Pick your day:
= Demo |
= Tool |
= Exploit
Get the schedule in printable PDF Format
Thursday
10:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
Panel
-
DEF CON 101
Data Protection 101 - Successes, Fails, and Fixes
PTzero (Peter Teoh)
11:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
DEFCON 101 - The Talk
continued
-
DEF CON 101
SimonJ
12:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
Paging SDR... Why should the NSA have all the fun?
Xaphan & Noobz
-
DEF CON 101
RF Penetration Testing, Your Air Stinks
RMellendick & DaKahuna
13:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
Protecting SCADA From the Ground Up
AlxRogan
-
DEF CON 101
Beaker
14:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
One Man Shop: Building an Effective Security Program All By Yourself
Medic
-
DEF CON 101
Anatomy of a Pentest; Poppin' Boxes like a Pro
Pushpin
15:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
In the forest of knowledge with 1o57
LosT
-
DEF CON 101
Standing Up an Effective Penetration Testing Team
Wiseacre
16:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
Terrence Gareau & Mike Thompson
-
DEF CON 101
Reverse Engineering Mac Malware
Sarah Edwards
17:00
-
Penn & Teller
-
Track One
-
Track Two
-
Track Three
Major Malfunction and Zac Franken
-
DEF CON 101
Xaphan, Beaker, & Anch
Friday
10:00
-
Penn & Teller
Welcome & Making of the DEF CON Badge
Dark Tangent & LosT
-
Track One
Saving the Internet (for the Future)
Jay Healey
-
Track Two
Domain Name Problems and Solutions
Paul Vixie
-
Track Three
Oracle Data Redaction is Broken
David Litchfield
-
DEF CON 101
Meddle: Framework for piggy-back fuzzing and tool development
Geoff McDonald
11:00
-
Penn & Teller
Steganography in Commonly Used HF Radio Protocols
Paul Drapeau & Brent Dukes
-
Track One
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State
Richard Thieme
-
Track Two
Measuring the IQ of your Threat Intelligence feeds
Alex Pinto & Kyle Maxwell
-
Track Three
Abuse of Blind Automation in Security Tools
Eric (XlogicX) Davisson & Ruben Alejandro (chap0)
-
DEF CON 101
Jesse Michael & Mickey Shkatov
12:00
-
Penn & Teller
The NSA Playset: RF Retroreflectors
Michael Ossmann
-
Track One
How To Get Phone Companies To Just Say No To Wiretapping
Phil Zimmermann
-
Track Two
Stolen Data Markets An Economic and Organizational Assessment
Dr. Thomas Holt, Olga Smirnova, & Yi-Ting Chua
-
Track Three
From root to SPECIAL: Pwning IBM Mainframes
Philip “Soldier of Fortran” Young
-
DEF CON 101
We Wrapped Samba So You Don’t Have To
Lucas Morris & Michael McAtee
12:30
-
Penn & Teller
The NSA Playset: RF Retroreflectors
continued
-
Track One
Phil Zimmerman
continued
-
Track Two
Stolen Data Markets An Economic and Organizational Assessment
continued
-
Track Three
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns
Christopher Campbell
-
DEF CON 101
We Wrapped Samba So You Don’t Have To
continued
13:00
-
Penn & Teller
Hacking US (and UK, Australia, France, etc.) traffic control systems
Cesar Cerrudo
-
Track One
Detecting and Defending Against a Surveillance State
Robert Rowley
-
Track Two
PoS Attacking the Traveling Salesman
Alex Zacharis & Tsagkarakis Nikolaos
-
Track Three
Bypass firewalls, application white lists, secure remote desktops under 20 seconds
Zoltán Balázs
-
DEF CON 101
Investigating PowerShell Attacks
Ryan Kazanciyan & Matt Hastings
14:00
-
Penn & Teller
What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil)
Dustin Hoffman & Thomas (TK) Kinsey
-
Track One
Hacking the FBI: How & Why to Liberate Government Records
Ryan Noah Shapiro
-
Track Two
DefCon Comedy Jam Part VII, Is This The One With The Whales?
Panel
-
Track Three
Extreme Privilege Escalation On Windows 8/UEFI System
Corey Kallenberg & Xeno Kovah
-
DEF CON 101
Client-Side HTTP Cookie Security: Attack and Defense
David Wyde
15:00
-
Penn & Teller
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance
Dr. Phil Polstra
-
Track One
Saving Cyberspace by Reinventing File Sharing
Eijah
-
Track Two
DefCon Comedy Jam Part VII, Is This The One With The Whales?
continued
-
Track Three
Veil-Pillage: Post-exploitation 2.0
Will Schroeder (@harmj0y)
-
DEF CON 101
An Introduction to Back Dooring Operating Systems for Fun and Trolling
Nemus
16:00
-
Penn & Teller
Practical Aerial Hacking & Surveillance
Glenn Wilkinson
-
Track One
Kenneth White & Matthew Green
-
Track Two
Ephemeral Communications: Why and How?
Panel
-
Track Three
Acquire current user hashes without admin privileges
Anton Sapozhnikov
-
DEF CON 101
Blinding The Surveillance State
Christopher Soghoian
17:00
-
Penn & Teller
-
Track One
Ladar Levison & Stephen Watt
-
Track Two
From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
Tess Schrodinger
-
Track Three
Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go?
David Dorsey
-
DEF CON 101
Diversity in Information Security
Panel
17:30
-
Penn & Teller
-
Track One
Dark Mail
Continued
-
Track Two
From Raxacoricofallapatorius With Love: Case Studies In Insider Threat
Continued
-
Track Three
Christopher Campbell
-
DEF CON 101
Diversity in Information Security
Continued
18:00
-
Penn & Teller
-
Track One
-
Track Two
A journey to protect points-of-sale
Nir Valtman
-
Track Three
-
DEF CON 101
Saturday
10:00
-
Penn & Teller
The Cavalry Year[0] & a Path Forward for Public Safety
Joshua Corman & Nicholas J Percoco
-
Track One
Hack All The Things: 20 Devices in 45 Minutes
CJ Heres, Amir Etemadieh, Mike Baker, & Hans Nielsen
-
Track Two
Hacking 911: Adventures in Disruption, Destruction, and Death
Christian “quaddi” Dameff, Jeff “r3plicant” Tully & Peter Hefley
-
Track Three
Mass Scanning the Internet: Tips, Tricks, Results
Robert Graham, Paul McMillan, & Dan Tentler
-
DEF CON 101
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter!
Jake Kouns & Carsten Eiram
11:00
-
Penn & Teller
Zoz
-
Track One
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right
Mark Stanislav & Zach Lanier
-
Track Two
Maggie Jauregui
-
Track Three
I Hunt TR-069 Admins: Pwning ISPs Like a Boss
Shahar Tal
-
DEF CON 101
Nir Valtman
12:00
-
Penn & Teller
Summary of Attacks Against BIOS and Secure Boot
Yuriy Bulygin, Oleksandr Bazhaniuk , Andrew Furtak & John Loucaides
-
Track One
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords>
Zack Fasel
-
Track Two
Cyberhijacking Airplanes: Truth or Fiction?
Dr. Phil Polstra & Captain Polly
-
Track Three
Don't DDoS Me Bro: Practical DDoS Defense
Blake Self & Shawn "cisc0ninja" Burrell
-
DEF CON 101
How to Disclose an Exploit Without Getting in Trouble
Jim Denaro & Tod Beardsley
13:00
-
Penn & Teller
Dan Kaminsky
-
Track One
PropLANE: Kind of keeping the NSA from watching you pee
Rob Bathurst, Russ Rogers, Mark Carey, & Ryan Clarke
-
Track Two
Scott Erven & Shawn Merdinger
-
Track Three
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring
Alex Pinto
-
DEF CON 101
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively
Wesley McGrew
14:00
-
Penn & Teller
Secure Random by Default
Continued
-
Track One
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It
Felix Leder
-
Track Two
Just What The Doctor Ordered?
Continued
-
Track Three
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring
Ryan Lackey, Marc Rogers, & theGrugq
-
DEF CON 101
The Monkey in the Middle: A pentesters guide to playing in traffic.
Anch
15:00
-
Penn & Teller
Advanced Red Teaming: All Your Badges Are Belong To Us
Eric Smith & Josh Perrymon
-
Track One
A Survey of Remote Automotive Attack Surfaces
Charlie Miller & Chris Valasek
-
Track Two
Impostor — Polluting Tor Metadata
Charlie Vedaa & Mike Larsen
-
Track Three
VoIP Wars: Attack of the Cisco Phones
Fatih Ozavci
-
DEF CON 101
Detecting Bluetooth Surveillance Systems
Grant Bugher
15:30
-
Penn & Teller
Advanced Red Teaming: All Your Badges Are Belong To Us
Continued
-
Track One
A Survey of Remote Automotive Attack Surfaces
Continued
-
Track Two
Check Your Fingerprints: Cloning the Strong Set
Richard Klafter (Free) & Eric Swanson (Lachesis)
-
Track Three
VoIP Wars: Attack of the Cisco Phones
Continued
-
DEF CON 101
Detecting Bluetooth Surveillance Systems
Continued
16:00
-
Penn & Teller
Manna from Heaven: Improving the state of wireless rogue AP attacks
Dominic White & Ian de Villiers
-
Track One
Jesus Molina
-
Track Two
Panel: Ask the EFF: The Year in Digital Civil Liberties
Kurt Opsahl, Nate Cardozo, Mark Jaycox, Yan Zhu, & Eva Galperin
-
Track Three
Abusing Software Defined Networks
Gregory Pickett
-
DEF CON 101
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
Metacortex & Grifter
16:30
-
Penn & Teller
Manna from Heaven: Improving the state of wireless rogue AP attacks
Continued
-
Track One
Raspberry MoCA - A recipe for compromise
Andrew Hunt
-
Track Two
Panel: Ask the EFF: The Year in Digital Civil Liberties
Continued
-
Track Three
Abusing Software Defined Networks
Continued
-
DEF CON 101
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin
Continued
17:00
-
Penn & Teller
-
Track One
Attacking the Internet of Things using Time
Paul McMillan
-
Track Two
Panel: Ask the EFF: The Year in Digital Civil Liberties
Continued
-
Track Three
Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse
Brady Bloxham
-
DEF CON 101
DEF CON the Mystery, Myth and Legend?
Panel
18:00
-
Penn & Teller
-
Track One
-
Track Two
Major Malfunction
-
Track Three
Panel — Surveillance on the Silver Screen- Fact or Fiction?
Nicole Ozer, Kevin Bankston, & Timothy Edgar
-
DEF CON 101
Sunday
10:00
-
Penn & Teller
-
Track One
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute
Weston Hecker
-
Track Two
Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog
Gene Bransfield
-
Track Three
I am a legend: Hacking Hearthstone with machine learning
Elie Bursztein & Celine Bursztein
-
DEF CON 101
"Around the world in 80 cons” - A Perspective
Jayson E. Street
11:00
-
Penn & Teller
-
Track One
NSA Playset: DIY WAGONBED Hardware Implant over I2C
Josh Datko & Teddy Reed
-
Track Two
Optical Surgery; Implanting a DropCam
Patrick Wardle & Colby Moore
-
Track Three
Through the Looking-Glass, and What Eve Found There
Luca "kaeso" Bruno & Mariano "emdel" Graziano
-
DEF CON 101
Michael Schrenk
12:00
-
Penn & Teller
-
Track One
Pierce & Loki
-
Track Two
John Menerick
-
Track Three
Catching Malware En Masse: DNS and IP Style
Dhia Mahjoub, Thibault Reuille, & Andree Toonk
-
DEF CON 101
Dropping Docs on Darknets: How People Got Caught
Adrian Crenshaw
13:00
-
Penn & Teller
-
Track One
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer
Brian Gorenc & Matt Molinyawe
-
Track Two
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
Joe "Kingpin" Grand
-
Track Three
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Shane Macaulay
-
DEF CON 101
Home Alone with localhost: Automating Home Defense
Chris Littlebury
13:30
-
Penn & Teller
-
Track One
Playing with Car Firmware or How to Brick your Car
Paul Such 0x222 & Agix
-
Track Two
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering
Continued
-
Track Three
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System
Continued
-
DEF CON 101
Home Alone with localhost: Automating Home Defense
Continued
14:00
-
Penn & Teller
-
Track One
Empowering Hackers to Create a Positive Impact
Keren "k3r3n3" Elazari
-
Track Two
Joe FitzPatrick & Miles Crabill
-
Track Three
Generating ROP payloads from numbers
Alexandre Moneger
-
DEF CON 101
Android Hacker Protection Level 0
Tim Strazzere & Jon Sawyer
15:00
-
Penn & Teller
-
Track One
Elevator Hacking - From the Pit to the Penthouse
Deviant Ollam & Howard Payne
-
Track Two
Contests Awards Ceremony
-
Track Three
Shellcodes for ARM: Your Pills Don't Work on Me, x86
Svetlana Gaivoronski & Ivan Petrov
-
DEF CON 101
Is This Your Pipe? Hijacking the Build Pipeline
Kyle Kelley & Greg Anderson
16:30
-
Penn & Teller
-
Track One
-
Track Two
DEF CON Closing Ceremonies
-
Track Three
DEF CON Closing Ceremonies
-
DEF CON 101