Pick a day:
= Demo |
= Tool |
= Exploit
Printable schedule coming soon, this version of the schedule is subject to change at any time.
Thursday
10:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Machine Duping 101: Pwning Deep Learning Systems
Clarence Chio
11:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Maelstrom - Are You Playing with a Full Deck?...
Shane Steiger
12:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Beyond the MCSE: Red Teaming Active Directory
Sean Metcalf
13:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Nicholas Rosario (MasterChen)
14:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Realtime bluetooth device detection with Blue Hydra
Zero_Chaos & Granolocks
15:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
Hacker Fundamentals and Cutting Through Abstraction
LosT
16:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
DC101
17:00
-
Track One
-
Track Two
-
Track Three
-
DEF CON 101
DEF CON 101 Panel
Cont.
Friday
10:00
-
Track One
Feds and 0Days: From Before Heartbleed to After FBI-Apple
Jay Healey
-
Track Two
DARPA Cyber Grand Challenge Award Ceremony
Mike Walker & Dr. Arati Prabhakar
-
Track Three
Introduction the Wichcraft Compiler Collection : Towards universal code theft
Jonathan Brossard (endrazine)
-
DEF CON 101
BSODomizer HD: A mischievous FPGA and HDMI platform for the (m)asses
Joe Grand (Kingpin)&Zoz
11:00
-
Track One
Compelled Decryption - State of the Art in Doctrinal Perversions
Ladar Levison
-
Track Two
Mudge Zatko &Sarah Zatko
-
Track Three
L0sT & The Dark Tangent
-
DEF CON 101
Jonathan Mayer & Panel
12:00
-
Track One
Honey Onions: Exposing Snooping Tor HSDir Relays Guevara Noubir & Amirali Sanatinia
-
Track Two
BlockFighting with a Hooker -- BlockfFghter2!
K2
-
Track Three
Javier Vazquez Vidal &Ferdinand Noelscher
-
DEF CON 101
411: A framework for managing security alerts
Kai Zhong
12:30
-
Track One
Dr. Paul Vixie
-
Track Two
BlockFighting with a Hooker -- BlockfFghter2!
Cont.
-
Track Three
Cheap Tools for Hacking Heavy Trucks
Six_Volts &Haystack
-
DEF CON 101
411: A framework for managing security alerts
Cont.
13:00
-
Track One
Research on the Machines: Help the FTC Protect Privacy & Security
Terrell McSweeny & Lorrie Cranor
-
Track Two
(Ab)using Smart Cities: the dark age of modern mobility
Matteo Beccaro & Matteo Collura
-
Track Three
How to Make Your Own DEF CON Black Badge
Badge Hacker Panel
-
DEF CON 101
Sentient Storage - Do SSDs Have a Mind of Their Own?
Tom Kopchak
14:00
-
Track One
How to design distributed systems resilient despite malicious participants
Radia Perlman
-
Track Two
A Monitor Darkly: Reversing and Exploiting Ubiquitous...
Ang Cui
-
Track Three
Direct Memory Attack the Kernel
Ulf Frisk
-
DEF CON 101
int0x80
15:00
-
Track One
How To Remote Control An Airliner: Security Flaws in Avionics
Sebastian Westerhold
-
Track Two
Slouching Towards Utopia: The State of the Internet Dream
Jennifer S. Granick
-
Track Three
The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering
Amro Abdelgawad
-
DEF CON 101
NPRE - Eavesdropping on the Machines
Tim "t0rch" Estell & Katea Murray
16:00
-
Track One
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
Allan Cecil (dwangoAC)
-
Track Two
Side-channel attacks on high-security electronic safe locks
Plore
-
Track Three
Breaking the Internet of Vibrating Things...
follower & goldfisk
-
DEF CON 101
101 Ways to Brick your Hardware
Joe FitzPatrick & Joe Grand
16:30
-
Track One
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
Cont.
-
Track Two
Samsung Pay: Tokenized Numbers, Flaws and Issues
Salvador Mendoza
-
Track Three
Kor Adana, Dark Tangent, & Marc Rogers
-
DEF CON 101
101 Ways to Brick your Hardware
Cont.
17:00
-
Track One
Hacking Next-Gen ATM's From Capture to Cashout.
Weston Hecker
-
Track Two
Sk3wlDbg: Emulating all (well many) of the things with Ida
Chris Eagle
-
Track Three
Mr. Robot Panel
Cont.
-
DEF CON 101
Malware Command and Control Channels: A journey into darkness
Brad Woodberg
20:00
-
Track One
until 22:00
-
Track Two
-
Track Three
-
DEF CON 101
Saturday
10:00
-
Track One
Chris Rock
-
Track Two
I Fight For The Users, Episode I - Attacks Against Top Consumer Products
Zack Fasel & Erin Jacobs
-
Track Three
Developing Managed Code Rootkits for the Java Runtime Environment
Benjamin Holland (daedared)
-
DEF CON 101
Escaping The Sandbox By Not Breaking It
Marco Grassi & Qidan He
11:00
-
Track One
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker
Evan Booth (Fort)
-
Track Two
Light-Weight Protocol! Serious Equipment! Critical Implications!
Lucas Lundgren & Neal Hindocha
-
Track Three
Picking Bluetooth Low Energy Locks from a Quarter Mile Away
Anthony Rose & Ben Ramsey
-
DEF CON 101
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
Wesley McGrew
12:00
-
Track One
Bypassing Captive Portals and Limited Networks
Grant Bugher
-
Track Two
Stargate: Pivoting Through VNC To Own Internal Networks
Yonathan Klijnsma & Dan Tentler
-
Track Three
CANSPY: A Framework for Auditing CAN Devices
Jonathan-Christofer Demay & Arnaud Lebrun
-
DEF CON 101
Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5
Luke Young
12:30
-
Track One
Retweet to win: How 50 lines of Python made me the luckiest guy on Twitter
Hunter Scott
-
Track Two
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle
Brad Dixon
-
Track Three
CANSPY: A Framework for Auditing CAN Devices
Cont.
-
DEF CON 101
Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5
Cont.
13:00
-
Track One
Six Degrees of Domain Admin ...
Andy Robbins, Rohan Vazarkar, Will Schroeder
-
Track Two
MouseJack: Injecting Keystrokes into Wireless Mice
Marc Newlin
-
Track Three
Cunning with CNG: Soliciting Secrets from Schannel
Jake Kambic
-
DEF CON 101
NG9-1-1: The Next Generation of Emergency Ph0nage
CINCVolFLT & AK3R303
14:00
-
Track One
Weaponizing Data Science for Social Engineering: Automated E2E spear phishing on Twitter
Delta Zero & KingPhish3r
-
Track Two
Universal Serial aBUSe: Remote physical access attacks
Rogan Dawes & Dominic White
-
Track Three
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities
Brian Gorenc & Fritz Sands
-
DEF CON 101
SITCH - Inexpensive, Coordinated GSM Anomaly Detection
ashmastaflash
15:00
-
Track One
Forcing a Targeted LTE Cellphone into Unsafe Network
Haoqi Shan & Wanqiao Zhang
-
Track Two
Playing Through the Pain? - The Impact of Secrets and Dark Knowledge
Richard Thieme
-
Track Three
Exploiting and attacking seismological networks.. remotely
Bertin Bervis Bonilla & James Jara
-
DEF CON 101
Phishing without Failure and Frustration
Jay Beale
16:00
-
Track One
"Cyber" Who Done It?! Attribution Analysis Through Arrest History
Jake Kouns
-
Track Two
DIY Nukeproofing: a new dig at "data-mining"
3AlarmLampScooter
-
Track Three
I've got 99 Problems, but LittleSnitch ain't one
Patrick Wardle
-
DEF CON 101
A Journey Through Exploit Mitigation Techniques in iOS
Max Bazaliy
16:30
-
Track One
"Cyber" Who Done It?! Attribution Analysis Through Arrest History
Cont.
-
Track Two
All Your Solar Panels are belong to Me
Fred Bret-Mounet
-
Track Three
Panel
-
DEF CON 101
Willa Cassandra Riggins(abyssknight)
17:00
-
Track One
Drunk Hacker History: Hacker Stories Powered by C2H6O for Fun & Profit
Panel
-
Track Two
Abusing Bleeding Edge Web Standards for AppSec Glory
Bryant Zadegan & Ryan Lester
-
Track Three
Nate Cardozo
-
DEF CON 101
Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think
Linuz & Medic
17:30
-
Track One
Drunk Hacker History: Hacker Stories Powered by C2H6O for Fun & Profit
Cont.
-
Track Two
Abusing Bleeding Edge Web Standards for AppSec Glory
Cont.
-
Track Three
Crypto State of the Law
Cont.
-
DEF CON 101
Propaganda and you (and your devices)...
The Bob Ross Fan Club
20:00
-
Track One
until 22:00
-
Track Two
-
Track Three
-
DEF CON 101
Sunday
10:00
-
Track One
How to do it Wrong: Smartphone Antivirus and Security Applications Under Fire
Stephan Huber & Siegfried Rasthofer
-
Track Two
Hacking Hotel Keys and Point of Sale systems ...
Weston Hecker
-
Track Three
Examining the Internet's pollution
Karyn Benson
-
DEF CON 101
How to get good seats in the security theater? Hacking boarding passes for fun & profit.
Przemek Jaroszewski
11:00
-
Track One
Hiding Wookiees in HTTP - HTTP smuggling...
regilero
-
Track Two
Discovering and Triangulating Rogue Cell Towers
JusticeBeaver
-
Track Three
Use Their Machines Against Them: Loading Code with a Copier
Mike
-
DEF CON 101
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game
Joshua Drake & Steve Christey Coley
12:00
-
Track One
Attacking BaseStations - an Odyssey through a Telco's Network
Hendrik Schmidt & Brian Butterly
-
Track Two
Let's Get Physical: Network Attacks Against Physical Security Systems
Ricky "HeadlessZeke" Lawshae
-
Track Three
Game over, man! - Reversing Video Games to Create an Unbeatable AI Player
Dan "AltF4" Petro
-
DEF CON 101
So you think you want to be a penetration tester
Anch
13:00
-
Track One
Can You Trust Autonomous Vehicles: Contactless Attacks ...
Jianhao Liu,Wenyuan Xu,Chen Yan
-
Track Two
Drones Hijacking - multi-dimensional attack vectors & countermeasures
Aaron Luo
-
Track Three
Jmaxxz
-
DEF CON 101
Mouse Jiggler Offense and Defense
Dr. Phil
14:00
-
Track One
Tamas Szakaly
-
Track Two
An introduction to Pinworm: man in the middle for your metadata
bigezy & saci
-
Track Three
VLAN hopping, ARP poisoning & MITM Attacks in Virtualized Environments
Ronny Bull, Dr. Jeanna N. Matthews, Ms. Kaitlin A. Trumbull
-
DEF CON 101
Toxic Proxies - Bypassing HTTPS & VPNs to pwn your online identity
Alex Chapman & Paul Stone
15:00
-
Track One
Adam Donenfeld
-
Track Two
Shellphish Panel
-
Track Three
Platform Agnostic Kernel Fuzzing
James Loureiro & Georgi Geshev
-
DEF CON 101
Auditing 6LoWPAN Networks using Standard Penetration Testing Tools
Jonathan-Christofer Demay, Adam Reziouk, & Arnaud Lebrun
16:30
-
Track One
Closing Ceremonies
-
Track Two
Closing Ceremonies
-
Track Three
Closing Ceremonies
-
DEF CON 101