All Episodes
DEF CON 24 [Video and Slides] Speeches from the Hacker Convention — 104 episodes
The Dark Tangent - DEF CON 24 Closing Ceremonies
Aaron Luo - Drones Hijacking - multi-dimensional attack vectors and countermeasures
Adam Donenfeld - Stumping the Mobile Chipset
Alex Chapman & Paul Stone - Toxic Proxies - Bypassing HTTPS and VPNs to Pwn Your Online Identity
Allan Cecil - Robot Hacks Video Games: How TASBot Exploits Consoles with Custom Controllers
Amro Abdelgawad - The Remote Metamorphic Engine: Detecting, Evading, Attacking the AI and Reverse Engineering
Anch - So You Think You Want To Be a Penetration Tester
Andy Robbins (@_wald0), Rohan Vazarkar (@cptjesus), Will Schroeder (@harmj0y) - Six Degrees of Domain Admin - Using Graph Theory to Accelerate Red Team Operations
Ang Cui & Jatin Kataria - A Monitor Darkly: Reversing and Exploiting Ubiquitous On-Screen-Display Controllers in Modern Monitors
Anthony Ros & Ben Ramsey - Picking Bluetooth Low Energy Locks from a Quarter Mile Away
L0sT & The Dark Tangent - DEF CON Welcome and Badge Talk
3AlarmLampScooter - DIY Nukeproofing: A New Dig at 'Datamining'
Bigezy & saci - An Introduction to Pinworm: Man in the Middle for your Metadata
Kai Zhong & Kenneth Lee - 411: A framework for managing security alerts
Zero_Chaos & Granolocks - Realtime Bluetooth Device Detection with Blue Hydra
Mudge Zatko & Sarah Zatko - Project CITL
Bryant Zadegan & Ryan Lester - Abusing Bleeding Edge Web Standards for AppSec Glory
Luke Young - Attacking Network Infrastructure to Generate a 4 Tb/s DDoS for $5
Brad Woodberg - Malware Command and Control Channels: A journey into darkness
Patrick Wardle - I've got 99 Problems, but Little Snitch ain't one
Terrell McSweeny & Lorrie Cranor - Research on the Machines: Help the FTC Protect Privacy & Security
Elie Bursztein & Celine Bursztein - Cheating at Poker. Ripping Off People at Poker, James Bond Style
JusticeBeaver (Eric Escobar) - Discovering and Triangulating Rogue Cell Towers
Mike Walker & Dr. Arati - DARPA Cyber Grand Challenge Award Ceremony
Dr. Phil - Mouse Jiggler Offense and Defense
Dr. Paul Vixie - Frontrunning the Frontrunners
Javier Vazquez & Ferdinand Noelscher - CAN i haz car secret plz?
Richard Thieme - Playing Through the Pain? - The Impact of Secrets and Dark Knowledge on Security and Intelligence Professionals
Tamas Szakaly - Help, I've got ANTs!!!
Shane Steiger - Maelstrom - Are You Playing with a Full Deck? : Using a Newly Developed Attack Life Cycle Game to Educate, Demonstrate and Evangelize.
Six_Volts & Haystack - Cheap Tools for Hacking Heavy Trucks
Panel - Team Shellphish - Cyber Grand Shellphish
Mickey Shkatov and Panel - How to Make Your Own DEF CON Black Badge
Haoqi Shan & Wanqiao Zhang - Forcing a Targeted LTE Cellphone into an Unsafe Network
Hunter Scott - Retweet to Win: How 50 lines of Python made me the luckiest guy on Twitter
Henrik Schmidt & Brian Butterly - Attacking BaseStations - an Odyssey through a Telco's Network
The Bob Ross Fan Club - Propaganda and You (and your devices) - How media devices can be used to coerce, and how the same devices can be used to fight back.
Nicholas Rosario (MasterChen) - Weaponize Your Feature Codes
Chris Rock - How to Overthrow a Government
WIlla Cassandra Riggins(abyssknight) - Esoteric Exfiltration
Regilero - Hiding Wookiees in HTTP - HTTP smuggling is a thing we should know better and care about
Plore - Side-channel Attacks on High-security Electronic Safe Locks
Panel - Ask the EFF
Dan ‘AltF4’ Petro - Game over, man! – Reversing Video Games to Create an Unbeatable AI Player
Radia Perlman - How to Design Distributed Systems Resilient Despite Malicious Participants
Guevara Noubir and Amirali Sanatinia - Honey Onions: Exposing Snooping Tor HSDir Relays
Marc Newlin - MouseJack: Injecting Keystrokes into Wireless Mice
Mike - Use Their Machines Against Them: Loading Code with a Copier
Sean Metcalf - Beyond the MCSE: Red Teaming Active Directory
Salvador Mendoza - Samsung Pay: Tokenized Numbers, Flaws and Issues
Wesley McGrew - Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
Panel - Meet the Feds
Linuz & Medic - Sticky Keys To The Kingdom: Pre-auth RCE Is More Common Than You Think
Lucas Lundgren & Neal Hindocha - Light-Weight Protocol! Serious Equipment! Critical Implications!
James Loureiro & Georgi Geshev - Platform agnostic kernel fuzzing
Jianhao Liu, Chen Yan & Wenyuan Xu - Can You Trust Autonomous Vehicles: Contactless Attacks against Sensors of Self-driving Vehicle
Ricky ‘HeadlessZeke’ Lawshae - Let’s Get Physical: Network Attacks Against Physical Security Systems
Ladar Levison - Compelled Decryption - State of the Art in Doctrinal Perversions
LosT - Hacker Fundamentals and Cutting Through Abstraction
Jake Kouns - 'Cyber' Who Done It?! Attribution Analysis Through Arrest History
Tom Kopchak - 101 Sentient Storage - Do SSDs Have a Mind of Their Own?
Yonathan Klijnsma & Dan Tentler - Stargate: Pivoting Through VNC to Own Internal Networks
Jake Kambic - Cunning with CNG: Soliciting Secrets from Schannel
K2 - Blockfighting with a Hooker -- BlockfFghter2!
Jmaxxz - Backdooring the Frontdoor
Przemek Jaroszewski - How to get good seats in the security theater? Hacking boarding passes for fun and profit.
Int0x80 (of Dual Core) - Anti-Forensics AF
Stephan Huber & Siegfried Rasthofer - How to Do it Wrong: Smartphone Antivirus and Security Applications Under Fire
Benjamin Holland - Developing Managed Code Rootkits for the Java Runtime Environment
Weston Hecker - Hacking Hotel Keys and Point of Sale Systems: Attacking Systems Using Magnetic Secure Transmission
Weston Hecker - Hacking Next-Gen ATM's From Capture to Cashout
Jay Healey - Feds and 0Days: From Before Heartbleed to After FBI-Apple
Marco Grassi & Qidan He - Escaping The Sandbox By Not Breaking It
Jennifer S. Granick - Slouching Towards Utopia: The State of the Internet Dream
Joe Grand & Zoz - BSODomizer HD: A Mischievous FPGA and HDMI Platform for the (M)asses
Brian Gorenc & Fritz Sands - Hacker-Machine Interface - State of the Union for SCADA HMI Vulnerabilities
Ulf Frisk - Direct Memory Attack the Kernel
Goldfisk & Follower - Breaking the Internet of Vibrating Things : What We Learned Reverse Engineering Bluetooth- and Internet-Enabled Adult Toys
Joe FitzPatrick & Joe Grand - 101 Ways to Brick your Hardware
Zack Fasel & Erin Jacobs - I Fight For The Users, Episode I - Attacks Against Top Consumer Products
Tim ‘t0rch’ Estell & Katea Murray - Eavesdropping on the Machines
Chris Eagle - Sk3wlDbg: Emulating All (well many) of the Things with Ida
Joshua Drake & Steve Christey - Vulnerabilities 101: How to Launch or Improve Your Vulnerability Research Game
Delta Zero & KingPhish3r - Weaponizing Data Science for Social Engineering: Automated E2E Spear Phishing on Twitter
Brad Dixon - pin2pwn: How to Root an Embedded Linux Box with a Sewing Needle
DC101 - DEF CON 101 Panel
Jonathan-Christofer Demay, Adam Reziouk & Arnaud Lebrun - Auditing 6LoWPAN Networks using Standard Penetration Testing Tools
Jonathan-Christofer Demay & Arnaud Lebrun - CANSPY: a Framework for Auditing CAN Devices
Rogan Dawes & Dominic White - Universal Serial aBUSe: Remote Physical Access Attacks
Clarence Chio - Machine Duping 101: Pwning Deep Learning Systems
CINCVolFLT & AK3R303 - NG9-1-1: The Next Generation of Emergency Ph0nage
Nate Cardozo - Crypto: State of the Law
Ronny Bull & Panel - VLAN hopping, ARP Poisoning and Man-In-The-Middle Attacks in Virtualized Environments
Grant Bugher - Bypassing Captive Portals and Limited Networks
Jonathan Brossard - Introduction the Wichcraft Compiler Collection : Towards Universal Code Theft
Fred Bret-Mounet - All Your Solar Panels are Belong to Me
Bertin Bervis Bonilla & James Jara - Exploiting and Attacking Seismological Networks... Remotely
Evan Booth - Jittery MacGyver: Lessons Learned from Building a Bionic Hand out of a Coffee Maker
Karyn Benson - Examining the Internet's pollution
Matteo Beccaro & Matteo Collura - (Ab)using Smart Cities: The Dark Age of Modern Mobility
Jay Beale & Larry Pesce - Phishing without Failure and Frustration
Max Bazaliy - A Journey Through Exploit Mitigation Techniques in iOS
Ashmastaflash - SITCH - Inexpensive, Coordinated GSM Anomaly Detection
Kor Adana & Panel - MR. ROBOT Panel