-
Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
Was August 4-7, 2011 at the Rio Hotel & Casino
Speakers & Presentations
Welcome and The Making of the DEF CON 19 Badge
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
When Space Elephants Attack: A DEFCON Challenge for Database Geeks
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Chema Alonso, Juan Garrido "Silverhack"
Bosses love Excel, Hackers too.
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Chema Alonso, Juan Garrido "Silverhack"
Dust: Your Feed RSS Belongs To You! Avoid Censorship!
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
IP4 TRUTH: The IPocalypse is a LIE
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Security When Nano Seconds Count
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Beat to 1337: Creating A Successful University Cyber Defense Organization
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Pillaging DVCS Repos For Fun And Profit
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Andrea Barisani, Adam Laurie, Zac Franken & Daniele Bianco
Chip & PIN is Definitely Broken
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Fingerbank — Open DH***** Fingerprints Database
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
PacketFence, The Open Source Nac: What We've Done In The Last Two Years
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Emmanuel Bouillon UPDATED
Federation and Empire
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Three Generations of DoS Attacks (with Audience Participation, as Victims)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
David M. N. Bryan, Luiz Eduardo
Building The DEF CON Network, Making A Sandbox For 10,000 Hackers
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Kinectasploit: Metasploit Meets Kinect
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Physical Memory Forensics for Cache
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Marcus J. Carey, David Rude & Will Vandevanter
Metasploit vSploit Modules
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Abusing HTML5
Read It! (PDF | PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Sandy "Mouse" Clark, Brad "RenderMan" Haines
Familiarity Breeds Contempt
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Operational Use of Offensive Cyber
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Kernel Exploitation Via Uninitialized Stack
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
The Art and Science of Security Research
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Internet Kiosk Terminals: The Redux
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Cipherspaces/Darknets: An Overview Of Attack Strategies
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Speaking with Cryptographic Oracles
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Jack Daniel, James Arlen, Joshua Corman, Alex Hutton, Martin McKeay & Dave Shackleford
PCI 2.0: Still Compromising Controls and Compromising Security
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Dark Tangent, Rod Beckstrom, Jerry Dixon, Tony Sager, Linton Wells II
Former Keynotes - The Future
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Introduction to Tamper Evident Devices
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
VDLDS — All Your Voice Are Belong To Us
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Whitfield Diffie and Moxie Marlinspike
Whitfield Diffie and Moxie Marlinspike
See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)
Bit-squatting: DNS Hijacking Without Exploitation
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Virtualization under attack: Breaking out of KVM
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
I Am Not a Doctor but I Play One on Your Network
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Dr. Patrick Engebretson, Dr. Josh Pauli
Mamma Don't Let Your Babies Grow Up to be Pen Testers - (a.k.a. Everything Your Guidance Counselor Forgot to Tell You About Pen Testing)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Steganography and Cryptography 101
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Tom Eston, Josh Abraham & Kevin Johnson
Don't Drop the SOAP: Real World Web Service Testing for Web Hackers
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
"Get Off of My Cloud": Cloud Credential Compromise and Exposure
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?
Read It! (White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Getting F***** On the River
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Cellular Privacy: A Forensic Analysis of Android Network Traffic
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Kenneth Geers UPDATED
Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies
Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Bulletproofing The Cloud: Are We Any Closer To Security?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Smile for the Grenade! "Camera Go Bang!"
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Anch, blakdayz, Anarchy Angel, ngharo, Itzik Kotler, Jake "GenericSuperhero" & converge
Represent! Defcon Groups, Hackerspaces, and You.
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Nathan Hamiel, Gregory Fleischer, Justin Engler & Seth Law
Smartfuzzing The Web: Carpe Vestra Foramina
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Rob Havelt, Wendel Guglielmetti Henrique
Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
An Insider's Look at International Cyber Security Threats and Trends
Read It! (PDF | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
The History and the Evolution of Computer Viruses
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Robert "Hackajar" Imhoff-Dousharm
Economics of Password Cracking in the GPU Era
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Jugaad – Linux Thread Injection Kit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
The Art of Trolling
Read It! (PNG) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Hacking Your Victims Over Power Lines
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Sounds Like Botnet
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
DCFluX in: License to Transmit
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Anthony Lai, Benson Wu, Jeremy Chiu & PK
Balancing The Pwn Trade Deficit – APT Secrets in Asia
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Shane Lawson, Bruce Potter & Deviant Ollam
And That's How I Lost My Eye: Exploring Emergency Data Destruction
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
I'm Your MAC(b)Daddy
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
PIG: Finding Truffles Without Leaving A Trace
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Hacking and Forensicating an Oracle Database Server
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
SSL And The Future Of Authenticity
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Hacking .Net Applications: The Black Arts
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Covert Post-Exploitation Forensics With Metasploit
Read It! (PDF | White Paper | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Vulnerabilities of Wireless Water Meter Networks
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Battery Firmware Hacking
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
David Mortman, Rich Mogull, Chris Hoff, Dave Maynor, Larry Pesce, James Arlen & Rob Graham
DEF CON Comedy Jam IV, A New Hope For The Fail Whale
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Blinkie Lights: Network Monitoring with Arduino
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Kurt Opsahl, Kevin Bankston, Marcia Hofmann, Hanni Fakhoury, Peter Eckersley & Rebecca Reagan
Ask EFF: The Year in Digital Civil Liberties
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Kyle 'Kos' Osborn, Matt Johanson
Hacking Google Chrome OS
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Big Brother on the Big Screen: Fact/Fiction?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Nicholas J. Percoco, Paul Kehrer
Getting SSLizzard
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Nicholas J. Percoco, Jibran Ilyas
Malware Freak Show 3: They're pwning er'body out there!
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Nicholas J. Percoco, Sean Schulte
This is REALLY not the droid you're looking for...
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Hacking MMORPGs for Fun and Mostly Profit
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Port Scanning Without Sending Packets
Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It
Read It! (PDF)
Semon Rezchikov, Morgan Wang & Joshua Engelman
Why Airport Security Can't Be Done FAST
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Paul Roberts, Aaron Barr, Joshua Corman & Jericho
"Whoever Fights Monsters..." Aaron Barr, Anonymous, and Ourselves
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
What Time Are You Anyway?
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Owned Over Amateur Radio: Remote Kernel Exploitation in 2011
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Build your own Synthetic Aperture Radar
See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)
Michael "theprez98" Schearer, Abigail Phillips, Deborah Salons & Todd Kimball
Net Neutrality Panel
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
WTF Happened to the Constitution?! The Right to Privacy in the Digital Age
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Archive Team: A Distributed Preservation of Service Attack
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Attacking and Defending the Smart Grid
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Mobile App Moolah: Profit taking with Mobile Malware
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Are You In Yet? The CISO's View of Pentesting
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
John J. Strauchs, Tiffany Rad, Teague Newman & Dora The SCADA Explorer
SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Chris "TheSuggmeister" Sumner, alien & Alison B UPDATED
Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
How To Get Your Message Out When Your Government Turns Off The Internet
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Martin Holst Swende, Patrik Karlsson
Web Application Analysis With Owasp Hatkit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Wireless Aerial Surveillance Platform
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Marc Weber Tobias, Matt Fiddler & Tobias Bluzmanis
Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs
See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
The Future of Cybertravel: Legal Implications of the Evasion of Geolocation
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Runtime Process Insemination
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Yekaterina Tsipenyuk O'Neil, Erika Chin
Seven Ways to Hang Yourself with Google Android
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Jos Weyers UPDATED
Key Impressioning
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Staying Connected during a Revolution or Disaster
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Network Application Firewalls: Exploits and Defense
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Phishing and Online Scam in China
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)
Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely
Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)