skip to main content

DEF CON Hacking Conference

DEF CON 21 Archive

Was August 1st-4th, 2013 at the Rio Hotel & Casino

Speakers & Presentations


LosT

Welcome and Making of the DEF CON 21 Badges

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top

return to top

return to top

return to top


Joe Grand, Mark 'Smitty' Smith, LosT, RenderMan, FirmWarez

Hardware Hacking with Microcontrollers: A Panel Discussion

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top

return to top

return to top

return to top


Lockheed, Roamer, Naifx

Hacking Management: From Operations to Command

return to top


Beaker, Flipper

The Ninjaneers: Getting started in Building Your Own Robots for World Domination.

return to top


LosT

Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play

return to top


Terrence "Tuna" Gareau

Intro to Web Application Hacking

return to top


AlxRogan

Oil & Gas Infosec 101

return to top


DaKahuna, RMellendick

Wireless Penetration Testing 101 & Wireless Contesting

return to top


Anch

Pentesters Toolkit

return to top


ZeroChaos

Meet Pentoo, the Longest Running Pen-testing Linux Distro

return to top


Bogdan Alecu : UPDATED :

Business logic flaws in mobile operators services

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Chema Alonso : UPDATED :

Fear the Evil FOCA: IPv6 attacks in Internet connections

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Amber Baldet : UPDATED :

Suicide Risk Assessment and Intervention Tactics

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Remy Baumgarten

Combatting Mac OSX/iOS Malware with Data Visualization

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Scott Behrens, Brent Bandelgar

MITM All The IPv6 Things

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Joe Bialek

PowerPwning: Post-Exploiting By Overpowering PowerShell

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Zak Blacher

Transcending Cloud Limitations by Obtaining Inner Piece

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Todd Bonnewell

Made Open: Hacking Capitalism

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Sam Bowne

Data Evaporation from SSDs

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Sam Bowne, Matthew Prince

Evil DoS Attacks and Strong Defenses

Read It! (PDF) See it! (Speaker & Slides | Slides Only) Hear it! (m4b Audio)

return to top


Francis Brown : UPDATED :

RFID Hacking: Live Free or RFID Hard

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


bughardy, Eagle1753 : UPDATED :

OTP, It won't save you from free rides!

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Daniel Burroughs

Open Public Sensors, Trend Monitoring and Data Fusion

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Alejandro Caceres

Conducting massive attacks with open source distributed computing

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Benjamin Caudill : UPDATED :

Offensive Forensics: CSI for the Bad Guy

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Daniel Chechik, Anat (Fox) Davidi : UPDATED :

Utilizing Popular Websites for Malicious Purposes Using RDI

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Ming Chow : UPDATED :

Abusing NoSQL Databases

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Robert Clark

Legal Aspects of Full Spectrum Computer Network (Active) Defense

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Joseph Paul Cohen

Blucat: Netcat For Bluetooth

Read It! (Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Daniel "unicornFurnace" Crowley, Jennifer "savagejen" Savage, David "videoman" Bryan

Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Ang Cui, Michael Costello : UPDATED :

Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top

return to top


Andy Davis : UPDATED :

Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


James Denaro : UPDATED :

How to Disclose or Sell an Exploit Without Getting in Trouble

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Doug DePerry, Tom Ritter : UPDATED :

I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top

return to top


Christie Dudley : UPDATED :

Privacy In DSRC Connected Vehicles

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Piotr Duszynski : UPDATED :

Pwn'ing You(r) Cyber Offenders

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Lt. Gen. Robert Elder

From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Melissa Elliott

Noise Floor: Exploring the world of unintentional radio emissions

Read It! (Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Justin Engler, Paul Vines

Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Amir Etemadieh, CJ Heres, Mike Baker, Hans Nielsen

Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jaime Filson (WiK), Rob Fuller (Mubix)

gitDigger: Creating useful wordlists from public GitHub repositories

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Flipper

10000 Yen into the Sea

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Pau Oliva Fora

Defeating SEAndroid

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Eric Fulton, Daniel Zolnikov

The Politics of Privacy and Technology: Fighting an Uphill Battle

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Brian *****nc, Jasiel Spelman

Java Every-Days: Exploiting Software Running on 3 Billion Devices

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Joe Grand

JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Dan Griffin : UPDATED :

Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Justin Hendricks

So You Think Your Domain Controller is Secure?

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Ricky Hill : UPDATED :

Phantom Network Surveillance UAV / Drone

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Ryan Holeman

The Bluetooth Device Database

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Alberto Garcia Illera, Javier Vazquez Vidal : UPDATED :

Dude, WTF in my car?

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Abraham Kang, Dinis Cruz : UPDATED :

Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned

Read It! (PDF)

return to top


Tom Keenan

Torturing Open Government Systems for Fun, Profit and Time Travel

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


David Kennedy, Nick Hitchcock

The Dirty South – Getting Justified with Technology

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Karl Koscher, Eric Butler : UPDATED :

The Secret Life of SIM Cards

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Adam "Major Malfunction" Laurie, Zac Franken

Decapping Chips the Easy Hard Way

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


David Lawrence, Eric Van Albert, Robert Johnson : UPDATED :

Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Kenneth Lee

How to use CSP to stop XSS

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Drea London, Kyle O'Meara

This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Sean Malone

HiveMind: Distributed File Storage Using JavaScript Botnets

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Todd Manning, Zach Lanier : UPDATED :

GoPro or GTFO: A Tale of Reversing an Embedded System

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Marion Marschalek

A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Wesley McGrew

Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Eric Milam : UPDATED :

Getting The Goods With smbexec

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Charlie Miller, Chris Valasek

Adventures in Automotive Networks and Control Units

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Nikhil Mittal

PowerPreter: Post Exploitation Like a Boss

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Tony Miu, Wai-leng Lee : UPDATED :

Kill 'em All — DDoS Protection Total Annihilation!

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Peiter Mudge Zatko

Unexpected Stories From a Hacker Who Made it Inside the Government

See it! (Speaker & Slides | Slides Video) Hear it! (m4b audio)

return to top


Nicolas Oberli

Please Insert Inject More Coins

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Brendan O'Connor : UPDATED :

Stalking a City for Fun and Frivolity

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


John Ortiz

Fast Forensics Using Simple Statistics and Cool Tools

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Fatih Ozavci : UPDATED :

VoIP Wars: Return of the SIP

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Franz Payer : UPDATED :

Exploiting Music Streaming with JavaScript

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Nicholas J. Percoco, Joshua Corman

The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Michael Perklin : UPDATED :

ACL Steganography - Permissions to Hide Your *****

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Phorkus (Mark Carey), Evilrob (Rob Bathurst)

Doing Bad Things to 'Good' Security Appliances

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Gregory Pickett : UPDATED :

Let's screw with nmap

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Alexandre Pinto : UPDATED :

Defending Networks with Incomplete Information: A Machine Learning Approach

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Dr. Philip Polstra

We are Legion: Pentesting with an Army of Low-power Low-cost Devices

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


pukingmonkey : UPDATED :

The Road Less Surreptitiously Traveled

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b audio)

return to top


Jim Rennie, Marcia Hofmann : UPDATED :

Hacker Law School

Read It! (PDF1 | PDF2 | PDF3 | PDF4)

return to top


Chris John Riley : UPDATED :

Defense by numbers: Making problems for script kiddies and scanner monkeys

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Tom Ritter

De-Anonymizing Alt.Anonymous.Messages

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Eric Robi, Michael Perklin : UPDATED :

Forensic Fails - Shift + Delete won't help you here

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Teal Rogers, Alejandro Caceres

The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jaime Sanchez : UPDATED :

Building an Android IDS on Network Level

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Runa A. Sandvik

Safety of the Tor network: a look at network diversity, relay operators, and malicious relays

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Noah Schiffman, SkyDog

The Dark Arts of OSINT

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Michael Schrenk

How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jaeson Schultz

Examining the Bitsquatting Attack Surface

Read It! (White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Hunter Scott : UPDATED :

Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jason Scott, Rachel Lovinger

Making Of The DEF CON Documentary

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Balint Seeber

All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Daniel Selifonov

A Password is Not Enough: Why disk encryption is broken and how we might fix it

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Neil Sikka : UPDATED :

EMET 4.0 PKI Mitigation

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Ryan W. Smith, Tim Strazzere

DragonLady: An Investigation of SMS Fraud Operations in Russia

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


James Snodgrass (PuNk1nPo0p), Josh Hoover (wishbone) : UPDATED :

BYO-Disaster and Why Corporate Wireless Security Still Sucks

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


soen : UPDATED :

Evolving Exploits Through Genetic Algorithms

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Christopher Soghoian

Backdoors, Government Hacking and The Next Crypto Wars

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jason Staggs : UPDATED :

How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles

Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Alex Stamos

An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Tom Steele, Dan Kottmann

Collaborative Penetration Testing With Lair

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Robert Stucke : UPDATED :

DNS May Be Hazardous to Your Health

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Chris Sumner, Randall Wald : UPDATED :

Predicting Susceptibility to Social Bots on Twitter

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Amr Thabet : UPDATED :

EDS: Exploitation Detection System

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Richard Thieme

The Government and UFOs: A Historical Analysis by Richard Thieme

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Josh 'm0nk' Thomas : UPDATED :

BoutiqueKit: Playing WarGames with expensive rootkits and malware

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Jacob Thompson

C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Marc Weber Tobias, Tobias Bluzmanis

Insecurity - A Failure of Imagination

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Vaagn Toukharian, Tigran Gevorgyan

HTTP Time Bandit

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Mark Weatherford

The Growing Irrelevance of US Government Cybersecurity Intelligence Information

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Tillmann Werner

Prowling Peer-to-Peer Botnets After Dark

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top

return to top


Brandon Wiley

Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine

See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Josh Yavor : UPDATED :

BYOD PEAP Show

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Craig *****

Android WebLogin: Google's Skeleton Key

Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top


Zoz

Hacking Driverless Vehicles

Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)

return to top