- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was August 4-6, 2006 at the Riviera Hotel and Casino.
Speakers & Presentations
The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights
Discovering Mac OS X Weaknesses and Fixing Them with the New Bastille OS X Port
Panel: Meet the Fed
Phishing, it starts with “Ph” for a reason. Some best practices to detect and prevent for some new point of attack methods
Exploit Writing Using Injectable Virtual Machines
Hacking FedEx Kinko's: How Not To Implement Stored-Value Card Systems
Strom Carlson, skrooyoo, datagram & Vidiot
SOCIAL MESSAGE RELAY: Using existing social networks to transmit covert messages in public
Legal Aspects of Computer Self-Defense and Aggressive Self-Defense
Legal Aspects of Internet & Computer Network Defense: A Year in Review Computer and Internet Security Law 2005-2006
Cindy Cohn, Kevin Bankston, Kurt Opsahl, Jason Schultz, Danny O’Brien, Seth Schoen
Ask EFF: The Year in Digital Civil Liberties
Cindy Cohn, Kevin Bankston, Kurt Opsahl & Jason Schultz
EFF v. AT&T: Your World, Delivered (to the NSA)
dr.kaos, arcon, atlas, beth, digunix
SAMAEL (Secure, Anonymous, Megalomaniacal, Autonomous, Encrypting Linux) and NARC (Network Analysis Reporting Console)
Ripples in the Gene Pool: Creating Genetic Mutations to Survive the Vulerability Window
10 Ways To Not Get Caught Hacking On Your Mac
Mac OS X Security Tools
DNS ***** Infrastructure and Games
Gadi Evron, Mudge, Paul Vixie, Dan Kaminsky, Randy Vaughn, Dan Hubbard, Tim Grasso
Panel: Internet Wars 2006
MatriXay: When Web App & Database Security Pen-Test/Audit Is a Joy
RE 2006: New Challenges Need Changing Tools
Graphical Representations of Security Relationships: Awesome or Bullshit?
Analysing Complex Systems: The BlackBerry Case
Fighting Organized Cyber Crime
First We Break Your Tag, Then We Break Your Systems Attacks to Rfid Systems
Phishing Tips and Techniques: Tackle, Rigging, and How & When to Phish
Trust, But Verify: Auditing Proprietary DRE Systems
Your Name, Your Shoe Size, Your Identity? What do we Trust in this Web?
Automatic Exploit Detection in Binaries
WarRocketing: Network Stumbling 50 sq. miles in < 60 sec.
Meme HackingSubverting The Ideosphere
Exploring the Changing Nature of DEF CON over the Past 14 Years
Owning the Linksys wrtp54g VOIP Router
How to Create an Anonymous Identity
Hacking UNIX with FreeBSD Jail(8), Secure Virtual Servers
Advanced Windows Based Firewall Subversion
Secrets of the Hollywood Hacker!
Old Skewl Hacking: Magstripe Madness
Visual Log Analysis - The Beauty of Graphs
Bridging the Gap Between Static and Dynamic Reversing
Zulu A Command Line Wireless Frame Generator
Rebuilding HARD DRIVES for Data Recovery: Anatomy of a Hard Drive
A New Bioinformatics-Inspired and Binary Analysis: Coding Style/Motif Identification
Advanced Attacks Against PocketPC Phones
Covert Channels using IPv6/ICMPv6
"What has the NSA done for me lately?"
US-VISIT: Raping personal privacy since 2004
Trusted Computing: Could it be... SATAN?
Service Cloaking and Anonymous Access; Combining Tor with Single Packet Authorization (SPA)
New Wireless Fun From the Church Of WiFi
A Hacker's Guide to RFID Spoofing and Jamming
IBM Networking AttacksOr The Easiest Way To Own A Mainframe Without Getting The Removals Men In
Cyber-crime Foiled Once Again? Help prove the innocence or guilt of Jack Grove
Hunting for Metamorphic Engines
OllyBone: Semi-Automatic Unpacking on IA-32
Beyond Social Engineering: Tools for Reinventing Yourself
Advanced File System Hiding and Detection
Marc Weber Tobias & Matt Fiddler