skip to main content

DEF CON Hacking Conference

DEF CON 13 Archive

was July 29-31, 2005 at the Alexis Park Hotel & Resort

Speakers & Presentations


Ofir Arkin

On the Current State of Remote Active OS Fingerprinting

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ofir Arkin

A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jay Beale

Introducing the Bastille Hardening Assessment Tool

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Marshall Beddoe

Reverse Engineering Network Protocols using Bioinformatics

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Scott Blake, Pamela Fusco, Ken Pfiel, Justin Somaini, Andre Gold, David Mortman

CISO Q&A with Dark Tangent

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Wes Brown & Scott Dunlop

Mosquito - Secure Remote Code Execution Framework

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Strom Carlson & Black Ratchet

Be Your Own Telephone Company...With Asterisk

Read It! (PDF | SXI) See It! (m4v Video) Hear it! (m4b Audio)


Cerebus

Analysis of Identity Creation Detection Schemes post- 9/11

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jim Christy & Various other Feds

Meet the Fed

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


DC Groups

Panel: A discussion of the regional DEF CON Groups

See It! (m4v Video) Hear it! (m4b Audio)


Daniel Burroughs

Auto-adapting Stealth Communication Channels

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Daniel Burroughs

Development of An Undergraduate Security Program

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ian Clarke & Oskar Sandberg

Routing in the Dark: Scalable Searches in Dark P2P Networks

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Greg Conti

Countering Denial of Information Attacks

Read It! (PDF) White Paper (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Matt Cottam

Sketchtools: Prototyping Physical Interfaces

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Cowan

The Information Security Industry: $3 Billion of Snake Oil

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Amanda Dean

Whiz ***** or Juvenile Delinquents: A Sociological Perspective The Construction of Hacker Identity

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Steve Dunker

The Hacker’s Guide to Search and Arrest

Read It! (PDF) Extras (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Kristofer Erickson

The Power to Map: How Cyberspace Is Imagined Through Cartography

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Fyodor

Hacking Nmap

Read It & Resources! (TAR) See It! (m4v Video) Hear it! (m4b Audio)


Leonard Gallion

A Safecracking Double Feature: Dial ‘B’ For BackDialing and Spike the Wonder Safe

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Kenneth Geers

Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Hernan Gips

Bacon: A Framework for Auditing and Pentesting

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Michael Glasser & Deviant Ollam

Intro to High Security Locks and Safes

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Graham

Inequality and Risk

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jennifer Granick

Top Ten Legal Issues in Computer Security

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Julian Grizzard

Surgical Recovery from Kernel-Level Rootkit Installations

Read It! (PDF) Papers (PDF) Tools (GZ) See It! (m4v Video) Hear it! (m4b Audio)


Christian Grothoff

Lost in Translation

Read It! (PDF) Tech Report (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Deral Heiland

The Insecure Workstation II `bob reloaded

Read It! (PDF) References! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


hellNbak

Your Defense is Offensive

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Thomas J. Holt

No Women Allowed? Exploring Gender Differences In Hacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Broward Horne

Meme Mining for Fun and Profit

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Tony Howlett

GeoIP Blocking, A Controversial But (Sometimes) Effective Approach

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


David Hulton

The Next Generation of Cryptanalytic Hardware

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert "hackajar" Imhoff-Dousharm

Credit Cards: Everything You have Ever Wanted to Know

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


jives

Passive Host Auditing

Read It + extras! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Black Ops 2005

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Ben Kurtz

A Linguistic Platform for Threat Development

Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)


Jonathan Levin

The Dark Side of Winsock

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johnny Long

Death of a Thousand cuts – Forensics

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Johhny Long

Google Hacking for Penetration Testers

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert E. Lee & Jack C. Louis

Introducing Unicornscan - Riding the Unicorn

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Beth Louis (Phen)

Social Engineering Do's and Don'ts (A Femaie Perspective)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Kevin McCarthy

The Six Year Old Hacker: No More Script Kiddies

Read It! (PDF) References! (PDF) Code! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Major Malfunction

Old Skewl Hacking - InfraRed

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Raffael Marty

Visual Security Event Analysis

Read It! (PDF) Extras (GZ) See It! (m4v Video) Hear it! (m4b Audio)


Metalstorm

Trust Transience: Post Intrusion SSH Hijacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Robert Morris

ATM Network Vulnerabilities

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Mystic

Hacking the Mind (Influence and NLP)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Annalee Newitz, Wendy Seltzer, Kevin Bankston, Kurt Opsahl, Seth Schoen

Ask EFF: The Year in Digital Liberties

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Deviant Ollam

Introduction to Lockpicking and Physical Security

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dean Pierce, Brandon Edwards & Anthony Lineberry

Bypassing Authenticated Wireless Networks

Read It! (PDF) Software (BZ2) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter, Beetle, CowboyM, Dan Moniz, Rodney Thayer, 3ricj, Pablos

Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter

Suicidal Linux

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Roberto Preatoni & Fabio Ghioni

Assymetric Digital Warfare

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


RS

Forensic Data Acquisition Tools

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Raven

Pen-testing the Backbone

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Jim "FalconRed" Rennie

Licensing Agreements 101: The Creative Commons License

Read It! PDF+code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


San

Hacking Windows CE

Read It! (PDF) Code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Jason Scott

Why Tech Documentaries are Impossible (And why we have to do them anyway.)

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Matthew L. Shuchman “Pilgrim”

Building WarDriving Hardware Workshop

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Matthew L. Shuchman, Frank Thornton, Robert V. Hale II

Legal and Ethical Aspects of WarDriving

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sensepost

Automation - Deus ex Machina or Rube Goldberg Machine?

Read It! (PDF) (m4v Video) Hear it! (m4b Audio)


Simple Nomad and the NMRC Collective: hellnback, ertia, Weasel, jRandom, MadHat

The NMRC Warez 2005 Extravaganza

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Alexey Smirnov & Tzi-cker Chiueh UPDATED

DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks

Read It! (PPT) Dira Whitepaper (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Sherri Sparks & Jamie Butler

“Shadow Walker ” — Raising The Bar For Rootkit Detection

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Alex Stamos & Scott Stender

Attacking Web Services: The Next Generation of Vulnerable Apps

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


StankDawg

Hacking Google AdWords

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Elizabeth Stark & Fred Benenson

The Revolution Will Not Be Copyrighted: Why You Should Care About Free Culture

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Wesley Tanner & Nick Lane-Smith

End-to-End Voice Encryption over GSM: A Different Approach

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Richard Thieme

Recapturing the Revolutionary Heart of Hacking

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Vixie

The Internet's March of Folly: How, from ARPA to WSIS, Internet governance has consistently pursued policies contrary to its self interest

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Paul Vixie & Gadi Evron

Internet Survivability, Threats and Efforts

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Patty L. Walsh

Hackers and the Media- Misconceptions and Critical Tools To Combat Them

Read It! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)


Mark Weber Tobias & Matt Fiddler

Physical Security Bypass Techniques: Exploring the Ethics of Full Disclosure

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Dr. Linton Wells

Assistant Secretary of Defense for Networks and Information Integration

Read It! (PDF) See It! (m4v Video)


Chuck Willis

Trends in Licensing of Security Tools

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Zamboni

Attacking Biometric Access Control Systems

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)


Philip R. Zimmermann

The Unveiling of My Next Big Project

Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)