- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was July 30 - Aug. 1, 2004 at the Alexis Park Hotel & Resort
Speakers & Presentations
Weaknesses in Satellite Television Protection Schemes
Read It! (PPT | PDF | SXI ) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
PDTP The Peer Distributed Transfer Protocol
Read It! (PPT) Memo (HTML) See It!(m4v Video) Hear it! (m4b Audio)
How Do We Get The World To Use Message Security
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
Program Semantics- Aware Intrusion Detection
Freenet: Taming the World's Largest Tamagotchi
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
Electronic Civil Disobedience and the Republican National Convention
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
The Open Source Security MythAnd How to Make it A Reality
Hacking the Media, and avoiding being Hacked by the Media
Tor: An Anonymizing Overlay Network For T*****
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Far More Than You Ever Wanted To Tell Hidden Data In Document Formats
Kryptos and the Cracking of the Cyrillic Projector Cipher
Hacking/Security Mac OSX Server aka Wussy Panther
Read It! (PPT) Resources (Edge) See It!(m4v Video) Hear it! (m4b Audio)
MySQL Passwords Password Strength and Cracking
Read It! (PPT) Resources (GZ) See It!(m4v Video) Hear it! (m4b Audio)
Information Hiding in Executable Binaries
Attacking Windows Mobile PDA’s
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Introduction to Hardware Hacking
Down with the RIAA, Musicians Against the Recording Industry
Subliminal Channels In Digital Signatures
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
Thorsten Holz, Maximillian Dornseif, Christian Klein
NoSEBrEaKDefeating Honeynets
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Blind SQL Injection Automation Techniques
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Virus, Worms and Trojans: Where are we going?
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
Robert "hackajar" Imhoff-Dousharm & Jonathan "ripshy" Duncan
Credit Card Networks Revisted: Penetration in Real-Time
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
BluesnarfingThe Risk From Digital Pickpockets
Phreaking in the Age of Voice Over IP
Smile, You’re on Candid Camera!
DIGEXAt the Dawn of the Commercial Internet
Better than Life - Manipulation of The Human Brain With The Use of Machines
Read It! (PowerPoint) See It!(m4v Video) Hear it! (m4b Audio)
Real World Privacy, How to Leave Less of A Trail in Life
Steganography, Steganalysis, & Cryptanalysis
Read It! (PPT) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Advanced Netfilter; Content Replacement (ala Snort_inline), and Port Knocking Based on Passive OS Fingerprinting
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Peter Silberman & Richard Johnson
A Comparison of Buffer Overflow Prevention Implementations and Weaknesses
Read It! (DOC) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Exploring Terminal Services, The Last 12 Month of Research. Or, The Evil Admin And His Tools
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)
Frustrating OS Fingerprinting with Morph
Read It! (PDF) Resources (ZIP) See It!(m4v Video) Hear it! (m4b Audio)