ƒ
Panel - "So It's your first DEF CON" - How to get the most out of DEF CON, What NOT to do.
DEF CON Goons
Welcome to DEF CON & The Making of the DEF CON Badge
The Dark Tangent, Michael and Katie Whiteley (Mkfactor)
Glitched on Earth by humans: A Black-Box Security Evaluation of the SpaceX Starlink User Terminal
Lennert Wouters
Emoji Shellcoding
Hadrien Barral, Georges-Axel Jaloyan
Space Jam: Exploring Radio Frequency Attacks in Outer Space
James Pavur
Exploring the hidden attack surface of OEM IoT devices: pwning thousands of routers with a vulnerability in Realtek’s SDK for eCos OS.
Octavio Gianatiempo, Octavio Galland
Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)
Gal Zror
Hunting Bugs in The Tropics
Daniel Jensen
Killer Hertz
Chris Rock
Panel - DEF CON Policy Dept - What is it, and what are we trying to do for hackers in the policy world?
DEF CON Policy Dept
A Policy Fireside Chat with the National Cyber Director
Chris Inglis
Global Challenges, Global Approaches in Cyber Policy
Gaurav Keerthi, Pete Cooper, Lily Newman, TBA
A Policy Fireside Chat with Jay Healey
Jason Healey, Fahmida Rashid
Leak The Planet: Veritatem cognoscere non pereat mundus
Emma Best, Xan North
DEF CON Policy Dept - Special Edition Policy Talk
DEF CON Policy Dept
Walk This Way: What Run D.M.C. and Aerosmith Can Teach Us About the Future of Cybersecurity
DEF CON Policy Dept
Old Malware, New tools: Ghidra and Commodore 64, why understanding old malicious software still matters
Cesare Pizzi
The PACMAN Attack: Breaking PAC on the Apple M1 with Hardware Attacks
Joseph Ravichandran
Avoiding Memory Scanners: Customizing Malware to Evade YARA, PE-sieve, and More
Kyle Avery
Backdooring Pickles: A decade only made things worse
ColdwaterQ
Weaponizing Windows Syscalls as Modern, 32-bit Shellcode
Tarek Abdelmotaleb, Dr. Bramwell Brizendine
Process injection: breaking all macOS security layers with a single vulnerability
Thijs Alkemade
LSASS Shtinkering: Abusing Windows Error Reporting to Dump LSASS
Asaf Gilboa
Wireless Keystroke Injection (WKI) via Bluetooth Low Energy (BLE)
Jose Pico, Fernando Perera
Let's Dance in the Cache - Destabilizing Hash Table on Microsoft IIS
Orange Tsai
Pulling Passwords out of Configuration Manager: Practical Attacks against Microsoft's Endpoint Management Software
Christopher Panayi
OopsSec -The bad, the worst and the ugly of APT’s operations security
Tomer Bar
Running Rootkits Like A Nation-State Hacker
Omri Misgav
One Bootloader to Load Them All
Mickey Shkatov, Jesse Michael
You’re Muted Rooted
Patrick Wardle
Phreaking 2.0 - Abusing Microsoft Teams Direct Routing
Moritz Abrell
Trace me if you can: Bypassing Linux Syscall Tracing
Rex Guo, Junyuan Zeng
Browser-Powered Desync Attacks: A New Frontier in HTTP Request Smuggling
James Kettle
A dead man’s full-yet-responsible-disclosure system
Yolan Romailler
Deanonymization of TOR HTTP hidden services
Ionut Cernica
Tear Down this Zywall: Breaking Open Zyxel Encrypted Firmware
Jay Lagorio
Hacker Jeopardy, followed by Whose Slide is it Anyway?
Brazil Redux: Short Circuiting Tech-Enabled Dystopia with The Right to Repair
Paul Roberts, Joe Grand, Corynne McSherry, Louis Rossmann, Kyle Wiens
Reversing the Original Xbox Live Protocols
Tristan Miller
The hitchhacker’s guide to iPhone Lightning & JTAG hacking
stacksmashing
Chromebook Breakout: Escaping Jail, with your friends, using a Pico Ducky
Jimi Allee
OpenCola. The AntiSocial Network
John Midgley, Oxblood Ruffin
Déjà Vu: Uncovering Stolen Algorithms in Commercial Products
Patrick Wardle, Tom McGuire
Automotive Ethernet Fuzzing: From purchasing ECU to SOME/IP fuzzing
Jonghyuk Song, Soohwan Oh, Woongjo choi
Ben Gardiner, Chris Poore
Hacking The Farm: Breaking Badly Into Agricultural Devices.
Sick Codes
My First Hack Was in 1958 (Then A Career in Rock’n’Roll Taught Me About Security)
Winn Schwartau
Tracking Military Ghost Helicopters over our Nation's Capital
Andrew Logan
UFOs, Alien Life, and the Least Untruthful Things I Can Say.
Richard Thieme
HACK THE HEMISPHERE! How we (legally) broadcasted hacker content to all of North America using an end-of-life geostationary satellite, and how you can set up your own broadcast too!
Karl Koscher, Andrew Green
The Big Rick: How I Rickrolled My High School District and Got Away With It
Minh Duong
Tor: Darknet Opsec By a Veteran Darknet Vendor & the Hackers Mentality
Sam Bent
Why did you lose the last PS5 restock to a bot Top-performing app-hackers business modules, architecture, and techniques
Arik
Crossing the KASM -- a webapp pentest story
Samuel Erb, Justin Gardner
War Stories
Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All
Jonathan Leitschuh
No-Code Malware: Windows 11 At Your Service
Michael Bargury
All Roads leads to GKE's Host : 4+ Ways to Escape
Billy Jheng, Muhammad ALifa Ramdhan
Exploring Ancient Ruins to Find Modern Bugs: Discovering a 0-Day in an MS-RPC Service
Ben Barnea, Ophir Harpaz
The COW (Container On Windows) Who Escaped the Silo
Eran Segal
You Have One New Appwntment - Hacking Proprietary iCalendar Properties
Eugene Lim
Low Code High Risk: Enterprise Domination via Low Code Abuse
Michael Bargury
Internal Server Error: Exploiting Inter-Process Communication with new desynchronization primitives
Martin Doyhenard
The CSRF Resurrections! Starring the Unholy Trinity: Service Worker of PWA, SameSite of HTTP Cookie, and Fetch
Dongsung Kim
Literal Self-Pwning: Why Patients - and Their Advocates - Should Be Encouraged to Hack, Improve, and Mod Med Tech
Cory Doctorow, Christian "quaddi" Dameff MD, Jeff “r3plicant” Tully MD
How To Get MUMPS Thirty Years Later
Zachary Minneker
The Evil PLC Attack: Weaponizing PLCs
Sharon Brizinov
Analyzing PIPEDREAM: Challenges in testing an ICS attack toolkit.
Jimmy Wylie
Do Not Trust the ASA, Trojans!
Jacob Baines
Doing the Impossible: How I Found Mainframe Buffer Overflows
Jake Labelle
Perimeter Breached! Hacking an Access Control System
Sam Quinn, Steve Povolny
Defeating Moving Elements in High Security Keys
Bill Graydon
Black-Box Assessment of Smart Cards
Daniel Crowley
Digital Skeleton Keys - We’ve got a bone to pick with offline Access Control Systems
Miana E Windall, Micsen
Hacker Jeopardy, followed by Whose Slide is it Anyway?
Exploitation in the era of formal verification: a peek at a new frontier with AdaCore/SPARK
Alex Tereshkin, Adam Zabrocki
The Call is Coming From Inside The Cluster: Mistakes that Lead to Whole Cluster Pwnership
Dagan Henderson, Will Kline
Less SmartScreen More Caffeine – ClickOnce (Ab)Use for Trusted Code Execution
Steven Flores, Nick Powers
DEF CON Closing Ceremonies & Awards
The Dark Tangent
emulation-driven reverse-engineering for finding vulns
atlas
Taking a Dump In The Cloud
Melvin Langvik, Flangvik
RingHopper – Hopping from User-space to God Mode
Jonathan Lusky, Benny Zeltser
DEF CON Closing Ceremonies & Awards
The Dark Tangent
Save The Environment (Variable): Hijacking Legitimate Applications with a Minimal Footprint
Wietze Beukema
PreAuth RCE Chains on an MDM: KACE SMA
Jeffrey Hofmann
ElectroVolt: Pwning popular desktop apps while uncovering new attack surface on Electron
Aaditya Purani, Max Garrett
Contest Closing Ceremonies & Awards
Grifter
STrace - A DTrace on windows reimplementation.
Stephen Eckels
Defaults - the faults. Bypassing android permissions from all protection levels
Nikita Kurtin
The Journey From an Isolated Container to Cluster Admin in Service Fabric
Aviv Sasson
Solana JIT: Lessons from fuzzing a smart-contract compiler
Thomas Roth