Speakers
- Tim Lawless & Saint Jude
- Robert Graham
- Ian Vitek
- Bennett Haselton
- Greg Hoglund
- Phil King
- Mythrandir
- Evil Wrangler
- Adam Bresson
- ghandi
- syke
- Kent Radek
- Chris Goggans, Kevin McPeake, Wouter Aukema
- John S. Flowers
- blanu
- jeru
- Subterrain Security Group (SSG)
- Gregory B. White
- Ron Moritz
- D-Krypt
- David J. DiCenso
- Jason Scott
- Mr. Mojo
- Ian Goldberg
- Ender
- Phillip J. Loranger
- Simple Nomad
- noise
- Bruce Schneier
- John Q. Newman (1, 2)
- Richard Thieme
- Eric Sinrod
- Sarah Gordon
- Aaron Grothe
- V1ru5 and *Hobbit*
- CdC
- Wyatt
- Thomas Munn
- V1ru5
- Mr. Nasty
- Jennifer Granick & Grant Gottfriend
- Mike Scher
- DDT - PGP
- Thomas Munn
- Freaky
- Pyr0
- Daremoe
- Natasha Gregori
- Jim McCoy
- Arthur L. Money
- Legal Panel
- Xs
Press Coverage
- ABC News has an intersting but shallow slide show overview of DEF CON 8.
- TechTV.com's cybercrime had extensive coverage of the convention. This is the main page.
- Hackers aren't criminals - they're the best kind of security - Laird Brown
- Black Hat/Def Con: The Magic is in the Mix. - Richard Thieme
- VarBusiness messes up an article and mis quotes Russ. - Carol Ellison - Local Copy
- Specter Of Network Attacks Looms Anew, - Max Smetannikov, Inter@ctive Week - Local Copy
- Hackers won't give Pentagon a break - Jim Wolf, Reuters - Local Copy
- Specter Of Network Attacks Looms Anew: Computer Snatchers Invade - Local Copy
- Is DEF CON turning legit? - Robert Lemos, ZDNet - Local Copy
- Hackers: Uncle Sam wants you! - Robert Lemos, ZDNet - Local Copy
- Do security holes demand full disclosure? - Weld Pond, @Stake - Local Copy
- Why DEF CON beats H2K. - Drew Ulricksen, ZDNet News
- Why it's a 'Summer of Hacking'. - Joel Deane, ZDNet News - Local Copy
- Jason Scott has a DEF CON Diary located at cow.net - Local Copy
was held July 28- 30, 2000 at the Alexis Park Hotel & Resort
Speakers & Presentations
Video encoded in m4v Video format. Audio encoded in m4b audiobook format.Defcon 8: Uber Haxor
Tim Lawless & Saint Jude
Modeling, Detecting and Responding to Unauthorized Root Transitions
See It! (m4v Video) Hear it! (m4b Audio)Robert Graham
Evading Network-based Intrusion Detection Systems
See It! (m4v Video) Hear it! (m4b Audio)Ian Vitek
IP-spoofing and source routing connections with Linux 2.0.X
See It! (m4v Video) Hear it! (m4b Audio)Bennett Haselton
A Protocol That Uses Steganography to Circumvent Network Level Censorship
See It! (m4v Video) Hear it! (m4b Audio)Evil Wrangler
Building a Backdoor Binary (featuring SSH 2.0.13)
See It! (m4v Video) Hear it! (m4b Audio)syke
Opensource Utilities and How to Use Them To Test IDSes and Firewalls
See It! (m4v Video) Hear it! (m4b Audio)Chris Goggans, Kevin McPeake, Wouter Aukema
Lotus Notes/Domino Security
See It! (m4v Video) Hear it! (m4b Audio)John S. Flowers
Network IDS - Do Not Bend, Fold, Spindle or Mutilate
See It! (m4v Video) Hear it! (m4b Audio)Defcon 8: Haxor
Gregory B. White
The USAFA Cadet Hacking Case: What Both Sides Should Learn About Computer Forensics
See It! (m4v Video) Hear it! (m4b Audio)David J. DiCenso
The Citizen Hacker: Patriot or War Criminal?
See It! (m4v Video) Hear it! (m4b Audio)Ian Goldberg
"Using the Internet Pseudonymously III: It's Alive!"
See It! (m4v Video) Hear it! (m4b Audio)Ender
Demonstration and presentation of the Autonomous Nodes that Batz and Caezar presented in concept at BlackHat Singapore
See It! (m4v Video) Hear it! (m4b Audio)Simple Nomad
A How-to Regarding Network Mapping That Covers Some Interesting Techniques Not Commonly Used
See It! (m4v Video) Hear it! (m4b Audio)noise
Anonymous Remailers: The Importance of Widely-available Anonymity In An Age of Big Brother
See It! (m4v Video) Hear it! (m4b Audio)John Q. Newman
10 Steps You Can Take To Protect Your Privacy
See It! (m4v Video) Hear it! (m4b Audio)Richard Thieme
Social Engineering at Def Con:Games Hackers Play
See It! (m4v Video) Hear it! (m4b Audio)Defcon 8: Newbie
Mike Scher
What is DNS and alt Roots? What Are Alternate Roots and Why Does Internet Duck
See It! (m4v Video) Hear it! (m4b Audio)DDT - PGP
What PGP and Crypto Is and How to Use (and Not Use) It
See It! (m4v Video) Hear it! (m4b Audio)Freaky
Security and Hacking of the MacOS and Details of OSX
See It! (m4v Video) Hear it! (m4b Audio)Daremoe
System Profiling: Target Analysis or How Crackers Find You
See It! (m4v Video) Hear it! (m4b Audio)Natasha Gregori
Hacktivits to Activists - Making the Transition
See It! (m4v Video) Hear it! (m4b Audio)

