/iOS Malware with Data Visualization
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Transcending Cloud Limitations by Obtaining Inner Piece
Utilizing Popular Websites for Malicious Purposes Using RDI
Open Public Sensors, Trend Monitoring and Data Fusion
Collaborative Penetration Testing With Lair
PowerPwning: Post-Exploiting By Overpowering PowerShell
Evolving Exploits Through Genetic Algorithms