This Schedule is tentative and may be changed at any time



Key:

= Demonstration = Tool Released = Exploit

Thursday, July 30th


Go to: Speakers / Events

08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store at The West Registration desk until 22:00 - Get your official DEF CON swag at the DEF CON Store.


    15:00
  • Track 1
    DEF CON 101
    (continued)
  • Track 2
    Effective Information Security Career Planning
    (continued)
  • Track 3
    Hardware Black Magic
    (continued)
  • Track 4
    Hacking the Apple TV and Where your Forensic Data Lives
    Kevin Estis & Randy Robbins
    Until: 17:00
  • Capri Rooms 103/104
    Pre-Con Introduction to Lock Picking
    (continued)

    16:30
  • Track 1
    So You Got Arrested in Vegas...
    Jim Rennie
    Until: 17:00
  • Track 2
    DCFluX in: The Man with the Soldering Gun
    (continued)
  • Track 3
    Defcon 1: a Personal Account
    (continued)
  • Track 4
    Hacking the Apple TV
    (continued)
  • Capri Rooms 103/104
    DC Network Session
    (continued until 19:00)

    Thursday Events Schedule



    17:30
  • Toxic BBQ
    Location: Sunset Park
    Until: 21:00

    20:45
  • The Summit
    Location: Top of the Riv
    Until: ???

Friday, July 31st


Go to: Speakers / Events

08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Vendor Area Hours: 10:00 - 19:00


    12:30
  • Track 1
    More Tricks For Defeating SSL
    Moxie Marlinspike
    Until: 13:20
  • Track 2
    TBA (Kenshoto)
    (continued)
  • Track 3
    0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
    (continued)
  • Track 4
    Death of Anonymous Travel
    (continued)
  • Turbo/Breakout Track
    Cloud Security in Map/Reduce
    Jason Schlesinger
    Until: 12:50

    14:30
  • Track 1
    Making Fun of Your Malware
    Michael Ligh & Matthew Richard
    Until: 14:50
  • Track 2
    Subverting the World Of Warcraft API
    (continued)
  • Track 3
    Advancing Video Application Attacks with Video Interception, Recording, and Replay
    (continued)
  • Track 4
    Defcon Security Jam 2: The Fails Keep on Coming
    (continued)
  • Turbo/Breakout Track
    Advanced MySQL Exploitation
    Muhaimin Dzulfakar
    Until: 14:50

    16:30
  • Track 1
    Malware Freak Show
    Nicholas J. Percoco and Jibran Ilyas
    Until: 17:20
  • Track 2
    Three Point Oh.
    (continued)
  • Track 3
    Why Tor is Slow, and What We're Doing About It
    (continued)
  • Track 4
    Ask EFF: The Year in Digital Civil Liberties
    (continued)
  • Turbo/Breakout Track
    Stealing Profits from Stock Market Spammers
    (continued)

    17:00
  • Track 1
    Malware Freak Show
    (continued)
  • Track 2
  • Track 3
    BitTorrent Hacks
    Michael Brooks and David Aslanian
    Until: 17:50
  • Track 4
    Ask EFF: The Year in Digital Civil Liberties
    (continued)
  • Turbo/Breakout Track
    Automated Malware Similarity Analysis
    Daniel Raygoza
    Until: 17:20

    18:00
  • Track 1
    Criminal Charges are not pursued: Hacking PKI
    (continued)
  • Track 2
    Fragging Game Servers
    (continued)
  • Track 3
    Attacking Tor at the Application Layer
    Gregory Fleischer
    Until: 18:50
  • Track 4
    Meet the Feds 2009
    Panel
    Until: 19:50
  • Turbo/Breakout Track
    Injecting Electromagnetic Pulses into Digital Devices
    (continued)
    11:00
  • DJ Rene
    Location: Chillout Area
    Until: 12:00
    14:00
  • Pepse (DJ)
    Location: Chillout Area
    Until: 15:00

Saturday, August 1st


Go to: Speakers / Events

08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Get your Official DEF CON Swag at the J!NX Hackwear Booth in the Vendor area.
Vendor Area Hours: 10:00 - 19:00

    14:30
  • Track 1
    The Projects of "Prototype This!"
    (continued)
  • Track 2
    MetaPhish
    (continued)
  • Track 3
    Feeding Controversial News to Censored Countries
    (continued)
  • Track 4
    Abusing Firefox Addons
    (continued)
  • Turbo/Breakout Track
    Hardware Trojans: Infiltrating the Faraday Cage
    Stephen 'afterburn' Janansky and Nick Waite
    Until: 14:50
    16:10
  • Track 1
    Sniff Keystrokes With Lasers/Voltmeters
    (continued)
  • Track 2
    Metasploit Evolved
    Meterpreter Advances
    Hacking the Next Internet
    HD Moore
    Until: 16:40
  • Track 3
    PLA Information Warfare Development Timeline and Nodal Analysis
    (continued)
  • Track 4
    Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
    (continued)
  • Turbo/Breakout Track
    Manipulation and Abuse of the Consumer Credit Reporting Agencies
    (continued)
    16:30
  • Track 1
    Sniff Keystrokes With Lasers/Voltmeters
    (continued)
  • Track 2
    Metasploit Evolved
    Meterpreter Advances
    Hacking the Next Internet
    (continued)
  • Track 3
    PLA Information Warfare Development Timeline and Nodal Analysis
    (continued)
  • Track 4
    Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
    (continued)
  • Turbo/Breakout Track
    An Open JTAG Debugger
    Travis Goodspeed
    Until: 17:20
    16:50
  • Track 1
    Sniff Keystrokes With Lasers/Voltmeters
    (continued)
  • Track 2
    MSF Wifi
    Mike Kershaw
    Until: 17:20
  • Track 3
    PLA Information Warfare Development Timeline and Nodal Analysis
    (continued)
  • Track 4
    Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
    (continued)
  • Turbo/Breakout Track
    An Open JTAG Debugger
    (continued)
    18:10
  • Track 1
    Router Exploitation
    (continued)
  • Track 2
    Macsploitation with Metasploit
    Dino Dai Zovi
    Until: 18:40
  • Track 3
    Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
    (continued)
  • Track 4
    The Middler 2.0: It's Not Just for Web Apps Anymore
    (continued)
  • Turbo/Breakout Track
    (continued)
    18:30
  • Track 1
    Router Exploitation
    (continued)
  • Track 2
    Macsploitation with Metasploit
    (continued)
  • Track 3
    Preparing for Cyber War
    (continued)
  • Track 4
    The Middler 2.0
    (continued)
  • Turbo/Breakout Track
    Runtime Kernel Patching on Mac OS X
    Bosse Eriksson
    Until: 18:50
    18:50
  • Track 1
    Router Exploitation
    (continued)
  • Track 2
    Metasploit Autopsy: Recontructing the Crime Scene
    Peter Silberman and Steve Davis
    Until: 19:20
  • Track 3
    Preparing for Cyber War
    (continued)
  • Track 4
    The Middler 2.0
    (continued)
  • Turbo/Breakout Track
    Runtime Kernel Patching on Mac OS X
    Bosse Eriksson
    Until: 18:50
    19:00
  • Track 1
    Closed
  • Track 2
    Metasploit Autopsy: Recontructing the Crime Scene
    (continued)
  • Track 3
    Preparing for Cyber War
    (continued until 20:00)
  • Track 4
    Closed
  • Turbo/Breakout Track
    The Day of the Updates
    Itzik Kotler and Tomer Bitton
    Until: 19:50

    Saturday Events Schedule



    9:00
  • Skytalks
    Location: Skybox 206
    Until: 18:00

    11:00
  • TRONA (DJ)
    Location: Chillout Area
    Until: 12:00

    12:00
  • DJ Reeves
    Location: Chillout Area
    Until: 13:00

    13:00
  • HoaX (DJ)
    Location: Chillout Area
    Until: 14:00

Sunday, August 2nd


Go to: Speakers / Events

08:00 - 12:00
Registration at Royale Registration Desk - $120 USD CASH ONLY
Get your Official DEF CON Swag at the J!NX Hackwear Booth in the Vendor area.
Vendor Area Hours: 10:00 - 15:00

    11:30
  • Track 1
    eXercise in Messaging and Presence Pwnage
    (continued)
  • Track 2
    Hacking Sleep: How to Build Your Very Own Sleep Lab
    (continued)
  • Track 3
    Win at Reversing: Tracing and Sandboxing through Inline Hooking
    (continued)
  • Track 4
    Invisible Access: Electronic Access Control, Audit Trails and "High Security"
    (continued)
  • Turbo/Breakout Track
    Hack The Textbook
    Jon R. Kibler and Mike Cooper
    Until: 11:50
    12:30
  • Track 1
    Unmasking You
    (continued)
  • Track 2
    Good Vibrations: Hacking Motion Sickness on the Cheap
    (continued)
  • Track 3
    Dradis Framework - Sharing Information will get you Root
    (continued)
  • Track 4
    Who Invented the Proximity Card?
    (continued)
  • Turbo/Breakout Track
    Attacks Against 2wire Residential Gateway Routers
    Pedro "hkm" Joaquin
    Until: 12:50
    13:30
  • Track 1
    Search And Seizure Explained - They Took My Laptop!
    (continued)
  • Track 2
    Your Mind: Legal Status, Rights and Securing Yourself
    (continued)
  • Track 3
    Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
    (continued)
  • Track 4
    Lockpicking Forensics
    (continued)
  • Turbo/Breakout Track
    AAPL- Automated Analog Telephone Logging
    Da Beave and JFalcon
    Until: 13:50
    17:00

    Awards Ceremonies hosted by Dark Tangent



    Sunday Events Schedule



    9:00
  • Skytalks
    Location: Skybox 206
    Until: 12:00