-
Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
Was August 6th-9th, 2015 at Paris & Bally's Hotels
Speakers & Presentations
DEF CON 101 Presentations
Mike Petruzzi (wiseacre), Nikita Kronenberg, PushPin, Plug, Russ Rogers
DEF CON 101: The Panel.
See it! (Speaker & Slides | Slides Video | Video)
David An
When the Secretary of State says: “Please Stop Hacking Us…”
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Amit Ashbel, Maty Siman : UPDATED :
Game of Hacks: Play, Hack & Track
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Fernando Arnaboldi : UPDATED :
Abusing XSLT for Practical Attacks
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Francis Brown, Shubham Shah
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
See it! (Speaker & Slides | Slides Video | Video)
Grant Bugher
It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
DaKahuna, satanklawz
Introduction to SDR and the Wireless Village
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Peter Desfigies, Joshua Brierton, Naveed Ul Islam
Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
Read It! (PDF | TXT)
See it! (Speaker & Slides | Slides Video | Video)
Peter Eckersley, James Kasten, Yan Zhu
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
See it! (Speaker & Slides | Slides Video | Video)
Sarah Edwards
Ubiquity Forensics - Your iCloud and You
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Eijah
Crypto for Hackers
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Saif El-Sherei, Etienne Stalmans
Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Justin Engler
Secure Messaging for Normal People
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Zack Fasel
Seeing through the Fog
See it! (Speaker & Slides | Slides Video | Video)
Aaron Grattafiori : UPDATED :
Linux Containers: Future or Fantasy?
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Jason Haddix
How to Shot Web: Web and mobile hacking in 2015
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
David Huerta
Alice and Bob are Really Confused
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ian Kline
LTE Recon and Tracking with RTLSDR
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Gerard Laygui
Forensic Artifacts From a Pass the Hash Attack
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
LI Jun, YANG Qing
I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Dennis Maldonado : UPDATED :
Are We Really Safe? - Bypassing Access Control Systems
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
"Unregistered436" Patrick McNeil, "Snide" Owen
Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
John Menerick
Backdooring Git
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Nemus : UPDATED :
Hacking SQL Injection for Remote Code Execution on a LAMP stack
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Sean Pierce
Abusing native Shims for Post Exploitation
See it! (Speaker & Slides | Slides Video | Video)
Dr. Phil Polstra
Hacker in the Wires
Read It! (PDF | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Bruce Potter
A Hacker’s Guide to Risk
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Vivek Ramachandran
Chellam – a Wi-Fi IDS/Firewall for Windows
See it! (Speaker & Slides | Slides Video | Video)
Teddy Reed, Nick Anderson
Hardware and Trust Security: Explain it like I’m 5
See it! (Speaker & Slides | Slides Video | Video)
Bruce Schneier
Bruce Schneier Q&A
See it! (Speaker & Slides | Slides Video | Video)
Michael Schrenk : UPDATED :
Applied Intelligence: Using Information That's Not There
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Mike Sconzo
I Am Packer And So Can You
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Chris Sistrunk
NSM 101 for ICS
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Damon Small
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Mark Ryan Talabis
The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Topher Timzen : UPDATED :
Hijacking Arbitrary .NET Application Control Flow
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Tottenkoph, IrishMASMS
Hackers Hiring Hackers - How to Do Things Better
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Tony Trummer, Tushar Dalvi
QARK: Android App Exploit and SCA Tool
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Brent White
Hacking Web Apps
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Zoz
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
See it! (Speaker & Slides | Slides Video | Video)
Presentations
Zack Allen, Rusty Bower
Malware in the Gaming Micro-economy
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Paul Amicelli, Baptiste David
How to secure the keyboard chain
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
AmmonRa : UPDATED :
How to hack your way out of home detention
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
atlas
Fun with Symboliks
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Jean-Philippe Aumasson
Quantum Computers vs. Computers Security
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Yaniv Balmas, Lior Oppenheim
Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Rob Bathurst (evilrob), Jeff Thomas (xaphan)
Canary: Keeping Your Dick Pics Safe(r)
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Matteo Beccaro, Matteo Collura
Extracting the Painful (blue)tooth
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Andres Blanco, Andres Gazzoli : UPDATED :
802.11 Massive Monitoring
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ronny L. Bull, Jeanna N. Matthews : UPDATED :
Exploring Layer 2 Network Security in Virtualized Environments
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Yuriy Bulygin, Mikhail Gorobets, Alexander Matrosov, Oleksandr Bazhaniuk, Andrew Furtak
Attacking Hypervisors Using Firmware and Hardware
See it! (Speaker & Slides | Slides Video | Video)
Matt Cagle, Eric Cheng
Who Will Rule the Sky? The Coming Drone Policy Wars
See it! (Speaker & Slides | Slides Video | Video)
Colin Cassidy, Éireann Leverett, Robert M. Lee
Switches Get Stitches
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ryan Castellucci
Cracking Cryptocurrency Brainwallets
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Benjamin Caudill
Paranoia and ProxyHam: High-Stakes Anonymity on the Internet
-->
Omer Coskun : UPDATED :
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Daniel “unicornFurnace” Crowley, Damon Smith
Bugged Files: Is Your Document Telling on You?
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Tom Cross aka Decius, Collin Anderson
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Eric (XlogicX) Davisson
REvisiting RE:DoS
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Jim Denaro, Dave Aitel, Matt Blaze, Nate Cardozo, Mara Tam, Catherine “Randy” Wheeler
Licensed to Pwn: The Weaponization and Regulation of Security Research
See it! (Speaker & Slides | Slides Video | Video)
Alessandro Di Federico, Yan Shoshitaishvili
Dark side of the ELF - leveraging dynamic loading to pwn noobs
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Cory Doctorow
Fighting Back in the War on General Purpose Computers
See it! (Speaker & Slides | Slides Video | Video)
Chris Domas
REpsych: Psychological Warfare in Reverse Engineering
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Jeremy Dorrough
USB Attack to Decrypt Wi-Fi Communications
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Nadeem Douba
BurpKit - Using WebKit to Own the Web
Read It! (PDF | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Joshua J. Drake : UPDATED :
Stagefright: Scary Code in the Heart of Android
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Scott Erven, Mark Collao
Medical Devices: Pwnage and Honeypots
See it! (Speaker & Slides | Slides Video | Video)
Joe FitzPatrick, Matt King : UPDATED :
NSA Playset: JTAG Implants
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
fluxist
Unbootable: Exploiting the PayLock SmartBoot Vehicle Immobilizer
-->
Christian (@xntrik) Frichot
Hooked Browser Meshed-Networks with WebRTC and BeEF
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
Abusing Adobe Reader’s JavaScript APIs
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Matt Graeber, Willi Ballenthin, Claudiu Teodorescu
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Robert Graham, David Maynor
HamSammich – long distance proxying over radio
See it! (Speaker & Slides | Slides Video | Video)
Weston Hecker
Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Lin Huang, Qing Yang
Low-cost GPS simulator – GPS spoofing by SDR
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Dan Kaminsky
I want these * bugs off my * Internet
See it! (Speaker & Slides | Slides Video | Video)
Samy Kamkar
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
Read It! (TXT | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Rich Kelley
Harness: Powershell Weaponization Made Easy (or at least easier)
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Trammel Hudson, Xeno Kovah, Corey Kallenberg
ThunderStrike 2: Sith Strike
See it! (Speaker & Slides | Slides Video | Video)
Marina Krotofil, Jason Larsen : UPDATED :
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Bart Kulach (Bartlomiej Jakub Kulach)
Hack the Legacy! IBM i (aka AS/400) Revealed.
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ian Latter
Remote Access, the APT
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ricky "HeadlessZeke" Lawshae
Let's Talk About SOAP, Baby. Let's Talk About UPNP
Read It! (PDF | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Marte Løge : UPDATED :
Tell me who you are and I will tell you your lock pattern
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
LosT
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
See it! (Speaker & Slides | Slides Video | Video)
Morgan Marquis-Boire, Marion Marschalek, Claudio Guarnieri
F*ck the attribution, show us your .idb!
See it! (Speaker & Slides | Slides Video | Video)
Etienne Martineau
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Alejandro Mayorkas
Working together to keep the Internet safe and secure
See it! (Speaker & Slides | Slides Video | Video)
Wesley McGrew
I Hunt Penetration Testers: More Weaknesses in Tools and Procedures
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Terrell McSweeny, Ashkan Soltani
How to Hack Government: Technologists as Policy Makers
See it! (Speaker & Slides | Slides Video | Video)
Sean Metcalf : UPDATED :
Red vs. Blue: Modern Active Directory Attacks & Defense
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
miaubiz
Put on your tinfo_t hat if you're my type
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Charlie Miller, Chris Valasek
Remote Exploitation of an Unaltered Passenger Vehicle
See it! (Speaker & Slides | Slides Video | Video)
Ryan Mitchell
Separating Bots from the Humans
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Colby Moore
Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
David Mortman
Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Mahdi Namazifar
Detecting Randomly Generated Strings; A Language Based Approach
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Colin O'Flynn
Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ryan O'Neill
Advances in Linux Process Forensics Using ECFS
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Kurt Opsahl, Nate Cardozo, Mark Jaycox, Corynne McSherry, Nadia Kayyali, Peter Eckersley
Ask the EFF: The Year in Digital Civil Liberties
See it! (Speaker & Slides | Slides Video | Video)
Larry Pesce, Chris Sistrunk, Will "illwill" Genovese, Chris Blow, Dan Tentler, Amanda Berlin
DEF CON Comedy Inception: How many levels deep can we go?
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Dan “AltF4” Petro, Oscar Salazar
Hacking Smart Safes: On the "Brink" of a Robbery
See it! (Speaker & Slides | Slides Video | Video)
Gregory Pickett
Staying Persistent in Software Defined Networks
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Dr. Phil Polstra
One Device to Pwn Them All
Read It! (PDF | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Ionut Popescu
NetRipper - Smart traffic sniffing for penetration testers
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Vivek Ramachandran
Chigula — a framework for Wi-Fi Intrusion Detection and Forensics
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Michael Robinson : UPDATED :
Knocking my neighbor’s kid’s cruddy drone offline
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Chris Rock
I Will Kill You
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Marc Rogers, Kevin Mahaffey
How to Hack a Tesla Model S
See it! (Speaker & Slides | Slides Video | Video)
Mike Ryan, Richo Healey
Hacking Electric Skateboards: Vehicle Research For Mortals
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Runa A. Sandvik, Michael Auger
When IoT attacks: hacking a Linux-powered rifle
See it! (Speaker & Slides | Slides Video | Video)
Daniel Selifonov
Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Jose Selvi
Breaking SSL Using Time Synchronisation Attacks
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
John Seymour : UPDATED :
"Quantum" Classification of Malware
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Peter Shipley, Ryan Gooler
Insteon' False Security And Deceptive Documentation
See it! (Speaker & Slides | Slides Video | Video)
Mickey Shkatov, Jesse Michael : UPDATED :
Scared Poopless – LTE and *your* laptop
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Yan Shoshitaishvili, Fish Wang
Angry Hacking - the next generation of binary analysis
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Joshua Smith : UPDATED :
High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Aditya K Sood
Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities
See it! (Speaker & Slides | Slides Video | Video)
Tamas Szakaly : UPDATED :
Shall We Play a Game?
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
3AlarmLampscooter
DIY Nukeproofing: a new dig at "data-mining"
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Richard Thieme
Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0
See it! (Speaker & Slides | Slides Video | Video)
Nir Valtman, Moshe Ferber : UPDATED :
From 0 To Secure In 1 Minute — Securing IAAS
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Eric Van Albert, Zach Banks
Looping Surveillance Cameras through Live Editing of Network Streams
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Michael Walker, Jordan Wiens
Machine vs. Machine: Inside DARPA’s Fully Automated CTF
See it! (Speaker & Slides | Slides Video | Video)
Geoff Walton, Dave Kennedy
Pivoting Without Rights – Introducing Pivoter
See it! (Speaker & Slides | Slides Video | Video)
Patrick Wardle : UPDATED :
'DLL Hijacking' on OS X? #@%& Yeah!
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Patrick Wardle : UPDATED :
Stick That In Your (root)Pipe & Smoke It
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Ken Westin
Confessions of a Professional Cyber Stalker
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Craig Young : UPDATED :
How to Train Your RFID Hacking Tools
Read It! (PDF | White Paper)
See it! (Speaker & Slides | Slides Video | Video)
Luke Young
Investigating the Practicality and Cost of Abusing Memory Errors with DNS
See it! (Speaker & Slides | Slides Video | Video)
Philip Young, Chad "Bigendian Smalls” Rikansrud
Security Necromancy: Further Adventures in Mainframe Hacking
Read It! (PDF | Extras)
See it! (Speaker & Slides | Slides Video | Video)
Yuwei Zheng, Haoqi Shan
Build a free cellular traffic capture tool with a vxworks based femoto
Read It! (PDF)
See it! (Speaker & Slides | Slides Video | Video)
Village Presentations
DEF CON 23 BioHacking Village
Alejandro Hernandez
Brain Waves Surfing: Insecurity in EEG Technologies
See it! (Speaker & Slides | Slides Video | Video)
Alex Smith
Cloning Access Cards to Implants
See it! (Speaker & Slides | Slides Video | Video)
Johan Sosa
Genetic engineering: GMO for fun and profit
See it! (Speaker & Slides | Slides Video | Video)
Keoni Gandall
Biohacking at Home
See it! (Speaker & Slides | Slides Video | Video)
Michael Goetzman
Social Implications of DNA Acquisition and Storage
See it! (Speaker & Slides | Slides Video | Video)
Panel
The Anatomy of DIY Implantable Devices
See it! (Speaker & Slides | Slides Video | Video)
Walter Powell
Parallels in BioSec and InfoSec
See it! (Speaker & Slides | Slides Video | Video)
Whitlock and Aganovic
Physiology from the Perspective of Control
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Crypto and Privacy Village
Carlson and Doherty
Breaking CBC
See it! (Speaker & Slides | Slides Video | Video)
Craig Young
Smart Home Invasion
See it! (Speaker & Slides | Slides Video | Video)
Freddy Martinez
IMSI Catchers: Detecting Cell Phone Surveillance
See it! (Speaker & Slides | Slides Video | Video)
Marina
Hacking Quantum Cryptography
See it! (Speaker & Slides | Slides Video | Video)
Nick Sullivan
CFSSL the evolution of a PKI toolkit
See it! (Speaker & Slides | Slides Video | Video)
Robert Olson
Teaching Privacy Using Red Team Strategies
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Hardware Hacking Village
Dr Tran
Intro to Lockpicking
See it! (Speaker & Slides | Slides Video | Video)
Machinist
Mechanical Engineering for Noobs
See it! (Speaker & Slides | Slides Video | Video)
Matt DuHarte
Introduction to USB and Fuzzing
See it! (Speaker & Slides | Slides Video | Video)
Nikhil Mittal
Hacking with Human Interface Devices
See it! (Speaker & Slides | Slides Video | Video)
Soldering 101
Melting metal for fun and profit
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 IoT Village
Aaron Guzman
Security: the IoT World
See it! (Speaker & Slides | Slides Video | Video)
Brian Knopf
Yes You Can Walk on Water
See it! (Speaker & Slides | Slides Video | Video)
Daniel Miessler
IoT Attack Surface Mapping
See it! (Speaker & Slides | Slides Video | Video)
Daniel Miessler
The Grid: A Multiplayer Game of Destruction
See it! (Speaker & Slides | Slides Video | Video)
K Reid Wrightman
Vulnerability Inheritance in PLCs
See it! (Speaker & Slides | Slides Video | Video)
Wesley Wineberg
Cameras Thermostats and Home Automation Controllers
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Lock Picking Village
Dr Tran
Introduction to Lockpicking
See it! (Speaker & Slides | Slides Video | Video)
Intro to Lockpicking 1
See it! (Speaker & Slides | Slides Video | Video)
Intro to Lockpicking 2
See it! (Speaker & Slides | Slides Video | Video)
James
Intro to Lockpicking
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Packet Capture Village
Bob Simpson
MITM 101: Easy Traffic Interception Techniques Using Scapy
See it! (Speaker & Slides | Slides Video | Video)
Brian Wohlwinder and Andrew Beard
I See You
See it! (Speaker & Slides | Slides Video | Video)
David Schwartzberg
Hacking the Next Generation
See it! (Speaker & Slides | Slides Video | Video)
Elliot Brink
Global Honeypot Trends
See it! (Speaker & Slides | Slides Video | Video)
Grecs
Creating REAL Threat Intelligence With Evernote
See it! (Speaker & Slides | Slides Video | Video)
Jay Beale
Jailing Programs via Docker: Using Linux Containers for Security
See it! (Speaker & Slides | Slides Video | Video)
Joseph Muniz and Aamir Lakhani
Penetration Testing with Raspberry Pi
See it! (Speaker & Slides | Slides Video | Video)
Karl Koscher
Sniffing SCADA
See it! (Speaker & Slides | Slides Video | Video)
Leon Ward
The Packets Made Me Do It: Using OpenFPC
See it! (Speaker & Slides | Slides Video | Video)
Lokesh Pidawekar
Hackers Practice Ground
See it! (Speaker & Slides | Slides Video | Video)
Michael Raggo
Mobile Data Loss: Threats and Countermeasures
See it! (Speaker & Slides | Slides Video | Video)
Mike Raggo
Remaining Covert in an Overt World
See it! (Speaker & Slides | Slides Video | Video)
Ming Chow
Tools and Techniques Used at the Wall of Sheep
See it! (Speaker & Slides | Slides Video | Video)
Monzy Merza
Real World Automation for Rapid Response
See it! (Speaker & Slides | Slides Video | Video)
Nikhil Mittal
Powershell for Penetration Testers
See it! (Speaker & Slides | Slides Video | Video)
Paul Vixie
Passive DNS Collection and Analysis: The dnstap and fstrm Approach
See it! (Speaker & Slides | Slides Video | Video)
Robert Simmons
The Digital Cockroach Bait Station How to Build Spam Honeypots
See it! (Speaker & Slides | Slides Video | Video)
Ron Taylor
Violating Web Services
See it! (Speaker & Slides | Slides Video | Video)
Sam Bowne
Is Your Android App Secure
See it! (Speaker & Slides | Slides Video | Video)
Theodora Titonis
How Machine Learning Finds Malware Needles in an AppStore Haystack
See it! (Speaker & Slides | Slides Video | Video)
Tony Martin
From XSS to Root on Your NAS
See it! (Speaker & Slides | Slides Video | Video)
Vivek Ramachandran
80211 Monitoring with PCAP2XML: SQLite
See it! (Speaker & Slides | Slides Video | Video)
Wayne Crowder
Fishing To Phishing: It's All About Slimy Creatures
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Social Engineering Village
Adam Compton and Eric Gershman
Phishing: Recon to Creds with the SpeedPhishing Framework
See it! (Speaker & Slides | Slides Video | Video)
Chris Hadnagy
A Peek Behind the Blue Mask: The Evolution of the SECTF
See it! (Speaker & Slides | Slides Video | Video)
Dave Kennedy
Understanding End-User Attacks: Real World Examples
See it! (Speaker & Slides | Slides Video | Video)
Ian Harris
Understanding Social Engineering Attacks with Natural Language Processing
See it! (Speaker & Slides | Slides Video | Video)
Jayson E. Street
Breaking in Bad: Im the one who doesn’t knock
See it! (Speaker & Slides | Slides Video | Video)
John Ridpath
I Am Not What I Am: Shakespeare and Social Engineering
See it! (Speaker & Slides | Slides Video | Video)
Michele Fincher
I Didn’t Think it was Loaded and Other Mental Derps
See it! (Speaker & Slides | Slides Video | Video)
Noah Beddome
Yellow Means Proceed with Caution: Applied De-escalation for SE
See it! (Speaker & Slides | Slides Video | Video)
Tim Newberry
Twitter ISIL and Tech
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Vehicle Hacking Village
Eric Evenchick
SocketCAN
See it! (Speaker & Slides | Slides Video | Video)
Josh Corman
Safer Sooner: Automotive Cyber Safety
See it! (Speaker & Slides | Slides Video | Video)
Nathan Hoch
The Badge and PAWN: Customizing the Badge
See it! (Speaker & Slides | Slides Video | Video)
DEF CON 23 Wireless Village
Balint Seeber
SIGINT and Blind Signal Analysis with GNU Radio and Advanced SDR
See it! (Speaker & Slides | Slides Video | Video)
Catatonic
Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities
See it! (Speaker & Slides | Slides Video | Video)
Cyb3r-Assassin
Wireless Pentesting: So Easy a Cave Man Can Do It
See it! (Speaker & Slides | Slides Video | Video)
Darren Kitchen and Sebastian Kinne
Rollin Down the Street Sniffin WiFi Sippin on Pineapple Juice
See it! (Speaker & Slides | Slides Video | Video)
JP Dunning
The Wireless World of the Internet of Things
See it! (Speaker & Slides | Slides Video | Video)
JoshInGeneral
Meeting People Over WiFi
See it! (Speaker & Slides | Slides Video | Video)
Karl Koscher
DSP for SDR
See it! (Speaker & Slides | Slides Video | Video)
Michael Calabro
Software Defined Radio Performance Trades and Tweaks
See it! (Speaker & Slides | Slides Video | Video)
Time Oshea
GNU Radio Tools for Radio Wrangling and Spectrum Domination
See it! (Speaker & Slides | Slides Video | Video)
Travis Goodspeed and Sergey Bratus
PSK31 Modulation Polyglots
See it! (Speaker & Slides | Slides Video | Video)
Vivek Ramachandran
Automatic Live WPA-WPA2 Attacks and WPA Supplicant
See it! (Speaker & Slides | Slides Video | Video)
Vivek Ramachandran and Thomas D’Otreppe
WPA Enterprise Hacking
See it! (Speaker & Slides | Slides Video | Video)
Wireless Warrior
Covert Wireless: Practical Hacker LPI-LPD
See it! (Speaker & Slides | Slides Video | Video)