This Schedule is tentative and may be changed at any time
Key:



Thursday, July 30th
Go to: Speakers / Events
08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store at The West Registration desk until 22:00 - Get your official DEF CON swag at the DEF CON Store.
Track 1
DEF CON 101
Panel
Until: 16:00Track 2
Effective Information Security Career Planning
Lee Kushner & Mike Murray
Until: 16:00Track 3
Hardware Black Magic - Building devices with FPGAs
Dr. Fouad Kiamilev
Until: 16:00
Track 4
Hacking with GNURadio
Videoman
Until: 15:00Capri Rooms 103/104
Pre-Con Introduction to Lock Picking
Alek Amrani
Until: 16:00
Thursday Speaking Schedule
13:00
Track 1
DEF CON 101
(continued)Track 2
Effective Information Security Career Planning
(continued)Track 3
Hardware Black Magic
(continued)Track 4
Hacking the Apple TV and Where your Forensic Data Lives
Kevin Estis & Randy Robbins
Until: 17:00
Capri Rooms 103/104
Pre-Con Introduction to Lock Picking
(continued)
15:00
Track 1
Con Kung-Fu: Defending Yourself @ DEF CON
Rob "Padre" DeGulielmo
Until: 16:20Track 2
DCFluX in: The Man with the Soldering Gun
Matt Krick "DCFluX"
Until: 17:00
Track 3
Defcon 1: a Personal Account
Dead Addict
Until: 17:00Track 4
Hacking the Apple TV
(continued)Capri Rooms 103/104
DC Network Session
Lockheed
Until: 19:00
16:00
Track 1
So You Got Arrested in Vegas...
Jim Rennie
Until: 17:00Track 2
DCFluX in: The Man with the Soldering Gun
(continued)Track 3
Defcon 1: a Personal Account
(continued)Track 4
Hacking the Apple TV
(continued)Capri Rooms 103/104
DC Network Session
(continued until 19:00)
16:30
-
Toxic BBQ
Location: Sunset Park
Until: 21:00
Thursday Events Schedule
17:30
-
Forums Meet
Location: Capri 111
Until: ???
19:30
-
The Summit
Location: Top of the Riv
Until: ???
20:45
Friday, July 31st
Go to: Speakers / Events
08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Vendor Area Hours: 10:00 - 19:00
Track 1
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Joe "Kingpin" Grand, The Dark Tangent
Until: 11:20
Track 2
Perspective of the DoD Chief Security Officer
Robert Lentz
Until: 10:50Track 3
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Kevin Mahaffey, John Hering and Anthony Lineberry
Until: 10:50
Track 4
Beckstrom's Law - A Model for Valuing Networks and Security
Rod Beckstrom
Until: 10:50Turbo/Breakout Track
Catching DNS Tunnels with AI
Jhind
Until: 10:50
Friday Speaking Schedule
10:00
Track 1
Welcome with DT & the Making/Hacking of the DC17 Badge
(continued)Track 2
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Efstratios L. Gavas
Until: 11:20Track 3
Jailbreaking and the Law of Reversing
Fred Von Lohmann and Jennifer Granick Civil Liberties Director, EFF
Until: 11:50Track 4
Is That You, Baby, or Just a Bridge in the Sky?
Douglas C. Merrill
Until 11:50Turbo/Breakout Track
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
Sean Taylor "Frank2"
Until: 11:50
11:00
Track 1
Q & A with Bruce Schneier
Bruce Schneier
Until: 12:20Track 2
Hacking the Wiimote and Wii fit to help the Disabled
Josh Marks and Rob Rehrig
Until: 11:50
Track 3
Jailbreaking and the Law of Reversing
(continued)Track 4
TBD
(continued)Turbo/Breakout Track
Binary Obfuscation from the Top-Down: Obfuscating
(continued)
11:30
Track 1
Q & A with Bruce Schneier
(continued)Track 2
TBA
Kenshoto
Until: 12:50Track 3
0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
Matt Richard and Steven Adair
Until: 12:50Track 4
Death of Anonymous Travel
Sherri Davidoff
Until: 13:50
Turbo/Breakout Track
Cross Site Scripting Anonymous Browser 2.0
Jeff Yestrumskas and Matt Flick
Until: 12:20
12:00
Track 1
More Tricks For Defeating SSL
Moxie Marlinspike
Until: 13:20
Track 2
TBA (Kenshoto)
(continued)Track 3
0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
(continued)Track 4
Death of Anonymous Travel
(continued)Turbo/Breakout Track
Cloud Security in Map/Reduce
Jason Schlesinger
Until: 12:50
12:30
Track 1
More Tricks For Defeating SSL
(continued)Track 2
Maximum CTF: Getting the Most Out of Capture the Flag
Psifertex
Until: 13:50Track 3
Hacking WITH the iPod Touch
Thomas Wilhelm
Until: 13:50Track 4
Death of Anonymous Travel
(continued)Turbo/Breakout Track
Socially Owned in the Cloud
Digividual
Until: 13:20
13:00
Track 1
The Year In Computer Crime Cases
Jennifer Granick
Until: 14:20Track 2
Maximum CTF: Getting the Most Out of Capture the Flag
(continued)Track 3
Hacking WITH the iPod Touch
(continued)Track 4
Death of Anonymous Travel
(continued)Turbo/Breakout Track
Deblaze - A Remote Method Enumeration Tool for Flex Servers
Jon Rose
Until: 13:50
13:30
Track 1
The Year In Computer Crime Cases
(continued)Track 2
Subverting the World Of Warcraft API
Christopher Mooney and James Luedke
Until: 14:50
Track 3
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Jason Ostrom and Arjun Sambamoorthy
Until: 14:50
Track 4
Defcon Security Jam 2: The Fails Keep on Coming
David Mortman et al
Until: 15:50
Turbo/Breakout Track
Attacking SMS. It's No Longer Your BFF
Brandon Dixon
Until: 14:20
14:00
Track 1
Making Fun of Your Malware
Michael Ligh & Matthew Richard
Until: 14:50
Track 2
Subverting the World Of Warcraft API
(continued)Track 3
Advancing Video Application Attacks with Video Interception, Recording, and Replay
(continued)Track 4
Defcon Security Jam 2: The Fails Keep on Coming
(continued)Turbo/Breakout Track
Advanced MySQL Exploitation
Muhaimin Dzulfakar
Until: 14:50
14:30
Track 1
Making Fun of Your Malware
(continued)Track 2
That Awesome Time I Was Sued For Two Billion Dollars
Jason Scott
Until: 15:50Track 3
Computer and Internet Security Law - A Year in Review 2008 - 2009
Robert Clark
Until: 15:50Track 4
Defcon Security Jam 2: The Fails Keep on Coming
(continued)Turbo/Breakout Track
Proxy Prank-o-Matic
Charlie Vedaa and "Anonymous secondary speaker"
Until:
15:00
Track 1
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
Danny Quist and Lorie M. Liebrock
Until: 17:20
Track 2
That Awesome Time I Was Sued For Two Billion Dollars
(continued)Track 3
Computer and Internet Security Law - A Year in Review 2008 - 2009
(continued)Track 4
Defcon Security Jam 2: The Fails Keep on Coming
(continued)Turbo/Breakout Track
Session Donation
Alex Amrani
Until: 15:50
15:30
Track 1
Reverse Engineering By Crayon
(continued)Track 2
Three Point Oh.
Johnny Long
Until: 16:50
Track 3
Why Tor is Slow, and What We're Doing About It
Roger Dingledine
Until: 16:50Track 4
Ask EFF: The Year in Digital Civil Liberties
Panel
Until: 17:50Turbo/Breakout Track
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Grant Jordan
Until: 16:50
16:00
Track 1
Malware Freak Show
Nicholas J. Percoco and Jibran Ilyas
Until: 17:20
Track 2
Three Point Oh.
(continued)Track 3
Why Tor is Slow, and What We're Doing About It
(continued)Track 4
Ask EFF: The Year in Digital Civil Liberties
(continued)Turbo/Breakout Track
Stealing Profits from Stock Market Spammers
(continued)
16:30
Track 1
Malware Freak Show
(continued)Track 2
Track 3
BitTorrent Hacks
Michael Brooks and David Aslanian
Until: 17:50Track 4
Ask EFF: The Year in Digital Civil Liberties
(continued)Turbo/Breakout Track
Automated Malware Similarity Analysis
Daniel Raygoza
Until: 17:20
17:00
Track 1
Criminal Charges are not pursued: Hacking PKI
Mike Zusman
Until: 18:20
Track 2
Fragging Game Servers
Bruce Potter and Logan Lodge
Until: 18:20
Track 3
BitTorrent Hacks
(continued)Track 4
Ask EFF: The Year in Digital Civil Liberties
(continued)Turbo/Breakout Track
Injecting Electromagnetic Pulses into Digital Devices
Paul F. Renda
Until: 18:20
17:30
Track 1
Criminal Charges are not pursued: Hacking PKI
(continued)Track 2
Fragging Game Servers
(continued)Track 3
Attacking Tor at the Application Layer
Gregory Fleischer
Until: 18:50
Track 4
Meet the Feds 2009
Panel
Until: 19:50Turbo/Breakout Track
Injecting Electromagnetic Pulses into Digital Devices
(continued)
18:00
-
18:30
Track 1
Something about Network Security
Dan Kaminsky
Until: 19:20Track 2
Locally Exploiting Wireless Sensors
Travis Goodspeed
Until: 19:20
Track 3
Attacking Tor at the Application Layer
(continued until 18:59)Track 4
Meet the Feds 2009
(continued until 19:20)Turbo/Breakout Track
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Richard Thieme
Until: 19:20
-
Fillmatic (DJ)
Location: Chillout Area
Until: 11:00 -
Coffee Wars X
Location: Contest Area
Until: 12:00 -
World of Warcraft Subversion
Location: Contest Area
Until: 19:00
Friday Events Schedule
10:00
-
11:00
-
DJ Rene
Location: Chillout Area
Until: 12:00
-
12:00
-
DJ njnTrubl
Location: Chillout Area
Until: 13:00 -
Open CTF Begins
Location: Contest Area
Until: 12:00 Sunday -
Beverage Cooling Contraption Contest
Location: Contest Area
Until: 14:00 -
Scavenger Hunt
Location: Contest Area
Until: 18:00
-
13:00
-
8thNerve (DJ)
Location: Chillout Area
Until: 14:00
-
14:00
-
Pepse (DJ)
Location: Chillout Area
Until: 15:00
-
15:00
-
DJ Felix Kay
Location: Chillout Area
Until: 16:00
-
16:00
-
Digital Phreak (DJ)
Location: Chillout Area
Until: 17:00 -
QueerCon PreFunk
Location: Chillout Area
Until: 19:00
-
17:00
-
Corruptdata (DJ)
Location: Chillout Area
Until: 18:00
-
18:00
-
Pool Party - The Scritch (DJ)
Location:
Until:
-
19:00
-
Pool Party - Inconspicuous Villain (DJ)
Location: Pool
Until: 20:00
-
20:00
-
Pool Party - DJ Reeves
Location: Pool
Until: 21:00 -
Black Ball - RECOGNIZE: The Goon Band
Location: Capri 101/102 (Chillout Room)
Until: 21:00 -
10,000ยข Hacker Pyramid
Location: Track 3
Until: 21:00
-
21:00
-
Pool Party - Simo Sleevin
Location: Pool
Until: 22:00 -
Black Ball - Phylo (DJ)
Location: Capri 101/102 (Chillout Room)
Until: 22:00 -
Hacker Karaoke
Location: Capri 111
Until: ??? -
Hacker Jeopardy
Location: Track 2
Until: ???
-
22:00
-
Pool Party - Simon Plexus
Location: Pool
Until: 23:00 -
Black Ball - E-Roc (DJ)
Location: Capri 101/102 (Chillout Room)
Until: 23:00 -
Queercon
Location: skyboxes 211/212
Until: ???
-
23:00
-
Black Ball - Mitch Mitchem
Location: Capri 101/102 (Chillout Room)
Until: 24:00
-
24:00
-
Black Ball - SailorGloom (DJ)
Location: Capri 101/102 (Chillout Room)
Until: 1:00
-
1:00
-
Black Ball - Krisz Klink
Location: Capri 101/102 (Chillout Room)
Until: 2:00
-
2:00
-
Black Ball - njnTrubl
Location: Capri 101/102 (Chillout Room)
Until: 3:00
Saturday, August 1st
Go to: Speakers / Events
08:00 - 22:00
Registration at Royale Registration Desk - $120 USD CASH ONLY - Avoid the lines and get your badge early.
Get your Official DEF CON Swag at the J!NX Hackwear Booth in the Vendor area.
Vendor Area Hours: 10:00 - 19:00
Track 1
"Smart" Parking Meter Implementations, Globalism, and You (aka Meter Maids Eat Their Young)
Joe "Kingpin" Grand, Jake Appelbaum, and Chris Tarnovsky
Until: 10:50
Track 2
Breaking the "Unbreakable" Oracle with Metasploit
Chris Gates and Mario Ceballos
Until: 10:50
Track 3
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
RenderMan and Michael "theprez98" Schearer
Until: 11:50
Track 4
Weaponizing the Web: New Attacks on User-generated Content
Shawn Moyer and Nathan Hamiel
Until: 10:50
Turbo/Breakout Track
Old Skool Brought Back: A 1964 Modem Demo
K.C. Budd "Phreakmonkey" and Taylor Banks "Dr Kaos"
Until: 10:50
Saturday Speaking Schedule
10:00
-
11:00
Track 1
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
Antoine Gademer and Corentin Chéron
Until: 11:50Track 2
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit
Egypt
Until: 11:50
Track 3
Hacker vs. Disasters Large and Small
(continued)Track 4
CSRF: Yeah, It Still Works
Mike "mckt" Bailey and Russ McRee
Until: 11:50Turbo/Breakout Track
Air Traffic Control: Insecurity and ADS-B
Righter Kunkel
Until: 11:50
-
12:00
Track 1
RFID MythBusting
Chris Paget
Until: 12:50
Track 2
Metasploit goes Web
Efrain 'ET' Torres
Until: 12:20
Track 3
Personal Survival Preparedness
Steve Dunker and Kristie Dunker
Until: 12:50Track 4
The Security Risks of Web 2.0
David Rook
Until: 12:50
Turbo/Breakout Track
Packing and the Friendly Skies (Why Transporting your Firearms may be the best way to Safeguard your Tech when you Fly)
Deviant Ollam
Until: 12:20
-
12:30
Track 1
RFID MythBusting
(continued)Track 2
Track 3
Personal Survival Preparedness
(continued)Track 4
The Security Risks of Web 2.0
(continued)Turbo/Breakout Track
Design and Implementation of a Quantum True Random Number Generator
Sean Boyce
Until: 12:50
-
13:00
Track 1
Failure
Adam Savage
Until: 13:50Track 2
Viewing Room for Adam Savage
Until: 13:50Track 3
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
Dr. Thomas J. Holt, Dr. Max Kilger, Dr. Debora Strumsky, and Dr. Olga Smirnova
Until: 13:50Track 4
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Kevin Johnson, Justin Searle and Frank DiMaggio
Until: 13:50
Turbo/Breakout Track
Unfair Use - Speculations on the Future of Piracy
Dead Addict
Until: 13:50
-
14:00
Track 1
The Projects of "Prototype This!"
Joe "Kingpin" Grand, Zoz
Until: 14:50Track 2
MetaPhish
Valsmith, Colin Ames and David Kerb
Until: 15:50
Track 3
FOE — Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
Sho Ho
Until: 14:50
Track 4
Abusing Firefox Addons
Roberto Suggi Liverani and Nick Freeman
Until: 14:50
Turbo/Breakout Track
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
Pratap Prabhu and Yingbo Song
Until: 14:20
-
14:30
Track 1
The Projects of "Prototype This!"
(continued)Track 2
MetaPhish
(continued)Track 3
Feeding Controversial News to Censored Countries
(continued)Track 4
Abusing Firefox Addons
(continued)Turbo/Breakout Track
Hardware Trojans: Infiltrating the Faraday Cage
Stephen 'afterburn' Janansky and Nick Waite
Until: 14:50
-
15:00
Track 1
Track 2
MetaPhish
(continued)Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
TK234
Until: 16:50
Track 4
Hijacking Web 2.0 Sites with SSLstrip—Hands-on Training
Sam Bowne
Until: 15:50
Turbo/Breakout Track
The Making of the second SQL injection Worm
Sumit Siddharth
Until: 15:20
-
15:30
Track 1
Picking Electronic Locks Using TCP Sequence Prediction
Ricky Lawshae
Until: 15:50
Track 3
MSF Telephony
I)ruid
Until: 16:00
Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
(continued)Track 4
Hijacking Web 2.0 Sites with SSLstrip—Hands-on Training
(continued)Turbo/Breakout Track
Hacking the Smart Grid
Tony Flick
Until: 15:50
-
16:00
Track 1
Sniff Keystrokes With Lasers/Voltmeters
Andrea Barisani and Daniele Bianco
Until: 16:50
Track 2
Metasploit Track
(Break)Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
(continued)Track 4
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Joey Calca and Ryan Anguiano
Until: 16:50Turbo/Breakout Track
Manipulation and Abuse of the Consumer Credit Reporting Agencies
Anonymous Speaker
Until: 16:20
-
16:10
Track 1
Sniff Keystrokes With Lasers/Voltmeters
(continued)Track 2
Metasploit Evolved
Meterpreter Advances
Hacking the Next Internet
HD Moore
Until: 16:40Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
(continued)Track 4
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
(continued)Turbo/Breakout Track
Manipulation and Abuse of the Consumer Credit Reporting Agencies
(continued)
-
16:30
Track 1
Sniff Keystrokes With Lasers/Voltmeters
(continued)Track 2
Metasploit Evolved
Meterpreter Advances
Hacking the Next Internet
(continued)Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
(continued)Track 4
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
(continued)Turbo/Breakout Track
An Open JTAG Debugger
Travis Goodspeed
Until: 17:20
-
16:50
Track 1
Sniff Keystrokes With Lasers/Voltmeters
(continued)Track 2
MSF Wifi
Mike Kershaw
Until: 17:20
Track 3
PLA Information Warfare Development Timeline and Nodal Analysis
(continued)Track 4
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
(continued)Turbo/Breakout Track
An Open JTAG Debugger
(continued)
-
17:00
Track 1
Bluetooth, Smells Like Chicken
Dominic Spill, Michael Ossmann and Mark Steward
Until: 17:50
Track 2
MSF Wifi
(continued)Track 3
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of Global Cyber-Warfare)
Jayson E. Street
Until: 17:50Track 4
Clobbering the Cloud
Haroon Meer and Marco Slaviero
Until: 17:50
Turbo/Breakout Track
An Open JTAG Debugger
(continued)
-
17:30
Track 1
Bluetooth, Smells Like Chicken
(continued)Track 2
App Assessment the Metasploit Way
David Maynor
Until: 18:00
Track 3
I Am Walking Through a City Made of Glass...
(continued)Track 4
Clobbering the Cloud
(continued)Turbo/Breakout Track
Doppelganger: The Web's Evil Twin
Edward Zaborowski
Until: 17:50
-
18:00
Track 1
Router Exploitation
FX
Until: 18:50Track 2
Metasploit Track
(continued)Track 3
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Dmitri Alperovitch, Marcus Sachs, Phyllis Schneck and Ed Skoudis
Until: 20:00Track 4
The Middler 2.0: It's Not Just for Web Apps Anymore
Jay Beale and Justin Searle
Until: 18:50
Turbo/Breakout Track
Sharepoint 2007 Knowledge Network Exposed
Digividual
Until: 18:20
-
18:10
Track 1
Router Exploitation
(continued)Track 2
Macsploitation with Metasploit
Dino Dai Zovi
Until: 18:40
Track 3
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
(continued)Track 4
The Middler 2.0: It's Not Just for Web Apps Anymore
(continued)Turbo/Breakout Track
(continued)
-
18:30
Track 1
Router Exploitation
(continued)Track 2
Macsploitation with Metasploit
(continued)Track 3
Preparing for Cyber War
(continued)Track 4
The Middler 2.0
(continued)Turbo/Breakout Track
Runtime Kernel Patching on Mac OS X
Bosse Eriksson
Until: 18:50
-
18:50
Track 1
Router Exploitation
(continued)Track 2
Metasploit Autopsy: Recontructing the Crime Scene
Peter Silberman and Steve Davis
Until: 19:20
Track 3
Preparing for Cyber War
(continued)Track 4
The Middler 2.0
(continued)Turbo/Breakout Track
Runtime Kernel Patching on Mac OS X
Bosse Eriksson
Until: 18:50
-
19:00
Track 1
ClosedTrack 2
Metasploit Autopsy: Recontructing the Crime Scene
(continued)Track 3
Preparing for Cyber War
(continued until 20:00)Track 4
ClosedTurbo/Breakout Track
The Day of the Updates
Itzik Kotler and Tomer Bitton
Until: 19:50
-
Skytalks
Location: Skybox 206
Until: 18:00
Saturday Events Schedule
9:00
-
Undecided (DJ)
Location: Chillout Area
Until: 11:00 -
Scavenger Hunt
Location: Contest Area
Until: 18:00 -
World of Warcraft Subversion
Location: Contest Area
Until: 19:00
10:00
-
TRONA (DJ)
Location: Chillout Area
Until: 12:00
11:00
-
DJ Reeves
Location: Chillout Area
Until: 13:00
12:00
-
HoaX (DJ)
Location: Chillout Area
Until: 14:00
13:00
-
Inconspicuous Villain (DJ)
Location: Chillout Area
Until: 15:00 -
Gringo Warrior
Location: Contest Area
Until: 18:00
14:00
-
Simo Sleevin (DJ)
Location: Chillout Area
Until: 16:00
15:00
-
Simon Plexus (DJ)
Location: Chillout Area
Until: 17:00
16:00
-
The Scritch (DJ)
Location: Chillout Area
Until: 18:00
17:00
-
Pool Party - HoaX (DJ)
Location: Pool
Until: 19:00
18:00
-
Pool Party - DJ AMP
Location: Pool
Until: 20:00
19:00
-
Pool Party - Pepse (DJ)
Location: Pool
Until: 21:00 -
White Ball - VJ Q.Alba
Location: Capri 101/102 (Chillout Area)
Until: 21:00 -
2nd Annual Podcaster's Meetup
Location: Skyboxes 207/208
Until: ???
20:00
-
Pool Party - DJ Felix Kay
Location: Pool
Until: 22:00 -
White Ball - Great Scott (DJ)
Location: Capri 101/102 (Chillout Area)
Until: 22:00 -
Hacker Jeopardy
Location: Track 2
Until: ???
21:00
-
Pool Party - 8thNerve
Location: Pool
Until: 23:00 -
White Ball - Undecided (DJ)
Location: Capri 101/102 (Chillout Area)
Until: 23:00
22:00
-
White Ball - Miss DJ Jackalope
Location: Capri 101/102 (Chillout Area)
Until: 24:00
23:00
-
White Ball - TRONA (DJ)
Location: Capri 101/102 (Chillout Area)
Until: 1:00
24:00
-
White Ball - Mumpi (DJ)
Location: Capri 101/102 (Chillout Area)
Until: 2:00
1:00
-
White Ball - Snow Crash (DJ)
Location: Capri 101/102 (Chillout Area)
Until: 3:00
2:00
Sunday, August 2nd
Go to: Speakers / Events
08:00 - 12:00
Registration at Royale Registration Desk - $120 USD CASH ONLY
Get your Official DEF CON Swag at the J!NX Hackwear Booth in the Vendor area.
Vendor Area Hours: 10:00 - 15:00
Track 1
Hello, My Name is /hostname/
Endgrain, Dan Kaminsky and Tiffany Rad Until: 10:50
Track 2
Hacking, Biohacking, and the Future of Humanity
Richard Thieme
Until: 10:50
Track 3
Managed Code Rootkits - Hooking into Runtime Environments
Erez Metula
Until: 10:50
Track 4
Down the Rabbit Hole: Uncovering a Criminal Server
Iftach Ian Amit
Until: 10:50Turbo/Breakout Track
Advanced SQL Injection
Joseph McCray
Until: 10:50
Sunday Speaking Schedule
10:00
-
11:00
Track 1
eXercise in Messaging and Presence Pwnage
Ava Latrope
Until: 11:50Track 2
Hacking Sleep: How to Build Your Very Own Sleep Lab
Ne0nRa1n and Keith Biddulph
Until: 11:50Track 3
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Nick Harbour
Until: 11:50
Track 4
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Marc Weber Tobias, Matt Fiddler and Tobias Bluzmanis
Until: 11:50
Turbo/Breakout Track
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Cody Pollet and George Louthan
Until: 11:20
-
11:30
Track 1
eXercise in Messaging and Presence Pwnage
(continued)Track 2
Hacking Sleep: How to Build Your Very Own Sleep Lab
(continued)Track 3
Win at Reversing: Tracing and Sandboxing through Inline Hooking
(continued)Track 4
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
(continued)Turbo/Breakout Track
Hack The Textbook
Jon R. Kibler and Mike Cooper
Until: 11:50
-
12:00
Track 1
Unmasking You
Joshua "Jabra" Abraham and Robert "RSnake" Hansen
Until: 12:50
Track 2
Good Vibrations: Hacking Motion Sickness on the Cheap
Tottenkoph
Until: 12:50
Track 3
Dradis Framework - Sharing Information will get you Root
etd
Until: 12:50
Track 4
Who Invented the Proximity Card?
Michael L. Davis
Until: 12:50
Turbo/Breakout Track
Wi-Fish Finder: Who Will Bite the Bait
MD Sohail Ahmad and Prabhash Dhyani
Until: 12:20
-
12:30
Track 1
Unmasking You
(continued)Track 2
Good Vibrations: Hacking Motion Sickness on the Cheap
(continued)Track 3
Dradis Framework - Sharing Information will get you Root
(continued)Track 4
Who Invented the Proximity Card?
(continued)Turbo/Breakout Track
Attacks Against 2wire Residential Gateway Routers
Pedro "hkm" Joaquin
Until: 12:50
-
13:00
Track 1
Search And Seizure Explained - They Took My Laptop!
Tyler Pitchford, Esq.
Until: 13:50
Track 2
Your Mind: Legal Status, Rights and Securing Yourself
James "Myrcurial" Arlen and Tiffany Rad
Until: 13:50
Track 3
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Chema Alonso and Jose Palazon "Palako"
Until: 13:50
Track 4
Lockpicking Forensics
Datagram
Until: 13:50Turbo/Breakout Track
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
Damian Finol
Until: 13:20
-
13:30
Track 1
Search And Seizure Explained - They Took My Laptop!
(continued)Track 2
Your Mind: Legal Status, Rights and Securing Yourself
(continued)Track 3
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
(continued)Track 4
Lockpicking Forensics
(continued)Turbo/Breakout Track
AAPL- Automated Analog Telephone Logging
Da Beave and JFalcon
Until: 13:50
-
14:00
Track 1
Hackerspaces: The Legal Bases
RogueClown
Until: 14:50
Track 2
Slight of Mind: Magic and Social Engineering
Mike Murray and Tyler Reguly
Until: 14:50
Track 3
Screen Scraper Tricks: Extracting Data from Difficult Websites
Michael Schrenk
Until: 14:50
Track 4
RAID Recovery: Recover your PORN by Sight and Sound
Scott Moulton
Until: 14:50Turbo/Breakout Track
30k Feet Look at WiFi
Luiz "effffn" Eduardo
Until: 14:50
-
15:00
Track 1
Robot Shark Laser! What Hackerspaces Do
Beth, Noid and Nick Farr
Until: 15:50
Track 2
Confidence Game Theater
cough
Until: 15:50
Track 3
Dangerous Minds: The Art of Guerrilla Data Mining
Mark Ryan Del Moral Talabis
Until: 15:50
Track 4
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
Antonio "Tony" Rucci
Until: 15:50Turbo/Breakout Track
USB Attacks: Fun with Plug & 0wn
Rafael Dominguez Vega
Until: 15:50
-
16:00
Track 1
Introduction to WiMAX Hacking
Goldy and Pierce
Until: 16:50Track 2
Social Zombies: Your Friends Want to Eat Your Brains
Tom Eston and Kevin Johnson
Until: 16:50
Track 3
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High
Matt Weir and Sudhir Aggarwal
Until: 16:50
Track 4
The Psychology of Security Unusability
Peter Gutmann
Until: 16:50Turbo/Breakout Track
De Gustibus, or Hacking your Tastebuds
Sandy Clark "Mouse"
Until: 16:50
-
17:00
Awards Ceremonies hosted by Dark Tangent
-
Skytalks
Location: Skybox 206
Until: 12:00
Sunday Events Schedule
9:00
-
Scavenger Hunt
Location: Contest Area
Until: 12:00 -
World of Warcraft Subversion
Location: Contest Area
Until: 17:00
10:00
-
Closing Ceremonies hosted by The Dark Tangent
Until: 17:50
17:00