• Thursday, July 27
  • Social Engineering The News

    Michael Schrenk
    Thu, 00:00 - 00:45
    101 Track
  • Uncovering useful and embarrassing info with Maltego

    Andrew MacPherson
    Thu, 00:00 - 00:45
    101 Track
  • There's no place like 127.0.0.1 - Achieving reliable DNS rebinding in modern browsers

    Luke Young
    Thu, 10:00 - 10:45
    101 Track
  • From Box to Backdoor: Using Old School Tools and Techniques to Discover Backdoors in Modern Devices

    Patrick DeSantis
    Thu, 11:00 - 11:45
    101 Track
  • Porosity: A Decompiler For Blockchain-Based Smart Contracts Bytecode

    Matthieu Suiche
    Thu, 12:00 - 12:45
    101 Track
  • Amateur Digital Archeology

    Matt Joyce
    Thu, 13:00 - 13:45
    101 Track
  • Hacking the Cloud

    Sean Metcalf, Gerald Steere
    Thu, 14:00 - 14:45
    101 Track
  • Inside the "Meet Desai" Attack: Defending Distributed Targets from Distributed Attacks

    Trey Forgety
    Thu, 15:00 - 15:45
    101 Track
  • DEF CON 101 Panel

    HighWiz, Niki7a, Roamer, Shaggy, Malware Unicorn, Wiseacre
    Thu, 16:00 - 17:45
    101 Track
  • Friday, July 28
  • macOS/iOS Kernel Debugging and Heap Feng Shui

    Min Zheng
    Fri, 10:00 - 10:20
    101 Track
  • Offensive Malware Analysis: Dissecting OSX/FruitFly via a Custom C&C Server

    Patrick Wardle
    Fri, 10:20 - 10:40
    101 Track
  • Rage Against the Weaponized AI Propaganda Machine

    Chris Sumner
    Fri, 11:00 - 11:45
    101 Track
  • CITL and the Digital Standard - A Year Later

    Sarah Zatko
    Fri, 12:00 - 12:45
    101 Track
  • Controlling IoT devices with crafted radio signals

    Caleb Madrigal
    Fri, 13:00 - 13:45
    101 Track
  • Using GPS Spoofing to control time

    David Robinson
    Fri, 14:00 - 14:45
    101 Track
  • Assembly Language is Too High Level

    XlogicX
    Fri, 15:00 - 15:45
    101 Track
  • Radio Exploitation 101: Characterizing, Contextualizing, and Applying Wireless Attack Methods

    Matt Knight, Marc Newlin
    Fri, 16:00 - 16:45
    101 Track
  • Cisco Catalyst Exploitation

    Artem Kondratenko
    Fri, 17:00 - 17:45
    101 Track
  • Saturday, July 29
  • Persisting with Microsoft Office: Abusing Extensibility Options

    William Knowles
    Sat, 10:00 - 10:20
    101 Track
  • Breaking Wind: Adventures in Hacking Wind Farm Control Networks

    Jason Staggs
    Sat, 10:20 - 10:40
    101 Track
  • Microservices and FaaS for Offensive Security

    Ryan Baxendale
    Sat, 11:00 - 11:20
    101 Track
  • Abusing Webhooks for Command and Control

    Dimitry Snezhkov
    Sat, 11:20 - 11:40
    101 Track
  • Driving down the rabbit hole

    Oleksandr Bazhaniuk, Jesse Michael, Mickey Shkatov
    Sat, 12:00 - 12:45
    101 Track
  • Demystifying Windows Kernel Exploitation by Abusing GDI Objects.

    Saif El-Sherei
    Sat, 13:00 - 13:45
    101 Track
  • Attacking Autonomic Networks

    Omar Eissa
    Sat, 14:00 - 14:45
    101 Track
  • MS Just Gave the Blue Team Tactical Nukes (And How Red Teams Need To Adapt)

    Chris Thompson
    Sat, 15:00 - 15:45
    101 Track
  • Dealing the perfect hand - Shuffling memory blocks on z/OS

    Ayoul3
    Sat, 16:00 - 16:45
    101 Track
  • Here to stay: Gaining persistency by abusing advanced authentication mechanisms

    Igal Gofman, Marina Simakov
    Sat, 17:00 - 17:45
    101 Track
  • Sunday, July 30
  • Unboxing Android: Everything you wanted to know about Android packers

    Avi Bashan, Slava Makkaveev
    Sun, 10:00 - 10:45
    101 Track
  • Total Recall: Implanting Passwords in Cognitive Memory

    Tess Schrodinger
    Sun, 11:00 - 11:45
    101 Track
  • The Black Art of Wireless Post Exploitation

    Gabriel Ryan
    Sun, 12:00 - 12:45
    101 Track
  • Game of Chromes: Owning the Web with Zombie Chrome Extensions

    Tomer Cohen
    Sun, 13:00 - 13:45
    101 Track
  • Call the plumber - you have a leak in your (named) pipe

    Gil Cohen
    Sun, 14:00 - 14:45
    101 Track
  • 25 Years of Program Analysis

    Yan Shoshitaishvili
    Sun, 15:00 - 15:45
    101 Track