• Thursday, August 7
  • DEF CON 101 - The Talk

    HighWiz, Lockheed, LosT, Pyr0, Roamer
    Thu, 10:00 - 11:50
    Track 3
  • Paging SDR... Why should the NSA have all the fun?

    Jason Malley, Jeff Thomas
    Thu, 12:00 - 12:50
    Track 3
  • Protecting SCADA From the Ground Up

    Aaron Bayles
    Thu, 13:00 - 13:50
    Track 3
  • One Man Shop: Building an effective security program all by yourself

    Tim McGuffin
    Thu, 14:00 - 14:50
    Track 3
  • In the forest of knowledge with 1o57

     
    Thu, 15:00 - 15:50
    Track 3
  • Oh Bother, Cruising The Internet With Your Honeys, Creating Honeynets For Tracking Criminal Organizations

    Terrence Gareau, Mike Thompson
    Thu, 16:00 - 16:50
    Track 3
  • RFIDler: SDR.RFID.FTW

    Zac Franken, Adam Laurie
    Thu, 17:00 - 17:50
    Track 3
  • Friday, August 8
  • Oracle Data Redaction is Broken

    David Litchfield
    Fri, 10:00 - 10:50
    Track 3
  • Abuse of Blind Automation in Security Tools

    Ruben Alejandro, Eric Davisson
    Fri, 11:00 - 11:50
    Track 3
  • From root to SPECIAL: Pwning IBM Mainframes

    Philip Young
    Fri, 12:00 - 12:20
    Track 3
  • The $env:PATH less Traveled is Full of Easy Privilege Escalation Vulns

    Christopher Campbell
    Fri, 12:30 - 12:50
    Track 3
  • Bypass firewalls, application white lists, secure remote desktops under 20 seconds

    Zoltán Balázs
    Fri, 13:00 - 13:50
    Track 3
  • Extreme Privilege Escalation On Windows 8/UEFI Systems

    Corey Kallenberg, Xeno Kovah
    Fri, 14:00 - 14:50
    Track 3
  • Veil-Pillage: Post-exploitation 2.0

    Will Schroeder
    Fri, 15:00 - 15:50
    Track 3
  • Acquire current user hashes without admin privileges

    Anton Sapozhnikov
    Fri, 16:00 - 16:50
    Track 3
  • Why Don’t You Just Tell Me Where The ROP Isn’t Supposed To Go

    David Dorsey
    Fri, 17:00 - 17:20
    Track 3
  • The Secret Life of Krbtgt

    Christopher Campbell
    Fri, 17:30 - 17:50
    Track 3
  • Saturday, August 9
  • Mass Scanning the Internet: Tips, Tricks, Results

    Rob Graham, Paul McMillan, Dan Tentler
    Sat, 10:00 - 10:50
    Track 3
  • I Hunt TR-069 Admins: Pwning ISPs Like a Boss

    Shahar Tal
    Sat, 11:00 - 11:50
    Track 3
  • Don't DDoS Me Bro: Practical DDoS Defense

    Shawn Burrell, Blake Self
    Sat, 12:00 - 12:50
    Track 3
  • Secure Because Math: A Deep Dive On Machine Learning-Based Monitoring

    Alex Pinto
    Sat, 13:00 - 13:50
    Track 3
  • Masquerade: How a Helpful Man-in-the-Middle Can Help You Evade Monitoring.

    The Grugq, Ryan Lackey, Marc Rogers
    Sat, 14:00 - 14:50
    Track 3
  • VoIP Wars: Attack of the Cisco Phones

    Fatih Ozavci
    Sat, 15:00 - 15:50
    Track 3
  • Abusing Software Defined Networks

    Gregory Pickett
    Sat, 16:00 - 16:50
    Track 3
  • Getting Windows to Play with Itself: A Hacker's Guide to Windows API Abuse

    Brady Bloxham
    Sat, 17:00 - 17:50
    Track 3
  • Surveillance on the Silver Screen- Fact or Fiction?

    Kevin Bankston, Timothy Edgar, Nicole Ozer
    Sat, 18:00 - 18:50
    Track 3
  • Sunday, August 10
  • I am a legend: Hacking Hearthstone with machine learning

    Celine Bursztein, Elie Bursztein
    Sun, 10:00 - 10:50
    Track 3
  • Through the Looking-Glass, and What Eve Found There

    Luca Bruno, Mariano Graziano
    Sun, 11:00 - 11:50
    Track 3
  • Catching Malware En Masse: DNS and IP Style

    Dhia Mahjoub, Thibault Reuille, Andree Toonk
    Sun, 12:00 - 12:50
    Track 3
  • Weird-Machine Motivated Practical Page Table Shellcode & Finding Out What's Running on Your System

    Shane Macaulay
    Sun, 13:00 - 13:50
    Track 3
  • Generating ROP payloads from numbers

    Alexandre Moneger
    Sun, 14:00 - 14:50
    Track 3
  • Shellcodes for ARM: Your Pills Don't Work on Me, x86

    Svetlana Gaivoronski, Ivan Petrov
    Sun, 15:00 - 15:50
    Track 3