DefCon 23

 

DEF CON 101 Presentations


Mike Petruzzi (wiseacre), Nikita Kronenberg, PushPin, Plug, Russ Rogers

DEF CON 101: The Panel.

 

Return to Top


David An

When the Secretary of State says: “Please Stop Hacking Us…”

Read It! (PDF)

Return to Top


Amit Ashbel, Maty Siman

Game of Hacks: Play, Hack & Track

Read It! (PDF)

Return to Top


Fernando Arnaboldi

Abusing XSLT for Practical Attacks

Read It! (1 | 2)

Return to Top


Francis Brown, Shubham Shah

RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

 

Return to Top


Grant Bugher

It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence

Read It! (PDF)

Return to Top


DaKahuna, satanklawz

Introduction to SDR and the Wireless Village

Read It! (PDF)

Return to Top


Peter Desfigies, Joshua Brierton, Naveed Ul Islam

Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques

Read It! (PDF | TXT)

Return to Top


Peter Eckersley, James Kasten, Yan Zhu

Let's Encrypt - Minting Free Certificates to Encrypt the Entire Web

 

Return to Top


Sarah Edwards

Ubiquity Forensics - Your iCloud and You

Read It! (PDF)

Return to Top


Eijah

Crypto for Hackers

Read It! (PDF)

Return to Top


Saif El-Sherei, Etienne Stalmans

Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers

Read It! (PDF)

Return to Top


Justin Engler

Secure Messaging for Normal People

Read It! (PDF | White paper)

Return to Top


Zack Fasel

Seeing through the Fog

 

Return to Top


Aaron Grattafiori

Linux Containers: Future or Fantasy?

 

Return to Top


Jason Haddix

How to Shot Web: Web and mobile hacking in 2015

Read It! (PDF)

Return to Top


David Huerta

Alice and Bob are Really Confused

Read It! (PDF)

Return to Top


Ian Kline

LTE Recon and Tracking with RTLSDR

Read It! (PDF)

Return to Top


Gerard Laygui

Forensic Artifacts From a Pass the Hash Attack

Read It! (PDF)

Return to Top


LI Jun, YANG Qing

I’m A Newbie Yet I Can Hack ZigBee – Take Unauthorized Control Over ZigBee Devices

Read It! (PDF)

Return to Top


Dennis Maldonado

Are We Really Safe? - Bypassing Access Control Systems

 

Return to Top


"Unregistered436" Patrick McNeil, "Snide" Owen

Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present

Read It! (PDF)

Return to Top


John Menerick

Backdooring Git

Read It! (PDF)

Return to Top


Nemus

Hacking SQL Injection for Remote Code Execution on a LAMP stack

Read It! (PDF)

Return to Top


Sean Pierce

Abusing native Shims for Post Exploitation

 

Return to Top


Dr. Phil Polstra

Hacker in the Wires

Read It! (PDF | Extras)

Return to Top


Bruce Potter

A Hacker’s Guide to Risk

Read It! (PDF)

Return to Top


Vivek Ramachandran

Chellam – a Wi-Fi IDS/Firewall for Windows

 

Return to Top


Teddy Reed, Nick Anderson

Hardware and Trust Security: Explain it like I’m 5

 

Return to Top


Bruce Schneier

Bruce Schneier Q&A

 

Return to Top


Michael Schrenk

Applied Intelligence: Using Information That's Not There

Read It! (PDF)

Return to Top


Mike Sconzo

I Am Packer And So Can You

Read It! (PDF)

Return to Top


Chris Sistrunk

NSM 101 for ICS

Read It! (PDF)

Return to Top


Damon Small

Beyond the Scan: The Value Proposition of Vulnerability Assessment

Read It! (PDF)

Return to Top


Mark Ryan Talabis

The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic

Read It! (PDF)

Return to Top


Topher Timzen

Hijacking Arbitrary .NET Application Control Flow

Read It! (1 | 2)

Return to Top


Tottenkoph, IrishMASMS

Hackers Hiring Hackers - How to Do Things Better

Read It! (PDF)

Return to Top


Tony Trummer, Tushar Dalvi

QARK: Android App Exploit and SCA Tool

Read It! (PDF)

Return to Top


Brent White

Hacking Web Apps

Read It! (PDF)

Return to Top


Zoz

And That's How I Lost My Other Eye: Further Explorations In Data Destruction

 

Return to Top



 

Presentations



Zack Allen, Rusty Bower

Malware in the Gaming Micro-economy

Read It! (PDF)

Return to Top


Paul Amicelli, Baptiste David

How to secure the keyboard chain

Read It! (PDF)

Return to Top


AmmonRa

How to hack your way out of home detention

Read It! (PDF)

Return to Top


atlas

Fun with Symboliks

Read It! (PDF)

Return to Top


Jean-Philippe Aumasson

Quantum Computers vs. Computers Security

Read It! (PDF)

Return to Top


Yaniv Balmas, Lior Oppenheim

Key-Logger, Video, Mouse — How To Turn Your KVM Into a Raging Key-logging Monster

Read It! (PDF)

Return to Top


Rob Bathurst (evilrob), Jeff Thomas (xaphan)

Canary: Keeping Your Dick Pics Safe(r)

Read It! (PDF)

Return to Top


Matteo Beccaro, Matteo Collura

Extracting the Painful (blue)tooth

Read It! (PDF)

Return to Top


Andres Blanco, Andres Gazzoli

802.11 Massive Monitoring

Read It! (PDF)

Return to Top


Ronny L. Bull, Jeanna N. Matthews

Exploring Layer 2 Network Security in Virtualized Environments

 

Return to Top


Yuriy Bulygin, Mikhail Gorobets, Alexander Matrosov, Oleksandr Bazhaniuk, Andrew Furtak

Attacking Hypervisors Using Firmware and Hardware

 

Return to Top


Matt Cagle, Eric Cheng

Who Will Rule the Sky? The Coming Drone Policy Wars

 

Return to Top


Colin Cassidy, Éireann Leverett, Robert M. Lee

Switches Get Stitches

Read It! (PDF)

Return to Top


Ryan Castellucci

Cracking Cryptocurrency Brainwallets

Read It! (PDF)

Return to Top


Benjamin Caudill

CANCELLED

Paranoia and ProxyHam: High-Stakes Anonymity on the Internet

 

Return to Top


Omer Coskun

Why nation-state malwares target Telco Networks: Dissecting technical capabilities of Regin and its counterparts

Read It! (PDF)

Return to Top


Daniel “unicornFurnace” Crowley, Damon Smith

Bugged Files: Is Your Document Telling on You?

Read It! (PDF)

Return to Top


Tom Cross aka Decius, Collin Anderson

Do Export Controls on “Intrusion Software” Threaten Vulnerability Research?

Read It! (PDF)

Return to Top


Eric (XlogicX) Davisson

REvisiting RE:DoS

Read It! (PDF)

Return to Top


Jim Denaro, Dave Aitel, Matt Blaze, Nate Cardozo, Mara Tam, Catherine “Randy” Wheeler

Licensed to Pwn: The Weaponization and Regulation of Security Research

 

Return to Top


Alessandro Di Federico, Yan Shoshitaishvili

Dark side of the ELF - leveraging dynamic loading to pwn noobs

Read It! (PDF)

Return to Top


Cory Doctorow

Fighting Back in the War on General Purpose Computers

 

Return to Top


Chris Domas

REpsych: Psychological Warfare in Reverse Engineering

Read It! (PDF)

Return to Top


Jeremy Dorrough

USB Attack to Decrypt Wi-Fi Communications

Read It! (PDF)

Return to Top


Nadeem Douba

BurpKit - Using WebKit to Own the Web

Read It! (PDF | Extras)

Return to Top


Joshua J. Drake

Stagefright: Scary Code in the Heart of Android

 

Return to Top


Scott Erven, Mark Collao

Medical Devices: Pwnage and Honeypots

 

Return to Top


Joe FitzPatrick, Matt King

NSA Playset: JTAG Implants

 

Return to Top


fluxist

CANCELLED

Unbootable: Exploiting the PayLock SmartBoot Vehicle Immobilizer

 

Return to Top


Christian (@xntrik) Frichot

Hooked Browser Meshed-Networks with WebRTC and BeEF

Read It! (PDF)

Return to Top


Brian Gorenc, Abdul-Aziz Hariri, Jasiel Spelman

Abusing Adobe Reader’s JavaScript APIs

Read It! (PDF)

Return to Top


Matt Graeber, Willi Ballenthin, Claudiu Teodorescu

WhyMI so Sexy? WMI Attacks, Real-Time Defense, and Advanced Forensic Analysis

Read It! (PDF)

Return to Top


Robert Graham, David Maynor

HamSammich – long distance proxying over radio

 

Return to Top


Weston Hecker

Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

Read It! (PDF)

Return to Top


Lin Huang, Qing Yang

Low-cost GPS simulator – GPS spoofing by SDR

Read It! (PDF)

Return to Top


Dan Kaminsky

I want these * bugs off my * Internet

 

Return to Top


Samy Kamkar

Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars

Read It! (TXT | Extras)

Return to Top


Rich Kelley

Harness: Powershell Weaponization Made Easy (or at least easier)

Read It! (PDF)

Return to Top


Trammel Hudson, Xeno Kovah, Corey Kallenberg

ThunderStrike 2: Sith Strike

 

Return to Top


Marina Krotofil, Jason Larsen

Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

Read It! (1 | 2)

Return to Top


Bart Kulach (Bartlomiej Jakub Kulach)

Hack the Legacy! IBM i (aka AS/400) Revealed.

Read It! (PDF)

Return to Top


Ian Latter

Remote Access, the APT

Read It! (PDF)

Return to Top


Ricky "HeadlessZeke" Lawshae

Let's Talk About SOAP, Baby. Let's Talk About UPNP

Read It! (PDF | Extras)

Return to Top


Marte Løge

Tell me who you are and I will tell you your lock pattern

Read It! (PDF)

Return to Top


LosT

Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey

 

Return to Top


Morgan Marquis-Boire, Marion Marschalek, Claudio Guarnieri

F*ck the attribution, show us your .idb!

 

Return to Top


Etienne Martineau

Inter-VM data exfiltration: The art of cache timing covert channel on x86 multi-core

Read It! (PDF)

Return to Top


Alejandro Mayorkas

Working together to keep the Internet safe and secure

 

Return to Top


Wesley McGrew

I Hunt Penetration Testers: More Weaknesses in Tools and Procedures

Read It! (PDF | White Paper)

Return to Top


Terrell McSweeny, Ashkan Soltani

How to Hack Government: Technologists as Policy Makers

 

Return to Top


Sean Metcalf

Red vs. Blue: Modern Active Directory Attacks & Defense

Read It! (PDF)

Return to Top


miaubiz

Put on your tinfo_t hat if you're my type

Read It! (PDF)

Return to Top


Charlie Miller, Chris Valasek

Remote Exploitation of an Unaltered Passenger Vehicle

 

Return to Top


Ryan Mitchell

Separating Bots from the Humans

Read It! (PDF)

Return to Top


Colby Moore

Spread Spectrum Satcom Hacking: Attacking The GlobalStar Simplex Data Service

Read It! (PDF)

Return to Top


David Mortman

Docker, Docker, Give Me The News, I Got A Bad Case Of Securing You

Read It! (PDF)

Return to Top


Mahdi Namazifar

Detecting Randomly Generated Strings; A Language Based Approach

Read It! (PDF)

Return to Top


Colin O'Flynn

Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit

Read It! (PDF)

Return to Top


Ryan O'Neill

Advances in Linux Process Forensics Using ECFS

Read It! (PDF)

Return to Top


Kurt Opsahl, Nate Cardozo, Mark Jaycox, Corynne McSherry, Nadia Kayyali, Peter Eckersley

Ask the EFF: The Year in Digital Civil Liberties

 

Return to Top


Larry Pesce, Chris Sistrunk, Will "illwill" Genovese, Chris Blow, Dan Tentler, Amanda Berlin

DEF CON Comedy Inception: How many levels deep can we go?

Read It! (PDF)

Return to Top


Dan “AltF4” Petro, Oscar Salazar

Hacking Smart Safes: On the "Brink" of a Robbery

 

Return to Top


Gregory Pickett

Staying Persistent in Software Defined Networks

Read It! (PDF)

Return to Top


Dr. Phil Polstra

One Device to Pwn Them All

Read It! (PDF | Extras)

Return to Top


Ionut Popescu

NetRipper - Smart traffic sniffing for penetration testers

Read It! (PDF | White Paper)

Return to Top


Vivek Ramachandran

Chigula — a framework for Wi-Fi Intrusion Detection and Forensics

Read It! (PDF)

Return to Top


Michael Robinson

Knocking my neighbor’s kid’s cruddy drone offline

Read It! (PDF)

Return to Top


Chris Rock

I Will Kill You

Read It! (PDF)

Return to Top


Marc Rogers, Kevin Mahaffey

How to Hack a Tesla Model S

 

Return to Top


Mike Ryan, Richo Healey

Hacking Electric Skateboards: Vehicle Research For Mortals

Read It! (PDF)

Return to Top


Runa A. Sandvik, Michael Auger

When IoT attacks: hacking a Linux-powered rifle

 

Return to Top


Daniel Selifonov

Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities

Read It! (PDF)

Return to Top


Jose Selvi

Breaking SSL Using Time Synchronisation Attacks

Read It! (PDF)

Return to Top


John Seymour

"Quantum" Classification of Malware

Read It! (PDF | White Paper)

Return to Top


Peter Shipley, Ryan Gooler

Insteon' False Security And Deceptive Documentation

 

Return to Top


Mickey Shkatov, Jesse Michael

Scared Poopless – LTE and *your* laptop 

Read It! (PDF)

Return to Top


Yan Shoshitaishvili, Fish Wang

Angry Hacking - the next generation of binary analysis

Read It! (PDF)

Return to Top


Joshua Smith

High-Def Fuzzing: Exploring Vulnerabilities in HDMI-CEC

Read It! (PDF)

Return to Top


Aditya K Sood

Dissecting the Design of SCADA Web Human Machine Interfaces (HMIs) - Hunting Vulnerabilities

 

Return to Top


Tamas Szakaly

Shall We Play a Game?

Read It! (PDF)

Return to Top


3AlarmLampscooter

DIY Nukeproofing: a new dig at "data-mining"

Read It! (PDF)

Return to Top


Richard Thieme

Hacking the Human Body/brain: Identity Shift, the Shape of a New Self, and Humanity 2.0

 

Return to Top


Nir Valtman, Moshe Ferber

From 0 To Secure In 1 Minute — Securing IAAS

Read It! (PDF)

Return to Top


Eric Van Albert, Zach Banks

Looping Surveillance Cameras through Live Editing of Network Streams

Read It! (PDF)

Return to Top


Michael Walker, Jordan Wiens

Machine vs. Machine: Inside DARPA’s Fully Automated CTF

 

Return to Top


Geoff Walton, Dave Kennedy

Pivoting Without Rights – Introducing Pivoter

 

Return to Top


Patrick Wardle

'DLL Hijacking' on OS X? #@%& Yeah!

Read It! (PDF)

Return to Top


Patrick Wardle

Stick That In Your (root)Pipe & Smoke It

Read It! (PDF)

Return to Top


Ken Westin

Confessions of a Professional Cyber Stalker

Read It! (PDF)

Return to Top


Craig Young

How to Train Your RFID Hacking Tools

Read It! (PDF)

Return to Top


Luke Young

Investigating the Practicality and Cost of Abusing Memory Errors with DNS

 

Return to Top


Philip Young, Chad "Bigendian Smalls” Rikansrud

Security Necromancy: Further Adventures in Mainframe Hacking

Read It! (PDF | Extras)

Return to Top


Yuwei Zheng, Haoqi Shan

Build a free cellular traffic capture tool with a vxworks based femoto

Read It! (PDF)