Presentations & Workshops
599 | 600 |Packet Hacking Village Talks at DEF CON 26
604 |An Analysis of Cybersecurity Educational Standards
605 |Rob Olson
606 |-
607 |
- Presentation slides (PDF) 608 |
Burning the Lookout
610 |Silas Cutler
611 |-
612 |
- Presentation slides (SlideShare) 613 |
Defense in Depth: The Path to SGX at Akamai
615 |Samuel Erb
616 |-
617 |
- Presentation slides (PDF) 618 |
Grand Theft Auto: Digital Key Hacking
620 |Huajiang "Kevin2600" Chen
621 |-
622 |
- Presentation slides (SlideShare) 623 |
How to Tune Automation to Avoid False Positives
625 |Gita Ziabari
626 |-
627 |
- Presentation slides (PDF) 628 |
Mapping Wi-Fi Networks and Triggering on Interesting Traffic Patterns
630 |Caleb Madrigal
631 |-
632 |
- Presentation slides (PDF) 633 |
Microcontrollers and Single Board Computers for Hacking, Fun and Profit
635 |gh057
636 |-
637 |
- Presentation slides (SlideShare) 638 |
Normalizing Empire's Traffic to Evade Anomaly-Based IDS
640 |Utku Sen
641 |-
642 |
- Presentation slides (PDF) 643 |
An OSINT Approach to Third Party Cloud Service Provider Evaluation
645 |Lokesh Pidawekar
646 |-
647 |
- Presentation slides (PDF) 648 |
Protecting Crypto Exchanges From a New Wave of Man-in-the-Browser Attacks
650 |Pedro Fortuna
651 |-
652 |
- Presentation slides (PDF) 653 |
Turning Deception Outside-In: Tricking Attackers with OSINT
655 |Hadar Yudovich, Tom Kahana, Tom Sela
656 |-
657 |
- Presentation slides (PDF) 658 |
wpa-sec: The Largest Online WPA Handshake Database
660 |A. Stanev
661 |-
662 |
- Presentation slides (PDF) 663 |
Speaker Workshops at DEF CON 25
665 |AWS Persistence and Lateral Movement Techniques
666 |Peter Ewane
667 |-
668 |
- Presentation slides (PDF) 669 |
CVE IDs and How to Get Them
671 |Daniel Adinolfi and Anthony Singleton
672 |-
673 |
- Presentation slides (PDF) 674 |
Fooling the Hound: Deceiving Domain Admin Hunters
676 |Tom Sela
677 |-
678 |
- Presentation slides (PDF) 679 |
Fortune 100 InfoSec on a State Government Budget
681 |Eric Capuano
682 |-
683 |
- Presentation slides (PDF) 684 |
How Hackers Changed The Security Industry
686 |Chris Wysopal
687 |-
688 |
- Presentation slides (PDF) 689 |
Hunting Down the Domain Admin and Rob Your Network
691 |Keith Lee and Michael Gianarakis
692 |-
693 |
- Presentation slides (PDF) 694 |
IP Spoofing
696 |Marek Majkowski
697 |-
698 |
- Presentation slides (PDF) 699 |
Iron Sights for Your Data
701 |Leah Figueroa
702 |-
703 |
- Presentation slides (PDF) 704 |
Layer 8 and Why People are the Most Important Security Tool
706 |Damon Small
707 |-
708 |
- Presentation slides (PDF) 709 |
Modern Day CovertTCP with a Twist
711 |Mike Raggo and Chet Hosmer
712 |-
713 |
- Presentation slides (PDF) 714 |
Passwords on a Phone
716 |Sam Bowne
717 |-
718 |
- Presentation slides (PDF) 719 |
Past, Present and Future of High Speed Packet Filtering on Linux
721 |Gilberto Bertin
722 |-
723 |
- Presentation slides (PDF) 724 |
Stories from a 15 days SMB Honeypot: Mum, Tons of WannaCry and Evils Attacked Our Home!
726 |Tan Kean Siong
727 |-
728 |
- Presentation slides (PDF) 729 |
Strengthen Your SecOps Team by Leveraging Neurodiversity
731 |Megan Roddie
732 |-
733 |
- Presentation slides (PDF) 734 |
Threat Intel for All: There's More to Your Data Than Meets the Eye
736 |Cheryl Biswas
737 |-
738 |
- Presentation slides (PDF) 739 |
Visual Network and File Forensics
741 |Ankur Tyagi
742 |-
743 |
- Presentation slides (PDF) 744 |
When the Current Ransomware and Payload of the Day (CRAP of the day) Hits the Fan: Breaking the Bad News
746 |Catherine Ullman and Chris Roberts
747 |-
748 |
- Presentation slides (PDF) 749 |
XSS FTW - What Can Really Be Done With Cross-Site Scripting
751 |Brute Logic
752 |-
753 |
- Presentation slides (PDF) 754 |
YALDA - Large Scale Data Mining for Threat Intelligence
756 |Gita Ziabari
757 |-
758 |
- Presentation slides (PDF) 759 |
You're Going to Connect to the Wrong Domain Name
761 |Sam Erb
762 |-
763 |
- Presentation slides (PDF) 764 |
- GitHub (with latest slides) 765 |
Speaker Workshops at DEF CON 24
767 |Attacks on Enterprise Social Media
768 |Mike Raggo
769 |-
770 |
- Presentation slides (PDF) 771 |
Automated Dorking for Fun and Profit^WSalary
773 |Filip Reesalu
774 |-
775 |
- Presentation slides (PDF) 776 |
Building a Local Passive DNS Tool for Threat Intelligence Research
778 |Kathy Wang
779 |-
780 |
- Presentation slides (PDF) 781 |
Chasing the Long Tail: Cracking Complex Passwords
783 |Phil Trainor
784 |-
785 |
- Presentation slides (PDF) 786 |
Connections: From the Eisenhower Interstate System to the Internet
788 |Chef
789 |-
790 |
- Presentation slides (PDF) 791 |
Deceive and Succeed: Measuring the Efficiency of a Deception Eco-System in Post-Breach Detection
793 |Omer Zohar
794 |-
795 |
- Presentation slides (PDF) 796 |
Dynamic Population Discovery for Lateral Movement Detection (Using Machine Learning)
798 |Rod Soto and Joseph Zadeh
799 |-
800 |
- Presentation slides (PDF) 801 |
Fuzzing For Humans: Real Fuzzing in the Real World
803 |Joshua Pereyda
804 |-
805 |
- Presentation slides (PDF) 806 |
How to Find 1,352 WordPress XSS Plugin Vulnerabilities in 1 Hour (not really)
808 |Larry Cashdollar
809 |-
810 |
- Presentation slides (via SlideShare) 811 |
LTE and Its Collective Insecurity
813 |Chuck McAuley and Chris Moore
814 |-
815 |
- Presentation slides (PDF) 816 |
Presenting Security Metrics to the Board / Leadership
818 |Walt Williams
819 |-
820 |
- Presentation slides (PDF) 821 |
To Catch An APT: YARA
823 |Jay DiMartino
824 |-
825 |
- Presentation slides (PDF) 826 |
You Are Being Manipulated
828 |GrayRaven
829 |-
830 |
- Presentation slides (PDF) 831 |
Speaker Workshops at DEF CON 23
833 |All videos are now available on YouTube: https://www.youtube.com/channel/UCnL9S5Wv_dNvO381slSA06w.
834 |Creating REAL Threat Intelligence with Evernote
835 |grecs
836 |-
837 |
- Presentation slides (via novainfosec.com) 838 |
The Digital Cockroach Bait Station: How to Build Spam Honeypots
840 |Robert Simmons
841 |-
842 |
- Presentation slides 843 |
dnstap - A Standard Interface to Real Time DNS Transaction Flows
845 |Paul Vixie
846 |-
847 |
- Presentation slides 848 |
From XSS to Root on Your NAS
850 |Tony Martin
851 |-
852 |
- Presentation slides (PPTX via neontool.com) 853 |
Global Honeypot Trend
855 |Elliott Brink
856 |-
857 |
- Presentation slides 858 |
Hacker's Practice Playground
860 |Lokesh Pidawekar
861 |-
862 |
- Presentation slides (via SlideShare) 863 |
I See You
865 |Brian Wohlwinder and Andrew Beard, Fidelis
866 |-
867 |
- Presentation slides (via SlideShare) 868 |
Is Your Android App Secure?
870 |Sam Bowne
871 |-
872 |
- Presentation slides (PPTX via samsclass.info) 873 |
MITM 101: Easy Traffic Interception Techniques Using Scapy
875 |Bob Simpson
876 |-
877 |
- Presentation slides 878 |
The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC
880 |Leon Ward
881 |-
882 |
- Presentation slides 883 |
PowerShell for Penetration Testers
885 |Nikhil Mittal
886 |-
887 |
- Presentation slides 888 |
Speaker Workshops at DEF CON 22
890 |Abusing Microsoft Kerberos: Sorry You Guys Don't Get It (Black Hat 2014 Encore)
891 |Alva Duckwall
Benjamin Delpy
892 | -
893 |
- Presentation slides 894 |
The Art of Botnet Tracking and Attribution
896 |Jozef Mlodzianowski, Malware Researcher at Sub0Day
897 |-
898 |
- Presentation slides 899 |
Data Hiding: A Peek at the Latest Innovations
901 |Michael Raggo, Security Evangelist at MobileIron
Chet Hosmer, Founder & Chief Scientist at WetStone Technologies, Inc.
902 | -
903 |
- Presentation slides 904 |
Don't Get Owned at DEF CON: Single Packet Authorization and SSH Tunneling
906 |Jay Beale, InGuardians
907 |-
908 |
- Presentation slides (PDF; via inguardians.com) 909 |
Exploit Development for Beginners
911 |Sam Bowne, Instructor at CCSF
912 |-
913 |
- Linux Buffer Overflow (via samsclass.info) 914 |
- Exploiting "Vulnerable Server" for Windows 7 (via samsclass.info) 915 |
- Additional examples (via samsclass.info) 916 |
How Machine Learning Finds Malware Needles in an AppStore Haystack
918 |Theodora Titonis, Vice President of Mobile Security at Veracode
919 |-
920 |
- Presentation slides 921 |
iOS Attachment Vulnerability
923 |Michael Raggo, Security Evangelist at MobileIron
924 |-
925 |
- Presentation slides 926 |
Making Mongo Cry: Automated NoSQL exploitation with NoSQLMap
928 |Russell Butturini
929 |-
930 |
- Presentation slides (PowerPoint; via nosqlmap.net) 931 |
- Website (nosqlmap.net) 932 |
MetaData: PII at Risk
934 |Sudesh Gadewar, Information Security Engineer at Cisco
935 |-
936 |
- Presentation slides (PowerPoint) 937 |
Mobile Network Forensics
939 |Michael Raggo, Security Evangelist at MobileIron
940 |-
941 |
- Presentation slides 942 |
Mobile SSL Failures
944 |Tony Trummer, Senior Information Security Engineer, Vulnerability Research and Assessment at LinkedIn
Tushar Dalvi, Senior Information Security Engineer, Vulnerability Research and Assessment at LinkedIn
945 | -
946 |
- Presentation slides (on SlideShare) 947 |
- Whitepaper (PDF) 948 |
Multipath TCP: Breaking Today's Networks with Tomorrow's Protocols (Black Hat 2014 Encore)
950 |Catherine (Kate) Pearce, Security Consultant at Neohapsis
Patrick Thomas, Security Consultant at Neohapsis
951 | -
952 |
- Presentation slides 953 |
Network Based File Carving
955 |GTKlondike, Independent Security Researcher
956 |-
957 |
- Presentation slides (PowerPoint) 958 |
One Social Profile To Rule Them All
960 |Joseph Muniz, Consulting Security Engineer at Cisco
Aamir Lakhani, DrChaos.com
961 | -
962 |
- Presentation slides 963 |
Tools and Techniques Used at the Wall of Sheep
965 |Ming Chow, Wall of Sheep
966 |-
967 |
- Presentation slides (PDF) 968 |
Vaccinating APK's and even Android
970 |Milan Gabor, CEO of Viris Ltd.
Danijel Grah, Consultant at Viris d.o.o.
971 | -
972 |
- Whitepaper (PDF) 973 |
- Source code (GitHub) 974 |
- Website (viris.si) 975 |
Violent Python
977 |Sam Bowne, Instructor at CCSF
978 |-
979 |
- Presentation slides (PDF; via samsclass.info) 980 |
- Examples (via samsclass.info) 981 |
ZitMo NoM (ZeuS-in-the-Mobile No More)
983 |David Schwartzberg, Senior Security Engineer at MobileIron
984 |-
985 |
- Presentation slides 986 |
Speaker Workshops at DEF CON 21
988 |For abstract and bios, see original schedule
989 |Got Spies in Your Wires?
990 |Evan Peña, Mandiant Corporation
Chuck Willis Mandiant Corporation
991 | -
992 |
- Presentation slides (PDF) 993 |
Juice Jacking Unearthed
995 |Robert Rowley Security Researcher, Trustwave
996 |-
997 |
- Presentation slides (PDF) 998 |
Owning a Fully Patched Windows 7 Machine with RDP
1000 |Wicked Clown
1001 |-
1002 |
- Presentation slides (PDF) 1003 |
Reverse Engineering with DOSBox for LOLz and Profit
1005 |Michael Spicer
1006 | 1007 |SO HOpelessly Broken: The Implications of Pervasive Vulnerabilities in SOHO Router Products
1008 |Jacob Holcomb Security Analyst, Independent Security Evaluators
1009 |-
1010 |
- Presentation slides (PDF) 1011 |
Tools and Techniques to Succeed at the Wall of Sheep
1013 |Ming Chow, Wall of Sheep
1014 |-
1015 |
- Presentation slides (PDF) 1016 |
1090 | 1096 |
1097 | 1098 | 1099 |