skip to main content

DEF CON Hacking Conference

DEF CON 12 Archive

was July 30 - Aug. 1, 2004 at the Alexis Park Hotel & Resort

Speakers & Presentations


A

Weaknesses in Satellite Television Protection Schemes

Read It! (PPT | PDF | SXI ) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Tony Arcieri

PDTP – The Peer Distributed Transfer Protocol

Read It! (PPT) Memo (HTML) See It!(m4v Video) Hear it! (m4b Audio)


Jay Beale

Locking Down Apache

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Adam Bresson

Identification Evasion

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Jamie Butler

VICE—Catch the Hookers!

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Jon Callas

How Do We Get The World To Use Message Security

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Tzi-cker Chiueh

Program Semantics- Aware Intrusion Detection

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Ian Clarke

Freenet: Taming the World's Largest Tamagotchi

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


CrimethInc

Electronic Civil Disobedience and the Republican National Convention

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Greg Conti

Network Attack Visualization

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Gene Cronk

IPv6 Primer

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Michael Davis

The Open Source Security Myth—And How to Make it A Reality

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Dead Addict

Hacking the Media, and avoiding being Hacked by the Media

Read It! (RTF) See It!(m4v Video) Hear it! (m4b Audio)


Dario D. Diaz

DMCA, Then and Now

Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Roger Dingledine

Tor: An Anonymizing Overlay Network For TCP

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Maximillian Dornseif

Far More Than You Ever Wanted To Tell— Hidden Data In Document Formats

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Elonka Dunin

Kryptos and the Cracking of the Cyrillic Projector Cipher

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Charles Edge

Hacking/Security Mac OSX Server aka Wussy Panther

Read It! (PPT) Resources (Edge) See It!(m4v Video) Hear it! (m4b Audio)


D. Egan

MySQL Passwords— Password Strength and Cracking

Read It! (PPT) Resources (GZ) See It!(m4v Video) Hear it! (m4b Audio)


Rakan El-Khalil

Information Hiding in Executable Binaries

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


FX & Halvar Flake

We Can Take It From Here

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Peter D. Feaver & Kenneth Geers

The First International Cyber War

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Seth Fogie

Attacking Windows Mobile PDA’s

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Foofus

Old Tricks

Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Scott Fullam

Introduction to Hardware Hacking

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Geoffrey & Mark Farver

This Space Intentionally Left Blank

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Sarah Gordon

What Do You Mean, Privacy?

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Joe Grand

Advanced Hardware Hacking

Read It! (PPT) Resources (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Rachel Greenstadt

Tools for Censorship Resistance

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Grifter, Russ Rogers & Tierra

Project Prometheus

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Lukas Grunwald

RF-ID and Smart-Labels

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Nathan Hamiel

Down with the RIAA, Musicians Against the Recording Industry

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Seth Hardy

Subliminal Channels In Digital Signatures

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Deral Heiland

The Insecure Workstation

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


h1kari

Smart Card Security

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Thorsten Holz, Maximillian Dornseif, Christian Klein

NoSEBrEaK—Defeating Honeynets

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Cameron “nummish” Hotchkies

Blind SQL Injection Automation Techniques

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


IcE tRe

Virus, Worms and Trojans: Where are we going?

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Robert "hackajar" Imhoff-Dousharm & Jonathan "ripshy" Duncan

Credit Card Networks Revisted: Penetration in Real-Time

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Black Ops of TCP/IP 2004

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Jesse Krembs & Nicholas Farr

The Hacker Foundation

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Adam Laurie & Martin Herfurt

Bluesnarfing—The Risk From Digital Pickpockets

Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


j0hnny long

Google Hacking

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Lucky 225

Phreaking in the Age of Voice Over IP

Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Kevin Mahaffey

Smile, You’re on Candid Camera!

Read It! (RTF) See It!(m4v Video) Hear it! (m4b Audio)


Nick Mathewson

Snake Oil Anonymity

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Rebecca Mercuri & Bev Harris

Hack the Vote: Election 2004

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Doug Mohney

DIGEX—At the Dawn of the Commercial Internet

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Brett Moore

Shoot the Messenger

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Todd Moore

Cracking Net2Phone

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Robert Morris

The History of the Future

See It!(m4v Video) Hear it! (m4b Audio)


Brett Neilson

The Advantages of Being an Amateur

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Ne0nRa1n

Better than Life - Manipulation of The Human Brain With The Use of Machines

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


n0namehere

Real World Privacy, How to Leave Less of A Trail in Life

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Nothingface

Automotive Networks

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Sean O'Toole

Mutating the Mutators

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


Laurent Oudot

Digital Active Self Defense

Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Dr. Larry Ponemon

The DEF CON Surveys

See It!(m4v Video) Hear it! (m4b Audio)


Michael T. Raggo

Steganography, Steganalysis, & Cryptanalysis

Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Michael Rash

Advanced Netfilter; Content Replacement (ala Snort_inline), and Port Knocking Based on Passive OS Fingerprinting

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Len Sassaman

Mixmaster vs. Reliable

Resources (PDF) See It!(m4v Video) Hear it! (m4b Audio)


Jason Scott

Digitizations And Documentary

Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Wendy Seltzer & Seth Schoen

Hacking the Spectrum

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Sensepost

When the Tables Turn

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


The Shmoo Group

Wireless Weaponry

Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)


spoonm & HD Moore

Bubonic Buffer Overflow

Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)


Peter Silberman & Richard Johnson

A Comparison of Buffer Overflow Prevention Implementations and Weaknesses

Read It! (DOC) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Joshua Teitelbaum & Peter Leung

CryptoMail Encrypted E-Mail for All (Including Grandma)

Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Richard Thieme

Quantum Hacking

Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Ian Vitek

Exploring Terminal Services, The Last 12 Month of Research. Or, The Evil Admin And His Tools

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Kathy Wang

Frustrating OS Fingerprinting with Morph

Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Wavyhill & Andre Goldman

Toward a Private Digital Economy

Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Paul Wouters

Windows WaveSEC Deployment

Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)


Panel: Meet the Fed

See It!(m4v Video) Hear it! (m4b Audio)