The Devil is in the Details - Why the way you used to do Social Engineering Sucks
Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2
Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future
World War 3.0: Chaos, Control & the Battle for the Net
Beyond the War on General Purpose Computing: What's Inside the Box?
Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)
The Patsy Proxy - Getting Others To Do Your Dirty Work
Stamp Out Hash Corruption! Crack All The Things!
Hacking Humanity: Human Augmentation and You
Bruce Schneier Answers Your Questions
Owning Bad Guys {And Mafia} With Javascript Botnets
Exploit Archaeology: Raiders of the Lost Payphones
TBA-sky3
Cryptohaze Cloud Cracking
DIY Electric Car
Meet the Feds 1 - Law Enforcement
Botnets Die Hard - Owned and Operated
Into the Droid: Gaining Access to Android User Data
Grepping the Gropers - Airport Security
The End of the PSTN As You Know It
More Projects of Prototype This!
Meet the Feds 2 - Policy
Hardware Backdooring is Practical
Hellaphone: Replacing the Java in Android
The Breach That Wasn't
Interface Puncher
Programming Weird Machines with ELF Metadata
<ghz or bust: DEF CON
Q&A with the Men (and Women) in Black
Hacking Measured Boot and UEFI
Off-Grid Communications with Android: Meshing the Mobile World
Why You Should Not Get a CISSP
Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol
The Safety Dance - Wardriving the Public Safety Band
Bigger Monster, Weaker Chains: The National Security Agency and the Constitution
DDoS Black and White "Kungfu" Revealed
Exchanging Demands
Builders vs. Breakers
Black Ops
Hacker + Airplanes = No Good Can Come Of This
Connected Chaos: Evolving the DCG/Hackspace Communication Landscape
Overwriting the Exception Handling Cache PointerDwarf Oriented Programming
Spy vs Spy: Spying on Mobile Device Spyware
Bureaucratic Denial of Service
Busting the BARR: Tracking “Untrackable” Private Aircraft for Fun & Profit
Anonymous and the Online Fight for Justice
The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet
The Darknet of Things, Building Sensor Networks That Do Your Bidding
Cyber Weapons, Castle Doctrine, and the Second Amendment
Movie Night With The Dark Tangent: "Reboot" + Q&A With the Filmmakers and Actors
Movie Night with The Dark Tangent: "We Are Legion: The Story of the Hacktivists"