• Thursday, August 6
  • Introduction to SDR and the Wireless Village

    DaKahuna, satanklawz
    Thu, 10:00 - 10:50
    DEF CON 101
  • Hackers Hiring Hackers - How to Do Things Better

    IrishMASMS, Tottenkoph
    Thu, 11:00 - 11:50
    DEF CON 101
  • DEF CON 101: The Panel.

    Nikita Kronenberg, Mike Petruzzi, Plug, PushPin, Russ Rogers
    Thu, 12:00 - 13:50
    DEF CON 101
  • Beyond the Scan: The Value Proposition of Vulnerability Assessment

    Damon Small
    Thu, 14:00 - 14:50
    DEF CON 101
  • Responsible Incident: Covert Keys Against Subverted Technology Latencies, Especially Yubikey

    LosT
    Thu, 15:00 - 15:50
    DEF CON 101
  • Guests N’ Goblins: Exposing Wi-Fi Exfiltration Risks and Mitigation techniques

    Joshua Brierton, Peter Desfigies, Naveed Ul Islam
    Thu, 16:00 - 16:50
    DEF CON 101
  • Dark side of the ELF - leveraging dynamic loading to pwn noobs

    Alessandro Di Federico, Yan Shoshitaishvili
    Thu, 17:00 - 17:50
    DEF CON 101
  • Medical Devices: Pwnage and Honeypots

    Mark Collao, Scott Erven
    Thu, 18:00 - 18:50
    DEF CON 101
  • Friday, August 7
  • NSM 101 for ICS

    Chris Sistrunk
    Fri, 10:00 - 10:50
    DEF CON 101
  • Crypto for Hackers

    Eijah
    Fri, 11:00 - 11:50
    DEF CON 101
  • Bruce Schneier Q&A

    Bruce Schneier
    Fri, 12:00 - 12:50
    DEF CON 101
  • Applied Intelligence: Using Information That's Not There

    Michael Schrenk
    Fri, 13:00 - 13:50
    DEF CON 101
  • Hacking SQL Injection for Remote Code Execution on a LAMP stack

    Nemus
    Fri, 14:00 - 14:50
    DEF CON 101
  • Chellam – a Wi-Fi IDS/Firewall for Windows

    Vivek Ramachandran
    Fri, 15:00 - 15:50
    DEF CON 101
  • LTE Recon and Tracking with RTLSDR

    Ian Kline
    Fri, 16:00 - 16:25
    DEF CON 101
  • Detecting Randomly Generated Strings; A Language Based Approach

    Mahdi Namazifar
    Fri, 16:30 - 16:55
    DEF CON 101
  • I Am Packer And So Can You

    Mike Sconzo
    Fri, 17:00 - 17:50
    DEF CON 101
  • Rocking the Pocket Book: Hacking Chemical Plant for Competition and Extortion

    Marina Krotofil, Jason Larsen
    Fri, 18:00 - 18:50
    DEF CON 101
  • Saturday, August 8
  • A Hacker’s Guide to Risk

    Bruce Potter
    Sat, 10:00 - 10:50
    DEF CON 101
  • And That's How I Lost My Other Eye: Further Explorations In Data Destruction

    Zoz
    Sat, 11:00 - 11:50
    DEF CON 101
  • Are We Really Safe? - Bypassing Access Control Systems

    Dennis Maldonado
    Sat, 12:00 - 12:50
    DEF CON 101
  • It's The Only Way To Be Sure: Obtaining and Detecting Domain Persistence

    Grant Bugher
    Sat, 13:00 - 13:50
    DEF CON 101
  • Abusing XSLT for Practical Attacks

    Fernando Arnaboldi
    Sat, 14:00 - 14:50
    DEF CON 101
  • Extending Fuzzing Grammars to Exploit Unexplored Code Paths in Modern Web Browsers

    Saif El-Sherei, Etienne Stalmans
    Sat, 15:00 - 15:50
    DEF CON 101
  • How to Shot Web: Web and mobile hacking in 2015

    Jason Haddix
    Sat, 16:00 - 16:50
    DEF CON 101
  • The Bieber Project: Ad Tech 101, Fake Fans and Adventures in Buying Internet Traffic

    Mark Ryan Del Moral Talabis
    Sat, 17:00 - 17:50
    DEF CON 101
  • Game of Hacks: Play, Hack & Track

    Amit Ashbel, Maty Siman
    Sat, 18:00 - 18:50
    DEF CON 101
  • Linux Containers: Future or Fantasy?

    Aaron Grattafiori
    Sat, 19:00 - 19:50
    DEF CON 101
  • Sunday, August 9
  • Abusing native Shims for Post Exploitation

    Sean Pierce
    Sun, 10:00 - 10:50
    DEF CON 101
  • Ubiquity Forensics - Your iCloud and You

    Sarah Edwards
    Sun, 11:00 - 11:50
    DEF CON 101
  • Hijacking Arbitrary .NET Application Control Flow

    Topher Timzen
    Sun, 12:00 - 12:50
    DEF CON 101
  • RFIDiggity: Pentester Guide to Hacking HF/NFC and UHF RFID

    Francis Brown, Shubham Shah
    Sun, 13:00 - 13:50
    DEF CON 101
  • Contest Closing Ceremonies

     
    Sun, 14:00 - 16:20
    DEF CON 101