Enormous Speaker Update! First DC101 Talks Revealed!
Posted 5.23.14
Hot off the presses - more speaker selections. Several of them are for the DEF CON 101 Track, newly expanded for DC 22 and running all the way through the con. The rest of the presentations listed here fall into the other tracks, and if we do say so ourselves, this is shaping up to be quite the year, hackwise. You’re definitely going to want to make sure you have a seat for some of these. The titles alone should tell you we’re coming correct in 2014.
New Presentations
The Simple Route to Backbone Routers
Luca "kaeso" Bruno and Mariano "emdel" Graziano
Summary of Attacks Against BIOS and Secure Boot
Yuriy Bulygin, Oleksandr Bazhaniuk, Andrew Furtak, and John Loucaides
Saving Cyberspace by Reinventing File Sharing
Eijah
Secure Random By Default
Dan Kaminsky
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.
Ryan Lackey and Marc Rogers
Just What The Doctor Ordered?
Scott Erven and Shawn Merdinger
NSA Playset : GSM Sniffing
Pierce and Loki
Don't DDoS Me Bro: Practical DDoS Defense
Blake Self and Shawn "cisc0ninja" Burrell
"Around the world in 80 cons” - A Perspective
Jayson E. Street
DEF CON 101 Presentations!
Now running Thurdsay through Sunday!
The DEF CON 101 track is a series of talks aimed at attendees who are not yet internationally-recognized infosec experts. This is not the n00b track. But if you're interested and engaged in the hacker community, these sessions are right up your alley. From Sysadmins & NOC Jockeys to College Students & IT Professionals, everyone exploring the world of Information Security can expect to feel welcome, not intimidated. We have grouped the sessions by interest area, so you're not spending all day bouncing between talks.
DEF CON 101 - The Talk
HighWiz, Lockheed, Pyr0, Roamer, and LosT
Protecting SCADA From the Ground Up
AlxRogan
Hacking 911: Adventures in Disruption, Destruction, and Death
Christian “quaddi” Dameff, Jeff “r3plicant” Tully, and Peter Hefley
How to Disclose an Exploit Without Getting in Trouble
Jim Denaro and Tod Beardsley
NSA Playset: PCIe
Joe FitzPatrick, Miles Crabill, and Dean Pierce
Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations
Terrence Gareau and Mike Thompson
The Monkey in the Middle: A pentesters guide to playing in traffic.
Anch
Investigating PowerShell Attacks
Ryan Kazanciyan and Matt Hastings
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
Jake Kouns and Carsten Eiram
Meddle: Framework for Piggy-back Fuzzing and Tool Development
Geoff McDonald
One Man Shop: Building an Effective Security Program All By Yourself
Medic
Rf Penetration Testing, Your Air Stinks
RMellendick and DaKahuna
Touring the Darkside of the Internet. An introduction to Tor, Darknets, and Bitcoin.
Metacortex and Grifter
USB for All!
Jesse Michael and Mickey Shkatov
ShareEnum: We Wrapped Samba So You Don’t Have To
Lucas Morris and Michael McAtee
An Introduction to Back Dooring Operating Systems for Fun and Trolling
Nemus
Standing Up an Effective Penetration Testing Team
Wiseacre
Data Protection 101 - Successes, Fails, and Fixes
PTzero
Anatomy of a Pentest; Poppin' Boxes like a Pro
PushPin
Practical Foxhunting 101
SimonJ
Blinding The Surveillance State
Christopher Soghoian
Bug Bounty Programs Evolution
Nir Valtman
Client-Side HTTP Cookie Security: Attack and Defense
David Wyde