DEF CON 20 - Thursday, July 26
10:00
DaKahuna
Breaking Wireless Encryption Keys
11:00
Imhoff, Ripshy
Intro to Digital Forensics: Tools & Tactics
12:00
Siviak
The Cerebral Source Code
13:00
AlxRogan, Flipper, HighWiz, Lockheed, LoST, Pyro, Roamer
DEF CON 101
14:00
AlxRogan, Lockheed, Roamer
Screw the planet, hack the job!
15:00
Gareau
HF skiddies suck, don't be one, learn some basic python
16:00
LoST
Hacking the hackers: How firm is your foundation?
17:00
Dr. Tran
Introduction to lockpicking and bypassing physical security
DEF CON 20 - Friday, July 27
09:00
Chook, Kemper
Prehack - How to create and/or prevent a backdoor during the design and development of a product
10:00
Weatherford
The Christopher Columbus Rule and DHS
Welcome & Making the DEF CON 20 Badge
Bankston, Blaze, Granick
Should the Wall of Sheep Be Illegal? A Debate Over Whether and How Open WiFi Sniffing Should Be Regulated
Beighley, Noble
Making Sense of Static - New Tools for Hacking GPS
Cui
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
Rowley
Juice Jacking: Hacking the Defcon Attendee's Smartphones
10:30
Pan
APK File Infection on an Android System
11:00
Mullen
Socialized Data: Using Social Media as a Cyber Mule
DEF CON Documentary Trailer
Granick, Rennie
MegaUpload: Guilty or Not Guilty?
Crump, Kohlenberg, Soghoian, Soltani, Wizner
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
Holeman
Passive Bluetooth Monitoring in Scapy
Dawson
2005 Called - They want their Lotus Notes password hashes back
11:20
Addict, Thackeray
Before, During, and After
11:30
Darkred
Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
12:00
Mudge
Cortana: Rise of the Automated Red Team
Alexander
Shared Values, Shared Responsibility
Eckersley, Fakhoury, Galperin, Hofmann, Opsahl, Timm
Meet the EFF
Duggan
Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?
Thomas
Appearance Hacking 101: The Art of Everyday Camouflage
12:30
Butler
The Open Cyber Challenge Platform
13:00
DeSimone, Kennedy
Owning One to Rule Them All
Geers
The Art of Cyberwar
Panel: The Making of DEF CON 20
Miller
Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
Illera, Street
How to Channel Your Inner Henry Rollins
TBA-sky1
13:30
Conley
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
14:00
Henry
Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary
Anderson
Drones!
Hofmann
Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
Lee
NFC Hacking: The Easy Way
Rodriguez, Valderrama
Scylla: Because There's no Patch for Human Stupidity
Mullen
TBA-sky2
14:30
Tentler
Drinking From the Caffeine Firehose We Know as Shodan
15:00
King
Detecting Reflective Injection
Kirk
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets
Arlen, Graham, Hoff, Maynor, Mogull, Mortman, Pesce
DEF CON Comedy Jam V, V for Vendetta
Tarnovsky
Attacking TPM Part 2: A Look at the ST19WP18 TPM Device
Petro
Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
Pordon
Making Lockpicks the Legion303 Way
15:30
Minozhenko
How to Hack VMware vCenter Server in 60 Seconds
16:00
Baucom, Gavin, Smith
Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions
Conti, Hartzog, Shay
Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement
Polstra
Bypassing Endpoint Security for $20 or Less
Gaivoronski, Gamayunov
Demorpheus: Getting Rid Of Polymorphic Shellcodes In Your Network
DC-949
Stiltwalker, Round 2
16:30
Galbreath
New Techniques in SQLi Obfuscation: SQL never before used in SQLi
17:00
Perklin
Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations
The Art Of The Con
Bluzmanis, Fiddler, Tobias
Safes and Containers: Insecurity Design Excellence
Deaton
DivaShark - Monitor your Flow
Hirsch, Patterson
Hammer: Smashing Binary Formats Into Bits
17:30
Baldwin
Blind XSS
18:00
Smith
Taking Back Our Data - An Invitation To Discussion
DEF CON 20 - Saturday, July 28
09:00
Beddome
The Devil is in the Details - Why the way you used to do Social Engineering Sucks
10:00
Marlinspike
Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2
Thieme
Twenty Years Back, Twenty Years Ahead: The Arc of DEF CON Past and Future
Beckstrom, Corman, Gross, Kaminsky, Moss
World War 3.0: Chaos, Control & the Battle for the Net
Doctorow
Beyond the War on General Purpose Computing: What's Inside the Box?
Perrine
Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)
Crowley, Savage
The Patsy Proxy - Getting Others To Do Your Dirty Work
11:00
Claudius, Reynolds
Stamp Out Hash Corruption! Crack All The Things!
Dameff, Tully
Hacking Humanity: Human Augmentation and You
Schneier
Bruce Schneier Answers Your Questions
Alonso, Manu
Owning Bad Guys {And Mafia} With Javascript Botnets
Brashars
Exploit Archaeology: Raiders of the Lost Payphones
Bird, McOmie
TBA-sky3
12:00
Bitweasil
Cryptohaze Cloud Cracking
Brown
DIY Electric Car
Carroll, Christy, Fried, Iadonisi, Marshall, McCallum, Wykes
Meet the Feds 1 - Law Enforcement
Enbody, Sood
Botnets Die Hard - Owned and Operated
Cannon
Into the Droid: Gaining Access to Android User Data
Crypt0s
Grepping the Gropers - Airport Security
13:00
Borskey, Feinauer, Ostrom
The End of the PSTN As You Know It
Grand, Zoz
More Projects of Prototype This!
Beckstrom, Christy, Dixon, Joyce, Kwon, Marshall, Repko, Sachs, Weatherford, Wells
Meet the Feds 2 - Policy
Brossard
Hardware Backdooring is Practical
Floren
Hellaphone: Replacing the Java in Android
Bowne
The Breach That Wasn't
13:30
Vandevanter
Interface Puncher
14:00
Bratus, Shapiro
Programming Weird Machines with ELF Metadata
Atlas
<ghz or bust: DEF CON
Priest
Q&A with the Men (and Women) in Black
Griffin
Hacking Measured Boot and UEFI
Robble, Thomas
Off-Grid Communications with Android: Meshing the Mobile World
Timmay
Why You Should Not Get a CISSP
15:00
Gallo
Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol
Antoniewicz, Portvilet
The Safety Dance - Wardriving the Public Safety Band
Abdo, Bamford, Binney, Jaffer
Bigger Monster, Weaker Chains: The National Security Agency and the Constitution
Chung, Lai, Miu, Wong
DDoS Black and White "Kungfu" Revealed
Hannay
Exchanging Demands
Claudius, Konda
Builders vs. Breakers
16:00
Kaminsky
Black Ops
Haines
Hacker + Airplanes = No Good Can Come Of This
Anarchy Angel, blakdayz, Farr, Marcus
Connected Chaos: Evolving the DCG/Hackspace Communication Landscape
Branco, Bratus, Oakley
Overwriting the Exception Handling Cache PointerDwarf Oriented Programming
Robinson, Taylor
Spy vs Spy: Spying on Mobile Device Spyware
Alonso, Delgado
Bureaucratic Denial of Service
17:00
Hoffman, Rezchikov
Busting the BARR: Tracking “Untrackable” Private Aircraft for Fun & Profit
Coleman, Haefer, Hofmann, Leiderman, Lyon, O'Neill
Anonymous and the Online Fight for Justice
Fried, Vixie
The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet
Anch, Omega
The Darknet of Things, Building Sensor Networks That Do Your Bidding
Claudius, Heid, Roamer, Soto
Cyber Weapons, Castle Doctrine, and the Second Amendment
DEF CON 20 - Sunday, July 29
09:00
Farina, N00bz, Raj
Fun with Software Defined Radios
10:00
Blaze, Clark
SIGINT and Traffic Analysis for the Rest of Us
Levinson
Robots: You're Doing It Wrong 2
Maletic, Pogue
OPFOR 4Ever
Kohlenberg, Shkatov
We Have You by the Gadgets
Antitree, JustBill
Jukebox Jacking
11:00
McGrew
SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor
Bryner
KinectasploitV2: Kinect Meets 20 Security Tools
Zulla
Improving Web Vulnerability Scanning
Kallenberg, Kovah
No More Hooks: Detection of Code Integrity Attacks
Weiss
Following the Digital Footprints
12:00
Cutaway
Looking Into The Eye Of The Meter
Percoco, Schulte
Adventures in Bouncerland
egyp7
Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework
Coppola
Owning the Network: Adventures in Router Rootkits
Anch
Your Network Sucks
13:00
Brown, Ragan
Tenacious Diggity: Skinny Dippin' in a Sea of Bing
DC RECOGNIZE Awards
Maloney
Weaponizing the Windows API with Metasploit’s Railgun
FX, Greg
Hacking [Redacted] Routers
Devious, Phantomworks, Skunkworks
PWN'D by SIGINT: Applied TEMPEST
14:00
Sumner, Wald
Can Twitter Really Help Expose Psychopath Killers' Traits?
Bursztein, Samy
Fuzzing Online Games
Poulsen
Kevin Poulsen Answers Your Questions
Cutlip
SQL Injection to MIPS Overflows: Rooting SOHO Routers
Constantine
The Leverage of Language - Advanced Workflow Environment for Security Intelligence and Exposure Management
15:00
Douba
Sploitego - Maltego's (Local) Partner in Crime
Dwenger, Etemadieh, Heres, Rosenberg
Hacking the Google TV
Fasel
Owned in 60 Seconds: From Network Guest to Windows Domain Admin
Behrens, Toews
bbqSQL - Rapid Blind SQL Injection Exploitation
Weidman
Introducing the Smartphone Pentesting Framework
16:00
How to Hack All the Transport Networks of a Country
CIFO, Dotaero, Esden, Misterj
The Paparazzi Platform: Flexible, Open-Source, UAS Software and Hardware
Shields, Toussain
Subterfuge: The Automated Man-in-the-Middle Attack Framework
London, Novak
SQL ReInjector - Automated Exfiltrated Data Identification
Mar, Yoder
Dr. Strangenerd: How I learned to collaborate and love the Maker Movement
17:30
Closing Ceremonies


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.