- Skip to DEF CON:
- 1
- 2
- 3
- 4
- 5
- 6
- 7
- 8
- 9
- 10
- 11
- 12
- 13
- 14
- 15
- 16
- 17
- 18
- 19
- 20
- 21
- 22
- 23
- 24
- 25
- CN B
- 26
- CN 1
- 27
- 28
- NYE21
- CN P
- 29
- 30
- 31
- 32
Was August 1st-4th, 2013 at the Rio Hotel & Casino
Speakers & Presentations
Welcome and Making of the DEF CON 21 Badges
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Alex Abdo, Catherine Crump, Christopher Soghoian, Kade Crockford, Nicole Ozer
The ACLU Presents: NSA Surveillance and More
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Kurt Opsahl, Marcia Hoffmann, Dan Auerbach, Eva Galperin, Marc Jaycox, Mitch Stoltz
Ask the EFF: The Year in Digital Civil Liberties
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
DEF CON Comedy Jam Part VI, Return of the Fail
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Joe Grand, Mark 'Smitty' Smith, LosT, RenderMan, FirmWarez
Hardware Hacking with Microcontrollers: A Panel Discussion
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Ping Li, Matt Ocko, Deepak Jeevankumar, John M. Jack , Eileen Burbidge
Meet the VCs
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Policy Wonk Lounge
Bogdan Alecu: UPDATED :
Business logic flaws in mobile operators services
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Chema Alonso: UPDATED :
Fear the Evil FOCA: IPv6 attacks in Internet connections
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Amber Baldet: UPDATED :
Suicide Risk Assessment and Intervention Tactics
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Combatting Mac OSX/iOS Malware with Data Visualization
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Scott Behrens, Brent Bandelgar
MITM All The IPv6 Things
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
PowerPwning: Post-Exploiting By Overpowering PowerShell
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Transcending Cloud Limitations by Obtaining Inner Piece
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Data Evaporation from SSDs
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Evil DoS Attacks and Strong Defenses
Read It! (PDF) See it! (Speaker & Slides | Slides Only) Hear it! (m4b Audio)
Francis Brown: UPDATED :
RFID Hacking: Live Free or RFID Hard
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
bughardy, Eagle1753: UPDATED :
OTP, It won't save you from free rides!
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Open Public Sensors, Trend Monitoring and Data Fusion
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Conducting massive attacks with open source distributed computing
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Benjamin Caudill: UPDATED :
Offensive Forensics: CSI for the Bad Guy
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Daniel Chechik, Anat (Fox) Davidi: UPDATED :
Utilizing Popular Websites for Malicious Purposes Using RDI
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Ming Chow: UPDATED :
Abusing NoSQL Databases
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Legal Aspects of Full Spectrum Computer Network (Active) Defense
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Blucat: Netcat For Bluetooth
Read It! (Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Daniel "unicornFurnace" Crowley, Jennifer "savagejen" Savage, David "videoman" Bryan
Home Invasion 2.0 - Attacking Network-Controlled Consumer Devices
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Ang Cui, Michael Costello: UPDATED :
Stepping P3wns: Adventures in full spectrum embedded exploitation (and defense!)
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Sherri Davidoff, Scott Fretheim, David Harrison, Randi Price
Do-It-Yourself Cellular IDS
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Andy Davis: UPDATED :
Revealing Embedded Fingerprints: Deriving intelligence from USB stack interactions
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
James Denaro: UPDATED :
How to Disclose or Sell an Exploit Without Getting in Trouble
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Doug DePerry, Tom Ritter: UPDATED :
I Can Hear You Now: Traffic Interception and Remote Mobile Phone Cloning with a Compromised CDMA Femtocell
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Christie Dudley: UPDATED :
Privacy In DSRC Connected Vehicles
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Piotr Duszynski: UPDATED :
Pwn'ing You(r) Cyber Offenders
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
From Nukes to Cyber – Alternative Approaches for Proactive Defense and Mission Assurance
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Noise Floor: Exploring the world of unintentional radio emissions
Read It! (Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Electromechanical PIN Cracking with Robotic Reconfigurable Button Basher (and C3BO)
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Amir Etemadieh, CJ Heres, Mike Baker, Hans Nielsen
Google TV or: How I Learned to Stop Worrying and Exploit Secure Boot
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Jaime Filson (WiK), Rob Fuller (Mubix)
gitDigger: Creating useful wordlists from public GitHub repositories
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
10000 Yen into the Sea
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Politics of Privacy and Technology: Fighting an Uphill Battle
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Java Every-Days: Exploiting Software Running on 3 Billion Devices
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
JTAGulator: Assisted Discovery Of On-Chip Debug Interfaces
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Dan Griffin: UPDATED :
Protecting Data with Short-Lived Encryption Keys and Hardware Root of Trust
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
So You Think Your Domain Controller is Secure?
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Ricky Hill: UPDATED :
Phantom Network Surveillance UAV / Drone
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Bluetooth Device Database
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Alberto Garcia Illera, Javier Vazquez Vidal: UPDATED :
Dude, WTF in my car?
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Abraham Kang, Dinis Cruz: UPDATED :
Resting on Your Laurels will get you Pwned: Effectively Code Reviewing REST Applications to avoid getting powned
Read It! (PDF)
Torturing Open Government Systems for Fun, Profit and Time Travel
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Dirty South – Getting Justified with Technology
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Karl Koscher, Eric Butler: UPDATED :
The Secret Life of SIM Cards
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Adam "Major Malfunction" Laurie, Zac Franken
Decapping Chips the Easy Hard Way
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
David Lawrence, Eric Van Albert, Robert Johnson: UPDATED :
Key Decoding and Duplication Attacks for the Schlage Primus High-Security Lock
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
How to use CSP to stop XSS
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
This presentation will self-destruct in 45 minutes: A forensic deep dive into self-destructing message apps
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
HiveMind: Distributed File Storage Using JavaScript Botnets
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Todd Manning, Zach Lanier: UPDATED :
GoPro or GTFO: A Tale of Reversing an Embedded System
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
A Thorny Piece Of Malware (And Me): The Nastiness of SEH, VFTables & Multi-Threading
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Pwn The Pwn Plug: Analyzing and Counter-Attacking Attacker-Implanted Devices
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Eric Milam: UPDATED :
Getting The Goods With smbexec
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Adventures in Automotive Networks and Control Units
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
PowerPreter: Post Exploitation Like a Boss
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Tony Miu, Wai-leng Lee: UPDATED :
Kill 'em All — DDoS Protection Total Annihilation!
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Unexpected Stories From a Hacker Who Made it Inside the Government
See it! (Speaker & Slides | Slides Video) Hear it! (m4b audio)
Please Insert Inject More Coins
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Brendan O'Connor: UPDATED :
Stalking a City for Fun and Frivolity
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Fast Forensics Using Simple Statistics and Cool Tools
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Fatih Ozavci: UPDATED :
VoIP Wars: Return of the SIP
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Franz Payer: UPDATED :
Exploiting Music Streaming with JavaScript
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Nicholas J. Percoco, Joshua Corman
The Cavalry Isn't Coming: Starting the Revolution to Fsck it All!
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Michael Perklin: UPDATED :
ACL Steganography - Permissions to Hide Your *****
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Phorkus (Mark Carey), Evilrob (Rob Bathurst)
Doing Bad Things to 'Good' Security Appliances
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Gregory Pickett: UPDATED :
Let's screw with nmap
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Alexandre Pinto: UPDATED :
Defending Networks with Incomplete Information: A Machine Learning Approach
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
We are Legion: Pentesting with an Army of Low-power Low-cost Devices
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
pukingmonkey: UPDATED :
The Road Less Surreptitiously Traveled
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b audio)
Chris John Riley: UPDATED :
Defense by numbers: Making problems for script kiddies and scanner monkeys
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
De-Anonymizing Alt.Anonymous.Messages
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Eric Robi, Michael Perklin: UPDATED :
Forensic Fails - Shift + Delete won't help you here
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Teal Rogers, Alejandro Caceres
The dawn of Web 3.0: website mapping and vulnerability scanning in 3D, just like you saw in the movies
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Jaime Sanchez: UPDATED :
Building an Android IDS on Network Level
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Safety of the Tor network: a look at network diversity, relay operators, and malicious relays
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Dark Arts of OSINT
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
How my Botnet Purchased Millions of Dollars in Cars and Defeated the Russian Hackers
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Examining the Bitsquatting Attack Surface
Read It! (White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Hunter Scott: UPDATED :
Hacking Wireless Networks of the Future: Security in Cognitive Radio Networks
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Making Of The DEF CON Documentary
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
All Your RFz Are Belong to Me - Hacking the Wireless World with Software Defined Radio
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
A Password is Not Enough: Why disk encryption is broken and how we might fix it
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Neil Sikka: UPDATED :
EMET 4.0 PKI Mitigation
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
DragonLady: An Investigation of SMS Fraud Operations in Russia
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
James Snodgrass (PuNk1nPo0p), Josh Hoover (wishbone): UPDATED :
BYO-Disaster and Why Corporate Wireless Security Still Sucks
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
soen: UPDATED :
Evolving Exploits Through Genetic Algorithms
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Backdoors, Government Hacking and The Next Crypto Wars
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Jason Staggs: UPDATED :
How to Hack Your Mini Cooper: Reverse Engineering Controller Area Network (CAN) Messages on Passenger Automobiles
Read It! (PDF | White Paper | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
An Open Letter - The White Hat's Dilemma: Professional Ethics in the Age of Swartz, PRISM and Stuxnet
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Collaborative Penetration Testing With Lair
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Robert Stucke: UPDATED :
DNS May Be Hazardous to Your Health
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Chris Sumner, Randall Wald: UPDATED :
Predicting Susceptibility to Social Bots on Twitter
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Amr Thabet: UPDATED :
EDS: Exploitation Detection System
Read It! (PDF | White Paper) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Government and UFOs: A Historical Analysis by Richard Thieme
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Josh 'm0nk' Thomas: UPDATED :
BoutiqueKit: Playing WarGames with expensive rootkits and malware
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
C.R.E.A.M. Cache Rules Evidently Ambiguous, Misunderstood
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Marc Weber Tobias, Tobias Bluzmanis
Insecurity - A Failure of Imagination
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Vaagn Toukharian, Tigran Gevorgyan
HTTP Time Bandit
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
The Growing Irrelevance of US Government Cybersecurity Intelligence Information
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Prowling Peer-to-Peer Botnets After Dark
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Defeating Internet Censorship with Dust, the Polymorphic Protocol Engine
See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Josh Yavor: UPDATED :
BYOD PEAP Show
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Android WebLogin: Google's Skeleton Key
Read It! (PDF | Extras) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)
Hacking Driverless Vehicles
Read It! (PDF) See it! (Speaker & Slides | Slides Video) Hear it! (m4b Audio)