Star 0


Title Humans
Attacking the Internet of Things using Time Paul McMillan , Nebula
Burner Phone DDOS 2 dollars a day : 70 Calls a Minute Weston Hecker
DEF CON 101 - The Talk HighWiz , Pyr0 , Roamer , LosT
Anatomy of a Pentest; Poppin' Boxes like a Pro PushPin
The Monkey in the Middle: A pentesters guide to playing in traffic. Anch
Panel — Surveillance on the Silver Screen- Fact or Fiction? Nicole Ozer , Kevin Bankston , Timothy Edgar , ACLU of California , New America Foundation's Open Technology Institute , Watson Institute for International Studies, Brown University
AWS for Hackers Beaker
Shellcodes for ARM: Your Pills Don't Work on Me, x86 Svetlana Gaivoronski , Ivan Petrov , Moscow State University, Russia
The Open Crypto Audit Project Kenneth White , Matthew Green , Open Crypto Audit Project , Johns Hopkins University
Open Source Fairy Dust John Menerick , Netsuite
Elevator Hacking - From the Pit to the Penthouse Deviant Ollam , Howard Payne , The CORE Group
One Man Shop: Building an effective security program all by yourself
ShareEnum: We Wrapped Samba So You Don’t Have To Lucas Morris , Michael McAtee , Crowe Horwath LLP
Advanced Red Teaming: All Your Badges Are Belong To Us Eric Smith , Josh Perrymon , LARES
NSA Playset: DIY WAGONBED Hardware Implant over I2C Josh Datko , Teddy Reed , Cryptotronix, LLC
RFIDler: SDR.RFID.FTW Major Malfunction , Zac Franken
Check Your Fingerprints: Cloning the Strong Set Richard Klafter (Free) , Eric Swanson (Lachesis) , Optimizely
The Only Way to Tell the Truth is in Fiction: The Dynamics of Life in the National Security State Richard Thieme , ThiemeWorks
From root to SPECIAL: Pwning IBM Mainframes Philip “Soldier of Fortran” Young
USB for all! Jesse Michael , Mickey Shkatov
Blinding The Surveillance State Christopher Soghoian , American Civil Liberties Union
Extreme Privilege Escalation On Windows 8/UEFI Systems Corey Kallenberg , Xeno Kovah , MITRE
NinjaTV - Increasing Your Smart TV’s IQ Without Bricking It Felix Leder , Blue Coat Norway
Optical Surgery; Implanting a DropCam Patrick Wardle , Colby Moore , Synack
Empowering Hackers to Create a Positive Impact Keren Elazari
Secure Random By Default Dan Kaminsky , White Ops
DEF CON Comedy Jam Part VII, Is This The One With The Whales? David Mortman , Rich Mogull , Chris Hoff , Dave Maynor , Larry Pesce , James Arlen , Rob Graham , Alex Rothman Shostack
I Hunt TR-069 Admins: Pwning ISPs Like a Boss Shahar Tal , Check Point Software Technologies
NSA Playset : GSM Sniffing Pierce , Loki
The Internet of Fails: Where IoT Has Gone Wrong and How We're Making It Right Mark Stanislav , Zach Lanier , Duo Security
Weaponizing Your Pets: The War Kitteh and the Denial of Service Dog Gene Bransfield , Tenacity Solutions, Inc.
The Cavalry Year[0] & a Path Forward for Public Safety Joshua Corman , Nicholas J Percoco , Sonatype , Rapid7
Girl… Fault-Interrupted. Maggie Jauregui
Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring. Ryan Lackey , Marc Rogers , The Grugq , CryptoSeal, Inc. , Lookout
A Survey of Remote Automotive Attack Surfaces Charlie Miller , Chris Valasek , Twitter , IOActive, Inc.
From Raxacoricofallapatorius With Love: Case Studies In Insider Threat Tess Schrodinger
Panel: Ask the EFF: The Year in Digital Civil Liberties Kurt Opsahl , Nate Cardozo , Mark Jaycox , Yan Zhu , Eva Galperin , Electronic Frontier Foundation , EFF
Saving Cyberspace by Reinventing File Sharing Eijah
Instrumenting Point-of-Sale Malware: A Case Study in Communicating Malware Analysis More Effectively Wesley McGrew , Mississippi State University
Practical Aerial Hacking & Surveillance Glenn Wilkinson , SensePost
Why Don’t You Just Tell Me Where The ROP Isn’t Suppose To Go David Dorsey , Click Security
PropLANE: Kind of keeping the NSA from watching you pee Rob Bathurst , Russ Rogers , Mark Carey , Ryan Clarke
Is This Your Pipe? Hijacking the Build Pipeline. Kyle Kelley , Greg Anderson , Rackspace
Through the Looking-Glass, and What Eve Found There Luca "kaeso" Bruno , Mariano "emdel" Graziano , Eurecom
Playing with Car Firmware or How to Brick your Car Paul Such 0x222 , Agix , SCRT
DEF CON the Mystery, Myth and Legend
Screw Becoming A Pentester - When I Grow Up I Want To Be A Bug Bounty Hunter! Jake Kouns , Carsten Eiram , Risk Based Security
Measuring the IQ of your Threat Intelligence feeds Alex Pinto , Kyle Maxwell , MLSec Project
PoS Attacking the Traveling Salesman Alex Zacharis , Tsagkarakis Nikolaos , Census
How to Disclose an Exploit Without Getting in Trouble Jim Denaro , Tod Beardsley , CipherLaw , Metasploit project
Raspberry MoCA - A recipe for compromise Andrew Hunt , Bechtel
Detecting Bluetooth Surveillance Systems Grant Bugher , Perimeter Grid
Bug Bounty Programs Evolution Nir Valtman
Android Hacker Protection Level 0 Tim Strazzere , Jon Sawyer , Applied Cybersecurity LLC
Old Skewl Hacking: Porn Free! Major Malfunction
Am I Being Spied On? Low-tech Ways Of Detecting High-tech Surveillance Dr. Phil Polstra , Bloomsburg University of Pennsylvania
Panel: Ephemeral Communications: Why and How? Ryan Lackey , Jon Callas , Elissa Shevinsky , CryptoSeal, Inc. , Silent Circle , Glimpse
Protecting SCADA From the Ground Up AlxRogan
What the Watchers See: Eavesdropping on Municipal Mesh Cameras for Giggles (or Pure Evil) Dustin Hoffman , Thomas (TK) Kinsey , Exigent Systems Inc.
Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System Shane Macaulay , Cloud Security, IOActive
Catching Malware En Masse: DNS and IP Style Dhia Mahjoub , Thibault Reuille , Andree Toonk , OpenDNS , OpenDNS Inc
Generating ROP payloads from numbers Alexandre Moneger , Cisco Systems
Meddle: Framework for Piggy-back Fuzzing and Tool Development Geoff McDonald , Microsoft Corporation
Don't DDoS Me Bro: Practical DDoS Defense Blake Self , Shawn "cisc0ninja" Burrell , SOLDIERX Crew
Paging SDR... Why should the NSA have all the fun? Xaphan , n00bz
Hacking the FBI: How & Why to Liberate Government Records Ryan Noah Shapiro , Massachusetts Institute of Technology
Dark Mail Ladar Levison , Stephen Watt , Lavabit, LLC
Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations Terrence Gareau , Mike Thompson
Mass Scanning the Internet: Tips, Tricks, Results Robert Graham , Paul McMillan , Dan Tentler
Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw , TrustedSec
Client-Side HTTP Cookie Security: Attack and Defense David Wyde , Cisco Systems
Data Protection 101 - Successes, Fails, and Fixes PTzero
The NSA Playset: RF Retroreflectors Michael Ossmann , Great Scott Gadgets
Domain Name Problems and Solutions Dr. Paul Vixie , Farsight Security
Investigating PowerShell Attacks Ryan Kazanciyan , Matt Hastings , Mandiant
Stolen Data Markets: An Economic and Organizational Assessment Tom Holt , Olga Smirnova , Yi-Ting Chua , Michigan State University , Eastern Carolina University
Panel - Diversity in Information Security Jennifer Imhoff-Dousharm , Sandy “Mouse” Clark , Kristin Paget , Jolly , Vyrus , Scott Martin , CIO Spikes Security
Home Alone with localhost: Automating Home Defense Chris Littlebury , Knowledge Consulting Group, Inc.
You're Leaking Trade Secrets Michael Schrenk
Deconstructing the Circuit Board Sandwich: Effective Techniques for PCB Reverse Engineering Joe Grand aka Kingpin , Grand Idea Studio
Blowing up the Celly - Building Your Own SMS/MMS Fuzzer Brian Gorenc , Matt Molinyawe , Trend Micro's Zero Day Initiative , HP Security Research
NSA Playset: PCIe Joe FitzPatrick , Miles Crabill , Hardware Security Resources, LLC
Logging ALL THE THINGS Without All The Cost With Open Source Big Data Tools </buzzwords> Zack Fasel , Urbane Security
"Around the world in 80 cons” - A Perspective Jayson E. Street , Krypton Security
Abuse of Blind Automation in Security Tools Eric (XlogicX) Davisson , Ruben Alejandro (chap0)
A Journey to Protect Points-of-sale Nir Valtman , NCR Retail
Acquire current user hashes without admin privileges Anton Sapozhnikov , KPMG
Hacking 911: Adventures in Disruption, Destruction, and Death Christian “quaddi” Dameff , Jeff “r3plicant” Tully , Peter Hefley , Sunera
Steganography in Commonly Used HF Radio Protocols Paul Drapeau , Brent Dukes , Confer Technologies Inc.
In the forest of knowledge with 1o57 LosT
Just What The Doctor Ordered? Scott Erven , Shawn Merdinger , SecMedic, Inc
The Making of DEFCOIN Xaphan , Beaker , Anch
Cyberhijacking Airplanes: Truth or Fiction? Dr. Phil Polstra , Captain Polly , Bloomsburg University of Pennsylvania , University of Dubuque
Bypass firewalls, application white lists, secure remote desktops under 20 seconds Zoltán Balázs , MRG Effitas
Veil-Pillage: Post-exploitation 2.0 Will Schroeder , Veris Group
Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring Alex Pinto , MLSec Project
Oracle Data Redaction is Broken David Litchfield , Datacom TSS
Hack All The Things: 20 Devices in 45 Minutes CJ Heres , Amir Etemadieh , Mike Baker , Hans Nielsen , Accuvant LABS , Matasano Security
An Introduction to Back Dooring Operating Systems for Fun and Trolling Nemus
The Secret Life of Krbtgt Christopher Campbell
Impostor — Polluting Tor Metadata Charlie Vedaa , Mike Larsen
Reverse Engineering Mac Malware Sarah Edwards , SANS Institute
Standing Up an Effective Penetration Testing Team Wiseacre
Don't Fuck It Up! Zoz
Abusing Software Defined Networks Gregory Pickett , Hellfire Security
Manna from Heaven: Improving the state of wireless rogue AP attacks Dominic White , Ian de Villiers , SensePost
Practical Foxhunting 101 Adam Wirth (SimonJ) , MasterPeace Solutions LTD
Touring the Darkside of the Internet. An Introduction to Tor, Darknets, and Bitcoin Metacortex , Grifter
The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns Christopher Campbell
Saving the Internet (for the Future) Jason Healey , Atlantic Council
Detecting and Defending Against a Surveillance State Robert Rowley , Trustwave Spiderlabs
Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse Brady Bloxham , Silent Break Security
VoIP Wars: Attack of the Cisco Phones Fatih Ozavci , Sense of Security
How To Get Phone Companies To Just Say No To Wiretapping Phil Zimmermann , Silent Circle
Summary of Attacks Against BIOS and Secure Boot Yuriy Bulygin , Oleksandr Bazhaniuk , Andrew Furtak , John Loucaides , Intel Security
Hacking US (and UK, Australia, France, etc.) traffic control systems Cesar Cerrudo , IOActive Labs
RF Penetration Testing, Your Air Stinks RMellendick , DaKahuna
Learn how to control every room at a luxury hotel remotely: the dangers of insecure home automation deployment Jesus Molina
I am a legend: Hacking Hearthstone with machine learning Elie Bursztein , Celine Bursztein , Google Inc. , PetSquare