skip to main content

DEF CON Hacking Conference

DEF CON 18 Archive

Was July 30 - August 1, 2010 at the Riviera Hotel & Casino

Speakers & Presentations


Chema Alonso, José Palazón "Palako"

FOCA2: The FOCA Strikes Back


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Chema Alonso, José Palazón "Palako"

Connection String Parameter Attacks

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video )
Hear it! (m4b Audio)

return to top


Md Sohail Ahmad

WPA Too!

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Francisco Amato, Federico Kirschbaum

Evilgrade, "You Still Have
Pending Upgrades?"

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Iftach Ian Amit

Cyber[Crime | War] Charting Dangerous Waters

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


James Arlen : UPDATED :

SCADA and ICS for Security Experts: How to avoid Cyberdouchery

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Itzhak "Zuk" Avraham : UPDATED :

Exploitation on ARM - Technique and Bypassing Defense Mechanisms

Read It! (Slides | White Paper)
See it! (Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Mike "mckt" Bailey

Web Services We Just Don't Need

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Marco Bonetti

Mobile Privacy: Tor on the iPhone and Other Unusual Devices

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Sam Bowne

Who Cares About IPv6?

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Frank Breedijk : UPDATED :

Seccubus – Analyzing vulnerability assessment data the easy way...

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Michael Brooks : UPDATED :

mas*****ploitation

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dennis Brown

Resilient Botnet Command and Control with Tor

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dennis Brown

How Hackers Won the Zombie Apocalypse

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jeremy Brown : UPDATED :

Exploiting SCADA Systems

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


David "VideoMan" M. N. Bryan, Michael Anderson

Cloud Computing, a Weapon of Mass Destruction?

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


David "VideoMan" M. N. Bryan, Jared Bird

The keys to running a successful Def con Group by DC612


See it! (Slide Video)
Hear it! (m4b Audio)

return to top


Jeff Bryner

Google Toolbar: The NARC Within

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Daniel Burroughs

Open Public Sensors and Trend Monitoring

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

return to top


Elie Bursztein, Jocelyn Lagarenne, Dan Boneh : UPDATED :

Kartograph : Finding a Needle in a Haystack or How to Apply Reverse Engineering Techniques to Cheat at
Video Games

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video )
Hear it! (m4b Audio)

return to top


Cesar Cerrudo

Token Kidnapping's Revenge

Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


John A. Colley

WRT54-TM, Media Center and
Network Sniffer

return to top


Chris Conley

Hacking Facebook Privacy


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Greg Conti : UPDATED :

Our Instrumented Lives: Sensors, Sensors, Everywhere...

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Adrian Crenshaw

Programmable HID USB Keystroke Dongle: Using the *****sy as a pen testing device

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


John Curran : UPDATED :

IPv6: No Longer Optional

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joe Damato : UPDATED :

Function Hooking for Mac OSX and Linux

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Decius

Exploiting Internet Surveillance Systems

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


A.P. Delchi

Physical Security : You're Doing It Wrong!

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


TOOOL

The Search for Perfect Handcuffs...
and the Perfect Handcuff Key


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


JP Dunning

Katana: Portable Multi-Boot Security Suite

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


JP Dunning

Breaking Bluetooth By Being Bored

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Peter Eckersley, Jesse Burns

An Observatory for the SSLiverse


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Peter Eckersley

How Unique Is Your Browser?

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Luiz "effffn" Eduardo

Your Boss is a Douchebag... How About You?

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Monta Elkins

Hacking with Hardware: Introducing the Universal RF USB Keyboard Emulation Device - URFUKED

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Marisa Fagan

Be A Mentor!

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Esteban Martínez Fayó

Hacking and Protecting
Oracle Database Vault

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


frank^2

Trolling Reverse-Engineers with Math: Ness... It hurts...

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jimi Fiekert

The Anatomy of Drug Testing

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joe "Crazy" Foley, Eric "Unlocked" Schmiedl, Zoz

Exploitable Assumptions Workshop

Read It! (Slides)

return to top


Fyodor, David Fifield

Mastering the Nmap Scripting Engine

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Kenneth Geers : UPDATED :

Live Fire Exercise: Baltic Cyber Shield 2010

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joe "Kingpin" Grand

Making the DEF CON 18 Badge

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jennifer Granick, Matt Zimmerman

Legal Developments in Hardware Hacking


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

return to top


Paul Haas

Advanced Format String Attacks

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


G. Mark Hardy

Tales from the Crypto

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Nathan Hamiel, Marcin Wielgoszewski

Constricting the Web: Offensive Python for Web Hackers

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Craig Heffner

How to Hack Millions of Routers

Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Sho Ho

FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Marcia Hofmann

How To Get Your FBI File (and Other Information You Want From the Federal Government)

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


HONEY : UPDATED :

Ripping Media Off Of the Wire

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Leigh Honeywell, Follower

Physical Computing, Virtual Security: Adding the Arduino Microcontroller Development Environment to Your Security Toolbox


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Chad Houck, Jason Lee

Decoding reCAPTCHA


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Wayne Huang, Kuon

NoSQL == No SQL injections?


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Wayne Huang

Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Wayne Huang, Jeremy Chiu

0box Analyzer: AfterDark Runtime Forensics for Automated Malware Analysis and Clustering


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Oren Isacson, Alfredo Ortega : UPDATED :

Exploiting Digital Cameras

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Barnaby Jack

Jackpotting Automated Teller Machines Redux


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dan Kaminsky

Black Ops Of Fundamental Defense: Web Edition


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Samy Kamkar

How I Met Your Girlfriend


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

return to top


Max Kelly

Perspectives on Cyber Security and Cyber Warfare


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dr. Fouad Kiamilev, Corey 'c0re' Lange, Stephen 'afterburn' Janansky

Hardware Black Magic: Designing Printed Circuit Boards

Read It! (Slides)

return to top


Ki-Chan Ahn, Dong-Joo Ha : UPDATED :

Malware Migrating to Gaming Consoles: Embedded Devices, an AntiVirus-free Safe Hideout for Malware

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dave King

Hardware Hacking for Software Guys

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Andrew Kongs, Dr. Gerald Kane

Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Matt "DCFluX" Krick

DCFluX in: Moon-bouncer

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Tyler Krpata

Like a Boss: Attacking JBoss

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Righter Kunkel

Air Traffic Control Insecurity 2.0

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Anthony Lai, Jake Appelbaum, Jon Oberheide

The Power of Chinese Security


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jonathan Lee, Neil Pahl

Bypassing Smart-card Authentication
and Blocking Debiting: Vulnerabilities
in Atmel Cryptomemory-based
Stored-value Systems

Read It! (Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Felix "FX" Lindner

Blitzableiter - the Release

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Anthony Lineberry, David Richardson, Sr., Tim Wyatt : UPDATED :

These Aren't the Permissions
You're Looking For

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Ryan Linn

Multiplayer Metasploit: Tag-Team Penetration and Information Gathering

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Matias Madou, Jacob West

Repelling the Wily Insider

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Kevin Mahaffey, John Hering

App Attack: Surviving the Mobile Application Explosion


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Moxie Marlinspike

Changing Threats To Privacy: From TIA To Google

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joshua Marpet

Facial Recognition: Facts, Fiction, and Fsck-ups


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dave Maynor, Dr. Paul Judge

Searching for Malware: A Review of Attackers' Use of Search Engines to Lure Victims

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jon McCoy

Hacking .NET Applications at Runtime: A Dynamic Attack

Read It! (Slides | White Paper | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joseph McCray : UPDATED :

You Spent All That Money And You Still Got Owned...

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


mc.fly, ryd, no_maam, vyrus

A ChaosVPN for Playing Capture The Flag


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


John McNabb : UPDATED :

Cyberterrorism and the Security of the National Drinking Water Infrastructure

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Shawn Merdinger

We Don't Need No Stinkin' Badges: Hacking Electronic Door Access Controllers

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


metr0

Securing MMOs: A Security Professional's View From the Inside


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Mike Metzger

Letting the Air Out of Tire Pressure Monitoring Systems

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Charlie Miller : UPDATED :

Kim Jong-il and Me: How to Build a Cyber Army to Defeat the U.S.

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Doug Mohney

HD Voice - The Overdue Revolution

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Justin Morehouse, Tony Flick

Getting Social with the Smart Grid


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

return to top


Shawn Moyer, Nathan Keltner

Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Patrick Mullen, Ryan Pentney : UPDATED :

Open Source Framework for Advanced Intrusion Detection Solutions

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Brandon Nesbit

The Games We Play


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Lang Nguyen

FPGA Bitstream Reverse Engineering

return to top


Jon Oberheide

Antique Exploitation (aka Terminator 3: Point One One for Workgroups)


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jeongwook Oh

ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


TW "Mage2" Otto : UPDATED :

Electronic Weaponry or How to Rule
the World While Shopping at Radio Shack

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

-

Nicole Ozer, Kevin Bankston

Big Brother on the Big Screen: Fact/Fiction?


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Chris Paget

Practical Cellphone Spying


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Chris Paget

Extreme-range RFID Tracking


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Garry Pejski

My Life As A Spyware Developer

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Nicholas J. Percoco, Christian Papathanasiou : UPDATED :

"This is not the droid you're looking for..."

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Nicholas J. Percoco, Jibran - : UPDATED :

Malware Freak Show 2: The Client-Side Boogaloo

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Pierce, Goldy, aSmig

WiMAX Hacking 2010

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Christopher E. Pogue A.K.A "Big Poppa ReverShell"

Sniper Forensics - One Shot, One Kill

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Wade Polk, Paul Malkewicz, J.Novak

Industrial Cyber Security

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Bruce Potter, Logan Lodge

"This Needs to be Fixed" and Other Jokes in Commit Statements

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Adam Pridgen, Matthew Wollenweber

Toolsmithing an IDA Bridge, Case Study For Building A Reverse Engineering Tool

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Josh Pyorre, Chris McKenney

Build Your Own Security Operations Center for Little or No Money

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Nguyen Anh Quynh

Operating System Fingerprinting for Virtual Machines

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Rob Ragan, Francis Brown

Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Rain, j03b34r

Build a Lie Detector/Beat a Lie Detector

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jim Rennie, Eric Rachner

Search & Seizure & Golfballs s


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Riley Repko

Enough Cyber Talk Already! Help get this Collaboration Engine Running!


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Matt Ryanczak : UPDATED :

Implementing IPv6 at ARIN

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Ed Schaller

Exploiting WebSphere Application Server's JSP Engine

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Michael "theprez98" Schearer

SHODAN for Penetration Testers

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Ferdinand Schober : UPDATED :

Gaming in the Glass Safe - Games
DRM & Privacy

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jason Scott

You're Stealing It Wrong! 30 Years of
Inter-Pirate Battles


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jason Scott

DC 18 Movie Night
GET LAMP

return to top


Blake Self, Wayne Zage, Dolores Zage

SMART Project: Applying Reliability Metrics to Security Vulnerabilities

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Blake Self, Bitemytaco

Hacking DOCSIS For Fun and Profit

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


James Shewmaker

Rip Your Browser for x06 days

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Sumit "sid" Siddharth

Hacking Oracle From Web Apps

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Brad Smith

Weaponizing Lady GaGa, Psychosonic Attacks

Read It! (Slides | Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


David C. Smith, Samuel Petreski

A New Approach to Forensic Methodology - !!BUSTED!! case studies

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Rich Smith : UPDATED :

pyREtic - In memory reverse engineering for obfuscated Python bytecode

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Christopher Soghoian

Your ISP and the Government: Best Friends Forever.


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


strace, Sean Barnum, EvilAdamSmith, Kanen, Joey Tyson,

So Many Ways to Slap A Yo-Ho:: Xploiting Yoville and Facebook for Fun and Profit

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Jayson E. Street

Deceiving the Heavens to Cross the Sea: Using the the 36 stratagems for Social Engineering

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


The Suggmeister : UPDATED :

Social Networking Special Ops:
Extending Data Visualization Tools for Faster Pwnage

Read It! (Slides | White Paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Richard Thieme

Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are

Read It! (Extras)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Patrick Thomas

Web Application Fingerprinting with Static Files

Read It! (Slides)
Hear it! (m4b Audio)

return to top


Tottenkoph

VirGraff101: An Introduction to
Virtual Graffiti

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Marc Weber Tobias, Tobias Bluzmanis, Matt Fiddler

INSECURITY ENGINEERING OF PHYSICAL SECURITY SYSTEMS: Locks, Lies, and Videotape

Read It! (Slides)
See it! (Slide Video
Hear it! (m4b Audio)

return to top


Schuyler Towne, datagram

Attack the Key, Own the Lock

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Valsmith, Colin Ames, Anthony Lai

Balancing the Pwn Trade Deficit


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Paul Vixie, Robert Edmonds : UPDATED :

SIE Passive DNS and the ISC DNS Database

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Nick Waite, Furkan Cayci

Go Go Gadget Python!
Introduction to Hardware Hacking

Read It! (Slides)

return to top


Michael Weigand, Renderman, Mike Kershaw

Build your own UAV 2.0 - Wireless Mayhem from the Heavens!


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Barrett Weisshaar, Garret Picchioni

The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Dondi "SpookDoctor06" West : UPDATED :

An Examination of the Adequacy of the Laws Related to Cyber Warfare

Read It! (Slides | White paper)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Joshua Wise : UPDATED :

From "No Way" to 0-day: Weaponizing the Unweaponizable

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Scott Wolchok

Crawling BitTorrent DHTs for Fun and Profit

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


Zoz

Pwned By The Owner: What Happens When You Steal A Hacker's Computer

Read It! (Slides)
See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top

return to top


Rod Beckstrom, Dan Kaminsky, Paul Mockapetris, Ken Silva, Mark Weatherford

Panel:DNS Systemic Vulnerabilities and Risk Management: A Discussion
with the Experts


See it! (Slide Video | Speaker and Slide Video)
Hear it! (m4b Audio)

return to top


James Arlen, James Costello, Leigh Honeywell, Tim Krabec, Tiffany Rad

Panel: Hacking The Future: Weaponizing the Next Generation

Read It! (Slides)

return to top

return to top

return to top

return to top

return to top

return to top

return to top