• 00:00
  • Workshop: How Do I TAILS? A Beginner's Guide to Anonymous Computing

    Forrest
    Fri, 00:00 - 00:00
     
  • Pwning IoT with Hardware Attacks

    Chase Shultz
    Fri, 00:00 - 00:00
     
  • Advanced SOHO Router Exploitation

    Lyon Yang
    Fri, 00:00 - 00:00
     
  • Phishing: Recon to Creds with the SpeedPhishing Framework

    Adam Compton, Eric Gershman
    Fri, 00:00 - 00:00
     
  • Creating REAL Threat Intelligence With Evernote

    grecs
    Fri, 00:00 - 00:00
     
  • Hacking the Next Generation

    David Schwartzberg
    Fri, 00:00 - 00:00
     
  • 802.11 Monitoring with PCAP2XML/SQLite

    Vivek Ramachandran
    Fri, 00:00 - 00:00
     
  • The Digital Cockroach Bait Station: How to Build Spam Honeypots

    Robert Simmons
    Fri, 00:00 - 00:00
     
  • Understanding End-User Attacks – Real World Examples

    David Kennedy
    Fri, 00:00 - 00:00
     
  • Fishing To Phishing: It's All About Slimy Creatures

    Wayne Crowder
    Fri, 00:00 - 00:00
     
  • Hacking Satellite TV Receivers

    Sofiane Talmat
    Fri, 00:00 - 00:00
     
  • Hacking You Fat: The FitBit Aria

    David Lodge, Ken Munro
    Fri, 00:00 - 00:00
     
  • Breaking in Bad! (I’m the one who doesn’t knock)

    Jayson E. Street
    Fri, 00:00 - 00:00
     
  • Twitter, ISIL, and Tech

    Tim Newberry
    Fri, 00:00 - 00:00
     
  • A Peek Behind the Blue Mask: The Evolution of the SECTF

    Chris Hadnagy
    Fri, 00:00 - 00:00
     
  • Brain Waves Surfing - (In)security in EEG (Electroencephalography) Technologies

    Alejandro Hernández
    Fri, 00:00 - 00:00
     
  • Underhanded Crypto Contest Wrapup

    Adam Caudill, Taylor Hornby
    Fri, 00:00 - 00:00
     
  • Protecting global email - status & the road ahead

    Steven F. Fox, Per Thorsheim
    Fri, 00:00 - 00:00
     
  • Making Email Dark

    Chris Brown, Ladar Levison, Fred Nixon
    Fri, 00:00 - 00:00
     
  • CrypTag: Building Encrypted, Taggable, Searchable Zero-knowledge Systems

    Steven Phillips
    Fri, 00:00 - 00:00
     
  • The Death of Privacy

    Stealth
    Fri, 00:00 - 00:00
     
  • Hacking Quantum Cryptography

    Marina
    Fri, 00:00 - 00:00
     
  • What is Bitcoin Tumbling and why do it?

    David Dahl, Sean Thomas Jones
    Fri, 00:00 - 00:00
     
  • Biohacking at home: Pragmatic DNA design, assembly, and transformation

    Keoni Gandall, Johan Sosa
    Fri, 00:00 - 00:00
     
  • From XSS to Root on Your NAS

    Tony Martin
    Fri, 00:00 - 00:00
     
  • Breaking CBC, or Randomness Never Was Happiness

    Dr. Albert H. Carlson, Patrick Doherty
    Fri, 00:00 - 00:00
     
  • How Machine Learning Finds Malware Needles in an AppStore Haystack

    Theodora Titonis
    Fri, 00:00 - 00:00
     
  • Skip, Freak, and Logjam: Moving past a legacy of weakness in TLS

    Karthikeyan Bhargavan
    Fri, 00:00 - 00:00
     
  • MITM 101: Easy Traffic Interception Techniques Using Scapy

    Bob Simpson
    Fri, 00:00 - 00:00
     
  • Where are the privacy-preserving services for the masses?

    Hadi Asghari
    Fri, 00:00 - 00:00
     
  • Should we trust crypto frameworks? A story about CVE-2015-2141

    Evgeny Sidorov
    Fri, 00:00 - 00:00
     
  • Cloning Access Cards to Implants

    Alex Smith @CyberiseMe
    Fri, 00:00 - 00:00
     
  • Powershell for Penetraton Testers

    Nikhil Mittal
    Fri, 00:00 - 00:00
     
  • Meeting People Over WiFi

    JoshInGeneral
    Fri, 00:00 - 00:00
     
  • Tospo Virus: Weaponizing WiFi Pineapple Vulnerabilities

    Catatonic
    Fri, 00:00 - 00:00
     
  • Rollin’ Down the Street Sniffin’ WiFi, Sippin’ on Pineapple Juice

    Sebastian Kinne, Darren Kitchen
    Fri, 00:00 - 00:00
     
  • GNU Radio Tools for Radio Wrangling and Spectrum Domination

    Tim O’Shea
    Fri, 00:00 - 00:00
     
  • Automatic Live WPA/WPA2 Attacks and WPA_Supplicant

    Vivek Ramachandran
    Fri, 00:00 - 00:00
     
  • I See You

    Andrew Beard, Brian Wohlwinder
    Fri, 00:00 - 00:00
     
  • DSP for SDR

    Karl Koscher
    Fri, 00:00 - 00:00
     
  • The Packets Made Me Do It: Getting Started with Distributed Full Packet Capture Using OpenFPC

    Leon Ward
    Fri, 00:00 - 00:00
     
  • Is Your Android App Secure?

    Sam Bowne
    Fri, 00:00 - 00:00
     
  • Sup3r S3cr3t!

     
    Fri, 00:00 - 00:00
     
  • Software Defined Radio Performance Trades and Tweaks

    Michael Calabro
    Fri, 00:00 - 00:00
     
  • Wireless Pentesting: So Easy a Cave Man Can Do It

    Cyb3r-Assassin
    Fri, 00:00 - 00:00
     
  • Seeing Blue: Tools, Tricks, and Techniques for Messin’ With Bluetooth

    Mike Ryan, Dominic Spill
    Fri, 00:00 - 00:00
     
  • 10:00
  • NSM 101 for ICS

    Chris Sistrunk
    Fri, 10:00 - 10:50
    DEF CON 101
  • Shall We Play a Game?

    Tamas Szakaly
    Fri, 10:00 - 10:50
    Track One
  • Working together to keep the Internet safe and secure

    Alejandro Mayorkas
    Fri, 10:00 - 10:50
    Track Two
  • Welcome to DEF CON

    LoST, Jeff Moss
    Fri, 10:00 - 10:50
    Track Three
  • Bugged Files: Is Your Document Telling on You?

    Dan Crowley, Damon Smith
    Fri, 10:00 - 10:50
    Track Four
  • Tools and Techniques Used at the Wall of Sheep

    Ming Chow
    Fri, 10:00 - 10:50
    Packet Capture Village
  • PSK31 Modulation Polyglots

    Sergey Bratus, Travis Goodspeed
    Fri, 10:00 - 10:50
    Wireless Village
  • DNS and the Future of Authenticity

    indolering
    Fri, 10:00 - 10:25
    Crypto and Privacy Village
  • Parallels in BioSec and InfoSec

    Walter Powell
    Fri, 10:00 - 10:15
    BioHacking Village
  • The Hand that Rocks the Cradle: Hacking IoT Baby Monitors

    Mark Stanislav
    Fri, 10:00 - 10:50
    Internet of Things Village
  • 10:25
  • Social Implications of DNA Acquisition & Storage

    Michael Goetzman
    Fri, 10:25 - 10:50
    BioHacking Village
  • 10:30
  • Getting into the Trust Store We Trust

    Ajit Hatti
    Fri, 10:30 - 11:55
    Crypto and Privacy Village
  • 11:00
  • Crypto for Hackers

    Eijah
    Fri, 11:00 - 11:50
    DEF CON 101
  • Stagefright: Scary Code in the Heart of Android

    Joshua Drake
    Fri, 11:00 - 11:50
    Track One
  • Licensed to Pwn: The Weaponization and Regulation of Security Research

    Dave Aitel, Matt Blaze, Nate Cardozo, James Denaro, Mara Tam
    Fri, 11:00 - 12:50
    Track Two
  • Fighting Back in the War on General Purpose Computers

    Cory Doctorow
    Fri, 11:00 - 11:50
    Track Three
  • Goodbye Memory Scraping Malware: Hold Out Till "Chip And Pin”

    Weston Hecker
    Fri, 11:00 - 11:50
    Track Four
  • Mobile Data Loss - Threats & Countermeasures

    Michael Raggo
    Fri, 11:00 - 11:50
    Packet Capture Village
  • WPA Enterprise Hacking

    Thomas D’Otreppe, Vivek Ramachandran
    Fri, 11:00 - 11:50
    Wireless Village
  • Using Privacy and Crypto Tools

    Edmond Rogers, Shane Rogers
    Fri, 11:00 - 11:25
    Crypto and Privacy Village
  • Modern Crypto: 15 Years of Advancement in Cryptography

    Steve Weis
    Fri, 11:00 - 11:25
    Crypto and Privacy Village
  • 11:30
  • Peerio: Productivity with end-to-end encryption

    Nadim Kobeissi
    Fri, 11:30 - 11:55
    Crypto and Privacy Village
  • 12:00
  • Bruce Schneier Q&A

    Bruce Schneier
    Fri, 12:00 - 12:50
    DEF CON 101
  • Malware in the Gaming Micro-economy

    Zack Allen, Rusty Bower
    Fri, 12:00 - 12:50
    Track One
  • USB Attack to Decrypt Wi-Fi Communications

    Jeremy Dorrough
    Fri, 12:00 - 12:50
    Track Three
  • Confessions of a Professional Cyber Stalker

    Ken Westin
    Fri, 12:00 - 12:50
    Track Four
  • Sniffing SCADA

    Karl Koscher
    Fri, 12:00 - 12:50
    Packet Capture Village
  • Keynote: Crypto & Privacy Village

    Tony Arcieri, Justin Culbertson, Nadia Kayyali, Jorge Lacoste, Whitney Merrill, Peter Teoh
    Fri, 12:00 - 12:25
    Crypto and Privacy Village
  • 12:30
  • Keynote: Underhanded Crypto Contest

    Adam Caudill, Taylor Hornby
    Fri, 12:30 - 12:55
    Crypto and Privacy Village
  • 13:00
  • Applied Intelligence: Using Information That's Not There

    Michael Schrenk
    Fri, 13:00 - 13:50
    DEF CON 101
  • Insteon' False Security And Deceptive Documentation

    Ryan Gooler, Peter Shipley
    Fri, 13:00 - 13:50
    Track One
  • Drive It Like You Hacked It: New Attacks and Tools to Wirelessly Steal Cars

    Samy Kamkar
    Fri, 13:00 - 13:50
    Track Two
  • Red vs. Blue: Modern Active Directory Attacks & Defense

    Sean Metcalf
    Fri, 13:00 - 13:50
    Track Three
  • Don't Whisper my Chips: Sidechannel and Glitching for Fun and Profit

    Colin O'Flynn
    Fri, 13:00 - 13:50
    Track Four
  • dnstap - A Standard Interface to Real Time DNS Transaction Flows

    Paul Vixie
    Fri, 13:00 - 13:50
    Packet Capture Village
  • SIGINT and Blind Signal Analysis with GNU Radio + Advanced SDR

    Balint Seeber
    Fri, 13:00 - 13:50
    Wireless Village
  • Life of PII: A Day in the Life of Your Personally Identifiable Information

    Alisha Kloc
    Fri, 13:00 - 13:55
    Crypto and Privacy Village
  • 14:00
  • Hacking SQL Injection for Remote Code Execution on a LAMP stack

    Nemus
    Fri, 14:00 - 14:50
    DEF CON 101
  • Build a free cellular traffic capture tool with a vxworks based femoto

    Haoqi Shan, Yuwei Zheng
    Fri, 14:00 - 14:50
    Track One
  • How to Hack a Tesla Model S

    Kevin Mahaffey, Marc Rogers
    Fri, 14:00 - 14:50
    Track Two
  • Remote Access, the APT

    Ian Latter
    Fri, 14:00 - 14:50
    Track Three
  • Cracking Cryptocurrency Brainwallets

    Ryan Castellucci
    Fri, 14:00 - 14:50
    Track Four
  • Hacker's Practice Ground

    Lokesh Pidawekar
    Fri, 14:00 - 14:50
    Packet Capture Village
  • Opening Backdoors: The Importance of Backdoor Research

    Adam Caudill
    Fri, 14:00 - 14:25
    Crypto and Privacy Village
  • Special Presentation

     
    Fri, 14:00 - 14:50
    Internet of Things Village
  • 14:30
  • How to Engineer a Cryptographic 'Front Door'

    Karl Koscher
    Fri, 14:30 - 14:55
    Crypto and Privacy Village
  • 15:00
  • Chellam – a Wi-Fi IDS/Firewall for Windows

    Vivek Ramachandran
    Fri, 15:00 - 15:50
    DEF CON 101
  • How to hack your way out of home detention

    AmmonRa
    Fri, 15:00 - 15:50
    Track One
  • Low-cost GPS simulator – GPS spoofing by SDR

    Lin Huang, Qing Yang
    Fri, 15:00 - 15:50
    Track Two
  • REvisiting RE:DoS

    Eric Davisson
    Fri, 15:00 - 15:50
    Track Three
  • Quantum Computers vs. Computers Security

    Jean-Philippe Aumasson
    Fri, 15:00 - 15:50
    Track Four
  • Global Honeypot Trends

    Elliot Brink
    Fri, 15:00 - 15:50
    Packet Capture Village
  • The Wireless World of the Internet of Things

    JP Dunning
    Fri, 15:00 - 15:50
    Wireless Village
  • Let's Talk about Let's Encrypt

    Bill Budindgton
    Fri, 15:00 - 15:55
    Crypto and Privacy Village
  • CFSSL: the evolution of a PKI toolkit

    Nick Sullivan
    Fri, 15:00 - 16:25
    Crypto and Privacy Village
  • Physiology from the Perspective of Control: A Bio-hacker's Guide

    Jasmina Aganovic, Christian Dameff, Peter Hefley, Jeff Tully, David Whitlock
    Fri, 15:00 - 15:20
    BioHacking Village
  • 15:30
  • Examining the Robustness of the Brain Against a Malicious Adversary

    Avani Wildani
    Fri, 15:30 - 15:50
    BioHacking Village
  • 16:00
  • LTE Recon and Tracking with RTLSDR

    Ian Kline
    Fri, 16:00 - 16:25
    DEF CON 101
  • HamSammich – long distance proxying over radio

    Rob Graham, David Maynor
    Fri, 16:00 - 16:25
    Track One
  • Harness: Powershell Weaponization Made Easy (or at least easier)

    Rich Kelley
    Fri, 16:00 - 16:25
    Track Two
  • When the Secretary of State says: “Please Stop Hacking Us…”

    David An
    Fri, 16:00 - 16:25
    Track Three
  • Tell me who you are and I will tell you your lock pattern

    Marte Løge
    Fri, 16:00 - 16:25
    Track Four
  • Remaining Covert in an Overt World

    Chet Hosmer, Michael Raggo
    Fri, 16:00 - 16:50
    Packet Capture Village
  • Yellow Means Proceed with Caution - Applied De-escalation for Social Engineering

    Noah Beddome
    Fri, 16:00 - 16:50
    Social Engineering Village
  • Covert Wireless: Practical Hacker LPI-LPD

    Wireless Warrior
    Fri, 16:00 - 16:50
    Wireless Village
  • Machine Learning and Manipulation

    Jennifer Helsby
    Fri, 16:00 - 16:25
    Crypto and Privacy Village
  • Security of Wireless Home Automation Systems - A World Beside TCP/IP

    Sebastian Strobi, Tobias Zillner
    Fri, 16:00 - 16:50
    Internet of Things Village
  • 16:30
  • Detecting Randomly Generated Strings; A Language Based Approach

    Mahdi Namazifar
    Fri, 16:30 - 16:55
    DEF CON 101
  • How to secure the keyboard chain

    Paul Amicelli, Baptiste David
    Fri, 16:30 - 16:55
    Track One
  • I Will Kill You

    Chris Rock
    Fri, 16:30 - 16:55
    Track Two
  • Put on your tinfo_t hat if you're my type

    miaubiz
    Fri, 16:30 - 16:55
    Track Three
  • Separating Bots from the Humans

    Ryan Mitchell
    Fri, 16:30 - 16:55
    Track Four
  • Beginner Crypto for Application Developers

    Justin Engler
    Fri, 16:30 - 16:55
    Crypto and Privacy Village
  • IMSI Catcher Counter-Surveillance

    Freddy Martinez
    Fri, 16:30 - 16:55
    Crypto and Privacy Village
  • 17:00
  • I Am Packer And So Can You

    Mike Sconzo
    Fri, 17:00 - 17:50
    DEF CON 101
  • When IoT attacks: hacking a Linux-powered rifle

    Michael Auger, Runa A. Sandvik
    Fri, 17:00 - 17:50
    Track One
  • Fun with Symboliks

    atlas
    Fri, 17:00 - 17:50
    Track Two
  • NetRipper - Smart traffic sniffing for penetration testers

    Ionut Popescu
    Fri, 17:00 - 17:50
    Track Three
  • Hack the Legacy! IBM i (aka AS/400) Revealed.

    Bart Kulach
    Fri, 17:00 - 17:50
    Track Four
  • Violating Web Services

    Ron Taylor
    Fri, 17:00 - 17:50
    Packet Capture Village
  • "I Didn’t Think it was Loaded" and Other Mental Derps

    Michele Fincher
    Fri, 17:00 - 17:50
    Social Engineering Village
  • Breaking RSA - new cryptography for a post-quantum world

    Jennifer Katherine Fernick
    Fri, 17:00 - 17:25
    Crypto and Privacy Village
  • 18:00
  • Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

    Marina Krotofil, Jason Larsen
    Fri, 18:00 - 18:50
    DEF CON 101
  • How to Train Your RFID Hacking Tools

    Craig Young
    Fri, 18:00 - 18:50
    Track One
  • Drinking from LETHE: New methods of exploiting and mitigating memory corruption vulnerabilities

    Daniel Selifonov
    Fri, 18:00 - 18:50
    Track Two
  • Hooked Browser Meshed-Networks with WebRTC and BeEF

    Christian Frichot
    Fri, 18:00 - 18:50
    Track Three
  • Breaking SSL Using Time Synchronisation Attacks

    Jose Selvi
    Fri, 18:00 - 18:50
    Track Four
  • Understanding Social Engineering Attacks with Natural Language Processing

    Ian Harris
    Fri, 18:00 - 18:50
    Social Engineering Village
  • 19:00
  • One Device to Pwn Them All

    Phil Polstra
    Fri, 19:00 - 19:50
    Track Two
  • I Am Not What I Am: Shakespeare and Social Engineering

    John Ridpath
    Fri, 19:00 - 19:50
    Social Engineering Village
  • 20:00
  • Classify Targets to Make Social Engineering Easier to Achieve

    Heng Guan
    Fri, 20:00 - 20:50
    Social Engineering Village