- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was August 8-10, 2008 at the Riviera Hotel and Casino.
Speakers & Presentations
BackTrack Foo - From Bug to 0day
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Md Sohail Ahmad, JVR Murthy, Amit Vartak
Autoimmunity Disorder in Wireless LAN
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Time-Based Blind SQL Injection using heavy queries: A practical approach for MS SQL Server, MS Access, Oracle and MySQL databases and Marathon Tool
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Zack Anderson, RJ Ryan & Alessandro Chiesa
Cancelled due to federal court order which was later allowed to expire. See court documents listed at right.
The Anatomy of a Subway Hack: Breaking Crypto RFID's and Magstripes of Ticketing Systems
Read It! (PDF)
Court Documents:
1-complaint.pdf
2-motionfortro.pdf
3-memorandum.pdf
4-declaration-sullivan.pdf
5-declaration-foster.pdf
6-declaration-kelley.pdf
7-declaration-mahony.pdf
8-corporatedisclosure.pdf
9-declaration-mahony2-exhibits.pdf
10-declaration-henderson-vulnerability.pdf
11-certificateofservice.pdf
12-motionfortro-order.pdf
13-noticeofappearance.pdf
14-johanson.pdf
15-no-scan.pdf
16-modifytro.pdf
17-mahony-declaration.pdf
8-modifytro-exhibits.pdf
19-certificate-of-service.pdf
20-originaltro-exhibits.pdf
21-motion-correct-not-mit.pdf
22-notice-of-appearance.pdf
23-response-to-modification-motion.pdf
24-hoffman-declarationandexhibits.pdf
25-eff-declaration.pdf
27-attorneyentrance.pdf
28-mbta-discovery-requests.pdf
29-attorneyentrance.pdf
30-mbta-oppositiontoTROreconsider.pdf
31-the-tech.pdf
33-motion-protectiveorder.pdf
34-reinsteinappearance.pdf
36-courtredactionpolicy.pdf
37-sullivandeclaration.pdf
38-mahonycertificate.pdf
39-discoveryextension.pdf
40-zack-motion-recon-tro.pdf
41-kessel-appearance.pdf
42-cohn-pro-hac-vice.pdf
43-hofman-pro-hac-vice.pdf
44-brown-appearance.pdf
45-kolodney-appearance.pdf
46-mbta-more-time.pdf
47-zack-reply-to-mbta-oppo.pdf
48-zack-declaration.pdf
49-mcsherry-declaration.pdf
MBTA-press-office-fact-sheet.pdf
Digital Security: A Risky Business
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
VulnCatcher: Fun with Vtrace and Programmatic Debugging
Read It! (PDF ) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Pen-Testing is Dead, Long Live the Pen Test
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Owning the Users with The Middler
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
They're Hacking Our Clients! Introducing Free Client-side Intrusion Prevention
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Luciano Bello & Maximiliano Bertacchini
Predictable RNG in the Vulnerable Debian OpenSSL Package, the What and the How
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
When Lawyers Attack! Dealing with the New Rules of Electronic Discovery
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Emergence (and Use) of Open Source Warfare
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
What To Do When Your Data Winds Up Where It Shouldn't
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol
Read It! (PPT | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Buying Time - What is your Data Worth?
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
ModScan: A SCADA MODBUS Network Scanner
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Deciphering Captcha
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Bypassing Pre-boot Authentication Passwords
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides) Hear it! (m4b audio)
Grendel-Scan: A new web application scanning tool
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
D.J. Capelis : UPDATED :
Building a Real Session Layer
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Climbing Everest: An Insider's Look at one State's Voting Systems
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Could Googling Take Down a President, a Prime Minister, or an Average Citizen?
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Compromising Windows Based Internet Kiosks
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Thomas d'Otreppe de Bouvette & Rick Farina
Shifting the Focus of WiFi Security: Beyond cracking your neighbor's wep key
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hacking Data Retention: Small Sister your digital privacy self defense
Read It! (PDF) See it! (Speaker & Slides) Hear it! (m4b audio)
Security and Anonymity Vulnerabilities in Tor: Past, Present, and Future
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Next Generation Collaborative Reversing with Ida Pro and CollabREate
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Brian K. Edwards & Silvio J. Flaim
Markets for Malware: A Structural Economic Approach
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Nathan Evans & Christian Grothoff
de-Tor-iorate Anonymity
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Identification Card Security: Past, Present, Future
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Ben Feinstein : UPDATED :
Snort Plug-in Development: Teaching an Old Pig New Tricks
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Ben Feinstein : UPDATED :
The Wide World of WAFs
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kevin Figueroa, Marco Figueroa & Anthony L. Williams
VLANs Layer 2 Attacks: Their Relevance and their Kryptonite
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Is That a Unique Credential in Your Pocket or Are You Just Pleased to See Me?
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Stefan Frei, Thomas Duebendorfer, Gunter Ollmann & Martin May
Exploiting A Hundred-Million Hosts Before Brunch
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Journey to the Center of the HP28
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Making the DEF CON 16 Badge
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Nail the Coffin Shut, NTLM is Dead
Nathan Hamiel & Shawn Moyer
Satan is on my Friends list: Attacking Social Networks
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Advanced Software Armoring and Polymorphic Kung Fu
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Playing with Web Application Firewalls
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
War Ballooning-Kismet Wireless "Eye in the Sky"
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Under the iHood
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Ham For Hackers- Take Back the Airwaves
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Stealing The Internet - A Routed, Wide-area, Man in the Middle Attack
Read It! (PDF) See It! (Speaker & Slides | Slides) Hear it! (m4b audio)
Demonstration of Hardware Trojans
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kolisar : UPDATED :
WhiteSpace: A Different Approach to JavaScript Obfuscation
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Flux on: EAS (Emergency Alert System)
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Career Mythbusters: Separating Fact from Fiction in your Information Security Career
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Developments in Cisco IOS Forensics
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Malware RCE: Debuggers and Decryptor Development
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Fear, Uncertainty and the Digital Armageddon
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Anthony Martinez & Thomas Bowen
Toasterkit, a Modular NetBSD Rootkit
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Bringing *****y Back: Breaking in with Style
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Forensics is ONLY for Private Investigators
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Solid State Drives Destroy Forensic & Data Recovery Jobs: Animated!
Read It! (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Nelson Murilo & Luiz 'effffn' Eduardo
Beholder: New Wifi Monitor Tool
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Good Viruses. Evaluating the Risks
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Ne0nRa1n & Joe "Kingpin" Grand : UPDATED :
Brain Games: Make your own Biofeedback Video Game
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Jan Newger : UPDATED :
Anti-RE Techniques in DRM Code
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
VoIPER: Smashing the VoIP Stack While You Sleep
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The World of Pager Sniffing/Interception: More Activity Than One May Suspect
Read It! (PDF) See it! (Speaker & Slides) Hear it! (m4b audio)
Christer Öberg, Claes Nyberg & James Tusini
Hacking OpenVMS
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
365-Day: Active Https Cookie Hijacking
Read It! (PDF) See It! (Speaker & Slides | Slides) Hear it! (m4b audio)
Phreakmonkey & mutantMandias : UPDATED :
Urban Exploration - A Hacker's View
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Malware Detection through Network Flow Analysis
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The true story of the Radioactive Boyscout: The first nuclear hacker and how his work relates to Homeland Security's model of the dirty bomb
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
How Can I Pwn Thee? Let Me Count the Ways
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Big Picture: Digital Cinema Technology and Security
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
New Tool for SQL Injection with DNS Exfiltration
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Advanced Physical Attacks: Going Beyond Social Engineering and Dumpster Diving
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Ferdinand Schober : UPDATED :
Gaming - The Next Overlooked Security Hole
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Making a Text Adventure Documentary
Read It! (TXT) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Blake Self, DevDelay & Bitemytaco : UPDATED :
Free Anonymous Internet Using Modified Cable Modems
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Teo Sze Siong & Hirosh Joseph : UPDATED :
Let's Sink the Phishermen's Boat!
Read It! (PDF | White Paper)
CAPTCHAs: Are they really hopeless? (Yes)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Alex Stamos, David Thiel & Justine Osborne
Living in the RIA World
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Tom "strace" Stracener & Robert "Rsnake" Hansen
Xploiting Google Gadgets: Gmalware and Beyond
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Inducing Momentary Faults Within Secure Smartcards / Microcontrollers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Marc Weber Tobias & Matt Fiddler
Open in 30 Seconds: Cracking One of the Most Secure Locks in America
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hijacking the Outdoor Digital Billboard Network
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
How to make Friends & Influence Lock Manufacturers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Evade IDS/IPS Systems using Geospatial Threat Detection
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Keeping Secret Secrets Secret and Sharing Secret Secrets Secretly
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Compliance: The Enterprise Vulnerability Roadmap
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Password Cracking on a Budget
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
David Weston & Tiller Beauchamp
RE:Trace: The Reverse Engineer's Unexpected Swiss Army Knife
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Web Privacy and Flash Local Shared Objects
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
New Ideas for Old Practices - Port-Scanning Improved
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Death Envelope: A Medieval Solution to a 21st Century Problem
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Michael J. Assante, Jerry Dixon, Tom Kellermann & Marcus Sachs
Panel: Commission on Cyber Security for the 44th Presidency
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
David Mortman, Rich Mogull, Chris Hoff, Robert "RSnake" Hansen, Robert Graham & David Maynor
Panel: All Your Sploits (and Servers) Are Belong To Us
Read It! (PDF 1, 2, 3, 4) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
David Kennedy, Ken Stasiak, Scott White, John Melvin & Andrew Weidenhamer
Panel: Black vs. White: The Complete Life Cycle of a Real World Breach
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kevin Bankston, Eva Galperin, Jennifer Granick, Marcia Hofmann, Corynne McSherry & Kurt Opsahl
Panel: Ask EFF: The Year in Digital Civil Liberties Panel
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Tadayoshi Kohno, Jon Callas, Alexei Czeskis, Dan Halperin, Karl Koscher & Michael Piatek
Panel: Hacking in the Name of Science
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
DAVIX Visualization Workshop
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)