Defcon 2016 Aug. 4, 2016 to Aug. 7, 2016, las vegas,usa

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
DIY Nukeproofing: A New Dig at 'Datamining 3alarmlamp Does the thought of nuclear war wiping out your data keep you up at night? ...
The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering Amro Abdelgawad As a matter of fact, it is all about time to reverse engineer the most ...
MR. ROBOT Panel Ryan Kazanciyan , Dark Tangent , Marc Rogers , Andre Mcgregor , Kim Zetter , Kor Adana MR. ROBOT is a rare treat - a network television show whose hacker protagonist is ...
So You Think You Want To Be a Penetration Tester Anch So, you think you want to be a penetration tester, or you already are and ...
SITCH - Inexpensive, Coordinated GSM Anomaly Detection Ashmastaflash It's recently become easier and less expensive to create malicious GSM Base Transceiver Station (BTS) ...
A Journey Through Exploit Mitigation Techniques in iOS Max Bazaliy Over the past year, Apple has consistently added features to prevent exploitation of the iOS ...
Phishing without Failure and Frustration Larry “@haxorthematrix” Pesce , Jay Beale You want to phish your company or your client. You’ve never done this for work ...
(Ab)using Smart Cities: The Dark Age of Modern Mobility Matteo Beccaro , Matteo Collura Since these last few years our world has been getting smarter and smarter. We may ...
Examining the Internet's pollution Karyn Benson Network telescopes are collections of unused but BGP-announced IP addresses. They collect the pollution of ...
An Introduction to Pinworm: Man in the Middle for your Metadata Bigezy , Saci What is the root cause of memory and network traffic bloat? Our current research using ...
Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker Evan "treefort" Booth In May of 2015, it was estimated that a pod-based coffee maker could be found ...
Exploiting and Attacking Seismological Networks... Remotely Bertin Bervis Bonilla , James Jara In this presentation we are going to explain and demonstrate step by step in a ...
All Your Solar Panels are Belong to Me Fred Bret-mounet I got myself a new toy: A solar array... With it, a little device by ...
Introduction the Wichcraft Compiler Collection : Towards Universal Code Theft Jonathan Brossard With this presentation, we take a new approach to reverse engineering. Instead of attempting to ...
Bypassing Captive Portals and Limited Networks Grant Bugher Common hotspot software like Chilispot and Sputnik allow anyone to set up a restricted WiFi ...
VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments Ronny Bull , Jeanna N. Matthews , Kaitlin A. Trumbull Cloud service providers offer their customers the ability to deploy virtual machines in a multi-tenant ...
Crypto: State of the Law Nate Cardozo Strong end-to-end encryption is legal in the United States today, thanks to our victory in ...
Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers Allan Cecil TASBot is an augmented Nintendo R.O.B. robot that can play video games without any of ...
Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity Alex Chapman , Paul Stone Rogue access points provide attackers with powerful capabilities, but in 2016 modern privacy protections such ...
NG9-1-1: The Next Generation of Emergency Ph0nage Cincvolflt , Ak3r303 For 48 years, 9-1-1 has been /the/ emergency telephone number in the United States. It's ...
Machine Duping 101: Pwning Deep Learning Systems Clarence Chio Deep learning and neural networks have gained incredible popularity in recent years. The technology has ...
A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors Ang Cui , Jatin Kataria , Francois Charbonneau There are multiple x86 processors in your monitor! OSD, or on-screen-display controllers are ubiquitous components ...
Universal Serial aBUSe: Remote Physical Access Attacks Dominic White , Rogan Dawes In this talk, we’ll cover some novel USB-level attacks, that can provide remote command and ...
CANSPY: a Framework for Auditing CAN Devices Jonathan-christofer Demay , Arnaud Lebrun In the past few years, several tools have been released allowing hobbyists to connect to ...
Auditing 6LoWPAN Networks using Standard Penetration Testing Tools Jonathan-christofer Demay , Arnaud Lebrun , Adam Reziouk The Internet of Things is expected to be involved in the near future in all ...
DEF CON 101 Panel Jay , Highwiz , Mike Petruzzi , Nikita Kronenberg , Ryan Clark , Crypt DEF CON has changed for the better since the days at the Alexis Park. It ...
pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle Brad Dixon Security assessments of embedded and IoT devices often begin with testing how an attacker could ...
Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter Delta Zero , Kingphish3r Historically, machine learning for information security has prioritized defense: think intrusion detection systems, malware classification ...
Stumping the Mobile Chipset Adam Donenfeld Following recent security issues discovered in Android, Google made a number of changes to tighten ...
Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game Joshua j. Drake , Steve Christey If you’re interested in vulnerability research for fun or profit, or if you’re a beginner ...
Sk3wlDbg: Emulating All (well many) of the Things with Ida Chris Eagle It is not uncommon that a software reverse engineer finds themselves desiring to execute a ...
Eavesdropping on the Machines Tim ‘t0rch’ Estell , Katea Murray After the Rise of the Machines they'll need to communicate. And we'll need to listen ...
I Fight For The Users, Episode I - Attacks Against Top Consumer Products Zack Fasel , Erin “secbarbie” Jacobs This is not just another "I found a problem in a single IOT device" talk. ...
101 Ways to Brick your Hardware Joe ( Kingpin ) Grand , Joe Fitzpatrick Spend some time hacking hardware and you'll eventually render a piece of equipment unusable either ...
Breaking the Internet of Vibrating Things : What We Learned Reverse Engineering Bluetooth- and Internet-Enabled Adult Toys Goldfisk , Follower The Internet of Things is filled with vulnerabilities, would you expect the Internet of Vibrating ...
Direct Memory Attack the Kernel Ulf Frisk Inexpensive universal DMA attacking is the new reality of today! In this talk I will ...
Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities Brian Gorenc , Fritz Sands Over the last year, synchronized and coordinated attacks against critical infrastructure have taken center stage. ...
BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses Joe ( Kingpin ) Grand , Zoz At DEF CON 16 in 2008, we released the original BSODomizer (www.bsodomizer.com), an open source ...
Slouching Towards Utopia: The State of the Internet Dream Jennifer S. Granick Is the Internet going to live up to its promise as the greatest force for ...
Escaping The Sandbox By Not Breaking It Qidan He , Marco Grassi The main topic of this technical talk will be "sandboxes" and how to escape them. ...
Feds and 0Days: From Before Heartbleed to After FBI-Apple Jay Healey Does the FBI have to tell Apple of the vuln it used to break their ...
Hacking Next-Gen ATM's From Capture to Cashout Weston Hecker MV (Chip & Pin) card ATM's are taking over the industry with the deadlines passed ...
Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission Weston Hecker Take a look at weaknesses in Point of sale systems and the foundation of hotel ...
Developing Managed Code Rootkits for the Java Runtime Environment Benjamin Holland Managed Code Rootkits (MCRs) are terrifying post-exploitation attacks that open the doors for cementing and ...
How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire Stephan Huber , Siegfried Rasthofer -Today’s evil often comes in the form of ransomware, keyloggers, or spyware, against which AntiVirus ...
Anti-Forensics AF Int0x80 This presentation is the screaming goat anti-forensics version of those ‘Stupid Pet Tricks’ segments on ...
How to get good seats in the security theater? Hacking boarding passes for fun and profit. Przemek Jaroszewski While traveling through airports, we usually don't give a second thought about why our boarding ...
Backdooring the Frontdoor Jmaxxz As our homes become smarter and more connected we come up with new ways of ...
Discovering and Triangulating Rogue Cell Towers Justicebeaver The number of IMSI-catchers (rogue cell towers) has been steadily increasing in use by hackers ...
Blockfighting with a Hooker -- BlockfFghter2! K2 What's your style of hooking? My hooking Style? It's like hooking without hookers. The use ...
Cunning with CNG: Soliciting Secrets from Schannel Jake Kambic Secure Channel (Schannel) is Microsoft's standard SSL/TLS Library underpinning services like RDP, Outlook, Internet Explorer, ...
Stargate: Pivoting Through VNC to Own Internal Networks Yonathan Klijnsma , Dan Tentler VNC is a great tool to use if you need to get to a box ...
101 Sentient Storage - Do SSDs Have a Mind of Their Own? Tom Kopchak Solid state drives drives are fundamentally changing the landscape of the digital forensics industry, primarily ...
Cyber' Who Done It?! Attribution Analysis Through Arrest History Jake Kouns There have been over 20,000 data breaches disclosed exposing over 4.8 billion records, with over ...
Hacker Fundamentals and Cutting Through Abstraction Lost Continuing the series of hacker foundational skills, YbfG jvyy nqqerff shaqnzragny fxvyyf gung rirel unpxre ...
Compelled Decryption - State of the Art in Doctrinal Perversions Ladar Levison Get mirandized for an encrypted world. This talk will cover the legal doctrines and statues ...
Let’s Get Physical: Network Attacks Against Physical Security Systems Ricky ‘headlesszeke’ Lawshae With the rise of the Internet of Things, the line between the physical and the ...
Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle Wenyuan Xu , Jianhao Liu , Chen Yan To improve road safety and driving experiences, autonomous vehicles have emerged recently, and they can ...
Drones Hijacking - multi-dimensional attack vectors and countermeasures Aaron Luo Drone related applications have sprung up in the recent years, and the drone security has ...
Platform agnostic kernel fuzzing Georgi Geshev , James Loureiro A number of toolsets have been around for a while which propose methods for identifying ...
Light-Weight Protocol! Serious Equipment! Critical Implications! Neal Hindocha , Lucas Lundgren The presentation will begin by discussing the protocol (http://mqtt.org/) and results from a simple query ...
Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think Dennis Maldonado , Tim Mcguffin With minimal to no effort, we can gain SYSTEM level access to hundreds, if not, ...
Meet the Feds Lorrie Faith Cranor , Jonathan Mayer , Ed Felten The federal government is increasingly addressing policy issues that intersect with technology--especially security and privacy. ...
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools Wesley Mcgrew Following previous presentations on the dangers penetration testers face in using current off-the-shelf tools and ...
Research on the Machines: Help the FTC Protect Privacy & Security Terrell Mcsweeny , Lorrie Faith Cranor Machines are getting smarter – so consumer protection enforcers like the Federal Trade Commission need ...
Samsung Pay: Tokenized Numbers, Flaws and Issues Salvador Mendoza Samsung announced many layers of security to its Pay app. Without storing or sharing any ...
Beyond the MCSE: Red Teaming Active Directory Sean Metcalf Active Directory (AD) is leveraged by 95% of the Fortune 1000 companies for its directory, ...
Use Their Machines Against Them: Loading Code with a Copier Mike Principal We've all worked on ‘closed systems’ with little to no direct Internet access. And we've ...
MouseJack: Injecting Keystrokes into Wireless Mice Marc Newlin What if your wireless mouse was an effective attack vector? Research reveals this to be ...
Honey Onions: Exposing Snooping Tor HSDir Relays Amirali Sanatinia , Guevara Noubir Tor is a widely used anonymity network that protects users' privacy and and identity from ...
How to Design Distributed Systems Resilient Despite Malicious Participants Radia Perlman Often distributed systems are considered robust if one of the components halts. But a failure ...
Game over, man! – Reversing Video Games to Create an Unbeatable AI Player Dan "altf4" Petro "Super Smash Bros: Melee." - Furrowed brows, pain in your thumbs, trash talk your Mom ...
Ask the EFF Kurt Opsahl , Eva Galperin , Nate Cardozo , Andrew Crocker , Jeremy Giliula , Katitza Rodriguez Get the latest information about how the law is racing to catch up with technological ...
Side-channel Attacks on High-security Electronic Safe Locks Plore Hacker Electronic locks are becoming increasingly common on consumer-grade safes, particularly those used to secure guns. ...
Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about Regilero HTTP is everywhere, everybody wants to write an HTTP server. So I wrote mine :-) ...
Esoteric Exfiltration Willa Cassandra Riggins When the machines rise up and take away our freedom to communicate we're going to ...
Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations Rohan Vazarkar , Will Schroeder , Andy Robbins Active Directory domain privilege escalation is a critical component of most penetration tests and red ...
How to Overthrow a Government Chris Rock Direct from the mind of the guy who bought you the "I will kill you" ...
Picking Bluetooth Low Energy Locks from a Quarter Mile Away Ben Ramsey , Anthony Rose Many Bluetooth Low Energy (BLE) enabled deadbolts and padlocks have hit the market recently. These ...
Weaponize Your Feature Codes Nicholas Rosario Almost everyone is familiar with feature codes, also known as star codes, such as *67 ...
Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back. The Club Any novice in the security field can tell you the importance of sanitizing input that ...
Attacking BaseStations - an Odyssey through a Telco's Network Brian Butterly , Henrik Schmidt As introduced in our former series of talks ‘LTE vs. Darwin‘ there are quite a ...
Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter Hunter Scott In this talk, I'll share how I won 4 Twitter contests per day, every day, ...
How to Make Your Own DEF CON Black Badge Dean Pierce , Mickey Shkatov , Kenny Mcelroy , Joe Fitzpatrick , Jesse Michael , Michael Leibowitz Yes, we did, we made our own DEF CON black badges. Why? Because we didn't ...
Forcing a Targeted LTE Cellphone into an Unsafe Network Haoqi Shan , Wanqiao Zhang LTE is a more advanced mobile network but not absolutely secure. Recently there already some ...
Cyber Grand Shellphish Giovanni Vigna , Yan Shoshitaishvili , Antonio Bianchi , Kevin Borgolte , Jacopo Corbetta , Fish Wang , Nick Stephens , John Grosen , Andrew Dutcher , Aravind Machiry , Francesco Disperati , Chris Salls Last year, DARPA ran the qualifying event for the Cyber Grand Challenge to usher in ...
Cheap Tools for Hacking Heavy Trucks Six_volts Haystack Vehicle Data Ninja There has been much buzz about car hacking, but what about ...
Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize. Shane Steiger As a defender, have you ever been asked ‘do they win?’ How about ‘what products ...
Help, I've got ANTs!!! Tamas Szakaly As stated in my bio, besides computer security I also love fligh simulators and mountain ...
Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals Richard Thieme Dismissing or laughing off concerns about what it does to a person to know critical ...
CAN i haz car secret plz? Ferdinand Noelscher , Javier Vazquez The CAN bus is really mainstream, and every now and then there are new tools ...
Frontrunning the Frontrunners Paul A. Vixie -While some domainers allegedly brainstorm ideas for new domains to register while taking a shower, ...
Mouse Jiggler Offense and Defense Philprofessor A group of highly-armed individuals has just stormed into your office. They are looking to ...
DARPA Cyber Grand Challenge Award Ceremony Mike Walker , Arati Prabhakar On Friday morning, August 5th, DARPA will announce the prize winners and recognize the parties ...
I've got 99 Problems, but Little Snitch ain't one Patrick Wardle Security products should make our computers more secure, not less. Little Snitch is the de ...
How to Remmote Control an Airliner: SecurityFLawsin Avionics Sebastian Westerhold This talk is exposing critical flaws in navigational aides, secondary surveillance radar, the Traffic Collision ...
Malware Command and Control Channels: A journey into darkness Brad Woodberg Much of the time and attention dedicated to modern network security focuses on detecting the ...
Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5 Luke Young As bandwidth, computing power, and software advancements have improved over the years, we've begun to ...
Abusing Bleeding Edge Web Standards for AppSec Glory Ryan Lester , Bryant Zadegan Through cooperation between browser vendors and standards bodies in the recent past, numerous standards have ...
Project CITL Mudge Zatko , Sarah Zatko Many industries, provide consumers with data about the quality, content, and cost of ownership of ...
Realtime Bluetooth Device Detection with Blue Hydra Granolocks , Zero_chaos We are releasing a new tool for discovering bluetooth devices and automatically probing them for ...