- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was July 29-31, 2005 at the Alexis Park Hotel & Resort
Speakers & Presentations
On the Current State of Remote Active OS Fingerprinting
A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
Introducing the Bastille Hardening Assessment Tool
Reverse Engineering Network Protocols using Bioinformatics
Scott Blake, Pamela Fusco, Ken Pfiel, Justin Somaini, Andre Gold, David Mortman
CISO Q&A with Dark Tangent
Mosquito - Secure Remote Code Execution Framework
Be Your Own Telephone Company...With Asterisk
Read It! (PDF | SXI) See It! (m4v Video) Hear it! (m4b Audio)
Analysis of Identity Creation Detection Schemes post- 9/11
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
Panel: A discussion of the regional DEF CON Groups
Auto-adapting Stealth Communication Channels
Development of An Undergraduate Security Program
Routing in the Dark: Scalable Searches in Dark P2P Networks
Countering Denial of Information Attacks
Read It! (PDF) White Paper (PDF) Extras (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Sketchtools: Prototyping Physical Interfaces
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Information Security Industry: $3 Billion of Snake Oil
Whiz ***** or Juvenile Delinquents: A Sociological Perspective The Construction of Hacker Identity
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Hacker’s Guide to Search and Arrest
Read It! (PDF) Extras (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Power to Map: How Cyberspace Is Imagined Through Cartography
A Safecracking Double Feature: Dial ‘B’ For BackDialing and Spike the Wonder Safe
Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)
Bacon: A Framework for Auditing and Pentesting
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
Top Ten Legal Issues in Computer Security
Surgical Recovery from Kernel-Level Rootkit Installations
Read It! (PDF) Papers (PDF) Tools (GZ) See It! (m4v Video) Hear it! (m4b Audio)
The Insecure Workstation II `bob reloaded
Read It! (PDF) References! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
No Women Allowed? Exploring Gender Differences In Hacking
Meme Mining for Fun and Profit
GeoIP Blocking, A Controversial But (Sometimes) Effective Approach
The Next Generation of Cryptanalytic Hardware
Doing Not-For-Profit Tech: The Hacker Foundation Year in Review
A Linguistic Platform for Threat Development
Read It! (PPT) See It! (m4v Video) Hear it! (m4b Audio)
Death of a Thousand cuts Forensics
Google Hacking for Penetration Testers
Introducing Unicornscan - Riding the Unicorn
Social Engineering Do's and Don'ts (A Femaie Perspective)
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Six Year Old Hacker: No More Script Kiddies
Read It! (PDF) References! (PDF) Code! (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Old Skewl Hacking - InfraRed
Trust Transience: Post Intrusion SSH Hijacking
Annalee Newitz, Wendy Seltzer, Kevin Bankston, Kurt Opsahl, Seth Schoen
Ask EFF: The Year in Digital Liberties
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
Introduction to Lockpicking and Physical Security
Dean Pierce, Brandon Edwards & Anthony Lineberry
Bypassing Authenticated Wireless Networks
Read It! (PDF) Software (BZ2) See It! (m4v Video) Hear it! (m4b Audio)
Bruce Potter, Beetle, CowboyM, Dan Moniz, Rodney Thayer, 3ricj, Pablos
Shmoo-Fu: Hacker Goo, Goofs, and Gear with the Shmoo
Licensing Agreements 101: The Creative Commons License
Read It! PDF+code (ZIP) See It! (m4v Video) Hear it! (m4b Audio)
Why Tech Documentaries are Impossible (And why we have to do them anyway.)
Building WarDriving Hardware Workshop
Automation - Deus ex Machina or Rube Goldberg Machine?
Simple Nomad and the NMRC Collective: hellnback, ertia, Weasel, jRandom, MadHat
The NMRC Warez 2005 Extravaganza
Alexey Smirnov & Tzi-cker Chiueh UPDATED
DIRA: Automatic Detection, Identification, and Repair of Control-Hijacking Attacks
Read It! (PPT) Dira Whitepaper (PDF) See It! (m4v Video) Hear it! (m4b Audio)
“Shadow Walker ” Raising The Bar For Rootkit Detection
Attacking Web Services: The Next Generation of Vulnerable Apps
Elizabeth Stark & Fred Benenson
The Revolution Will Not Be Copyrighted: Why You Should Care About Free Culture
Recapturing the Revolutionary Heart of Hacking
Read It! (PDF) See It! (m4v Video) Hear it! (m4b Audio)
The Internet's March of Folly: How, from ARPA to WSIS, Internet governance has consistently pursued policies contrary to its self interest
Internet Survivability, Threats and Efforts
Hackers and the Media- Misconceptions and Critical Tools To Combat Them
Mark Weber Tobias & Matt Fiddler
Physical Security Bypass Techniques: Exploring the Ethics of Full Disclosure
Assistant Secretary of Defense for Networks and Information Integration
Read It! (PDF) See It! (m4v Video)