Pick your day:
= Demo |
= Tool |
= Exploit
Get the schedule in printable PDF Format
Thursday
10:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Hardware and Trust Security: Explain it like I’m 5
Teddy Reed & Nick Anderson
-
DEF CON 101
Introduction to SDR and the Wireless Village
DaKahuna & satanklawz
11:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Brent White
-
DEF CON 101
Hackers Hiring Hackers - How to Do Things Better
Tottenkoph & IrishMASMS
12:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Zack Fasel
-
DEF CON 101
Panel
13:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Alice and Bob are Really Confused
David Huerta
-
DEF CON 101
Panel
14:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Dr. Phil Polstra
-
DEF CON 101
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Damon Small
15:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Forensic Artifacts From a Pass the Hash Attack
Gerard Laygui
-
DEF CON 101
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
1o57
16:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Sorry, Wrong Number: Mysteries Of The Phone System — Past and Present
"Unregistered436" & "Snide" Owen
-
DEF CON 101
Guests N' Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
Peter Desfigies, Joshua Brierton & Naveed Ul Islam
17:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
John Menerick
-
DEF CON 101
Dark side of the ELF — leveraging dynamic loading to pwn noobs
Alessandro Di Federico & Yan Shoshitaishvil
18:00
-
Track One
-
Track Two
-
Track Three
-
Track Four
Secure Messaging for Normal People
Justin Engler
-
DEF CON 101
Medical Devices: Pwnage and Honeypots
Scott Erven & Mark Collao
Friday
10:00
-
Track One
Tamas Szakaly
-
Track Two
Working together to keep the Internet safe and secure
Alejandro Mayorkas
-
Track three
DT and 1057
-
Track Four
Bugged Files: Is Your Document Telling on You?
Daniel “unicornFurnace” Crowley & Damon Smith
-
DEF CON 101
Chris Sistrunk
11:00
-
Track One
Stagefright: Scary Code in the Heart of Android
Joshua J. Drake
-
Track Two
Licensed to Pwn: The Weaponization and Regulation of Security Research
Panel
-
Track Three
Fighting Back in the War on General Purpose Computers
Cory Doctorow
-
Track Four
Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
Weston Hecker
-
DEF CON 101
Eijah
12:00
-
Track One
Malware in the Gaming Micro-economy
Zack Allen & Rusty Bower
-
Track Two
Licensed to Pwn: The Weaponization and Regulation of Security Research
cont.
-
Track Three
USB Attack to Decrypt Wi-Fi Communications
Jeremy Dorrough
-
Track Four
Confessions of a Professional Cyber Stalker
Ken Westin
-
DEF CON 101
Bruce Schneier
13:00
-
Track One
Insteon' False Security And Deceptive Documentation
Peter Shipley & Ryan Gooler
-
Track Two
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
Samy Kamkar
-
Track Three
Red vs. Blue: Modern Active Directory Attacks & Defense
Sean Metcalf
-
Track Four
Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
Colin O'Flynn
-
DEF CON 101
Applied Intelligence: Using Information That's Not There
Michael Schrenk
14:00
-
Track One
Build a free cellular traffic capture tool with a vxworks based femoto
Yuwei Zheng & Haoqi Shan
-
Track Two
Marc Rogers & Kevin Mahaffey
-
Track Three
Ian Latter
-
Track Four
Cracking Cryptocurrency Brainwallets
Ryan Castellucci
-
DEF CON 101
Hacking SQL Injection for Remote Code Execution on a LAMP stack
Nemus
15:00
-
Track One
How to hack your way out of home detention
AmmonRa
-
Track Two
Low-cost GPS simulator – GPS spoofing by SDR
Lin Huang & Qing Yang
-
Track Three
Eric (XlogicX) Davisson
-
Track Four
Quantum Computers vs. Computers Security
Jean-Philippe Aumasson
-
DEF CON 101
Chellam – a Wi-Fi IDS/Firewall for Windows
Vivek Ramachandran
16:00
-
Track One
HamSammich – long distance proxying over radio
Robert Graham & David Maynor
-
Track Two
Harness: Powershell Weaponization Made Easy (or at least easier)
Rich Kelley
-
Track Three
When the Secretary of State says: “Please Stop Hacking Us…”
David An
-
Track Four
Tell me who you are and I will tell you your lock pattern
Marte Løge
-
DEF CON 101
LTE Recon and Tracking with RTLSDR
Ian Kline
16:30
-
Track One
How to secure the keyboard chain
Paul Amicelli & Baptiste David
-
Track Two
Chris Rock
-
Track Three
Put on your tinfo_t hat if you're my type
miaubiz
-
Track Four
Separating Bots from the Humans
Ryan Mitchell
-
DEF CON 101
Detecting Randomly Generated Strings; A Language Based Approach
Mahdi Namazifar
17:00
-
Track One
When IoT attacks: hacking a Linux-powered rifle
Runa A. Sandvik & Michael Auger
-
Track Two
atlas
-
Track Three
NetRipper - Smart traffic sniffing for penetration testers
Ionut Popescu
-
Track Four
Hack the Legacy! IBM i (aka AS/400) Revealed
Bart Kulach
-
DEF CON 101
Mike Sconzo
18:00
-
Track One
How to Train Your RFID Hacking Tools
Craig Young
-
Track Two
Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities
Daniel Selifonov
-
Track Three
Hooked Browser Meshed-Networks with WebRTC and BeEF
Christian (@xntrik) Frichot
-
Track Four
Breaking SSL Using Time Synchronisation Attacks
Jose Selvi
-
DEF CON 101
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Marina Krotofil & Jason Larsen
19:00
-
Track one
Dr. Phil Polstra
Saturday
10:00
-
Track One
Scared Poopless – LTE and *your* laptop
Mickey Shkatov & Jesse Michael
-
Track Two
Trammel Hudson, Xeno Kovah, Corey Kallenberg
-
Track Three
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
Tom Cross aka Decius & Collin Anderson
-
Track Four
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
Aditya K Sood
-
DEF CON 101
Bruce Potter
11:00
-
Track One
Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging
Yaniv Balmas & Lior Oppenheim
-
Track Two
Machine vs. Machine: Inside DARPA’s Fully Automated CTF
Michael Walker & Jordan Wiens
-
Track Three
'DLL Hijacking' on OS X? #@%& Yeah!
Patrick Wardle
-
Track Four
QARK: Android App Exploit and SCA Tool
Tony Trummer & Tushar Dalvi
-
DEF CON 101
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
Zoz
12:00
-
Track One
Hacking Smart Safes: On the "Brink" of a Robbery
Dan “AltF4” Petro & Oscar Salazar
-
Track Two
F*ck the attribution, show us your .idb!
Morgan Marquis-Boire, Marion Marschalek, Claudio Guarnieri
-
Track Three
I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
Wesley McGrew
-
Track Four
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
Vivek Ramachandran
-
DEF CON 101
Are We Really Safe? - Bypassing Access Control Systems
Dennis Maldonado
13:00
-
Track One
Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service
Colby Moore
-
Track Two
Angry Hacking - the next generation of binary analysis
Yan Shoshitaishvili & Fish Wang
-
Track Three
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Matt Graeber, Willi Ballentin, Claudiu Teodorescu
-
Track Four
From 0 To Secure In 1 Minute — Securing IAAS
Nir Valtman & Moshe Ferber
-
DEF CON 101
It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence
Grant Bugher
14:00
-
Track One
Extracting the Painful (blue)tooth
Matteo Beccaro & Matteo Collura
-
Track Two
Remote exploitation of an unaltered passenger vehicle
Charlie Miller and Chris Valasek
-
Track Three
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
cont.
-
Track Four
BurpKit — Using WebKit to Own the Web
Nadeem Douba
-
DEF CON 101
Abusing XSLT for Practical Attacks
Fernando Arnaboldi
15:00
-
Track One
Looping Surveillance Cameras through Live Editing of Network Streams
Eric Van Albert & Zach Banks
-
Track Two
Hacking Electric Skateboards: Vehicle Research For Mortals
Mike Ryan & Richo Healey
-
Track Three
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
Joshua Smith
-
Track Four
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
Peter Eckersley, James Kasten, & Yan Zhu
-
DEF CON 101
Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers
Saif El-Sherei & Etienne Stalmans
16:00
-
Track One
Colin Cassidy, Éireann Leverett, Robert M. Lee
-
Track Two
I want these * bugs off my * Internet
Dan Kaminsky
-
Track Three
Investigating the Practicality and Cost of Abusing Memory Errors with DNS
Luke Young
-
Track Four
Joe FitzPatrick & Matt King
-
DEF CON 101
How to Shot Web: Web and mobile hacking in 2015
Jason Haddix
17:00
-
Track One
Exploring Layer 2 Network Security in Virtualized Environments
Ronny L. Bull & Jeanna N. Matthews
-
Track Two
Security Necromancy: Further Adventures in Mainframe Hacking
Philip Young & Chad "Bigendian Smalls” Rikansrud
-
Track Three
Andres Blanco & Andres Gazzoli
-
Track Four
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
Richard Thieme
-
DEF CON 101
The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic
Mark Ryan Talabis
18:00
-
Track One
Staying Persistent in Software Defined Networks
Gregory Pickett
-
Track Two
Ask the EFF: The Year in Digital Civil Liberties
Panel
-
Track Three
DEF CON Comedy Inception: How many levels deep can we go?
Panel
-
Track Four
DIY Nukeproofing: a new dig at "data-mining"
3AlarmLampscooter
-
DEF CON 101
Game of Hacks: Play, Hack & Track
Amit Ashbel & Maty Siman
19:00
-
Track One
Contest: Drunk Hacker History
Until 20:20
-
Track Two
Ask the EFF: The Year in Digital Civil Liberties
Cont.
-
Track Three
DEF CON Comedy Inception: How many levels deep can we go?
Cont.
-
Track Four
I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices
LI Jun & YANG Qing
-
DEF CON 101
Linux Containers: Future or Fantasy?
Aaron Grattafiori
Sunday
10:00
-
Track One
Abusing Adobe Reader’s JavaScript APIs
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
-
Track Two
Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
David Mortman
-
Track Three
How to Hack Government: Technologists as Policy Makers
Terrell McSweeny & Ashkan Soltani
-
DEF CON 101
Abusing native Shims for Post Exploitation
Sean Pierce
11:00
-
Track One
Who Will Rule the Sky? The Coming Drone Policy Wars
Matt Cagle & Eric Cheng
-
Track Two
Canary: Keeping Your Dick Pics Safe(r)
Rob Bathurst (evilrob) & Jeff Thomas (xaphan)
-
Track Three
REpsych: Psychological Warfare in Reverse Engineering
Chris Domas
-
DEF CON 101
Ubiquity Forensics - Your iCloud and You
Sarah Edwards
12:00
-
Track One
Knocking my neighbor’s kid’s cruddy drone offline
Michael Robinson
-
Track Two
Pivoting Without Rights – Introducing Pivoter
Geoff Walton & Dave Kennedy
-
Track Three
Stick That In Your (root)Pipe & Smoke It
Patrick Wardle
-
DEF CON 101
Hijacking Arbitrary .NET Application Control Flow
Topher Timzen
13:00
-
Track One
Attacking Hypervisors Using Firmware and Hardware
Yuriy Bulygin
-
Track Two
Omer Coskun
-
Track Three
"Quantum" Classification of Malware
John Seymour
-
DEF CON 101
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
Francis Brown & Shubham Shah
14:00
-
Track One
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
Etienne Martineau
-
Track Two
Let's Talk About SOAP, Baby. Let's Talk About UPNP
Ricky "HeadlessZeke" Lawshae
-
Track Three
Advances in Linux Process Forensics Using ECFS
Ryan O'Neill
-
DEF CON 101
Contest Closing Ceremonies
15:00
-
Track One
Closed for Setup
-
Track Two
Closed for Setup
-
Track Three
Closed for Setup
-
DEF CON 101
Contest Closing Ceremonies
Cont.