Speakers
-
A
- A
- Tony Arcieri
- Kevin Bankston
- Jay Beale
- Beetle
- Adam Bresson
- Jamie Butler
- Jon Callas
- Strom Carlson
- Cazz
- Tzi-cker Chiueh
- Ian Clarke
- Greg Conti
- CrimethInc
- Gene Cronk
- Michael Davis
- Dead Addict
- Dario D. Diaz
- Dipl.-Jur. Maximillian Dornseif
- Roger Dingledine
- Maximillian Dornseif
- Robert "hackajar" Imhoff-Dousharm
- Elonka Dunin
- Jonathan "ripshy" Duncan
- D. Egan
- Charles Edge
- Rakan El-Khalil
- FX
- Nicholas Farr
- Mark Farver
- Peter D. Feaver
- Halvar Flake
- Bob Fleck
- Seth Fogie
- Foofus
- Scott Fullam
- Kenneth Geers
- Geoffrey
- Andre Goldman
- Sarah Gordon
- Joe Grand
- Rachel Greenstadt
- Jennifer Granick
- Grifter
- Lukas Grunwald
- Nathan Hamiel
- Seth Hardy
- Bev Harris
- Deral Heiland
- Martin Herfurt
- h1kari
- Cameron “nummish” Hotchkies
- Thorsten Holz
- IcE tRe
- Ichabod Ver7
- Eric Johanson
- Richard Johnson
- Dan Kaminsky
- Christian Klein
- Jesse Krembs
- Adam Laurie
- Lucky225
- Peter Leung
- j0hnny Long
- Kevin Mahaffey
- Nick Mathewson
- Jon McClintock
- Rebecca Mercuri
- Mike Messick
- Doug Mohney
- Brett Moore
- HD Moore
- Todd Moore
- Robert Morris
- Mudge
- Brett Neilson
- Ne0nRa1n
- Annalee Newitz
- n0namehere
- Nothingface
- Sean O'Toole
- Laurent Oudot
- Dr. Larry Ponemon
- Bruce Potter
- Michael T. Raggo
- Michael Rash
- Russ Rogers
- Len Sassaman
- Seth Schoen
- Jason Scott
- Wendy Seltzer
- Sensepost
- The Shmoo Group
- Peter Silberman
- Snax
- Holt Sorenson
- spoonm
- Joshua Teitelbaum
- Rodney Thayer
- Richard Thieme
- Grifter
- Ian Vitek
- Kathy Wang
- Wavyhill
- Paul Wouters
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
V
W
Highlights
DefCon 12 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!(PDF file - 2.8 MB)
Contest Results
May be found on the Defcon 12 Post-Con pageAudio/Video RSS Feeds
VideoAudio
Music
DEF CON 12 Website
DEF CON 12 Post-Con PagePosters
Press Coverage
- Slashdot - Defcon 12 Running Man Contest - Local Copy
- Slashdot - Slashdot | Blackhat/Defcon Report - Local Copy
- Slashdot - DEF CON 12 - After the Hangover - Local Copy
- Slashdot - Combining Port Knocking With OS Fingerprinting - Local Copy
- The Register - Rampant capitalism upsets delicate Reg reader - Local Copy
- The Register - Vegas braces for DEF CON | The Register - Local Copy
- The Register - VoIP hackers gut Caller ID - Local Copy
- PC World - PDA Viruses Could Get Nasty - Local Copy
- PC World - PCWorld.com - School for Hackers - Local Copy
- Blogs.PC World - Today @ PC World - New MyDoom Strikes Search Engines - Local Copy
- The Inquirer - Hackers and establishment to mingle at DEF CON - Local Copy
- The Inquirer - DEF CON 12: Feds Yes, Anarchy No. - Local Copy
- TomsHardware - Hackers descend on Las Vegas - Local Copy
- TomsHardware - Defcon 12's Fear and Hacking in Vegas - Local Copy
- Las Vegas Sun - Las Vegas SUN: Hackers gather in Vegas for annual digital huddles - Local Copy
- MarketPlace Public Radio - Marketplace Morning Report for August 2, 2004 - Local Copy
- Las Vegas City Life - Hacking the planet - Local Copy
- Searchsecurity - REPORTER'S NOTEBOOK: Impressions of DefCon 12 - Local Copy
- Searchsecurity - Capture the Flag competitions can net far more than fun - Local Copy
- PCWorld - Feds Seek a Few Good Hackers - Local Copy
- ZDNet - Hackers plan global game of 'capture the flag' - Local Copy
- Geek.Com - Global Capture the Flag game for hackers - Local Copy
- ZDNet - Why you should Google yourself--and often - Local Copy
- NewsForge - Google hacks are for real - Local Copy
- NewsForge - Blackhat/Defcon: The final report - Local Copy
- NewsForge - DEF CON 12: Opening Day - Local Copy
- ComputerWeekly - Hackers conference shown how to bypass Active Directory controls - Local Copy
- eBCVG - Training Ethical Hackers: Training the Enemy? - Local Copy
- Forbes Technology Playing Role in GOP Protests - Local Copy
- Wired - Group Warns DVRs Endangered - Local Copy
- Telecom Web - EFF's Digital Television Liberation Project Starts Its Engines - Local Copy
- Slashdot - DefCon WiFi Distance Competition Calls For Entrants - Local Copy
- Slashdot - DEF CON WiFi Shootout Winners Set A Land Record - Local Copy
- Slashdot - The Dark Side Of DefCon's Wireless Network - Local Copy
- Slashdot - Ready, Aim, HACK! - Local Copy
- Wi-Fi Planet - High Noon for High Range Wireless - Local Copy
- USA Today - Teens' wireless feat could be world record - Local Copy
- LocalTechWire - AirDefense Says Hackers Growing More Sophisticated - Local Copy
- TechWeb - Techweb > News > WLAN security > Wireless Hacks Growing Threat > August 3, 2004 - Local Copy
- Wired - Wired News: Wi-Fi Shootout in the Desert - Local Copy
- TomsHardware - Wireless Wizardy and chaos during at talk at Defcon - Local Copy
- ComputerWire - WiFi and Bluetooth Distance Records Smashed - No Local Copy - pay site
- TheRegister - Wi-Fi 'sniper rifle' debuts at DEF CON | The Register - Local Copy
- P2PNet - Wi-Fi ground distance record - Local Copy
- P2PNet - Bringing goatse - Local Copy
- InternetWeek - WLAN Attacks Getting More Sophisticated, Vendor Says - Local Copy
- Slashdot - Bluesniper Creator Interviewed on Gizmodo - Local Copy
- Gizmodo - IMterview With Bluetooth Hacking Flexilis's John Hering - Local Copy
- PCWorld - PCWorld.com - Bluetooth Phones Could Leak Data - Local Copy
- P2PNet - Bluetooth mobile snipers - Local Copy
- Wired - Wired News: Security Cavities Ail Bluetooth - Local Copy
- Esato - Bluetooth-cracking gun - Local Copy
- SearchNetWorking - Bluetooth: Security's 'silent killer' - Local Copy
- NYTimes - The New York Times > Opinion > Editorial Observer: Rolling Down the Highway, Looking Out for Flawed Elections - Local Copy
- IHT (same as NYTIMEs story) - Meanwhile: Chasing down flaws in electronic voting - Local Copy
- Slashdot - Hackers, Public Differ Greatly On E-voting - Local Copy
- News.com - Poll: E-voters not so afraid of election-day hacks | CNET News.com - Local Copy
- GCN - Government Computer News (GCN) daily news -- Public and experts split over e-voting security - Local Copy
- ZDNet - Poll: E-voters not so afraid of election-day hacks - News - ZDNet - Local Copy
- ComputerWorld - Can you hack the vote? - Local Copy
- ComputerWorld - Public, security experts' e-voting views differ sharply - Local Copy
- GCN - Government Computer News (GCN) daily news; Public and experts split over e-voting security - Local Copy
- News.com - Internet's 'white pages' allow data attacks - Local Copy
- Slashdot - Network Attacks Via DNS - Local Copy
- Silicon.Com - DNS hack leaves corporate networks wide open - silicon.com - Local Copy
- CBROnline - Researcher says DNS can stream voice, control Trojans - Computer Business Review - Local Copy
- Slashdot - Tor: A JAP Replacement - Local Copy
- Wired - Wired News: Onion Routing Averts Prying Eyes - Local Copy
- CBROnline - Tor offers onion routing for anonymity - Local Copy
- CBROnline - Freenet project struggles with overload - Local Copy
- Net Security - Syngress Publishing Announces the Release of "Zero Day Exploit ... - Local Copy
- Itseccity - DEF CON : One-Hundred Leading Hackers to Present New Material to ... - Local Copy
- Biz.Yahoo - Wireless LAN Attacks are Moving from Discovery Mode to Manipulation - Local Copy
- BusinessWire - LinuxWorld Conference & Expo Exhibitor Profiles - Local Copy
- MarketWire - Immunix Introduces YaST GUI to Help Users of Novell's SUSE LINUX Enterprise Server Simplify Application Security Management - Local Copy
- LockerGnome - No Starch Press Authors To Make Appearance At DEF CON 12 - Local Copy
- FSecure - Mikko's blogging on DC12 - Local Copy
- Engadget - Live from DefCon: The Sniper Yagi - Engadget - www.engadget.com - Local Copy
- Engadget - Who you gonna call? The BlueSniper - Engadget - www.engadget.com - Local Copy
- Engadget - Live from DefCon: WiFi bouncing - Local Copy
- BoingBoing - Replace every image on a WiFi network with goatse.cx - Local Copy
- BoingBoing - Defcon Wi-Fi shootout results - Local Copy
- BoingBoing - Sniper rifle modded to be WiFi antenna - Local Copy
- BoingBoing - Defcon Wifi Shootout Contest - Local Copy
- BoingBoing - WiFi shootout in Vegas - Local Copy
- DC404 - Defcon Atlanta Group Write-up - Local Copy
General/Misc
EFF & DVR
Wireless & Wifi Shootout
Bluetooth
Evoting
DNS
Anonymity
Press Releases
Blogs/Small Articles
Speakers & Presentations
encoded Real Media FormatA
Weaknesses in Satellite Television Protection Schemes
Read It! (PPT | PDF | SXI ) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Tony Arcieri
PDTP The Peer Distributed Transfer Protocol
Read It! (PPT) Memo (HTML) See It!(m4v Video) Hear it! (m4b Audio)Adam Bresson
Identification Evasion
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Jamie Butler
VICECatch the Hookers!
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Jon Callas
How Do We Get The World To Use Message Security
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Tzi-cker Chiueh
Program Semantics- Aware Intrusion Detection
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Ian Clarke
Freenet: Taming the World's Largest Tamagotchi
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)CrimethInc
Electronic Civil Disobedience and the Republican National Convention
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Greg Conti
Network Attack Visualization
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Michael Davis
The Open Source Security MythAnd How to Make it A Reality
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Dead Addict
Hacking the Media, and avoiding being Hacked by the Media
Read It! (RTF) See It!(m4v Video) Hear it! (m4b Audio)Roger Dingledine
Tor: An Anonymizing Overlay Network For TCP
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Maximillian Dornseif
Far More Than You Ever Wanted To Tell Hidden Data In Document Formats
Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)Elonka Dunin
Kryptos and the Cracking of the Cyrillic Projector Cipher
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Charles Edge
Hacking/Security Mac OSX Server aka Wussy Panther
Read It! (PPT) Resources (Edge) See It!(m4v Video) Hear it! (m4b Audio)D. Egan
MySQL Passwords Password Strength and Cracking
Read It! (PPT) Resources (GZ) See It!(m4v Video) Hear it! (m4b Audio)Rakan El-Khalil
Information Hiding in Executable Binaries
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)FX & Halvar Flake
We Can Take It From Here
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Peter D. Feaver & Kenneth Geers
The First International Cyber War
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Seth Fogie
Attacking Windows Mobile PDA’s
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Scott Fullam
Introduction to Hardware Hacking
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Geoffrey & Mark Farver
This Space Intentionally Left Blank
Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)Joe Grand
Advanced Hardware Hacking
Read It! (PPT) Resources (PDF) See It!(m4v Video) Hear it! (m4b Audio)Rachel Greenstadt
Tools for Censorship Resistance
Read It! (PDF) See It!(m4v Video) Hear it! (m4b Audio)Grifter, Russ Rogers & Tierra
Project Prometheus
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Lukas Grunwald
RF-ID and Smart-Labels
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Nathan Hamiel
Down with the RIAA, Musicians Against the Recording Industry
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Seth Hardy
Subliminal Channels In Digital Signatures
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Deral Heiland
The Insecure Workstation
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Thorsten Holz, Maximillian Dornseif, Christian Klein
NoSEBrEaKDefeating Honeynets
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Cameron “nummish” Hotchkies
Blind SQL Injection Automation Techniques
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)IcE tRe
Virus, Worms and Trojans: Where are we going?
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Robert "hackajar" Imhoff-Dousharm & Jonathan "ripshy" Duncan
Credit Card Networks Revisted: Penetration in Real-Time
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Jesse Krembs & Nicholas Farr
The Hacker Foundation
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Adam Laurie & Martin Herfurt
BluesnarfingThe Risk From Digital Pickpockets
Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Lucky 225
Phreaking in the Age of Voice Over IP
Read It! (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Kevin Mahaffey
Smile, You’re on Candid Camera!
Read It! (RTF) See It!(m4v Video) Hear it! (m4b Audio)Rebecca Mercuri & Bev Harris
Hack the Vote: Election 2004
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Doug Mohney
DIGEXAt the Dawn of the Commercial Internet
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Brett Moore
Shoot the Messenger
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Brett Neilson
The Advantages of Being an Amateur
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Ne0nRa1n
Better than Life - Manipulation of The Human Brain With The Use of Machines
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)n0namehere
Real World Privacy, How to Leave Less of A Trail in Life
Read It! (PPT) See It!(m4v Video) Hear it! (m4b Audio)Nothingface
Automotive Networks
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Michael T. Raggo
Steganography, Steganalysis, & Cryptanalysis
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Michael Rash
Advanced Netfilter; Content Replacement (ala Snort_inline), and Port Knocking Based on Passive OS Fingerprinting
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Wendy Seltzer & Seth Schoen
Hacking the Spectrum
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)spoonm & HD Moore
Bubonic Buffer Overflow
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)Peter Silberman & Richard Johnson
A Comparison of Buffer Overflow Prevention Implementations and Weaknesses
Read It! (DOC) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Joshua Teitelbaum & Peter Leung
CryptoMail Encrypted E-Mail for All (Including Grandma)
Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Ian Vitek
Exploring Terminal Services, The Last 12 Month of Research. Or, The Evil Admin And His Tools
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Kathy Wang
Frustrating OS Fingerprinting with Morph
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Wavyhill & Andre Goldman
Toward a Private Digital Economy
Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)Annalee Newitz, Wendy Seltzer, Kevin Bankston, Seth Schoen & Jennifer Granick


