skip to main content

DEF CON Hacking Conference

DEF CON 14 Archive

was August 4-6, 2006 at the Riviera Hotel and Casino.

Speakers & Presentations


atlas

The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jay Beale

Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Teli Brown

Phishing, it starts with “Ph” for a reason. Some best practices to detect and prevent for some new point of attack methods

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Wes Brown & Scott Dunlop

Exploit Writing Using Injectable Virtual Machines

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Cache

Fun with 802.11 Device Drivers

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jon Callas

Traffic Analysis Panel

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Strom Carlson

Hacking FedEx Kinko's: How Not To Implement Stored-Value Card Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Strom Carlson, skrooyoo, datagram & Vidiot

SOCIAL MESSAGE RELAY: Using existing social networks to transmit covert messages in public

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert W. Clark

Legal Aspects of Computer Self-Defense and Aggressive Self-Defense

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert Clark

Legal Aspects of Internet & Computer Network Defense: A Year in Review Computer and Internet Security Law 2005-2006

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Cindy Cohn, Kevin Bankston, Kurt Opsahl, Jason Schultz, Danny O’Brien, Seth Schoen

Ask EFF: The Year in Digital Civil Liberties

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Cindy Cohn, Kevin Bankston, Kurt Opsahl & Jason Schultz

EFF v. AT&T: Your World, Delivered (to the NSA)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Greg Conti

Googling: I'm Feeling (un)Lucky

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jared DeMott

The Evolving Art of Fuzzing

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


dr.kaos, arcon, atlas, beth, digunix

SAMAEL (Secure, Anonymous, Megalomaniacal, Autonomous, Encrypting Linux) and NARC (Network Analysis Reporting Console)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Steve Dunker

FEAR!(?) The Census Bureau

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Chris Eagle

Ripples in the Gene Pool: Creating Genetic Mutations to Survive the Vulerability Window

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Charles Edge aka Krypted

10 Ways To Not Get Caught Hacking On Your Mac

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Charles Edge aka Krypted

Mac OS X Security Tools

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Riley "Caezar" Eller

Securing MANET

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Gadi Evron

DNS Abuse Infrastructure and Games

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Yuan Fan & Xiao Rong

MatriXay: When Web App & Database Security Pen-Test/Audit Is a Joy

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Halvar Flake

RE 2006: New Challenges Need Changing Tools

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Foofus

Graphical Representations of Security Relationships: Awesome or Bullshit?

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


FX

Analysing Complex Systems: The BlackBerry Case

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Joe Grand

Hardware Hacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Kenneth Geers & Alexander Eisen

Ipv6 World Update: High Diplomacy & Monster Trucks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas X. Grasso

Fighting Organized Cyber Crime

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Lukas Grunwald

First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Peter Gutmann

Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert J. Hansen

Trust, But Verify: Auditing Proprietary DRE Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Seth Hardy

Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Matt Hargett & Luis Miras

Automatic Exploit Detection in Binaries

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Rick Hill

WarRocketing: Network Stumbling 50 sq. miles in < 60 sec.

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Broward Horne

Meme Hacking—Subverting The Ideosphere

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas Holt

Exploring the Changing Nature of DEF CON over the Past 14 Years

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Arias Hung

Owning the Linksys wrtp54g VOIP Router

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johan Hybinette

How to Create an Anonymous Identity

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Black Ops 2006

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Alexander Kornbrust

Oracle Rootkits 2.0

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Isaac Levy (.ike)

Hacking UNIX with FreeBSD Jail(8), Secure Virtual Servers

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Lin0xx

Advanced Windows Based Firewall Subversion

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Long

Death By 1000 Cuts

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Long

Secrets of the Hollywood Hacker!

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Major Malfunction

Old Skewl Hacking: Magstripe Madness

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Raffael Marty

Visual Log Analysis - The Beauty of Graphs

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Luis Miras

Bridging the Gap Between Static and Dynamic Reversing

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Damon McCoy & Anmol Sheth

Zulu A Command Line Wireless Frame Generator

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Scott Moulton

Rebuilding HARD DRIVES for Data Recovery: Anatomy of a Hard Drive

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Scott Miller

A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Collin Mulliner

Advanced Attacks Against PocketPC Phones

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


R.P. Murphy

Covert Channels using IPv6/ICMPv6

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Timothy M O'Neill

"What has the NSA done for me lately?"

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Chris Paget

US-VISIT: Raping personal privacy since 2004

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


tommEE pickles

802.1x Networking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter

Trusted Computing: Could it be... SATAN?

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael Rash

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Renderman, Thorn & H1kari

New Wireless Fun From the Church Of WiFi

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Melanie Rieback

A Hacker's Guide to RFID Spoofing and Jamming

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Martyn Ruks

IBM Networking Attacks—Or The Easiest Way To Own A Mainframe Without Getting The Removals Men In

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Eric Schmiedl

Safecracking Without a Trace

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Amber Schroader & Tyler Cohen

Cyber-crime Foiled Once Again? Help prove the innocence or guilt of Jack Grove

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


SensePost

A Tale of Two Proxies

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Simmonds, Pamela Fusco, David Mortman, Henry Teng

The Jericho Forum and Challenge

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Brad Smith

How the FBI uses NLP on YOU!

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Mark Stamp & Wing H. Wong

Hunting for Metamorphic Engines

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Joe Stewart

OllyBone: Semi-Automatic Unpacking on IA-32

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Richard Thieme

Beyond Social Engineering: Tools for Reinventing Yourself

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Irby Thompson & Mathew Monroe

Advanced File System Hiding and Detection

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Marc Weber Tobias & Matt Fiddler

Things That Go "Bump" in the night: An Analysis of Current and Emerging Threats to Physical Security

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Peleus Uhley

Kiosk Security

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Valsmith & Danny Quist

Hacking Malware: Offense is the new Defense

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Randal Vaughn & Gadi Evron

DNS Amplification Attacks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Vixie & David Dagon

Malware Repository Requirements

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


weasel & simple nomad

The Plausible Deniability Toolkit

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Linton Wells

UNCLASSIFIED Information Sharing with Non-Traditional Partners

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Rick Wesson

Abuse and the Global Infection Rate

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Andrew Whitaker

Corporate Network Spying

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Greg White & Kevin Archer

The National Collegiate Cyber Defense Competition

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


x30n

Blackjacking - 0wning the Enterprise via the Blackberry

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Phil Zimmermann

Turbo-Talk - Special Project VOIP Encryption Update

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)

return to top