Speaker Index


DEF CON 101 (Thursday)

DEF CON 101

Hacking Management, from Operations to Command

The Ninjaneers: Getting Started in Building Your Own Robots for World Domination

Decrypting DEF CON: Foundations Behind Some of the Games Hackers Play

Intro to Web Application Hacking

Oil & Gas Infosec 101

Wireless Penetration Testing 101 & Wireless Contesting

Pentesters Toolkit

Meet Pentoo, the Longest Running Pen-testing Linux Distro

A

Alex Abdo

Bogdan Alecu

Chema Alonso

AlxRogan

Anch

James Arlen

Dan Auerbach

B

Mike Baker

Amber Baldet

Remy Baumgarten

Brent Bandelgar

Beaker

Scott Behrens

Sameer Bhalotra

Joe Bialek

Zak Blacher

Tobias Bluzmanis

Todd Bonnewell

Sam Bowne (1, 2)

Robert Brese

Francis Brown

bughardy

Eileen Burbridge

Daniel Burroughs

Eric Butler

C

Alejandro Caceres (1, 2)

Benjamin Caudill

Daniel Chechik

Ming Chow

Joseph Paul Cohen

Joshua Corman

Michael Costello

Robert Clark

Kade Crockford

Daniel "unicornFurnace" Crowley

Catherine Crump

Dinis Cruz

Ang Cui

D

DaKahuna

Anat (Fox) Davidi

Sherri Davidoff

Andy Davis

James Denaro

Doug DePerry

Ambassador Joseph R. DeTrani

Christie Dudley

Piotr Duszynski

E

Eagle1753

Lt. Gen. Robert Elder (1, 2)

Justin Engler

Melissa Elliott

Amir Etemadieh

Evilrob (Rob Bathurst)

F

Jaime Filson (WiK)

FirmWarez

Flipper (1, 2)

Pau Oliva Fora

Zac Franken

Scott Fretheim

Rob Fuller (Mubix)

Eric Fulton

G

Eva Galperin

Terrence "Tuna" Gareau

Tigran Gevorgyan

Brian Gorenc

Rob Graham

Joe Grand (1, 2)

Dan Griffin

H

David Harrison

Justin Hendricks

CJ Heres

HighWiz

Ricky Hill

Nick Hitchcock

Chris Hoff

Marcia Hofmann

Ryan Holeman

Josh Hoover (wishbone)

I

Alberto Garcia Illera

J

John M. Jack

Mark Jaycox

Deepak Jeevankumar

Robert Johnson

K

Abraham Kang

Tom Keenan

David Kennedy

Karl Koscher

Dan Kottmann

L

Zach Lanier

Adam "Major Malfunction" Laurie

David Lawrence

Kenneth Lee

Wai-leng Lee

Ping Li

James R. Lint

Lockheed (1, 2)

Drea London

LosT (1, 2, 3)

Rachel Lovinger

M

Sean Malone

Todd Manning

Marion Marschalek

Dave Maynor

Bruce McConnnell

Wesley McGrew

Eric Milam

Charlie Miller

Nikhil Mittal

Tony Miu

Rich Mogull

David Mortman

Peiter "Mudge" Zatko

N

Naifx

Hans Nielsen

O

Nicolas Oberli

Matt Ocko

Brendan O'Connor

Kyle O'Meara

Kurt Opsahl

John Ortiz

Fatih Ozavci

Nicole Ozer

P

Franz Payer

Nicholas J. Percoco

Michael Perklin (1, 2)

Larry Pesce

Phorkus (Mark Carey)

Gregory Pickett

Alexandre Pinto

Philip Polstra

Randi Price

Matthew Prince

pukingmonkey

R

RenderMan

Jim Rennie

Chris John Riley

Tom Ritter (1, 2)

RMellendick

Roamer (1, 2)

Eric Robi

Teal Rogers

Alex Rothman

S

Jaime Sanchez

Runa A. Sandvik

Paul Sanderson

Jennifer "savagejen" Savage

Noah Schiffman

Michael Schrenk

Jaeson Schultz

Hunter Scott

Jason Scott

Balint Seeber

Daniel Selifonov

Neil Sikka

SkyDog

Christopher Soghoian (1, 2)

Ryan W. Smith

Mark 'Smitty' Smith

James Snodgrass (PuNk1nPo0p)

soen

Jasiel Spelman

Jason Staggs

Alex Stamos

Tom Steele

Mitch Stoltz

Tim Strazzere

Robert Stucke

Chris Sumner

T

Amr Thabet

Richard Thieme

Josh 'm0nk' Thomas

Jacob Thompson

Marc Weber Tobias

Vaagn Toukharian

V

Eric Van Albert

Javier Vazquez Vidal

Paul Vines

W

Randall Wald

Mark Weatherford (1, 2)

Rebecca Wexler

Tillmann Werner

Brandon Wiley

Y

Josh Yavor

Craig Young

Z

ZeroChaos

Daniel Zolnikov

Zoz

Panels

Ask the EFF

DEF CON Comedy Jam Part VI

The ACLU Presents: NSA Surveillance and More

Hardware Hacking with Microcontrollers: A Panel Discussion

Meet the VCs

The Policy Wonk Lounge

Highlights


DEF CON 21 Program

Lost your program? Didn't pick one up? Couldn't make it to the con? Here it is!
PDF (15MB)

DEF CON 21 Receipt

Need to expense that trip to DEF CON 21? Here is a handy receipt for just such endeavors!
PDF (901KB)

Contest Results

May be found on the DEF CON 21 Contest Results page

Audio/Video RSS Feeds

Speaker Materials


DEF CON 21 Website

DEF CON 21 Site

Press Coverage


General

Car Hacking

Lock Security/Sport

Bitcoin

Rootz Kidcon

Legal/Civil Rights

Feds

Smart Devices and Homes

Mobile Security/Malware

Badge/Badge Challenge

Will Smith

Social Engineering

EFF Crypto Shirt

Documentary

IPV6

Facebook

Wireless

Misc

logo image

Was August 1st-4th, 2013 at the Rio Hotel & Casino




Speakers & Presentations

return to top

return to top

return to top


Joe Grand, Mark 'Smitty' Smith, LosT, RenderMan, FirmWarez

Hardware Hacking with Microcontrollers: A Panel Discussion

return to top

return to top

return to top

return to top


Lockheed, Roamer, Naifx

Hacking Management: From Operations to Command

return to top


Beaker, Flipper

The Ninjaneers: Getting started in Building Your Own Robots for World Domination.

return to top


LosT

Decrypting DEFCON: Foundations Behind Some of the Games Hackers Play

return to top


Terrence "Tuna" Gareau

Intro to Web Application Hacking

return to top


AlxRogan

Oil & Gas Infosec 101

return to top


DaKahuna, RMellendick

Wireless Penetration Testing 101 & Wireless Contesting

return to top


Anch

Pentesters Toolkit

return to top


ZeroChaos

Meet Pentoo, the Longest Running Pen-testing Linux Distro

return to top


Bogdan Alecu UPDATED

Business logic flaws in mobile operators services

Read It! (PDF | White Paper)

return to top


Chema Alonso UPDATED

Fear the Evil FOCA: IPv6 attacks in Internet connections

Read It! (PDF)

return to top


Amber Baldet UPDATED

Suicide Risk Assessment and Intervention Tactics

Read It! (PDF | Extras)

return to top


Remy Baumgarten

Combatting Mac OSX/iOS Malware with Data Visualization

Read It! (PDF | White Paper)

return to top


Scott Behrens, Brent Bandelgar

MITM All The IPv6 Things

Read It! (PDF)

return to top


Joe Bialek

PowerPwning: Post-Exploiting By Overpowering PowerShell

Read It! (PDF | Extras)

return to top


Zak Blacher

Transcending Cloud Limitations by Obtaining Inner Piece

Read It! (PDF | Extras)

return to top


Todd Bonnewell

Made Open: Hacking Capitalism

return to top


Sam Bowne

Data Evaporation from SSDs

Read It! (PDF)

return to top


Sam Bowne, Matthew Prince

Evil DoS Attacks and Strong Defenses

Read It! (PDF)

return to top


Francis Brown UPDATED

RFID Hacking: Live Free or RFID Hard

Read It! (PDF | Extras)

return to top


bughardy, Eagle1753 UPDATED

OTP, It won't save you from free rides!

Read It! (PDF | White Paper | Extras)

return to top


Daniel Burroughs

Open Public Sensors, Trend Monitoring and Data Fusion

return to top


Alejandro Caceres

Conducting massive attacks with open source distributed computing

Read It! (PDF)

return to top


Benjamin Caudill UPDATED

Offensive Forensics: CSI for the Bad Guy

Read It! (PDF | Extras)

return to top


Daniel Chechik, Anat (Fox) Davidi UPDATED

Utilizing Popular Websites for Malicious Purposes Using RDI

Read It! (PDF)

return to top


Ming Chow UPDATED

Abusing NoSQL Databases

Read It! (PDF | Extras)

return to top


Robert Clark

Legal Aspects of Full Spectrum Computer Network (Active) Defense

Read It! (PDF)

return to top


Joseph Paul Cohen

Blucat: Netcat For Bluetooth

Read It! (Extras)

return to top


Daniel "unicornFurnace" Crowley, Jennifer "savagejen" Savage, David "videoman" Bryan

Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices

Read It! (PDF | White Paper | Extras)

return to top


Ang Cui, Michael Costello UPDATED

Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)

Read It! (PDF)

return to top

return to top


Andy Davis UPDATED

Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions

Read It! (PDF | White Paper)

return to top


James Denaro UPDATED

How to Disclose or Sell an Exploit Without Getting in Trouble

Read It! (PDF)

return to top


Doug DePerry, Tom Ritter UPDATED

I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell

Read It! (PDF | Extras)

return to top

return to top


Christie Dudley UPDATED

Privacy In DSRC Connected Vehicles

Read It! (PDF)

return to top


Piotr Duszynski UPDATED

Pwn'ing You(r) Cyber Offenders

Read It! (PDF)

return to top


Lt. Gen. Robert Elder

From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance

return to top


Melissa Elliott

Noise Floor: Exploring the world of unintentional radio emissions

Read It! (Extras)

return to top


Justin Engler, Paul Vines

Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)

Read It! (PDF | White Paper | Extras)

return to top


Amir Etemadieh, CJ Heres, Mike Baker, Hans Nielsen

Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot

Read It! (PDF)

return to top


Jaime Filson (WiK), Rob Fuller (Mubix)

gitDigger: Creating useful wordlists from public GitHub repositories

Read It! (PDF)

return to top


Flipper

10000 Yen into the Sea

Read It! (PDF | Extras)

return to top


Pau Oliva Fora

Defeating SEAndroid

Read It! (PDF)

return to top


Eric Fulton, Daniel Zolnikov

The Politics of Privacy and Technology: Fighting an Uphill Battle

Read It! (PDF)

return to top


Brian Gorenc, Jasiel Spelman

Java Every-Days: Exploiting Software Running on 3 Billion Devices

Read It! (PDF | White Paper)

return to top


Joe Grand

JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces

Read It! (PDF | Extras)

return to top


Dan Griffin UPDATED

Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust

Read It! (PDF)

return to top


Justin Hendricks

So You Think Your Domain Controller is Secure?

Read It! (PDF)

return to top


Ricky Hill UPDATED

Phantom Network Surveillance UAV / Drone

Read It! (PDF)

return to top


Ryan Holeman

The Bluetooth Device Database

Read It! (PDF | Extras)

return to top


Alberto Garcia Illera, Javier Vazquez Vidal UPDATED

Dude, WTF in my car?

Read It! (PDF | Extras)

return to top


Abraham Kang, Dinis Cruz UPDATED

Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned

Read It! (PDF)

return to top


Tom Keenan

Torturing Open Government Systems for Fun, Profit and Time Travel

Read It! (PDF)

return to top


David Kennedy, Nick Hitchcock

The Dirty South – Getting Justified with Technology

return to top


Karl Koscher, Eric Butler UPDATED

The Secret Life of SIM Cards

Read It! (PDF)

return to top


Adam "Major Malfunction" Laurie, Zac Franken

Decapping Chips the Easy Hard Way

return to top


David Lawrence, Eric Van Albert, Robert Johnson UPDATED

Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock

Read It! (PDF | Extras)

return to top


Kenneth Lee

How to use CSP to stop XSS

return to top


Drea London, Kyle O'Meara

This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps

return to top


Sean Malone

HiveMind: Distributed File Storage Using JavaScript Botnets

return to top


Todd Manning, Zach Lanier UPDATED

GoPro or GTFO: A Tale of Reversing
an Embedded System

Read It! (PDF)

return to top


Marion Marschalek

A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading

Read It! (PDF | Extras)

return to top


Wesley McGrew

Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices

Read It! (PDF | White Paper | Extras)

return to top


Eric Milam UPDATED

Getting The Goods With smbexec

Read It! (PDF)

return to top


Charlie Miller, Chris Valasek

Adventures in Automotive Networks and Control Units

return to top


Nikhil Mittal

PowerPreter: Post Exploitation Like a Boss

Read It! (PDF | Extras)

return to top


Tony Miu, Wai-leng Lee UPDATED

Kill 'em All — DDoS Protection Total Annihilation!

Read It! (PDF | White Paper | Extras)

return to top


Peiter Mudge Zatko

Unexpected Stories From a Hacker Who Made it Inside the Government

return to top


Nicolas Oberli

Please Insert Inject More Coins

Read It! (PDF)

return to top


Brendan O'Connor UPDATED

Stalking a City for Fun and Frivolity

Read It! (PDF)

return to top


John Ortiz

Fast Forensics Using Simple Statistics and Cool Tools

Read It! (PDF | Extras)

return to top


Fatih Ozavci UPDATED

VoIP Wars: Return of the SIP

Read It! (PDF | Extras)

return to top


Franz Payer UPDATED

Exploiting Music Streaming with JavaScript

Read It! (PDF | Extras)

return to top


Nicholas J. Percoco, Joshua Corman

The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!

return to top


Michael Perklin UPDATED

ACL Steganography - Permissions to Hide Your Porn

Read It! (PDF | Extras)

return to top


Phorkus (Mark Carey), Evilrob (Rob Bathurst)

Doing Bad Things to 'Good' Security Appliances

Read It! (PDF)

return to top


Gregory Pickett UPDATED

Let's screw with nmap

Read It! (PDF | Extras)

return to top


Alexandre Pinto UPDATED

Defending Networks with Incomplete Information: A Machine Learning Approach

Read It! (PDF | White Paper)

return to top


Dr. Philip Polstra

We are Legion: Pentesting with an Army of Low-power Low-cost Devices

Read It! (PDF | Extras)

return to top


pukingmonkey UPDATED

The Road Less Surreptitiously Traveled

Read It! (PDF | Extras)

return to top


Jim Rennie, Marcia Hofmann UPDATED

Hacker Law School

Read It! (PDF1 | PDF2 | PDF3 | PDF4)

return to top


Chris John Riley UPDATED

Defense by numbers: Making problems for script kiddies and scanner monkeys

Read It! (PDF)

return to top


Tom Ritter

De-Anonymizing Alt.Anonymous.Messages

return to top


Eric Robi, Michael Perklin UPDATED

Forensic Fails - Shift + Delete won't help you here

Read It! (PDF)

return to top


Teal Rogers, Alejandro Caceres

The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies

Read It! (PDF)

return to top


Jaime Sanchez UPDATED

Building an Android IDS on Network Level

Read It! (PDF)

return to top


Runa A. Sandvik

Safety of the Tor network: a look at network diversity, relay operators, and malicious relays

Read It! (PDF)

return to top


Noah Schiffman, SkyDog

The Dark Arts of OSINT

return to top


Michael Schrenk

How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers

Read It! (PDF)

return to top


Jaeson Schultz

Examining the Bitsquatting Attack Surface

Read It! (White Paper)

return to top


Hunter Scott UPDATED

Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks

Read It! (PDF)

return to top


Jason Scott, Rachel Lovinger

Making Of The DEF CON Documentary

Read It! (PDF)

return to top


Balint Seeber

All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio

Read It! (PDF)

return to top


Daniel Selifonov

A Password is Not Enough: Why disk encryption is broken and how we might fix it

Read It! (PDF)

return to top


Neil Sikka UPDATED

EMET 4.0 PKI Mitigation

Read It! (PDF)

return to top


Ryan W. Smith, Tim Strazzere

DragonLady: An Investigation of SMS Fraud Operations in Russia

return to top


James Snodgrass (PuNk1nPo0p), Josh Hoover (wishbone) UPDATED

BYO-Disaster and Why Corporate Wireless Security Still Sucks

Read It! (PDF | Extras)

return to top


soen UPDATED

Evolving Exploits Through Genetic Algorithms

Read It! (PDF)

return to top


Christopher Soghoian

Backdoors, Government Hacking and The Next Crypto Wars

return to top


Jason Staggs UPDATED

How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles

Read It! (PDF | White Paper | Extras)

return to top


Alex Stamos

An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet

return to top


Tom Steele, Dan Kottmann

Collaborative Penetration Testing With Lair

Read It! (PDF)

return to top


Robert Stucke UPDATED

DNS May Be Hazardous to Your Health

Read It! (PDF)

return to top


Chris Sumner, Randall Wald UPDATED

Predicting Susceptibility to Social Bots on Twitter

Read It! (PDF)

return to top


Amr Thabet UPDATED

EDS: Exploitation Detection System

Read It! (PDF | White Paper)

return to top


Richard Thieme

The Government and UFOs: A Historical Analysis by Richard Thieme

Read It! (PDF | Extras)

return to top


Josh 'm0nk' Thomas UPDATED

BoutiqueKit: Playing WarGames with expensive rootkits and malware

Read It! (PDF)

return to top


Jacob Thompson

C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood

Read It! (PDF)

return to top


Marc Weber Tobias, Tobias Bluzmanis

Insecurity - A Failure of Imagination

Read It! (PDF)

return to top


Vaagn Toukharian, Tigran Gevorgyan

HTTP Time Bandit

Read It! (PDF)

return to top


Mark Weatherford

The Growing Irrelevance of US Government Cybersecurity Intelligence Information

return to top


Tillmann Werner

Prowling Peer-to-Peer Botnets After Dark

return to top

return to top


Brandon Wiley

Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine

return to top


Josh Yavor UPDATED

BYOD PEAP Show

Read It! (PDF)

return to top


Craig Young

Android WebLogin: Google's Skeleton Key

Read It! (PDF | Extras)

return to top


Zoz

Hacking Driverless Vehicles

Read It! (PDF)

return to top