skip to main content

DEF CON Hacking Conference

DEF CON 9 Archive

was held July 13-15, 2001 at the Alexis Park Hotel & Resort

Speakers & Presentations

Defcon 9: Uber Haxor


FX

Attacking Control, Routing, and Tunneling Protocols.

See It! (m4v Video) Hear it! (m4b Audio)


Thor

Grabbing User Credentials via W2k ODBC Libraries.

See It! (m4v Video) Hear it! (m4b Audio)


Ofir Arkin

Introducing X: Playing Tricks With ICMP

See It! (m4v Video) Hear it! (m4b Audio)


Robert Grill & Michael Cohen

Windows NT and Novell Host Based Intrusion Detection Using Native Logging and 3rd Party Log Reporting Tools

See It! (m4v Video) Hear it! (m4b Audio)


Mark Grimes

T*****/IP Intelligent Agents: The Future of Electronic Warfare and Defense

See It! (m4v Video) Hear it! (m4b Audio)


Phil King

8 bits and 8 pins: More Fun with Microcontroller Hacking

See It! (m4v Video) Hear it! (m4b Audio)


TechnoDragon

Hardware Mods

See It! (m4v Video) Hear it! (m4b Audio)


Raven Alder

A Perl Script That Tracks DoS Attacks Across Cisco Backbones

See It! (m4v Video) Hear it! (m4b Audio)


Robert Muncy

Securing Cisco Routers

See It! (m4v Video) Hear it! (m4b Audio)


Thomas J. Munn

Using OpenBSD, Snort, Linux and A Few Other Tricks To Set Up A Transparent *ACTIVE* IDS

See It! (m4v Video) Hear it! (m4b Audio)


Anders Ingeborn

Designing Small Payloads

See It! (m4v Video) Hear it! (m4b Audio)


Bruce Potter & Adam

The Captive Portal

Hear it! (m4b Audio)


Kevin M*****eake & Chris Goggans

Falling Dominoes

See It! (m4v Video) Hear it! (m4b Audio)


Dan Kaminsky

Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks with OpenSSH and the GNU Privacy Guard

See It! (m4v Video) Hear it! (m4b Audio)


Dmitry Sklyarov & Andy Malyshev

eBooks Security – Theory and Practice

Hear it! (m4b Audio)


Optyx

KIS: Kernel Intrusion System

See It! (m4v Video) Hear it! (m4b Audio)


Jason Peel

Cypherpunk Grade Covert Network Channels

See It! (m4v Video) Hear it! (m4b Audio)


K2

Polymorphic Shell Code API

See It! (m4v Video) Hear it! (m4b Audio)


Rob Schein

Evaluating VPN Solutions

See It! (m4v Video) Hear it! (m4b Audio)


Adam Bresson

Data Mining with PHP

See It! (m4v Video) Hear it! (m4b Audio)


Biing Jong Lin, Chieh Chun Lin & Jan Che Su

Survey of Country-Wide Web Server Security

See It! (m4v Video) Hear it! (m4b Audio)


Nick Farr

Designing Secure Interfaces "for Dummies"

See It! (m4v Video) Hear it! (m4b Audio)

Defcon 9: General


Richard Thieme

Hacking a Trans-Planetary Net

See It! (m4v Video) Hear it! (m4b Audio)


Peter Shipley

802.11b War Driving and LAN Jacking

See It! (m4v Video) Hear it! (m4b Audio)


Michael Wilson

Hacker Doctrine in Information Warfare

See It! (m4v Video) Hear it! (m4b Audio)


Marcus Andersson

Firewalling Wireless Devices

See It! (m4v Video) Hear it! (m4b Audio)


Jay Beale

Attacking and Securing RedHat

See It! (m4v Video) Hear it! (m4b Audio)


Daniel J. Burroughs

Applying Information Warfare Theory to Generate a Higher Level of Knowledge from Current IDS

See It! (m4v Video) Hear it! (m4b Audio)


Dr. Ian Goldberg

Arranging an Anonymous Rendezvous: Privacy Protection for Internet Servers

See It! (m4v Video) Hear it! (m4b Audio)


Keith Nugent

Windows 2000 Security: How to Lock Down Your Win2k Boxes

See It! (m4v Video) Hear it! (m4b Audio)


Brenno de Winter

IPV6 Security

See It! (m4v Video) Hear it! (m4b Audio)


HC

NTFS Alternate Data Streams

Hear it! (m4b Audio)


Bryan Glancey

Weakest Link

See It! (m4v Video) Hear it! (m4b Audio)


Simple Nomad

Widdershins: De-evolution and the Politics of Technology

See It! (m4v Video) Hear it! (m4b Audio)


Bruce Schneier

Bruce Schneier Answers Questions

See It! (m4v Video) Hear it! (m4b Audio)


Enrique Sanchez

Distributed Intrusion Detection System Evasion

See It! (m4v Video) Hear it! (m4b Audio)


Jim Christy

Meet the FED Panel

See It! (m4v Video) Hear it! (m4b Audio)


William Tafoya

Hacking the Mind

See It! (m4v Video) Hear it! (m4b Audio)


Stephen Hsu

SafeWeb's Triangle Boy: IP Spoofing and Strong Encryption in Sservice of a Free Internet.

Hear it! (m4b Audio)


CdC

See It! (m4v Video) Hear it! (m4b Audio)

Defcon 9: Newbie


Lile Elam

Renagade Wireless Networks, Creating Connectivity on Demand

Hear it! (m4b Audio)


Dennis Salguero

The Business Side of Starting Your Own Consulting Firm and How They Can Succeed

See It! (m4v Video) Hear it! (m4b Audio)


Robert Graham

The Principals of Cyber-Anarchy.

See It! (m4v Video) Hear it! (m4b Audio)


The Defendant

So You Got Your Lame Ass Sued: A Legal Narrative

See It! (m4v Video) Hear it! (m4b Audio)


Barry J. Stiefel

NAT for Newbies and Not-So-Newbies: A Tutorial

See It! (m4v Video) Hear it! (m4b Audio)


Dario D. Diaz, Esq.

Digital Millenium Copyright Act

See It! (m4v Video) Hear it! (m4b Audio)


Dr. Cyrus Peikari

An Open Source, International, Attenuated Computer Virus

See It! (m4v Video) Hear it! (m4b Audio)


Shatter

FAQ The Newbies: Information for People New to Security, Hacking or Defcon

See It! (m4v Video) Hear it! (m4b Audio)


Len Sassaman

What is SSL, a CA, and FreeCert?

See It! (m4v Video) Hear it! (m4b Audio)


Jennifer Granick

European Cybercrime Treaty

See It! (m4v Video) Hear it! (m4b Audio)


Ryan Lackey

HavenCo: One Year Later

Hear it! (m4b Audio)


John L. Dodge & Bernadette H. Schell

Laurentian University Hacker Study Update

Hear it! (m4b Audio)


Sharad

Security & Privacy are Critically Important Issues in Todays Digitally Connected Age.

See It! (m4v Video) Hear it! (m4b Audio)


Dan Moniz

The Impact of P2P on Security in the Enterprise

Hear it! (m4b Audio)


Freaky

OS/X and Macintosh Security

See It! (m4v Video) Hear it! (m4b Audio)

return to top