• 10:00
  • Introduction to SDR and the Wireless Village

    DaKahuna, satanklawz
    Thu, 10:00 - 10:50
    DEF CON 101
  • Hardware and Trust Security: Explain it like I’m 5

    Nick Anderson, Ted Reed
    Thu, 10:00 - 10:50
    Track Four
  • 11:00
  • Hackers Hiring Hackers - How to Do Things Better

    IrishMASMS, Tottenkoph
    Thu, 11:00 - 11:50
    DEF CON 101
  • Hacking Web Apps

    Brent White
    Thu, 11:00 - 11:50
    Track Four
  • 12:00
  • DEF CON 101: The Panel.

    Nikita Kronenberg, Mike Petruzzi, Plug, PushPin, Russ Rogers
    Thu, 12:00 - 13:50
    DEF CON 101
  • Seeing through the Fog

    Zack Fasel
    Thu, 12:00 - 12:50
    Track Four
  • 13:00
  • Alice and Bob are Really Confused

    David Huerta
    Thu, 13:00 - 13:50
    Track Four
  • 14:00
  • Beyond the Scan: The Value Proposition of Vulnerability Assessment

    Damon Small
    Thu, 14:00 - 14:50
    DEF CON 101
  • Hacker in the Wires

    Phil Polstra
    Thu, 14:00 - 14:50
    Track Four
  • 15:00
  • Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey

    LosT
    Thu, 15:00 - 15:50
    DEF CON 101
  • Forensic Artifacts From a Pass the Hash Attack

    Gerard Laygui
    Thu, 15:00 - 15:50
    Track Four
  • 16:00
  • Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques

    Joshua Brierton, Peter Desfigies, Naveed Ul Islam
    Thu, 16:00 - 16:50
    DEF CON 101
  • Sorry, Wrong Number: Mysteries Of The Phone System - Past and Present

    Patrick McNeil, Owen
    Thu, 16:00 - 16:50
    Track Four
  • 17:00
  • Dark side of the ELF - leveraging dynamic loading to pwn noobs

    Alessandro Di Federico, Yan Shoshitaishvili
    Thu, 17:00 - 17:50
    DEF CON 101
  • Backdooring Git

    John Menerick
    Thu, 17:00 - 17:50
    Track Four
  • 18:00
  • Medical Devices: Pwnage and Honeypots

    Mark Collao, Scott Erven
    Thu, 18:00 - 18:50
    DEF CON 101
  • Secure Messaging for Normal People

    Justin Engler
    Thu, 18:00 - 18:50
    Track Four