596 |
597 | 598 |

Presentations & Workshops

599 | 600 |
601 |
602 |
603 |

Packet Hacking Village Talks at DEF CON 26

604 |

An Analysis of Cybersecurity Educational Standards

605 |

Rob Olson

606 | 609 |

Burning the Lookout

610 |

Silas Cutler

611 | 614 |

Defense in Depth: The Path to SGX at Akamai

615 |

Samuel Erb

616 | 619 |

Grand Theft Auto: Digital Key Hacking

620 |

Huajiang "Kevin2600" Chen

621 | 624 |

How to Tune Automation to Avoid False Positives

625 |

Gita Ziabari

626 | 629 |

Mapping Wi-Fi Networks and Triggering on Interesting Traffic Patterns

630 |

Caleb Madrigal

631 | 634 |

Microcontrollers and Single Board Computers for Hacking, Fun and Profit

635 |

gh057

636 | 639 |

Normalizing Empire's Traffic to Evade Anomaly-Based IDS

640 |

Utku Sen

641 | 644 |

An OSINT Approach to Third Party Cloud Service Provider Evaluation

645 |

Lokesh Pidawekar

646 | 649 |

Protecting Crypto Exchanges From a New Wave of Man-in-the-Browser Attacks

650 |

Pedro Fortuna

651 | 654 |

Turning Deception Outside-In: Tricking Attackers with OSINT

655 |

Hadar Yudovich, Tom Kahana, Tom Sela

656 | 659 |

wpa-sec: The Largest Online WPA Handshake Database

660 |

A. Stanev

661 | 664 |

Speaker Workshops at DEF CON 25

665 |

AWS Persistence and Lateral Movement Techniques

666 |

Peter Ewane

667 | 670 |

CVE IDs and How to Get Them

671 |

Daniel Adinolfi and Anthony Singleton

672 | 675 |

Fooling the Hound: Deceiving Domain Admin Hunters

676 |

Tom Sela

677 | 680 |

Fortune 100 InfoSec on a State Government Budget

681 |

Eric Capuano

682 | 685 |

How Hackers Changed The Security Industry

686 |

Chris Wysopal

687 | 690 |

Hunting Down the Domain Admin and Rob Your Network

691 |

Keith Lee and Michael Gianarakis

692 | 695 |

IP Spoofing

696 |

Marek Majkowski

697 | 700 |

Iron Sights for Your Data

701 |

Leah Figueroa

702 | 705 |

Layer 8 and Why People are the Most Important Security Tool

706 |

Damon Small

707 | 710 |

Modern Day CovertTCP with a Twist

711 |

Mike Raggo and Chet Hosmer

712 | 715 |

Passwords on a Phone

716 |

Sam Bowne

717 | 720 |

Past, Present and Future of High Speed Packet Filtering on Linux

721 |

Gilberto Bertin

722 | 725 |

Stories from a 15 days SMB Honeypot: Mum, Tons of WannaCry and Evils Attacked Our Home!

726 |

Tan Kean Siong

727 | 730 |

Strengthen Your SecOps Team by Leveraging Neurodiversity

731 |

Megan Roddie

732 | 735 |

Threat Intel for All: There's More to Your Data Than Meets the Eye

736 |

Cheryl Biswas

737 | 740 |

Visual Network and File Forensics

741 |

Ankur Tyagi

742 | 745 |

When the Current Ransomware and Payload of the Day (CRAP of the day) Hits the Fan: Breaking the Bad News

746 |

Catherine Ullman and Chris Roberts

747 | 750 |

XSS FTW - What Can Really Be Done With Cross-Site Scripting

751 |

Brute Logic

752 | 755 |

YALDA - Large Scale Data Mining for Threat Intelligence

756 |

Gita Ziabari

757 | 760 |

You're Going to Connect to the Wrong Domain Name

761 |

Sam Erb

762 | 766 |

Speaker Workshops at DEF CON 24

767 |

Attacks on Enterprise Social Media

768 |

Mike Raggo

769 | 772 |

Automated Dorking for Fun and Profit^WSalary

773 |

Filip Reesalu

774 | 777 |

Building a Local Passive DNS Tool for Threat Intelligence Research

778 |

Kathy Wang

779 | 782 |

Chasing the Long Tail: Cracking Complex Passwords

783 |

Phil Trainor

784 | 787 |

Connections: From the Eisenhower Interstate System to the Internet

788 |

Chef

789 | 792 |

Deceive and Succeed: Measuring the Efficiency of a Deception Eco-System in Post-Breach Detection

793 |

Omer Zohar

794 | 797 |

Dynamic Population Discovery for Lateral Movement Detection (Using Machine Learning)

798 |

Rod Soto and Joseph Zadeh

799 | 802 |

Fuzzing For Humans: Real Fuzzing in the Real World

803 |

Joshua Pereyda

804 | 807 |

How to Find 1,352 WordPress XSS Plugin Vulnerabilities in 1 Hour (not really)

808 |

Larry Cashdollar

809 | 812 |

LTE and Its Collective Insecurity

813 |

Chuck McAuley and Chris Moore

814 | 817 |

Presenting Security Metrics to the Board / Leadership

818 |

Walt Williams

819 | 822 |

To Catch An APT: YARA

823 |

Jay DiMartino

824 | 827 |

You Are Being Manipulated

828 |

GrayRaven

829 | 832 |

Speaker Workshops at DEF CON 23

833 |

All videos are now available on YouTube: https://www.youtube.com/channel/UCnL9S5Wv_dNvO381slSA06w.

834 |

Creating REAL Threat Intelligence with Evernote

835 |

grecs

836 | 839 |

The Digital Cockroach Bait Station: How to Build Spam Honeypots

840 |

Robert Simmons

841 | 844 |

dnstap - A Standard Interface to Real Time DNS Transaction Flows

845 |

Paul Vixie

846 | 849 |

From XSS to Root on Your NAS

850 |

Tony Martin

851 | 854 |

Global Honeypot Trend

855 |

Elliott Brink

856 | 859 |

Hacker's Practice Playground

860 |

Lokesh Pidawekar

861 | 864 |

I See You

865 |

Brian Wohlwinder and Andrew Beard, Fidelis

866 | 869 |

Is Your Android App Secure?

870 |

Sam Bowne

871 | 874 |

MITM 101: Easy Traffic Interception Techniques Using Scapy

875 |

Bob Simpson

876 | 879 |

The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC

880 |

Leon Ward

881 | 884 |

PowerShell for Penetration Testers

885 |

Nikhil Mittal

886 | 889 |

Speaker Workshops at DEF CON 22

890 |

Abusing Microsoft Kerberos: Sorry You Guys Don't Get It (Black Hat 2014 Encore)

891 |

Alva Duckwall
Benjamin Delpy

892 |
    893 |
  • Presentation slides
  • 894 |
895 |

The Art of Botnet Tracking and Attribution

896 |

Jozef Mlodzianowski, Malware Researcher at Sub0Day

897 |
    898 |
  • Presentation slides
  • 899 |
900 |

Data Hiding: A Peek at the Latest Innovations

901 |

Michael Raggo, Security Evangelist at MobileIron
Chet Hosmer, Founder & Chief Scientist at WetStone Technologies, Inc.

902 |
    903 |
  • Presentation slides
  • 904 |
905 |

Don't Get Owned at DEF CON: Single Packet Authorization and SSH Tunneling

906 |

Jay Beale, InGuardians

907 | 910 |

Exploit Development for Beginners

911 |

Sam Bowne, Instructor at CCSF

912 | 917 |

How Machine Learning Finds Malware Needles in an AppStore Haystack

918 |

Theodora Titonis, Vice President of Mobile Security at Veracode

919 |
    920 |
  • Presentation slides
  • 921 |
922 |

iOS Attachment Vulnerability

923 |

Michael Raggo, Security Evangelist at MobileIron

924 |
    925 |
  • Presentation slides
  • 926 |
927 |

Making Mongo Cry: Automated NoSQL exploitation with NoSQLMap

928 |

Russell Butturini

929 | 933 |

MetaData: PII at Risk

934 |

Sudesh Gadewar, Information Security Engineer at Cisco

935 | 938 |

Mobile Network Forensics

939 |

Michael Raggo, Security Evangelist at MobileIron

940 |
    941 |
  • Presentation slides
  • 942 |
943 |

Mobile SSL Failures

944 |

Tony Trummer, Senior Information Security Engineer, Vulnerability Research and Assessment at LinkedIn
Tushar Dalvi, Senior Information Security Engineer, Vulnerability Research and Assessment at LinkedIn

945 | 949 |

Multipath TCP: Breaking Today's Networks with Tomorrow's Protocols (Black Hat 2014 Encore)

950 |

Catherine (Kate) Pearce, Security Consultant at Neohapsis
Patrick Thomas, Security Consultant at Neohapsis

951 |
    952 |
  • Presentation slides
  • 953 |
954 |

Network Based File Carving

955 |

GTKlondike, Independent Security Researcher

956 | 959 |

One Social Profile To Rule Them All

960 |

Joseph Muniz, Consulting Security Engineer at Cisco
Aamir Lakhani, DrChaos.com

961 |
    962 |
  • Presentation slides
  • 963 |
964 |

Tools and Techniques Used at the Wall of Sheep

965 |

Ming Chow, Wall of Sheep

966 | 969 |

Vaccinating APK's and even Android

970 |

Milan Gabor, CEO of Viris Ltd.
Danijel Grah, Consultant at Viris d.o.o.

971 | 976 |

Violent Python

977 |

Sam Bowne, Instructor at CCSF

978 | 982 |

ZitMo NoM (ZeuS-in-the-Mobile No More)

983 |

David Schwartzberg, Senior Security Engineer at MobileIron

984 |
    985 |
  • Presentation slides
  • 986 |
987 |

Speaker Workshops at DEF CON 21

988 |

For abstract and bios, see original schedule

989 |

Got Spies in Your Wires?

990 |

Evan Peña, Mandiant Corporation
Chuck Willis Mandiant Corporation

991 | 994 |

Juice Jacking Unearthed

995 |

Robert Rowley Security Researcher, Trustwave

996 | 999 |

Owning a Fully Patched Windows 7 Machine with RDP

1000 |

Wicked Clown

1001 | 1004 |

Reverse Engineering with DOSBox for LOLz and Profit

1005 |

Michael Spicer

1006 |

1007 |

SO HOpelessly Broken: The Implications of Pervasive Vulnerabilities in SOHO Router Products

1008 |

Jacob Holcomb Security Analyst, Independent Security Evaluators

1009 | 1012 |

Tools and Techniques to Succeed at the Wall of Sheep

1013 |

Ming Chow, Wall of Sheep

1014 | 1017 |
1018 |
1019 | 1020 | 1021 |
1022 | 1023 | 1024 | 1025 | 1080 | 1081 | 1082 | 1083 |
1084 | 1085 | 1086 |
1087 | 1088 |
1089 |
1090 | 1096 |
1097 | 1098 | 1099 |