DEF CON 101 Presentations
Mike Petruzzi (wiseacre), Nikita Kronenberg, PushPin, Plug, Russ Rogers
DEF CON 101: The Panel.
David An
When the Secretary of State says: “Please Stop Hacking Us…”
Read It! (PDF)
Amit Ashbel, Maty Siman
Game of Hacks: Play, Hack & Track
Read It! (PDF)
Fernando Arnaboldi
Abusing XSLT for Practical Attacks
Francis Brown, Shubham Shah
RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID
Grant Bugher
It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence
Read It! (PDF)
DaKahuna, satanklawz
Introduction to SDR and the Wireless Village
Read It! (PDF)
Peter Desfigies, Joshua Brierton, Naveed Ul Islam
Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques
Peter Eckersley, James Kasten, Yan Zhu
Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web
Sarah Edwards
Ubiquity Forensics - Your iCloud and You
Read It! (PDF)
Eijah
Crypto for Hackers
Read It! (PDF)
Saif El-Sherei, Etienne Stalmans
Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers
Read It! (PDF)
Justin Engler
Secure Messaging for Normal People
Read It! (PDF | White paper)
Zack Fasel
Seeing through the Fog
Aaron Grattafiori
Linux Containers: Future or Fantasy?
Jason Haddix
How to Shot Web: Web and mobile hacking in 2015
Read It! (PDF)
David Huerta
Alice and Bob are Really Confused
Read It! (PDF)
Ian Kline
LTE Recon and Tracking with RTLSDR
Read It! (PDF)
Gerard Laygui
Forensic Artifacts From a Pass the Hash Attack
Read It! (PDF)
LI Jun, YANG Qing
I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices
Read It! (PDF)
Dennis Maldonado
Are We Really Safe? - Bypassing Access Control Systems
"Unregistered436" Patrick McNeil, "Snide" Owen
Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present
Read It! (PDF)
John Menerick
Backdooring Git
Read It! (PDF)
Nemus
Hacking SQL Injection for Remote Code Execution on a LAMP stack
Read It! (PDF)
Sean Pierce
Abusing native Shims for Post Exploitation
Dr. Phil Polstra
Hacker in the Wires
Bruce Potter
A Hacker’s Guide to Risk
Read It! (PDF)
Vivek Ramachandran
Chellam – a Wi-Fi IDS/Firewall for Windows
Teddy Reed, Nick Anderson
Hardware and Trust Security: Explain it like I’m 5
Bruce Schneier
Bruce Schneier Q&A
Michael Schrenk
Applied Intelligence: Using Information That's Not There
Read It! (PDF)
Mike Sconzo
I Am Packer And So Can You
Read It! (PDF)
Chris Sistrunk
NSM 101 for ICS
Read It! (PDF)
Damon Small
Beyond the Scan: The Value Proposition of Vulnerability Assessment
Read It! (PDF)
Mark Ryan Talabis
The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic
Read It! (PDF)
Topher Timzen
Hijacking Arbitrary .NET Application Control Flow
Tottenkoph, IrishMASMS
Hackers Hiring Hackers - How to Do Things Better
Read It! (PDF)
Tony Trummer, Tushar Dalvi
QARK: Android App Exploit and SCA Tool
Read It! (PDF)
Brent White
Hacking Web Apps
Read It! (PDF)
Zoz
And That's How I Lost My Other Eye: Further Explorations In Data Destruction
Presentations
Zack Allen, Rusty Bower
Malware in the Gaming Micro-economy
Read It! (PDF)
Paul Amicelli, Baptiste David
How to secure the keyboard chain
Read It! (PDF)
AmmonRa
How to hack your way out of home detention
Read It! (PDF)
atlas
Fun with Symboliks
Read It! (PDF)
Jean-Philippe Aumasson
Quantum Computers vs. Computers Security
Read It! (PDF)
Yaniv Balmas, Lior Oppenheim
Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster
Read It! (PDF)
Rob Bathurst (evilrob), Jeff Thomas (xaphan)
Canary: Keeping Your Dick Pics Safe(r)
Read It! (PDF)
Matteo Beccaro, Matteo Collura
Extracting the Painful (blue)tooth
Read It! (PDF)
Andres Blanco, Andres Gazzoli
802.11 Massive Monitoring
Read It! (PDF)
Ronny L. Bull, Jeanna N. Matthews
Exploring Layer 2 Network Security in Virtualized Environments
Yuriy Bulygin, Mikhail Gorobets, Alexander Matrosov, Oleksandr Bazhaniuk, Andrew Furtak
Attacking Hypervisors Using Firmware and Hardware
Matt Cagle, Eric Cheng
Who Will Rule the Sky? The Coming Drone Policy Wars
Colin Cassidy, Éireann Leverett, Robert M. Lee
Switches Get Stitches
Read It! (PDF)
Ryan Castellucci
Cracking Cryptocurrency Brainwallets
Read It! (PDF)
Benjamin Caudill
CANCELLED
Paranoia and ProxyHam: High-Stakes Anonymity on the Internet
Omer Coskun
Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts
Read It! (PDF)
Daniel “unicornFurnace” Crowley, Damon Smith
Bugged Files: Is Your Document Telling on You?
Read It! (PDF)
Tom Cross aka Decius, Collin Anderson
Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?
Read It! (PDF)
Eric (XlogicX) Davisson
REvisiting RE:DoS
Read It! (PDF)
Jim Denaro, Dave Aitel, Matt Blaze, Nate Cardozo, Mara Tam, Catherine “Randy” Wheeler
Licensed to Pwn: The Weaponization and Regulation of Security Research
Alessandro Di Federico, Yan Shoshitaishvili
Dark side of the ELF - leveraging dynamic loading to pwn noobs
Read It! (PDF)
Cory Doctorow
Fighting Back in the War on General Purpose Computers
Chris Domas
REpsych: Psychological Warfare in Reverse Engineering
Read It! (PDF)
Jeremy Dorrough
USB Attack to Decrypt Wi-Fi Communications
Read It! (PDF)
Nadeem Douba
BurpKit - Using WebKit to Own the Web
Joshua J. Drake
Stagefright: Scary Code in the Heart of Android
Scott Erven, Mark Collao
Medical Devices: Pwnage and Honeypots
Joe FitzPatrick, Matt King
NSA Playset: JTAG Implants
fluxist
CANCELLED
Unbootable: Exploiting the PayLock SmartBoot Vehicle Immobilizer
Christian (@xntrik) Frichot
Hooked Browser Meshed-Networks with WebRTC and BeEF
Read It! (PDF)
Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman
Abusing Adobe Reader’s JavaScript APIs
Read It! (PDF)
Matt Graeber, Willi Ballenthin, Claudiu Teodorescu
WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis
Read It! (PDF)
Robert Graham, David Maynor
HamSammich – long distance proxying over radio
Weston Hecker
Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”
Read It! (PDF)
Lin Huang, Qing Yang
Low-cost GPS simulator – GPS spoofing by SDR
Read It! (PDF)
Dan Kaminsky
I want these * bugs off my * Internet
Samy Kamkar
Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars
Rich Kelley
Harness: Powershell Weaponization Made Easy (or at least easier)
Read It! (PDF)
Trammel Hudson, Xeno Kovah, Corey Kallenberg
ThunderStrike 2: Sith Strike
Marina Krotofil, Jason Larsen
Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion
Bart Kulach (Bartlomiej Jakub Kulach)
Hack the Legacy! IBM i (aka AS/400) Revealed.
Read It! (PDF)
Ian Latter
Remote Access, the APT
Read It! (PDF)
Ricky "HeadlessZeke" Lawshae
Let's Talk About SOAP, Baby. Let's Talk About UPNP
Marte Løge
Tell me who you are and I will tell you your lock pattern
Read It! (PDF)
LosT
Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey
Morgan Marquis-Boire, Marion Marschalek, Claudio Guarnieri
F*ck the attribution, show us your .idb!
Etienne Martineau
Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core
Read It! (PDF)
Alejandro Mayorkas
Working together to keep the Internet safe and secure