13:00 |
Chéron,
HighWiz,
Kushner,
Miss Jackalope,
Moss,
Noid,
Ollam,
Russr,
Siviak,
Thorn
|
DEF CON 101 |
Kiamilev,
Murray
|
Effective Information Security Career Planning |
|
Bryan,
McGee
|
Hardware Black Magic - Building devices with FPGAs |
|
Bryan
|
Hacking with GNURadio |
|
Estis
|
Pre-Con Introduction to Lock Picking |
|
15:00 |
DeGulielmo,
Robbins
|
Hacking the Apple TV and Where your Forensic Data Lives |
16:00 |
Krick
|
Con Kung-Fu: Defending Yourself @ DEF CON |
Addict
|
DCFluX in: The Man with the Soldering Gun |
|
Lockheed
|
DEF CON 1 - A Personal Account |
|
Rennie
|
DC Network Session |
|
16:30 |
Lentz
|
So You Got Arrested in Vegas... |
10:00 |
Liverani,
Moss
|
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge |
Hering
|
Perspective of the DoD Chief Security Officer |
|
Beckstrom,
jhind,
Lineberry
|
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices |
|
Gavas
|
Beckstrom's Law - A Model for Valuing Networks and Security |
|
Granick
|
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence,
Geometry and Malicious Traffic |
|
11:00 |
Merrill
|
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less |
Jordan,
Marks
|
Jailbreaking and the Law of Reversing |
|
Rehrig
|
Is That You, Baby, or Just a Bridge in the Sky? |
|
Aiello
|
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly |
|
11:30 | Q & A with Bruce Schneier |
|
Adair,
Davidoff,
Richard
|
Hacking the Wiimote and Wii Fit to Help the Disabled |
|
12:00 | TBA |
|
Flick,
Yestrumskas
|
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability |
|
Marlinspike
|
Death of Anonymous Travel |
|
Psifertex,
Schlesinger
|
Cross Site Scripting Anonymous Browser 2.0 |
|
12:30 |
Wilhelm
|
More Tricks For Defeating SSL |
Digividual
|
Cloud Security in Map/Reduce |
|
13:00 |
Rose
|
Maximum CTF: Getting the Most Out of Capture the Flag |
Mooney
|
Hacking WITH the iPod Touch |
|
Luedke
|
Socially Owned in the Cloud |
|
13:30 |
Marks
|
The Year In Computer Crime Cases |
Ostrom
|
Deblaze - A Remote Method Enumeration Tool for Flex Servers |
|
14:00 |
Mortman,
Sambamoorthy
|
Subverting the World Of Warcraft API |
Mogull
|
Advancing Video Application Attacks with Video Interception, Recording, and Replay |
|
Dixon,
Hansen,
Ligh,
Maynor,
Pesce,
Richard
|
Defcon Security Jam 2: The Fails Keep on Coming |
|
Dzulfakar
|
Attacking SMS. It's No Longer Your BFF |
|
14:30 |
Clark,
Scott
|
Making Fun of Your Malware |
Vedaa
|
Advanced MySQL Exploitation |
|
15:00 |
Anonymous
|
That Awesome Time I Was Sued For Two Billion Dollars |
Quist
|
Computer and Internet Security Law - A Year in Review 2008 - 2009 |
|
Liebrock,
Long
|
Proxy Prank-o-Matic |
|
15:30 |
Dingledine,
Opsahl
|
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization |
Estis
|
Session Donation |
|
16:00 |
Bankston
|
three point Oh. |
von Lohmann
|
Why Tor is Slow, and What We're Doing About It |
|
Eckersley,
Hofmann,
Ilyas,
Jordan,
Marks,
Percoco
|
Ask EFF: The Year in Digital Civil Liberties |
|
Brooks
|
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam |
|
16:30 |
Aslanian,
Raygoza
|
Malware Freak Show |
17:00 |
Potter,
Zusman
|
BitTorrent Hacks |
Lodge
|
Automated Malware Similarity Analysis |
|
17:30 |
Renda
|
Criminal Charges are not pursued: Hacking PKI |
Christy,
Fleischer
|
Fragging Game Servers |
|
Convertino
|
Injecting Electromagnetic Pulses into Digital Devices |
|
18:00 |
Dixon
|
Attacking Tor at the Application Layer |
Appelbaum,
Fried,
Garcia,
Garris,
Gavas,
Goodspeed,
Grundy,
Hering,
Hopper,
Idonisi,
Kaminsky,
Kwon,
Manson,
Marshall,
Privette,
Thieme,
Turgeon,
Turner,
Wells
|
Meet the Feds 2009 |
|
18:30 |
Tarnovsky
|
Something about Network Security |
Gates
|
Locally Exploiting Wireless Sensors |
|
Ceballos
|
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything |
10:00 |
Liverani,
Moyer,
Schearer
|
"Smart" Parking Meter Implementations, Globalism, and You(aka Meter Maids Eat Their Young) |
Budd,
Hamiel
|
Breaking the "Unbreakable" Oracle with Metasploit |
|
Chéron,
Gademer
|
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival |
|
Bailey,
McRee
|
Weaponizing the Web: New Attacks on User-generated Content |
|
Crowley,
Kunkel
|
Old Skool Brought Back: A 1964 Modem Demo |
|
11:00 |
Dunker,
Torres
|
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera |
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit |
||
Boyce,
Rook
|
CSRF: Yeah, It Still Works |
|
Savage
|
Air Traffic Control: Insecurity and ADS-B |
|
12:00 |
Holt
|
RFID MythBusting |
Johnson
|
Metasploit Goes Web |
|
Searle
|
Personal Survival Preparedness |
|
DiMaggio
|
The security risks of Web 2.0 |
|
Ollam
|
Packing and the Friendly Skies |
|
12:30 |
Grand
|
Design and Implementation of a Quantum True Random Number Generator |
13:00 |
Zoz
|
Failure |
Smith
|
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community |
|
Ames,
Ho,
Kerb
|
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers |
|
Lockheed
|
Unfair Use - Speculations on the Future of Piracy |
|
14:00 |
Liverani
|
The Projects of "Prototype This!" |
Prabhu,
Song,
Stolfo
|
MetaPhish |
|
Waite
|
FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers) |
|
Bowne,
TK234
|
Abusing Firefox Addons |
|
I)ruid,
Lawshae,
Siddharth
|
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode |
|
14:30 |
Calca,
Day
|
Hardware Trojans: Infiltrating the Faraday Cage |
15:00 |
Anguiano
|
PLA Information Warfare Development Timeline and Nodal Analysis |
Anonymous
|
Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training |
|
Kershaw
|
The Making of the second SQL injection Worm |
|
15:30 |
Spill
|
Picking Electronic Locks Using TCP Sequence Prediction |
Ossmann
|
MSF Telephony |
|
Steward
|
Hacking the Smart Grid |
|
16:00 | Sniff Keystrokes With Lasers/Voltmeters |
|
Meer,
Street
|
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework |
|
Slaviero
|
Manipulation and Abuse of the Consumer Credit Reporting Agencies |
|
16:10 | Metasploit Evolved |
|
Meterpreter Advances |
||
16:30 |
Gates
|
An Open JTAG Debugger |
16:50 |
Arvanitis
|
MSF Wifi |
17:00 |
FX,
Maynor,
Zaborowski
|
Bluetooth, Smells Like Chicken |
Alperovitch
|
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" |
|
Sachs,
Schneck,
Skoudis
|
Clobbering the Cloud |
|
17:30 |
Beale
|
App Assessment the Metasploit Way |
Dai Zovi
|
Doppelganger: The Web's Evil Twin |
|
18:00 |
Eriksson
|
Router Exploitation |
Bitton,
Davis,
Kotler,
Silberman
|
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World |
|
Endgrain,
Kerb
|
The Middler 2.0: It's Not Just for Web Apps Anymore |
|
Luedke
|
Sharepoint 2007 Knowledge Network Exposed |
|
18:10 |
Rad
|
Macsploitation with Metasploit |
18:30 |
Metula
|
Runtime Kernel Patching on Mac OS X |
18:50 |
Amit,
McCray
|
Metasploit Autopsy: Recontructing the Crime Scene |
19:00 |
Latrope,
Ne0nRa1n
|
The Day of the Updates |
09:00 | Skytalks |
|
10:00 |
Biddulph,
Harbour,
Tarnovsky
|
Hello, My Name is /hostname/ |
Ceballos
|
Hacking, Biohacking, and the Future of Humanity |
|
Tobias
|
Managed Code Rootkits - Hooking into Runtime Environments |
|
Fiddler
|
Down the Rabbit Hole: Uncovering a Criminal Server |
|
Bluzmanis
|
Advanced SQL Injection |
|
World of Warcraft Subversion |
||
11:00 |
Pollet
|
eXercise in Messaging and Presence Pwnage |
Kibler,
Louthan
|
Hacking Sleep: How to Build Your Very Own Sleep Lab |
|
Cooper
|
Win at Reversing: Tracing and Sandboxing through Inline Hooking |
|
Davis,
etd,
Hughes
|
Invisible Access: Electronic Access Control, Audit Trails and "High Security" |
|
Ahmad,
Dhyani
|
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor |
|
11:30 |
Joaquin,
Pitchford
|
Hack The Textbook |
12:00 |
Miller,
Richard
|
Unmasking You |
Alonso
|
Good Vibrations: Hacking Motion Sickness on the Cheap |
|
Dradis Framework - Sharing Information will get you Root |
||
Finol
|
Who Invented the Proximity Card? |
|
Beave,
JFalcon
|
Wi-Fish Finder: Who Will Bite the Bait |
|
12:30 |
Neulist
|
Attacks Against 2wire Residential Gateways |
13:00 |
Reguly
|
Search And Seizure Explained - They Took My Laptop! |
Harbour,
Schrenk
|
Your Mind: Legal Status, Rights and Securing Yourself |
|
Moulton,
Ray
|
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data |
|
Beth
|
Lockpicking Forensics |
|
Farr
|
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security |
|
13:30 |
Clement,
Honeywell
|
AAPL- Automated Analog Telephone Logging |
14:00 |
Cough
|
Hackerspaces: The Legal Bases |
Kiamilev,
Talabis
|
Slight of Mind: Magic and Social Engineering |
|
Rucci
|
Screen Scraper Tricks: Extracting Data from Difficult Websites |
|
Vega
|
RAID Recovery: Recover your PORN by Sight and Sound |
|
Goldy
|
30k Feet Look at WiFi |
|
15:00 |
Aggarwal,
Eston,
Pierce,
Siviak,
Weir
|
Robot Shark Laser! What Hackerspaces Do |
Gutmann
|
Confidence Game Theater |
|
Clark
|
Dangerous Minds: The Art of Guerrilla Data Mining |
|
Blaze
|
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization) |
|
Hardy
|
USB Attacks: Fun with Plug & 0wn |
|
16:00 |
Guerra,
McGovern
|
Introduction to WiMAX Hacking |
Ames,
Farina
|
Social Zombies: Your Friends Want to Eat Your Brains |
|
Daniel
|
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High… |
|
Sangster
|
The Psychology of Security Unusability |
|
Ragsdale
|
De Gustibus, or Hacking your Tastebuds |
|
17:00 | Closing Ceremonies hosted by The Dark Tangent |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.