Abuse of Blind Automation in Security Tools
Abusing Software Defined Networks
Acquire current user hashes without admin privileges
Advanced Red Teaming: All Your Badges Are Belong To Us
A Journey to Protect Points-of-sale
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance
Anatomy of a Pentest; Poppin' Boxes like a Pro
Android Hacker Protection Level 0
An Introduction to Back Dooring Operating Systems for Fun and Trolling
Around the world in 80 cons - A Perspective
Ask the EFF: The Year in Digital Civil Liberties
A Survey of Remote Automotive Attack Surfaces
Attacking the Internet of Things using Time
AWS for Hackers
Bitcoin Barons
Blinding The Surveillance State
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer
Breaking MIFARE ULTRALIGHT... or how to get free rides and more
Bug Bounty Programs Evolution
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
Bypass firewalls, application white lists, secure remote desktops under 20 seconds
Catching Malware En Masse: DNS and IP Style
Check Your Fingerprints: Cloning the Strong Set
Civilianization of War - Paramilitarization of Cyberspace and Its Implications for Civilian Information Security Professionals
Client-Side HTTP Cookie Security: Attack and Defense
Contests Awards Ceremony
ContradictionC2: A Takedown-Resistant Botnet Based on Dead Drops
Custodiet - The Open Source MSSP Framework
Cyberhijacking Airplanes: Truth or Fiction?
Dark Mail
Data Protection 101 - Successes, Fails, and Fixes
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
DEF CON 101 - The Talk
DEF CON Closing Ceremonies
DEF CON Comedy Jam Part VII, Is This The One With The Whales?
DEF CON the Mystery, Myth and Legend
Detecting and Defending Against a Surveillance State
Detecting Bluetooth Surveillance Systems
Diversity in Information Security
Domain Name Problems and Solutions
Don't DDoS Me Bro: Practical DDoS Defense
Don't Fuck It Up!
Dropping Docs on Darknets: How People Got Caught
Elevator Hacking - From the Pit to the Penthouse
Empowering Hackers to Create a Positive Impact
Energy-efficient bcrypt cracking
Ephemeral Communications: Why and How?
Extreme Privilege Escalation On Windows 8/UEFI Systems
For a good time, call....
From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
From root to SPECIAL: Pwning IBM Mainframes
Generating ROP payloads from numbers
Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
Girl… Fault-Interrupted.
Hack All The Things: 20 Devices in 45 Minutes
Hacking 911: Adventures in Disruption, Destruction, and Death
Hacking the FBI: How & Why to Liberate Government Records
Hacking US (and UK, Australia, France, etc.) traffic control systems
Home Alone with localhost: Automating Home Defense
How to Disclose an Exploit Without Getting in Trouble
How To Get Phone Companies To Just Say No To Wiretapping
How To Make Money Fast Using A Pwned PBX
I am a legend: Hacking Hearthstone with machine learning
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Impostor — Polluting Tor Metadata
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
In the forest of knowledge with 1o57
Investigating PowerShell Attacks
Is This Your Pipe? Hijacking the Build Pipeline.
Just What The Doctor Ordered?
Keynote
Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>
Manna from Heaven: Improving the state of wireless rogue AP attacks
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
Mass Scanning the Internet: Tips, Tricks, Results
Measuring the IQ of your Threat Intelligence feeds
Meddle: Framework for Piggy-back Fuzzing and Tool Development
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
NSA Playset: DIY WAGONBED Hardware Implant over I2C
NSA Playset: GSM Sniffing
NSA Playset: PCIe
NSA Playset: RF Retroreflectors
Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations
Old Skewl Hacking: Porn Free!
One Man Shop: Building an effective security program all by yourself
Open Source Fairy Dust
Optical Surgery; Implanting a DropCam
Oracle Data Redaction is Broken
Paging SDR... Why should the NSA have all the fun?
Password Topology Histogram Wear-Leveling, aka PathWell
Penetrate your OWA
Playing with Car Firmware or How to Brick your Car
PoS Attacking the Traveling Salesman
Practical Aerial Hacking & Surveillance
Practical Foxhunting 101
PropLANE: Kind of keeping the NSA from watching you pee
Protecting SCADA From the Ground Up
Raspberry MoCA - A recipe for compromise
Reverse Engineering Mac Malware
RFIDler: SDR.RFID.FTW
RF Penetration Testing, Your Air Stinks
Saving Cyberspace by Reinventing File Sharing
Saving the Internet (for the Future)
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
Secure Random By Default
Security's in your DNA: Using Genomics & Big Data for Security
Security with Anch: Another Talk, Another Drink.
SHA1 backdooring and exploitation
ShareEnum: We Wrapped Samba So You Don’t Have To
Shellcodes for ARM: Your Pills Don't Work on Me, x86
SQL-Gestalt: A MS-SQL Rootkit Framework
Standing Up an Effective Penetration Testing Team
Steganography in Commonly Used HF Radio Protocols
Stolen Data Markets: An Economic and Organizational Assessment
Summary of Attacks Against BIOS and Secure Boot
Surveillance on the Silver Screen- Fact or Fiction?
The Cavalry Year[0] & a Path Forward for Public Safety
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right
The Making of DEFCOIN
The Monkey in the Middle: A pentesters guide to playing in traffic.
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
The Open Crypto Audit Project
The Secret Life of Krbtgt
Through the Looking-Glass, and What Eve Found There
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
Trojan banker turned DDoS - The bug that brought a Bank down
USB for all!
Veil-Pillage: Post-exploitation 2.0
VoIP Wars: Attack of the Cisco Phones
Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Welcome & Making of the DEF CON Badge
What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)
Why Don’t You Just Tell Me Where The ROP Isn’t Supposed To Go
Y3t1's mobile uberpwn drop unit -- or how I learned to love the tab
You Are Not A Soldier, and This Is Not A War
You're Leaking Trade Secrets