Speakers
- Kevin Archer
- arcon
- atlas
- Kevin Bankston
- Jason Beckett
- beth
- Teli Brown
- Wes Brown
- Johnny Cache
- Strom Carlson
- James Christy
- Robert Clark
- Tyler Cohen
- Cindy Cohn
- Greg Conti
- datagram
- Jared DeMott
- digunix
- dr.kaos
- Steve Dunker
- Scott Dunlop
- Chris Eagle
- Charles Edge
- Alexander Eisen
- Riley "Caezar" Eller
- Gadi Evron
- FX
- Yuan Fan
- Matt Fiddler
- Halvar Flake
- Foofus
- Andy Fried
- Pamela Fusco
- Kenneth Geers
- Joe Grand
- Thomas X. Grasso
- Lukas Grunwald
- Peter Gutmann
- Robert J. Hansen
- Seth Hardy
- Matt Hargett
- Rick Hill
- H1kari
- Thomas Holt
- Dan Hubbard
- Arias Hung
- Johan Hybinette
- Mike Jacobs
- Dan kaminsky
- Alexander Kornbrust
- Isaac Levy (.ike)
- Lin0xx
- Johnny Long
- Major Malfunction
- Rich Marshall
- Raffael Marty
- Damon McCoy
- Scott Miller
- Luis Miras
- Mathew Monroe
- David Mortman
- Scott Moulton
- Mudge
- Collin Mulliner
- R.P. Murphy
- Danny O’Brien
- Timothy M O'Neill
- Kurt Opsahl
- Chris Paget
- tommEE pickles
- Bruce Potter
- Ken Privette
- Danny Quist
- Michael Rash
- Renderman
- Keith Rhodes
- Melanie Rieback
- Xiao Rong
- Martyn Ruks
- Eric Schmiedl
- Seth Schoen
- Amber Schroader
- Jason Schultz
- SensePost
- Anmol Sheth
- Paul Simmonds
- simple nomad
- skrooyoo
- Brad Smith
- Mark Stamp
- Joe Stewart
- Henry Teng
- Richard Thieme
- Thorn
- Dave Thomas
- Irby Thompson
- Marc Weber Tobias
- Peleus Uhley
- Valsmith
- Randal Vaughn
- Vidiot
- Paul Vixie
- weasel
- Linton Wells
- Rick Wesson
- Andrew Whitaker
- Greg White
- Wing H. Wong
- x30n
A
B
C
D
E
F
G
H
J
K
L
M
O
P
Q
R
S
T
U
V
W
X
Highlights
DefCon 14 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!(PDF file - 6 MB)
Contest Results
May be found on the Defcon 14 Post-Con pageAudio/Video RSS Feeds
VideoAudio
Music
DEF CON 14 Website
DEF CON 14 Post-Con PagePress Coverage
- Defcon aims to thwart counterfeit badges - ABC News
- Defcon Badges go high tech - The Inquirer
- BlackBerry a Juicy Hacker Target - Wired News
- BlackBerry flaw highlights growing mobile device risks - Search Security
- D'Aguanno demonstrates Blackberry attack - The Inquirer
- Is Your Blackberry a Hacker's Back Door? - CFO
- Security Researcher To Release Code That Could Help Exploit BlackBerry Security Flaw - Information Week
- The Week Ahead, Aug. 14-18, 2005 - Forbes
- Trojan malware takes a bite out of BlackBerry - Computer World
- BlackBerry hacking peril exposed - The Register
- Introducing Blue Pill - The Invisible Things
- Defcon Speakers Team Up to Fight 'Queen Bots' - Washington Post
- Defcon 14 report: DAY TWO Zone-H
- Piratas informáticos a todo vapor - BBC Mundo
- Black Hat and Defcon 2006: SecurityFest - PC World
- Defcon 14 report: DAY ONE - Zone-H
- Defcon 14 Wrapup, at Long Last - Washington Post
- DefCon Delays Can't Stop the Madness - Washington Post
- Defcon gets off to a late start - CNET News
- Defcon growing pains - Rush of people delay opening - TG Daily
- Hacker Pranks at Defcon and Black Hat in Las Vegas Emphasize Computer Security - MIT Tech Review
- Hackers and G-men to descend on Las Vegas - MSNBC.com
- Hackers and trackers mixing and mingling - International Herald Tribune
- Hackers gather at confab to penetrate computers, pick locks, spray pellets - Washington Post
- Hackers meet to exploit computer flaws - Fox News
- Las Vegas braces for computer security gurus - TG Daily
- Las Vegas hosts computer security events - SEATTLE POST-INTELLIGENCER
- Reunión mundial de piratas informáticos en Las Vegas - El Pais
- Suits and punks convene in Las Vegas for hacker conferences - USA Today
- Talking with the Dark Tangent - Washington Post
- Two Former Federal Agents Talk About Computer Forensics, Network Security and Computer Crime. - CyberSpeak
- IT Security through contests, sponsored by Pepsi - The Inquirer
- Hackers meet to exploit computer flaws - Fox News
- Elite programmers compete in CTF at DEF CON - ZD Net
- UF security professionals win world's largest ‘hacking’ competition - University of Florida News
- Even offline computers can be hacked, researchers say - USA Today
- Experts Discuss Wireless Vulnerability - MS Money
- Researchers show 'systemic' wireless vulnerability - International Herald Tribune
- DNS amplification attacks explained - The Inquirer
- Defcon 2006: Hackers can work for the Feds - no degree required - TG Daily
- FBI: Cybercriminals Taking Cues From Mafia - PC World
- Feds court infosec pros in fight against cybercrime - Search Security
- Meeting the Feds at the Def Con Hacker Fair - NPR Radio
- When Online Crooks Advertise - Washington Post
- Johnny Long interview - CyberSpeak
- Defcon 14 Full of Amazing Hardware Hacks - Slashdot
- - Legacy protocol puts IBM mainframes at risk Search Security
- The state of IPv6 has to be seen to be believed - The Inquirer
- Defcon 2006: Casinos could be losing millions to slot machine hackers - TG Daily
- Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro
- Microsoft Challenges Hackers On Vista - CBS News
- Cult Of The Dead Cow Puts Malware Samples Online - Windows IT Pro
- Defcon 2006: Oracle not so "unbreakable" - TG Daily
- Is RFID tracking you? - CNN
- Researchers: E-passports pose security risk - CNET
- Biometric passports cracked - Computing
- British biometric passport hacked - The Inquirer
- E-Passport ally responds to cloning claims - Security Focus
- Hacker Cracks, Clones RFID Passport - Tech News World
- Researchers expose e-passport vulnerability - Search Security
- Researchers: E-passports pose security risk - ZD Net Asia
- Security fears threaten RFID adoption - ITWeek
- Traveling Terabyte Project helps soldiers keep in touch with Defcon - TG Daily
- VoIP Abuse at BlackHat, Zimmermann to kick off DEF CON - VON Magazine
- E-mail security hero takes on VoIP - CNET News
- Zfone for VoIP ready for testing - The Inquirer
- Zimmermann: Borderware Licenses Zfone Technology - VON Magazine
- Wall of Sheep at DEF CON illustrates what not to do - ZD Net
- War driving by rocket at 6,800 feet - Security Focus
- A wireless hacking computer that can't be hacked - TG Daily
- The Black Hat Wi-Fi exploit coverup - NewsForge
- Researchers warn over Web worms - Security Focus
Badges
Blackberry
Blue Pill
Bots
Conference Overview
Contests
CTF
Device Driver
DNS
Feds
Hardware
IBM
IPv6
Jackpotters
Malware
Microsoft
Offensive Computing
Oracle
Passport
Traveling Terabyte
VOIP
Wall of Sheep
War Driving/Wi-Fi
Worms
Speakers & Presentations
encoded in h.264 from original .mov (Video iPod friendly)atlas
The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jay Beale
Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Jason Beckett, James Christy SA Andy Fried, Mike Jacobs, Rich Marshall, Ken Privette, Keith Rhodes, Dave Thomas, Tim Fowler, Linton Wells, Rick Palermo
Panel: Meet the Fed
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Teli Brown
Phishing, it starts with “Ph” for a reason. Some best practices to detect and prevent for some new point of attack methods
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Wes Brown & Scott Dunlop
Exploit Writing Using Injectable Virtual Machines
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Strom Carlson
Hacking FedEx Kinko's: How Not To Implement Stored-Value Card Systems
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Strom Carlson, skrooyoo, datagram & Vidiot
SOCIAL MESSAGE RELAY: Using existing social networks to transmit covert messages in public
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert W. Clark
Legal Aspects of Computer Self-Defense and Aggressive Self-Defense
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert Clark
Legal Aspects of Internet & Computer Network Defense: A Year in Review Computer and Internet Security Law 2005-2006
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Cindy Cohn, Kevin Bankston, Kurt Opsahl, Jason Schultz, Danny O’Brien, Seth Schoen
Ask EFF: The Year in Digital Civil Liberties
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Cindy Cohn, Kevin Bankston, Kurt Opsahl & Jason Schultz
EFF v. AT&T: Your World, Delivered (to the NSA)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)dr.kaos, arcon, atlas, beth, digunix
SAMAEL (Secure, Anonymous, Megalomaniacal, Autonomous, Encrypting Linux) and NARC (Network Analysis Reporting Console)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Chris Eagle
Ripples in the Gene Pool: Creating Genetic Mutations to Survive the Vulerability Window
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Charles Edge aka Krypted
10 Ways To Not Get Caught Hacking On Your Mac
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Charles Edge aka Krypted
Mac OS X Security Tools
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Gadi Evron
DNS Abuse Infrastructure and Games
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Gadi Evron, Mudge, Paul Vixie, Dan Kaminsky, Randy Vaughn, Dan Hubbard, Tim Grasso
Panel: Internet Wars 2006
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Yuan Fan & Xiao Rong
MatriXay: When Web App & Database Security Pen-Test/Audit Is a Joy
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Halvar Flake
RE 2006: New Challenges Need Changing Tools
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Foofus
Graphical Representations of Security Relationships: Awesome or Bullshit?
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)FX
Analysing Complex Systems: The BlackBerry Case
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Kenneth Geers & Alexander Eisen
Ipv6 World Update: High Diplomacy & Monster Trucks
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Thomas X. Grasso
Fighting Organized Cyber Crime
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Lukas Grunwald
First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Peter Gutmann
Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Robert J. Hansen
Trust, But Verify: Auditing Proprietary DRE Systems
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Seth Hardy
Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Matt Hargett & Luis Miras
Automatic Exploit Detection in Binaries
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Rick Hill
WarRocketing: Network Stumbling 50 sq. miles in < 60 sec.
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Broward Horne
Meme HackingSubverting The Ideosphere
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Thomas Holt
Exploring the Changing Nature of DEF CON over the Past 14 Years
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Arias Hung
Owning the Linksys wrtp54g VOIP Router
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Johan Hybinette
How to Create an Anonymous Identity
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Isaac Levy (.ike)
Hacking UNIX with FreeBSD Jail(8), Secure Virtual Servers
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Lin0xx
Advanced Windows Based Firewall Subversion
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Johnny Long
Secrets of the Hollywood Hacker!
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Major Malfunction
Old Skewl Hacking: Magstripe Madness
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Raffael Marty
Visual Log Analysis - The Beauty of Graphs
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Luis Miras
Bridging the Gap Between Static and Dynamic Reversing
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Damon McCoy & Anmol Sheth
Zulu A Command Line Wireless Frame Generator
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Scott Moulton
Rebuilding HARD DRIVES for Data Recovery: Anatomy of a Hard Drive
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Scott Miller
A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Collin Mulliner
Advanced Attacks Against PocketPC Phones
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)R.P. Murphy
Covert Channels using IPv6/ICMPv6
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Timothy M O'Neill
"What has the NSA done for me lately?"
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Chris Paget
US-VISIT: Raping personal privacy since 2004
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Bruce Potter
Trusted Computing: Could it be... SATAN?
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Michael Rash
Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Renderman, Thorn & H1kari
New Wireless Fun From the Church Of WiFi
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Melanie Rieback
A Hacker's Guide to RFID Spoofing and Jamming
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Martyn Ruks
IBM Networking AttacksOr The Easiest Way To Own A Mainframe Without Getting The Removals Men In
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Amber Schroader & Tyler Cohen
Cyber-crime Foiled Once Again? Help prove the innocence or guilt of Jack Grove
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Simmonds, Pamela Fusco, David Mortman, Henry Teng
The Jericho Forum and Challenge
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Mark Stamp & Wing H. Wong
Hunting for Metamorphic Engines
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Joe Stewart
OllyBone: Semi-Automatic Unpacking on IA-32
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Richard Thieme
Beyond Social Engineering: Tools for Reinventing Yourself
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Irby Thompson & Mathew Monroe
Advanced File System Hiding and Detection
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Marc Weber Tobias & Matt Fiddler
Things That Go "Bump" in the night: An Analysis of Current and Emerging Threats to Physical Security
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Valsmith & Danny Quist
Hacking Malware: Offense is the new Defense
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Randal Vaughn & Gadi Evron
DNS Amplification Attacks
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Paul Vixie & David Dagon
Malware Repository Requirements
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)weasel & simple nomad
The Plausible Deniability Toolkit
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Linton Wells
UNCLASSIFIED Information Sharing with Non-Traditional Partners
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Rick Wesson
Abuse and the Global Infection Rate
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Greg White & Kevin Archer
The National Collegiate Cyber Defense Competition
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)x30n
Blackjacking - 0wning the Enterprise via the Blackberry
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)Phil Zimmermann


