DEFCON 14 Masthead
DEFCON 14 FAQDEFCON 14 VenueDEFCON 14 ContestsDEFCON 14 EventsDEFCON 14 SpeakersDEFCON 14 Schedule
DEFCON 14 Schedule


Pre-Con - Thursday: August 3

12:00 - 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early.

Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store located in the same room as Registration

Vendor Area Setup: 11:00 - 18:00

18:00 - ???

The Unofficial Defcon 14 Toxic BBQ will be held for its third consecutive year. Details of the TBBQ's location can be found at http://www.toxicbbq.com. Sign on to the Defcon Forums and help plan this year's event.


Day 1 - Friday: August 4

08:00 - 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the Royale Pavilion Registration Desk.

Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store across from Registration

Vendor Area Hours: 10:00 - 19:00


Track 1

Royale Pavilion 1-2

Track 2

Grand Ballroom F-G-H

Track 3

Grand Ballroom E

Outdoor Area

Top of the Riv

Contest Area

Events

10:00 – 10:50

Hardware Hacking

Joe Grand

Fighting Organized Cyber Crime

Thomas X. Grasso

The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

atlas

Outdoor Grill and Thrill with Dunk Tank, fresh grilled victuals and cash bar


Coffee Wars

Capture the Flag unitl 22:00 (Day 1)

Janus Wireless Challenge until 18:00 (Day 1)

Net Appliance Challenge until 18:00 (Day 1)

Robot Wars until 18:00 (Day 1)

Scavenger Hunt until 20:00 (Day 1)

TCPIP Enabled Device until 18:00 (Day 1)

Wall of Sheep

Vendor Area Open until 19:00

LockPick Village in Skybox 206 until 18:00

11:00 – 11:50

Googling: I'm Feeling (un)Lucky

Greg Conti

The Jericho Forum and Challenge

Paul Simmonds, Pamela Fusco, David Mortman, Henry Teng

Remote Pair Programming and Test-driven Development Using Open Source

Matt Hargett & Luis Miras

Amateur CtF until 19:00 (Day 1)


12:00 – 12:50

New Wireless Fun From the Church Of WiFi

Renderman, Thorn & H1kari

Beyond Social Engineering: Tools for Reinventing Yourself

Richard Thieme

Panel: Internet Wars 2006

Gadi Evron, Mudge, Paul Vixie, Dan Kaminsky, Randy Vaughn, Dan Hubbard, Tim Grasso

Beverage Cooling Contraption until 15:00


13:00 – 13:50

WarRocketing: Network Stumbling 50 sq. miles in < 60 sec.

Rick Hill

Trusted Computing: Could it be... SATAN?

Bruce Potter


Lockpick until 16:00 (Day 1)

Booksigning: RFID Security with Thorn and Renderman

14:00 – 14:50

Hacking Malware: Offense is the new Defense

Valsmith & Danny Quist

Advanced Attacks Against PocketPC Phones

Collin Mulliner

The National Collegiate Cyber Defense Competition

Greg White & Kevin Archer

LosT @ Con Mystery Box Challenge


15:00 - 15:50

Rebuilding HARD DRIVES for Data Recovery: Anatomy of a Hard Drive

Scott Moulton

Old Skewl Hacking: Magstripe Madness

Major Malfunction

Exploring the Changing Nature of DEFCON over the Past 14 Years

Thomas Holt


16:00 – 16:50

Death By 1000 Cuts

Johnny Long

Hacking FedEx Kinko's: How Not To Implement Stored-Value Card Systems

Strom Carlson

Legal Aspects of Internet & Computer Network Defense: A Year in Review Computer and Internet Security Law 2005-2006

Robert Clark

17:00 - 17:50

Cyber-crime Foiled Once Again? Help prove the innocence or guilt of Jack Grove

Amber Schroader & Tyler Cohen

Ask EFF: The Year in Digital Civil Liberties

Cindy Cohn, Kevin Bankston, Kurt Opsahl, Jason Schultz, Danny O’Brien, Seth Schoen

US-VISIT: Raping personal privacy since 2004

Chris Paget

Booksigning: Mac Tiger Server Little Black Book with Charles Edge

18:00 – 18:20

A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification

Scott Miller

Phishing, it starts with “Ph” for a reason. Some best practices to detect and prevent for some new point of attack methods

Teli Brown

"What has the NSA done for me lately?"

Timothy M O'Neill


18:30 – 18:50

10 Ways To Not Get Caught Hacking On Your Mac

Charles Edge aka Krypted

19:00 – 19:50

A Hacker's Guide to RFID Spoofing and Jamming

Melanie Rieback

Panel: Meet the Fed

Jason Beckett, James Christy SA Andy Fried, Mike Jacobs, Rich Marshall, Ken Privette, Keith Rhodes, Dave Thomas, Tim Fowler, Linton Wells, Rick Palermo

Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port

Jay Beale

20:00 -  20:20

First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems

Lukas Grunwald

Advanced File System Hiding and Detection

Irby Thompson & Mathew Monroe

Mac OS X Security Tools

Charles Edge aka Krypted

Black Ball

DJ Lineup:
Krisz Klink
Shatter
Delchi
Spekulum

Forum Meet - 5th Year Anniversary

20:30 - 20:50

Area Closed: Hacker Jeopardy Setup

21:00 - 22:00

Closed

TCP/IP Drinking Game hosted by Mudge

Hacker Jeopardy

QueerCon with DJ CMOS

23:00


Day 2 - Saturday: August 5

08:00 - 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the Royale Pavilion Registration Desk.

Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth

Vendor Area Hours: 10:00 - 19:00


Track 1

Royale Pavilion 1-2

Track 2

Grand Ballroom F-G-H

Track 3

Grand Ballroom E

Outdoor Area

Top of the Riv

Contest Area

Events

10:00 – 10:50

SOCIAL MESSAGE RELAY: Using existing social networks to transmit covert messages in public

Strom Carlson, skrooyoo, datagram & Vidiot

Visual Log Analysis - The Beauty of Graphs

Raffael Marty

Ipv6 World Update: High Diplomacy & Monster Trucks

Kenneth Geers & Alexander Eisen

Outdoor Grill and Thrill with Dunk Tank, fresh grilled victuals and cash bar


Capture the Flag until 22:00 (Day 2)

Janus Wireless Challenge until 20:00 (Day 2)

LosT @ Con Mystery Box Challenge until 20:00

Net Appliance Challenge until 18:00 (Day 2)

Scavenger Hunt until 20:00 (Day 2)

Wall of Sheep

Vendor Area Open until 19:00

LockPick Village in Skybox 206 until 18:00

11:00 – 11:20

802.1x Networking

tommEE pickles

Oracle Rootkits 2.0

Alexander Kornbrust

MatriXay: When Web App & Database Security Pen-Test/Audit Is a Joy

Yuan Fan & Xiao Rong

Amateur CtF until 19:00 (Day 2)


11:30 – 11:50

Zulu A Command Line Wireless Frame Generator

Damon McCoy & Anmol Sheth

12:00 – 12:50

Black Ops 2006

Dan kaminsky

The Evolving Art of Fuzzing

Jared DeMott

SAMAEL (Secure, Anonymous, Megalomaniacal, Autonomous, Encrypting Linux) and NARC (Network Analysis Reporting Console)

dr.kaos, arcon, atlas, beth, digunix

WarDrive until 18:00

13:00 – 13:50

Hacking UNIX with FreeBSD Jail(8), Secure Virtual Servers

Isaac Levy (.ike)

Bridging the Gap Between Static and Dynamic Reversing

Luis Miras

IBM Networking Attacks—Or The Easiest Way To Own A Mainframe Without Getting The Removals Men In

Martyn Ruks

Lockpick until 16:00 (Day 2)

14:00 – 14:50

Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)

Michael Rash

Hunting for Metamorphic Engines

Mark Stamp & Wing H. Wong

Securing MANET

Riley "Caezar" Eller

15:00 - 15:50

Fun with 802.11 Device Drivers

Johnny Cache

RE 2006: New Challenges Need Changing Tools

Halvar Flake

The Plausible Deniability Toolkit

weasel & simple nomad

 

Booksigning: Intrusion Prevention and Active Response with Michael Rash

16:00 – 16:50

UNCLASSIFIED Information Sharing with Non-Traditional Partners

Linton Wells

OllyBone: Semi-Automatic Unpacking on IA-32

Joe Stewart

Kiosk Security

Peleus Uhley

Robot Wars until 20:00 (Day 2)

TCPIP Enabled Device until 20:00 (Day 2)


17:00 - 17:50

Covert Channels using IPv6/ICMPv6

R.P. Murphy

Things That Go "Bump" in the night: An Analysis of Current and Emerging Threats to Physical Security

Marc Weber Tobias & Matt Fiddler

DNS Amplification Attacks

Randal Vaughn & Gadi Evron

18:00 – 18:50

Analysing Complex Systems: The BlackBerry Case

FX

Safecracking Without a Trace

Eric Schmiedl

DNS Abuse Infrastructure and Games

Gadi Evron

19:00 – 19:50

Owning the Linksys wrtp54g VOIP Router

Arias Hung

Secrets of the Hollywood Hacker!

Johnny Long

Blackjacking - 0wning the Enterprise via the Blackberry

x30n

20:00 -  20:50

Legal Aspects of Computer Self-Defense and Aggressive Self-Defense

Robert W. Clark

Automatic Exploit Detection in Binaries

Matt Hargett & Luis Miras

Area Closed: Hacker Jeopardy Setup

White Ball

DJ Line-up:
Catharsis
DJ Casey
Krisz Klink
Mindpop
Ms DJ Jackalope
Regenerator
The Minibosses
munich


Annual DCG Meeting

21:00 - 21:50

Closed

Closed

Hacker Jeopardy


|

Day 3 - Sunday: August 6

08:00 - 12:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the Royale Pavilion Registration Desk.

Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth

Vendor Area Hours: 10:00 - 15:00


Track 1

Royale Pavilion 1-2

Track 2

Grand Ballroom F-G-H

Track 3

Grand Ballroom E

Outdoor Area

Contest Area

Events

10:00 – 10:50

Trust, But Verify: Auditing Proprietary DRE Systems

Robert J. Hansen

Abuse and the Global Infection Rate

Rick Wesson

Corporate Network Spying

Andrew Whitaker

Outdoor Grill and Thrill with Dunk Tank, fresh grilled victuals and cash bar

Capture the Flag unitl 14:00 (Day 3)

Wall of Sheep

Vendor Area Open until 15:00

LockPick Village in Skybox 206 until 15:00

11:00 – 11:50

Traffic Analysis Panel

Jon Callas

Meme Hacking— Subverting The Ideosphere

Broward Horne


12:00 – 12:50

Graphical Representations of Security Relationships: Awesome or Bullshit?

Foofus

EFF v. AT&T: Your World, Delivered (to the NSA)

Cindy Cohn, Kevin Bankston, Kurt Opsahl & Jason Schultz

A Tale of Two Proxies

SensePost

Booksigning: Penetration Testing and Network Defense by Andrew Whitaker

13:00 – 13:50

Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish

Peter Gutmann

How to Create an Anonymous Identity

Johan Hybinette

Advanced Windows Based Firewall Subversion

Lin0xx


14:00 – 14:50

Ripples in the Gene Pool: Creating Genetic Mutations to Survive the Vulerability Window

Chris Eagle

FEAR!(?) The Census Bureau

Steve Dunker

Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?

Seth Hardy

15:00 - 15:50

Malware Repository Requirements

Paul Vixie & David Dagon

How the FBI uses NLP on YOU!

Brad Smith

Exploit Writing Using Injectable Virtual Machines

Wes Brown & Scott Dunlop

16:00 – 16:50

Award Ceremonies hosted by Dark Tangent



Home | Archives | Community | Resources | Scene | Contact