Defcon 18 Conference: Presentation Materials (2010)
http://defcon.org/html/defcon-18/dc-18-index.html
http://defcon.org/html/defcon-18/dc-18-schedule.html
Below is the speaker schedule… Enjoy!
——————-
Thursday Speaking Schedule
* 13:00
Track 1
DEF CON 101
Panel
Until: 15:00
*
Track 4
Hacking The Future: Weaponizing The Next Generation
Panel
Until: 15:00
*
Capri Room 111
Go Go Gadget Python! : Introduction to Hardware Hacking
Nick Waite, Furkan Cayci
Until: 14:00
[demo] [tool]
*
Capri Room 112
Exploitable Assumptions Workshop
Joe “Crazy” Foley, Eric “Unlocked” Schmiedl, Zoz
Until: 15:00
*
Capri Room 113
Hardware Black Magic: Designing Printed Circuit Boards
Dr. Fouad Kiamilev, Corey ‘c0re’ Lange, Stephen ‘afterburn’ Janansky
Until: 16:00
* 14:00
Track 1
DEF CON 101 (con’t)
Panel
Until: 15:00
*
Track 4
Hacking The Future: Weaponizing The Next Generation (con’t)
Panel
Until: 15:00
*
Capri Room 111
The Keys To Running A Successful DEF CON Group By DC612
David “VideoMan” M. N. Bryan, Jared Bird
Until: 15:00
*
Capri Room 112
Exploitable Assumptions Workshop (con’t)
Joe “Crazy” Foley, Eric “Unlocked” Schmiedl, Zoz
Until: 15:00
*
Capri Room 113
Hardware Black Magic: Designing Printed Circuit Boards (con’t)
Dr. Fouad Kiamilev, Corey ‘c0re’ Lange, Stephen ‘afterburn’ Janansky
Until: 16:00
[demo]
* 19:00
Track 2
DC 18 Movie Night
GET LAMP
Jason Scott
Until: 21:00:00
Thursday Events Schedule
* 17:30 Toxic BBQ Location: Sunset Park, Area F
Until: 21:00
* 20:00 The Summit Location: Top of the Riv – Penthouse Monaco Tower
Until: 04:00
* 21:00 Hacker Karaoke Location: Skybox 212
Until: 02:00
* Movie Night – GET LAMP Location: Track 2
Until: ???
Friday, July 30th
Go to: Speakers / Events
08:00 – 22:00
Registration at Royale Registration Desk – $140 USD CASH ONLY – Avoid the lines and get your badge early.
Vendor Area Hours: 10:00 – 19:00
Friday Speaking Schedule
* 10:00
Track 1
Perspectives on Cyber Security and Cyber Warfare
Max Kelly
Until: 10:50
*
Track 2
SIE Passive DNS and the ISC DNS Database
Paul Vixie
Until: 10:50
[demo] [exploit]
*
Track 3
How To Get Your FBI File (and Other Information You Want From the Federal Government)
Marcia Hofmann
Until: 10:50
*
Track 4
Welcome and Making the DEF CON 18 Badge
Dark Tangent, Joe Grand
Until: 11:50
*
Track 5
oCTF: 5 years in 50 minutes
Panel
Until: 10:50
* 10:30
Track 1
Keynote (con’t)
Top Secret
*
Track 2
TBA (con’t)
Paul Vixie
*
Track 3
How To Get Your FBI File (and Other Information You Want From the Federal Government) (con’t)
Marcia Hofmann
*
Track 4
Welcome and Making the DEF CON 18 Badge (con’t)
Dark Tangent, Joe Grand
*
Track 5
oCTF: 5 years in 50 minutes (con’t)
Panel
Until: 10:50
* 11:00
Track 1
Meet the Feds – CSI:TCP/IP
Panel
Until: 11:50
*
Track 2
Cloud Computing, a Weapon of Mass Destruction?
David “VideoMan” M. N. Bryan
Until: 11:50
[demo] [tool]
*
Track 3
Our Instrumented Lives: Sensors, Sensors, Everywhere…
Greg Conti
Until: 11:50
*
Track 4
Welcome and Making the DEF CON 18 Badge (con’t)
Dark Tangent, Joe Grand
*
Track 5
Open Public Sensors and Trend Monitoring
Daniel Burroughs
Until: 11:20
[demo] [tool]
* 11:30
Track 1
Meet the Feds – CSI:TCP/IP (con’t)
Panel
*
Track 2
Cloud Computing, a Weapon of Mass Destruction? (con’t)
David “VideoMan” M. N. Bryan
*
Track 3
Our Instrumented Lives: Sensors, Sensors, Everywhere… (con’t)
Greg Conti
*
Track 4
Welcome and Making the DEF CON 18 Badge (con’t)
Dark Tangent, Joe Grand
*
Track 5
FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
Sho Ho
Until: 11:50
[demo] [tool]
* 12:00
Track 1
DNS Systemic Vulnerabilities and Risk Management: A Discussion
Panel
Until: 12:50
*
Track 2
How Unique Is Your Browser?
Peter Eckersley
Until: 12:50
[demo]
*
Track 3
Your ISP and the Government: Best Friends Forever.
Christopher Soghoian
Until: 12:50
*
Track 4
Build a Lie Detector/Beat a Lie Detector
Rain
Until: 12:50
[demo]
*
Track 5
Google Toolbar: The NARC Within
Jeff Bryner
Until: 12:20
[demo]
* 12:30
Track 1
DNS Systemic Vulnerabilities and Risk Management: A Discussion (con’t)
Panel
*
Track 2
How Unique Is Your Browser? (con’t)
Peter Eckersley
*
Track 3
Your ISP and the Government: Best Friends Forever. (con’t)
Christopher Soghoian
*
Track 4
Build a Lie Detector/Beat a Lie Detector (con’t)
Rain
*
Track 5
Crawling BitTorrent DHTs for Fun
Scott Wolchok
Until: 12:50
* 13:00
Track 1
Meet the Feds – Policy, Privacy, Deterrence and Cyber War
PANEL
Until: 13:50
*
Track 2
Token Kidnapping’s Revenge
Cesar Cerrudo
Until: 13:50
[demo] [exploit]
*
Track 3
The Law of Laptop Search and Seizure
Jennifer Granick,
Kevin Bankston,
Marcia Hofmann,
Kurt Opsahl
Until: 13:50
*
Track 4
How Hackers Won the Zombie Apocalypse
Dennis Brown
Until: 13:50
[demo] [tool] [exploit]
*
Track 5
Who Cares About IPv6?
Sam Bowne
Until: 13:20
* 13:30
Track 1
Meet the Feds – Policy, Privacy, Deterrence and Cyber War (con’t)
PANEL
*
Track 2
Token Kidnapping’s Revenge (con’t)
Cesar Cerrudo
*
Track 3
The Law of Laptop Search and Seizure (con’t)
Jennifer Granick,
Kevin Bankston,
Marcia Hofmann,
Kurt Opsahl
*
Track 4
How Hackers Won the Zombie Apocalypse (con’t)
Dennis Brown
*
Track 5
Operating System Fingerprinting for Virtual Machines
Nguyen Anh Quynh
Until: 13:50
[demo] [tool]
* 14:00
Track 1
Enough Cyber Talk Already! Help get this Collaboration Engine Running!
Riley Repko
Until: 14:50
*
Track 2
Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
Rob Ragan,
Francis Brown
Until: 14:50
[demo] [tool]
*
Track 3
Search & Seizure & Golfballs
Jim Rennie,
Eric Rachner
Until: 14:50
[demo]
*
Track 4
Build your own UAV 2.0 – Wireless Mayhem from the Heavens!
Michael Weigand,
Renderman,
Mike Kershaw
Until: 14:50
[demo] [tool]
*
Track 5
Web Application Fingerprinting with
Static Files
Patrick Thomas
Until: 14:20
[demo] [tool]
* 14:30
Track 1
Enough Cyber Talk Already! Help get this Collaboration Engine Running! (con’t)
Riley Repko
[demo] [tool] [exploit]
*
Track 2
Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing (con’t)
Rob Ragan,
Francis Brown
*
Track 3
Search & Seizure & Golfballs (con’t)
Jim Rennie,
Eric Rachner
*
Track 4
Build your own UAV 2.0 – Wireless Mayhem from the Heavens! (con’t)
Michael Weigand,
Renderman,
Mike Kershaw
*
Track 5
WRT54-TM, Media Center and Network Sniffer
John A. Colley
Until: 14:50
[demo]
* 15:00
Track 1
Open Letter – Call to Action
Until: 15:50
*
Track 2
Tales from the Crypto
G. Mark Hardy
Until: 15:50
[demo]
*
Track 3
Exploiting Internet Surveillance Systems
Decius
Until: 15:50
*
Track 4
Exploiting Digital Cameras
Oren Isacson,
Alfredo Ortega
Until: 15:50
[demo] [exploit]
*
Track 5
Air Traffic Control Insecurity 2.0
Righter Kunkel
Until: 15:20
[exploit]
* 15:30
Track 1
Open Letter – Call to Action (con’t)
*
Track 2
Tales from the Crypto (con’t)
G. Mark Hardy
*
Track 3
Exploiting Internet Surveillance Systems (con’t)
Decius
*
Track 4
Exploiting Digital Cameras (con’t)
Oren Isacson,
Alfredo Ortega
*
Track 5
FPGA Bitstream Reverse Engineering
Lang Nguyen
Until: 15:50
[tool]
* 16:00
Track 1
Of Bytes and Bullets
Panel
Until: 16:50
*
Track 2
Exploiting WebSphere Application Server’s JSP Engine
Ed Schaller
Until: 16:50
[demo] [tool] [exploit]
*
Track 3
Hacking Facebook Privacy
Chris Conley
Until: 16:50
[demo] [tool]
*
Track 4
VirGraff101: An Introduction to Virtual Graffiti
Tottenkoph
Until: 16:50
[demo]
*
Track 5
Like a Boss: Attacking JBoss
Tyler Krpata
Until: 16:20
[tool]
* 16:30
Track 1
Of Bytes and Bullets (con’t)
Panel
*
Track 2
Exploiting WebSphere Application Server’s JSP Engine (con’t)
Ed Schaller
*
Track 3
Hacking Facebook Privacy (con’t)
Chris Conley
*
Track 4
VirGraff101: An Introduction to Virtual Graffiti (con’t)
Tottenkoph
*
Track 5
Letting the Air Out of Tire Pressure Monitoring Systems
Mike Metzger
Until: 16:50
[demo] [tool]
* 17:00
Track 1
Mastering the Nmap scripting Engine
Fyodor,
David Fifield
Until: 17:50
[demo] [tool]
*
Track 2
Hacking Oracle From Web Apps
Sumit Siddharth
Until: 17:50
[demo] [tool]
*
Track 3
An Observatory for the SSLiverse
Peter Eckersley, Jesse Burns
Until: 17:50
[demo] [tool]
*
Track 4
DCFluX in: Moon-bouncer
Matt Krick
Until: 17:50
*
Track 5
Evilgrade, You Still Have Pending Upgrades?
Francisco Amato
Until: 17:20
[demo] [tool]
* 17:30
Track 1
Mastering the Nmap scripting Engine (con’t)
Fyodor,
David Fifield
*
Track 2
Hacking Oracle From Web Apps (con’t)
Sumit Siddharth
*
Track 3
An Observatory for the SSLiverse (con’t)
Peter Eckersley, Jesse Burns
*
Track 4
DCFluX in: Moon-bouncer (con’t)
Matt Krick
*
Track 5
Training the Next Generation of Hardware Hackers — Teaching Computer Organization and Assembly Language Hands-on with embedded Systems
Andrew Kongs, Dr. Gerald Kane
Until: 17:50
[demo] [tool]
* 18:00
Track 1
Meet the EFF
Kevin Bankston,
Eva Galperin,
Jennifer Granick,
Marcia Hofmann,
Kurt Opsahl
Until: 18:50
*
Track 2
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
Wayne Huang
Until: 18:50
[demo] [tool] [exploit]
*
Track 3
Bad Memories
Elie Bursztein,
Baptiste Gourdin,
Gustav Rydstedt
Until: 18:50
[demo] [tool] [exploit]
*
Track 4
Weaponizing Lady GaGa, Psychosonic Attacks
Brad Smith
Until: 18:50
[demo] [exploit]
*
Track 5
Be A Mentor!
Marisa Fagan
Until: 18:20
* 18:30
Track 1
Meet the EFF (con’t)
Kevin Bankston,
Eva Galperin,
Jennifer Granick,
Marcia Hofmann,
Kurt Opsahl
*
Track 2
Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection (con’t)
Wayne Huang
*
Track 3
Bad Memories (con’t)
Elie Bursztein,
Baptiste Gourdin,
Gustav Rydstedt
*
Track 4
Weaponizing Lady GaGa, Psychosonic Attacks (con’t)
Brad Smith
*
Track 5
Your Boss is a Douchebag… How About You?
Luiz “effffn” Eduardo
Until: 18:50
* 19:00
Track 1
Black Ops Of Fundamental Defense: Web Edition
Dan Kaminsky
Until: 19:50
*
Track 2
Hacking and Protecting Oracle Database Vault
Esteban MartÃnez Fayó
Until: 19:50
*
Track 3
FOCA2: The FOCA
Strikes Back
Chema Alonso,
José Palazón “Palako”
Until: 19:50
[demo] [tool]
*
Track 4
Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
Richard Thieme
Until: 19:50
*
Track 5
Antique Exploitation (aka Terminator 3.1.1 for Workgroups
Jon Oberheide
Until: 19:20
[demo] [tool] [exploit]
* 19:30
Track 1
Black Ops Of Fundamental Defense: Web Edition (con’t)
Dan Kaminsky
Until: 19:50
*
Track 2
Hacking and Protecting Oracle Database Vault (con’t)
Esteban MartÃnez Fayó
Until: 19:50
*
Track 3
FOCA2: The FOCA
Strikes Back (con’t)
Chema Alonso,
José Palazón “Palako”
Until: 19:50
[demo] [tool]
*
Track 4
Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are (con’t)
Richard Thieme
Until: 19:50
*
Track 5
Pwned By The Owner: What Happens When You Steal A Hacker’s Computer
Zoz
Until: 19:50
* 20:00
Track 1
*
Track 2
*
Track 3
Big Brother on the Big Screen: Fact/Fiction?
Nicole Ozer,
Kevin Bankston
Until: 20:50
[demo]
*
Track 4
Live Fire Exercise: Baltic Cyber Shield 2010
Kenneth Geers
Until: 20:50
*
Track 5
* 21:00
Track 1
*
Track 2
*
Track 3
*
Track 4
Panel: Internet Wars
Marcus Sachs
Until: 21:50
*
Track 5
Reviews
There are no reviews yet.