skip to main content

DEF CON Hacking Conference

DEF CON 10 Archive

was held August 2-4, 2002 at the Alexis Park Hotel & Resort

Speakers & Presentations


Jay Beale

Attacking & Securing FTP

Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)


Rich Bodo

It is Now Safe to Compile Your Phone System

Read It! (.ungz file contains presentation in html) See It! (m4v Video) Hear it! (m4b Audio)


John Dodge, Steve S. Mautsatsos and Bernadette H. Schell

Should Organizations Employ Hackers?
Implications Drawn From the Book Hacking of America

Read It! (rich text) See It! (m4v Video) Hear it! (m4b Audio)


Aaron Higbee & Chris Davis

DC Phone Home

Read It! (PDF) Tool! (ISO) See It! (m4v Video) Hear it! (m4b Audio)


Humperdink

Securing Your Windows Internet Server

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dennis Mattison aka Littlewolf

Network Printers and Other Network Devices, Vulnerabilities and Fixes

Read It! (.zip file contains presentation in Magicpoint and pdf support files) See It! (m4v Video) Hear it! (m4b Audio)


Thomas Munn & tgr2mfx

Using Filesystem Crypto and Other Approaches to Protect Your Data/Privacy on BSD and LINUX

Read It! (Acrobat PDF) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Privacy/Anonymity


Ian Clarke

Freenet, Past, Present, and Future Direction

See It! (m4v Video) Hear it! (m4b Audio)


Roger Dingledine

The Mixminion Anonymous Remailer Protocol

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jennifer Granick

The USA PATRIOT Act & You

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Christian Grothoff

GNUNet

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Khan

Stealth Data Dispersal: ICMP Moon-Bounce

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ryan Lackey

Anonymous, Secure, Open Electronic Cash

See It! (m4v Video) Hear it! (m4b Audio)


John Q. Newman

Post 9/11 Privacy

See It! (m4v Video) Hear it! (m4b Audio)


Len Sassaman

Anonymity Services and the Law: How to Safely Provide Anonymous Technology on the Internet

Read It! (.gz file contains .ppt presentation and support text) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Net Recon


Agent OJ

Applescript (in) Security in OS X

See It! (m4v Video) Hear it! (m4b Audio)


Ofir Arkin

XProbe, The Year After

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dan Burroughs

Correlation & Tracking of Distributed IDS

Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)


Ian Peters

Rubicon - An Extensible Gateway IDS

Read It! (.gz file containing .ppt and pdf support file) See It! (m4v Video) Hear it! (m4b Audio)


Steve Schear

GNU Radio

See It! (m4v Video) Hear it! (m4b Audio)


Jaeson Schultz & Lawrence Baldwin

Extreme IP Backtracing

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


T3-Fred Trotter

Operating System Fingerprinting Library

See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: The Big Picture


Scott Blake

The Politics of Vulnerabilities

See It! (m4v Video) Hear it! (m4b Audio)


Adam Bresson

Consumer Media Protections

Read It! (.zip file contains .ppt, pdf support file and .exe) See It! (m4v Video) Hear it! (m4b Audio)


Joe Burton & William Reilly

Dmitry Sklyarov and the DMCA: 12 Months Later

See It! (m4v Video) Hear it! (m4b Audio)


Lucky Green

Trusted Computing Platform Alliance:
The Mother(board) of all Big Brothers

Read It! (.zip file contains .ppt and supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)


Simple Nomad

Widdershins: The Hacker Nation

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Richard Thieme

1992 ... 2002 ... 2012 ...Hacking: The Next Ten Years

See It! (m4v Video) Hear it! (m4b Audio)


Wilco Van Ginkel

The Other Side of Information Security

Read It! (.zip file contains .ppt & supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)


Panel Discussion
with Michael I. Morgenstern, Richard Schaeffer, Marcus H. Sachs, O. Sami Saydjari, Steve Lipner, Tom Parker

Disclosure: The Mother of All Vulnerabilities

See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Attack + Tools


Philippe Biondi

Security at Kernel Level

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


DJ Sweet Sensation

SNMP Attacks/Security

See It! (m4v Video) Hear it! (m4b Audio)


David Endler & Michael Sutton

Web Application Brute Forcing 101 - "Enemy of the State (Mechanism)"

Read It! (.zip file contains .ppt and pdf support file) Play With It! (.zip file contains iDefense Session Auditor tool) See It! (m4v Video) Hear it! (m4b Audio)


FX & FtR

Attacking Networked Embedded Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Gingerbread Man

Lock Picking: Techniques and Tools for High Security

Read It! (.zip file- requires OpenSource to view after decompiressing) See It! (m4v Video) Hear it! (m4b Audio)


Michael Glasser CRL, aka Laz

High Security Locks, and Access Control Products

See It! (m4v Video) Hear it! (m4b Audio)


Cyrus Peikari & Seth Fogie

Hacking .NET Server

Read It! (PDF) Play With It! (.exe) See It! (m4v Video) Hear it! (m4b Audio)


Ian Vitek

Citrix and Terminal Services

Read It! (PDF) Play With It! (.zip of tools & readme file in html) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Wireless + Routing


Ken Caruso

Community Wireless Networks: Friend or Foe to the Telecom Industry

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Brett Eldridge

Mobile VPN Vulnerabilities & Solutions

Read It! (compressed file containing presentation and other supporting documents) See It! (m4v Video) Hear it! (m4b Audio)


Nicholas Fischbach and Sebastien Lacoste-Seris

Layer 2, Routing Protocols, Router Security & Forensics

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Black Ops of TCP/IP: Work NAT, Work. Good NAT. Woof

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Matthew Marsh

Replacing TripWire with SNMPv3

Read It! (PDF) Play With It! (.zip) See It! (m4v Video) Hear it! (m4b Audio)


Greg Miles

Anatomy of Denial of Service Mitigation Testing

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter, Tony 'Xam' Kapela, and Adam Shand

Wireless Networking

See It! (m4v Video) Hear it! (m4b Audio)


zSnark

Building Secure Wireless Networks

Read It! (.zip file-contains presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Break Out


Jay Beale

Bastille Linux 2.0: Six Operating Systems and Still Going!

Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)


Chris Hurley

Hardening Solaris Installs

Read It! (.zip file-contains .ppt, .doc & .html supporting read me text) See It! (m4v Video) Hear it! (m4b Audio)


Rich Murphey

FreeBSD Exploits & Remedies


SkrooYou & Grifter

Resurrecting the Scene through Local 'Hacker' Meetings

See It! (m4v Video) Hear it! (m4b Audio)


Kevin Spett

SQL Injection

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


TechnoDragon

Making a Non-portable Computer System Portable

See It! (m4v Video) Hear it! (m4b Audio)


Vic Vandal

Intelligence Gathering

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Agents/Trojans/Virii/Spiders


Elonka Dunin

Cryptography and Steganography

See It! (m4v Video) Hear it! (m4b Audio)


Robert V1ru5 Lupo

Introduction to Computer Viruses:
Understanding the Fundamentals of How to Identify, Remove and Defend Against Hostile Code

See It! (m4v Video) Hear it! (m4b Audio)


Michael Rogers

Steganographic Trojans

See It! (m4v Video) Hear it! (m4b Audio)


Michael Schrenk

Introduction to Writing Spiders & Web Agents

Read It! (.zip file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)


Roelof Temmingh & Haroon Meer

Setiri: Advances in Trojan Technology

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Net Defense


Mick Bauer

Stealthful Sniffing, Logging, and Intrusion Detection:
Useful and Fun Things You Can Do Without an IP Address

Read It! (.ungz file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)


Andrew Hintz

Covert Channels in TCP and IP Headers

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sean Lewis

BSD Security Fundamentals

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas Rude aka Farmerdude

Next Generation Data Forensics & Linux

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)

Defcon 10: Miscellaneous


Dr. Walter C. Daugherity

Quantum Computing 101: How to Crack RSA

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Error

Neuro-Linguistic Programming (NLP)

See It! (m4v Video) Hear it! (m4b Audio)


GOBBLES Security

Wolves Among Us

See It! (m4v Video) Hear it! (m4b Audio)


hellNbak

Selling Out For Fun and Profit

See It! (m4v Video) Hear it! (m4b Audio)


Nate Rotschafer

Stage Biometric Authentication

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)