This Schedule is tentative and may be changed at any time
Key:
= Demonstration
= Tool Released
= Exploit
Jump to: Thursday |
Friday |
Saturday |
Sunday
Thursday, July 26th
Go to: Speakers / Events
08:00 - 22:00
Registration in the Rotunda - $200 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda until 22:00 - Get your official DEF CON swag at the DEF CON Store.
Penn & Teller
Track 1
Wireless Security: Breaking Wireless Encryption Keys
DaKahuna
Until 10:50Track 2
Track 3
Turbo Track
Thursday Speaking Schedule
10:00
Penn & Teller
Track 1
Intro to Digital Forensics: Tools & Tactics
Ripshy & Hackajar
Until 11:50Track 2
Track 3
Turbo Track
11:00
Penn & Teller
Track 1
Cerebral Source Code
Siviak
Until 12:50Track 2
Track 3
Turbo Track
12:00
Penn & Teller
Track 1
DC101: DefCon Survival
HighWiz, Lockheed, Runnerup, Roamer, AlxRogan, Pyr0, Flipper
Until 13:50Track 2
Track 3
Turbo Track
13:00
Penn & Teller
Track 1
Screw the Planet, Hack the Job!
Roamer, Lockheed, Heather, Alxrogan
Until 14:50Track 2
Track 3
Turbo Track
14:00
Penn & Teller
Track 1
HF skiddies suck, don't be one. Learn some basic Python.
Terrence "tuna" Gareau
Until 15:50Track 2
Track 3
Turbo Track
15:00
Penn & Teller
Track 1
Hacking the Hackers: How Firm is Your Foundation?
LoST
Until 16:50Track 2
Track 3
Turbo Track
16:00
Penn & Teller
Track 1
Fun with the Lockpick Village
Dr. Tran
Until 17:50Track 2
Track 3
Turbo Track
16:00
Friday, July 27th
Go to: Speakers / Events
08:00 - 22:00
Registration in the Rotunda - $200 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda until 22:00 - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 19:00
Penn & Teller
The Christopher Columbus Rule and DHS
Mark Weatherford, DHS
Until 10:50Track 1
Welcome & Badge Talk
The Dark Tangent, LoST
Until 11:20Track 2
Should the Wall of Sheep Be Illegal?
Kevin Bankston, Matt Blaze, Jennifer Granick
Until 10:50Track 3
Making Sense of Static - New Tools for Hacking GPS
Fergus Noble, Colin Beighley
Until 10:50Turbo Track
Embedded device firmware vulnerability hunting using FRAK, the Firmware Reverse Analysis Konsole
Ang Cui
Until 10:20
APK File Infection on an Android System
Bob Pan
Until 10:50M
Friday Speaking Schedule
10:00
Penn & Teller
Socialized Data: Using Social Media as a Cyber Mule
Thor
Until 11:50Track 1
DEF CON Documentary Trailer
Director Jason Scott
Until 11:20
Before, During and After
Dead Addict,
Gail Thackeray
Until 11:50Track 2
MegaUpload: Guilty or Not Guilty?
Jim Rennie, Jennifer Granick
Until 11:50Track 3
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data
Christopher Soghoian, Ben Wizner, Catherine Crump, Ashkan Soltani
Until 11:50Turbo Track
Passive Bluetooth Monitoring in Scapy
Ryan Holeman
Until 11:20
Not-So-Limited Warranty: Target Attacks on Warranties for Fun and Profit
Darkred
Until 11:50
11:00
Penn & Teller
Cortana: Rise of the Automated Red Team
Raphael Mudge
Until 12:50Track 1
Shared Values, Shared Responsibility
General Keith B. Alexander
Commander, USCYBERCOM
Director, NSA/CSSTrack 2
Meet the EFF
Kurt Opsahl, Marcia Hoffman, Hanni Fakhouri, Peter Eckersley, Eva Galperin, Trevor Tim
Until 12:50Track 3
Can You Track Me Now? Government And Corporate Surveillance Of Mobile Geo-Location Data (Continued)Turbo Track
Not So Super Notes, How Well Does US Dollar Note Security Prevent Counterfeiting?
Matthew Duggan
Until 12:20
The Open Cyber Challenge Platform Project
Linda C. Butler
Until 12:50
12:00
Penn & Teller
Owning One to Rule Them All
Dave Kennedy, Dave Desimone
Until 13:50Track 1
The Art of Cyberwar
Kenneth Geers
Until 13:50Track 2
Panel: The Making of DEF CON 20
DEF CON Department Heads
Until 13:50Track 3
Don't Stand So Close To Me: An Analysis of the NFC Attack Surface
Charlie Miller
Until 13:50Turbo Track
How to Channel Your Inner Henry Rollins
Jayson E. Street
Until 13:20
Bad (and Sometimes Good) Tech Policy: It's Not Just a DC Thing
Chris Conley
Until 13:50
13:00
Penn & Teller
Changing the Security Paradigm: Taking Back Your Network and Bringing Pain to the Adversary
Shawn Henry
Until 14:50Track 1
Drones!
Chris Anderson
Until 14:50Track 2
Crypto and the Cops: the Law of Key Disclosure and Forced Decryption
Marcia Hofmann
Until 14:50Track 3
NFC Hacking: The Easy Way
Eddie Lee
Until 14:50Turbo Track
Scylla: Because There is No Patch for Human Stupidity
Sergio Valderrama, Carlos Rodriguez
Until 14:20
Drinking From the Caffeine Firehose We Know as Shodan
Viss
Until 14:50
14:00
Penn & Teller
Detecting Reflective Injection
Andrew King
Until 15:50Track 1
An Inside Look Into Defense Industrial Base (DIB) Technical Security Controls: How Private Industry Protects Our Country's Secrets
James Kirk
Until 15:50Track 2
Panel: DEF CON Comedy Jam V, V for Vendetta
David Mortman, Rich Mogull, Chris Hoff, Dave Maynor, Larry Pesce, James Arlen
Until 16:50Track 3
Attacking TPM Part 2: A Look at the ST19WP18 TPM Device
Chris Tarnovsky
Until 15:50Turbo Track
Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors
Dan 'AltF4' Petro
Until 15:20
How to Hack VMware vCenter Server in 60 Seconds
Alexander Minozhenko
Until 15:50
15:00
Penn & Teller
Post-Exploitation Nirvana: Launching OpenDLP Agents over Meterpreter Sessions
Andrew Gavin, Michael Baucom, Charles Smith
Until 16:50Track 1
Life Inside a Skinner Box: Confronting our Future of Automated Law Enforcement
Greg Conti, Lisa Shay, Woodrow Hartzog
Until 16:50Track 2
Panel: DEF CON Comedy Jam V, V for Vendetta (Continued)Track 3
Bypassing Endpoint Security for $20 or Less
Phil Polstra
Until 16:50Turbo Track
Demorpheos: Getting Rid Of Polymorphic Shellcodes In Your Network
Svetlana Gaivoronsli, Denis Gamayunov
Until 16:20
New Techniques in SQLi Obfuscation: SQL Never Before Used in SQLi
Nick Galbreath
Until 16:50
16:00
Penn & Teller
Track 1
Anti-Forensics and Anti-Anti-Forensics: Attacks and Mitigating Techniques for Digital-Forensic Investigations
Michael Perklin
Until 17:50Track 2
The Art of the Con
Paul Wilson
Until 17:50Track 3
Safes and Containers - Insecurity Design Excellence
Marc Weber Tobias, Matt Fiddler, Tobias Bluzmanis
Until 17:50
Turbo Track
DivaShark - Monitor Your Flow
Robert Deaton
Until 17:20
Blind XSS
Adam Baldwin
Until 17:50
17:00
Penn & Teller
Track 1
Track 2
Movie Night With Dark Tangent: "21" with 'MIT Mike' Aponte
Dark Tangent, 'MIT Mike' AponteTrack 3
Turbo Track
18:00
Penn & Teller
Track 1
Track 2
Movie Night With Dark Tangent: "21" Q&A with 'MIT Mike' Aponte
Dark Tangent, 'MIT Mike' AponteTrack 3
Turbo Track
19:00
Penn & Teller
Track 1
Track 2
Movie Night with Dark Tangent: "Code 2600"
Dark Tangent, Jeremy ZerechakTrack 3
PyramidTurbo Track
20:00
Penn & Teller
Track 1
MusicTrack 2
Movie Night with Dark Tangent: "Code 2600" Q&A with Director Jeremy Zerechak
Dark Tangent, Jeremy ZerechakTrack 3
Hacker JeopardyTurbo Track
21:00
Penn & Teller
Track 1
MusicTrack 2
Track 3
Turbo Track
22:00
Saturday, July 28th
Go to: Speakers / Events
08:00 - 22:00
Registration in the Rotunda - $200 USD CASH ONLY - Avoid the lines and get your badge early.
Official DEF CON Store in the Rotunda - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 19:00
Penn & Teller
Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2
Moxie Marlinspike, David Hulton, Marsh Ray
Until 10:50Track 1
Twenty Years Back, Twenty Years Ahead: The Arc of DefCon Past and Future
Richard Thieme
Until 10:50Track 2
World War 3.0 - The battle for the Internet between the forces of Chaos & Control
Joshua Corman, Dan Kaminsky, Jeff Moss, Rod Beckstrom, Michael Joseph Gross
Until 10:50Track 3
Beyond the War on General Purpose Computing: What's Inside the Box?
Cory Doctorow
Until 10:50Track 4
Creating an A1 Security Kernel in the 1980s (Using “Stone Knives and Bear Skins”)
Tom Perrine
Until 10:50
Saturday Speaking Schedule
10:00
Penn & Teller
Stamp Out Hash Corruption! Crack All The Things
Ryan Reynolds, Jonathan Claudius
Until 11:50
Track 1
Hacking Humanity: Human Augmentation and You
Christian 'Quaddi' Dameff, Jeff 'R3plicant' Tully
Until 11:50Track 2
Bruce Schneier Answers Your Questions
Bruce Schneier
Until 11:50Track 3
Owning Bad Guys {And Mafia} With Javascript Botnets
Chema Alonso, Manu 'The Sur'
Until 11:50Track 4
Exploit Archaeology: Raiders of the Lost Payphones
Josh Brashars
Until 11:50
11:00
Penn & Teller
Cryptohaze Cloud Hacking
Bitweasil
Until 12:50Track 1
DIY Electric Car
David Brown
Until 12:50Track 2
Meet the Fed Panel One: Law Enforcement
Jim Christy, Leon Carroll, Andy Fried, Jon Iadonisi, Rich Marshall, David McCallum, Justin Wykes
Until 12:50Track 3
Botnets Die Hard - Owned and Operated
Aditya K. Sood, Richard J. Enbody
Until 12:50
Track 4
Into the Droid: Gaining Access to Android User Data
Thomas Cannon
Until 12:50
12:00
Penn & Teller
The End of the PSTN As You Know It
Jason Ostrom, Karl Feinauer, William Borskey
Until 13:50Track 1
More Projects of Prototype This!
Joe Grand, Zoz
Until 13:50Track 2
Meet the Fed Panel Two: Policy
Jim Christy, Rod Beckstrom, Rich Marshall, Jerry Dixon, Mishel Kwon, Riley Repko, Dr. Linton Wells, Mark Weatherford, Marcus Sachs, Robert E. Joyce
Until 13:50Track 3
Hardware Backdooring is Practical
Jonathan Brossard
Until 13:50
Track 4
Hellaphone: Replacing the Java in Android
John Floren
Until 13:50
13:00
Penn & Teller
Programming Weird Machines with ELF Metadata
Rebecca 'bx' Shapiro, Sergey Bratus
Until 14:50
Track 1
<ghz or Bust: DEF CON
Atlas
Until 14:50Track 2
Q&A With the Men (and Women) in Black
Priest
others
Until 14:50Track 3
Hacking Measured Boot and UEF
Dan Griffin
Until 16:50
Track 4
Off Grid Communications with Android - Meshing the Mobile World
m0nk, Stoker
Until 14:50
14:00
Penn & Teller
Uncovering SAP Vulnerabilities: Reversing and Breaking the Diag Protocol
Martin Gallo
Until 15:50
Track 1
The Safety Dance - Wardriving the Public Safety Band
Robert Portvliet, Brad Antoniewicz
Until 15:50
Track 2
Bigger Monster, Weaker Chains: The NSA and the Constitution
Jameel Jaffer, William Binney, James Bamford, Alex Abdo
Until 15:50Track 3
DDoS Black and White "Kungfu" Revealed
Anthony 'Darkfloyd' Lai, Tony 'MT'Miu, Kelvin 'Captain' Wong, Alan 'Avenir' Chung
Until 17:50Track 4
Exchanging Demands
Peter Hannay
Until 15:50
15:00
Penn & Teller
Black Ops
Dan Kaminsky
Until 16:50Track 1
Hacker + Airplanes = No Good Can Come Of This
Renderman
Until 16:50Track 2
Connected Chaos: Evolving the DCG/Hackspace Communication Landscape
blakdayz, anarchy angel, anch, Dave Marcus, Nick Farr
Until 16:50Track 3
(BSDaemon)
Overwriting the Exception Handling Cache Pointer - Dwarf Oriented Programming
Rodrigo Branco, Sergey Bratus, James Oakley
Until 14:50
Track 4
Spy vs. Spy: Spying on Mobile Device Spyware
Michael Robinson, Chris Taylor
Until 16:50
16:00
Penn & Teller
Track 1
Busting the BARR: Tracking “Untrackable” Private Aircraft for Fun & Profit
Dustin Hoffman, Semon Rezchikov
Until 17:50
Track 2
Panel: Anonymous and the Online Fight for Justice
Amner Lyon, Gabriella Coleman, Marcia Hofmann, Mercedes Haefer, Jay Leiderman, Gráinne O’Neill
Until 18:50Track 3
The DCWG Debriefing - How the FBI Grabbed a Bot and Saved the Internet
Paul Vixie, Andrew Fried
Until 17:50Track 4
The Darknet of Things, Building Sensor Networks That Do Your Bidding
Anch, Omega
Until 17:50
17:00
Penn & Teller
Track 1
Track 2
Movie Night: Reboot
Joe Kawaskaki,Writer
Sidney Sherman, Producer
Actors (tba)
40 minutesTrack 3
Track 4
19:00
Penn & Teller
Track 1
Track 2
Movie Night: Reboot Q&A
Joe Kawaskaki,Writer
Sidney Sherman, Producer
Actors (tba)Track 3
Track 4
20:00
Penn & Teller
Track 1
MusicTrack 2
Movie Night: We are LegionTrack 3
Hacker JeopardyTrack 4
21:00
Penn & Teller
Track 1
MusicTrack 2
Movie Night: We are Legion Q&ATrack 3
Track 4
22:00
Penn & Teller
Track 1
MusicTrack 2
Track 3
Track 4
23:00
Sunday, July 29th
Go to: Speakers / Events
08:00 - 12:00
Registration in the Rotunda - $200 USD CASH ONLY
Official DEF CON Store in the Rotunda - Get your official DEF CON swag at the DEF CON Store.
Vendor Area Hours: 10:00 - 15:00
Track 1
SIGINT and Traffic Analysis for the Rest of Us
Sandy Clark, Matt Blaze
Until 10:50
Track 2
Robots: You're Doing it Wrong 2
Katy Levinson
Until 10:50Track 3
OPFOR 4Ever
Tim Maletic, Christopher Pogue
Until 10:50
Track 4
We Have You by the Gadgets
Mickey Shkatov, Toby
Until 10:50
Sunday Speaking Schedule
10:00
Track 1
SCADA HMI and Microsoft Bob: Modern Authentication Flaws With a 90's Flavor
Wesley McGrew
Until 11:50Track 2
KinectasploitV2: Kinect Meets 20 Security Tools
Jeff Bryner
Until 11:50
Track 3
Improving Web Vulnerability Scanning
Dan Zulla
Until 11:50
Track 4
No More Hooks: Trustworthy Detection of Code Integrity Attacks
Xeno Kovah, Corey Kallenberg
Until 11:50
11:00
Track 1
Looking into the Eye of the Meter
Cutaway
Until 12:50
Track 2
Adventures in Bouncerland
Nicholas J. Percoco
Sean Schulte
Until 12:50
Track 3
Post Metasploitation: Improving Accuracy and Efficiency in Post Exploitation Using the Metasploit Framework
egypt
Until 12:50
Track 4
Owning the Network: Adventures in Router Rootkits
Michael Coppola
Until 12:50
12:00
Track 1
Tenacious Diggity - Skinny Dippin in a Sea of Bing
Francis Brown, Rob Ragan
Until 13:50
Track 2
DC Recognize Awards
Jeff Moss, Jericho, Russ Rogers
Until 13:50Track 3
Weaponizing the Windows API with Metasploit’s Railgun
David 'thelightcosine' Maloney
Until 13:50
Track 4
Hacking [redacted] Routers
FX, Greg
Until 13:50
13:00
Track 1
Can Twitter Really Help Expose Psychopath Killers' Traits?
Chris "The Suggmeister" Sumner
Until 14:50
Track 2
Fuzzing Online Games
Elie Bursztein, Patrick Samy
Until 14:50
Track 3
Kevin Poulsen Answers Your Questions
Kevin Poulsen
Until 14:50Track 4
SQL Injection to MIPS Overflows: Rooting SOHO Routers
Zachary Cutlip
Until 14:50
14:00
Track 1
Sploitego – Maltego’s (Local) Partner in Crime
Nadeem Douba
Until 15:50
Track 2
Hacking the GoogleTV
Amir 'zenofex' Etemadieh, CJ Heres, Dan Rosenberg, Tom Dwenger
Until 15:50
Track 3
Owned in 60 Seconds: From Network Guest to Windows Domain Admin
Zack Fasel
Until 16:50
Track 4
bbqSQL - Blind SQLi Exploitation
Ben Toews, Scott Behrens
Until 15:50
15:00
Track 1
How to Hack All the Transport Networks of a Country
Alberto Garcia Illera
Until 16:50
Track 2
The Paparazzi Platform Flexible, Open-Source, UAS Software and Hardware
esden, dotAero, misterj, cifo
Until 16:50
Track 3
Subterfuge: The Automated Man-in-the-Middle Attack Framework
Matthew Toussain, Christopher M. Shields
Until 16:50
Track 4
SQL ReInjector - Automated Exfiltrated Data Identification
Jason A. Novak, Andrea London
Until 16:50
16:00
Track 1
Break
Until 17:30Track 2
Track 3
Track 4
17:00
Track 1
Closing CeremoniesTrack 2
Track 3
Track 4
17:30