Speakers
-
A
- Joshua "Jabra" Abraham
- Steven Adair
- Sudhir Aggarwal
- MD Sohail Ahmad
- Larry Aiello
- Chema Alonso
- Dmitri Alperovitch
- Colin Ames
- Iftach Ian Amit
- Alek Amrani (1, 2)
- Ryan Anguiano
- Anonymous Speaker
- Jake Appelbaum
- James "Myrcurial" Arlen
- Nicholas Arvanitis
- David Aslanian
- Andrea Barisani
- Mike "mckt" Bailey
- Taylor Banks "Dr Kaos"
- Kevin Bankston
- Jay Beale
- Rod Beckstrom
- Beth
- Daniele Bianco
- Keith Biddulph
- Tomer Bitton
- Tobias Bluzmanis
- Sam Bowne
- Sean Boyce
- Michael Brooks
- K.C. Budd "Phreakmonkey"
- Joey Calca
- Mario Ceballos
- Corentin Chéron
- Robert Clark
- Sandy Clark "Mouse"
- Steve Clement
- Mike Cooper
- cough
- Datagram
- Sherri Davidoff
- Dead Addict (1, 2)
- Da Beave
- Dino Dai Zovi
- Michael L. Davis
- Steve Davis
- Rob "Padre" DeGulielmo
- Deviant Ollam
- Prabhash Dhyani
- Digividual (1, 2)
- Frank DiMaggio
- Roger Dingledine
- Brandon Dixon
- I)ruid
- Kristie Dunker
- Steve Dunker
- Muhaimin Dzulfakar
- Peter Eckersley
- Luiz "effffn" Eduardo
- Egypt
- Endgrain
- Bosse Eriksson
- Kevin Estis
- Tom Eston
- etd
- Nick Farr
- Matt Fiddler
- Damian Finol
- Gregory Fleischer
- Matt Flick
- Tony Flick
- Nick Freeman
- FX
- Antoine Gademer
- Chris Gates
- Efstratios L. Gavas
- Goldy
- Travis Goodspeed (1, 2)
- Joe Grand (1,2,3)
- Jennifer Granick (1, 2, 3)
- Peter Gutmann
- Nathan Hamiel
- Robert "RSnake" Hansen (1, 2)
- Nick Harbour
- John Hering
- Sho Ho
- Marcia Hofmann
- Dr. Thomas J. Holt
- Leigh Honeywell
- Jibran Ilyas
- Stephen 'afterburn' Janansky
- JFalcon
- jhind
- Pedro "hkm" Joaquin
- Kevin Johnson (1, 2)
- Grant Jordan
- Dan Kaminsky (1, 2)
- Kenshoto
- Dave Kerb
- Mike Kershaw
- Fouad Kiamilev
- Jon R. Kibler
- Dr. Max Kilger
- Itzik Kotler
- Matt Krick "DCFluX"
- Righter Kunkel
- Lee Kushner
- Ava Latrope
- Ricky Lawshae
- Robert F. Lentz
- Lorie M. Liebrock
- Michael Ligh
- Anthony Lineberry
- Roberto Suggi Liverani
- Lockheed
- Fred Von Lohmann
- Logan Lodge
- Johnny Long
- George Louthan
- James Luedke
- Kevin Mahaffey
- Josh Marks
- Moxie Marlinspike
- David Maynor (1, 2)
- Rodney McGee
- Russ McRee
- Joseph McCray
- Haroon Meer
- Douglas C. Merrill
- Erez Metula
- Rich Mogull
- HD Moore (1, 2, 3)
- Christopher Mooney
- David Mortman
- Scott Moulton
- Shawn Moyer
- Mike Murray (1, 2)
- James "Myrcurial" Arlen
- Ne0nRa1n
- Noid (1, 2)
- Kurt Opsahl
- Michael Ossmann
- Jason Ostrom
- Chris Paget
- Jose Palazon "Palako"
- Nicholas J. Percoco
- Larry Pesce
- Pierce
- Tyler Pitchford, Esq.
- Cody Pollet
- Bruce Potter
- Pratap Prabhu
- Psifertex
- Danny Quist
- Tiffany Rad (1, 2)
- Daniel Raygoza
- Tyler Reguly
- Rob Rehrig
- Paul F. Renda
- RenderMan
- Jim Rennie
- Matt Richard (1, 2)
- Randy Robbins
- Nicolle Neulist "RogueClown"
- David Rook
- Jon Rose
- Antonio "Tony" Rucci
- Arjun Sambamoorthy
- Marcus Sachs
- Adam Savage
- Michael "theprez98" Schearer
- Jason Schlesinger
- Phyllis Schneck
- Bruce Schneier
- Michael Schrenk
- Jason Scott
- Justin Searle (1, 2)
- Sumit Siddharth
- Peter Silberman
- Ed Skoudis
- Marco Slaviero
- Dr. Olga Smirnova
- Yingbo Song
- Dominic Spill
- Mark Steward
- Salvatore J. Stolfo
- Jayson E. Street
- Dr. Debora Strumsky
- Mark Ryan Del Moral Talabis
- Chris Tarnovsky
- Sean "Frank^2" Taylor
- Richard Thieme (1, 2)
- TK234
- Marc Weber Tobias
- Efrain Torres
- Tottenkoph
- Valsmith
- Charlie Vedaa
- Rafael Dominguez Vega
- Videoman
- Fred von Lohmann
- Nick Waite
- Matt Weir
- Thomas Wilhelm
- Jeff Yestrumskas
- Edward Zaborowski
- Zoz
- Mike Zusman
- DEF CON 101 (Thursday)
- Ask EFF
- Meet the Fed
B
C
D
E
F
G
H
I
J
K
L
M
N
0
P
Q
R
S
T
V
W
Y
Z
Panels
Highlights
DEF CON 17 Program
Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!(Coming Soon)
DEF CON 17 Closing Ceremonies
Video and audio of the DEF CON 17 Closing CeremoniesVideo
Audio
Contest Results
May be found on the DEF CON 17 Contest Results pageAudio/Video RSS Feeds
Speaker & SlidesSlides
Audio
DEF CON 17 CD
Download ISO (RAR)DEF CON 17 Website
DEF CON 17 SitePress
- Electronic High-Security Locks Easily Defeated at DefCon - WIRED -Threat Level
- Open Sesame! Network Attack Literally Unlocks Doors - WIRED -Threat Level
- Exclusive Peek Inside DEF CON's High-Tech Badge - WIRED -Threat Level
- Hacking The DEF CON 17 Badges - WIRED -Threat Level
- Photos: Defcon badge inspires hacks - CNET
- A Browser's View of Your Computer - MIT Technology Review
- DefCon: ‘Credit Hackers’ Win the Credit Card Game … Legally - WIRED -Threat Level
- cPanel, Netgear and Linksys susceptible to nasty attack - The Register
- Fake ATM doesn't last long at hacker meet - IDG News
- Hackers spot fake ATM. Could you? - Internet News
- Defense Department eyes hacker con for new recruits - IDG News
- Hackers: Uncle Sam (still) wants you! - Internet News
- Hacking Sleep - Forbes
- Korean 'journalists' booted from Defcon - IDG News
- Researchers Hack IP Video - Dark Reading
- Researchers offer tools for eavesdropping and video hijacking - CNet News - InSecurity Complex
- Security Camera Hack Conceals Heists Behind Dummy Video - WIRED -Threat Level
- Surveillance camera hack swaps live feed with spoof video - The Register
- Defcon air traffic control hacker: Excuse me while I change your aircraft’s flight plan - Venturebeat
- Hack-Proofing The Hackers - Forbes
- Hackers Game a Multiplayer World - MIT Technology Review
- DEF CON 17 Mystery Challenge - WIRED -Threat Level
- Mystery Challenge - DEF CON 17 - Security Ripcord
- Inside The World's Most Hostile Network - WIRED -Threat Level
- At Black Hat and Defcon, hackers talk shop - CNET
- Ax0n's DEF CON 17 Wrap-up - HIR Information Report
- DEF CON 17 - The Pulse Review
- Defcon 17 hacks into Vegas - Las Vegas Weekly
- Defcon: What to leave at home and other do's and don'ts - CNET
- Hacking, Lock-Picking, Booze and Bacon: DEF CON 17 In Review - WIRED -Threat Level
- Hanging with hackers can make you paranoid - CNN
- Feds at DefCon Alarmed After RFIDs Scanned - WIRED -Threat Level
- Fed's RFIDiocy pwnd at DEF CON - ZDNet Blog
- Twitter: More Secure Than You Think - Forbes
- Dan Kaminsky Feels a disturbance in The Internet - SemiAccurate
- Hackers expose weakness in visiting trusted sites - Associated Press
- Researcher Exposes Flaws In Certificate Authority Web Applications - Dark Reading
- Secure Browsing Takes A Beating - Forbes
- Boffins showcase do-it-yourself flying spy drone - The Register
- Defcon: New Hack Hijacks Application Updates Via WiFi - Dark Reading
- Software Updates Vulnerable To Hijacking - Information Week
- Using Software Updates to Spread Malware - CBS News
Access Control
Badge
Browser Sniffing
Credit Hacking
CSRF
Fake ATM
Feds
Hacking Sleep
Espionage
IP Video Hijacking
Social Engineering
Misc
MMORPG Expolits
Mystery Challenge
NOC
Overview
RFID
Social Networks
SSL Hijacking
UAV
Software Update MITM
was July 30 - August 2, 2009 at the Riviera Hotel and Casino.
HighWiz, The Dark Tangent, Russr, DJ Jackalope, Deviant Ollam, Thorn, ThePrez98, LosT, Noid, Siviak
DEF CON 101
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joshua "Jabra" Abraham, Robert "RSnake" Hansen
Unmasking You
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)MD Sohail Ahmad, Prabhash Dhyani
Wi-Fish Finder: Who Will Bite the Bait
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Chema Alonso, Jose Palazon "Palako"
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dmitri Alperovitch, Marcus Sachs, Phyllis Schneck, Ed Skoudis
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
See it! (m4v video) Hear it! (m4b audio)Iftach Ian Amit
Down the Rabbit Hole: Uncovering a Criminal Server
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Alek Amrani UPDATED
Session Donation
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)James "Myrcurial" Arlen, Tiffany Rad
Your Mind: Legal Status, Rights and Securing Yourself
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Mike "mckt" Bailey, Russ McRee
CSRF: Yeah, It Still Works
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Andrea Barisani, Daniele Bianco
Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jay Beale, Justin Searle
The Middler 2.0: It's Not Just for Web Apps Anymore
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Antoine Gademer, Corentin Chéron
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Rod Beckstrom
Beckstrom's Law - A Model for Valuing Networks and Security
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Beth, Noid, Nick Farr, Leigh Honeywell, Steve Clement UPDATED
Robot Shark Laser! What Hackerspaces Do
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sam Bowne
Hijacking Web 2.0 Sites with SSLstrip—Hands-on Training
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sean Boyce UPDATED
Design and Implementation of a Quantum True Random Number Generator
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Michael Brooks, David Aslanian
BitTorrent Hacks
Read It! (PDF) Extras (TAR.BZ2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)K.C. Budd "Phreakmonkey", Taylor Banks "Dr Kaos" UPDATED
Old Skool Brought Back: A 1964 Modem Demo
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joey Calca, Ryan Anguiano
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Robert Clark
Computer and Internet Security Law - A Year in Review 2008 - 2009
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sandy Clark "Mouse"
De Gustibus, or Hacking your Tastebuds
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Datagram
Lockpicking Forensics
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dead Addict
Unfair Use - Speculations on the Future of Piracy
See it! (m4v video) Hear it! (m4b audio)Da Beave, JFalcon
AAPL- Automated Analog Telephone Logging
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Michael L. Davis UPDATED
Who Invented the Proximity Card?
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Rob "Padre" DeGulielmo UPDATED
Con Kung-Fu: Defending Yourself @ DEF CON
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Deviant Ollam
Packing and the Friendly Skies (Why Transporting your Firearms may be the best way to Safeguard your Tech when you Fly)
Read It! (PDF) Extras (ZIP) See it! ( Slides) Hear it! (m4b audio)Digividual
Sharepoint 2007 Knowledge Network Exposed
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Digividual
Socially Owned in the Cloud
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Roger Dingledine
Why Tor is Slow, and What We're Doing About It
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Brandon Dixon
Attacking SMS. It's No Longer Your BFF
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Steve Dunker, Kristie Dunker
Personal Survival Preparedness
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Muhaimin Dzulfakar
Advanced MySQL Exploitation
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Luiz "effffn" Eduardo
30k Feet Look at WiFi
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Egypt UPDATED
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Endgrain, Tiffany Rad, Dan Kaminsky
Hello, My Name is /hostname/
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Bosse Eriksson UPDATED
Runtime Kernel Patching on Mac OS X
Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Kevin Estis, Randy Robbins UPDATED
Hacking the Apple TV and Where your Forensic Data Lives
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Tom Eston, Kevin Johnson
Social Zombies: Your Friends Want to Eat Your Brains
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)etd UPDATED
Dradis Framework - Sharing Information will get you Root
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Damian Finol
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
Read It! (PDF)Gregory Fleischer
Attacking Tor at the Application Layer
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Tony Flick
Hacking the Smart Grid
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Chris Gates, Mario Ceballos
Breaking the "Unbreakable" Oracle with Metasploit
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Efstratios L. Gavas UPDATED
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Travis Goodspeed
Locally Exploiting Wireless Sensors
Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Goldy, Pierce
Introduction to WiMAX Hacking
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joe Grand (Kingpin) & The Dark Tangent UPDATED
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joe Grand (Kingpin), Zoz
The Projects of "Prototype This!"
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joe "Kingpin" Grand, Jake Appelbaum, Chris Tarnovsky
"Smart" Parking Meter Implementations, Globalism, and You
(aka Meter Maids Eat Their Young)
Read It! (PDF)
See it! (Speaker & Slides |
Slides)
Hear it! (m4b audio)
Jennifer Granick UPDATED
The Year In Computer Crime Cases
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Peter Gutmann
The Psychology of Security Unusability
Read It! (PDF) See it! (Slides) Hear it! (m4b audio)Nick Harbour
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sho Ho
FOE — Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dr. Thomas J. Holt, Dr. Max Kilger, Dr. Debora Strumsky, Dr. Olga Smirnova
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Stephen 'afterburn' Janansky, Nick Waite
Hardware Trojans: Infiltrating the Faraday Cage
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)jhind
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Pedro "hkm" Joaquin UPDATED
Attacks Against 2wire Residential Gateways
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Kevin Johnson, Justin Searle, Frank DiMaggio
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Grant Jordan UPDATED
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dan Kaminsky
Something about Network Security
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dr. Fouad Kiamilev, Rodney McGee
Hardware Black Magic - Building devices with FPGAs
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jon R. Kibler, Mike Cooper UPDATED
Hack The Textbook
Read It! (PDF) Extras (KEY) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Itzik Kotler, Tomer Bitton
The Day of the Updates
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Righter Kunkel
Air Traffic Control: Insecurity and ADS-B
Read It! (PDF) Extras (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Lee Kushner, Mike Murray
Effective Information Security Career Planning
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Ava Latrope
eXercise in Messaging and Presence Pwnage
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Ricky Lawshae
Picking Electronic Locks Using TCP Sequence Prediction
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Robert F. Lentz
Perspective of the DoD Chief Security Officer
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Michael Ligh, Matthew Richard
Making Fun of Your Malware
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Roberto Suggi Liverani, Nick Freeman UPDATED
Abusing Firefox Addons
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Fred Von Lohmann, Jennifer Granick
Jailbreaking and the Law of Reversing
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)George Louthan, Cody Pollet UPDATED
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Kevin Mahaffey, John Hering, Anthony Lineberry
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Josh Marks, Rob Rehrig, Larry Aiello
Hacking the Wiimote and Wii Fit to Help the Disabled
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Moxie Marlinspike
More Tricks For Defeating SSL
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Joseph McCray
Advanced SQL Injection
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Haroon Meer, Marco Slaviero, Nicholas Arvanitis UPDATED
Clobbering the Cloud
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Douglas C. Merrill
Is That You, Baby, or Just a Bridge in the Sky?
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Including talks by: |)ruid, H.D. Moore, Mike Kershaw, David Maynor, Dino Dai Zovi, Peter Silberman, and Steve Davis
MetaSploit Track
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Erez Metula UPDATED
Managed Code Rootkits - Hooking into Runtime Environments
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Christopher Mooney, James Luedke
Subverting the World Of Warcraft API
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)David Mortman, Rich Mogull, Dave Maynor, Larry Pesce, Robert "RSnake" Hansen
Defcon Security Jam 2: The Fails Keep on Coming
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Scott Moulton
RAID Recovery: Recover your PORN by Sight and Sound
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Shawn Moyer, Nathan Hamiel
Weaponizing the Web: New Attacks on User-generated Content
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Ne0nRa1n, Keith Biddulph
Hacking Sleep: How to Build Your Very Own Sleep Lab
Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jason Ostrom, Arjun Sambamoorthy UPDATED
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Nicholas J. Percoco , Jibran Ilyas UPDATED
Malware Freak Show
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Tyler Pitchford, Esq.
Search And Seizure Explained - They Took My Laptop!
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Bruce Potter, Logan Lodge
Fragging Game Servers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Pratap Prabhu, Yingbo Song, Salvatore. J. Stolfo
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Psifertex UPDATED
Maximum CTF: Getting the Most Out of Capture the Flag
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Danny Quist, Lorie M. Liebrock
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Daniel Raygoza
Automated Malware Similarity Analysis
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Paul F. Renda
Injecting Electromagnetic Pulses into Digital Devices
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)RenderMan, Michael "theprez98" Schearer UPDATED
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jim Rennie
So You Got Arrested in Vegas...
Read It! (PDF) Extras (PDF) See it! (Video and Slides | Slides) Hear it! (m4b audio)Matt Richard, Steven Adair
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Nicolle Neulist "RogueClown"
Hackerspaces: The Legal Bases
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)David Rook UPDATED
The security risks of Web 2.0
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jon Rose
Deblaze - A Remote Method Enumeration Tool for Flex Servers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Antonio "Tony" Rucci
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jason Schlesinger
Cloud Security in Map/Reduce
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Michael Schrenk UPDATED
Screen Scraper Tricks: Extracting Data from Difficult Websites
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jason Scott
That Awesome Time I Was Sued For Two Billion Dollars
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sumit Siddharth UPDATED
The Making of the second SQL injection Worm
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Peter Silberman, Steve Davis
Metasploit Autopsy: Recontructing the Crime Scene
See Metasploit Track for video and audio.Christopher Soghoian
Manipulation and Abuse of the Consumer Credit Reporting Agencies
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Dominic Spill, Michael Ossmann, Mark Steward
Bluetooth, Smells Like Chicken
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jayson E. Street
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of Global Cyber-Warfare)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Mark Ryan Del Moral Talabis
Dangerous Minds: The Art of Guerrilla Data Mining
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Sean "Frank^2" Taylor
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Richard Thieme
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
See it! (m4v video) Hear it! (m4b audio)Richard Thieme
Hacking, Biohacking, and the Future of Humanity
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)TK234
PLA Information Warfare Development Timeline and Nodal Analysis
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Marc Weber Tobias, Matt Fiddler, Tobias Bluzmanis UPDATED
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Efrain Torres
Metasploit Goes Web
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Tottenkoph
Good Vibrations: Hacking Motion Sickness on the Cheap
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Valsmith, Colin Ames, David Kerb
MetaPhish
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Charlie Vedaa, "Anonymous secondary speaker"
Proxy Prank-o-Matic
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Rafael Dominguez Vega UPDATED
USB Attacks: Fun with Plug & 0wn
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Videoman
Hacking with GNURadio
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Matt Weir, Professor Sudhir Aggarwal UPDATED
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Thomas Wilhelm
Hacking WITH the iPod Touch
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Jeff Yestrumskas, Matt Flick
Cross Site Scripting Anonymous Browser 2.0
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Edward Zaborowski UPDATED
Doppelganger: The Web's Evil Twin
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Mike Zusman
Criminal Charges are not pursued: Hacking PKI
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)Panels
Kurt Opsahl, Jennifer Granick, Kevin Bankston, Fred von Lohmann, Marcia Hofmann, Peter Eckersley
Ask EFF: The Year in Digital Civil Liberties
See it! (m4v video) Hear it! (m4b audio)Jim Christy , Mike Convertino, John Garris, Barry Grundy, Bob Hopper, Mischel Kwon, Robert Lentz, Rich Marshall, Stephane Turgeon, Gordon Snow, Ken Privette, Paul Sternal, Jamie Turner, Lin Wells, Rod Beckstrom, Jerry Dixon, Andy Fried, Greg Garcia, Jon Idonisi, Ray Kessenich, Kevin Manson

