skip to main content

DEF CON Hacking Conference

DEF CON 8 Archive

was held July 28- 30, 2000 at the Alexis Park Hotel & Resort

Speakers & Presentations

Defcon 8: Uber Haxor


Tim Lawless & Saint Jude

Modeling, Detecting and Responding to Unauthorized Root Transitions

See It! (m4v Video) Hear it! (m4b Audio)


Robert Graham

Evading Network-based Intrusion Detection Systems

See It! (m4v Video) Hear it! (m4b Audio)


Ian Vitek

IP-spoofing and source routing connections with Linux 2.0.X

See It! (m4v Video) Hear it! (m4b Audio)


Bennett Haselton

A Protocol That Uses Steganography to Circumvent Network Level Censorship

See It! (m4v Video) Hear it! (m4b Audio)


Greg Hoglund

Advanced Buffer Overflow Techniques

See It! (m4v Video) Hear it! (m4b Audio)


Phil King

8-Bit Redux: Microcontroller Hacking

See It! (m4v Video) Hear it! (m4b Audio)


Mythrandir

Penetrating B1 Trusted Operating Systems

See It! (m4v Video) Hear it! (m4b Audio)


Evil Wrangler

Building a Backdoor Binary (featuring SSH 2.0.13)

See It! (m4v Video) Hear it! (m4b Audio)


Adam Bresson

Palm OS Security

See It! (m4v Video) Hear it! (m4b Audio)


ghandi

Dot-Com Smashing: Buffer Overflows on the SPARC

See It! (m4v Video) Hear it! (m4b Audio)


syke

Opensource Utilities and How to Use Them To Test IDSes and Firewalls

See It! (m4v Video) Hear it! (m4b Audio)


Kent Radek

Puzzlenet.net - Designing An Anonymous Network

See It! (m4v Video) Hear it! (m4b Audio)


Chris Goggans, Kevin McPeake, Wouter Aukema

Lotus Notes/Domino Security

See It! (m4v Video) Hear it! (m4b Audio)


John S. Flowers

Network IDS - Do Not Bend, Fold, Spindle or Mutilate

See It! (m4v Video) Hear it! (m4b Audio)


blanu

Freenet 101 + Why We're Anonymous

See It! (m4v Video) Hear it! (m4b Audio)


jeru

Advanced Evasion of IDS Buffer Overflow Detection

See It! (m4v Video) Hear it! (m4b Audio)


Subterrain Security Group (SSG)

The Impact of Passive Network Mapping in Distributed Environments

Defcon 8: Haxor


Gregory B. White

The USAFA Cadet Hacking Case: What Both Sides Should Learn About Computer Forensics

See It! (m4v Video) Hear it! (m4b Audio)


Ron Moritz

Proactive Defense Against Malicious Code

See It! (m4v Video) Hear it! (m4b Audio)


D-Krypt

Web Application Security

See It! (m4v Video) Hear it! (m4b Audio)


David J. DiCenso

The Citizen Hacker: Patriot or War Criminal?

See It! (m4v Video) Hear it! (m4b Audio)


Jason Scott

TEXTFILES.COM: ONE YEAR LATER

See It! (m4v Video) Hear it! (m4b Audio)


Mr. Mojo

Windows 2000 Security

See It! (m4v Video) Hear it! (m4b Audio)


Ian Goldberg

"Using the Internet Pseudonymously III: It's Alive!"

See It! (m4v Video) Hear it! (m4b Audio)


Ender

Demonstration and presentation of the Autonomous Nodes that Batz and Caezar presented in concept at BlackHat Singapore

See It! (m4v Video) Hear it! (m4b Audio)


Phillip J. Loranger

See It! (m4v Video) Hear it! (m4b Audio)


Simple Nomad

A How-to Regarding Network Mapping That Covers Some Interesting Techniques Not Commonly Used

See It! (m4v Video) Hear it! (m4b Audio)


noise

Anonymous Remailers: The Importance of Widely-available Anonymity In An Age of Big Brother

See It! (m4v Video) Hear it! (m4b Audio)


Bruce Schneier

See It! (m4v Video) Hear it! (m4b Audio)


John Q. Newman

Fake ID by Mail and Modem

See It! (m4v Video) Hear it! (m4b Audio)


John Q. Newman

10 Steps You Can Take To Protect Your Privacy

See It! (m4v Video) Hear it! (m4b Audio)


Richard Thieme

Social Engineering at Def Con:Games Hackers Play

See It! (m4v Video) Hear it! (m4b Audio)


Eric Sinrod

Federal Computer Fraud and Abuse Act

See It! (m4v Video) Hear it! (m4b Audio)


Sarah Gordon

Virus Writers: The End of The Innocence

See It! (m4v Video) Hear it! (m4b Audio)


Aaron Grothe

Tunneling and Firewalls

See It! (m4v Video) Hear it! (m4b Audio)


V1ru5 and *Hobbit*

See It! (m4v Video) Hear it! (m4b Audio)


CdC

Defcon 8: Newbie


Wyatt

Radio Hacking


Thomas Munn

Need for Home-based Firewalls

See It! (m4v Video) Hear it! (m4b Audio)


V1ru5

Virus talk: An Introduction To Computer Viruses

See It! (m4v Video) Hear it! (m4b Audio)


Mr. Nasty

Using Tools To Obtain Recon on NT Networks

See It! (m4v Video) Hear it! (m4b Audio)


Jennifer Granick & Grant Gottfriend

The Law and Hacking

See It! (m4v Video) Hear it! (m4b Audio)


Mike Scher

What is DNS and alt Roots? What Are Alternate Roots and Why Does Internet Duck

See It! (m4v Video) Hear it! (m4b Audio)


DDT - PGP

What PGP and Crypto Is and How to Use (and Not Use) It

See It! (m4v Video) Hear it! (m4b Audio)


Thomas Munn

How To Make a Linux Firewall with IP-chains


Freaky

Security and Hacking of the MacOS and Details of OSX

See It! (m4v Video) Hear it! (m4b Audio)


Pyr0

FAQ the Kiddies

See It! (m4v Video) Hear it! (m4b Audio)


Daremoe

System Profiling: Target Analysis or How Crackers Find You

See It! (m4v Video) Hear it! (m4b Audio)


Natasha Gregori

Hacktivits to Activists - Making the Transition

See It! (m4v Video) Hear it! (m4b Audio)


Jim McCoy

Majo Nation: Building a Next Generation Distributed Data Service

See It! (m4v Video) Hear it! (m4b Audio)


Arthur L. Money

Meet the FED [ Panel ]

See It! (m4v Video) Hear it! (m4b Audio)


Legal Panel

See It! (m4v Video) Hear it! (m4b Audio)


Xs

LDAP

See It! (m4v Video) Hear it! (m4b Audio)

return to top