Defcon 15 Schedule (schedule_title.gif)

The Speaking Schedule is now final.
Contact Neil [at] defcon [dot] org for contest or event time corrections.

Skyboxes
206
207
208
209
210
211/212
Thursday Night   Artimage the Summit Public Hang Out
Friday Day i-hacked .com Hackerpimps Wi-fi Village Lockpick Village
Friday Night
Saturday Day 303 Ninja Networks
Saturday Night
Sunday Day hackaday.com    

Pre-Con - Thursday: August 2

12:00 - 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early.

Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store located in the same room as Registration

Vendor Area Setup: 11:00 - 18:00

18:00 - ???

The Unofficial Defcon 15 Toxic BBQ will be held for its fourth consecutive year. Details of the TBBQ's location can be found at http://www.toxicbbq.com. Sign on to the Defcon Forums and help plan this year's event.

theSummit fundraiser at 21:00 in Skybox209/210. For more information regarding this event, check out the Official Website: http://www.vegassummit.org/


Day 1 - Friday: August 3

08:00- 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the West Registration Desk.

Official DEFCON Store in the same area as the Registration desk until 22:00 - Get your official DEFCON swag at the DEFCON Store across from Registration

Vendor Area Hours: 10:00 - 19:00


Track 1

Track 2

Track 3

Track 4

Track 5

Contest Area

Events

Outdoor Area

10:00 – 10:50

Joe Grand
Making of the DEFCON 15 Badge
Church Of WiFi's Wireless Extravaganza
tool released
demonstration
Sean Bodmer
Analyzing Intrusions & Intruders
Jennifer Granick
Disclosure and Intellectual Property Law: Case Studies
Tony Sager
Vulnerabilities and The Information Assurance Directorate

Coffee Wars till 12:00

Lockpicking Points contest till close

GHII Free Play till 12:30

DefconBots open for practice - First come, first served till ???

Wall of Sheep till 15:00 Sunday

  Kiddie Pools and Outdoor Chill spot all dang day

11:00 – 11:50

Bruce Schneier
Q&A
Patrik Karlsson
SQL injection and out-of-band channeling
David Litchfield
Database Forensics
Robert Clark
Computer and Internet Security Law - A Year in Review 2006 - 2007
Year In Review
Meet The VCs    

12:00 – 12:50

Thomas Wilhelm
Turn-Key Pen Test Labs
tool released
Philip Zimmermann
Z-Phone
demonstration
Chris Palmer & Alex Stamos
Breaking Forensics Software
exploit released
tool released
demonstration
Dead Addict
Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures
Panel: Anti Spyware Coalition

Wireless Contest: Tower (tiered) Challenge till19:00

Øwn the box? Own the box! till 18:00 Saturday

 

Beverage Cooling Contraption Contest till 14:00

Brew Wars till 14:00

Dunk Tank till 21:00

13:00 – 13:50

Jacob West
How I Learned to Stop Fuzzing and Find More Bugs
Alfredo Ortega
OpenBSD remote Exploit and another IPv6 vulnerabilities
Scott Moulton
Re-Animating Drives & Advanced Data Recovery
Steve Dunker
Everything you ever wanted to know about Police Procedure in 50 minutes.
Disclosure Panel

Lockpicking Skills Contest till 16:00

GHII Medium Heat 1

LosT@Con Mystery Challenge till 12:00 Sunday

The Phreaking Challenge Round 1

WPA Cracking Breakout Session - Wireless Village (209)  

14:00 – 14:50

Danny Quist & Valsmith
Covert Debugging: Circumventing Software Armoring Techniques
Martyn Ruks
MQ Jumping
exploit released
tool released
demonstration
David C. Smith
Cool stuff learned from competing in the DC3 digital forensic challenge
John Benson
Bridging the Gap Between Technology and the Law
Bruce Potter
Dirty Secrets of the Security Industry

GHII Medium Heat 2

Wireless Contest: WPA Cracking Contest till 16:00

   

15:00 - 15:50

Benjamin Kurtz
Functional Fuzzing with Funk
tool released
demonstration
Greg Hoglund
Virtual World, Real Hacking
Rich Murphey
Windows Vista Log Forensics
Alexander Muentz
Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust
Myles Long, Rob "Flack" O'Hara, & Christian "RaDMan" Wirth
Self Publishing in the Underground
GHII Medium Heat 3 Book Signing: Mike Schrenk@ No Starch Press
Book: Webbots, Spiders, and Screen Scrapers: A Guide to Developing Internet
Agents with PHP/CURL
 

16:00 – 16:50

H.D.Moore & Valsmith
Tactical Exploitation
tool released
Haroon Meer & Marco Slaviero
It's All About the Timing
tool released
demonstration
Robert Stoudt
When Tapes Go Missing
tool released
Danny O'Brien
Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy
Luiz Eduardo
The Hacker Society around the (corporate) world
 

Book signing: Johnny Long @ Breakpoint Books
Books: "Stealing the Network: How to Own a Shadow", "Google Talking", "Techno
Security's Guide to Managing Risks for It Managers, Auditors and
Investigators", "Asterisk Hacking"

QueerCon Mixer in Skybox 211/212 till 19:00

 

17:00 - 17:50

Damien Gomez
Intelligent debugging for vuln-dev
tool released
demonstration
Jared DeMott, Dr. Richard Enbody & Dr. Bill Punch
Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
The Dark Tangent
CiscoGate
Peter Berghammer
A Journalist's Perspective on Security Research
Mike Murray & Lee Kushner
Creating and Managing Your Security Career
     

18:00 – 18:20

Subere
Fingerprinting and Cracking Java Obfuscated Code
tool released
demonstration
Charlie Miller
How smart is Intelligent Fuzzing - or - How stupid is Dumb Fuzzing?
Richard Thieme
Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors
Sam Bowne
Teaching Hacking at College
Ofir Arkin
kNAC!
demonstration
     

18:30 – 18:50

Edward Lee
Comparing Application Security Tools
Ian G. Harris
INTERSTATE: A Stateful Protocol Fuzzer for SIP
David Hulton
Faster PwninG Assured: New adventures with FPGAs
tool released
demonstration
     

19:00 – 19:50

Meet the Feds
Luke Jennings
One token to rule them all
tool released
demonstration
Aaron Higbee
Hack Your Car for Boost and Power!
Panel: Ask the EFF        

20:00 -  20:20

Johnny Long
No-Tech Hacking
Toralv Dirro & Dirk Kollberg
Trojans: A Reality Check
Michael Schrenk
The Executable Image Exploit
exploit released
demonstration
    Forum Meet in room 113 till 23:00  

20:30 - 20:50

Black Ball till ???  

21:00 -  ???

 

DEFCON Movie Night - World Premiere of "Infest Wisely" in Speaking Area 1

Club QueerCon Starts 22:00 in Room 115 till ???

Hacker Jeopardy22:00 to 01:00 in speaking area 2

 

Day 2 - Saturday: August 4

08:00 - 22:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the West Registration Desk.

Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth

Vendor Area Hours: 10:00 - 19:00


Track 1

Track 2

Track 3

Track 4

Track 5

Contest Area

Events

Outdoor Area

10:00 – 10:50

Joel Eriksson, Karl Janmar, Claes Nyberg, Christer Öberg
Kernel Wars
exploit released
demonstration
Paul Ziegler
Multiplatform malware within the .NET-Framework
demonstration
Dror Shalev
A Crazy Toaster: Can Home Devices Turn Against Us?
tool released
demonstration
Thomas Holt
The Market for Malware
Ne0nRa1n & Julian Spillane
Hack your brain with video games
tool released
demonstration
Lockpicking Points contest till close   Kiddie Pools and Outdoor Chill spot all dang day

11:00 – 11:20

Valsmith & Delchi
Malware Secrets
Janne Lindqvist
IPv6 is Bad for Your Privacy
Pilgrim
How to be a WiFi Ninja

 

GHII Free Play

WEP Cracking Breakout Session: Wireless Village (209)  

11:30 – 11:50

Aaron Peterson
Pen-testing Wi-Fi
tool released
demonstration
Agent X
44 lines about 22 things that keep me up at night
Andrea Barisani
Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation
tool released
Nathan Evans & Christian Grothoff
Routing in The Dark: Pitch Black
exploit released

12:00 – 12:50

King Tuna
Hacking EVDO
exploit released
tool released
demonstration
Broward Horne
Click Fraud Detection with Practical Memetics
exploit released
demonstration
Nick Mathewson
Technical Changes Since You Last Heard About Tor
Mike Murray & Anton Chuvakin
The Science of Social Engineering: NLP, Hypnosis and the science of persuasion

GHII Hard Heat 1

Wireless Contest: Tower (tiered) Challenge till19:00

Wireless Contest: WEP Cracking Contest till 14:00

  Dunk Tank till 21:00

13:00 – 13:50

K.N. Gopinath
Multipot: A More Potent Variant of Evil Twin
demonstration
Vitaliy Kamlyuk
Fighting Malware on your own
demonstration
Ganesh Devarajan
Unraveling SCADA Protocols: Using Sulley Fuzzer
exploit released
tool released
demonstration
Nick Mathewson
Social Attacks on Anonymity Networks
Dan Kaminsky
Black Ops 2007: Design Reviewing The Web

GHII Hard Heat 2

Lockpicking Skills Contest till 16:00

DefconBots Contest till 16:00

The Phreaking Challenge Round 2

   

14:00 – 14:50

Doug Mohney
The Next Wireless Frontier - TV White Spaces
D.J.Capelis
Virtualization: Enough holes to work Vegas
tool released
John Heasman
Hacking the Extensible Firmware Interface
demonstration
Roger Dingledine
Tor and blocking- resistance
Jason Scott
The Edge of Forever - Making Computer History
GHII Expert Heat Direction Finding Breakout Session: Wireless Village (209)  

15:00 - 15:50

Sysmin & Marklar
Creating Unreliable Systems, Attacking the Systems that Attack You
Dave Josephsen
Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)
Zac Franken
Biometric and token based access control systems: Are you protected by two screws and a plastic cover? Probably.
exploit released
tool released
demonstration

GHII Finals Medium

GHII Finals Hard @ 15:30

Wireless Contest: Direction Finding Contest till 17:00

 

   

16:00 – 16:50

Ricky HillGeoLocation of Wireless Access Points and "Wireless GeoCaching" Gadi Evron
Webserver Botnets
Lukas Grunwald
Security by Politics - Why it will never work
Zed Shaw
Saving The Internet With Hate
tool released
demonstration
Plet
Stealing Identity Management Systems
tool released
demonstration
GHII Finals Expert    

17:00 - 17:50

Brett Neilson
Being in the know... Listening to and understanding modern radio systems
demonstration
Peter Gutmann
The Commercial Malware Industry
Steve Orrin
The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats
Mike Perry
Securing the Tor Network
Panel: Internet Wars 2007    

18:00 – 18:50

Vivek Ramachandran
The Emperor Has No Cloak - WEP Cloaking Exposed
tool released
demonstration
Daniel Peck & Ben Feinstein
CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
Shawn Moyer
(un)Smashing the Stack: Overflows, Counter- measures, and the Real World
demonstration
       

19:00 – 19:50

David Gustin
Hardware Hacking for Software Geeks
demonstration
Kenneth Geers
Greetz from Room 101
atlas
Remedial Heap Overflows: dlmalloc style
tool released
demonstration
Steve Topletz
Portable Privacy
tool released
demonstration
       

20:00 -  20:50

Michael Schearer
The Church of WiFi Presents: Hacking Iraq
Gadi Evron
Estonia and Information Warfare
Squidly1
Thinking Outside the Console (box)
|)ruid
Real-time Steganography with RTP
tool released
demonstration
White Ball till ???      

21:00 -  ???

 

DEFCON Movie Night - in Speaking Area 1

Hacker Jeopardy 22:00 to 01:00 in speaking area 2

TCP/IP Drinking Game in Speaking area 3

 

Day 3 - Sunday: August 5

08:00 - 12:00

Registration - $100 USD CASH ONLY - Avoid the lines and get your badge early. Registration will be at the West Registration Desk.

Official DEFCON Store in the Vendor Area at the J!nx Hackwear Booth

Vendor Area Hours: 10:00 - 15:00


Track 1

Track 2

Track 3

Outdoor Area

Contest Area

Events

10:00 – 10:50

Dan Hubbard
HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)
demonstration
geoffrey
The Completion Backward Principle
Tom Stracener & Marce Luck
Hacking the EULA: Reverse Benchmarking Web Application Security Scanners
Kiddie Pools and Outdoor Chill spot all dang day Lockpicking Points contest till 13:00  

11:00 – 11:50

Rick Deacon
Hacking Social Lives: MySpace.com
exploit released
demonstration
Deviant Ollam, Noid, Thorn, Jur1st
Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level
Oskar Sandberg
Network Mathematics: Why is it a Small World?
demonstration
     

12:00 – 12:50

Aviv Raff & Iftach Ian Amit
The Inherent Insecurity of Widgets and Gadgets
exploit released
demonstration
Schuyler Towne
Locksport: An emerging subculture
Matt Richard
Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning
tool released
demonstration
Dunk Tank till 15:00 Wireless Contest: Tower (tiered) Challenge till19:00 RFID Locating Breakout Session:Wireless Village (209)

13:00 – 13:50

Brendan O'Connor
Greater than 1: Defeating "strong" Authentication in Web Applications
exploit released
demonstration
Greg Conti
Satellite Imagery Analysis
demonstration
Jesse D'Aguanno
LAN Protocol Attacks Part 1 - Arp Reloaded
exploit released
tool released
demonstration
 

The Phreaking Challenge Final Round

Wireless Contest: RFID Locating Contest

 

14:00 – 14:50

David Byrne
Intranet Invasion With Anti-DNS Pinning
demonstration
Marc Weber Tobias & Matt Fiddler
High Insecurity: Locks, Lies, and Liability
tool released
demonstration
Sergey Bratus
Entropy-based data organization tricks for log and packet capture browsing
tool released
demonstration
     

15:00 - 15:50

Billy Rios & Nathan McFeters
Biting tha Hand that Feeds You - Storing and Serving Malicious Content From Well Known Web Servers
demonstration
Crispin Cowan
Securing Linux Applications With AppArmor
demonstration
     

16:00 – 16:50

Award Ceremonies hosted by Dark Tangent