• Thursday, August 7
  • Data Protection 101 - Successes, Fails, and Fixes

    Peter Teoh
    Thu, 10:00 - 10:50
    DEF CON 101
  • Practical Foxhunting 101

    Adam Wirth
    Thu, 11:00 - 11:50
    DEF CON 101
  • RF Penetration Testing, Your Air Stinks

    John Fulmer
    Thu, 12:00 - 12:50
    DEF CON 101
  • AWS for Hackers

    Seth van Ommen
    Thu, 13:00 - 13:50
    DEF CON 101
  • Anatomy of a Pentest; Poppin' Boxes like a Pro

    PushPin
    Thu, 14:00 - 14:50
    DEF CON 101
  • Standing Up an Effective Penetration Testing Team

    Mike Petruzzi
    Thu, 15:00 - 15:50
    DEF CON 101
  • Reverse Engineering Mac Malware

    Sarah Edwards
    Thu, 16:00 - 16:50
    DEF CON 101
  • The Making of DEFCOIN

    Mike Guthrie, Jeff Thomas, Seth van Ommen
    Thu, 17:00 - 17:50
    DEF CON 101
  • Friday, August 8
  • Meddle: Framework for Piggy-back Fuzzing and Tool Development

    Geoff McDonald
    Fri, 10:00 - 10:50
    DEF CON 101
  • USB for all!

    Jesse Michael
    Fri, 11:00 - 11:50
    DEF CON 101
  • ShareEnum: We Wrapped Samba So You Don’t Have To

    Michael McAtee, Lucas Morris
    Fri, 12:00 - 12:50
    DEF CON 101
  • Investigating PowerShell Attacks

    Matt Hastings, Ryan Kazanciyan
    Fri, 13:00 - 13:50
    DEF CON 101
  • Client-Side HTTP Cookie Security: Attack and Defense

    David Wyde
    Fri, 14:00 - 14:50
    DEF CON 101
  • An Introduction to Back Dooring Operating Systems for Fun and Trolling

    Nemus
    Fri, 15:00 - 15:50
    DEF CON 101
  • Blinding The Surveillance State

    Christopher Soghoian
    Fri, 16:00 - 16:50
    DEF CON 101
  • Diversity in Information Security

    Sandy Clark, Jennifer Imhoff-Dousharm, Jolly, Scott Martin, Kristin Paget, Vyrus
    Fri, 17:00 - 17:50
    DEF CON 101
  • Saturday, August 9
  • Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!

    Carsten Eiram, Jake Kouns
    Sat, 10:00 - 10:50
    DEF CON 101
  • Bug Bounty Programs Evolution

    Nir Valtman
    Sat, 11:00 - 11:50
    DEF CON 101
  • How to Disclose an Exploit Without Getting in Trouble

    Tod Beardsley, James Denaro
    Sat, 12:00 - 12:50
    DEF CON 101
  • Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively

    Wesley McGrew
    Sat, 13:00 - 13:50
    DEF CON 101
  • The Monkey in the Middle: A pentesters guide to playing in traffic.

    Mike Guthrie
    Sat, 14:00 - 14:50
    DEF CON 101
  • Detecting Bluetooth Surveillance Systems

    Grant Bugher
    Sat, 15:00 - 15:50
    DEF CON 101
  • Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin

    Metacortex
    Sat, 16:00 - 16:50
    DEF CON 101
  • DEF CON the Mystery, Myth and Legend

     
    Sat, 17:00 - 17:50
    DEF CON 101
  • Sunday, August 10
  • Around the world in 80 cons - A Perspective

    Jayson E. Street
    Sun, 10:00 - 10:50
    DEF CON 101
  • You're Leaking Trade Secrets

    Michael Schrenk
    Sun, 11:00 - 11:50
    DEF CON 101
  • Dropping Docs on Darknets: How People Got Caught

    Adrian Crenshaw
    Sun, 12:00 - 12:50
    DEF CON 101
  • Home Alone with localhost: Automating Home Defense

    Chris Littlebury
    Sun, 13:00 - 13:50
    DEF CON 101
  • Android Hacker Protection Level 0

    Jon Sawyer, Tim Strazzere
    Sun, 14:00 - 14:50
    DEF CON 101
  • Is This Your Pipe? Hijacking the Build Pipeline.

    Greg Anderson, Kyle Kelley
    Sun, 15:00 - 15:50
    DEF CON 101