Defcon 13 Schedule

 

This Schedule & Speakers are Subject to Change.

Pre-Con - Thursday: July 28
12:00 - 22:00
Registration - $80 USD CASH ONLY in Apollo Foyer - Avoid the lines and get your badge early.
Official DEFCON Store in Apollo Foyer until 22:00 - Get your official DEFCON swag at the DEFCON Store located in the same room as Registration

Return to Top of Page

Day 1 - Friday: July 29
bright & early
08:00 - 22:00
Registration - $80 USD CASH ONLY in Apollo Foyer

Official DEFCON Store in Apollo Foyer until 22:00 - Get your official DEFCON swag at the DEFCON Store located in the same room as Registration

10:00
Vendor Area in Zeus until 20:00
Info Booth and Contests in Athena until 20:00
Check-in for Wardrive in Athena
Coffee Wars in Athena
Chill Out in Parthenon 2
12:00
The Dunk Tank opens at 12 Noon by Pool 2
Track 1 - Parthenon 3 & 4 Track 2 - Tent Track 3 - Apollo Events
10:00 – 10:50
Recapturing the Revolutionary Heart of Hacking

Richard Thieme

The Unveiling of My Next Big Project

Philip R. Zimmermann

Hacking Nmap

Fyodor  


11:00 – 11:50
Mudge End-to-End Voice Encryption over GSM: A Different Approach

Wesley Tanner & Nick Lane-Smith

On the Current State of Remote Active OS Fingerprinting

Ofir Arkin

Booksigning: Richard Thieme, "Islands in the Clickstream"
12:00 – 12:50
The Internet's March of Folly:
How, from ARPA to WSIS, Internet governance has consistently pursued policies contrary to its self interest

Paul Vixie  

Routing in the Dark: Scalable Searches in Dark P2P Networks

Ian Clarke & Oskar Sandberg

Introducing Unicornscan - Riding the Unicorn

Robert E. Lee & Jack C. Louis

Booksigning: Kevin Mitnick, "Art of Deception" and "Art of Intrusion"

Dunk Tank Opens

13:00 – 13:50
Suicidal Linux

Bruce Potter

Lost in Translation

Christian Grothoff

ATM Network Vulnerabilities

Robert Morris


14:00 – 14:20
CISO Q&A with Dark Tangent

Scott Blake, Pamela Fusco, Ken Pfiel, Justin Somaini, Andre Gold, David Mortman

Auto-adapting Stealth Communication Channels

Daniel Burroughs

Credit Cards: Everything You have Ever Wanted to Know

Robert "hackajar" Imhoff-Dousharm

14:30 – 14:50
The Next Generation of Cryptanalytic Hardware

David Hulton

15:00 - 15:20
No Women Allowed? Exploring Gender Differences In Hacking

Thomas J. Holt

The NMRC Warez 2005 Extravaganza

Simple Nomad and the NMRC Collective: hellnback, ertia, Weasel, jRandom, MadHat

Hacking Google AdWords

StankDawg

Booksigning: Contributors of "Stealing the Network: How to Own an Identity" including Johnny Long, Chris Hurley, Ryan Russell, Jay Beale, Russ Rogers, The Dark Tangent
15:20 - 16:00
Social Engineering Do's and Don'ts (A Femaie Perspective)

Beth Louis (Phen)

16:00 – 16:20
The Six Year Old Hacker: No More Script Kiddies

Kevin McCarthy

Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo

Bruce Potter, Beetle, CowboyM, Dan Moniz, Rodney Thayer, 3ricj, Pablos

Passive Host Auditing

jives

WarDrive: King of the Hill begins (ends at 20:00)
16:30 – 16:50
Development of An Undergraduate Security Program

Daniel Burroughs

Bypassing Authenticated Wireless Networks

Dean Pierce, Brandon Edwards & Anthony Lineberry

17:00 - 17:20
Whiz Kids or Juvenile Delinquents: A Sociological Perspective The Construction of Hacker Identity

Amanda Dean

Mosquito - Secure Remote Code Execution Framework

Wes Brown & Scott Dunlop

17:30 - 17:50
The Power to Map: How Cyberspace Is Imagined Through Cartography

Kristofer Erickson

18:00 – 18:50
Ask EFF: The Year in Digital Liberties

Annalee Newitz, Wendy Seltzer, Kevin Bankston, Kurt Opsahl, Seth Schoen

DC Groups

Panel: A discussion of the regional DEFCON Groups

Hacking Windows CE

San

19:00 – 19:20
Death of a Thousand cuts – Forensics

Johnny Long

Your Defense is Offensive

hellNbak  

WarDrive: King of the Hill ends

19:30 - 20:00

TBA

Inequality and Risk

Paul Graham

Booksigning: Contributors of "Aggressive Network Self Defense" including Grifter, Dedhed, Pyr0, Chris Hurley, Bruce Potter, Johnny Long

20:00 -  21:00
Assymetric Digital Warfare

Roberto Preatoni & Fabio Ghioni

Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Kenneth Geers

Black And White Ball Setup DEFCON Forum Meeting in Athena
22:00
Internet Survivability, Threats and Efforts

Paul Vixie & Gadi Evron

Black Ops 2005

Dan Kaminsky

23:00

TCP/IP Drinking Game with Mudge

Hacker Jeopardy until... Registration closes

Return to Top of Page

Day 2 - Saturday: July 30
bright & early
08:00 - 22:00
Registration - $80 USD CASH ONLY in Apollo Foyer
10:00
Vendor Area in Zeus until 20:00 - Get your official DEFCON Swag from J!nx Hackwear.
Info Booth and Contests in Athena until 20:00
Chill Out in Parthenon 2
12:00
The Dunk Tank opens at 12 Noon by Pool 2
Track 1 - Parthenon 3 & 4 Track 2 - Tent Track 3 - Apollo Events
10:00 – 10:50
Physical Security Bypass Techniques: Exploring the Ethics of Full Disclosure

Mark Weber Tobias & Matt Fiddler

The Hacker’s Guide to Search and Arrest

Steve Dunker  

Bacon: A Framework for Auditing and Pentesting

Hernan Gips


11:00 – 11:50
Introduction to Lockpicking and Physical Security

Deviant Ollam    

Hackers and the Media- Misconceptions and Critical Tools To Combat Them

Patty L. Walsh

Attacking Web Services: The Next Generation of Vulnerable Apps

Alex Stamos & Scott Stender

WarDrive: Fox and the Hound, Tag begins (ends at 14:00)
12:00 – 12:50
Reverse Engineering Network Protocols using Bioinformatics

Marshall Beddoe

Booksigning: Andrew Lockhart, "Network Security Hacks"
13:00 - 13:50
Intro to High Security Locks and Safes

Michael Glasser & Deviant Ollam

Dr. Linton Wells, Assistant Secretary of Defense for Networks and Information Integration Automation - Deus ex Machina or Rube Goldberg Machine?

Sensepost

14:00 - 14:50
A Safecracking Double Feature: Dial ‘B’ For BackDialing and Spike the Wonder Safe

Leonard Gallion

The Information Security Industry: $3 Billion of Snake Oil

David Cowan

WarDrive: Fox and the Hound, Tag ends
15:00 - 15:50
Attacking Biometric Access Control Systems

Zamboni  

Meet the Fed

Jim Christy & Various other Feds

Pen-testing the Backbone

Raven    

Booksigning: Contributors of "Log Parser Toolkit" 
16:00 – 16:50
Old Skewl Hacking - InfraRed

Major Malfunction

Doing Not-For-Profit Tech: The Hacker Foundation Year in Review

Jesse Krembs, Nick Farr, Emerson Tan, Frazier Cunningham, Jennifer Granick, James Schuyler, Christian Wright & William Knowles & other select members of the Foundation Board.  

Trust Transience: Post Intrusion SSH Hijacking

Metalstorm  

PGP Keysigning Party with the Dark Tangent in the Athena (ends at 18:00)
17:00 – 17:50
Building WarDriving Hardware Workshop

Matthew L. Shuchman “Pilgrim”

Trends in Licensing of Security Tools

Chuck Willis

Countering Denial of Information Attacks

Greg Conti  

WarDrive: LockPick Crossover, Lady and the Tramp begins (ends at 20:00)
18:00 – 18:50
Sketchtools: Prototyping Physical Interfaces

Matt Cottam  

Licensing Agreements 101: The Creative Commons License

Jim "FalconRed" Rennie

The Dark Side of Winsock

Jonathan Levin  

19:00 - 19:50
Be Your Own Telephone Company...With Asterisk

Strom Carlson & Black Ratchet

The Revolution Will Not Be Copyrighted: Why You Should Care About Free Culture

Elizabeth Stark & Fred Benenson

Google Hacking for Penetration Testers

Johhny Long  

20:00 – 20:50
Top Ten Legal Issues in Computer Security

Jennifer Granick  

A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control

Ofir Arkin

Booksigning: Johnny Long, "Google Hacking for Penetration Testers"

WarDrive: LockPick Crossover, Lady and the Tramp ends

21:00 - 21:50
Movies with the Dark Tangent until 01:00 Hacker Jeopardy until... Black & White Ball until 04:00
22:00
Registration closes

Return to Top of Page

Day 3 - Sunday: July 31
bright & early
08:00 - 12:00
Registration - $80 USD CASH ONLY in Lobby
10:00
Vendor Area in Zeus until 18:00 - Get your official DEFCON Swag from J!nx Hackwear.
Info Booth and Contests in Athena until 16:00
Chill Out in Parthenon 2
The Dunk Tank opens at 12:00 Noon by Pool 2
Track 1 - Parthenon 3 & 4 Track 2 - Tent Track 3 - Apollo Events
11:00 - 11:50
DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks

Alexey Smirnov & Tzi-cker Chiueh

Meme Mining for Fun and Profit

Broward Horne

Forensic Data Acquisition Tools

RS  

WarDrive:Running Man, The Last Crusade begins (ends at 14:00)
12:00 - 12:50
Introducing the Bastille Hardening Assessment Tool

Jay Beale

Hacking the Mind (Influence and NLP)

Mystic  

Visual Security Event Analysis

Raffael Marty

13:00 - 13:50
The Insecure Workstation II `bob reloaded`

Deral Heiland

Legal and Ethical Aspects of WarDriving

Matthew L. Shuchman, Frank Thornton, Robert V. Hale II

Surgical Recovery from Kernel-Level Rootkit Installations

Julian Grizzard  

Booksigning: Jay Beale's "Snort 2.1 Intrusion Detection"
14:00 - 14:50
A Linguistic Platform for Threat Development

Ben Kurtz  

Analysis of Identity Creation Detection Schemes post- 9/11

Cerebus

GeoIP Blocking, A Controversial But (Sometimes) Effective Approach

Tony Howlett

CtF ends

WarDrive:Running Man, The Last Crusade ends

Booksigning: Contributors to "InfoSec Career Hacking" including Aaron Bayles and Chris Hurley

15:00 - 15:50
“Shadow Walker ” — Raising The Bar For Rootkit Detection

Sherri Sparks & Jamie Butler

Why Tech Documentaries are Impossible (And why we have to do them anyway.)

Jason Scott

TBA

Steve Dugan

16:00 - 16:50
Award Ceremonies hosted by Dark Tangent

Return to Top of Page


Home | Archives | Community | Resources | Scene | Contact

 

This page last updated on: Tuesday, June 28, 2005

All content (c) 1992-2007 Dark Tangent. Site designed and maintained by BlackBeetle.