skip to main content

DEF CON Hacking Conference

DEF CON 19 Archive

Was August 4-7, 2011 at the Rio Hotel & Casino

Speakers & Presentations


Dark Tangent and LosTboY

Welcome and The Making of the DEF CON 19 Badge

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Panel

Network Security Podcast

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)


Panel

Meet the Federal Agent 2.0

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Abstrct

When Space Elephants Attack: A DEFCON Challenge for Database Geeks

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chema Alonso, Juan Garrido "Silverhack"

Bosses love Excel, Hackers too.

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chema Alonso, Juan Garrido "Silverhack"

Dust: Your Feed RSS Belongs To You! Avoid Censorship!

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Sterling Archer, Freaksworth

IP4 TRUTH: The IPocalypse is a LIE

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


James "Myrcurial" Arlen

Security When Nano Seconds Count

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Mike Arpaia, Ted Reed

Beat to 1337: Creating A Successful University Cyber Defense Organization

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Adam Baldwin

Pillaging DVCS Repos For Fun And Profit

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrea Barisani, Adam Laurie, Zac Franken & Daniele Bianco

Chip & PIN is Definitely Broken

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Bruce "Grymoire" Barnett

Deceptive Hacking: How Misdirection Can Be Used To Steal Information Without Being Detected

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Olivier Bilodeau

Fingerbank — Open DHCP Fingerprints Database

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Olivier Bilodeau

PacketFence, The Open Source Nac: What We've Done In The Last Two Years

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Emmanuel Bouillon UPDATED

Federation and Empire

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Sam Bowne

Three Generations of DoS Attacks (with Audience Participation, as Victims)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


David M. N. Bryan, Luiz Eduardo

Building The DEF CON Network, Making A Sandbox For 10,000 Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jeff Bryner

Kinectasploit: Metasploit Meets Kinect

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jamie Butler

Physical Memory Forensics for Cache

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marcus J. Carey, David Rude & Will Vandevanter

Metasploit vSploit Modules

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


George Chamales

Lives On The Line: Securing Crisis Maps In Libya, Sudan, And Pakistan

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ming Chow

Abusing HTML5

Read It! (PDF | PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Christopher Cleary

Operational Use of Offensive Cyber

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tyler Cohen

Look At What My Car Can Do

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Kees Cook

Kernel Exploitation Via Uninitialized Stack

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Greg Conti

The Art and Science of Security Research

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Paul Craig

Internet Kiosk Terminals: The Redux

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Adrian Crenshaw "Irongeek"

Cipherspaces/Darknets: An Overview Of Attack Strategies

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Daniel Crowley

Speaking with Cryptographic Oracles

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Phil Cryer

Taking Your Ball And Going Home; Building Your Own Secure Storage Space That Mirrors Dropbox's Functionality

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jack Daniel, James Arlen, Joshua Corman, Alex Hutton, Martin McKeay & Dave Shackleford

PCI 2.0: Still Compromising Controls and Compromising Security

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


datagram

Introduction to Tamper Evident Devices

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ganesh Devarajan, Don LeBert

VDLDS — All Your Voice Are Belong To Us

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Deviant Ollam

Safe to Armed in Seconds: A Study of Epic Fails of Popular Gun Safes

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Whitfield Diffie and Moxie Marlinspike

Whitfield Diffie and Moxie Marlinspike

See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)

return to top


Artem Dinaburg

Bit-squatting: DNS Hijacking Without Exploitation

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Alva 'Skip' Duckwall

A Bridge Too Far: Defeating Wired 802.1x with a Transparent Bridge Using Linux

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nelson Elhage

Virtualization under attack: Breaking out of KVM

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tim Elrod, Stefan Morris

I Am Not a Doctor but I Play One on Your Network

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dr. Patrick Engebretson, Dr. Josh Pauli

Mamma Don't Let Your Babies Grow Up to be Pen Testers - (a.k.a. Everything Your Guidance Counselor Forgot to Tell You About Pen Testing)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


eskimo

Steganography and Cryptography 101

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Tom Eston, Josh Abraham & Kevin Johnson

Don't Drop the SOAP: Real World Web Service Testing for Web Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ben Feinstein, Jeff Jarmoc

"Get Off of My Cloud": Cloud Credential Compromise and Exposure

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Foofus

Handicapping the US Supreme Court: Can We Get Rich by Forceful Browsing?

Read It! (White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Gus Fritschie, Mike Wright

Getting F***** On the River

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Eric Fulton

Cellular Privacy: A Forensic Analysis of Android Network Traffic

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Daniel Garcia

UPnP Mapping

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrew Gavin

Gone in 60 Minutes: Stealing Sensitive Data from Thousands of Systems Simultaneously with OpenDLP

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Kenneth Geers UPDATED

Strategic Cyber Security: An Evaluation of Nation-State Cyber Attack Mitigation Strategies

Read It! (Slides | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ramon Gomez

Bulletproofing The Cloud: Are We Any Closer To Security?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Vlad Gostom, Joshua Marpet

Smile for the Grenade! "Camera Go Bang!"

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Anch, blakdayz, Anarchy Angel, ngharo, Itzik Kotler, Jake "GenericSuperhero" & converge

Represent! Defcon Groups, Hackerspaces, and You.

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nathan Hamiel, Gregory Fleischer, Justin Engler & Seth Law

Smartfuzzing The Web: Carpe Vestra Foramina

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Rob Havelt, Wendel Guglielmetti Henrique

Earth vs. The Giant Spider: Amazingly True Stories of Real Penetration Tests

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Deral Heiland

From Printer To Pwnd: Leveraging Multifunction Printers During Penetration Testing

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Thomas J. Holt, Max Kilger

Assessing Civilian Willingness to Participate in On-Line Political and Social Conflict

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Rick Howard

An Insider's Look at International Cyber Security Threats and Trends

Read It! (PDF | White Paper) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Hubris and a5h3r4h

Anonymous Cyber War

See it! (Slides Video)

return to top


Mikko Hypponen

The History and the Evolution of Computer Viruses

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Robert "Hackajar" Imhoff-Dousharm

Economics of Password Cracking in the GPU Era

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Aseem "@" Jakhar

Jugaad – Linux Thread Injection Kit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt 'openfly' Joyce

The Art of Trolling

Read It! (PNG) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dan Kaminsky

Black Ops of TCP/IP 2011

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Dave Kennedy (ReL1K)

Hacking Your Victims Over Power Lines

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Brian Kennish

Tracking the Trackers: How Our Browsing History Is Leaking into the Cloud

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Itzik Kotler, Iftach Ian Amit

Sounds Like Botnet

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt Krick "DCFluX"

DCFluX in: License to Transmit

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Anthony Lai, Benson Wu, Jeremy Chiu & PK

Balancing The Pwn Trade Deficit – APT Secrets in Asia

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shane Lawson, Bruce Potter & Deviant Ollam

And That's How I Lost My Eye: Exploring Emergency Data Destruction

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Grayson Lenik

I'm Your MAC(b)Daddy

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Katy Levinson

Don't Fix It In Software

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Steven Levy

We Owe it All to the Hackers

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Ryan Linn

PIG: Finding Truffles Without Leaving A Trace

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


David Litchfield

Hacking and Forensicating an Oracle Database Server

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Johnny Long

Johnny Long and Hackers for Charity

return to top


William Manning

Pervasive Cloaking

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Joey Maresca

We're (The Government) Here To Help: A Look At How FIPS 140 Helps (And Hurts) Security

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Moxie Marlinspike

SSL And The Future Of Authenticity

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jon McCoy

Hacking .Net Applications: The Black Arts

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Wesley McGrew

Covert Post-Exploitation Forensics With Metasploit

Read It! (PDF | White Paper | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


John McNabb

Vulnerabilities of Wireless Water Meter Networks

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Charlie Miller

Battery Firmware Hacking

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Steve Ocepek

Blinkie Lights: Network Monitoring with Arduino

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Kyle 'Kos' Osborn, Matt Johanson

Hacking Google Chrome OS

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason Ostrom

VoIP Hopping the Hotel: Attacking the Crown Jewels through VoIP

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicole Ozer

Big Brother on the Big Screen: Fact/Fiction?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Paul Kehrer

Getting SSLizzard

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Jibran Ilyas

Malware Freak Show 3: They're pwning er'body out there!

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Nicholas J. Percoco, Sean Schulte

This is REALLY not the droid you're looking for...

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Josh Phillips

Hacking MMORPGs for Fun and Mostly Profit

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Gregory Pickett

Port Scanning Without Sending Packets

Read It! (PDF | Extras) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason M. Pittman

My password is: #FullOfFail! — The Core Problem with Authentication and How We Can Overcome It

Read It! (PDF)

return to top

return to top


Semon Rezchikov, Morgan Wang & Joshua Engelman

Why Airport Security Can't Be Done FAST

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Paul Roberts, Aaron Barr, Joshua Corman & Jericho

"Whoever Fights Monsters..." Aaron Barr, Anonymous, and Ourselves

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Michael Robinson

What Time Are You Anyway?

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Dan Rosenberg

Owned Over Amateur Radio: Remote Kernel Exploitation in 2011

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Michael Scarito

Build your own Synthetic Aperture Radar

See it! (Slides Video| Speaker & Slides Video) Hear it! (m4b audio)

return to top

return to top


Michael "theprez98" Schearer

WTF Happened to the Constitution?! The Right to Privacy in the Digital Age

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jason Scott

Archive Team: A Distributed Preservation of Service Attack

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Justin Searle

Attacking and Defending the Smart Grid

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jimmy Shah

Mobile App Moolah: Profit taking with Mobile Malware

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shrdlu

Are You In Yet? The CISO's View of Pentesting

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Skunkworks

Hacking the Global Economy with GPUs or How I Learned to Stop Worrying and Love Bitcoin

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Reeves Smith

How Haunters Void Warranties

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


John J. Strauchs, Tiffany Rad, Teague Newman & Dora The SCADA Explorer

SCADA & PLCs in Correctional Facilities: The Nightmare Before Christmas

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jayson E. Street

Steal Everything, Kill Everyone, Cause Total Financial Ruin! (Or How I Walked In And Misbehaved)

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Chris "TheSuggmeister" Sumner, alien & Alison B UPDATED

Weaponizing Cyberpsychology and Subverting Cybervetting for Fun, Profit and Subterfuge

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Bruce Sutherland

How To Get Your Message Out When Your Government Turns Off The Internet

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Martin Holst Swende, Patrik Karlsson

Web Application Analysis With Owasp Hatkit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Mike Tassey, Rich Perkins

Wireless Aerial Surveillance Platform

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Richard Thieme

Staring into the Abyss: The Dark Side of Crime-fighting, Security, and Professional Intelligence

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marc Weber Tobias, Matt Fiddler & Tobias Bluzmanis

Insecurity: An Analysis Of Current Commercial And Government Security Lock Designs

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Schuyler Towne

DIY Non-Destructive Entry

See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Marketa Trimble

The Future of Cybertravel: Legal Implications of the Evasion of Geolocation

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Shawn Webb

Runtime Process Insemination

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Matt "scriptjunkie" Weeks

Network Nightmare: Ruling The Nightlife Between Shutdown And Boot With Pxesploit

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Yekaterina Tsipenyuk O'Neil, Erika Chin

Seven Ways to Hang Yourself with Google Android

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Jos Weyers UPDATED

Key Impressioning

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Thomas Wilhelm

Staying Connected during a Revolution or Disaster

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Andrew Wilson, Michael Brooks

Traps of Gold

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Brad Woodberg

Network Application Firewalls: Exploits and Defense

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Joey Zhu

Phishing and Online Scam in China

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top


Zoz, Andrea Bianchi

Vanquishing Voyeurs: Secure Ways To Authenticate Insecurely

Read It! (PDF) See it! (Slides Video | Speaker & Slides Video) Hear it! (m4b audio)

return to top

Panels




return to top