skip to main content

DEF CON Hacking Conference

DEF CON 11 Archive

was August 1-3, 2003 at the Alexis Park Hotel & Resort

Speakers & Presentations


Abaddon, Dragorn, Anton Rager, Joshua Wright & h1kari

Abusing 802.11 [ Panel Discussion ]

See It! (m4v Video) Hear it! (m4b Audio)


Leia Amidon, Omar Ahmed, David McLeod, Harry Regan

After Napster

Read It! (PDF) Notes! (Word) See It! (m4v Video) Hear it! (m4b Audio)


Greg Conti

Interface Design of Hacking Tools

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Bryan Glancey : UPDATED :

PDA Insecurity

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert Imhoff-Dousharm

Credit Card Networks 101

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


OldSkoolS

Satellite TV Technology

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


ParanoidAndroid

Beat the Casinos At Their Own Game

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bill Scannell

Punishing Collaborators Redux

Read It! (PowerPoint) See It! (m4v Video) Hear it! (m4b Audio)


Phil Zimmermann

A Conversation with Phil Zimmermann

See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Attack!


Adam Bresson

Manyonymity

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Silvio Cesare

Opensource Kernel Auditing and Exploitation

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Seth Fogie

Embedded Reverse Engineering

Read It! (PowerPoint) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


FX

More Embedded Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Icer

Why Anomaly Based Intrusion Detection Systems Are A Hackers Best Friend

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Stack Black Ops

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Beetle & Bruce Potter

Airsnarf

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


SensePost
: UPDATED :

Putting The Tea Back Into CyberTerrorism

Read It! (PDF) Extras (Word) See It! (m4v Video) Hear it! (m4b Audio)


Spyde~1, AutoNiN & Mystic
: UPDATED :

The UPS (Undetectable Packet Sniffer)

Read It! (SWF) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Agents, Trojans & Viruses


Viki Navratilova

Today's Modern Network Killing Robot

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Brett Neilson

Malicious Code & Wireless Networks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sean O'Toole
: UPDATED :

Metamorphic Viruses

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Daniel Roelker
: UPDATED :

HTTP IDS Evasions Revisited

Read It! (PDF) Code (Zip) Tool (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Jonathan Wignall

Network Worms

Read It! (Powerpoint) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: The Big Picture


Susan W. Brenner

Toward a Criminal Law for Cyberspace

Read It! (PDF) Extras (Word) See It! (m4v Video) Hear it! (m4b Audio)


Cindy Cohn

What Hackers Need to Know About Post 9/11 Legal Changes

Read It! (PowerPoint) See It! (m4v Video) Hear it! (m4b Audio)


Eric Goldman

Criminal Copyright Infringement and Warez Trading

Read It! (PDF) Extras (Word) See It! (m4v Video) Hear it! (m4b Audio)


NMRC:
Simple Nomad, Inertia, jrandom, Weasel, Cyberiad, Sioda an Cailleach, HellNbak

Free Your Mind: The NMRC Info/Warez [ Panel Discussion ]

Read It! (PDF) Extras (ISO) See It! (m4v Video) Hear it! (m4b Audio)


Tom Parker, Matt Devost, Marcus H. Sachs and Toby Miller

Adversary Characterization and Scoring Systems [ Panel Discussion ]

Read It! (PowerPoint) See It! (m4v Video) Hear it! (m4b Audio)


Wendy Seltzer

The Internet's Private Cops

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Richard Thieme

Hacker Generations

Read It! (Word) See It! (m4v Video) Hear it! (m4b Audio)


Mikko Valimaki & Ville Oksanen

The Story of EFFI

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Defend!


Mick Bauer

Self-Abuse For Smarter Log Monitoring

Read It! (ZIP of html) Extras (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jay Beale

Locking Down Mac OS X

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Inertia

Introducing nmrcOS

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Rich Murphey

Intrusion Prevention Techniques on Windows and Unix

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Michael Sutton & Pedram Amini

Hacking the Invisible Network

Read It! (PDF file) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Net Recon


Ofir Arkin

Revolutionizing Operating System Fingerprinting

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Clip
ADDED

Hacking From the Palm of Your Hand

Read It! (PowerPoint) Tool (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Fyodor

Advanced Network Reconnaissance Techniques

Read It! (ZIP of .mgp) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Chris Hurley (aka Roamer)
: UPDATED :

The WorldWide WarDrive

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Tony (aka Xam) Kapela

Fashonably Late - What Your Networks RTT Says About Itself

Read It! (PowerPoint) See It! (m4v Video) Hear it! (m4b Audio)


Joe Klein, CISSP
ADDED

Information Leakage— You posted what?!

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Long

Watching the Watchers

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter

Bluetooth

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael Schrenk
ADDED

Online Corporate Intelligence

Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Physical Security


Criticalmass and Matt (404)

Social Engineering Fundamentals

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael D. Glasser

OSI Layer 1 Security

Read It! (PowerPoint file) See It! (m4v Video) Hear it! (m4b Audio)


Grifter

Dumpster Diving

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ryan Lackey

HavenCo

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Jeffrey Prusan

Technical Security Countermeasures

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Privacy / Anonymity


Jaya Baloo

Government IP_TAPPING

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Chung's Donut Shop

The Luna Correspondence Protocol

Read It! (PowerPoint or .mov) See It! (m4v Video) Hear it! (m4b Audio)


Lenard Kleinrock & Sally Richards

At Risk! Privacy

Read It! (PowerPoint file) See It! (m4v Video) Hear it! (m4b Audio)


Mystic

Mimicry

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Cat Okita
: UPDATED :

Aura

Read It! (PDF) White Paper (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Len Sassaman, Peter Palfrader, noise, Michael Shinn, Ryan Lackey

Behind the Remailers [ Panel Discussion ]

Read It! (PowerPoint) See It! (m4v Video) Hear it! (m4b Audio)


Daniel C. Silverstein & Damon McCormick

Increasing The Security of Your Election by Fixing It

Read It! (PDF) Extras (.CGI) See It! (m4v Video) Hear it! (m4b Audio)


Paul Wouters

Deploying DNSSEC

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Defcon 11: Web & Database Hacking


Gregoire Gentil

Hack Any Website

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Brian Hurley & Ann Gabriel

Internet Radio Politics

Read It! (TXT) See It! (m4v Video) Hear it! (m4b Audio)


tommEE pickles

Streaming Media Theft and Protection

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Roberto Preatoni (akaSyS64738)

The Future Frontiers of Hacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Rhoades

ADDED

Hacking Web Apps

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Matthew Shannon : UPDATED :

_vti_fpxploitation

Read It! (PDF) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)


Robert Sheehy

Theft of Service Attacks

Read It! (PowerPoint) Extras (Zip) See It! (m4v Video) Hear it! (m4b Audio)

return to top