Prehack - How to create and/or prevent a backdoor during the design and development of a product
The Christopher Columbus Rule and DHS
Welcome & Making the DEF CON 20 Badge
Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated
Making Sense of Static - New Tools for Hacking GPS
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
Juice Jacking: Hacking the Defcon Attendee's Smartphones
APK File Infection on an Android System
Socialized Data: Using Social Media as a Cyber Mule
DEF CON Documentary Trailer
MegaUpload: Guilty or Not Guilty?
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
Passive Bluetooth Monitoring in Scapy
2005 Called - They want their Lotus Notes password hashes back
Before, During, and After
Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
Cortana: Rise of the Automated Red Team
Shared Values, Shared Responsibility
Meet the EFF
Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?
Appearance Hacking 101: The Art of Everyday Camouflage
The Open Cyber Challenge Platform
Owning One to Rule Them All
The Art of Cyberwar
Panel: The Making of DEF CON 20
Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
How to Channel Your Inner Henry Rollins
TBA-sky1
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary
Drones!
Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
NFC Hacking: The Easy Way
Scylla: Because There's no Patch for Human Stupidity
TBA-sky2
Drinking From the Caffeine Firehose We Know as Shodan
Detecting Reflective Injection
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets
DEF CON Comedy Jam V, V for Vendetta
Attacking TPM Part 2: A Look at the ST19WP18 TPM Device
Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
Making Lockpicks the Legion303 Way
How to Hack VMware vCenter Server in 60 Seconds
Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions
Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement
Bypassing Endpoint Security for $20 or Less
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
Stiltwalker, Round 2
New Techniques in SQLi Obfuscation: SQL never before used in SQLi
Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations
The Art Of The Con
Safes and Containers: Insecurity Design Excellence
DivaShark - Monitor your Flow
Hammer: Smashing Binary Formats Into Bits
Blind XSS
Movie Night With The Dark Tangent: "21" + Q&A With "MIT Mike" Aponte
Taking Back Our Data - An Invitation To Discussion
Movie night with The Dark Tangent: "Code2600" + Q&A with the Director