Speakers
- Ofir Arkin (1,2)
- Kevin Bankston
- Jay Beale
- Marshall Beddoe
- Beetle
- Fred Benenson
- Black Ratchet
- Scott Blake
- Wes Brown
- Daniel Burroughs (1,2)
- Jamie Butler
- Strom Carlson
- Cerebus
- Tzi-cker Chiueh
- Jim Christy & Various other Feds
- CowboyM
- Ian Clarke
- Greg Conti
- Matt Cottam
- David Cowan
- Frazier Cunningham
- DC Groups
- Amanda Dean
- Deviant Ollam (1,2)
- Scott Dunlop
- Steve Dunker
- Brandon Edwards
- 3ricj
- Kristofer Erickson
- ertia
- Gadi Evron
- Nick Farr
- Matt Fiddler
- Pamela Fusco
- Fyodor
- Leonard Gallion
- Kenneth Geers
- Fabio Ghioni
- Hernan Gips
- Michael Glasser
- Andre Gold
- Paul Graham
- Jennifer Granick (1,2)
- Julian Grizzard
- Christian Grothoff
- Robert V. Hale II
- Deral Heiland
- hellNbak (1,2)
- Thomas J. Holt
- Broward Horne
- Tony Howlett
- David Hulton
- Robert "hackajar" Imhoff-Dousharm
- jives
- jRandom
- Dan Kaminsky
- William Knowles
- Jesse Krembs
- Ben Kurtz
- Nick Lane-Smith
- Robert E. Lee
- Jonathan Levin
- Anthony Lineberry
- Johnny Long (1,2)
- Jack C. Louis
- Beth Louis (Phen)
- MadHat
- Major Malfunction
- Raffael Marty
- Kevin McCarthy
- Metalstorm
- Dan Moniz
- Robert Morris
- David Mortman
- Mystic
- Annalee Newitz
- Kurt Opsahl
- Pablos
- Ken Pfiel
- Dean Pierce
- Bruce Potter (1,2)
- Roberto Preatoni
- RS
- Raven
- Jim "FalconRed" Rennie
- San
- Oskar Sandberg
- Seth Schoen
- Matthew L. Shuchman “Pilgrim” (1,2)
- Jason Scott
- James Schuyler
- Wendy Seltzer
- Sensepost
- Simple Nomad
- Justin Somaini
- Sherri Sparks
- Alexey Smirnov
- Alex Stamos
- StankDawg
- Elizabeth Stark
- Scott Stender
- Emerson Tan
- Wesley Tanner
- Rodney Thayer
- Richard Thieme
- Frank Thornton
- Mark Weber Tobias
- Paul Vixie
- Patty L. Walsh
- Weasel
- Dr. Linton Wells
- Chuck Willis
- Christian Wright
- Zamboni
- Philip R. Zimmermann
A
B
C
D
E
F
G
H
I
J
K
L
M
N
O
P
R
S
T
V
W
Z
Highlights
DefCon 13 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!(PDF file - 6 MB)
Contest Results
May be found on the Defcon 13 Post-Con pageAudio/Video RSS Feeds
VideoAudio
Music
Music Videos
DEF CON 13 Website
DEF CON 13 Post-Con PagePress Coverage
- Zero Day - Infoworld Blog
- Security Fix - Washington Post Blog - Defcon Day 1
- Slashdot | DEF CON Coverage Round-up at Make
- Hackers and foes exchange ideas - International Herald Tribune - AP
- Las Vegas Weekly - Written by Defcon Speaker Patty Walsh
- Hackers prowess on display - Statesman
- Kisses and Renderman brave INQ snapperazzi - The Inquirer
- Hacking hardware on display- The Inquirer
- Hackers Head To DefCon In Vegas
- Hackers show off abilities at Defcon - Miami Herald
- RantMedia at DEF CON XIII | Rantmedia Community - Blog by RantRadio
- Otinia - Blog entry with impressions of DC
- DefCon 13 - Trip Report for the Distributed systems department at Lawrence Berkely Lab
- Andrew Mudd [AndrewMudd.com] :: DefCon 13 No-Pictures-Yet Wrap Up - Blog
- My EXCEPTIONALLY lengthy and yet contentless DEF CON review! - Blog by attendee on Johnny Long's forum
- Freedom Lives: Defcon 13 Archives - Blog
- Kitchen Sink Web Blog Archive DefCon 13 roundup - Blog from attendee
- Insomnygen: Defcon 13 - Blog
- Defcon 101: no show speakers, long lines, and total chaos. - The Jason Calacanis Weblog - calacanis.weblogsinc.com _ - Blog
- Emergent Chaos: Defcon Coverage? - Blog of Adam Shostack
- Who Has Time For This?: CiscoGate at DEF CON - Blog by David Cowan
- Blog for DIAMONDKT - Blog by attendee - extensive length
- DEF CON 13 Reading List at Daniel Spisak on Technology - Blog entry highlighting authors favorite talks
- DEF CON 13 Aftermath at Daniel Spisak on Technology - Blog of attendee
- SynapticTransmissions.com - Attendee Blog
- SynapticTransmissions.com - Attendee Blog - Day 3
- SynapticTransmissions.com - Attendee Blog - day 2
- SynapticTransmissions.com - Attendee Blog - Day 1
- Ants on the MelonBlog Archive Friday at DefCon 13 - Blog entry
- Ants on the MelonBlog Archive Saturday at DefCon, Blackjack in Vegas - Blog
- Ants on the MelonBlog Archive End of DefCon, Deep Fried Twinkies - Blog (day 3 review)
- Russell's blog - Blog entry by attendee
- timbrown: Okay, so I'm back on UK time... - Blog entry by attendee
- http://sneak.datavibe.net/blog/read?id=1076 - Blog entry by attendee
- Carbon Ring: DefCon 13 Part II - Blog entry by attendee
- Carbon Ring: DefCon 13 Part I - Blog entry by attendee
- The Edge of I-Hacked DEF CON 13!! - Blog entry
- Rupert Goodwins' Diary - ZDNet UK Comment - Blog
- Team iFiber Redwire Sets New WiFi Distance Record - Digital-Lifestyles.info
- Slashdot | 125-Mile WiFi Connection - Slashdot article on WiFi shootout
- New wireless record claimed | Tech News on ZDNet
- Boing Boing: Third Annual Defcon Wifi Shootout Contest - Pre DC Coverage of WiFi Shootout
- Boing Boing: DefCon WiFi shootout champions crowned: 125 miles - BoingBoing Blog Entry after event
- Belkin intros sub-$100 G Plus MIMO router line - Engadget - www.engadget.com - Product announcement mentioning recent DC Wi-Fi world record
- Unamplified WiFi distance record set at 125 miles - Engadget - www.engadget.com - Blog
- Record Set at DefCon WiFi Shootout - By Pedro Hernandez [enterpriseplanet]
- heise online - New WLAN long-distance world record
- Tom's Hardware Guide: Tom's Hard News - WiFi Shootout record
- Wi-Fi Toys - Wi-Fi blog entry on shootout record
- Wired News: Hackers Annihilate Wi-Fi Record
- The Car Whisperer, Bluesnarfing for hands-free - Engadget - www.engadget.com
- Opposable Thumbs: Meet KegBot, son of Kegerator
- Security Fix- Washinton Post
- Boing Boing: Defcon, Makezine, kegbot
- The Kegbot - It Gives You Beer : Gizmodo
- Slashdot | Kegbot: The Future of Robotic Drink Service, Now
- MAKE: Blog: @ DEF CON - The Kegbot project
- Wall of Sheep - I see stupid people
- [ISN] Wall of Sheep - I see stupid people
- Passing the conference 'sniff' test - Talks about several conferences.
- Security Awareness for Ma, Pa and the Corporate Clueless: Into the Valley of Death - Blog by Winn Shwartau (he gives pre-con advice on avoiding the wall of sheep)
- Annual hacking game teaches security lessons
- twin stars DEF CON 13: Capture The Flag - Blog
- WiFi access points go nuclear
- Live from DefCon: WiFi bouncing - Engadget - www.engadget.com - Engadget blog entry (Live from DC)
- Wireless access security tool moves past prototype stage - WaveSEC story
- AirDefense Reports Nearly 2,500 Wireless Attacks at DefCon; Evil Twin Attacks Moving from Masquerading to Injection - Forbes.com - AirDefense PR regarding hostile activity on the Defcon network.
- Wireless Noise Hampers DefCon; Impact of Non-Wi-Fi Interference Surprises Observers at Hacker Conference - Press release by company analyzing interference issues [AirMagnet]
- Nevada legalizes wireless handheld gambling - Engadget - www.engadget.com - Pre-DC article mentioning how DC hackers will enjoy wireless handheld gambling
- The INQ Guide to finding wardriving supplies
- Wireless Developer Network
- Internet News Article | Reuters.co.uk | PluggedIn: Wireless networks -- easy pickings for hackers
- Tom's Hardware Guide: Tom's Hard News - WiFi pistol appears at Defcon
- InformationWeek > Wireless > When Networking Wirelessly, Beware The Microwave > August 2, 2005
- How to pick an IT lock at Defcon 13 - Article with pictures (The Register/TheInquirer)
- Dunk the hacker and be a net society contributor - The Inquirer
- Macworld UK - Defcon draws federal recruiters - Macworld staff blurb quoting Wells from Reuters report
- US officials go to hackers' convention to recruit - Reuters
- PC Pro: News: US authorities recruiting at Defcon - Short blurb by Simon Aughton
- CNN.com - Feds recruiting hackers at Defcon - Aug 11, 2005 - CNN copy of reuters article
- U.S. government hiring more hackers
- Infrared exploits open the door to hotel hacking | The Register
- Hacking the hotel through the TV - Hotel News Resource
- Hacking the hotel through the TV | Tech News on ZDNet
- WatchGuard Wire: RSS Feed | WatchGuard Technologies, Inc.
- Wired News: A Hacker Games the Hotel
- GoldBlogger Hacker Teaches Click Fraud At Conference! - Blog entry on Adwords hacking
- Hacking Google Adwords - Defcon Panel recap - The Jason Calacanis Weblog - Lengthy Blog by attendee on the hacking google adwords
- Hacker Teaches Click Fraud At Conference! - addict3d.org
- Hackers demonstrate their skills in Vegas - Business Week, Aug 1. Greg Sandoval
- RFID: There you are!: ZDNet Australia: News: Hardware
Conference Overview
Conference Overview - Blogs
WiFi Shootout
Bluetooth
KegBot
Wall of Sheep
Capture The Flag
WiFi Security
Lockpicking
EFF
Feds
Infra-red
RFID
Speakers & Presentations
encoded in h.264 from original .mov (Video iPod friendly)Ofir Arkin
On the Current State of Remote Active OS Fingerprinting
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ofir Arkin
A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jay Beale
Introducing the Bastille Hardening Assessment Tool
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Marshall Beddoe
Reverse Engineering Network Protocols using Bioinformatics
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Scott Blake, Pamela Fusco, Ken Pfiel, Justin Somaini, Andre Gold, David Mortman
CISO Q&A with Dark Tangent
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Wes Brown & Scott Dunlop
Mosquito - Secure Remote Code Execution Framework
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Strom Carlson & Black Ratchet
Be Your Own Telephone Company...With Asterisk
Read It! (PDF | SXI) See It! (m4v Video) Hear it! (m4b Audio)Cerebus
Analysis of Identity Creation Detection Schemes post- 9/11
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jim Christy & Various other Feds
Meet the Fed
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)DC Groups
Panel: A discussion of the regional DEF CON Groups
See It! (m4v Video) Hear it! (m4b Audio)Daniel Burroughs
Auto-adapting Stealth Communication Channels
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Daniel Burroughs
Development of An Undergraduate Security Program
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ian Clarke & Oskar Sandberg
Routing in the Dark: Scalable Searches in Dark P2P Networks
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Greg Conti
Countering Denial of Information Attacks
Read It! (PDF) White Paper (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Matt Cottam
Sketchtools: Prototyping Physical Interfaces
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David Cowan
The Information Security Industry: $3 Billion of Snake Oil
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Amanda Dean
Whiz Kids or Juvenile Delinquents: A Sociological Perspective The Construction of Hacker Identity
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Steve Dunker
The Hacker’s Guide to Search and Arrest
Read It! (PDF) Extras (PDF) See It! (m4v Video) Hear it! (m4b Audio)Kristofer Erickson
The Power to Map: How Cyberspace Is Imagined Through Cartography
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Leonard Gallion
A Safecracking Double Feature: Dial ‘B’ For BackDialing and Spike the Wonder Safe
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Kenneth Geers
Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Hernan Gips
Bacon: A Framework for Auditing and Pentesting
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Michael Glasser & Deviant Ollam
Intro to High Security Locks and Safes
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jennifer Granick
Top Ten Legal Issues in Computer Security
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Julian Grizzard
Surgical Recovery from Kernel-Level Rootkit Installations
Read It! (PDF) Papers (PDF) Tools (GZ) See It! (m4v Video) Hear it! (m4b Audio)Christian Grothoff
Lost in Translation
Read It! (PDF) Tech Report (PDF) See It! (m4v Video) Hear it! (m4b Audio)Deral Heiland
The Insecure Workstation II `bob reloaded
Read It! (PDF) References! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Thomas J. Holt
No Women Allowed? Exploring Gender Differences In Hacking
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Broward Horne
Meme Mining for Fun and Profit
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Tony Howlett
GeoIP Blocking, A Controversial But (Sometimes) Effective Approach
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)David Hulton
The Next Generation of Cryptanalytic Hardware
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert "hackajar" Imhoff-Dousharm
Credit Cards: Everything You have Ever Wanted to Know
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jesse Krembs, Nick Farr, Emerson Tan, Frazier Cunningham, Jennifer Granick, James Schuyler, Christian Wright & William Knowles & other select members of the Foundation Board.
Doing Not-For-Profit Tech: The Hacker Foundation Year in Review
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Ben Kurtz
A Linguistic Platform for Threat Development
Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)Johnny Long
Death of a Thousand cuts Forensics
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Johhny Long
Google Hacking for Penetration Testers
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert E. Lee & Jack C. Louis
Introducing Unicornscan - Riding the Unicorn
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Beth Louis (Phen)
Social Engineering Do's and Don'ts (A Femaie Perspective)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Kevin McCarthy
The Six Year Old Hacker: No More Script Kiddies
Read It! (PDF) References! (PDF) Code! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Major Malfunction
Old Skewl Hacking - InfraRed
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Raffael Marty
Visual Security Event Analysis
Read It! (PDF) Extras (GZ) See It! (m4v Video) Hear it! (m4b Audio)Metalstorm
Trust Transience: Post Intrusion SSH Hijacking
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Annalee Newitz, Wendy Seltzer, Kevin Bankston, Kurt Opsahl, Seth Schoen
Ask EFF: The Year in Digital Liberties
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Deviant Ollam
Introduction to Lockpicking and Physical Security
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dean Pierce, Brandon Edwards & Anthony Lineberry
Bypassing Authenticated Wireless Networks
Read It! (PDF) Software (BZ2) See It! (m4v Video) Hear it! (m4b Audio)Bruce Potter, Beetle, CowboyM, Dan Moniz, Rodney Thayer, 3ricj, Pablos
Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Roberto Preatoni & Fabio Ghioni
Assymetric Digital Warfare
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jim "FalconRed" Rennie
Licensing Agreements 101: The Creative Commons License
Read It! PDF+code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Jason Scott
Why Tech Documentaries are Impossible (And why we have to do them anyway.)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Matthew L. Shuchman “Pilgrim”
Building WarDriving Hardware Workshop
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Matthew L. Shuchman, Frank Thornton, Robert V. Hale II
Legal and Ethical Aspects of WarDriving
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Sensepost
Automation - Deus ex Machina or Rube Goldberg Machine?
Read It! (PDF) (m4v Video) Hear it! (m4b Audio)Simple Nomad and the NMRC Collective: hellnback, ertia, Weasel, jRandom, MadHat
The NMRC Warez 2005 Extravaganza
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Alexey Smirnov & Tzi-cker Chiueh
DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks
UPDATED Read It! (PPT) Dira Whitepaper (PDF) See It! (m4v Video) Hear it! (m4b Audio)Sherri Sparks & Jamie Butler
“Shadow Walker ” Raising The Bar For Rootkit Detection
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Alex Stamos & Scott Stender
Attacking Web Services: The Next Generation of Vulnerable Apps
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Elizabeth Stark & Fred Benenson
The Revolution Will Not Be Copyrighted: Why You Should Care About Free Culture
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Wesley Tanner & Nick Lane-Smith
End-to-End Voice Encryption over GSM: A Different Approach
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Richard Thieme
Recapturing the Revolutionary Heart of Hacking
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Vixie
The Internet's March of Folly: How, from ARPA to WSIS, Internet governance has consistently pursued policies contrary to its self interest
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Vixie & Gadi Evron
Internet Survivability, Threats and Efforts
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Patty L. Walsh
Hackers and the Media- Misconceptions and Critical Tools To Combat Them
Read It! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)Mark Weber Tobias & Matt Fiddler
Physical Security Bypass Techniques: Exploring the Ethics of Full Disclosure
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Dr. Linton Wells
Assistant Secretary of Defense for Networks and Information Integration
Read It! (PDF) See It! (m4v Video) Chuck Willis
Trends in Licensing of Security Tools
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Zamboni
Attacking Biometric Access Control Systems
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Philip R. Zimmermann


