DEF CON 16 Aug. 8, 2008 to Aug. 10, 2008, Las Vegas, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Security And Anonymity Vulnerabilities In Tor: Past, Present, And Future Roger Dingledine None Security Anonymity
Backtrack Foo - From Bug To 0Day Mati Aharoni None Security
Autoimmunity Disorder In Wireless Lan Md Sohail Ahmad , Jvr Murthy , Amit Vartak None Security Wireless
Time-Based Blind Sql Injection Using Heavy Queries: A Practical Approach For Ms Sql Server, Ms Access, Oracle And Mysql Databases And Marathon Tool Chema Alonso , Josăš Parada None Security SQL
The Anatomy Of A Subway Hack: Breaking Crypto Rfid'S And Magstripes Of Ticketing Systems Zack Anderson , Rj Ryan , Alessandro Chiesa None Security
Digital Security: A Risky Business Ian O. Angell None Security Business
Vulncatcher: Fun With Vtrace And Programmatic Debugging Atlas None Security
Pen-Testing Is Dead, Long Live The Pen Test Taylor Banks , Carric None Security
Owning The Users With The Middler Jay Beale None Security
They'Re Hacking Our Clients! Introducing Free Client-Side Intrusion Prevention Jay Beale None Security
Predictable Rng In The Vulnerable Debian Openssl Package, The What And The How Luciano Bello , Maximiliano Bertacchini None Security
When Lawyers Attack! Dealing With The New Rules Of Electronic Discovery John ( jur1st ) Benson None Security
The Emergence (And Use) Of Open Source Warfare Peter Berghammer None Security
What To Do When Your Data Winds Up Where It Shouldn'T Don M. Blumenthal None Security
Working With Law Enforcement Don M. Blumenthal None Security
Generic, Decentralized, Unstoppable Anonymity: The Phantom Protocol Magnus Br책ding None Security
Buying Time - What Is Your Data Worth? Adam Bregenzer None Security
Modscan: A Scada Modbus Network Scanner Mark Bristow None Security
Deciphering Captcha Michael Brooks None Security
Csrf Bouncing† Michael Brooks None Security
Bypassing Pre-Boot Authentication Passwords Jonathan ( Endrazine ) Brossard None Security
Grendel-Scan: A New Web Application Scanning Tool David Byrne , Eric Duprey None Security Web
Building A Real Session Layer D.j. Capelis None Security
Hacking E.S.P. Joe Cicero , Michael Vieau None Security
Hacking Desire Ian Clarke None Security
Climbing Everest: An Insider'S Look At One State'S Voting Systems Sandy Clark None Security
Could Googling Take Down A President, A Prime Minister, Or An Average Citizen? Greg Conti None Security
Compromising Windows Based Internet Kiosks Paul Craig None Security
Hacking Data Retention: Small Sister Your Digital Privacy Self Defense Brenno De Winter None Security Privacy
Ticket To Trouble Brenno De Winter None Security
Next Generation Collaborative Reversing With Ida Pro And Collabreate Chris Eagle , Tim Vidas None Security
Markets For Malware: A Structural Economic Approach Brian K. Edwards , Silvio J. Flaim None Security
De-Tor-Iorate Anonymity Nathan S. Evans , Christian Grothoff None Security Anonymity
Identification Card Security: Past, Present, Future Doug Farre None Security
Snort Plug-In Development: Teaching An Old Pig New Tricks Ben Feinstein None Security
The Wide World Of Wafs Ben Feinstein None Security
Vlans Layer 2 Attacks: Their Relevance And Their Kryptonite Kevin Figueroa , Marco Figueroa , Anthony L. Williams None Security
Virtually Hacking John Fitzpatrick None Security
Is That A Unique Credential In Your Pocket Or Are You Just Pleased To See Me? Zac Franken None Security
Exploiting A Hundred-Million Hosts Before Brunch Stefan Frei , Thomas Duebendorfer , Gunter Ollmann , Martin May None Security
Nmap: Scanning The Internet Fyodor None Security
Journey To The Center Of The Hp28 Travis Goodspeed Security
Making The Def Con 16 Badge Joe ( Kingpin ) Grand None Security
Bsodomizer Joe ( Kingpin ) Grand , Zoz None Security
Nail The Coffin Shut, Ntlm Is Dead Kurt Grutzmacher None Security
Satan Is On My Friends List: Attacking Social Networks Nathan Hamiel , Shawn Moyer None Security
Advanced Software Armoring And Polymorphic Kung Fu Nick Harbour None Security
A Hacker Looks At 50 G. Mark Hardy None Security
Playing With Web Application Firewalls Wendel Guglielmetti Henrique None Security Web
War Ballooning-Kismet Wireless Eye In The Sky Rick Hill None Security Wireless
Under The Ihood Cameron Hotchkies None Security
Race-2-Zero Unpacked Simon Howard None Security
The Death Of Cash Tony Howlett None Security
Ham For Hackers- Take Back The Airwaves Jonm None Security
Dns Goodness Dan Kaminsky None Security DNS
Stealing The Internet - A Routed, Wide-Area, Man In The Middle Attack Tony ( Xam ) Kapela , Alex Pilosov None Security
Demonstration Of Hardware Trojans Fouad Kiamilev , Ryan Hoover None Security
Whitespace: A Different Approach To Javascript Obfuscation Kolisar None Security
Flux On: Eas (Emergency Alert System) Matt "DCFluX" Krick None Security
Career Mythbusters: Separating Fact From Fiction In Your Information Security Career Lee Kushner , Mike Murray None Security
Taking Back Your Cellphone Alexander Lash None Security
Comparison Of File Infection On Windows &Amp; Linux Lclee_vx & Lychan25 , Lychan25 None Security
Developments In Cisco Ios Forensics Felix ( FX ) Lindner None Security Forensics
Toying With Barcodes Felix ( FX ) Lindner None Security
Malware Rce: Debuggers And Decryptor Development Michael Ligh , Greg Sinclair None Security Malware Development
Tuning Your Brain Lyn None Security
Feed My Sat Monkey Major Malfunction None Security
Fear, Uncertainty And The Digital Armageddon Morgan Marquis-boire None Security
Sniffing Cable Modems Guy Martin None Security
Toasterkit, A Modular Netbsd Rootkit Anthony Martinez , Thomas Bowen None Security
Bringing Sexy Back: Breaking In With Style David Maynor , Robert Graham None Security
Forensics Is Only For Private Investigators Scott Moulton None Security Forensics
Solid State Drives Destroy Forensic &Amp; Data Recovery Jobs: Animated! Scott Moulton None Security
Beholder: New Wifi Monitor Tool Nelson Murilo , Luiz 'effffn' Eduardo None Security
Good Viruses. Evaluating The Risks Igor Muttik None Security
Brain Games: Make Your Own Biofeedback Video Game Joe ( Kingpin ) Grand , Ne0nra1n None Security
Anti-Re Techniques In Drm Code Jan Newger None Security
Voiper: Smashing The Voip Stack While You Sleep N.n.p. None Security
The World Of Pager Sniffing/Interception: More Activity Than One May Suspect Nycmike None Security
Hacking Openvms Christer Berg , Claes Nyberg , James Tusini None Security
Every Breath You Take Jim O'leary None Security
365-Day: Active Https Cookie Hijacking Mike Perry None Security
Urban Exploration - A Hacker'S View Phreakmonkey & Mutantmandias , Mutantmandias None Security
Malware Detection Through Network Flow Analysis Bruce Potter None Security Analysis Malware
The True Story Of The Radioactive Boyscout: The First Nuclear Hacker And How His Work Relates To Homeland Security'S Model Of The Dirty Bomb Paul F. Renda None Security
How Can I Pwn Thee? Let Me Count The Ways Renderman None Security
10 Things That Are Pissing Me Off Renderman None Security
The Big Picture: Digital Cinema Technology And Security Mike Renlund None Security
New Tool For Sql Injection With Dns Exfiltration Robert Ricks None Security DNS SQL
Advanced Physical Attacks: Going Beyond Social Engineering And Dumpster Diving Eric "Unlocked" Schmiedl None Security
Gaming - The Next Overlooked Security Hole Ferdinand Schober None Security
Making A Text Adventure Documentary Jason Scott None Security
Free Anonymous Internet Using Modified Cable Modems Blake Self , Devdelay & Bitemytaco , Bitemytaco None Security
Stegofs James Shewmaker None Security
Let'S Sink The Phishermen'S Boat! Teo Sze Siong , Hirosh Joseph None Security
Medical Identity Theft Eric Smith , Dr. Shana Dardan None Security
Captchas: Are They Really Hopeless? (Yes) Mike Spindel , Scott Torborg None Security
Living In The Ria World Alex Stamos , David Thiel , Justine Osborne None Security
Xploiting Google Gadgets: Gmalware And Beyond Robert ( Rsnake ) Hansen , Tom "strace" Stracener None Security
Inducing Momentary Faults Within Secure Smartcards / Microcontrollers Christopher Tarnovsky None Security
Open In 30 Seconds: Cracking One Of The Most Secure Locks In America Marc Weber Tobias , Matt Fiddler None Security
Hijacking The Outdoor Digital Billboard Network Tottenkoph , Rev & Philosopher , Philosopher None Security
How To Make Friends &Amp; Influence Lock Manufacturers Jon King , Schuyler Towne None Security
Evade Ids/Ips Systems Using Geospatial Threat Detection Ryan Trost None Security
Metapost-Exploitation Colin Ames , Valsmith None Security
Keeping Secret Secrets Secret And Sharing Secret Secrets Secretly Vic Vandal None Security
Compliance: The Enterprise Vulnerability Roadmap Weasel None Security
Password Cracking On A Budget Matt Weir , Sudhir Aggarwal None Security
Re:Trace: The Reverse Engineer'S Unexpected Swiss Army Knife David Weston , Tiller Beauchamp None Security
Mobile Hacker Space Thomas Wilhelm None Security
Web Privacy And Flash Local Shared Objects Clinton Wong None Security Web Privacy
New Ideas For Old Practices - Port-Scanning Improved Felix ( FX ) Lindner , Fabian "fabs" Yamaguchi Security
The Death Envelope: A Medieval Solution To A 21St Century Problem Matt Yoder None Security
Panel: Commission On Cyber Security For The 44Th Presidency Marcus Sachs , Jerry Dixon , Michael J. Assante , Tom Kellermann None Security
Panel: Meet The Feds Jim Christy , Jerry Dixon , Bob Hopper , Ken Privette , Andrew Fried , Jon Iadonisi , Kevin Manson , Rich Marshall , Tim Fowler , Barry Gundy , Mike Jacobs , Tim Koshiba , Bob Lentz , Keith Rhodes , Linton Wells None Security
Panel: All Your Sploits (And Servers) Are Belong To Us Rich Mogull , Chris Hoff , Robert ( Rsnake ) Hansen , David Maynor , Robert Graham , David Mortman Security
Panel: Black Vs. White: The Complete Life Cycle Of A Real World Breach David Kennedy , Ken Stasiak , Scott White , John Melvin , Andrew Weidenhamer None Security
Panel: Ask Eff: The Year In Digital Civil Liberties Panel Jennifer Granick , Kevin Bankston , Marcia Hofmann , Kurt Opsahl , Eva Galperin , Corynne Mcsherry None Security Panel
Panel: Hacking In The Name Of Science Tadayoshi Kohno , Jon Callas , Alexei Czeskis , Dan Halperin , Karl Koscher , Michael Piatek None Security
Davix Visualization Workshop Raffael Marty , Jan P. Monsch Security
Shifting The Focus Of Wifi Security: Beyond Cracking Your Neighbor'S Wep Key Thomas Bouvette , Rick Farina None Security