Speakers
- Ofir Arkin
- Mick Bauer
- Jay Beale (1, 2)
- Philippe Biondi
- Scott Blake
- Rich Bodo
- Adam Bresson
- Dan Burroughs
- Joe Burton & William Reilly
- Ken Caruso
- Ian Clarke
- Dr. Walter C. Daugherity
- Roger Dingledine
- Panel Discussion
- John Dodge, Steve S. Mautsatsos and Bernadette H. Schell
- Elonka Dunin
- Brett Eldridge
- David Endler &
- Error
- FX & FtR
- Nicholas Fischbach and
- FozZy
- GOBBLES Security
- Gingerbread Man
- Wilco Van Ginkel
- Michael Glasser CRL,
- Jennifer Granick
- Lucky Green
- Christian Grothoff
- Aaron Higbee
- Andrew Hintz
- Humperdink
- Chris Hurley
- Dan Kaminsky
- Khan
- Ryan Lackey
- Sean Lewis
- Matthew Marsh
- Dennis Mattison aka Littlewolf
- Greg Miles
- Rich Murphey
- John Q. Newman
- Simple Nomad
- Agent OJ
- Ian Peters
- Michael Rogers
- Nate Rotschafer
- Thomas Rude aka Farmerdude
- Len Sassaman
- Steve Schear
- Michael Schrenk
- Jaeson Schultz & Lawrence Baldwin
- DJ Sweet Sensation
- SkrooYou & Grifter
- Kevin Spett
- TechnoDragon
- Roelof Temmingh & Haroon Meer
- Richard Thieme
- T3-Fred Trotter
- Robert V1ru5 Lupo
- Vic Vandal
- Ian Vitek
- Huagang Xie
- hellNbak
- Bruce Potter, Tony 'Xam' Kapela, and Adam Shand
- Thomas Munn
- Cyrus Pekiri & Seth Fogie
- zSnark
Highlights

Cover artwork by Sleestak
DefCon ØA Program
Lost your program? Didn't pick one up? Here it is!
Lo-Res 72dpi (PDF file-1.4 MB) Med-Res 150dpi (PDF file-4.7 MB)
Much of the artwork was provided by DeadDreamer. Check out his latest work and awesome website.
Press Coverage
- Vegas Braces for Hackers - Wired
- Defcon: Va-Va-Va Voom, Las Vegas - Wired
- Defcon: A Veritable Hack Fest - Wired
- Patrick's Def Con X Report: Day One
- How to Win Def Con's Capture the Flag Contest
- Putting fun back into hacking - ZDNet
- Shock! Maturity rules at hack fest - SMH
- Hackers Called Truthseekers, Problem-Solvers
- Reality Douses DefCon Camaraderie - PCWorld
was held August 2-4, 2002 at the Alexis Park Hotel & Resort
Speakers & Presentations
Video encoded in m4v video format. Audio encoded in m4b audiobook format.Rich Bodo
It is Now Safe to Compile Your Phone System
Read It! (.ungz file contains presentation in html) See It! (m4v Video) Hear it! (m4b Audio)John Dodge, Steve S. Mautsatsos and Bernadette H. Schell
Should Organizations Employ Hackers?
Implications Drawn From the Book Hacking of America
Read It! (rich text) See It! (m4v Video) Hear it! (m4b Audio)
Aaron Higbee & Chris Davis
DC Phone Home
Read It! (PDF) Tool! (ISO) See It! (m4v Video) Hear it! (m4b Audio)Humperdink
Securing Your Windows Internet Server
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dennis Mattison aka Littlewolf
Network Printers and Other Network Devices, Vulnerabilities and Fixes
Read It! (.zip file contains presentation in Magicpoint and pdf support files) See It! (m4v Video) Hear it! (m4b Audio)Thomas Munn & tgr2mfx
Using Filesystem Crypto and Other Approaches to Protect Your Data/Privacy on BSD and LINUX
Read It! (Acrobat PDF) See It! (m4v Video) Hear it! (m4b Audio)Roger Dingledine
The Mixminion Anonymous Remailer Protocol
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Khan
Stealth Data Dispersal: ICMP Moon-Bounce
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Len Sassaman
Anonymity Services and the Law: How to Safely Provide Anonymous Technology on the Internet
Read It! (.gz file contains .ppt presentation and support text) See It! (m4v Video) Hear it! (m4b Audio)Dan Burroughs
Correlation & Tracking of Distributed IDS
Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)Ian Peters
Rubicon - An Extensible Gateway IDS
Read It! (.gz file containing .ppt and pdf support file) See It! (m4v Video) Hear it! (m4b Audio)Jaeson Schultz & Lawrence Baldwin
Extreme IP Backtracing
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Adam Bresson
Consumer Media Protections
Read It! (.zip file contains .ppt, pdf support file and .exe) See It! (m4v Video) Hear it! (m4b Audio)Joe Burton & William Reilly
Dmitry Sklyarov and the DMCA: 12 Months Later
See It! (m4v Video) Hear it! (m4b Audio)Lucky Green
Trusted Computing Platform Alliance:
The Mother(board) of all Big Brothers
Read It! (.zip file contains .ppt and supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)
Richard Thieme
1992 ... 2002 ... 2012 ...Hacking: The Next Ten Years
See It! (m4v Video) Hear it! (m4b Audio)Wilco Van Ginkel
The Other Side of Information Security
Read It! (.zip file contains .ppt & supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)Panel Discussion
with Michael I. Morgenstern, Richard Schaeffer, Marcus H. Sachs, O. Sami Saydjari, Steve Lipner, Tom Parker
Disclosure: The Mother of All Vulnerabilities
See It! (m4v Video) Hear it! (m4b Audio)David Endler & Michael Sutton
Web Application Brute Forcing 101 - "Enemy of the State (Mechanism)"
Read It! (.zip file contains .ppt and pdf support file) Play With It! (.zip file contains iDefense Session Auditor tool) See It! (m4v Video) Hear it! (m4b Audio)FX & FtR
Attacking Networked Embedded Systems
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Gingerbread Man
Lock Picking: Techniques and Tools for High Security
Read It! (.zip file- requires OpenSource to view after decompiressing) See It! (m4v Video) Hear it! (m4b Audio)Michael Glasser CRL, aka Laz
High Security Locks, and Access Control Products
See It! (m4v Video) Hear it! (m4b Audio)Cyrus Peikari & Seth Fogie
Hacking .NET Server
Read It! (PDF) Play With It! (.exe) See It! (m4v Video) Hear it! (m4b Audio)Ian Vitek
Citrix and Terminal Services
Read It! (PDF) Play With It! (.zip of tools & readme file in html) See It! (m4v Video) Hear it! (m4b Audio)Ken Caruso
Community Wireless Networks: Friend or Foe to the Telecom Industry
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Brett Eldridge
Mobile VPN Vulnerabilities & Solutions
Read It! (compressed file containing presentation and other supporting documents) See It! (m4v Video) Hear it! (m4b Audio)Nicholas Fischbach and Sebastien Lacoste-Seris
Layer 2, Routing Protocols, Router Security & Forensics
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dan Kaminsky
Black Ops of TCP/IP: Work NAT, Work. Good NAT. Woof
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Matthew Marsh
Replacing TripWire with SNMPv3
Read It! (PDF) Play With It! (.zip) See It! (m4v Video) Hear it! (m4b Audio)Greg Miles
Anatomy of Denial of Service Mitigation Testing
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Bruce Potter, Tony 'Xam' Kapela, and Adam Shand
Wireless Networking
See It! (m4v Video) Hear it! (m4b Audio)zSnark
Building Secure Wireless Networks
Read It! (.zip file-contains presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)Jay Beale
Bastille Linux 2.0: Six Operating Systems and Still Going!
Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)Chris Hurley
Hardening Solaris Installs
Read It! (.zip file-contains .ppt, .doc & .html supporting read me text) See It! (m4v Video) Hear it! (m4b Audio)SkrooYou & Grifter
Resurrecting the Scene through Local 'Hacker' Meetings
See It! (m4v Video) Hear it! (m4b Audio)TechnoDragon
Making a Non-portable Computer System Portable
See It! (m4v Video) Hear it! (m4b Audio)FozZy
Advanced Shellcodes
Read It! (.zip file containing presentation in html) Play With It! (.zip file- a How To on writing Shell Codes)Robert V1ru5 Lupo
Introduction to Computer Viruses:
Understanding the Fundamentals of How to Identify, Remove and Defend Against Hostile Code
See It! (m4v Video) Hear it! (m4b Audio)
Michael Schrenk
Introduction to Writing Spiders & Web Agents
Read It! (.zip file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)Roelof Temmingh & Haroon Meer
Setiri: Advances in Trojan Technology
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Mick Bauer
Stealthful Sniffing, Logging, and Intrusion Detection:
Useful and Fun Things You Can Do Without an IP Address
Read It! (.ungz file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)
Andrew Hintz
Covert Channels in TCP and IP Headers
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Thomas Rude aka Farmerdude
Next Generation Data Forensics & Linux
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Huagang Xie
LIDS
Read It! (.gz file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)Dr. Walter C. Daugherity
Quantum Computing 101: How to Crack RSA
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Nate Rotschafer

