Introduction to SDR and the Wireless Village
Hackers Hiring Hackers - How to Do Things Better
DEF CON 101: The Panel.
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
Dark side of the ELF - leveraging dynamic loading to pwn noobs
Medical Devices: Pwnage and Honeypots
NSM 101 for ICS
Crypto for Hackers
Bruce Schneier Q&A
Applied Intelligence: Using Information That's Not There
Hacking SQL Injection for Remote Code Execution on a LAMP stack
Chellam – a Wi-Fi IDS/Firewall for Windows
LTE Recon and Tracking with RTLSDR
Detecting Randomly Generated Strings; A Language Based Approach
I Am Packer And So Can You
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
A Hacker’s Guide to Risk
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
Are We Really Safe? - Bypassing Access Control Systems
It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence
Abusing XSLT for Practical Attacks
Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers
How to Shot Web: Web and mobile hacking in 2015
The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic
Game of Hacks: Play, Hack & Track
Linux Containers: Future or Fantasy?
Abusing native Shims for Post Exploitation
Ubiquity Forensics - Your iCloud and You
Hijacking Arbitrary .NET Application Control Flow
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
Contest Closing Ceremonies