DEF CON 18 July 30, 2010 to Aug. 1, 2010, Las Vegas, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Foca2: The Foca Strikes Back José ( Palako ) Palazón None Security
Wpa Too! Md Sohail Ahmad None Security
Evilgrade, You Still Havepending Upgrades? Francisco Amato , Federico Kirschbaum None Security
Cyber[Crime | War] Charting Dangerous Waters Iftach Ian Amit None Security
Scada And Ics For Security Experts: How To Avoid Cyberdouchery James Arlen None Security
Exploitation On Arm - Technique And Bypassing Defense Mechanisms Itzhak "Zuk" Avraham None Security Exploitation
Web Services We Just Don'T Need Mike "mckt" Bailey None Security Web
Mobile Privacy: Tor On The Iphone And Other Unusual Devices Marco Bonetti None Security
Who Cares About Ipv6? Sam Bowne None Security
Seccubus – Analyzing Vulnerability Assessment Data The Easy Way... Frank Breedijk None Security
Massexploitation Michael Brooks None Security
Resilient Botnet Command And Control With Tor Dennis Brown None Security
Exploiting Scada Systems Jeremy Brown None Security
Cloud Computing, A Weapon Of Mass Destruction? Michael Anderson , David ( VideoMan ) Bryan None Security Cloud
The Keys To Running A Successful Def Con Group By Dc612 Jared Bird , David ( VideoMan ) Bryan None Security
Google Toolbar: The Narc Within Jeff Bryner None Security
Open Public Sensors And Trend Monitoring Daniel Burroughs None Security Monitoring
Bad Memories Elie Bursztein , Baptiste Gourdin , Gustav Rydstedt None Security
Kartograph : Finding A Needle In A Haystack Or How To Apply Reverse Engineering Techniques To Cheat Atvideo Games Jocelyn Lagarenne , Dan Boneh None Security
Token Kidnapping'S Revenge Cesar Cerrudo None Security
Wrt54-Tm, Media Center Andnetwork Sniffer John A. Colley None Security Media
Hacking Facebook Privacy Chris Conley None Security Privacy
Our Instrumented Lives: Sensors, Sensors, Everywhere... Greg Conti None Security
Ipv6: No Longer Optional John Curran None Security
Function Hooking For Mac Osx And Linux Joe Damato None Security
Physical Security : Yore Doing It Wrong! A.p. Delchi None Security
Katana: Portable Multi-Boot Security Suite Jp Dunning None Security
An Observatory For The Ssliverse Peter Eckersley , Jesse Burns None Security
Your Boss Is A Douchebag... How About You? Luiz "effffn" Eduardo None Security
Hacking With Hardware: Introducing The Universal Rf Usb Keyboard Emulation Device - Urfuked Monta Elkins None Security
Be A Mentor! Marisa Fagan None Security
Hacking And Protectingoracle Database Vault Esteban Martínez Fayó None Security
The Anatomy Of Drug Testing Jimi Fiekert None Security Testing
Exploitable Assumptions Workshop Joe "Crazy" Foley , Eric "Unlocked" Schmiedl None Security
Mastering The Nmap Scripting Engine David Fifield None Security
Live Fire Exercise: Baltic Cyber Shield 2010 Kenneth Geers None Security
Making The Def Con 18 Badge Joe ( Kingpin ) Grand None Security
Legal Developments In Hardware Hacking Jennifer Granick , Matt Zimmerman None Security Legal
The Law Of Laptop Search And Seizure Kevin Bankston , Marcia Hofmann , Kurt Opsahl None Security
Advanced Format String Attacks Paul Haas None Security
Tales From The Crypto G. Mark Hardy None Security
Constricting The Web: Offensive Python For Web Hackers Nathan Hamiel , Marcin Wielgoszewski None Security Web
How To Hack Millions Of Routers Craig Heffner None Security
Foe‚ The Release Of Feed Over Email, A Solution To Feed Controversial News To Censored Countries Sho Ho None Security
Physical Computing, Virtual Security: Adding The Arduino Microcontroller Development Environment To Your Security Toolbox Leigh ( Hypatiadotca ) Honeywell None Security Development
Decoding Recaptcha Chad Houck , Jason Lee None Security
Nosql == No Sql Injections? Wayne Huang None Security SQL
0Box Analyzer: Afterdark Runtime Forensics For Automated Malware Analysis And Clustering Jeremy Chiu None Security Analysis Malware Forensics
Exploiting Digital Cameras Oren Isacson , Alfredo Ortega None Security
Jackpotting Automated Teller Machines Redux Barnaby Jack None Security
Black Ops Of Fundamental Defense: Web Edition Dan Kaminsky None Security Web
How I Met Your Girlfriend Samy Kamkar None Security
Powershell...Omfg David ReL1K Kennedy , Joshua ( Winfang ) Kelley Security
Perspectives On Cyber Security And Cyber Warfare Max Kelly None Security
Hardware Black Magic: Designing Printed Circuit Boards Fouad Kiamilev , Corey 'c0re' Lange , Stephen 'afterburn' Janansky None Security
Malware Migrating To Gaming Consoles: Embedded Devices, An Antivirus-Free Safe Hideout For Malware Ki-chan Ahn , Dong-joo Ha None Security Malware
Hardware Hacking For Software Guys Dave King None Security
Training The Next Generation Of Hardware Hackers -- Teaching Computer Organization And Assembly Language Hands-On With Embedded Systems Andrew Kongs , Dr. Gerald Kane None Security
Dcflux In: Moon-Bouncer Matt "DCFluX" Krick None Security
Like A Boss: Attacking Jboss Tyler Krpata None Security
Air Traffic Control Insecurity 2.0 Righter Kunkel None Security
The Power Of Chinese Security Anthony ( darkfloyd ) Lai , Jake Appelbaum None Security
Bypassing Smart-Card Authenticationand Blocking Debiting: Vulnerabilitiesin Atmel Cryptomemory-Basedstored-Value Systems Jonathan Lee , Neil Pahl None Security
Blitzableiter - The Release Felix ( FX ) Lindner None Security
These Aren'T The Permissionsyore Looking For Anthony Lineberry , David Richardson , Tim Wyatt None Security
Multiplayer Metasploit: Tag-Team Penetration And Information Gathering Ryan Linn None Security
Repelling The Wily Insider Matias Madou , Jacob West None Security
App Attack: Surviving The Mobile Application Explosion Kevin Mahaffey , John Hering None Security
Changing Threats To Privacy: From Tia To Google Moxie Marlinspike None Security
Facial Recognition: Facts, Fiction, And Fsck-Ups Joshua Marpet None Security
Searching For Malware: A Review Of Attackers' Use Of Search Engines To Lure Victims David Maynor , Paul Judge None Security
Hacking .Net Applications At Runtime: A Dynamic Attack Jon Mccoy None Security
You Spent All That Money And You Still Got Owned... Joseph Mccray None Security
We Don'T Need No Stinkin' Badges: Hacking Electronic Door Access Controllers Shawn Merdinger None Security Access
Letting The Air Out Of Tire Pressure Monitoring Systems Mike Metzger None Security Monitoring
Kim Jong-Il And Me: How To Build A Cyber Army To Defeat The U.S. Charlie Miller None Security
Hd Voice - The Overdue Revolution Doug Mohney None Security
Getting Social With The Smart Grid Justin Morehouse , Tony Flick None Security
Defcon Security Jam Iii: Now In 3-D? David Mortman , Rich Mogull , Chris Hoff , Rob Graham None Security
Wardriving The Smart Grid: Practical Approaches To Attacking Utility Packet Radios Shawn Moyer , Nathan Keltner None Security
Open Source Framework For Advanced Intrusion Detection Solutions Patrick Mullen , Ryan Pentney None Security
The Games We Play Brandon Nesbit None Security
Fpga Bitstream Reverse Engineering Lang Nguyen None Security
Exploitspotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh None Security
Electronic Weaponry Or How To Rulethe World While Shopping At Radio Shack Tw "Mage2" Otto None Security
Big Brother On The Big Screen: Fact/Fiction? Nicole Ozer None Security
Practical Cellphone Spying Chris Paget None Security
My Life As A Spyware Developer Garry Pejski None Security
This Is Not The Droid Yore Looking For... Nicholas J. Percoco , Christian Papathanasiou None Security
Malware Freak Show 2: The Client-Side Boogaloo Jibran - None Security Malware
Industrial Cyber Security Wade Polk , Paul Malkewicz None Security
This Needs To Be Fixed And Other Jokes In Commit Statements Bruce Potter , Logan Lodge None Security
Toolsmithing An Ida Bridge, Case Study For Building A Reverse Engineering Tool Adam Pridgen , Matthew Wollenweber None Security
Build Your Own Security Operations Center For Little Or No Money Josh Pyorre , Chris Mckenney None Security
Operating System Fingerprinting For Virtual Machines Nguyen Anh Quynh None Security
Lord Of The Bing: Taking Back Search Engine Hacking From Google And Bing Rob Ragan , Francis Brown None Security
Search &Amp; Seizure &Amp; Golfballs S Jim Rennie , Eric Rachner None Security
Enough Cyber Talk Already! Help Get This Collaboration Engine Running! Riley Repko None Security
Implementing Ipv6 At Arin Matt Ryanczak None Security IPv6
Exploiting Websphere Application Server'S Jsp Engine Ed Schaller None Security
Shodan For Penetration Testers Michael ( theprez98 ) Schearer None Security
Gaming In The Glass Safe - Gamesdrm &Amp; Privacy Ferdinand Schober None Security Privacy
Yore Stealing It Wrong! 30 Years Ofinter-Pirate Battles Jason Scott None Security
Smart Project: Applying Reliability Metrics To Security Vulnerabilities Blake Self , Wayne Zage , Dolores Zage None Security
Rip Your Browser For X06 Days James Shewmaker None Security Browser
Hacking Oracle From Web Apps Sumit "sid" Siddharth None Security Web
Weaponizing Lady Gaga, Psychosonic Attacks Brad Smith None Security
A New Approach To Forensic Methodology - !!Busted!! Case Studies David C. Smith , Samuel Petreski None Security
Pyretic - In Memory Reverse Engineering For Obfuscated Python Bytecode Rich Smith None Security
Your Isp And The Government: Best Friends Forever. Christopher Soghoian None Security
So Many Ways To Slap A Yo-Ho:: Xploiting Yoville And Facebook For Fun And Profit Sean Barnum , Joey Tyson None Security
Deceiving The Heavens To Cross The Sea: Using The The 36 Stratagems For Social Engineering Jayson E. Street None Security
Social Networking Special Ops:Extending Data Visualization Tools For Faster Pwnage The Suggmeister None Security
Getting Root: Remote Viewing, Non-Local Consciousness, Big Picture Hacking, And Knowing Who You Are Richard Thieme None Security
Web Application Fingerprinting With Static Files Patrick Thomas None Security Web
Insecurity Engineering Of Physical Security Systems: Locks, Lies, And Videotape Marc Weber Tobias , Tobias Bluzmanis , Matt Fiddler None Security
Attack The Key, Own The Lock Schuyler Towne None Security
Balancing The Pwn Trade Deficit Colin Ames None Security
Sie Passive Dns And The Isc Dns Database Paul Vixie , Robert Edmonds None Security DNS
Go Go Gadget Python!Introduction To Hardware Hacking Nick Waite , Furkan Cayci None Security
Build Your Own Uav 2.0 - Wireless Mayhem From The Heavens! Mike Kershaw None Security Wireless
The Night The Lights Went Out In Vegas: Demystifying Smartmeter Networks Barrett Weisshaar , Garret Picchioni None Security
An Examination Of The Adequacy Of The Laws Related To Cyber Warfare Dondi "SpookDoctor06" West None Security
From No Way To 0-Day: Weaponizing The Unweaponizable Joshua Wise None Security
Crawling Bittorrent Dhts For Fun And Profit Scott Wolchok None Security
Panel: Of Bytes And Bullets Jeffrey Carr , Robert Knake , Joseph Menn , Robert Vamosi None Security
Panel:Dns Systemic Vulnerabilities And Risk Management: A Discussionwith The Experts Rod Beckstrom , Paul Mockapetris , Ken Silva , Mark Weatherford None Security Risk
Panel: Hacking The Future: Weaponizing The Next Generation James Costello , Tim Krabec , Tiffany Rad None Security
Panel: Internet Wars Marcus Sachs , John Bumgarner , Daniel Uriah Clemens , John Ives None Security
Meet The Eff Eva Galperin None Security
Meet The Feds - Csi:Tcp/Ip Jim Christy , Mike Convertino , Jerry Dixon , John Garris , Barry Grundy , Bob Hopper , Ken Privette , Tom Talleur , Trent Teyema None Security
Meet The Feds - Policy, Privacy, Deterrence And Cyber War Andrew Fried , Jon Iadonisi , Kevin Manson , Rich Marshall , Roberta Stempfley , Randy Vickers , Lin Wells , Amit Yoran None Security
Pci, Compromising Controls And Compromising Security Jack Daniel , Joshua Corman , Dave Shackleford , Anton Chuvakin , Martin Mckeay , Alex Hutton None Security
Securing Mmos: A Security Professional'S View From The Inside Metr0 None Security
Antique Exploitation (Aka Terminator 3: Point One One For Workgroups) Jon Oberheide None Security Exploitation
Extreme-Range Rfid Tracking Chris Paget None Security
Wimax Hacking 2010 Pierce , Goldy , Asmig None Security
Build A Lie Detector/Beat A Lie Detector Rain Forest Puppy , J03b34r None Security
Dc 18 Movie Nightget Lamp Jason Scott None Security
Hacking Docsis For Fun And Profit Blake Self , Bitemytaco None Security
Virgraff101: An Introduction Tovirtual Graffiti Tottenkoph None Security
Pwned By The Owner: What Happens When You Steal A Hacker'S Computer Zoz None Security
Octf: 5 Years In 50 Minutes Adam Pridgen , Frank^2 , Vyrus , Cp , Jeffball , Merlin None Security
Cyberterrorism And The Security Of The National Drinking Water Infrastructure John Mcnabb None Security Infrastructure
A Chaosvpn For Playing Capture The Flag , Ryd , No_maam , Vyrus None Security
Drivesploit: Circumventing Both Automated And Manual Drive-By-Download Detection Wayne Huang None Security
Ripping Media Off Of The Wire Honey None Security Media
How To Get Your Fbi File (And Other Information You Want From The Federal Government) Marcia Hofmann None Security
Trolling Reverse-Engineers With Math: Ness... It Hurts... Frank^2 None Security
How Unique Is Your Browser? Peter Eckersley None Security
Breaking Bluetooth By Being Bored Jp Dunning None Security
The Search For Perfect Handcuffs...And The Perfect Handcuff Key Toool None Security
Exploiting Internet Surveillance Systems Decius None Security
Programmable Hid Usb Keystroke Dongle: Using The Teensy As A Pen Testing Device Adrian Crenshaw None Security Testing
How Hackers Won The Zombie Apocalypse Dennis Brown None Security
Connection String Parameter Attacks José ( Palako ) Palazón , Chema Alonso None Security
Sniper Forensics - One Shot, One Kill Christopher E Pogue Security Forensics