|
|
Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the West Registration Desk.
Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store across from Registration
Vendor Area Hours: 10:00 - 19:00 |
|
Track 1 |
Track 2 |
Track 3 |
Track 4 |
Track 5 |
Contest Area |
Events |
Outdoor Area |
10:00 10:50 |
Joe Grand
Making of the DEFCON 15 Badge |
Church Of WiFi's Wireless Extravaganza

 |
Sean Bodmer Analyzing Intrusions & Intruders |
Jennifer Granick Disclosure and Intellectual Property Law: Case Studies |
Tony Sager
Vulnerabilities and The Information Assurance Directorate |
Coffee Wars till 12:00
Lockpicking Points contest till close
GHII Free Play till 12:30
DefconBots open for practice - First come, first served till ???
Wall of Sheep till 15:00 Sunday |
|
Kiddie Pools and Outdoor Chill spot all dang day |
11:00 11:50 |
Bruce Schneier
Q&A |
Patrik Karlsson SQL injection and out-of-band channeling |
David Litchfield Database Forensics |
Robert Clark Computer and Internet Security Law - A Year in Review 2006 - 2007
Year In Review |
Meet The VCs |
|
|
|
12:00 12:50 |
Thomas Wilhelm
Turn-Key Pen Test Labs
 |
Philip Zimmermann Z-Phone  |
Chris Palmer & Alex Stamos
Breaking Forensics Software


 |
Dead Addict
Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures |
Panel: Anti Spyware Coalition |
Wireless Contest: Tower (tiered) Challenge till19:00
Øwn the box? Own the box! till 18:00 Saturday |
|
Beverage Cooling Contraption Contest till 14:00
Brew Wars till 14:00
Dunk Tank till 21:00 |
13:00 13:50 |
Jacob West How I Learned to Stop Fuzzing and Find More Bugs |
Alfredo Ortega
OpenBSD remote Exploit and another IPv6 vulnerabilities |
Scott Moulton
Re-Animating Drives & Advanced Data Recovery |
Steve Dunker
Everything you ever wanted to know about Police Procedure in 50 minutes. |
Disclosure Panel |
Lockpicking Skills Contest till 16:00
GHII Medium Heat 1
LosT@Con Mystery Challenge till 12:00 Sunday
The Phreaking Challenge Round 1 |
WPA Cracking Breakout Session - Wireless Village (209) |
|
14:00 14:50 |
Danny Quist & Valsmith
Covert Debugging: Circumventing Software Armoring Techniques |
Martyn Ruks MQ Jumping


 |
David C. Smith Cool stuff learned from competing in the DC3 digital forensic challenge |
John Benson Bridging the Gap Between Technology and the Law |
Bruce Potter
Dirty Secrets of the Security Industry |
GHII Medium Heat 2
Wireless Contest: WPA Cracking Contest till 16:00 |
|
|
15:00 - 15:50 |
Benjamin Kurtz
Functional Fuzzing with Funk

 |
Greg Hoglund Virtual World, Real Hacking |
Rich Murphey Windows Vista Log Forensics |
Alexander Muentz Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust |
Myles Long, Rob "Flack" O'Hara, & Christian "RaDMan" Wirth
Self Publishing in the Underground |
GHII Medium Heat 3 |
Book Signing: Mike Schrenk@ No Starch Press
Book: Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet
Agents with PHP/CURL |
|
16:00 16:50 |
H.D.Moore & Valsmith Tactical Exploitation
 |
Haroon Meer & Marco Slaviero It's All About the Timing

 |
Robert Stoudt
When Tapes Go Missing

|
Danny O'Brien Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy |
Luiz Eduardo
The Hacker Society around the (corporate) world |
|
Book signing: Johnny Long @ Breakpoint Books
Books: "Stealing the Network: How to Own a Shadow", "Google Talking", "Techno
Security's Guide to Managing Risks for It Managers, Auditors and
Investigators", "Asterisk Hacking"
QueerCon Mixer in Skybox 211/212 till 19:00 |
|
17:00 - 17:50 |
Damien Gomez Intelligent debugging for vuln-dev

 |
Jared DeMott, Dr. Richard Enbody & Dr. Bill Punch
Revolutionizing the Field of Grey-box Attack
Surface Testing with Evolutionary Fuzzing |
The Dark Tangent CiscoGate |
Peter Berghammer A Journalist's Perspective on Security Research |
Mike Murray & Lee Kushner
Creating and Managing Your Security Career |
|
|
|
18:00 18:20 |
Subere
Fingerprinting and Cracking Java Obfuscated Code

 |
Charlie Miller How smart is Intelligent Fuzzing
- or -
How stupid is Dumb Fuzzing? |
Richard Thieme Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors |
Sam Bowne Teaching Hacking at College |
Ofir Arkin
kNAC!
 |
|
|
|
18:30 18:50 |
Edward Lee Comparing Application Security Tools |
Ian G. Harris INTERSTATE: A Stateful Protocol Fuzzer for SIP |
David Hulton Faster PwninG Assured: New adventures with FPGAs

 |
|
|
|
19:00 19:50 |
Meet the Feds
|
Luke Jennings One token to rule them all

 |
Aaron Higbee Hack Your Car for Boost and Power! |
Panel: Ask the EFF |
|
|
|
|
20:00 - 20:20 |
Johnny Long No-Tech Hacking |
Toralv Dirro & Dirk Kollberg
Trojans: A Reality Check |
Michael Schrenk The Executable Image Exploit

 |
|
|
Forum Meet in room 113 till 23:00 |
|
20:30 - 20:50 |
Black Ball till ??? |
|
21:00 - ??? |
|
|
|
|
|
DEFCON Movie Night - World Premiere of "Infest Wisely" in Speaking Area 1
Club QueerCon Starts 22:00 in Room 115 till ???
Hacker Jeopardy22:00 to 01:00 in speaking area 2 |
|