Welcome to DEF CON
Fighting Back in the War on General Purpose Computers
USB Attack to Decrypt Wi-Fi Communications
Red vs. Blue: Modern Active Directory Attacks & Defense
Remote Access, the APT
REvisiting RE:DoS
When the Secretary of State says: “Please Stop Hacking Us…”
Put on your tinfo_t hat if you're my type
NetRipper - Smart traffic sniffing for penetration testers
Hooked Browser Meshed-Networks with WebRTC and BeEF
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
'DLL Hijacking' on OS X? #@%& Yeah!
I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
Investigating the Practicality and Cost of Abusing Memory Errors with DNS
802.11 Massive Monitoring
DEF CON Comedy Inception: How many levels deep can we go?
How to Hack Government: Technologists as Policy Makers
REpsych: Psychological Warfare in Reverse Engineering
Stick That In Your (root)Pipe & Smoke It
"Quantum" Classification of Malware
Advances in Linux Process Forensics Using ECFS