Speakers


Highlights


DefCon 15 Program

Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!
(PDF file - 7.3 MB)

Contest Results

May be found on the Defcon 15 Post-Con page

Audio/Video RSS Feeds

Video
Audio

DEF CON 15 Website

DEF CON 15 Post-Con Page

Press Coverage


Defcon 15

was August 3-5, 2007 at the Riviera Hotel and Casino.




Speakers & Presentations

encoded in h.264 from original .mov (Video iPod friendly)

Agent X

44 Lines about 22 Things that keep me up at Night

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ofir Arkin UPDATED

kNAC!

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


atlas UPDATED

Remedial Heap Overflows: dlmalloc style

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Andrea Barisani & Daniele Bianco

Injecting RDS-TMC Traffic Information Signals
a.k.a. How to freak out your Satellite Navigation

Read It! (Slides | White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


John Benson (jur1st)

Bridging the Gap Between Technology and the Law

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Peter Berghammer

A Journalist's Perspective on Security Research

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sean M. Bodmer UPDATED

Analyzing Intrusions & Intruders

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sam Bowne

Teaching Hacking at College

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sergey Bratus

Entropy-based data organization tricks for log and packet capture browsing

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Byrne

Intranet Invasion With Anti-DNS Pinning

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


D.J.Capelis UPDATED

Virtualization: Enough holes to work Vegas

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Proctor, Patrick Chung, Maria Cirino,
Mark McGovern, Dov Yoran

Panel: Meet the VCs

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert W. Clark

Computer and Internet Security Law - A Year in Review 2006 - 2007

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Greg Conti

Satellite Imagery Analysis

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Crispin Cowan

Securing Linux Applications With AppArmor

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jesse "x30n" D'Aguanno

LAN Protocol Attacks Part 1 - Arp Reloaded

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


The Dark Tangent

CiscoGate

Read It! (PDF) See It! (m4v Video)


Rick Deacon

Hacking Social Lives: MySpace.com

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Dead Addict

Picking up the Zero Day; An Everyones Guide to Unexpected Disclosures

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Jared DeMott, Dr. Richard Enbody, Dr. Bill Punch UPDATED

Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Ganesh Devarajan UPDATED

Unraveling SCADA Protocols: Using Sulley Fuzzer

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Deviant Ollam, Noid, Frank Thornton (a.k.a. Thorn), jur1st

Boomstick Fu: The Fundamentals of Physical Security at its Most Basic Level

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Roger Dingledine

Tor and blocking-resistance

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Toralv Dirro, Dirk Kollberg UPDATED

Trojans: A Reality Check

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


I)ruid UPDATED

Real-time Steganography with RTP

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Steve Dunker

Everything you ever wanted to know about Police Procedure in 50 minutes

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Luiz Eduardo

The Hacker Society around the (corporate) world

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Joel Eriksson, Karl Janmar, Claes Nyberg, Christer Öberg UPDATED

Kernel Wars

Read It! (Slides | White Paper) Extras (ZIP) Code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Nathan S. Evans, Christian Grothoff

Routing in The Dark: Pitch Black

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Gadi Evron

Estonia: Information Warfare and Strategic Lessons

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Gadi Evron

Webserver Botnets

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Zac Franken

Biometric and token based access control systems: Are you protected by two screws and a plastic cover? Probably.

Read It! (PDF) See It! (m4v Video)


Kenneth Geers UPDATED

Greetz from Room 101

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


geoffrey UPDATED

The Completion Backward Principle

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Damien Gomez

Intelligent debugging for VulnDev

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


K.N. Gopinath UPDATED

Multipot: A More Potent Variant of Evil Twin

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Joe Grand

Making of the DEF CON 15 Badge

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Jennifer Granick

Disclosure and Intellectual Property Law: Case Studies

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Lukas Grunwald

Security by Politics - Why it will never work

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Gustin, Ab3nd

Hardware Hacking for Software Geeks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Peter Gutmann

The Commercial Malware Industry

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ian G. Harris

INTERSTATE: A Stateful Protocol Fuzzer for SIP

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


John Heasman

Hacking the Extensible Firmware Interface

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Aaron Higbee

Hack Your Car for Boost and Power!

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ricky Hill

GeoLocation of Wireless Access Points and "Wireless GeoCaching"

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Greg Hoglund

VIRTUAL WORLD, REAL HACKING

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas J. Holt

The Market for Malware

Read It! (PDF) See It! (m4v Video)


Broward Horne

Click Fraud Detection with Practical Memetics

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Hulton

Faster PwninG Assured: New adventures with FPGAs

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dan Hubbard UPDATED

HoneyJax (AKA Web Security Monitoring and Intelligence 2.0)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Luke Jennings

One Token to Rule Them All: Post-Exploitation Fun in Windows Environments

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Dave Josephsen

Homeless Vikings, (short-lived bgp prefix hijacking and the spamwars)

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Black Ops 2007: Design Reviewing The Web

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Vitaliy Kamlyuk

Fighting Malware on your own

Read It! (PDF) Extras (ZIP) See It! (m4v Video)


Patrik Karlsson UPDATED

SQL injection and out-of-band channeling

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


King Tuna

Hacking EVDO

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Benjamin Kurtz

Functional Fuzzing with Funk

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Edward Lee UPDATED

Comparing Application Security Tools

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Janne Lindqvist

IPv6 is Bad for Your Privacy

Read It! (Slides | White paper) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Long

No-Tech Hacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Myles Long, Rob "Flack" O'Hara, Christian "RaDMan" Wirth UPDATED

Self-Publishing and the Computer Underground

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Nick Mathewson UPDATED

Social Attacks on Anonymity Networks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Nick Mathewson UPDATED

Technical Changes Since The Last Tor Talk

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Haroon Meer, Marco Slaviero UPDATED

It's All About the Timing

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Charlie Miller UPDATED

How smart is Intelligent Fuzzing
- or -
How stupid is Dumb Fuzzing?

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Doug Mohney

The Next Wireless Frontier - TV White Spaces

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


H.D. Moore, Valsmith UPDATED

Tactical Exploitation

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Scott Moulton

Re-Animating Drives & Advanced Data Recovery

Read It! (White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Shawn Moyer

(un)Smashing the Stack: Overflows, Countermeasures, and the Real World

Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Alexander Muentz UPDATED

Protecting your IT infrastructure from legal attacks- Subpoenas, Warrants and Transitive Trust

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Rich Murphey

Windows Vista Log Forensics

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Mike Murray, Lee Kushner

Creating and Managing Your Security Career

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Mike Murray, Anton Chuvakin

The Science of Social Engineering: NLP, Hypnosis and the science of persuasion

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Brett Neilson, Taylor Brinton UPDATED

Being in the know... Listening to and understanding modern radio systems

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Ne0nra1n, Julian Spillane

Hack your brain with video games

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Danny O'Brien

Digital Rights Worldwide: Or How to Build a Global Hacker Conspiracy

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Brendan O'Connor

Greater than 1: Defeating "strong" Authentication in Web Applications

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Steve Orrin UPDATED

The SOA/XML Threat Model and New XML/SOA/Web 2.0 Attacks & Threats

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Alfredo Ortega

OpenBSD remote Exploit and another IPv6 vulnerabilities

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Chris Palmer, Alex Stamos

Breaking Forensics Software: Weaknesses in Critical Evidence Collection

Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Daniel Peck, Ben Feinstein

CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Mike Perry UPDATED

Securing the Tor Network

Read It! (Slides | White Paper) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Aaron Peterson UPDATED

Pen-testing Wi-Fi

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Pilgrim

How to be a WiFi Ninja

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Plet

Stealing Identity Management Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter UPDATED

Dirty Secrets of the Security Industry

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Danny Quist, Valsmith

Covert Debugging: Circumventing Software Armoring Techniques

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Aviv Raff, Iftach Ian Amit

The Inherent Insecurity of Widgets and Gadgets

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Vivek Ramachandran UPDATED

The Emperor Has No Cloak - WEP Cloaking Exposed

Read It! (Slides | White Paper) See It! (m4v Video)


Matt Richard, Fred Doyle UPDATED

Beyond Vulnerability Scanning - Extrusion and Exploitability Scanning

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Billy Rios, Nathan McFeters UPDATED

Biting the Hand that Feeds You - Storing and Serving Malicous Content >From Well Known Web Servers

Read It! (Slides | White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Martyn Ruks

MQ Jumping

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Tony Sager

Vulnerabilities and The Information Assurance Directorate

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Oskar Sandberg UPDATED

Network Mathematics: Why is it a Small World?

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael Schearer

The Church of WiFi Presents: Hacking Iraq

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Schneier

Q & A with Bruce Schneier

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael Schrenk UPDATED

The Executable Image Exploit

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ari Schwartz, Ben Edelman, Eileen Harrington, Mario Vuksan

Panel: Center for Democracy & Technology Anti-Spyware Coalition

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jason Scott

THE EDGE OF FOREVER - MAKING COMPUTER HISTORY

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dror Shalev UPDATED

A Crazy Toaster: Can Home Devices Turn Against Us?

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Zed A. Shaw UPDATED

Saving The Internet With Hate

Read It! (PDF) Extras (ZIP) See It! (m4v Video)


David C. Smith, Mickey Laskey

Cool stuff learned from competing in the DC3 digital forensic challenge

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Squidly1 UPDATED

Thinking Outside the Console (box)

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Robert Stoudt UPDATED

When Tapes Go Missing

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Tom Stracener, Marce Luck UPDATED

Hacking the EULA: Reverse Benchmarking Web Application Security Scanners

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Subere

Fingerprinting and Cracking Java Obfuscated Code

Read It! (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Sysmin, Marklar UPDATED

Creating Unreliable Systems, Attacking the Systems that Attack You

Read It! (PDF) See It! (m4v Video)


Thorn, Renderman, theprez98

The Church of WiFi's Wireless Extravaganza

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Richard Theime

Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors

Read It! (White Paper) See It! (m4v Video) Hear it! (m4b Audio)


Marc Weber Tobias, Matt Fiddler

High Insecurity: Locks, Lies, and Liability

Read It! (PDF) See It! (m4v Video)


Steve Topletz

Portable Privacy: Digital Munitions for the Privacy War

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Schuyler Towne

Locksport: An emerging subculture

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Valsmith, Delchi

Malware Secrets

Read It! (PDF) See It! (m4v Video)


Jacob West UPDATED

How I Learned to Stop Fuzzing and Find More Bugs

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas Wilhelm

Turn-Key Pen Test Labs

Read It! (PDF) See It! (m4v Video)


Paul Sebastian Ziegler, Tatsumori UPDATED

Multiplatform malware within the .NET-Framework

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Philip R. Zimmermann

Z-Phone

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)

return to top