- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
was July 30 - August 2, 2009 at the Riviera Hotel & Casino.
Speakers & Presentations
HighWiz, The Dark Tangent, Russr, DJ Jackalope, Deviant Ollam, Thorn, ThePrez98, LosT, Noid, Siviak
DEF CON 101
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Joshua "Jabra" Abraham, Robert "RSnake" Hansen
Unmasking You
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
MD Sohail Ahmad, Prabhash Dhyani
Wi-Fish Finder: Who Will Bite the Bait
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Chema Alonso, Jose Palazon "Palako"
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Dmitri Alperovitch, Marcus Sachs, Phyllis Schneck, Ed Skoudis
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Down the Rabbit Hole: Uncovering a Criminal Server
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Alek Amrani : UPDATED :
Session Donation
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
James "Myrcurial" Arlen, Tiffany Rad
Your Mind: Legal Status, Rights and Securing Yourself
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Mike "mckt" Bailey, Russ McRee
CSRF: Yeah, It Still Works
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Andrea Barisani, Daniele Bianco
Sniff Keystrokes With Lasers/Voltmeters - Side Channel Attacks Using Optical Sampling Of Mechanical Energy And Power Line Leakage
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Middler 2.0: It's Not Just for Web Apps Anymore
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Antoine Gademer, Corentin Chéron
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Beckstrom's Law - A Model for Valuing Networks and Security
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Beth, Noid, Nick Farr, Leigh Honeywell, Steve Clement : UPDATED :
Robot Shark Laser! What Hackerspaces Do
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hijacking Web 2.0 Sites with SSLstrip—Hands-on Training
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Sean Boyce : UPDATED :
Design and Implementation of a Quantum True Random Number Generator
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Michael Brooks, David Aslanian
BitTorrent Hacks
Read It! (PDF) Extras (TAR.BZ2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
K.C. Budd "Phreakmonkey", Taylor Banks "Dr Kaos" : UPDATED :
Old Skool Brought Back: A 1964 Modem Demo
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Computer and Internet Security Law - A Year in Review 2008 - 2009
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
De Gustibus, or Hacking your Tastebuds
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Lockpicking Forensics
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Unfair Use - Speculations on the Future of Piracy
AAPL- Automated Analog Telephone Logging
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Michael L. Davis : UPDATED :
Who Invented the Proximity Card?
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Rob "Padre" DeGulielmo : UPDATED :
Con Kung-Fu: Defending Yourself @ DEF CON
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Packing and the Friendly Skies (Why Transporting your Firearms may be the best way to Safeguard your Tech when you Fly)
Read It! (PDF) Extras (ZIP) See it! ( Slides) Hear it! (m4b audio)
Sharepoint 2007 Knowledge Network Exposed
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Why Tor is Slow, and What We're Doing About It
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Attacking SMS. It's No Longer Your BFF
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Personal Survival Preparedness
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Advanced MySQL Exploitation
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Egypt : UPDATED :
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Endgrain, Tiffany Rad, Dan Kaminsky
Hello, My Name is /hostname/
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Bosse Eriksson : UPDATED :
Runtime Kernel Patching on Mac OS X
Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kevin Estis, Randy Robbins : UPDATED :
Hacking the Apple TV and Where your Forensic Data Lives
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Social Zombies: Your Friends Want to Eat Your Brains
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
etd : UPDATED :
Dradis Framework - Sharing Information will get you Root
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
Read It! (PDF)
Attacking Tor at the Application Layer
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hacking the Smart Grid
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Breaking the "Unbreakable" Oracle with Metasploit
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Efstratios L. Gavas : UPDATED :
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Locally Exploiting Wireless Sensors
Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Joe Grand (Kingpin) & The Dark Tangent : UPDATED :
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Projects of "Prototype This!"
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Joe "Kingpin" Grand, Jake Appelbaum, Chris Tarnovsky
"Smart" Parking Meter Implementations, Globalism, and You
(aka Meter Maids Eat Their *****)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Jennifer Granick : UPDATED :
The Year In Computer Crime Cases
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
The Psychology of Security Unusability
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
FOE — Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Dr. Thomas J. Holt, Dr. Max Kilger, Dr. Debora Strumsky, Dr. Olga Smirnova
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Stephen 'afterburn' Janansky, Nick Waite
Hardware Trojans: Infiltrating the Faraday Cage
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Pedro "hkm" Joaquin : UPDATED :
Attacks Against 2wire Residential Gateways
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kevin Johnson, Justin Searle, Frank DiMaggio
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Grant Jordan : UPDATED :
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Dr. Fouad Kiamilev, Rodney McGee
Hardware Black Magic - Building devices with FPGAs
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Jon R. Kibler, Mike Cooper : UPDATED :
Hack The Textbook
Read It! (PDF) Extras (KEY) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Air Traffic Control: Insecurity and ADS-B
Read It! (PDF) Extras (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Effective Information Security Career Planning
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
eXercise in Messaging and Presence Pwnage
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Picking Electronic Locks Using T***** Sequence Prediction
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Perspective of the DoD Chief Security Officer
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Roberto Suggi Liverani, Nick Freeman : UPDATED :
Abusing Firefox Addons
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Fred Von Lohmann, Jennifer Granick
Jailbreaking and the Law of Reversing
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
George Louthan, Cody Pollet : UPDATED :
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Kevin Mahaffey, John Hering, Anthony Lineberry
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Josh Marks, Rob Rehrig, Larry Aiello
Hacking the Wiimote and Wii Fit to Help the Disabled
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Haroon Meer, Marco Slaviero, Nicholas Arvanitis : UPDATED :
Clobbering the Cloud
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Is That You, Baby, or Just a Bridge in the Sky?
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Erez Metula : UPDATED :
Managed Code Rootkits - Hooking into Runtime Environments
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Christopher Mooney, James Luedke
Subverting the World Of Warcraft API
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
David Mortman, Rich Mogull, Dave Maynor, Larry Pesce, Robert "RSnake" Hansen
Defcon Security Jam 2: The Fails Keep on Coming
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
RAID Recovery: Recover your ***** by Sight and Sound
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Weaponizing the Web: New Attacks on User-generated Content
Read It! (PDF | White Paper) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hacking Sleep: How to Build Your Very Own Sleep Lab
Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Jason Ostrom, Arjun Sambamoorthy : UPDATED :
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Nicholas J. Percoco , Jibran Ilyas : UPDATED :
Malware Freak Show
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Search And Seizure Explained - They Took My Laptop!
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Pratap Prabhu, Yingbo Song, Salvatore. J. Stolfo
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Psifertex : UPDATED :
Maximum CTF: Getting the Most Out of Capture the Flag
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Danny Quist, Lorie M. Liebrock
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Automated Malware Similarity Analysis
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Injecting Electromagnetic Pulses into Digital Devices
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
RenderMan, Michael "theprez98" Schearer : UPDATED :
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
Read It! (PDF 1, 2) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
So You Got Arrested in Vegas...
Read It! (PDF) Extras (PDF) See it! (Video and Slides | Slides) Hear it! (m4b audio)
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hackerspaces: The Legal Bases
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
David Rook : UPDATED :
The security risks of Web 2.0
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Deblaze - A Remote Method Enumeration Tool for Flex Servers
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Cloud Security in Map/Reduce
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Michael Schrenk : UPDATED :
Screen Sc*****r Tricks: Extracting Data from Difficult Websites
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
That Awesome Time I Was Sued For Two Billion Dollars
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Sumit Siddharth : UPDATED :
The Making of the second SQL injection Worm
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Manipulation and ***** of the Consumer Credit Reporting Agencies
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Dominic Spill, Michael Ossmann, Mark Steward
Bluetooth, Smells Like Chicken
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks" (Dispelling the Myths and Discussing the Facts of Global Cyber-Warfare)
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Dangerous Minds: The Art of Guerrilla Data Mining
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
Read It! (PDF) Extras (ZIP) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
Hacking, Biohacking, and the Future of Humanity
See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
PLA Information Warfare Development Timeline and Nodal Analysis
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Marc Weber Tobias, Matt Fiddler, Tobias Bluzmanis : UPDATED :
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Good Vibrations: Hacking Motion Sickness on the Cheap
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Valsmith, Colin Ames, David Kerb
MetaPhish
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Charlie Vedaa, "Anonymous secondary speaker"
Proxy Prank-o-Matic
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Rafael Dominguez Vega : UPDATED :
USB Attacks: Fun with Plug & 0wn
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Matt Weir, Professor Sudhir Aggarwal : UPDATED :
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
Read It! (PDF) Extras (TAR.GZ) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Cross Site Scripting Anonymous Browser 2.0
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Edward Zaborowski : UPDATED :
Doppelganger: The Web's Evil Twin
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Criminal Charges are not pursued: Hacking PKI
Read It! (PDF) See it! (Speaker & Slides | Slides) Hear it! (m4b audio)
Panels
Kurt Opsahl, Jennifer Granick, Kevin Bankston, Fred von Lohmann, Marcia Hofmann, Peter Eckersley