- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was held August 2-4, 2002 at the Alexis Park Hotel & Resort
Speakers & Presentations
It is Now Safe to Compile Your Phone System
Read It! (.ungz file contains presentation in html) See It! (m4v Video) Hear it! (m4b Audio)
John Dodge, Steve S. Mautsatsos and Bernadette H. Schell
Should Organizations Employ Hackers?
Implications Drawn From the Book Hacking of America
Read It! (rich text) See It! (m4v Video) Hear it! (m4b Audio)
Securing Your Windows Internet Server
Dennis Mattison aka Littlewolf
Network Printers and Other Network Devices, Vulnerabilities and Fixes
Read It! (.zip file contains presentation in Magi*****oint and pdf support files) See It! (m4v Video) Hear it! (m4b Audio)
Using Filesystem Crypto and Other Approaches to Protect Your Data/Privacy on BSD and LINUX
Read It! (Acrobat PDF) See It! (m4v Video) Hear it! (m4b Audio)
Defcon 10: Privacy/Anonymity
Stealth Data Dispersal: ICMP Moon-Bounce
Anonymity Services and the Law: How to Safely Provide Anonymous Technology on the Internet
Read It! (.gz file contains .ppt presentation and support text) See It! (m4v Video) Hear it! (m4b Audio)
Defcon 10: Net Recon
Correlation & Tracking of Distributed IDS
Rubicon - An Extensible Gateway IDS
Read It! (.gz file containing .ppt and pdf support file) See It! (m4v Video) Hear it! (m4b Audio)
Defcon 10: The Big Picture
Consumer Media Protections
Read It! (.zip file contains .ppt, pdf support file and .exe) See It! (m4v Video) Hear it! (m4b Audio)
Dmitry Sklyarov and the DMCA: 12 Months Later
Trusted Computing Platform Alliance:
The Mother(board) of all Big Brothers
Read It! (.zip file contains .ppt and supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)
1992 ... 2002 ... 2012 ...Hacking: The Next Ten Years
The Other Side of Information Security
Read It! (.zip file contains .ppt & supporting pdfs) See It! (m4v Video) Hear it! (m4b Audio)
Panel Discussion
with Michael I. Morgenstern, Richard Schaeffer, Marcus H. Sachs, O. Sami Saydjari, Steve Lipner, Tom Parker
Disclosure: The Mother of All Vulnerabilities
Defcon 10: Attack + Tools
Web Application Brute Forcing 101 - "Enemy of the State (Mechanism)"
Read It! (.zip file contains .ppt and pdf support file) Play With It! (.zip file contains iDefense Session Auditor tool) See It! (m4v Video) Hear it! (m4b Audio)
Attacking Networked Embedded Systems
Lock Picking: Techniques and Tools for High Security
Read It! (.zip file- requires OpenSource to view after decompiressing) See It! (m4v Video) Hear it! (m4b Audio)
High Security Locks, and Access Control Products
Citrix and Terminal Services
Read It! (PDF) Play With It! (.zip of tools & readme file in html) See It! (m4v Video) Hear it! (m4b Audio)
Defcon 10: Wireless + Routing
Community Wireless Networks: Friend or Foe to the Telecom Industry
Mobile VPN Vulnerabilities & Solutions
Read It! (compressed file containing presentation and other supporting documents) See It! (m4v Video) Hear it! (m4b Audio)
Nicholas Fischbach and Sebastien Lacoste-Seris
Layer 2, Routing Protocols, Router Security & Forensics
Black Ops of T*****/IP: Work NAT, Work. Good NAT. Woof
Replacing TripWire with SNMPv3
Read It! (PDF) Play With It! (.zip) See It! (m4v Video) Hear it! (m4b Audio)
Anatomy of Denial of Service Mitigation Testing
Building Secure Wireless Networks
Read It! (.zip file-contains presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)
Defcon 10: Break Out
Bastille Linux 2.0: Six Operating Systems and Still Going!
Hardening Solaris Installs
Read It! (.zip file-contains .ppt, .doc & .html supporting read me text) See It! (m4v Video) Hear it! (m4b Audio)
Resurrecting the Scene through Local 'Hacker' Meetings
Making a Non-portable Computer System Portable
Defcon 10: Agents/Trojans/Virii/Spiders
Advanced Shellcodes
Read It! (.zip file containing presentation in html) Play With It! (.zip file- a How To on writing Shell Codes)
Introduction to Computer Viruses:
Understanding the Fundamentals of How to Identify, Remove and Defend Against Hostile Code
Introduction to Writing Spiders & Web Agents
Read It! (.zip file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)
Setiri: Advances in Trojan Technology
Defcon 10: Net Defense
Stealthful Sniffing, Logging, and Intrusion Detection:
Useful and Fun Things You Can Do Without an IP Address
Read It! (.ungz file containing presentation in HTML) See It! (m4v Video) Hear it! (m4b Audio)