skip to main content

DEF CON Hacking Conference

DEF CON 17 Archive

was July 30 - August 2, 2009 at the Riviera Hotel & Casino.

Speakers & Presentations

return to top


Joshua "Jabra" Abraham, Robert "RSnake" Hansen

Unmasking You

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


MD Sohail Ahmad, Prabhash Dhyani

Wi-Fish Finder: Who Will Bite the Bait

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Chema Alonso, Jose Palazon "Palako"

Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dmitri Alperovitch, Marcus Sachs, Phyllis Schneck, Ed Skoudis

Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World

See it! (m4v video) Hear it! (m4b audio)

return to top


Iftach Ian Amit

Down the Rabbit Hole: Uncovering a Criminal Server

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Alek Amrani : UPDATED :

Pre-Con Introduction to Lock Picking

return to top


Alek Amrani : UPDATED :

Session Donation

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


James "Myrcurial" Arlen, Tiffany Rad

Your Mind: Legal Status, Rights and Securing Yourself

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Mike "mckt" Bailey, Russ McRee

CSRF: Yeah, It Still Works

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Andrea Barisani, Daniele Bianco

Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jay Beale, Justin Searle

The Middler 2.0: It's Not Just for Web Apps Anymore

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Antoine Gademer, Corentin Chéron

A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Rod Beckstrom

Beckstrom's Law - A Model for Valuing Networks and Security

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Beth, Noid, Nick Farr, Leigh Honeywell, Steve Clement : UPDATED :

Robot Shark Laser! What Hackerspaces Do

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sam Bowne

Hijacking Web 2.0 Sites with SSLstrip—Hands-on Training

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sean Boyce : UPDATED :

Design and Implementation of a Quantum True Random Number Generator

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Michael Brooks, David Aslanian

BitTorrent Hacks

Read It! (PDF) Extras (TAR.BZ2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


K.C. Budd "Phreakmonkey", Taylor Banks "Dr Kaos" : UPDATED :

Old Skool Brought Back: A 1964 Modem Demo

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Joey Calca, Ryan Anguiano

Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Robert Clark

Computer and Internet Security Law - A Year in Review 2008 - 2009

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sandy Clark "Mouse"

De Gustibus, or Hacking your Tastebuds

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Cough

Confidence Game Theater

Read It! (PDF) See it! (m4v Video) Hear it! (m4b audio)

return to top


Datagram

Lockpicking Forensics

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sherri Davidoff

Death of Anonymous Travel

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dead Addict

Unfair Use - Speculations on the Future of Piracy

See it! (m4v video) Hear it! (m4b audio)

return to top


Dead Addict

DEF CON 1 - A Personal Account

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Da Beave, JFalcon

AAPL- Automated Analog Telephone Logging

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dino Dai Zovi

Macsploitation with Metasploit

See Metasploit Track for video and audio.

return to top


Michael L. Davis : UPDATED :

Who Invented the Proximity Card?

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Rob "Padre" DeGulielmo : UPDATED :

Con Kung-Fu: Defending Yourself @ DEF CON

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Deviant Ollam

Packing and the Friendly Skies (Why Transporting your Firearms may be the best way to Safeguard your Tech when you Fly)

Read It! (PDF) Extras (ZIP) See it! ( Slides) Hear it! (m4b audio)

return to top


Digividual

Sharepoint 2007 Knowledge Network Exposed

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Digividual

Socially Owned in the Cloud

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Roger Dingledine

Why Tor is Slow, and What We're Doing About It

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Brandon Dixon

Attacking SMS. It's No Longer Your BFF

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


I)ruid

MSF Telephony

See Metasploit Track for video and audio.

return to top


Steve Dunker, Kristie Dunker

Personal Survival Preparedness

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Muhaimin Dzulfakar

Advanced MySQL Exploitation

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Luiz "effffn" Eduardo

30k Feet Look at WiFi

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Egypt : UPDATED :

Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Endgrain, Tiffany Rad, Dan Kaminsky

Hello, My Name is /hostname/

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Bosse Eriksson : UPDATED :

Runtime Kernel Patching on Mac OS X

Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Kevin Estis, Randy Robbins : UPDATED :

Hacking the Apple TV and Where your Forensic Data Lives

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Tom Eston, Kevin Johnson

Social Zombies: Your Friends Want to Eat Your Brains

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


etd : UPDATED :

Dradis Framework - Sharing Information will get you Root

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Damian Finol

Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security

Read It! (PDF)

return to top


Gregory Fleischer

Attacking Tor at the Application Layer

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Tony Flick

Hacking the Smart Grid

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


FX

Router Exploitation

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Chris Gates, Mario Ceballos

Breaking the "Unbreakable" Oracle with Metasploit

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Efstratios L. Gavas : UPDATED :

Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Travis Goodspeed

Locally Exploiting Wireless Sensors

Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Goldy, Pierce

Introduction to WiMAX Hacking

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Travis Goodspeed

An Open JTAG Debugger

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Joe Grand (Kingpin) & The Dark Tangent : UPDATED :

Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Joe Grand (Kingpin), Zoz

The Projects of "Prototype This!"

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Joe "Kingpin" Grand, Jake Appelbaum, Chris Tarnovsky

"Smart" Parking Meter Implementations, Globalism, and You
(aka Meter Maids Eat Their Young)

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jennifer Granick : UPDATED :

The Year In Computer Crime Cases

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Peter Gutmann

The Psychology of Security Unusability

Read It! (PDF) See it! (Slides) Hear it! (m4b audio)

return to top


Nick Harbour

Win at Reversing: Tracing and Sandboxing through Inline Hooking

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sho Ho

FOE — Feeding Controversial News to Censored Countries (Without Using Proxy Servers)

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dr. Thomas J. Holt, Dr. Max Kilger, Dr. Debora Strumsky, Dr. Olga Smirnova


Identifying, Exploring, and Predicting Threats in the Russian Hacker Community

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Stephen 'afterburn' Janansky, Nick Waite

Hardware Trojans: Infiltrating the Faraday Cage

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


jhind

Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Pedro "hkm" Joaquin : UPDATED :

Attacks Against 2wire Residential Gateways

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Kevin Johnson, Justin Searle, Frank DiMaggio

Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Grant Jordan : UPDATED :

Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dan Kaminsky

Something about Network Security

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Kenshoto

WarGamez Redux

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Mike Kershaw

MSF Wifi

See Metasploit Track for video and audio.

return to top


Dr. Fouad Kiamilev, Rodney McGee

Hardware Black Magic - Building devices with FPGAs

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jon R. Kibler, Mike Cooper : UPDATED :

Hack The Textbook

Read It! (PDF) Extras (KEY) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Itzik Kotler, Tomer Bitton

The Day of the Updates

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Matt Krick "DCFluX"

DCFluX in: The Man with the Soldering Gun

Read It! (PDF)

return to top


Righter Kunkel

Air Traffic Control: Insecurity and ADS-B

Read It! (PDF) Extras (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Lee Kushner, Mike Murray

Effective Information Security Career Planning

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Ava Latrope

eXercise in Messaging and Presence Pwnage

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Ricky Lawshae

Picking Electronic Locks Using TCP Sequence Prediction

Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Robert F. Lentz

Perspective of the DoD Chief Security Officer

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Michael Ligh, Matthew Richard

Making Fun of Your Malware

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Roberto Suggi Liverani, Nick Freeman : UPDATED :

Abusing Firefox Addons

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Lockheed

DC Network Session

return to top


Fred Von Lohmann, Jennifer Granick

Jailbreaking and the Law of Reversing

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Johnny Long

three point Oh.

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


George Louthan, Cody Pollet : UPDATED :

Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Kevin Mahaffey, John Hering, Anthony Lineberry

Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Josh Marks, Rob Rehrig, Larry Aiello

Hacking the Wiimote and Wii Fit to Help the Disabled

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Moxie Marlinspike

More Tricks For Defeating SSL

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


David Maynor

App Assessment the Metasploit Way

See Metasploit Track for video and audio.

return to top


Joseph McCray

Advanced SQL Injection

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Haroon Meer, Marco Slaviero, Nicholas Arvanitis : UPDATED :

Clobbering the Cloud

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Douglas C. Merrill

Is That You, Baby, or Just a Bridge in the Sky?

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top

return to top


Erez Metula : UPDATED :

Managed Code Rootkits - Hooking into Runtime Environments

Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Christopher Mooney, James Luedke

Subverting the World Of Warcraft API

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


H.D. Moore

Metasploit Evolved

See Metasploit Track for video and audio.

return to top


H.D. Moore

Meterpreter Advances

See Metasploit Track for video and audio.

return to top


H.D. Moore

Hacking the Next Internet

See Metasploit Track for video and audio.

return to top


David Mortman, Rich Mogull, Dave Maynor, Larry Pesce, Robert "RSnake" Hansen

Defcon Security Jam 2: The Fails Keep on Coming

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Scott Moulton

RAID Recovery: Recover your PORN by Sight and Sound

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Shawn Moyer, Nathan Hamiel

Weaponizing the Web: New Attacks on User-generated Content

Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Mike Murray, Tyler Reguly

Slight of Mind: Magic and Social Engineering

Read It! (PDF)

return to top


Ne0nRa1n, Keith Biddulph

Hacking Sleep: How to Build Your Very Own Sleep Lab

Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jason Ostrom, Arjun Sambamoorthy : UPDATED :

Advancing Video Application Attacks with Video Interception, Recording, and Replay

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Chris Paget

RFID MythBusting

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Nicholas J. Percoco , Jibran Ilyas : UPDATED :

Malware Freak Show

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Tyler Pitchford, Esq.

Search And Seizure Explained - They Took My Laptop!

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Bruce Potter, Logan Lodge

Fragging Game Servers

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Pratap Prabhu, Yingbo Song, Salvatore. J. Stolfo

Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Psifertex : UPDATED :

Maximum CTF: Getting the Most Out of Capture the Flag

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Danny Quist, Lorie M. Liebrock

Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Daniel Raygoza

Automated Malware Similarity Analysis

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Paul F. Renda

Injecting Electromagnetic Pulses into Digital Devices

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


RenderMan, Michael "theprez98" Schearer : UPDATED :

Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival

Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jim Rennie

So You Got Arrested in Vegas...

Read It! (PDF) Extras (PDF) See it! (Video and Slides | Slides) Hear it! (m4b audio)

return to top


Matt Richard, Steven Adair

0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Nicolle Neulist "RogueClown"

Hackerspaces: The Legal Bases

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


David Rook : UPDATED :

The security risks of Web 2.0

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jon Rose

Deblaze - A Remote Method Enumeration Tool for Flex Servers

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Antonio "Tony" Rucci

Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Adam Savage

Failure

See it! (Speaker & Slides) Hear it! (m4b audio)

return to top


Jason Schlesinger

Cloud Security in Map/Reduce

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Bruce Schneier

Q & A with Bruce Schneier

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Michael Schrenk : UPDATED :

Screen Scraper Tricks: Extracting Data from Difficult Websites

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jason Scott

That Awesome Time I Was Sued For Two Billion Dollars

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sumit Siddharth : UPDATED :

The Making of the second SQL injection Worm

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Peter Silberman, Steve Davis

Metasploit Autopsy: Recontructing the Crime Scene

See Metasploit Track for video and audio.

return to top


Christopher Soghoian

Manipulation and Abuse of the Consumer Credit Reporting Agencies

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Dominic Spill, Michael Ossmann, Mark Steward

Bluetooth, Smells Like Chicken

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jayson E. Street

"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of Global Cyber-Warfare)

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Mark Ryan Del Moral Talabis

Dangerous Minds: The Art of Guerrilla Data Mining

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Sean "Frank^2" Taylor

Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly

Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Richard Thieme

Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything

See it! (m4v video) Hear it! (m4b audio)

return to top


Richard Thieme

Hacking, Biohacking, and the Future of Humanity

See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


TK234

PLA Information Warfare Development Timeline and Nodal Analysis

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Marc Weber Tobias, Matt Fiddler, Tobias Bluzmanis : UPDATED :

Invisible Access: Electronic Access Control, Audit Trails and "High Security"

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Efrain Torres

Metasploit Goes Web

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Tottenkoph

Good Vibrations: Hacking Motion Sickness on the Cheap

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Valsmith, Colin Ames, David Kerb

MetaPhish

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Charlie Vedaa, "Anonymous secondary speaker"

Proxy Prank-o-Matic

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Rafael Dominguez Vega : UPDATED :

USB Attacks: Fun with Plug & 0wn

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Videoman

Hacking with GNURadio

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Matt Weir, Professor Sudhir Aggarwal : UPDATED :

Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…

Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Thomas Wilhelm

Hacking WITH the iPod Touch

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Jeff Yestrumskas, Matt Flick

Cross Site Scripting Anonymous Browser 2.0

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Edward Zaborowski : UPDATED :

Doppelganger: The Web's Evil Twin

Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top


Mike Zusman

Criminal Charges are not pursued: Hacking PKI

Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)

return to top

Panels


return to top

return to top