The ONE!

One Schedule to Rule them All!


Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 28.

It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.

The intent is still to be a resource to answer the question at the end of an hour of "What's next?"

As a general rule I do not include:

Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.

Check out the Guides/Tips/FAQs links if you're new to Las Vegas.
Notable suggestions are:

And finally, this is only as good as the ideas and information used to generate it. I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org

Have a good time at DEF CON 28!


Index of DEF CON 28 Activities


Locations Legends and Info
Schedule   - Thursday  - Friday  - Saturday  - Sunday
Speaker List
Talk Title List
Village Talk List
    AEV - AIV - ASV - BCV - BHV - BTVT1 - BTVW1 - BTVW2 - CHV - CLV - CNE - CPV - CRV - DC - DCG - DL - ENT - ETV - FSL - HHV - HRV - HTS - ICS - IOT - LBV - LPV - MOV - PAYV - PHVT - PHVW - POV - PWDV - RCV - RGV - RTV - SEV - VMV - WLV
Talk Descriptions
DEF CON News
DEF CON 28 FAQ
DEF CON FAQ
Links to DEF CON 28 related pages


Locations Legends and Info

AIV = Artifical Intellegence Village
      Location: #aiv-general-text

ASV = AppSec Village
      Location: #asv-general-text

AEV = AeroSpace Village
      Location: #av-lounge-bar-text

BCV = Blockchain Village
      Location: #bcv-general-text

BHV = Bio Hacking Village
      Location: #bhv-general-text

BTVT  = Blue Team Village Talks
BTVW = Blue Team Village Workshops
      Location: #btv-general-text

CHV = Car Hacking Village
      Location: #chv-welcome-text

CLV = Cloud Village
      Location: #cloudv-general-text

CNE = Contests and Events
     

CPV = Crypto Privacy Village
      Location: #cpv-general-text

CRV = Career Hacking Village
      Location: #cahv-general-text

DC = DEF CON Talks
     

DCG = DEF CON Groups
      Location: #dcg-stage-voice

DDV = Data Duplication Village
      Location: #ddv-general-text

DL = DEF CON DemoLabs
     

ENT = Entertainment ( Music )
     

ETV = Ethics Village
      Location: #ev-general-text

FSL = Fireside Lounge
      Location: #fireside-lounge-voice

HHV = Hardware Hacking Village
      Location: #hhv-infobooth-text

HRV = Ham Radio Village
      Location: #ham-general-text

HTS = Hack The Sea
      Location: #htsv-general-text

ICS = Industrial Control Systems Village
      Location: #ics-general-text

IOT = Internet Of Things Village
      Location: #iotv-general-text

LBV = Lock Bypass Village
      Location: #lbpv-social-text

LPV = Lockpicking Village
      Location: #lpv-general-text

MOV = Monero Village
      Location: #mv-general-text

PHVT = Packet Hacking Village Talks
PHVW = Packet Hacking Village Workshops
Wall of Sheep
      Location: #phv-infobooth-text
PAYV = Payment Village
      Location: #pay-labs-text
PWDV = Password Village
      Location: #pwdv-general-text
POV = Policy Village
      Location: #pol-general-text
RCV = Recon Village
      Location: #rv-general-text
RGV = Rogue's Village
      Location: #rov-announcements-text
RTV = Red Team Village
      Location: #rtv-briefings-text

SEV = Social Engineering Village
      Location: #sev-general-text

Vendors Area
      Vendors Discord channel #vendors

VMV = Voting Machine Village
      Location: #vmhv-general-text

WLV = Wireless Village
      Location: #wv-general-text

Talk/Event Schedule


Thursday


This Schedule is tentative and may be changed at any time. Check at an Info Booth for the latest.

 

Thursday - 07:00 PDT


Return to Index  -  Locations Legend
RTV - (07:30-07:59 PDT) - Red Team Village Announcements and Remarks - Joseph Mlodzìanowskì (cedoXx),Omar Ωr

 

Thursday - 08:00 PDT


Return to Index  -  Locations Legend
RTV - The Bug Hunter’s Methodology - Jason Haddix

 

Thursday - 09:00 PDT


Return to Index  -  Locations Legend
BTVT1 - Blue Team Village - Opening Ceremony
DC - (09:30-09:59 PDT) - Discovering Hidden Properties to Attack Node.js ecosystem - Feng Xiao
RTV - Red Team Village CTF - Prequal -
RTV - (09:15-10:15 PDT) - Securing AND Pentesting the Great Spaghetti Monster (k8s) - Kat Fitzgerald
WLV - wicked wardriving with gps and glonass - wytshadow
WLV - Introduction to WiFi Security - Nishant Sharma
WLV - Wireless Blue Team - Eric Escobar
WLV - DragonOS - How I kept busy during COVID19 - cemaxecuter
WLV - The Basics Of Breaking BLE v3 - FreqyXin

 

Thursday - 10:00 PDT


Return to Index  -  Locations Legend
BTVT1 - (10:15-10:59 PDT) - Graylog: An Introduction Into OpenSOC CTF Tools - Lennart Koopmann
DC - (10:30-10:59 PDT) - Room for Escape: Scribbling Outside the Lines of Template Security - Alvaro Munoz,Oleksandr Mirosh
RTV - cont...(09:15-10:15 PDT) - Securing AND Pentesting the Great Spaghetti Monster (k8s) - Kat Fitzgerald
RTV - (10:30-11:30 PDT) - Guerrilla Red Team: Decentralize the Adversary - Christopher Cottrell

 

Thursday - 11:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (11:15-11:59 PDT) - Kibana: An Introduction Into OpenSOC CTF Tools - TimDotZero
DC - (11:30-11:59 PDT) - DNSSECTION: A practical attack on DNSSEC Zone Walking - Hadrien Barral,Rémi Géraud-Stewart
RTV - cont...(10:30-11:30 PDT) - Guerrilla Red Team: Decentralize the Adversary - Christopher Cottrell
RTV - (11:45-12:45 PDT) - Evil Genius: Why you shouldn't trust that keyboard - Farith Perez,Mauro Cáseres

 

Thursday - 12:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (12:15-12:59 PDT) - OpenSOC CTF Tool Demo: Moloch
DC - (12:30-12:59 PDT) - Hacking the Hybrid Cloud - Sean Metcalf
RTV - cont...(11:45-12:45 PDT) - Evil Genius: Why you shouldn't trust that keyboard - Farith Perez,Mauro Cáseres

 

Thursday - 13:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (13:15-13:59 PDT) - Osquery: An Introduction Into OpenSOC CTF Tools - Whitney Champion
DC - (13:30-13:59 PDT) - Hacking traffic lights - Rik van Duijn,Wesley Neelen
HTS - Dockside with the US Coast Guard
RTV - Combining notebooks, datasets, and cloud for the ultimate automation factory - Ryan Elkins

 

Thursday - 14:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (14:15-14:59 PDT) - Velociraptor: An Introduction Into OpenSOC CTF Tools - Mike Cohen
DC - (14:30-14:59 PDT) - Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices - Ariel Schön,Moshe Kol,Shlomi Oberman
RTV - (14:15-15:15 PDT) - Deep Dive into Adversary Emulation - Ransomware Edition - Jorge Orchilles

 

Thursday - 15:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (15:15-15:59 PDT) - Zeek: An Introduction Into OpenSOC CTF Tools - Aaron Soto,Amber Graner
DC - (15:30-15:59 PDT) - Demystifying Modern Windows Rootkits - Bill Demirkapi
RTV - cont...(14:15-15:15 PDT) - Deep Dive into Adversary Emulation - Ransomware Edition - Jorge Orchilles
RTV - (15:30-16:30 PDT) - Introducing DropEngine: A Malleable Payload Creation Framework - Gabriel Ryan

 

Thursday - 16:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (16:15-16:59 PDT) - Suricata: An Introduction Into OpenSOC CTF Tools - Josh
DC - (16:30-16:59 PDT) - Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise - Erik Hunstad
RTV - cont...(15:30-16:30 PDT) - Introducing DropEngine: A Malleable Payload Creation Framework - Gabriel Ryan
RTV - (16:45-17:45 PDT) - Zero Trust - A Vision for Securing Cloud and Redefining Security - Vandana Verma Sehgal

 

Thursday - 17:00 PDT


Return to Index  -  Locations Legend
BTVW1 - (17:15-17:59 PDT) - OpenSOC CTF Tool Demo: Thinkst Canary
RTV - cont...(16:45-17:45 PDT) - Zero Trust - A Vision for Securing Cloud and Redefining Security - Vandana Verma Sehgal

 

Thursday - 18:00 PDT


Return to Index  -  Locations Legend
RTV - What college kids always get wrong, the art of attacking newbies to blueteam - Forrest Fuqua

 

Thursday - 19:00 PDT


Return to Index  -  Locations Legend
RTV - (19:15-20:15 PDT) - Android Malware Adventures - Kürşat Oğuzhan Akıncı,Mert Can Coşkuner

 

Thursday - 20:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(19:15-20:15 PDT) - Android Malware Adventures - Kürşat Oğuzhan Akıncı,Mert Can Coşkuner
RTV - (20:30-21:30 PDT) - Making Breach and Attack Simulation Accessible and Actionable with Infection Monkey - from IT to the C-suite - Shay Nehmad

 

Thursday - 21:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(20:30-21:30 PDT) - Making Breach and Attack Simulation Accessible and Actionable with Infection Monkey - from IT to the C-suite - Shay Nehmad
RTV - (21:45-22:45 PDT) - Android Application Exploitation - Kyle Benac (aka @B3nac)

 

Thursday - 22:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(21:45-22:45 PDT) - Android Application Exploitation - Kyle Benac (aka @B3nac)

 

Thursday - 23:00 PDT


Return to Index  -  Locations Legend
RTV - Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing - Kaustubh Padwad

Friday


This Schedule is tentative and may be changed at any time. Check at an Info Booth for the latest.

 

Friday - 06:00 PDT


Return to Index  -  Locations Legend
CLV - Cloud Village CTF -

 

Friday - 07:00 PDT


Return to Index  -  Locations Legend
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -
RTV - (07:30-07:59 PDT) - Red Team Village Opening Remarks - Joseph Mlodzìanowskì (cedoXx),Omar Ωr

 

Friday - 08:00 PDT


Return to Index  -  Locations Legend
AEV - Hack-A-Sat Launch Party -
RTV - Knock knock, who's there? Identifying assets in the cloud - Tanner Barnes (aka @_StaticFlow_),NahamSec

 

Friday - 09:00 PDT


Return to Index  -  Locations Legend
AIV - (09:30-09:59 PDT) - Opening Remarks - AI Village Organizers
BHV - (09:30-10:45 PDT) - DAY1 KEYNOTE: The Trust Talks - Nina Alli,Vee Schmitt,Yusuf Henriques,Josh O'Connor,Cannibal,Devabhaktuni Srikrishna,Najla Lindsay,Nate DeNicola
DC - (09:30-09:59 PDT) - Welcome to DEF CON Safe Mode - The Dark Tangent
HHV - (09:30-09:59 PDT) - Meetup: Some HHV Challenges - rehr
ICS - Keynote - Chris Krebs
IOT - (09:15-09:45 PDT) - How to get rights for hackers - Chloé Messdaghi
MOV - (09:50-09:59 PDT) - Welcome Speech - rehr
PAYV - (09:45-09:59 PDT) - Welcome to the Payment Village - Leigh-Anne Galloway
RTV - (09:15-10:15 PDT) - Red Teaming: Born from the Hacker Community - Chris Wysopal
RTV - (09:30-15:59 PDT) - Red Team Village CTF - Finals -

 

Friday - 10:00 PDT


Return to Index  -  Locations Legend
AEV - Opening Remarks: Getting The Aerospace Village To Take-Off - Chris Krebs,Dr Will Roper,Pete Cooper
AIV - ML Security Evasion Competition 2020 - drhyrum,zh4ck
AIV - (10:30-10:59 PDT) - Baby's First 100 MLSec Words - erickgalinkin
ASV - Who’s secure, who’s not, & who makes that choice - Maddie Stone
BCV - Welcome Note
BCV - Key Note - State of Blockchain Security - Peter Kacherginsky
BHV - cont...(09:30-10:45 PDT) - DAY1 KEYNOTE: The Trust Talks - Nina Alli,Vee Schmitt,Yusuf Henriques,Josh O'Connor,Cannibal,Devabhaktuni Srikrishna,Najla Lindsay,Nate DeNicola
BTVT1 - Quark Engine - An Obfuscation-Neglect Android Malware Scoring System (Beginner) - JunWei Song,KunYu Chen
BTVW1 - Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI (Intermediate) - Scoubi
CHV - Adding new features by manipulating CAN bus - Teejay
CHV - Automotive In-Vehicle Networks - Kamel Ghali
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -
CPV - STARTTLS is Dangerous - Hanno Böck
CRV - From Barista to Cyber Security Pro, Breaking the Entry Level Barrier - Alyssa Miller
DC - (10:30-10:59 PDT) - Spectra—New Wireless Escalation Targets - Francesco Gringoli,Jiska Classen
DL - Carnivore (Microsoft External Attack Tool) - Chris Nevin
DL - CIRCO v2: Cisco Implant Raspberry Controlled Operations - Emilio Couto
ETV - Federal Communications Commission - Comm. Geoffrey Starks
HHV - Learn to Solder the BadgeBuddy Kit - Joseph Long (hwbxr)
HRV - Village Opening Remarks -
HTS - Yacht PWNed - Stephen Gerling
ICS - (10:15-10:45 PDT) - ICS Village CTF Kick-Off - Tom
IOT - IoT Hacking Stories in Real Life - Besim Altinok
IOT - (10:45-11:45 PDT) - Getting Started – Building an IoT Hardware Hacking Lab -
LBV - Bypass 101 + Q&A
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - Making sense of EMV card data – decoding the TLV format - Dr Steven J. Murdoch
PHVT - Media Analysis of Disinformation Campaigns - Chet Hosmer,Mike Raggo
PWDV - Getting Started with Hashcat - Password Village Staff
RTV - cont...(09:15-10:15 PDT) - Red Teaming: Born from the Hacker Community - Chris Wysopal
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - (10:30-11:30 PDT) - Panel: The Joy of Coordinating Vulnerability Disclosure - Daniel Gruss,CRob,Lisa Bradley,Katie Noble,Omar Santos, Anders Fogh
VMV - Welcome and Kick-Off - Harri Hursti,Matt Blaze,Maggie MacAlpine
VMV - (10:30-10:59 PDT) - Keynote Remarks: Representative Jackie Speier - Jackie Speier

 

Friday - 11:00 PDT


Return to Index  -  Locations Legend
AEV - MITM - The Mystery In The Middle. An Introduction To The Aircraft Information Systems Domain - Matt Gaffney
AIV - Workshop 1
ASV - 2FA in 2020 and Beyond - Kelley Robinson
ASV - Applying Pysa to Identify Python Security Vulnerabilities - Graham Bleaney
BCV - Verifiable Delay Functions for preventing DDoS Attacks on Ethereum 2.0 - Gokul Alex,Tejaswa Rastogi
BHV - Fireside Chat with Dr. Amy Abernethy and Adama Ibrahim - Adama Ibrahim,Amy Abernethy
BHV - (11:30-11:59 PDT) - Porcupine: Rapid and robust tagging of physical objects using DNA with highly separable nanopore signatures - Katie Doroschak
BTVT1 - OuterHaven - The UEFI Memory Space Just Itching to be Misused (Intermediate) - Connor Morley
BTVW1 - cont...(10:00-11:30 PDT) - Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI (Intermediate) - Scoubi
BTVW2 - (11:30-13:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - Ben Gardiner,Chris Poore
CHV - OBD and what we CAN do with it - Infenet
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -
CLV - Opening Keynote
CLV - (11:20-12:05 PDT) - IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP) - Jenko Hwong
CPV - LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage - Akira Takahashi,F. Novaes,M. Tibouchi,Y. Yarom,Diego F. Aranha
CRV - But I Still Need A Job! - Kirsten Renner
DC - (11:30-11:59 PDT) - Pwn2Own Qualcomm compute DSP for fun and profit - Slava Makkaveev
DL - cont...(10:00-11:50 PDT) - Carnivore (Microsoft External Attack Tool) - Chris Nevin
DL - cont...(10:00-11:50 PDT) - CIRCO v2: Cisco Implant Raspberry Controlled Operations - Emilio Couto
HHV - Hardware hacking 101: There is plenty of room at the bottom - Federico Lucifredi
HRV - Ham Radio USA License Exams (Friday) -
HRV - Talking to Satellites -
ICS - Mission Kill: Process Targeting in ICS Attacks - Joe Slowik
ICS - (11:45-12:15 PDT) - Vulnerability Discovery - Tips for Surviving and Thriving - Dor Yardeni,Mike Lemley
IOT - cont...(10:45-11:45 PDT) - Getting Started – Building an IoT Hardware Hacking Lab -
LBV - cont...(10:00-11:30 PDT) - Bypass 101 + Q&A
LBV - (11:30-12:59 PDT) - DIY Bypass Tool Workshop + Q&A
LPV - Key Duplication - It's not just for the movies! - Tony Virelli
MOV - cont...(10:00-11:30 PDT) - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - Fear and Loathing in Payment Bug Bounty - Timur Yunusov
RGV - Rogues Village Introduction - Rogues Village Team
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - cont...(10:30-11:30 PDT) - Panel: The Joy of Coordinating Vulnerability Disclosure - Daniel Gruss,CRob,Lisa Bradley,Katie Noble,Omar Santos, Anders Fogh
RTV - (11:45-12:45 PDT) - How to hack SWIFT, SPID, and SPEI with basic hacking techniques (from a Red Team Perspective) - Guillermo Buendia
VMV - A Policy Approach to Resolving Cybersecurity Problems inthe Election Process - Jody Westby
VMV - (11:30-12:30 PDT) - Hacking Democracy II: On Securing an Election Under Times of Uncertainty and Upheaval - Casey John Ellis,Kimber Dowsett,Tod Beardsley,Jack Cable,Amèlie Koran

 

Friday - 12:00 PDT


Return to Index  -  Locations Legend
AEV - Satellite Orbits 101 - Matt Murray
AEV - (12:30-12:59 PDT) - GPS Spoofing 101 - Harshad Sathaye
AIV - cont...(11:00-12:30 PDT) - Workshop 1
ASV - cont...(11:00-12:59 PDT) - Applying Pysa to Identify Python Security Vulnerabilities - Graham Bleaney
ASV - Android Bug Foraging - João Morais,Pedro Umbelino
BCV - Security Focused Operating System Design - Colin Cantrell
BHV - Redefining patient safety in the digital era - Dena Medelsohn,Jen Goldsack
BTVT1 - (12:30-12:59 PDT) - No Question: Teamviewer, Police and Consequence (Beginner) - corvusactual
BTVW2 - cont...(11:30-13:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - Before J1939: A J1708/J1587 Protocol Decoder - Thomas Hayes,Dan Salloum
CHV - Fundamentals of Diagnostic Requests over CAN Bus - Robert Leale (CarFuCar)
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -
CLV - cont...(11:20-12:05 PDT) - IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP) - Jenko Hwong
CLV - Ransom in the Cloud - Spencer Gietzen
CLV - (12:50-13:25 PDT) - Static analysis of Infrastructure as code: Terraform, Kubernetes, Cloudformation and more! - Barak Schoster
CPV - The Norwegian Blue: A lesson in Privacy Engineering - Eivind Arvesen
CRV - Hacking Security Leadership - Pete Keenan
DC - (12:30-12:59 PDT) - Detecting Fake 4G Base Stations in Real Time - Cooper Quintin
DL - PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - Olivier Bilodeau
DL - Mobile Security Framework - MobSF - Ajin Abraham
ETV - U.S. Privacy and Civil Liberties Oversight Board Member - Travis LeBlanc
HHV - (12:30-12:59 PDT) - onkeypress=hack(); - Farith Pérez Sáez,Luis Ángel Ramírez Mendoza (@larm182luis),Mauro Cáseres
HRV - cont...(11:00-13:59 PDT) - Ham Radio USA License Exams (Friday) -
HTS - Build a Raspberry AIS - Dr. Gary Kessler
ICS - cont...(11:45-12:15 PDT) - Vulnerability Discovery - Tips for Surviving and Thriving - Dor Yardeni,Mike Lemley
ICS - (12:30-13:30 PDT) - On the insecure nature of turbine control systems in power generation - Alexander Korotin,Radu Motspan
IOT - (12:15-12:59 PDT) - Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research - Denise Giusto Bilic
LBV - cont...(11:30-12:59 PDT) - DIY Bypass Tool Workshop + Q&A
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Proposed Mitigation Measures to Address a Disruption Such as The Economic Impact of COVID -19 on Transaction Capacity and Fees in Monero - Dr. Francisco "ArticMine" Cabañas
RGV - Google Maps Hacks - Simon Weckert
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - cont...(11:45-12:45 PDT) - How to hack SWIFT, SPID, and SPEI with basic hacking techniques (from a Red Team Perspective) - Guillermo Buendia
VMV - cont...(11:30-12:30 PDT) - Hacking Democracy II: On Securing an Election Under Times of Uncertainty and Upheaval - Casey John Ellis,Kimber Dowsett,Tod Beardsley,Jack Cable,Amèlie Koran
VMV - (12:30-12:59 PDT) - See Something, Say Something - Marten Mickos

 

Friday - 13:00 PDT


Return to Index  -  Locations Legend
AEV - Building Connections Across The Aviation Ecosystem - Katie Noble,Al Burke,Jeff Troy,Jen Ellis,John Craig,Randy Talley (CISA),Sidd Gejji
AIV - Hyperlocal Drift detection with Goko: Finding abusers of your Dataset - comathematician
AIV - (13:30-13:59 PDT) - Spectrum: An End-to-End Framework for ML-based Threat Monitoring and Detection - Nahid Farhady
ASV - Our journey into turning offsec mindset to developer's toolset - Paul Amar,Stanislas Molveau
BCV - Cryptocurrencies have superusers? - Mark Nesbitt
BCV - (13:30-13:59 PDT) - Double Spending in BSV, is it Possible? - Poming Lee
BHV - Russian Cyber Threats in The Pandemic Era - Dr. Khatuna Mshvidobadze
BTVT1 - (13:30-14:30 PDT) - Building BLUESPAWN: An Open-Source, Active Defense & EDR Software (Intermediate) - Jake Smith,Jack McDowell
BTVW1 - (13:30-14:59 PDT) - Turning Telemetry and Artifacts Into Information (Intermediate) - Omenscan
BTVW2 - cont...(11:30-13:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - Cluster fuzz! - Mintynet
CLV - cont...(12:50-13:25 PDT) - Static analysis of Infrastructure as code: Terraform, Kubernetes, Cloudformation and more! - Barak Schoster
CLV - (13:25-14:10 PDT) - Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - Phillip Marlow
CPV - Dos, Donts and How-Tos of crypto building blocks using Java - Mansi Sheth
CRV - Key Ingredients for the Job Interviews (Virtual or Face-2-Face) - Roy Wattanasin
DC - (13:30-13:59 PDT) - When TLS Hacks You - Joshua Maddux
DL - cont...(12:00-13:50 PDT) - PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - Olivier Bilodeau
DL - cont...(12:00-13:50 PDT) - Mobile Security Framework - MobSF - Ajin Abraham
HHV - (13:30-14:30 PDT) - HackerBox 0057 Build Session - Joseph Long (hwbxr)
HRV - cont...(11:00-13:59 PDT) - Ham Radio USA License Exams (Friday) -
HRV - A Basic Ham Station Setup -
ICS - cont...(12:30-13:30 PDT) - On the insecure nature of turbine control systems in power generation - Alexander Korotin,Radu Motspan
ICS - (13:45-14:45 PDT) - The Journey of ICS Project Files - Visibility and Forensics to Exploitation - Nadav Erez
IOT - (13:15-13:59 PDT) - IoT Under the Microscope: Vulnerability Trends in the Supply Chain - Parker Wiksell
LBV - General Q&A / Drop-in and Chat
LPV - Hybrid PhySec tools - best of both worlds or just weird? - d1dymu5
MOV - This year's village badge - Michael Schloh von Bennewitz
PHVT - Dumpster Fires: 6 Things About IR I Learned by Being a Firefighter - Dr. Catherine Ullman
PHVW - Intrusion Analysis and Threat Hunting with Open Source Tools - Jack Mott,Jason Williams,Josh Stroschein
PWDV - Making Targeted Wordlists - Password Village Staff
RGV - cont...(12:00-13:59 PDT) - Google Maps Hacks - Simon Weckert
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры - Allie Mellen
SEV - Live SE Q&A -
VMV - A Panel with the Feds on Election Security - Bryson Bort,David Imbordino,Brig. Gen. William Hartman,Matthew Masterson,Cynthia Kaiser,Dan Kimmage

 

Friday - 14:00 PDT


Return to Index  -  Locations Legend
AEV - Experimental Aviation, Risks And Rewards - Patrick Kiley
AIV - Hacking with Skynet - How AI is Empowering Adversaries - GTKlondike
BCV - Creating a decentralized storage for Kubernetes with Tardigrade and Velero - Kevin Leffew
BHV - Digital Health Technologies in the NIH All of Us Research Program - Michelle Holko
BHV - (14:30-15:30 PDT) - Medical Device Vulnerability Disclosure - Chloé Messdaghi,Eirick Lurass,Casey John Ellis
BTVT1 - cont...(13:30-14:30 PDT) - Building BLUESPAWN: An Open-Source, Active Defense & EDR Software (Intermediate) - Jake Smith,Jack McDowell
BTVW1 - cont...(13:30-14:59 PDT) - Turning Telemetry and Artifacts Into Information (Intermediate) - Omenscan
CHV - Realistic Trends in Vulnerability based on Hacking into Vehicle - Ryosuke Uematsu,Shogo Nakao,Ryoichi Teramura,Tatsuya Katsuhara
CHV - Bluetooth Security in Automotive - Kamel Ghali
CLV - cont...(13:25-14:10 PDT) - Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - Phillip Marlow
CLV - Peeling Back the Layers and Peering Through the Clouds with Security Onion - Wes Lambert
CPV - How to store sensitive information in 2020? - Mansi Sheth
CRV - Pwning Your Resume - Kris Rides
DC - (14:30-14:59 PDT) - Finding and Exploiting Bugs in Multiplayer Game Engines - Jack Baker
DL - jeopardize - Utku Sen
ETV - Models of Privacy Norms - R. Jason Cronk,Ece Gumusel
HHV - cont...(13:30-14:30 PDT) - HackerBox 0057 Build Session - Joseph Long (hwbxr)
HHV - (14:30-14:59 PDT) - Meetup: PCB Proto and Rework - ShortTie
HRV - So You Got an SDR: Common Signals and the Wiki -
HTS - 40,000 Leagues UUV Death Match - Dr. Nina Kollars
ICS - cont...(13:45-14:45 PDT) - The Journey of ICS Project Files - Visibility and Forensics to Exploitation - Nadav Erez
IOT - (14:15-14:59 PDT) - Hella Booters: Why IoT Botnets Aren't Going Anywhere - Netspooky
LBV - cont...(13:00-14:59 PDT) - General Q&A / Drop-in and Chat
LPV - (14:15-14:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - (14:30-15:30 PDT) - Getting started with the Intervillage badge - Michael Schloh von Bennewitz
PHVW - cont...(13:00-14:59 PDT) - Intrusion Analysis and Threat Hunting with Open Source Tools - Jack Mott,Jason Williams,Josh Stroschein
RGV - Performance - Daniel Roy
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - (14:15-15:15 PDT) - Grey Hat SSH: SShenanigans - Evan Anderson
VMV - Keynote Remarks: Senator Ron Wyden - Ron Wyden
VMV - (14:30-14:59 PDT) - Chairman Benjamin Hovland, US Election Assistance Commission - Benjamin Hovland

 

Friday - 15:00 PDT


Return to Index  -  Locations Legend
AEV - Talking To Satellites - 101 - Eric Escobar
AIV - Breakout Session
ASV - API (in)Security TOP 10: Guided tour to the Wild Wild World of APIs - David Sopas,Paulo Silva
BCV - Attacking and Defending Blockchain Nodes - Peter Kacherginsky
BHV - cont...(14:30-15:30 PDT) - Medical Device Vulnerability Disclosure - Chloé Messdaghi,Eirick Lurass,Casey John Ellis
BHV - (15:30-15:59 PDT) - Hacking the Insulin Supply Chain To Save Lives - Anthony DiFranco
BTVT1 - Indicators of Emulation (Intermediate) - Ch33r10
BTVW2 - Threat Hunting with the Elastic Stack (Beginner) - Ben Hughes
CHV - CAN be super secure: Bit Smashing FTW - Brent Stone
CHV - Automotive Ethernet for the rest of us - Infenet
CLV - cont...(14:10-16:30 PDT) - Peeling Back the Layers and Peering Through the Clouds with Security Onion - Wes Lambert
CPV - Workshop: Let's Talk About Abusability Testing - Avi Zajac,Franchesca Spektor,Ji Su Yoo,Nicole Chi
CRV - In theory, there is no difference between theory and practice - Pablo Breuer
DC - (15:30-15:59 PDT) - Don't Be Silly - It's Only a Lightbulb - Eyal Itkin
DL - cont...(14:00-15:50 PDT) - jeopardize - Utku Sen
HHV - (15:30-15:59 PDT) - Meetup: Legacy Hardware - ShortTie
ICS - 5 Quick Wins for Improving your ICS Cybersecurity Posture - Austin Scott
ICS - (15:45-16:45 PDT) - PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - Ben Gardiner
IOT - (15:15-16:15 PDT) - NAND Flash – Recovering File Systems from Extracted Data -
LBV - Alarm Bypass + Q&A
LPV - Doors, Cameras, and Mantraps OH MY! - Dylan The Magician
MOV - cont...(14:30-15:30 PDT) - Getting started with the Intervillage badge - Michael Schloh von Bennewitz
MOV - (15:30-15:59 PDT) - Monero Wallet Basics: Sending, Receiving, Proving - rehr
POV - (15:30-16:30 PDT) - Election Security -
PWDV - Result of Longer Passwords in Real World Application - Minga
RTV - cont...(09:30-15:59 PDT) - Red Team Village CTF - Finals -
RTV - cont...(14:15-15:15 PDT) - Grey Hat SSH: SShenanigans - Evan Anderson
RTV - (15:30-16:30 PDT) - Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Time Replay Session Instantiation Attacks - Justin Hutchens (“Hutch”)
VMV - Secretary Kim Wyman, Washington - Kim Wyman

 

Friday - 16:00 PDT


Return to Index  -  Locations Legend
AEV - Hack-A-Sat Friday Recap -
AIV - Workshop 2
ASV - Threat Modelling the Death Star - Mário Areias
ASV - JWT Parkour - Louis Nyffenegger
BCV - Panel Discussion
BHV - (16:15-16:45 PDT) - Cybersecurity informed consent for medical devices -
BHV - (16:45-17:45 PDT) - INCLUDES NO DIRT: Threat Modeling for Healthcare
BTVT1 - Detecting The Not-PowerShell Gang (Intermediate) - Mangatas Tondang
BTVW1 - (16:30-17:59 PDT) - Open-Source Tools for Hunting and Practical Intelligence (Intermediate) - Joe Slowik
BTVW2 - cont...(15:00-16:30 PDT) - Threat Hunting with the Elastic Stack (Beginner) - Ben Hughes
CHV - Misbehavior Detection for V2X communication - Jaime
CHV - Car (to Cloud) Talk: Using MQTT for Car Hacking - Jaime
CLV - cont...(14:10-16:30 PDT) - Peeling Back the Layers and Peering Through the Clouds with Security Onion - Wes Lambert
CPV - DNS Privacy - Matt Cheung
CRV - Building Teams in the New Normal - Mike Murray
DC - (16:30-16:59 PDT) - Exploiting Key Space Vulnerabilities in the Physical World - Bill Graydon
DL - redlure - Matthew Creel
ETV - Security of Election Systems: A contract case study in progress - Rim Boujnah
ICS - cont...(15:45-16:45 PDT) - PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - Ben Gardiner
IOT - cont...(15:15-16:15 PDT) - NAND Flash – Recovering File Systems from Extracted Data -
IOT - (16:45-17:30 PDT) - Assembling VULNtron: 4 CVEs that Turn a Teleconference Robot into a Spy - Mark Bereza
LBV - cont...(15:00-16:30 PDT) - Alarm Bypass + Q&A
LBV - (16:30-16:59 PDT) - General Q&A / Drop-in and Chat
LPV - (16:15-16:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Meme Competition
PHVT - Take Down the Internet! With Scapy - C8 (John Hammond)
PHVW - Violent Python 3 - Elizabeth Biddlecome,Irvin Lemus,Kaitlyn Handleman,Sam Bowne
POV - cont...(15:30-16:30 PDT) - Election Security -
PWDV - From Printers to Silver Tickets or Something - EvilMog
RGV - Pickpocketing @ Home - James Harrison
RTV - cont...(15:30-16:30 PDT) - Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Time Replay Session Instantiation Attacks - Justin Hutchens (“Hutch”)
RTV - (16:45-17:45 PDT) - Enumerating Cloud File Storage Gems - Michael Wylie

 

Friday - 17:00 PDT


Return to Index  -  Locations Legend
AEV - Exploiting Spacecraft - Brandon Bailey
AIV - cont...(16:00-17:30 PDT) - Workshop 2
ASV - cont...(16:00-17:59 PDT) - JWT Parkour - Louis Nyffenegger
BHV - cont...(16:45-17:45 PDT) - INCLUDES NO DIRT: Threat Modeling for Healthcare
BTVT1 - Discovering ELK The First Time - Lessons Learned Over 2 Years (Beginner) - TheDrPinky
BTVW1 - cont...(16:30-17:59 PDT) - Open-Source Tools for Hunting and Practical Intelligence (Intermediate) - Joe Slowik
CNE - EFF Tech Trivia Pub Quiz -
CPV - Fireside Chat: All about Section 230, the EARN IT Act, and What They Mean for Free Speech and Encryption - Cathy Gellis,Riana Pfefferkorn
CRV - Future Proofing Your Career - Jenai Marinkovic
DC - (17:30-17:59 PDT) - A Hacker’s guide to reducing side-channel attack surfaces using deep-learning - Elie Bursztein
DL - cont...(16:00-17:55 PDT) - redlure - Matthew Creel
HHV - (17:30-17:59 PDT) - Meetup: Some HHV Challenges - rehr
IOT - cont...(16:45-17:30 PDT) - Assembling VULNtron: 4 CVEs that Turn a Teleconference Robot into a Spy - Mark Bereza
IOT - (17:45-18:15 PDT) - Pandemic In Plaintext - Troy Brown
PHVW - cont...(16:00-17:59 PDT) - Violent Python 3 - Elizabeth Biddlecome,Irvin Lemus,Kaitlyn Handleman,Sam Bowne
RGV - cont...(16:00-17:59 PDT) - Pickpocketing @ Home - James Harrison
RTV - cont...(16:45-17:45 PDT) - Enumerating Cloud File Storage Gems - Michael Wylie
WLV - (17:45-18:45 PDT) - Wireless Village Fireside Talk -

 

Friday - 18:00 PDT


Return to Index  -  Locations Legend
BTVT1 - (18:30-18:59 PDT) - Fighting a Virus with a Spreadsheet (Beginner) - Allen Baranov
BTVW2 - Data Analysis for Detection Research Through Jupyter Notebooks 101 (Beginner) - Roberto Rodriguez,Jose Rodriguez
CNE - cont...(17:00-18:59 PDT) - EFF Tech Trivia Pub Quiz -
CNE - War Story Bunker -
CNE - Hacker Jeopardy -
DC - (18:30-18:59 PDT) - Office Drama on macOS - Patrick Wardle
ENT - Terrestrial Access Network -
HHV - Meetup: 3H: Hardware Happy Hour - Chris Gammell
IOT - cont...(17:45-18:15 PDT) - Pandemic In Plaintext - Troy Brown
IOT - (18:30-19:15 PDT) - The Joy of Coordinating Vulnerability Disclosure - Daniel Gruss,CRob,Lisa Bradley,Katie Noble,Omar Santos, Anders Fogh
PWDV - Getting Advanced with Hashcat - Password Village Staff
RTV - Total E(A)gression - Alvaro Folgado Rueda
WLV - cont...(17:45-18:45 PDT) - Wireless Village Fireside Talk -

 

Friday - 19:00 PDT


Return to Index  -  Locations Legend
BTVT1 - (19:30-20:30 PDT) - Purple On My Mind: Cost Effective Automated Adversary Simulation (Intermediate) - Mauricio Velazco
BTVW2 - cont...(18:00-19:30 PDT) - Data Analysis for Detection Research Through Jupyter Notebooks 101 (Beginner) - Roberto Rodriguez,Jose Rodriguez
CNE - cont...(18:00-19:59 PDT) - War Story Bunker -
CNE - cont...(18:00-19:59 PDT) - Hacker Jeopardy -
ENT - Acid T -
IOT - cont...(18:30-19:15 PDT) - The Joy of Coordinating Vulnerability Disclosure - Daniel Gruss,CRob,Lisa Bradley,Katie Noble,Omar Santos, Anders Fogh
RTV - (19:15-20:15 PDT) - Password cracking beyond 15 characters and under $500 - Travis Palmer

 

Friday - 20:00 PDT


Return to Index  -  Locations Legend
BTVT1 - cont...(19:30-20:30 PDT) - Purple On My Mind: Cost Effective Automated Adversary Simulation (Intermediate) - Mauricio Velazco
ENT - Icetre Normal -
FSL - D0 N0 H4RM: A Healthcare Security Conversation - Ash Luft,Christian “quaddi” Dameff,Jeff “r3plicant” Tully,Suzanne Schwartz,Vidya Murthy
RTV - cont...(19:15-20:15 PDT) - Password cracking beyond 15 characters and under $500 - Travis Palmer
RTV - (20:30-21:30 PDT) - 50 Shades of Sudo Abuse - Tyler Boykin
VMV - Live Q&A with Special Guests Regarding "Kill Chain" -

 

Friday - 21:00 PDT


Return to Index  -  Locations Legend
ENT - Zebbler Encanti Experience -
FSL - Shrek, Juggs, and Toxic Trolls: a BADASS discussion about Online Sexuality and Hacktivism - Katelyn Bowden,Rachel Lamp,Allie Barnes,Kate Venable,Marleigh Farlow,Tim Doomsday
PWDV - Getting Started with Hashcat (Rebroadcast) - Password Village Staff
PWDV - (21:30-21:59 PDT) - Making Targeted Wordlists (Rebroadcast) - Password Village Staff
RTV - cont...(20:30-21:30 PDT) - 50 Shades of Sudo Abuse - Tyler Boykin
RTV - (21:45-22:45 PDT) - ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project - Fran Ramirez,Pablo Gonzalez

 

Friday - 22:00 PDT


Return to Index  -  Locations Legend
ENT - Ninjula -
PWDV - Result of Longer Passwords in Real World Application (Rebroadcast) - Minga
PWDV - (22:30-22:40 PDT) - From Printers to Silver Tickets or Something (Rebroadcast) - EvilMog
PWDV - (22:40-23:30 PDT) - Getting Advanced with Hashcat (Rebroadcast) - Password Village Staff
RTV - cont...(21:45-22:45 PDT) - ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project - Fran Ramirez,Pablo Gonzalez

 

Friday - 23:00 PDT


Return to Index  -  Locations Legend
ENT - Shadowvex -
PWDV - cont...(22:40-23:30 PDT) - Getting Advanced with Hashcat (Rebroadcast) - Password Village Staff
RTV - ERPwnage - a red team approach to targeting SAP - Austin Marck

 

Friday - 8:00 PDT


Return to Index  -  Locations Legend
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -

 

Friday - 9:00 PDT


Return to Index  -  Locations Legend
CLV - cont...(06:00-12:30 PDT) - Cloud Village CTF -

Saturday


This Schedule is tentative and may be changed at any time. Check at an Info Booth for the latest.

 

Saturday - 00:00 PDT


Return to Index  -  Locations Legend
PWDV - PathWell: Dynamic Password Strength Enforcement (Rebroadcast) - Hank Leininger

 

Saturday - 01:00 PDT


Return to Index  -  Locations Legend
RTV - Back to the future: Computer science and systems biology  - Dr Lorenz Adlung,Noa Novogroder

 

Saturday - 02:00 PDT


Return to Index  -  Locations Legend
RTV - (02:15-03:15 PDT) - Modern Red Team Tradecraft - Informing Defenders by Evolving Your Attackers - Sajal Thomas

 

Saturday - 03:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(02:15-03:15 PDT) - Modern Red Team Tradecraft - Informing Defenders by Evolving Your Attackers - Sajal Thomas
RTV - (03:30-04:30 PDT) - Executing Red Team Scenarios with Built-in Scenario Place - Erdener Uyan,Gökberk Gülgün

 

Saturday - 04:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(03:30-04:30 PDT) - Executing Red Team Scenarios with Built-in Scenario Place - Erdener Uyan,Gökberk Gülgün
RTV - (04:45-05:45 PDT) - OU having a laugh? - Petros Koutroumpis

 

Saturday - 05:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(04:45-05:45 PDT) - OU having a laugh? - Petros Koutroumpis

 

Saturday - 06:00 PDT


Return to Index  -  Locations Legend
RTV - All of the threats: Intelligence, modelling and hunting through an ATT&CKers lens - Tim Wadhwa-Brown

 

Saturday - 07:00 PDT


Return to Index  -  Locations Legend
RTV - (07:15-08:15 PDT) - Catch Me if You Can - Eduardo Arriols

 

Saturday - 08:00 PDT


Return to Index  -  Locations Legend
AEV - (08:30-08:59 PDT) - Attacking Flight Management Systems: This Is Your Captain Speaking, We Have A Small Problem! - Javad Dadgar,Mohammad-Reza Zamiri,Reza Dorosti
HHV - (08:30-08:59 PDT) - Learn to Solder the BadgeBuddy Kit - Joseph Long (hwbxr)
RTV - cont...(07:15-08:15 PDT) - Catch Me if You Can - Eduardo Arriols
RTV - (08:30-09:30 PDT) - Mechanizing the Methodology: Automating Discovery, Testing, and Alerting using Recon/Testing Tools and Amazon SES - Daniel Miessler

 

Saturday - 09:00 PDT


Return to Index  -  Locations Legend
AEV - Hack-A-Sat Kickoff Segment -
AEV - (09:30-09:59 PDT) - Aerospace Village Badge - Rick Hansen
AIV - (09:30-09:59 PDT) - "SECRETS ARE LIES, SHARING IS CARING, PRIVACY IS THEFT."- A Dive into Privacy Preserving Machine Learning - Nahid Farhady
ASV - Be Like Water: What Bruce Lee Can Teach Us About AppSec - Fredrick "Flee" Lee
BTVT1 - Reversing with Dynamic Data Resolver (DDR) – Best practice (Advanced) - Holger Unterbrink
BTVW1 - Leveraging the critical YARA skills for Blue Teamers (Beginner) - David Bernal Michelena
DC - (09:30-09:59 PDT) - A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven - Peleg Hadar,Tomer Bar
HHV - (09:30-09:59 PDT) - Hardware hacking 101: There is plenty of room at the bottom - Federico Lucifredi
ICS - ICS SecOps: Active Defense Concept with Effective Incident Response in Industrial Control Systems
ICS - (09:45-10:45 PDT) - Confessions of an Offensive ICS Cyber Security Researcher - Marina Krotofil
IOT - Hacking smart-devices for fun and profit: From exploiting my smart-home into controlling thousands of smart-devices around the world - Barak Sternberg
PHVW - Writing Wireshark Plugins for Security Analysis - Jeswin Mathai,Nishant Sharma
RTV - cont...(08:30-09:30 PDT) - Mechanizing the Methodology: Automating Discovery, Testing, and Alerting using Recon/Testing Tools and Amazon SES - Daniel Miessler
RTV - (09:45-10:45 PDT) - Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah? - Leron Gray

 

Saturday - 10:00 PDT


Return to Index  -  Locations Legend
AEV - Hackers And ISACS - Erin Miller,Jeff Troy,Ken Munro,Matthew Gaffney,Pete Cooper
AIV - Misinformation & Covid - lmeyerov
ASV - Web Shell Hunting - Part 1 - Joe Schottman
ASV - 10,000 Dependencies Under The Sea: Exploring and Securing Open source dependencies - Gregg Horton,Ryan Slama
BCV - Welcome Note
BCV - Twitter’s Tax Day Disaster: The Beginning (and End) of Mainstream Crypto Scams - Victor Fang
BHV - DAY2 KEYNOTE: Understanding DIYBio and Community Labs - A Social Science Approach - Yong-Bee
BTVT1 - (10:30-10:59 PDT) - O365Squatting (Intermediate) - Juan Francisco,Jose Miguel Gómez-Casero Marichal
BTVW1 - cont...(09:00-10:30 PDT) - Leveraging the critical YARA skills for Blue Teamers (Beginner) - David Bernal Michelena
BTVW2 - (10:30-11:59 PDT) - Wireshark for Incident Response & Threat Hunting (Beginner) - Michael Wylie
CHV - Hacking TESLA Model 3 - NFC Relay Revisited - Huajiang "Kevin2600" Chen,Yuchao (Alex) Zhang
CHV - Automotive In-Vehicle Networks - Kamel Ghali
CPV - Quantum Computers & Cryptography - I. Shaheem
CRV - Cons and Careers - Steven Bernstein
DC - (10:30-10:59 PDT) - Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks - James Pavur
DCG - OWASP API Top 10 -
DL - jeopardize - Utku Sen
DL - Starkiller - Vincent “Vinnybod” Rose
ETV - Killer Robots Reconsidered - Diane Vavrichek,Larry Lewis
HRV - Single Board Computers in Amateur Radio -
HTS - Speed 2: The Poseidon Adventure – When Cruise Ships Go Wrong - Andrew Tierney
ICS - cont...(09:45-10:45 PDT) - Confessions of an Offensive ICS Cyber Security Researcher - Marina Krotofil
IOT - Your connected world isn't yours anymore! - Remote IoT attacks and data exfiltration. - Dewank Pant,Shruti Lohani
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
LPV - (10:45-11:45 PDT) - High Security Wafer Locks - An Oxymoron? - zeefeene
MOV - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - Identity Crisis: the mad rise of online account opening fraud - Uri Rivner
PHVT - The Vulnerability That Gmail Overlooked and Enabling Threat Hunting - Özkan Mustafa Akkus
PHVW - cont...(09:00-10:59 PDT) - Writing Wireshark Plugins for Security Analysis - Jeswin Mathai,Nishant Sharma
PWDV - Cracking at Extreme Scale: The Evolution of Hashstack - Jeremi M Gosney (epixoip)
RCV - Twitter Word Phrequency - Master Chen
RTV - cont...(09:45-10:45 PDT) - Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah? - Leron Gray
VMV - War By Other Means: How Influence Operations Undermine Democracy - Ben Dubow
VMV - (10:30-10:59 PDT) - John Odum, Montpelier, VT - John Odum

 

Saturday - 11:00 PDT


Return to Index  -  Locations Legend
AEV - A View From The Cockpit: Exploring Pilot Reactions To Attacks On Avionic Systems - Matt Smith
AEV - (11:30-11:59 PDT) - Checklist For Aviation Vulnerability Disclosure: Don't Go It Alone - Jay Angus
AIV - Workshop 3
ASV - Hackium: a browser for web hackers - Jarrod Overson
BCV - Decentralized Finance (DeFi) - ready for prime time ? - Ryan Rubin
BHV - How COVID19 Changed Our Understanding of Cyber Disaster Medicine - Christian “quaddi” Dameff,Jeff “r3plicant” Tully
BTVT1 - (11:30-11:59 PDT) - Low Value Indicators For High Value Decisions (Intermediate) - Allan Stojanovic,Spencer Cureton
BTVW2 - cont...(10:30-11:59 PDT) - Wireshark for Incident Response & Threat Hunting (Beginner) - Michael Wylie
CHV - OBD and what we CAN do with it - Infenet
CLV - Least privilege using infrastructure as code - Nimrod Kor
CLV - (11:45-12:30 PDT) - How Blue Penetrates You - Dani Goland,Mohsan Farid
CPV - Online Ads as a Recon and Surveillance Tool - Neil M
CPV - (11:30-11:59 PDT) - Who needs spyware when you have COVID-19 apps? A look at global trends and what to do about it. - C. Nadal,J. DeBlois,M. DeBlois,Z. Anderson
CRV - The Individual Contributor to Tech Executive, or There and Back Again - Amelie Koran
DC - (11:30-11:59 PDT) - Don't Ruck Us Again - The Exploit Returns - Gal Zror
DCG - Government Espionage on a School Lunch Budget -
DL - cont...(10:00-11:50 PDT) - jeopardize - Utku Sen
DL - cont...(10:00-11:50 PDT) - Starkiller - Vincent “Vinnybod” Rose
HHV - onkeypress=hack(); - Farith Pérez Sáez,Luis Ángel Ramírez Mendoza (@larm182luis),Mauro Cáseres
HRV - (11:30-12:30 PDT) - Discussion: What makes a good ham radio operator? -
HTS - Hack the SeaPod - Grant Romundt
ICS - Playing with Electricity: Hacking into Distribution Companies - Can Demirel,Serkan Temel
IOT - Introduction to U-Boot Interaction and Hacking - Garrett Enoch
LBV - Bypass 101 + Q&A
LPV - cont...(10:45-11:45 PDT) - High Security Wafer Locks - An Oxymoron? - zeefeene
MOV - cont...(10:00-11:30 PDT) - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - Online Banking Security - Arkadiy Litvinenko
POV - AMA w/@hackingdave & @kennwhite - hackingdave,kennwhite
RCV - Burnout is real - Chloé Messdaghi
RTV - Initial Compromise through Web Side - Walter Cuestas
VMV - Heightened Election Security Risks Admist the Pandemic - Jack Cable,Alex Zaheer
VMV - (11:30-11:59 PDT) - Hack-a-Fax - Forrest Senti,Mattie Gullixson,Caleb Gardner

 

Saturday - 12:00 PDT


Return to Index  -  Locations Legend
AEV - Low-Cost VHF Receiver: Eavesdropping Pilot/Controller Communication - Allan Tart,Fabian Landis
AIV - cont...(11:00-12:30 PDT) - Workshop 3
ASV - The DevOps & Agile Security Toolkit - David Waldrop
ASV - Web Shell Hunting - Part 2 - Joe Schottman
BCV - Securing the COSMOS: How to operate and secure a validator - Ron Stoner
BHV - Medical Technology: How do we unfuck things - Veronica
BHV - (12:30-13:30 PDT) - Advancing Medical Device Security – How collaboration between providers, manufacturers, and pen testers is advancing what’s possible with security. - Mitchell Parker
BTVT1 - (12:30-13:30 PDT) - Incident Response Panel - Russell Mosley,Vyrus,Litmoose,Xavier Ashe
BTVW1 - Tracer FIRE 9 (Intermediate) - Andrew Chu
CHV - Houston, we CAV a problem - Vic Harkness
CHV - Fundamentals of Diagnostic Requests over CAN Bus - Robert Leale (CarFuCar)
CLV - cont...(11:45-12:30 PDT) - How Blue Penetrates You - Dani Goland,Mohsan Farid
CLV - (12:30-13:15 PDT) - 21 Jump Server: Going Bastionless in the Cloud - Colin Estep
CPV - Differential Privacy..more important than ever in the world of Covid-19 - Aditi Joshi
CRV - Entrepeneurial Adventures: What It Takes to Start A Company - Bryson Bort
DC - (12:30-12:59 PDT) - Applied Ca$h Eviction through ATM Exploitation - Brenda So,Trey Keown
DCG - Basic OSINT: Mining Personal Data -
DL - Phirautee - Viral Maniar
ETV - Vote @ Home Workshop - Andrea Matwyshyn
HHV - Learn to Solder the BadgeBuddy Kit - Joseph Long (hwbxr)
HRV - cont...(11:30-12:30 PDT) - Discussion: What makes a good ham radio operator? -
ICS - (12:15-13:15 PDT) - Vivisecting PowerPC - ac0rn,atlas 0f d00m
IOT - (12:30-13:15 PDT) - Kicking Devices and Taking CVEs : The Zoomer’s Guide to Hacking Shit - Sanjana Sarda
LBV - cont...(11:00-12:30 PDT) - Bypass 101 + Q&A
LBV - (12:30-13:59 PDT) - Alarm Bypass + Q&A
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Open Office Q&A w/ Monero Research Lab's Sarang - Sarang
PAYV - Trends in the online card payment security - Dr Mohammed Aamir Ali
PWDV - What the Shuck? Layered Hash Shucking - Sam Croley (Chick3nman)
RCV - Hunting for Blue Mockingbird Coinminers - Ladislav B
RTV - (12:15-12:30 PDT) - Inside the Mind of a Threat Actor: Beyond Pentesting - Phillip Wylie
RTV - (12:45-13:45 PDT) - The Student Roadmap to Becoming A Penetration Tester - Jonathan Helmus
VMV - Analysis of the Attack Data Collected During Mobile Voting Pilots - Nimit Sawhney,Nailah Mims
VMV - (12:30-12:59 PDT) - Remote Online Balloting Delivery and Marking Options and Security Considerations for Absentee Voting During the COVID-19 Pandemic - Susan Greenhalgh,Steve Newell

 

Saturday - 13:00 PDT


Return to Index  -  Locations Legend
AEV - Product Cybersecurity: Secure Airplane Development Lifecycle - Michael Vanguardia
AEV - (13:30-13:59 PDT) - Introduction To ACARS - Alex Lomas
AIV - Journal Club Live! Fawkes FR - AI Village Journal Club
ASV - cont...(12:00-13:59 PDT) - Web Shell Hunting - Part 2 - Joe Schottman
ASV - localghost: Escaping the Browser Sandbox Without 0-Days - Parsia Hakimian
BCV - Blockchain for Cyber Defense: Will it be as good as you think? - Seungjoo,Suhyeon Lee
BCV - (13:30-13:59 PDT) - Identifying and fixing out-of-gas errors in smart contracts with smart fuzzing - Sebastian Banescu
BHV - cont...(12:30-13:30 PDT) - Advancing Medical Device Security – How collaboration between providers, manufacturers, and pen testers is advancing what’s possible with security. - Mitchell Parker
BTVT1 - cont...(12:30-13:30 PDT) - Incident Response Panel - Russell Mosley,Vyrus,Litmoose,Xavier Ashe
BTVW1 - cont...(12:00-13:30 PDT) - Tracer FIRE 9 (Intermediate) - Andrew Chu
BTVW2 - (13:30-15:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - CMAP: Open Source Vehicle Services Mapping Tool for noobs - Robert Leale (CarFuCar)
CHV - Cluster fuzz! - Mintynet
CLV - cont...(12:30-13:15 PDT) - 21 Jump Server: Going Bastionless in the Cloud - Colin Estep
CLV - (13:15-13:59 PDT) - Cloud Frontier - Setu Parimi
CNE - Film Festival: Project Immerse: A Deepfake Paranoid Thriller -
CPV - Rights You Can’t Exercise Can’t Protect You: Privacy by Design, Dark Patterns, and Cultural Context - Ben Brook,Maritza Johnson,Megan DeBlois,Zach Singleton
CRV - National Service Panel: Career Opportunities Supporting the Country - John Felker,Diane Janosek,Chris Pimlott,Roman Vitkovitsky,Liz Popiak,Joe Billingsley
DC - (13:30-13:59 PDT) - How we recovered $XXX,000 in Bitcoin from an encrypted zip file - Michael Stay
DCG - Intro to DC858 -
DCG - (13:15-13:59 PDT) - Saving Yourself from Microsoft: It's by design -
DL - cont...(12:00-13:50 PDT) - Phirautee - Viral Maniar
ETV - cont...(12:00-14:10 PDT) - Vote @ Home Workshop - Andrea Matwyshyn
HHV - Meetup: Some HHV Challenges - rehr
HRV - (13:30-13:59 PDT) - Practice 'Net' via Discord -
ICS - cont...(12:15-13:15 PDT) - Vivisecting PowerPC - ac0rn,atlas 0f d00m
ICS - (13:30-13:59 PDT) - MITRE ICS ATT&CK - Marie,Otis
IOT - cont...(12:30-13:15 PDT) - Kicking Devices and Taking CVEs : The Zoomer’s Guide to Hacking Shit - Sanjana Sarda
IOT - (13:45-14:15 PDT) - In search of the perfect UPnP tool - Trevor Stevado t1v0
LBV - cont...(12:30-13:59 PDT) - Alarm Bypass + Q&A
LPV - Law School for Lockpickers - Preston Thomas
MOV - (13:30-14:30 PDT) - Badge Clinic - Michael Schloh von Bennewitz
PHVT - The Worst Mobile Apps - Sam Bowne
PHVW - Wireshark for Incident Response & Threat Hunting - Michael Wylie
PWDV - PathWell: Dynamic Password Strength Enforcement - Hank Leininger
RCV - Ambly, the Smart Darknet Spider  - Levi
RTV - cont...(12:45-13:45 PDT) - The Student Roadmap to Becoming A Penetration Tester - Jonathan Helmus
VMV - Don’t Go Postal Over Mail In Voting - Bianca Lewis
VMV - (13:30-13:59 PDT) - The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections - Michael A. Specter

 

Saturday - 14:00 PDT


Return to Index  -  Locations Legend
AEV - Ticketing To Takeoff: An Airport Hacking Choose Your Own Adventure - Liz Wharton
AIV - Does AI Live up to the Hype?
BCV - Monetary Maximalism and Millennial Finance - Building Decentralized Tooling to Empower Everyone - Kris Jones,Matt Luongo
BHV - MedICS - Bryson Bort
BHV - (14:45-15:15 PDT) - Towards an Institutional Review Board for Biohackers - Dr. Sarah Blossom Ware
BTVT1 - Blue Team Village & Red Team Village Panel - Joseph Mlodzìanowskì (cedoXx),Adam Mashinchi,Plug,Dani,Jorge Orchilles,David J. Bianco
BTVW2 - cont...(13:30-15:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - All Aboard the CAN Bus… or Motorcycle - Derrick (CanBusDutch)
CHV - Bluetooth Security in Automotive - Kamel Ghali
CLV - Attacking the Helmsman - Mohit Gupta
CLV - (14:45-15:30 PDT) - SaaSpocalypse - The Complexity and Power of AWS Cross Account Access - Alexandre Sieira
CNE - cont...(13:00-14:30 PDT) - Film Festival: Project Immerse: A Deepfake Paranoid Thriller -
CPV - Hacking like Paris Hilton 14 years later - and still winning! - Per Thorsheim
CRV - Veteran Transition Tips - Bob Wheeler
DC - (14:30-14:59 PDT) - Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT - Paul Marrapese
DCG - Understanding the Threat: Malicious Software, Malicious Actors, and the Promise of Connected Medical Technology -
DL - PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - Olivier Bilodeau,Alexandre Beaulieu
ETV - cont...(12:00-14:10 PDT) - Vote @ Home Workshop - Andrea Matwyshyn
ETV - Federal Trade Commision - Comm. Rohit Chopra
HHV - Meetup: Sourcing Parts - bombnav
HRV - Ham Radio USA License Exams (Saturday) -
ICS - (14:15-15:15 PDT) - Building a Physical Testbed for Blackstart Restoration under Cyber Fire - Tim Yardley
IOT - cont...(13:45-14:15 PDT) - In search of the perfect UPnP tool - Trevor Stevado t1v0
IOT - (14:30-15:20 PDT) - The future of IoT Security “Baselines,” Standards, and Regulatory Domain - Amit Elazari,Anahit Tarkhanyan
LBV - Reconnaissance + Q&A
LPV - (14:15-14:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - cont...(13:30-14:30 PDT) - Badge Clinic - Michael Schloh von Bennewitz
PHVW - cont...(13:00-14:59 PDT) - Wireshark for Incident Response & Threat Hunting - Michael Wylie
POV - AMA w/Policymakers -
PWDV - Practical PCFG Password Cracking - Matt Weir
RCV - COVID 1984_ Propaganda and Surveillance during a Pandemic - Mauro Cáseres
RGV - Performance - Daniel Roy
RTV - (14:15-14:59 PDT) - The Art of Balancing: A Burnout Talk - Chloé Messdaghi
VMV - Vote-from-home? Review of Election Security on Remote Voting in Response to COVID-19 - Sang-Oun Lee
VMV - (14:30-14:59 PDT) - Electronic Ballot Return Standards & Guidelines - Forrest Senti,Mattie Gullixson

 

Saturday - 15:00 PDT


Return to Index  -  Locations Legend
AEV - ILS and TCAS Spoofing Demonstration - Alex Lomas
AEV - (15:30-15:59 PDT) - A Deeper Dive Into ILS And ADS-B Spoofing - Harshad Sathaye
AIV - AI vs. Airplanes and IT-Security: What Security Regulations Teach Us About AI Governance - Laurin Weissinger
ASV - Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - Phillip Marlow
BCV - 7 Phases of Smart Contract Hacking - Martin Abbatemarco
BHV - cont...(14:45-15:15 PDT) - Towards an Institutional Review Board for Biohackers - Dr. Sarah Blossom Ware
BHV - (15:15-15:59 PDT) - DIY Diabetics and a Million Boluses - Dr. Mike Rushanan,Julian Suleder
BTVT1 - (15:30-16:30 PDT) - Practical Advice on Threat Hunting Panel - Plug,Roberto Rodriguez,Tony M Lambert,Valentina Palacín,Samir,Ruth Barbacil,Anna McAbee,Paul Melson
BTVW1 - (15:30-16:15 PDT) - Defending Your UNIX Hosts (Intermediate) - Daniel Ward,Samuel Gasparro
BTVW2 - cont...(13:30-15:30 PDT) - An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - Ben Bornholm
CHV - From Blackbox to Automotive Ransomware - Nils Weiss,Enrico Pozzobon
CHV - Automotive Ethernet for the rest of us - Infenet
CLV - cont...(14:45-15:30 PDT) - SaaSpocalypse - The Complexity and Power of AWS Cross Account Access - Alexandre Sieira
CLV - (15:30-17:30 PDT) - Discovering Cloud File Storage Artifacts - Michael Wylie
CPV - Online Voting: Theory and Practice - Emily Stamm,Porter Adams
CRV - Drinks with Recruiters - Kris Rides,Rachel Bozeman,Matt Duren,Pete Radloff
DC - (15:30-15:59 PDT) - Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks - Yamila Levalle
DCG - Intro to DC603 -
DCG - (15:15-15:59 PDT) - DNS New World Order, version 1.4: QuadX! DoH! DoT! Da Fuq? -
DL - cont...(14:00-15:50 PDT) - PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - Olivier Bilodeau,Alexandre Beaulieu
ETV - cont...(14:10-15:20 PDT) - Federal Trade Commision - Comm. Rohit Chopra
ETV - (15:20-16:30 PDT) - Food and Drug Administration - Jessica Wilkerson
HHV - Meetup: OSS ASIC - Josh Marks
HRV - cont...(14:00-16:59 PDT) - Ham Radio USA License Exams (Saturday) -
HRV - OSTWERK Initiative -
ICS - cont...(14:15-15:15 PDT) - Building a Physical Testbed for Blackstart Restoration under Cyber Fire - Tim Yardley
ICS - (15:30-16:30 PDT) - Operationalizing Cyber Norms: Critical Infrastructure Protection - Chris Kubecka
IOT - cont...(14:30-15:20 PDT) - The future of IoT Security “Baselines,” Standards, and Regulatory Domain - Amit Elazari,Anahit Tarkhanyan
IOT - (15:30-16:30 PDT) - Learning to Use Logic Analyzers - Jonathan Stines
LBV - cont...(14:00-15:30 PDT) - Reconnaissance + Q&A
LBV - (15:30-16:59 PDT) - Bypass 101 + Q&A
LPV - Bobby Pins, More Effective Than Lockpicks? - John the Greek
MOV - Decentralization in a Centralized world - rehr
RTV - (15:15-16:15 PDT) - APTs <3 PowerShell and Why You Should Too - Anthony Rose,Jake “Hubbl3” Krasnov
VMV - Understanding Cyber-Attacks and Their Implications to Democratic Regimes - Javier F. Patiño García
VMV - (15:30-15:59 PDT) - A Lawyer's Reflections on Elections - Cordero Alexander Delgadillo

 

Saturday - 16:00 PDT


Return to Index  -  Locations Legend
AEV - Hack-A-Sat End Of Day Recap -
AIV - Workshop 4
BCV - Panel Discussion
BHV - Chinese Military Labratory Mission + COVID-19 - The Red Dragon
BHV - (16:30-17:30 PDT) - What's up with proposed privacy legislation and how to influence the debate - Lucia Savage
BTVT1 - cont...(15:30-16:30 PDT) - Practical Advice on Threat Hunting Panel - Plug,Roberto Rodriguez,Tony M Lambert,Valentina Palacín,Samir,Ruth Barbacil,Anna McAbee,Paul Melson
BTVW1 - cont...(15:30-16:15 PDT) - Defending Your UNIX Hosts (Intermediate) - Daniel Ward,Samuel Gasparro
BTVW2 - (16:30-17:59 PDT) - A N00b's Intro to Building Your Own Lab (Beginner) - Omar Santos
CHV - ChupaCarBrah: Open Source Hardware and Software for Interacting with your Vehicle CAN Bus - Marcelo Sacchetin
CHV - Car (to Cloud) Talk: Using MQTT for Car Hacking - Jaime
CLV - cont...(15:30-17:30 PDT) - Discovering Cloud File Storage Artifacts - Michael Wylie
CPV - Next level stalker ware - Cecilie Wian
DC - (16:30-16:59 PDT) - Reverse Engineering the Tesla Battery Management System for Moar Powerrr! - Patrick Kiley
DL - CIRCO v2: Cisco Implant Raspberry Controlled Operations - Emilio Couto
DL - Cotopaxi: IoT Protocols Security Testing Toolkit - Jakub Botwicz
ETV - cont...(15:20-16:30 PDT) - Food and Drug Administration - Jessica Wilkerson
ETV - (16:30-17:40 PDT) - TechCongress - Leisel Bogan
HHV - Meetup: Certification Processes (UL, FCC, etc.) - ShortTie
HRV - cont...(14:00-16:59 PDT) - Ham Radio USA License Exams (Saturday) -
ICS - cont...(15:30-16:30 PDT) - Operationalizing Cyber Norms: Critical Infrastructure Protection - Chris Kubecka
ICS - (16:45-17:15 PDT) - Industrial Cybersecurity in Mexico - Octavio Fernandez,Victor Gomez
IOT - cont...(15:30-16:30 PDT) - Learning to Use Logic Analyzers - Jonathan Stines
LBV - cont...(15:30-16:59 PDT) - Bypass 101 + Q&A
LPV - (16:15-16:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Tricky Bundles: Smarter Dependency Management for I2P-Bundling Applications - idk
MOV - (16:30-16:59 PDT) - Kahoot! Quiz
PHVW - Advanced APT Hunting with Splunk - Matt Toth,Robert Wagner
POV - Mis/Dis Information & Democracy -
RGV - Outs, Forces, and Equivoque: A treatise on how Magicians speak - Brandon Martinez
RTV - cont...(15:15-16:15 PDT) - APTs <3 PowerShell and Why You Should Too - Anthony Rose,Jake “Hubbl3” Krasnov
RTV - (16:30-17:30 PDT) - Indicators of Emulation: Extra Spicy Adversary Emulation - Ch33r10,haydnjohnson
VMV - Protecting Elections with Data Science -- A Tool for 2020 and Beyond - Stephanie Singer

 

Saturday - 17:00 PDT


Return to Index  -  Locations Legend
AEV - General Aviation (GA) Electronic Flight Bags (EFB) - David Robinson
AIV - cont...(16:00-17:30 PDT) - Workshop 4
BHV - cont...(16:30-17:30 PDT) - What's up with proposed privacy legislation and how to influence the debate - Lucia Savage
BTVT1 - Introducing the Meet a Mentor Program - Scoubi,Plug,Litmoose,Xavier Ashe,Rand0h,Muteki,PacketSqueezins,ttheveii0x,Allie Hansen,nohackme
BTVW2 - cont...(16:30-17:59 PDT) - A N00b's Intro to Building Your Own Lab (Beginner) - Omar Santos
CLV - cont...(15:30-17:30 PDT) - Discovering Cloud File Storage Artifacts - Michael Wylie
CPV - Workshop: Let's Talk About Abusability Testing - Avi Zajac,Franchesca Spektor,Ji Su Yoo,Nicole Chi
DC - (17:30-17:59 PDT) - Getting Shells on z/OS with Surrogat Chains - Jake Labelle
DCG - Introducing Melbourne DCG by Allen and Friends -
DL - cont...(16:00-17:55 PDT) - CIRCO v2: Cisco Implant Raspberry Controlled Operations - Emilio Couto
DL - cont...(16:00-17:55 PDT) - Cotopaxi: IoT Protocols Security Testing Toolkit - Jakub Botwicz
ETV - cont...(16:30-17:40 PDT) - TechCongress - Leisel Bogan
ICS - cont...(16:45-17:15 PDT) - Industrial Cybersecurity in Mexico - Octavio Fernandez,Victor Gomez
IOT - IoT Honeypots and taming Rogue appliances - Kat Fitzgerald
LPV - Intro to high security locks and lockpicking - N∅thing
PHVW - cont...(16:00-17:59 PDT) - Advanced APT Hunting with Splunk - Matt Toth,Robert Wagner
RGV - cont...(16:00-17:59 PDT) - Outs, Forces, and Equivoque: A treatise on how Magicians speak - Brandon Martinez
RTV - cont...(16:30-17:30 PDT) - Indicators of Emulation: Extra Spicy Adversary Emulation - Ch33r10,haydnjohnson
RTV - (17:45-18:45 PDT) - Emulating an Adversary with Imperfect Intelligence - Adam Pennington

 

Saturday - 18:00 PDT


Return to Index  -  Locations Legend
CNE - No Tech Talks -
CNE - Hacker Jeopardy -
CNE - (18:30-19:59 PDT) - Film Festival: Project Immerse: A Deepfake Paranoid Thriller -
ENT - tense future -
IOT - Stepped on a Nail - Matthew Byrdwell
RTV - cont...(17:45-18:45 PDT) - Emulating an Adversary with Imperfect Intelligence - Adam Pennington

 

Saturday - 19:00 PDT


Return to Index  -  Locations Legend
CNE - cont...(18:00-19:59 PDT) - No Tech Talks -
CNE - cont...(18:00-19:59 PDT) - Hacker Jeopardy -
CNE - cont...(18:30-19:59 PDT) - Film Festival: Project Immerse: A Deepfake Paranoid Thriller -
ENT - Mica Husky -
FSL - Ask the EFF/Meet the EFA - Abi Hassen,Alexis Hancock,Elliot,Emilie St-Pierre,Eva Galperin,Hannah Zhao,Kurt Opsahl,nash,Rory Mir,Tracy Rosenberg
RTV - Automating Threat Hunting on the Dark Web and other nitty-gritty things - Apurv Singh Gautam

 

Saturday - 20:00 PDT


Return to Index  -  Locations Legend
CNE - Whose Slide is It Anyway -
DC - Movie Stream - Lost World -
ENT - Dj St3rling -
RTV - (20:15-21:15 PDT) - Bypassing in Mobile Network From Red-Team Points of View - Ali Abdollahi

 

Saturday - 21:00 PDT


Return to Index  -  Locations Legend
CNE - cont...(20:00-21:59 PDT) - Whose Slide is It Anyway -
DC - cont...(20:00-21:59 PDT) - Movie Stream - Lost World -
ENT - Skittish & Bus -
PWDV - Cracking at Extreme Scale: The Evolution of Hashstack (Rebroadcast) - Jeremi M Gosney (epixoip)
RTV - cont...(20:15-21:15 PDT) - Bypassing in Mobile Network From Red-Team Points of View - Ali Abdollahi
RTV - (21:30-22:30 PDT) - Sounds Legit: Why you shouldn't trust that speaker - Luis Ángel Ramírez Mendoza (@larm182luis),Mauro Cáseres

 

Saturday - 22:00 PDT


Return to Index  -  Locations Legend
ENT - Miss Jackalope -
PWDV - Length 15 & No Change. Implementing NIST SP800-63B for real (Rebroadcast - Per Thorsheim
RTV - cont...(21:30-22:30 PDT) - Sounds Legit: Why you shouldn't trust that speaker - Luis Ángel Ramírez Mendoza (@larm182luis),Mauro Cáseres
RTV - (22:45-23:59 PDT) - Weaponized XSS - Moving Beyond Alert(1) - Ray Doyle

 

Saturday - 23:00 PDT


Return to Index  -  Locations Legend
ENT - Subxian -
PWDV - What the Shuck? Layered Hash Shucking (Rebroadcast) - Sam Croley (Chick3nman)
RTV - cont...(22:45-23:59 PDT) - Weaponized XSS - Moving Beyond Alert(1) - Ray Doyle

Sunday


This Schedule is tentative and may be changed at any time. Check at an Info Booth for the latest.

 

Sunday - 01:00 PDT


Return to Index  -  Locations Legend
PWDV - Practical PCFG Password Cracking (Rebroadcast) - Matt Weir
RTV - PatrOwl - Red flavour of SOC automation - Nicolas MATTIOCCO

 

Sunday - 02:00 PDT


Return to Index  -  Locations Legend
RTV - (02:15-03:15 PDT) - Reviewing MS08-067, Illustration Of An Old Chapter - Etizaz Mohsin

 

Sunday - 03:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(02:15-03:15 PDT) - Reviewing MS08-067, Illustration Of An Old Chapter - Etizaz Mohsin
RTV - (03:30-04:30 PDT) - RedTeamOps - Managing Red Team Infrastructure as a Red Teamer - Mert Can Coşkuner

 

Sunday - 04:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(03:30-04:30 PDT) - RedTeamOps - Managing Red Team Infrastructure as a Red Teamer - Mert Can Coşkuner
RTV - (04:45-05:45 PDT) - From Discovery to Disclosure - Ibad Shah

 

Sunday - 05:00 PDT


Return to Index  -  Locations Legend
RTV - cont...(04:45-05:45 PDT) - From Discovery to Disclosure - Ibad Shah

 

Sunday - 06:00 PDT


Return to Index  -  Locations Legend
RTV - Hacking Zoom: a Hacker's Journey into Zoom Security - Mazin Ahmed

 

Sunday - 07:00 PDT


Return to Index  -  Locations Legend
RTV - (07:15-08:15 PDT) - PWN The World - Chris Kubecka

 

Sunday - 08:00 PDT


Return to Index  -  Locations Legend
AEV - (08:30-08:59 PDT) - Hacking Airplane Air To Ground (A2G) Systems - Ali Abdollahi
RTV - cont...(07:15-08:15 PDT) - PWN The World - Chris Kubecka
RTV - (08:30-09:30 PDT) - Autonomous Security Analysis and Penetration Testing (ASAP) - Ankur Chowdhary

 

Sunday - 09:00 PDT


Return to Index  -  Locations Legend
AEV - Hacking Aerospace Cybersecurity Regulation - Harley Geiger,Kaylin Trychon,Nicky Keeley
AIV - Detecting hand-crafted social engineering emails with a bleeding-edge neural language model - Younghoo Lee,Joshua Saxe
ASV - Threagile - Agile Threat Modeling with Open-Source Tools from within Your IDE - Christian Schneider
BTVW1 - Introduction to Malware Analysis & Response (MA&R) (Beginner) - Michael Wylie
DC - (09:30-09:59 PDT) - Evil Printer: How to Hack Windows Machines with Printing Protocol - Chuanda Ding,Zhipeng Huo
HHV - Learn to Solder the BadgeBuddy Kit - Joseph Long (hwbxr)
PHVW - Bad Active Directory (BAD) - Dhruv Verma,Michael Roberts,Xiang Wen Kuan
RTV - cont...(08:30-09:30 PDT) - Autonomous Security Analysis and Penetration Testing (ASAP) - Ankur Chowdhary
RTV - (09:45-10:45 PDT) - Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment - Madhu Akula

 

Sunday - 10:00 PDT


Return to Index  -  Locations Legend
AEV - Trust And Truth In Space Situational Awareness - James Pavur
AEV - (10:30-10:59 PDT) - 747 Walkthrough From A Hacker's Perspective - Alex Lomas,Ken Munro
AIV - Journal Club Live! Summoning Demons: The Pursuit of Exploitable Bugs in Machine Learning<\a>
ASV - Kubernetes Container Orchestration Security Assessment - Ali Abdollahi
ASV - The Elephant in the Room: Burnout - Chloé Messdaghi
BCV - Welcome Note
BCV - Modeling systematic threat: testing on mainnet fork - Martinet Lee
BHV - DAY3 KEYNOTE: Why is Security Hard? - Seth Carmody
BHV - (10:30-10:59 PDT) - Infodemic: Threat models for patient communities on social networks - Andrea Downing
BTVW1 - cont...(09:00-10:30 PDT) - Introduction to Malware Analysis & Response (MA&R) (Beginner) - Michael Wylie
BTVW2 - (10:30-11:59 PDT) - Incident Response and the ATT&CK Matrix (Beginner) - Sam Bowne
CHV - Hacking Ludicrous Mode on a Tesla (moar powerr!) - Patrick Kiley
CPV - (10:30-10:59 PDT) - European regulatory trends for Artificial Intelligence: same impact on US as GDPR? - Julia Reinhardt
DC - (10:30-10:59 PDT) - Bytes In Disguise - Jesse Michael,Mickey Shkatov
DL - redlure - Matthew Creel
DL - MalConfScan with Cuckoo - Tomoaki Tani,Shusei Tomonaga
ETV - Blackmail, Extortion and the Ethics of Disclosure - Michael Antonino
HHV - Meetup: Sourcing Parts - bombnav
HRV - The K0BAK Rover Van -
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - PoS Terminal Security Uncovered - Aleksei Stennikov
PHVW - cont...(09:00-12:59 PDT) - Bad Active Directory (BAD) - Dhruv Verma,Michael Roberts,Xiang Wen Kuan
RTV - cont...(09:45-10:45 PDT) - Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment - Madhu Akula

 

Sunday - 11:00 PDT


Return to Index  -  Locations Legend
AEV - Critical Aerospace Cybersecurity: How Hacking And Designing Aerospace Systems Is Changing - Lawrence Rowell,Nathalie Feyt,Yannick Le Ray
ASV - cont...(10:00-11:59 PDT) - Kubernetes Container Orchestration Security Assessment - Ali Abdollahi
ASV - A Heaven for Hackers: Breaking a Web Security Virtual Appliances - Mehmet D. Ince
BCV - Building a Microcontroller Bitcoin Address Generator - chaintuts,Josh McIntyre
BHV - How Independent Security Researchers work with Medical Device Manufacturers - The Bad, The Ugly & The Great (BUG) - Kyle Erickson,Natali,Peter,Veronica
BTVW2 - cont...(10:30-11:59 PDT) - Incident Response and the ATT&CK Matrix (Beginner) - Sam Bowne
CLV - Cloud host base strategy by staging defensive tools for Threat Hunting and Forensics - Michael Mimo
CLV - (11:45-12:30 PDT) - Remediation Framework - Auto respond to AWS nightmares. - Sahir Khan,Justin Paglierani
CPV - Fear, Uncertainty, and Doubt about Human Microchip Implants - Zhanna Malekos Smith
CPV - (11:30-11:59 PDT) - What if we had TLS for phone numbers? An introduction to SHAKEN/STIR - Kelley Robinson
DC - (11:30-11:59 PDT) - Only takes a Spark - Popping a shell on a 1000 nodes - ayoul3
DL - cont...(10:00-11:50 PDT) - redlure - Matthew Creel
DL - cont...(10:00-11:50 PDT) - MalConfScan with Cuckoo - Tomoaki Tani,Shusei Tomonaga
HHV - (11:30-12:30 PDT) - HackerBox 0057 Build Session - Joseph Long (hwbxr)
HRV - cont...(10:00-11:30 PDT) - The K0BAK Rover Van -
HTS - Hack the SeaPod - Fathom5
LBV - Bypass 101 + Q&A
LPV - Safecracking for Everyone! - Jared Dygert
MOV - cont...(10:00-11:30 PDT) - Keynote: Monero: Sound Money Safe Mode - Dr. Daniel Kim
PAYV - Architecting Modern Payment Gateways in .Net core with Azure - Menaka BaskerPillai
PHVT - Packet Acquisition: Building the Haystack - Chris Abella,Pete Anderson
PHVW - cont...(09:00-12:59 PDT) - Bad Active Directory (BAD) - Dhruv Verma,Michael Roberts,Xiang Wen Kuan
RTV - Breaking the Attack Chain - Corey Ham,Matt Eidelberg

 

Sunday - 12:00 PDT


Return to Index  -  Locations Legend
AEV - Cybersecurity Lessons Learned From Human Spaceflight - Pam Melroy
ASV - Secure Your Code — Injections and Logging - Philipp Krenn
BCV - exploit insecure crypto wallet - Minzhi He,peiyu wang
BCV - (12:40-12:59 PDT) - Closing Note
BHV - (12:30-12:59 PDT) - How to Grow a Brain in a Jar - Neuroengineering 101 - Jack
BTVW1 - Deploying Pi-hole: More Than an Ad Blocker (Beginner) - Ben Hughes
CLV - cont...(11:45-12:30 PDT) - Remediation Framework - Auto respond to AWS nightmares. - Sahir Khan,Justin Paglierani
CLV - (12:30-13:30 PDT) - Cloud-Native Attack Detection and Simulation. - Nick Jones
CPV - Workshop: Let's Talk About Abusability Testing - Avi Zajac,Franchesca Spektor,Ji Su Yoo,Nicole Chi
DL - Carnivore (Microsoft External Attack Tool) - Chris Nevin
DL - Starkiller -
ETV - How to Start a Movement: Hackers Edition - Chloé Messdaghi
HHV - cont...(11:30-12:30 PDT) - HackerBox 0057 Build Session - Joseph Long (hwbxr)
HHV - (12:30-12:59 PDT) - Meetup: Wearables - ShortTie
LBV - cont...(11:00-12:30 PDT) - Bypass 101 + Q&A
LPV - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - You're not the money printer, or why we need to separate coinbase rings - sgp
PHVW - cont...(09:00-12:59 PDT) - Bad Active Directory (BAD) - Dhruv Verma,Michael Roberts,Xiang Wen Kuan
RGV - Rogues adventure & the intervillage badge - Monero Village Team,Rogues Village Team
RTV - (12:15-13:15 PDT) - Hashes; Smothered, Covered, and Scattered: Modern Password Cracking as a Methodology - Lee Wangenheim
WLV - Ghosting the PACS-man: New Tools and Techniques - Iceman,Omikron

 

Sunday - 13:00 PDT


Return to Index  -  Locations Legend
AEV - Dissecting Wireless Privacy In Aviation - Martin Strohmeier
AEV - (13:30-13:59 PDT) - Breakdown Of The FAA's Privacy ICAO Address Program - Gui Michel
AIV - Faults in our Pi Stars: Security Issues and Challenges in Deep Reinforcement Learning - Vahid Behzadan
ASV - Running an appsec program with open source projects - Vandana Verma Sehgal
BHV - (13:15-13:45 PDT) - The Underestimated Threat Vector: Homogeneity - Vidya Murthy
BHV - (13:30-14:30 PDT) - Making Next Generation Drugs at Home - Mixæl Swan Laufer
BTVW1 - cont...(12:00-13:30 PDT) - Deploying Pi-hole: More Than an Ad Blocker (Beginner) - Ben Hughes
BTVW2 - (13:30-14:59 PDT) - Cloud Security Monitoring on a Dime Store Budget (Beginner) - Wes Lambert
CLV - cont...(12:30-13:30 PDT) - Cloud-Native Attack Detection and Simulation. - Nick Jones
CLV - (13:30-13:50 PDT) - Closing Note -
CPV - File Encryption For Actual Humans - David Kane-Parry
DL - cont...(12:00-13:50 PDT) - Carnivore (Microsoft External Attack Tool) - Chris Nevin
DL - cont...(12:00-13:50 PDT) - Starkiller -
HHV - Importing vector graphics in to EagleCAD -
HRV - APRS: Automatic Packet Reporting System Demo -
LPV - Keystone to the Kingdom - Austin Marck
MOV - Locha Mesh: Monero off-the-grid - Randy Brito
MOV - (13:30-14:30 PDT) - Badge Clinic - Michael Schloh von Bennewitz
RGV - cont...(12:00-13:59 PDT) - Rogues adventure & the intervillage badge - Monero Village Team,Rogues Village Team
RTV - cont...(12:15-13:15 PDT) - Hashes; Smothered, Covered, and Scattered: Modern Password Cracking as a Methodology - Lee Wangenheim
RTV - (13:30-14:30 PDT) - You're Adversary Within - The Golden Age of Insider Threats - Adam Mashinchi

 

Sunday - 14:00 PDT


Return to Index  -  Locations Legend
AEV - Hack-A-Sat Closing Segment -
AIV - Ethics & Bias Panel
BHV - cont...(13:30-14:30 PDT) - Making Next Generation Drugs at Home - Mixæl Swan Laufer
BHV - Open Ventilator Remote Monitoring Project -
BHV - (14:45-16:45 PDT) - Securing Your Medical Device Network on a Shoestring Budget
BTVW2 - cont...(13:30-14:59 PDT) - Cloud Security Monitoring on a Dime Store Budget (Beginner) - Wes Lambert
DC - (14:30-14:59 PDT) - Beyond Root: Custom Firmware for Embedded Mobile Chipsets - Christopher Wade
ETV - Open Live Chat for all Speakers or another talk on Ethics of Moderation - Ethics Village Staff
HHV - Learn to Solder the BadgeBuddy Kit - Joseph Long (hwbxr)
HRV - (14:30-14:45 PDT) - Village Closing Commentary -
LBV - DIY Bypass Tool Workshop + Q&A
LPV - (14:15-14:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
MOV - cont...(13:30-14:30 PDT) - Badge Clinic - Michael Schloh von Bennewitz
RTV - cont...(13:30-14:30 PDT) - You're Adversary Within - The Golden Age of Insider Threats - Adam Mashinchi

 

Sunday - 15:00 PDT


Return to Index  -  Locations Legend
AEV - Cybersecurity Meets Aviation Regulation - Aaron Cornelius,Tim Brom
AIV - (15:30-15:59 PDT) - Closing Remarks
BHV - cont...(14:45-16:45 PDT) - Securing Your Medical Device Network on a Shoestring Budget
BTVW1 - Azure AD Logs for the Blue Team (Intermediate) - Mark Morowczynski
DC - (15:30-15:59 PDT) - Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based Audit & Attack Tool - Ismail Melih Tas,Kubilay Ahmet Kucuk
DCG - DEF CON Groups Panel - Brent White / B1TK1LL3R,Casey Bourbonnais / ADAM_915,Jayson E. Street,April C Wright
HRV - Ham Radio USA License Exams (Sunday) -
LBV - cont...(14:00-15:30 PDT) - DIY Bypass Tool Workshop + Q&A
LBV - (15:30-16:59 PDT) - General Q&A / Drop-in and Chat
LPV - How I defeated the Western Electric 30c - N∅thing
MOV - (15:30-15:59 PDT) - Closing talk - rehr
RTV - Have my keys been pwned? - API Edition - José Hernandez,Rod Soto

 

Sunday - 16:00 PDT


Return to Index  -  Locations Legend
AEV - What I Learned Trying To Hack A 737 - Karl Koscher
BHV - cont...(14:45-16:45 PDT) - Securing Your Medical Device Network on a Shoestring Budget
BTVT1 - Blue Team Village Closing Ceremony
DC - (16:30-16:59 PDT) - Lateral Movement and Privilege Escalation in GCP; Compromise any Organization Without Dropping an Implant - Allison Donovan,Dylan Ayrey
HRV - cont...(15:00-17:59 PDT) - Ham Radio USA License Exams (Sunday) -
LBV - cont...(15:30-16:59 PDT) - General Q&A / Drop-in and Chat
LPV - (16:15-16:45 PDT) - Intro to Lockpicking - The Open Orginisation Of Lockpickers
RTV - Red Team Village Closing Ceremony and Announcement of Winners of CTF and CyberWraith  - Joseph Mlodzìanowskì (cedoXx),Omar Ωr

 

Sunday - 17:00 PDT


Return to Index  -  Locations Legend
DC - Closing Ceremonies - The Dark Tangent
HRV - cont...(15:00-17:59 PDT) - Ham Radio USA License Exams (Sunday) -

Speaker List


Anders Fogh
Anders Fogh
Özkan Mustafa Akkus
Aaron Cornelius
Aaron Soto
Abi Hassen
ac0rn
Adam Mashinchi
Adam Mashinchi
Adam Pennington
Adama Ibrahim
Aditi Joshi
AI Village Journal Club
AI Village Organizers
Ajin Abraham
Akira Takahashi
Al Burke
Aleksei Stennikov
Alex Lomas
Alex Lomas
Alex Lomas
Alex Zaheer
Alexander Korotin
Alexandre Beaulieu
Alexandre Sieira
Alexis Hancock
Ali Abdollahi
Ali Abdollahi
Ali Abdollahi
Allan Stojanovic
Allan Tart
Allen Baranov
Allie Barnes
Allie Hansen
Allie Mellen
Allison Donovan
Alvaro Folgado Rueda
Alvaro Munoz
Alyssa Miller
Amèlie Koran
Amber Graner
Amelie Koran
Amit Elazari
Amy Abernethy
Anahit Tarkhanyan
Andrea Downing
Andrea Matwyshyn
Andrew Chu
Andrew Tierney
Ankur Chowdhary
Anna McAbee
Anthony DiFranco
Anthony Rose
April C Wright
Apurv Singh Gautam
Ariel Schön
Arkadiy Litvinenko
Ash Luft
atlas 0f d00m
Austin Marck
Austin Marck
Austin Scott
Avi Zajac
Avi Zajac
Avi Zajac
ayoul3
Barak Schoster
Barak Sternberg
Ben Bornholm
Ben Bornholm
Ben Brook
Ben Dubow
Ben Gardiner
Ben Gardiner
Ben Hughes
Ben Hughes
Benjamin Hovland
Besim Altinok
Bianca Lewis
Bill Demirkapi
Bill Graydon
Bob Wheeler
bombnav
bombnav
Brandon Bailey
Brandon Martinez
Brenda So
Brent Stone
Brent White / B1TK1LL3R
Brig. Gen. William Hartman
Bryson Bort
Bryson Bort
Bryson Bort
C. Nadal
C8 (John Hammond)
Caleb Gardner
Can Demirel
Cannibal
Casey Bourbonnais / ADAM_915
Casey John Ellis
Casey John Ellis
Cathy Gellis
Cecilie Wian
cemaxecuter
Ch33r10
Ch33r10
chaintuts
Chet Hosmer
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chloé Messdaghi
Chris Abella
Chris Gammell
Chris Krebs
Chris Krebs
Chris Kubecka
Chris Kubecka
Chris Nevin
Chris Nevin
Chris Pimlott
Chris Poore
Chris Wysopal
Christian “quaddi” Dameff
Christian “quaddi” Dameff
Christian Schneider
Christopher Cottrell
Christopher Wade
Chuanda Ding
Colin Cantrell
Colin Estep
comathematician
Comm. Geoffrey Starks
Comm. Rohit Chopra
Connor Morley
Cooper Quintin
Cordero Alexander Delgadillo
Corey Ham
corvusactual
CRob
CRob
Cynthia Kaiser
d1dymu5
Dan Kimmage
Dan Salloum
Dani Goland
Dani
Daniel Gruss
Daniel Gruss
Daniel Miessler
Daniel Roy
Daniel Roy
Daniel Ward
David Bernal Michelena
David Imbordino
David J. Bianco
David Kane-Parry
David Robinson
David Sopas
David Waldrop
Dena Medelsohn
Denise Giusto Bilic
Derrick (CanBusDutch)
Devabhaktuni Srikrishna
Dewank Pant
Dhruv Verma
Diane Janosek
Diane Vavrichek
Diego F. Aranha
Dor Yardeni
Dr Lorenz Adlung
Dr Mohammed Aamir Ali
Dr Steven J. Murdoch
Dr Will Roper
Dr. Catherine Ullman
Dr. Daniel Kim
Dr. Daniel Kim
Dr. Daniel Kim
Dr. Francisco "ArticMine" Cabañas
Dr. Gary Kessler
Dr. Khatuna Mshvidobadze
Dr. Mike Rushanan
Dr. Nina Kollars
Dr. Sarah Blossom Ware
drhyrum
Dylan Ayrey
Dylan The Magician
Ece Gumusel
Eduardo Arriols
Eirick Lurass
Eivind Arvesen
Elie Bursztein
Elizabeth Biddlecome
Elliot
Emilie St-Pierre
Emilio Couto
Emilio Couto
Emily Stamm
Enrico Pozzobon
Erdener Uyan
Eric Escobar
Eric Escobar
erickgalinkin
Erik Hunstad
Erin Miller
Ethics Village Staff
Etizaz Mohsin
Eva Galperin
Evan Anderson
EvilMog
EvilMog
Eyal Itkin
F. Novaes
Fabian Landis
Farith Pérez Sáez
Farith Pérez Sáez
Farith Perez
Fathom5
Federico Lucifredi
Federico Lucifredi
Feng Xiao
Forrest Fuqua
Forrest Senti
Forrest Senti
Fran Ramirez
Francesco Gringoli
Franchesca Spektor
Franchesca Spektor
Franchesca Spektor
Fredrick "Flee" Lee
FreqyXin
Gökberk Gülgün
Gabriel Ryan
Gal Zror
Garrett Enoch
Gokul Alex
Graham Bleaney
Grant Romundt
Gregg Horton
GTKlondike
Gui Michel
Guillermo Buendia
hackingdave
Hadrien Barral
Hank Leininger
Hank Leininger
Hannah Zhao
Hanno Böck
Harley Geiger
Harri Hursti
Harshad Sathaye
Harshad Sathaye
haydnjohnson
Holger Unterbrink
Huajiang "Kevin2600" Chen
I. Shaheem
Ibad Shah
Iceman
idk
Infenet
Infenet
Infenet
Infenet
Irvin Lemus
Ismail Melih Tas
J. DeBlois
Jack Baker
Jack Cable
Jack Cable
Jack McDowell
Jack Mott
Jack
Jackie Speier
Jaime
Jaime
Jaime
Jake “Hubbl3” Krasnov
Jake Labelle
Jake Smith
Jakub Botwicz
James Harrison
James Pavur
James Pavur
Jared Dygert
Jarrod Overson
Jason Haddix
Jason Williams
Javad Dadgar
Javier F. Patiño García
Jay Angus
Jayson E. Street
Jeff “r3plicant” Tully
Jeff “r3plicant” Tully
Jeff Troy
Jeff Troy
Jen Ellis
Jen Goldsack
Jenai Marinkovic
Jenko Hwong
Jeremi M Gosney (epixoip)
Jeremi M Gosney (epixoip)
Jesse Michael
Jessica Wilkerson
Jeswin Mathai
Ji Su Yoo
Ji Su Yoo
Ji Su Yoo
Jiska Classen
João Morais
Jody Westby
Joe Billingsley
Joe Schottman
Joe Schottman
Joe Slowik
Joe Slowik
John Craig
John Felker
John Odum
John the Greek
Jonathan Helmus
Jonathan Stines
Jorge Orchilles
Jorge Orchilles
José Hernandez
Jose Miguel Gómez-Casero Marichal
Jose Rodriguez
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Long (hwbxr)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Joseph Mlodzìanowskì (cedoXx)
Josh Marks
Josh McIntyre
Josh O'Connor
Josh Stroschein
Josh
Joshua Maddux
Joshua Saxe
Juan Francisco
Julia Reinhardt
Julian Suleder
JunWei Song
Justin Hutchens (“Hutch”)
Justin Paglierani
Kürşat Oğuzhan Akıncı
Kaitlyn Handleman
Kamel Ghali
Kamel Ghali
Kamel Ghali
Kamel Ghali
Karl Koscher
Kat Fitzgerald
Kat Fitzgerald
Kate Venable
Katelyn Bowden
Katie Doroschak
Katie Noble
Katie Noble
Katie Noble
Kaustubh Padwad
Kaylin Trychon
Kelley Robinson
Kelley Robinson
Ken Munro
Ken Munro
kennwhite
Kevin Leffew
Kim Wyman
Kimber Dowsett
Kirsten Renner
Kris Jones
Kris Rides
Kris Rides
Kubilay Ahmet Kucuk
KunYu Chen
Kurt Opsahl
Kyle Benac (aka @B3nac)
Kyle Erickson
Ladislav B
Larry Lewis
Laurin Weissinger
Lawrence Rowell
Lee Wangenheim
Leigh-Anne Galloway
Leisel Bogan
Lennart Koopmann
Leron Gray
Levi
Lisa Bradley
Lisa Bradley
Litmoose
Litmoose
Liz Popiak
Liz Wharton
lmeyerov
Louis Nyffenegger
Lucia Savage
Luis Ángel Ramírez Mendoza (@larm182luis)
Luis Ángel Ramírez Mendoza (@larm182luis)
Luis Ángel Ramírez Mendoza (@larm182luis)
M. DeBlois
M. Tibouchi
Mário Areias
Maddie Stone
Madhu Akula
Maggie MacAlpine
Mangatas Tondang
Mansi Sheth
Mansi Sheth
Marcelo Sacchetin
Marie
Marina Krotofil
Maritza Johnson
Mark Bereza
Mark Morowczynski
Mark Nesbitt
Marleigh Farlow
Marten Mickos
Martin Abbatemarco
Martin Strohmeier
Martinet Lee
Master Chen
Matt Blaze
Matt Cheung
Matt Duren
Matt Eidelberg
Matt Gaffney
Matt Luongo
Matt Murray
Matt Smith
Matt Toth
Matt Weir
Matt Weir
Matthew Byrdwell
Matthew Creel
Matthew Creel
Matthew Gaffney
Matthew Masterson
Mattie Gullixson
Mattie Gullixson
Mauricio Velazco
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mauro Cáseres
Mazin Ahmed
Megan DeBlois
Mehmet D. Ince
Menaka BaskerPillai
Mert Can Coşkuner
Mert Can Coşkuner
Michael A. Specter
Michael Antonino
Michael Mimo
Michael Roberts
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Schloh von Bennewitz
Michael Stay
Michael Vanguardia
Michael Wylie
Michael Wylie
Michael Wylie
Michael Wylie
Michael Wylie
Michelle Holko
Mickey Shkatov
Mike Cohen
Mike Lemley
Mike Murray
Mike Raggo
Minga
Minga
Mintynet
Mintynet
Minzhi He
Mitchell Parker
Mixæl Swan Laufer
Mohammad-Reza Zamiri
Mohit Gupta
Mohsan Farid
Monero Village Team
Moshe Kol
Muteki
N∅thing
N∅thing
Nadav Erez
NahamSec
Nahid Farhady
Nahid Farhady
Nailah Mims
Najla Lindsay
nash
Natali
Nate DeNicola
Nathalie Feyt
Neil M
Netspooky
Nick Jones
Nicky Keeley
Nicolas MATTIOCCO
Nicole Chi
Nicole Chi
Nicole Chi
Nils Weiss
Nimit Sawhney
Nimrod Kor
Nina Alli
Nishant Sharma
Nishant Sharma
Noa Novogroder
nohackme
Octavio Fernandez
Oleksandr Mirosh
Olivier Bilodeau
Olivier Bilodeau
Omar Ωr
Omar Ωr
Omar Ωr
Omar Santos
Omar Santos
Omar Santos
Omenscan
Omikron
Otis
Pablo Breuer
Pablo Gonzalez
PacketSqueezins
Pam Melroy
Parker Wiksell
Parsia Hakimian
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Password Village Staff
Patrick Kiley
Patrick Kiley
Patrick Kiley
Patrick Wardle
Paul Amar
Paul Marrapese
Paul Melson
Paulo Silva
Pedro Umbelino
peiyu wang
Peleg Hadar
Per Thorsheim
Per Thorsheim
Pete Anderson
Pete Cooper
Pete Cooper
Pete Keenan
Pete Radloff
Peter Kacherginsky
Peter Kacherginsky
Peter
Petros Koutroumpis
Philipp Krenn
Phillip Marlow
Phillip Marlow
Phillip Wylie
Plug
Plug
Plug
Poming Lee
Porter Adams
Preston Thomas
R. Jason Cronk
Rémi Géraud-Stewart
Rachel Bozeman
Rachel Lamp
Radu Motspan
Rand0h
Randy Brito
Randy Talley (CISA)
Ray Doyle
rehr
rehr
rehr
rehr
rehr
rehr
rehr
Reza Dorosti
Riana Pfefferkorn
Rick Hansen
Rik van Duijn
Rim Boujnah
Robert Leale (CarFuCar)
Robert Leale (CarFuCar)
Robert Leale (CarFuCar)
Robert Wagner
Roberto Rodriguez
Roberto Rodriguez
Rod Soto
Rogues Village Team
Rogues Village Team
Roman Vitkovitsky
Ron Stoner
Ron Wyden
Rory Mir
Roy Wattanasin
Russell Mosley
Ruth Barbacil
Ryan Elkins
Ryan Rubin
Ryan Slama
Ryoichi Teramura
Ryosuke Uematsu
Sahir Khan
Sajal Thomas
Sam Bowne
Sam Bowne
Sam Bowne
Sam Croley (Chick3nman)
Sam Croley (Chick3nman)
Samir
Samuel Gasparro
Sang-Oun Lee
Sanjana Sarda
Sarang
Scoubi
Scoubi
Sean Metcalf
Sebastian Banescu
Serkan Temel
Seth Carmody
Setu Parimi
Seungjoo
sgp
Shay Nehmad
Shlomi Oberman
Shogo Nakao
ShortTie
ShortTie
ShortTie
ShortTie
Shruti Lohani
Shusei Tomonaga
Sidd Gejji
Simon Weckert
Slava Makkaveev
Spencer Cureton
Spencer Gietzen
Stanislas Molveau
Stephanie Singer
Stephen Gerling
Steve Newell
Steven Bernstein
Suhyeon Lee
Susan Greenhalgh
Suzanne Schwartz
Tanner Barnes (aka @_StaticFlow_)
Tatsuya Katsuhara
Teejay
Tejaswa Rastogi
The Dark Tangent
The Dark Tangent
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Open Orginisation Of Lockpickers
The Red Dragon
TheDrPinky
Thomas Hayes
Tim Brom
Tim Doomsday
Tim Wadhwa-Brown
Tim Yardley
TimDotZero
Timur Yunusov
Tod Beardsley
Tom
Tomer Bar
Tomoaki Tani
Tony M Lambert
Tony Virelli
Tracy Rosenberg
Travis LeBlanc
Travis Palmer
Trevor Stevado t1v0
Trey Keown
Troy Brown
ttheveii0x
Tyler Boykin
Uri Rivner
Utku Sen
Utku Sen
Vahid Behzadan
Valentina Palacín
Vandana Verma Sehgal
Vandana Verma Sehgal
Vee Schmitt
Veronica
Veronica
Vic Harkness
Victor Fang
Victor Gomez
Vidya Murthy
Vidya Murthy
Vincent “Vinnybod” Rose
Viral Maniar
Vyrus
Walter Cuestas
Wes Lambert
Wes Lambert
Wesley Neelen
Whitney Champion
wytshadow
Xavier Ashe
Xavier Ashe
Xiang Wen Kuan
Y. Yarom
Yamila Levalle
Yannick Le Ray
Yong-Bee
Younghoo Lee
Yuchao (Alex) Zhang
Yusuf Henriques
Z. Anderson
Zach Singleton
zeefeene
zh4ck
Zhanna Malekos Smith
Zhipeng Huo

Talk List


"SECRETS ARE LIES, SHARING IS CARING, PRIVACY IS THEFT."- A Dive into Privacy Preserving Machine Learning - AIV
10,000 Dependencies Under The Sea: Exploring and Securing Open source dependencies - ASV
21 Jump Server: Going Bastionless in the Cloud - CLV
2FA in 2020 and Beyond - ASV
40,000 Leagues UUV Death Match - HTS
5 Quick Wins for Improving your ICS Cybersecurity Posture - ICS
50 Shades of Sudo Abuse - RTV
7 Phases of Smart Contract Hacking - BCV
747 Walkthrough From A Hacker's Perspective - AEV
A Basic Ham Station Setup - HRV
A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven - DC
A Deeper Dive Into ILS And ADS-B Spoofing - AEV
A Hacker’s guide to reducing side-channel attack surfaces using deep-learning - DC
A Heaven for Hackers: Breaking a Web Security Virtual Appliances - ASV
A Lawyer's Reflections on Elections - VMV
A N00b's Intro to Building Your Own Lab (Beginner) - BTVW2
A Panel with the Feds on Election Security - VMV
A Policy Approach to Resolving Cybersecurity Problems inthe Election Process - VMV
A View From The Cockpit: Exploring Pilot Reactions To Attacks On Avionic Systems - AEV
Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT - DC
Acid T - ENT
Adding new features by manipulating CAN bus - CHV
Advanced APT Hunting with Splunk - PHVW
Advancing Medical Device Security – How collaboration between providers, manufacturers, and pen testers is advancing what’s possible with security. - BHV
Aerospace Village Badge - AEV
AI vs. Airplanes and IT-Security: What Security Regulations Teach Us About AI Governance - AIV
All Aboard the CAN Bus… or Motorcycle - CHV
All of the threats: Intelligence, modelling and hunting through an ATT&CKers lens - RTV
AMA w/@hackingdave & @kennwhite - POV
AMA w/Policymakers - POV
Ambly, the Smart Darknet Spider  - RCV
An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - BTVW2
An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner) - BTVW2
Analysis of the Attack Data Collected During Mobile Voting Pilots - VMV
Android Application Exploitation - RTV
Android Bug Foraging - ASV
Android Malware Adventures - RTV
API (in)Security TOP 10: Guided tour to the Wild Wild World of APIs - ASV
Applied Ca$h Eviction through ATM Exploitation - DC
Applying Pysa to Identify Python Security Vulnerabilities - ASV
APRS: Automatic Packet Reporting System Demo - HRV
APTs <3 PowerShell and Why You Should Too - RTV
Architecting Modern Payment Gateways in .Net core with Azure - PAYV
Ask the EFF/Meet the EFA - FSL
Assembling VULNtron: 4 CVEs that Turn a Teleconference Robot into a Spy - IOT
Attacking and Defending Blockchain Nodes - BCV
Attacking Flight Management Systems: This Is Your Captain Speaking, We Have A Small Problem! - AEV
Attacking the Helmsman - CLV
ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project - RTV
Automating Threat Hunting on the Dark Web and other nitty-gritty things - RTV
Automotive Ethernet for the rest of us - CHV
Automotive Ethernet for the rest of us - CHV
Automotive In-Vehicle Networks - CHV
Automotive In-Vehicle Networks - CHV
Autonomous Security Analysis and Penetration Testing (ASAP) - RTV
Azure AD Logs for the Blue Team (Intermediate) - BTVW1
Baby's First 100 MLSec Words - AIV
Back to the future: Computer science and systems biology  - RTV
Bad Active Directory (BAD) - PHVW
Badge Clinic - MOV
Badge Clinic - MOV
Basic OSINT: Mining Personal Data - DCG
Be Like Water: What Bruce Lee Can Teach Us About AppSec - ASV
Before J1939: A J1708/J1587 Protocol Decoder - CHV
Beyond Root: Custom Firmware for Embedded Mobile Chipsets - DC
Blackmail, Extortion and the Ethics of Disclosure - ETV
Blockchain for Cyber Defense: Will it be as good as you think? - BCV
Blue Team Village & Red Team Village Panel - BTVT1
Bluetooth Security in Automotive - CHV
Bluetooth Security in Automotive - CHV
Bobby Pins, More Effective Than Lockpicks? - LPV
Breakdown Of The FAA's Privacy ICAO Address Program - AEV
Breaking the Attack Chain - RTV
Build a Raspberry AIS - HTS
Building a Microcontroller Bitcoin Address Generator - BCV
Building a Physical Testbed for Blackstart Restoration under Cyber Fire - ICS
Building BLUESPAWN: An Open-Source, Active Defense & EDR Software (Intermediate) - BTVT1
Building Connections Across The Aviation Ecosystem - AEV
Building Teams in the New Normal - CRV
Burnout is real - RCV
But I Still Need A Job! - CRV
Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks - DC
Bypassing in Mobile Network From Red-Team Points of View - RTV
Bytes In Disguise - DC
CAN be super secure: Bit Smashing FTW - CHV
Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - CLV
Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments - ASV
Car (to Cloud) Talk: Using MQTT for Car Hacking - CHV
Car (to Cloud) Talk: Using MQTT for Car Hacking - CHV
Carnivore (Microsoft External Attack Tool) - DL
Carnivore (Microsoft External Attack Tool) - DL
Catch Me if You Can - RTV
Chairman Benjamin Hovland, US Election Assistance Commission - VMV
Checklist For Aviation Vulnerability Disclosure: Don't Go It Alone - AEV
Chinese Military Labratory Mission + COVID-19 - BHV
ChupaCarBrah: Open Source Hardware and Software for Interacting with your Vehicle CAN Bus - CHV
CIRCO v2: Cisco Implant Raspberry Controlled Operations - DL
CIRCO v2: Cisco Implant Raspberry Controlled Operations - DL
Closing Ceremonies - DC
Closing Note - CLV
Closing talk - MOV
Cloud Frontier - CLV
Cloud host base strategy by staging defensive tools for Threat Hunting and Forensics - CLV
Cloud Security Monitoring on a Dime Store Budget (Beginner) - BTVW2
Cloud Village CTF - CLV
Cloud-Native Attack Detection and Simulation. - CLV
Cluster fuzz! - CHV
Cluster fuzz! - CHV
CMAP: Open Source Vehicle Services Mapping Tool for noobs - CHV
Combining notebooks, datasets, and cloud for the ultimate automation factory - RTV
Confessions of an Offensive ICS Cyber Security Researcher - ICS
Cons and Careers - CRV
Cotopaxi: IoT Protocols Security Testing Toolkit - DL
COVID 1984_ Propaganda and Surveillance during a Pandemic - RCV
Cracking at Extreme Scale: The Evolution of Hashstack (Rebroadcast) - PWDV
Cracking at Extreme Scale: The Evolution of Hashstack - PWDV
Creating a decentralized storage for Kubernetes with Tardigrade and Velero - BCV
Critical Aerospace Cybersecurity: How Hacking And Designing Aerospace Systems Is Changing - AEV
Cryptocurrencies have superusers? - BCV
Cybersecurity informed consent for medical devices - BHV
Cybersecurity Lessons Learned From Human Spaceflight - AEV
Cybersecurity Meets Aviation Regulation - AEV
Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI (Intermediate) - BTVW1
D0 N0 H4RM: A Healthcare Security Conversation - FSL
Data Analysis for Detection Research Through Jupyter Notebooks 101 (Beginner) - BTVW2
DAY1 KEYNOTE: The Trust Talks - BHV
DAY2 KEYNOTE: Understanding DIYBio and Community Labs - A Social Science Approach - BHV
DAY3 KEYNOTE: Why is Security Hard? - BHV
Decentralization in a Centralized world - MOV
Decentralized Finance (DeFi) - ready for prime time ? - BCV
Deep Dive into Adversary Emulation - Ransomware Edition - RTV
DEF CON Groups Panel - DCG
Defending Your UNIX Hosts (Intermediate) - BTVW1
Demystifying Modern Windows Rootkits - DC
Deploying Pi-hole: More Than an Ad Blocker (Beginner) - BTVW1
Detecting Fake 4G Base Stations in Real Time - DC
Detecting hand-crafted social engineering emails with a bleeding-edge neural language model - AIV
Detecting The Not-PowerShell Gang (Intermediate) - BTVT1
Differential Privacy..more important than ever in the world of Covid-19 - CPV
Digital Health Technologies in the NIH All of Us Research Program - BHV
Discovering Cloud File Storage Artifacts - CLV
Discovering ELK The First Time - Lessons Learned Over 2 Years (Beginner) - BTVT1
Discovering Hidden Properties to Attack Node.js ecosystem - DC
Discussion: What makes a good ham radio operator? - HRV
Dissecting Wireless Privacy In Aviation - AEV
DIY Diabetics and a Million Boluses - BHV
Dj St3rling - ENT
DNS New World Order, version 1.4: QuadX! DoH! DoT! Da Fuq? - DCG
DNS Privacy - CPV
DNSSECTION: A practical attack on DNSSEC Zone Walking - DC
Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise - DC
Don't Be Silly - It's Only a Lightbulb - DC
Don't Ruck Us Again - The Exploit Returns - DC
Don’t Go Postal Over Mail In Voting - VMV
Doors, Cameras, and Mantraps OH MY! - LPV
Dos, Donts and How-Tos of crypto building blocks using Java - CPV
Double Spending in BSV, is it Possible? - BCV
DragonOS - How I kept busy during COVID19 - WLV
Drinks with Recruiters - CRV
Dumpster Fires: 6 Things About IR I Learned by Being a Firefighter - PHVT
EFF Tech Trivia Pub Quiz - CNE
Election Security - POV
Electronic Ballot Return Standards & Guidelines - VMV
Emulating an Adversary with Imperfect Intelligence - RTV
Entrepeneurial Adventures: What It Takes to Start A Company - CRV
Enumerating Cloud File Storage Gems - RTV
ERPwnage - a red team approach to targeting SAP - RTV
European regulatory trends for Artificial Intelligence: same impact on US as GDPR? - CPV
Evil Genius: Why you shouldn't trust that keyboard - RTV
Evil Printer: How to Hack Windows Machines with Printing Protocol - DC
Executing Red Team Scenarios with Built-in Scenario Place - RTV
Experimental Aviation, Risks And Rewards - AEV
exploit insecure crypto wallet - BCV
Exploiting Key Space Vulnerabilities in the Physical World - DC
Exploiting Spacecraft - AEV
Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research - IOT
Faults in our Pi Stars: Security Issues and Challenges in Deep Reinforcement Learning - AIV
Fear and Loathing in Payment Bug Bounty - PAYV
Fear, Uncertainty, and Doubt about Human Microchip Implants - CPV
Federal Communications Commission - ETV
Federal Trade Commision - ETV
Fighting a Virus with a Spreadsheet (Beginner) - BTVT1
File Encryption For Actual Humans - CPV
Film Festival: Project Immerse: A Deepfake Paranoid Thriller - CNE
Film Festival: Project Immerse: A Deepfake Paranoid Thriller - CNE
Finding and Exploiting Bugs in Multiplayer Game Engines - DC
Fireside Chat with Dr. Amy Abernethy and Adama Ibrahim - BHV
Fireside Chat: All about Section 230, the EARN IT Act, and What They Mean for Free Speech and Encryption - CPV
Food and Drug Administration - ETV
From Barista to Cyber Security Pro, Breaking the Entry Level Barrier - CRV
From Blackbox to Automotive Ransomware - CHV
From Discovery to Disclosure - RTV
From Printers to Silver Tickets or Something (Rebroadcast) - PWDV
From Printers to Silver Tickets or Something - PWDV
Fundamentals of Diagnostic Requests over CAN Bus - CHV
Fundamentals of Diagnostic Requests over CAN Bus - CHV
Future Proofing Your Career - CRV
General Aviation (GA) Electronic Flight Bags (EFB) - AEV
Getting Advanced with Hashcat (Rebroadcast) - PWDV
Getting Advanced with Hashcat - PWDV
Getting Shells on z/OS with Surrogat Chains - DC
Getting Started – Building an IoT Hardware Hacking Lab - IOT
Getting Started with Hashcat (Rebroadcast) - PWDV
Getting Started with Hashcat - PWDV
Getting started with the Intervillage badge - MOV
Ghosting the PACS-man: New Tools and Techniques - WLV
Google Maps Hacks - RGV
Government Espionage on a School Lunch Budget - DCG
GPS Spoofing 101 - AEV
Graylog: An Introduction Into OpenSOC CTF Tools - BTVT1
Grey Hat SSH: SShenanigans - RTV
Guerrilla Red Team: Decentralize the Adversary - RTV
Hack the SeaPod - HTS
Hack the SeaPod - HTS
Hack-a-Fax - VMV
Hack-A-Sat Closing Segment - AEV
Hack-A-Sat End Of Day Recap - AEV
Hack-A-Sat Friday Recap - AEV
Hack-A-Sat Kickoff Segment - AEV
Hack-A-Sat Launch Party - AEV
Hacker Jeopardy - CNE
Hacker Jeopardy - CNE
HackerBox 0057 Build Session - HHV
HackerBox 0057 Build Session - HHV
Hackers And ISACS - AEV
Hacking Aerospace Cybersecurity Regulation - AEV
Hacking Airplane Air To Ground (A2G) Systems - AEV
Hacking Democracy II: On Securing an Election Under Times of Uncertainty and Upheaval - VMV
Hacking like Paris Hilton 14 years later - and still winning! - CPV
Hacking Ludicrous Mode on a Tesla (moar powerr!) - CHV
Hacking Security Leadership - CRV
Hacking smart-devices for fun and profit: From exploiting my smart-home into controlling thousands of smart-devices around the world - IOT
Hacking TESLA Model 3 - NFC Relay Revisited - CHV
Hacking the Hybrid Cloud - DC
Hacking the Insulin Supply Chain To Save Lives - BHV
Hacking the Supply Chain – The Ripple20 Vulnerabilities Haunt Hundreds of Millions of Critical Devices - DC
Hacking traffic lights - DC
Hacking with Skynet - How AI is Empowering Adversaries - AIV
Hacking Zoom: a Hacker's Journey into Zoom Security - RTV
Hackium: a browser for web hackers - ASV
Ham Radio USA License Exams (Friday) - HRV
Ham Radio USA License Exams (Saturday) - HRV
Ham Radio USA License Exams (Sunday) - HRV
Hardware hacking 101: There is plenty of room at the bottom - HHV
Hardware hacking 101: There is plenty of room at the bottom - HHV
Hashes; Smothered, Covered, and Scattered: Modern Password Cracking as a Methodology - RTV
Have my keys been pwned? - API Edition - RTV
Heightened Election Security Risks Admist the Pandemic - VMV
Hella Booters: Why IoT Botnets Aren't Going Anywhere - IOT
High Security Wafer Locks - An Oxymoron? - LPV
Houston, we CAV a problem - CHV
How Blue Penetrates You - CLV
How COVID19 Changed Our Understanding of Cyber Disaster Medicine - BHV
How I defeated the Western Electric 30c - LPV
How Independent Security Researchers work with Medical Device Manufacturers - The Bad, The Ugly & The Great (BUG) - BHV
How to get rights for hackers - IOT
How to Grow a Brain in a Jar - Neuroengineering 101 - BHV
How to hack SWIFT, SPID, and SPEI with basic hacking techniques (from a Red Team Perspective) - RTV
How to Start a Movement: Hackers Edition - ETV
How to store sensitive information in 2020? - CPV
How we recovered $XXX,000 in Bitcoin from an encrypted zip file - DC
Hunting for Blue Mockingbird Coinminers - RCV
Hybrid PhySec tools - best of both worlds or just weird? - LPV
Hyperlocal Drift detection with Goko: Finding abusers of your Dataset - AIV
IAM Concerned: OAuth Token Hijacking in Google Cloud (GCP) - CLV
Icetre Normal - ENT
ICS Village CTF Kick-Off - ICS
Identifying and fixing out-of-gas errors in smart contracts with smart fuzzing - BCV
Identity Crisis: the mad rise of online account opening fraud - PAYV
ILS and TCAS Spoofing Demonstration - AEV
Importing vector graphics in to EagleCAD - HHV
In search of the perfect UPnP tool - IOT
In theory, there is no difference between theory and practice - CRV
Incident Response and the ATT&CK Matrix (Beginner) - BTVW2
Incident Response Panel - BTVT1
Indicators of Emulation (Intermediate) - BTVT1
Indicators of Emulation: Extra Spicy Adversary Emulation - RTV
Industrial Cybersecurity in Mexico - ICS
Infodemic: Threat models for patient communities on social networks - BHV
Initial Compromise through Web Side - RTV
Inside the Mind of a Threat Actor: Beyond Pentesting - RTV
Intro to DC603 - DCG
Intro to DC858 - DCG
Intro to high security locks and lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Intro to Lockpicking - LPV
Introducing DropEngine: A Malleable Payload Creation Framework - RTV
Introducing Melbourne DCG by Allen and Friends - DCG
Introducing the Meet a Mentor Program - BTVT1
Introduction To ACARS - AEV
Introduction to Malware Analysis & Response (MA&R) (Beginner) - BTVW1
Introduction to U-Boot Interaction and Hacking - IOT
Introduction to WiFi Security - WLV
Intrusion Analysis and Threat Hunting with Open Source Tools - PHVW
IoT Hacking Stories in Real Life - IOT
IoT Honeypots and taming Rogue appliances - IOT
IoT Under the Microscope: Vulnerability Trends in the Supply Chain - IOT
jeopardize - DL
jeopardize - DL
John Odum, Montpelier, VT - VMV
Journal Club Live! Fawkes FR - AIV
JWT Parkour - ASV
Key Duplication - It's not just for the movies! - LPV
Key Ingredients for the Job Interviews (Virtual or Face-2-Face) - CRV
Key Note - State of Blockchain Security - BCV
Keynote Remarks: Representative Jackie Speier - VMV
Keynote Remarks: Senator Ron Wyden - VMV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote: Monero: Sound Money Safe Mode - MOV
Keynote - ICS
Keystone to the Kingdom - LPV
Kibana: An Introduction Into OpenSOC CTF Tools - BTVW1
Kicking Devices and Taking CVEs : The Zoomer’s Guide to Hacking Shit - IOT
Killer Robots Reconsidered - ETV
Knock knock, who's there? Identifying assets in the cloud - RTV
Kubernetes Container Orchestration Security Assessment - ASV
Kubernetes Goat - Vulnerable by Design Kubernetes Cluster Environment - RTV
LadderLeak: Breaking ECDSA With Less Than One Bit Of Nonce Leakage - CPV
Lateral Movement and Privilege Escalation in GCP; Compromise any Organization Without Dropping an Implant - DC
Law School for Lockpickers - LPV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learn to Solder the BadgeBuddy Kit - HHV
Learning to Use Logic Analyzers - IOT
Least privilege using infrastructure as code - CLV
Length 15 & No Change. Implementing NIST SP800-63B for real (Rebroadcast - PWDV
Leveraging the critical YARA skills for Blue Teamers (Beginner) - BTVW1
Live Q&A with Special Guests Regarding "Kill Chain" - VMV
Live SE Q&A - SEV
localghost: Escaping the Browser Sandbox Without 0-Days - ASV
Locha Mesh: Monero off-the-grid - MOV
Low Value Indicators For High Value Decisions (Intermediate) - BTVT1
Low-Cost VHF Receiver: Eavesdropping Pilot/Controller Communication - AEV
Making Breach and Attack Simulation Accessible and Actionable with Infection Monkey - from IT to the C-suite - RTV
Making Next Generation Drugs at Home - BHV
Making sense of EMV card data – decoding the TLV format - PAYV
Making Targeted Wordlists (Rebroadcast) - PWDV
Making Targeted Wordlists - PWDV
MalConfScan with Cuckoo - DL
Mechanizing the Methodology: Automating Discovery, Testing, and Alerting using Recon/Testing Tools and Amazon SES - RTV
Media Analysis of Disinformation Campaigns - PHVT
Medical Device Vulnerability Disclosure - BHV
Medical Technology: How do we unfuck things - BHV
MedICS - BHV
Meetup: 3H: Hardware Happy Hour - HHV
Meetup: Certification Processes (UL, FCC, etc.) - HHV
Meetup: Legacy Hardware - HHV
Meetup: OSS ASIC - HHV
Meetup: PCB Proto and Rework - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Some HHV Challenges - HHV
Meetup: Sourcing Parts - HHV
Meetup: Sourcing Parts - HHV
Meetup: Wearables - HHV
Mica Husky - ENT
Mis/Dis Information & Democracy - POV
Misbehavior Detection for V2X communication - CHV
Misinformation & Covid - AIV
Miss Jackalope - ENT
Mission Kill: Process Targeting in ICS Attacks - ICS
MITM - The Mystery In The Middle. An Introduction To The Aircraft Information Systems Domain - AEV
MITRE ICS ATT&CK - ICS
ML Security Evasion Competition 2020 - AIV
Mobile Security Framework - MobSF - DL
Modeling systematic threat: testing on mainnet fork - BCV
Models of Privacy Norms - ETV
Modern Red Team Tradecraft - Informing Defenders by Evolving Your Attackers - RTV
Monero Wallet Basics: Sending, Receiving, Proving - MOV
Monetary Maximalism and Millennial Finance - Building Decentralized Tooling to Empower Everyone - BCV
Movie Stream - Lost World - DC
NAND Flash – Recovering File Systems from Extracted Data - IOT
National Service Panel: Career Opportunities Supporting the Country - CRV
Next level stalker ware - CPV
Ninjula - ENT
No Question: Teamviewer, Police and Consequence (Beginner) - BTVT1
No Tech Talks - CNE
O365Squatting (Intermediate) - BTVT1
OBD and what we CAN do with it - CHV
OBD and what we CAN do with it - CHV
Offensive Embedded Exploitation : Getting hands dirty with IOT/Embedded Device Security Testing - RTV
Office Drama on macOS - DC
On the insecure nature of turbine control systems in power generation - ICS
onkeypress=hack(); - HHV
onkeypress=hack(); - HHV
Online Ads as a Recon and Surveillance Tool - CPV
Online Banking Security - PAYV
Online Voting: Theory and Practice - CPV
Only takes a Spark - Popping a shell on a 1000 nodes - DC
Open Live Chat for all Speakers or another talk on Ethics of Moderation - ETV
Open Office Q&A w/ Monero Research Lab's Sarang - MOV
Open Ventilator Remote Monitoring Project - BHV
Open-Source Tools for Hunting and Practical Intelligence (Intermediate) - BTVW1
Opening Remarks: Getting The Aerospace Village To Take-Off - AEV
Opening Remarks - AIV
Operationalizing Cyber Norms: Critical Infrastructure Protection - ICS
Osquery: An Introduction Into OpenSOC CTF Tools - BTVW1
OSTWERK Initiative - HRV
OU having a laugh? - RTV
Our journey into turning offsec mindset to developer's toolset - ASV
OuterHaven - The UEFI Memory Space Just Itching to be Misused (Intermediate) - BTVT1
Outs, Forces, and Equivoque: A treatise on how Magicians speak - RGV
OWASP API Top 10 - DCG
Packet Acquisition: Building the Haystack - PHVT
Pandemic In Plaintext - IOT
Panel: The Joy of Coordinating Vulnerability Disclosure - RTV
Password cracking beyond 15 characters and under $500 - RTV
PathWell: Dynamic Password Strength Enforcement (Rebroadcast) - PWDV
PathWell: Dynamic Password Strength Enforcement - PWDV
PatrOwl - Red flavour of SOC automation - RTV
Peeling Back the Layers and Peering Through the Clouds with Security Onion - CLV
Performance - RGV
Performance - RGV
Phirautee - DL
Pickpocketing @ Home - RGV
Playing with Electricity: Hacking into Distribution Companies - ICS
Porcupine: Rapid and robust tagging of physical objects using DNA with highly separable nanopore signatures - BHV
PoS Terminal Security Uncovered - PAYV
PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - ICS
PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS - CHV
Practical Advice on Threat Hunting Panel - BTVT1
Practical PCFG Password Cracking (Rebroadcast) - PWDV
Practical PCFG Password Cracking - PWDV
Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based Audit & Attack Tool - DC
Practice 'Net' via Discord - HRV
Product Cybersecurity: Secure Airplane Development Lifecycle - AEV
Proposed Mitigation Measures to Address a Disruption Such as The Economic Impact of COVID -19 on Transaction Capacity and Fees in Monero - MOV
Protecting Elections with Data Science -- A Tool for 2020 and Beyond - VMV
Purple On My Mind: Cost Effective Automated Adversary Simulation (Intermediate) - BTVT1
PWN The World - RTV
Pwn2Own Qualcomm compute DSP for fun and profit - DC
Pwning Your Resume - CRV
PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - DL
PyRDP: Remote Desktop Protocol Monster-in-the-Middle (MITM) and Library - DL
Quantum Computers & Cryptography - CPV
Quark Engine - An Obfuscation-Neglect Android Malware Scoring System (Beginner) - BTVT1
Ransom in the Cloud - CLV
Realistic Trends in Vulnerability based on Hacking into Vehicle - CHV
Red Team Village Announcements and Remarks - RTV
Red Team Village Closing Ceremony and Announcement of Winners of CTF and CyberWraith  - RTV
Red Team Village CTF - Finals - RTV
Red Team Village CTF - Prequal - RTV
Red Team Village Opening Remarks - RTV
Red Teaming: Born from the Hacker Community - RTV
Redefining patient safety in the digital era - BHV
redlure - DL
redlure - DL
RedTeamOps - Managing Red Team Infrastructure as a Red Teamer - RTV
Remediation Framework - Auto respond to AWS nightmares. - CLV
Remote Online Balloting Delivery and Marking Options and Security Considerations for Absentee Voting During the COVID-19 Pandemic - VMV
Result of Longer Passwords in Real World Application (Rebroadcast) - PWDV
Result of Longer Passwords in Real World Application - PWDV
Reverse Engineering the Tesla Battery Management System for Moar Powerrr! - DC
Reversing with Dynamic Data Resolver (DDR) – Best practice (Advanced) - BTVT1
Reviewing MS08-067, Illustration Of An Old Chapter - RTV
Rights You Can’t Exercise Can’t Protect You: Privacy by Design, Dark Patterns, and Cultural Context - CPV
Rogues adventure & the intervillage badge - RGV
Rogues Village Introduction - RGV
Room for Escape: Scribbling Outside the Lines of Template Security - DC
Running an appsec program with open source projects - ASV
Russian Cyber Threats in The Pandemic Era - BHV
SaaSpocalypse - The Complexity and Power of AWS Cross Account Access - CLV
Safecracking for Everyone! - LPV
Satellite Orbits 101 - AEV
Saving Yourself from Microsoft: It's by design - DCG
Secretary Kim Wyman, Washington - VMV
Secure Your Code — Injections and Logging - ASV
Securing AND Pentesting the Great Spaghetti Monster (k8s) - RTV
Securing the COSMOS: How to operate and secure a validator - BCV
Security Focused Operating System Design - BCV
Security of Election Systems: A contract case study in progress - ETV
See Something, Say Something - VMV
Shadowvex - ENT
Shrek, Juggs, and Toxic Trolls: a BADASS discussion about Online Sexuality and Hacktivism - FSL
Single Board Computers in Amateur Radio - HRV
Skittish & Bus - ENT
So You Got an SDR: Common Signals and the Wiki - HRV
Sounds Legit: Why you shouldn't trust that speaker - RTV
Spectra—New Wireless Escalation Targets - DC
Spectrum: An End-to-End Framework for ML-based Threat Monitoring and Detection - AIV
Speed 2: The Poseidon Adventure – When Cruise Ships Go Wrong - HTS
Starkiller - DL
Starkiller - DL
STARTTLS is Dangerous - CPV
Static analysis of Infrastructure as code: Terraform, Kubernetes, Cloudformation and more! - CLV
Stepped on a Nail - IOT
Subxian - ENT
Suricata: An Introduction Into OpenSOC CTF Tools - BTVW1
Take Down the Internet! With Scapy - PHVT
Talking to Satellites - HRV
Talking To Satellites - 101 - AEV
TechCongress - ETV
tense future - ENT
Terrestrial Access Network - ENT
The Art of Balancing: A Burnout Talk - RTV
The Ballot is Busted Before the Blockchain: A Security Analysis of Voatz, the First Internet Voting Application Used in U.S. Federal Elections - VMV
The Basics Of Breaking BLE v3 - WLV
The Bug Hunter’s Methodology - RTV
The DevOps & Agile Security Toolkit - ASV
The Elephant in the Room: Burnout - ASV
The future of IoT Security “Baselines,” Standards, and Regulatory Domain - IOT
The Individual Contributor to Tech Executive, or There and Back Again - CRV
The Journey of ICS Project Files - Visibility and Forensics to Exploitation - ICS
The Joy of Coordinating Vulnerability Disclosure - IOT
The K0BAK Rover Van - HRV
The Norwegian Blue: A lesson in Privacy Engineering - CPV
The Student Roadmap to Becoming A Penetration Tester - RTV
The Underestimated Threat Vector: Homogeneity - BHV
The Vulnerability That Gmail Overlooked and Enabling Threat Hunting - PHVT
The Worst Mobile Apps - PHVT
This year's village badge - MOV
Threagile - Agile Threat Modeling with Open-Source Tools from within Your IDE - ASV
Threat Hunting with the Elastic Stack (Beginner) - BTVW2
Threat Modelling the Death Star - ASV
Ticketing To Takeoff: An Airport Hacking Choose Your Own Adventure - AEV
Total E(A)gression - RTV
Towards an Institutional Review Board for Biohackers - BHV
Tracer FIRE 9 (Intermediate) - BTVW1
Trends in the online card payment security - PAYV
Tricky Bundles: Smarter Dependency Management for I2P-Bundling Applications - MOV
Trust And Truth In Space Situational Awareness - AEV
Trust, but Verify: Maintaining Democracy In Spite of Информационные контрмеры - RTV
Turning Telemetry and Artifacts Into Information (Intermediate) - BTVW1
Twitter Word Phrequency - RCV
Twitter’s Tax Day Disaster: The Beginning (and End) of Mainstream Crypto Scams - BCV
U.S. Privacy and Civil Liberties Oversight Board Member - ETV
Understanding Cyber-Attacks and Their Implications to Democratic Regimes - VMV
Understanding the Threat: Malicious Software, Malicious Actors, and the Promise of Connected Medical Technology - DCG
Velociraptor: An Introduction Into OpenSOC CTF Tools - BTVW1
Verifiable Delay Functions for preventing DDoS Attacks on Ethereum 2.0 - BCV
Veteran Transition Tips - CRV
Village Closing Commentary - HRV
Village Opening Remarks - HRV
Violent Python 3 - PHVW
Vivisecting PowerPC - ICS
Vote @ Home Workshop - ETV
Vote-from-home? Review of Election Security on Remote Voting in Response to COVID-19 - VMV
Vulnerability Discovery - Tips for Surviving and Thriving - ICS
War By Other Means: How Influence Operations Undermine Democracy - VMV
War Story Bunker - CNE
Weaponized XSS - Moving Beyond Alert(1) - RTV
Web Shell Hunting - Part 1 - ASV
Web Shell Hunting - Part 2 - ASV
Welcome and Kick-Off - VMV
Welcome Speech - MOV
Welcome to DEF CON Safe Mode - DC
Welcome to the Payment Village - PAYV
What college kids always get wrong, the art of attacking newbies to blueteam - RTV
What I Learned Trying To Hack A 737 - AEV
What if we had TLS for phone numbers? An introduction to SHAKEN/STIR - CPV
What the Shuck? Layered Hash Shucking (Rebroadcast) - PWDV
What the Shuck? Layered Hash Shucking - PWDV
What's up with proposed privacy legislation and how to influence the debate - BHV
When TLS Hacks You - DC
Whispers Among the Stars: Perpetrating (and Preventing) Satellite Eavesdropping Attacks - DC
Who needs spyware when you have COVID-19 apps? A look at global trends and what to do about it. - CPV
Who’s secure, who’s not, & who makes that choice - ASV
Whose Slide is It Anyway - CNE
wicked wardriving with gps and glonass - WLV
Wireless Blue Team - WLV
Wireless Village Fireside Talk - WLV
Wireshark for Incident Response & Threat Hunting (Beginner) - BTVW2
Wireshark for Incident Response & Threat Hunting - PHVW
Workshop: Let's Talk About Abusability Testing - CPV
Workshop: Let's Talk About Abusability Testing - CPV
Workshop: Let's Talk About Abusability Testing - CPV
Writing Wireshark Plugins for Security Analysis - PHVW
Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah? - RTV
Yacht PWNed - HTS
Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Time Replay Session Instantiation Attacks - RTV
You're Adversary Within - The Golden Age of Insider Threats - RTV
You're not the money printer, or why we need to separate coinbase rings - MOV
Your connected world isn't yours anymore! - Remote IoT attacks and data exfiltration. - IOT
Zebbler Encanti Experience - ENT
Zeek: An Introduction Into OpenSOC CTF Tools - BTVW1
Zero Trust - A Vision for Securing Cloud and Redefining Security - RTV

Village Talk List



AeroSpace Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #av-lounge-bar-text


PDT Times Title speaker
Friday
08:00 - 08:25 Hack-A-Sat Launch Party
08:30 - 15:59 Hack-a-Sat
08:00 - 19:59 A-ISAC CTF
09:00 - 15:59 Cal Poly Workshop - Simulated Satellite Communicat . . .
09:00 - 15:59 Deep Space Networking
09:00 - 15:59 Nyan Sat Workshop
09:00 - 15:59 Aviation Privacy Treasure Hunt Martin Strohmeier
09:00 - 15:59 Mission Alenium: Launching the Next Generation int . . . Henry Danielson
10:00 - 10:59 Opening Remarks: Getting The Aerospace Village To . . . Chris Krebs,Dr Will Roper . . .
10:00 - 13:30 Understanding Space Through a CyberSecurity Lens
11:00 - 11:59 MITM - The Mystery In The Middle. An Introduction . . . Matt Gaffney
12:00 - 12:30 Satellite Orbits 101 Matt Murray
12:30 - 12:59 GPS Spoofing 101 Harshad Sathaye
12:00 - 17:59 Bricks in the Air
12:00 - 17:59 CPX SimpleSat
12:00 - 17:59 DDSAT-1
13:00 - 13:59 Building Connections Across The Aviation Ecosystem Katie Noble,Al Burke,Jeff . . .
14:00 - 14:59 Experimental Aviation, Risks And Rewards Patrick Kiley
14:30 - 17:59 Understanding Space Through a CyberSecurity Lens
15:00 - 15:59 Talking To Satellites - 101 Eric Escobar
16:00 - 16:30 Hack-A-Sat Friday Recap
17:00 - 17:59 Exploiting Spacecraft Brandon Bailey
Saturday
08:30 - 08:59 Attacking Flight Management Systems: This Is Your . . . Javad Dadgar,Mohammad-Rez . . .
08:00 - 19:59 A-ISAC CTF
09:00 - 09:30 Hack-A-Sat Kickoff Segment
09:30 - 09:59 Aerospace Village Badge Rick Hansen
09:30 - 15:59 Hack-a-Sat
09:00 - 15:59 Bricks in the Air
09:00 - 15:59 Cal Poly Workshop - Simulated Satellite Communicat . . .
09:00 - 15:59 CPX SimpleSat
09:00 - 15:59 DDSAT-1
09:00 - 15:59 Deep Space Networking
09:00 - 15:59 Nyan Sat Workshop
09:00 - 12:30 Understanding Space Through a CyberSecurity Lens
09:00 - 15:59 Mission Alenium: Launching the Next Generation int . . . Henry Danielson
10:00 - 10:59 Hackers And ISACS Erin Miller,Jeff Troy,Ken . . .
11:00 - 11:30 A View From The Cockpit: Exploring Pilot Reactions . . . Matt Smith
11:30 - 11:59 Checklist For Aviation Vulnerability Disclosure: D . . . Jay Angus
12:00 - 12:59 Low-Cost VHF Receiver: Eavesdropping Pilot/Control . . . Allan Tart,Fabian Landis
13:00 - 13:30 Product Cybersecurity: Secure Airplane Development . . . Michael Vanguardia
13:30 - 13:59 Introduction To ACARS Alex Lomas
13:30 - 16:59 Understanding Space Through a CyberSecurity Lens
14:00 - 14:59 Ticketing To Takeoff: An Airport Hacking Choose Yo . . . Liz Wharton
15:00 - 15:30 ILS and TCAS Spoofing Demonstration Alex Lomas
15:30 - 15:59 A Deeper Dive Into ILS And ADS-B Spoofing Harshad Sathaye
16:00 - 16:30 Hack-A-Sat End Of Day Recap
17:00 - 17:59 General Aviation (GA) Electronic Flight Bags (EFB) David Robinson
Sunday
08:30 - 08:59 Hacking Airplane Air To Ground (A2G) Systems Ali Abdollahi
09:00 - 09:59 Hacking Aerospace Cybersecurity Regulation Harley Geiger,Kaylin Tryc . . .
09:00 - 13:59 Hack-a-Sat
09:00 - 13:59 Bricks in the Air
09:00 - 15:59 Cal Poly Workshop - Simulated Satellite Communicat . . .
09:00 - 13:59 CPX SimpleSat
09:00 - 13:59 DDSAT-1
09:00 - 15:59 Deep Space Networking
09:00 - 13:59 Nyan Sat Workshop
09:00 - 12:30 Understanding Space Through a CyberSecurity Lens
10:00 - 10:30 Trust And Truth In Space Situational Awareness James Pavur
10:30 - 10:59 747 Walkthrough From A Hacker's Perspective Alex Lomas,Ken Munro
11:00 - 11:59 Critical Aerospace Cybersecurity: How Hacking And . . . Lawrence Rowell,Nathalie . . .
12:00 - 12:59 Cybersecurity Lessons Learned From Human Spaceflig . . . Pam Melroy
13:00 - 13:30 Dissecting Wireless Privacy In Aviation Martin Strohmeier
13:30 - 13:59 Breakdown Of The FAA's Privacy ICAO Address Progra . . . Gui Michel
14:00 - 14:59 Hack-A-Sat Closing Segment
15:00 - 15:59 Cybersecurity Meets Aviation Regulation Aaron Cornelius,Tim Brom
16:00 - 16:59 What I Learned Trying To Hack A 737 Karl Koscher

Return to Index


Artificial Intelligence Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #aiv-general-text


PDT Times Title speaker
Friday
09:30 - 09:59 Opening Remarks AI Village Organizers
10:00 - 10:30 ML Security Evasion Competition 2020 drhyrum,zh4ck
10:30 - 10:59 Baby's First 100 MLSec Words erickgalinkin
11:00 - 12:30 Workshop 1
13:00 - 13:30 Hyperlocal Drift detection with Goko: Finding abus . . . comathematician
13:30 - 13:59 Spectrum: An End-to-End Framework for ML-based Thr . . . Nahid Farhady
14:00 - 14:50 Hacking with Skynet - How AI is Empowering Adversa . . . GTKlondike
15:00 - 15:59 Breakout Session
16:00 - 17:30 Workshop 2
Saturday
09:30 - 09:59 "SECRETS ARE LIES, SHARING IS CARING, PRIVACY IS T . . . Nahid Farhady
10:00 - 10:30 Misinformation & Covid lmeyerov
11:00 - 12:30 Workshop 3
13:00 - 13:59 Journal Club Live! Fawkes FR AI Village Journal Club
14:00 - 14:59 Does AI Live up to the Hype?
15:00 - 15:30 AI vs. Airplanes and IT-Security: What Security Re . . . Laurin Weissinger
16:00 - 17:30 Workshop 4
Sunday
09:00 - 09:30 Detecting hand-crafted social engineering emails w . . . Younghoo Lee,Joshua Saxe
10:00 - 10:59 Journal Club Live! Summoning Demons: The Pursuit o . . .
13:00 - 13:59 Faults in our Pi Stars: Security Issues and Challe . . . Vahid Behzadan
14:00 - 14:59 Ethics & Bias Panel
15:30 - 15:59 Closing Remarks

Return to Index


Applications Security Village
Friday: 09:00-18:00, Saturday: 09:00-17:00, Sunday: 09:00-15:00
Location: #asv-general-text


PDT Times Title speaker
Friday
10:00 - 10:59 Who’s secure, who’s not, & who makes that choi . . . Maddie Stone
11:00 - 11:45 2FA in 2020 and Beyond Kelley Robinson
11:00 - 12:59 Applying Pysa to Identify Python Security Vulnerab . . . Graham Bleaney
12:00 - 12:45 Android Bug Foraging João Morais,Pedro Umbeli . . .
13:00 - 13:45 Our journey into turning offsec mindset to develop . . . Paul Amar,Stanislas Molve . . .
15:00 - 15:45 API (in)Security TOP 10: Guided tour to the Wild W . . . David Sopas,Paulo Silva
16:00 - 16:45 Threat Modelling the Death Star Mário Areias
16:00 - 17:59 JWT Parkour Louis Nyffenegger
Saturday
09:00 - 09:59 Be Like Water: What Bruce Lee Can Teach Us About A . . . Fredrick "Flee" Lee
10:00 - 10:59 Web Shell Hunting - Part 1 Joe Schottman
10:00 - 10:45 10,000 Dependencies Under The Sea: Exploring and S . . . Gregg Horton,Ryan Slama
11:00 - 11:45 Hackium: a browser for web hackers Jarrod Overson
12:00 - 12:45 The DevOps & Agile Security Toolkit David Waldrop
12:00 - 13:59 Web Shell Hunting - Part 2 Joe Schottman
13:00 - 13:45 localghost: Escaping the Browser Sandbox Without 0 . . . Parsia Hakimian
15:00 - 15:45 Can't Touch This: Detecting Lateral Movement in Ze . . . Phillip Marlow
Sunday
09:00 - 09:45 Threagile - Agile Threat Modeling with Open-Source . . . Christian Schneider
10:00 - 11:59 Kubernetes Container Orchestration Security Assess . . . Ali Abdollahi
10:00 - 10:45 The Elephant in the Room: Burnout Chloé Messdaghi
11:00 - 11:45 A Heaven for Hackers: Breaking a Web Security Virt . . . Mehmet D. Ince
12:00 - 12:45 Secure Your Code — Injections and Logging Philipp Krenn
13:00 - 13:45 Running an appsec program with open source project . . . Vandana Verma Sehgal

Return to Index


Block Chain Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #bcv-general-text


PDT Times Title speaker
Friday
10:00 - 10:10 Welcome Note
10:10 - 10:59 Key Note - State of Blockchain Security Peter Kacherginsky
11:00 - 11:59 Verifiable Delay Functions for preventing DDoS Att . . . Gokul Alex,Tejaswa Rastog . . .
12:00 - 12:59 Security Focused Operating System Design Colin Cantrell
13:00 - 13:30 Cryptocurrencies have superusers? Mark Nesbitt
13:30 - 13:59 Double Spending in BSV, is it Possible? Poming Lee
14:00 - 14:59 Creating a decentralized storage for Kubernetes wi . . . Kevin Leffew
15:00 - 15:59 Attacking and Defending Blockchain Nodes Peter Kacherginsky
16:00 - 16:59 Panel Discussion
Saturday
10:00 - 10:10 Welcome Note
10:10 - 10:59 Twitter’s Tax Day Disaster: The Beginning (and E . . . Victor Fang
11:00 - 11:59 Decentralized Finance (DeFi) - ready for prime ti . . . Ryan Rubin
12:00 - 12:59 Securing the COSMOS: How to operate and secure a v . . . Ron Stoner
13:00 - 13:30 Blockchain for Cyber Defense: Will it be as good a . . . Seungjoo,Suhyeon Lee
13:30 - 13:59 Identifying and fixing out-of-gas errors in smart . . . Sebastian Banescu
14:00 - 14:59 Monetary Maximalism and Millennial Finance - Build . . . Kris Jones,Matt Luongo
15:00 - 15:59 7 Phases of Smart Contract Hacking Martin Abbatemarco
16:00 - 16:59 Panel Discussion
Sunday
10:00 - 10:10 Welcome Note
10:10 - 10:59 Modeling systematic threat: testing on mainnet for . . . Martinet Lee
11:00 - 11:59 Building a Microcontroller Bitcoin Address Generat . . . chaintuts,Josh McIntyre
12:00 - 12:40 exploit insecure crypto wallet Minzhi He,peiyu wang
12:40 - 12:59 Closing Note

Return to Index


Bio Hacking Village
Thursday: 0900 - 18:00,Friday: 10:00 - 18:00 , Saturday: 10:00 - 18:00 , Sunday: 10:00 - 15:00 (CTF closes at 1200 PT)
Location: #bhv-general-text


PDT Times Title speaker
Friday
09:30 - 10:45 DAY1 KEYNOTE: The Trust Talks Nina Alli,Vee Schmitt,Yus . . .
11:00 - 11:45 Fireside Chat with Dr. Amy Abernethy and Adama Ibr . . . Adama Ibrahim,Amy Abernet . . .
11:30 - 11:59 Porcupine: Rapid and robust tagging of physical ob . . . Katie Doroschak
12:00 - 12:59 Redefining patient safety in the digital era Dena Medelsohn,Jen Goldsa . . .
13:00 - 13:59 Russian Cyber Threats in The Pandemic Era Dr. Khatuna Mshvidobadze
14:00 - 14:30 Digital Health Technologies in the NIH All of Us R . . . Michelle Holko
14:30 - 15:30 Medical Device Vulnerability Disclosure Chloé Messdaghi,Eirick L . . .
15:30 - 15:59 Hacking the Insulin Supply Chain To Save Lives Anthony DiFranco
16:15 - 16:45 Cybersecurity informed consent for medical devices
16:45 - 17:45 INCLUDES NO DIRT: Threat Modeling for Healthcare
Saturday
10:00 - 10:45 DAY2 KEYNOTE: Understanding DIYBio and Community L . . . Yong-Bee
11:00 - 11:30 How COVID19 Changed Our Understanding of Cyber Dis . . . Christian “quaddi” Da . . .
12:00 - 12:30 Medical Technology: How do we unfuck things Veronica
12:30 - 13:30 Advancing Medical Device Security – How collabor . . . Mitchell Parker
14:00 - 14:30 MedICS Bryson Bort
14:45 - 15:15 Towards an Institutional Review Board for Biohacke . . . Dr. Sarah Blossom Ware
15:15 - 15:59 DIY Diabetics and a Million Boluses Dr. Mike Rushanan,Julian . . .
16:00 - 16:30 Chinese Military Labratory Mission + COVID-19 The Red Dragon
16:30 - 17:30 What's up with proposed privacy legislation and ho . . . Lucia Savage
Sunday
10:00 - 10:59 DAY3 KEYNOTE: Why is Security Hard? Seth Carmody
10:30 - 10:59 Infodemic: Threat models for patient communities o . . . Andrea Downing
11:00 - 11:59 How Independent Security Researchers work with Med . . . Kyle Erickson,Natali,Pete . . .
12:30 - 12:59 How to Grow a Brain in a Jar - Neuroengineering 10 . . . Jack
13:15 - 13:45 The Underestimated Threat Vector: Homogeneity Vidya Murthy
13:30 - 14:30 Making Next Generation Drugs at Home Mixæl Swan Laufer
14:00 - 14:30 Open Ventilator Remote Monitoring Project
14:45 - 16:45 Securing Your Medical Device Network on a Shoestri . . .

Return to Index


Blue Team Village Talks 1
Friday: 09:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 09:00 - 18:00
Location: #btv-general-text


PDT Times Title speaker
Thursday
09:00 - 09:59 Blue Team Village - Opening Ceremony
10:15 - 10:59 Graylog: An Introduction Into OpenSOC CTF Tools Lennart Koopmann
Friday
10:00 - 10:30 Quark Engine - An Obfuscation-Neglect Android Malw . . . JunWei Song,KunYu Chen
11:00 - 11:59 OuterHaven - The UEFI Memory Space Just Itching to . . . Connor Morley
12:30 - 12:59 No Question: Teamviewer, Police and Consequence (B . . . corvusactual
13:30 - 14:30 Building BLUESPAWN: An Open-Source, Active Defense . . . Jake Smith,Jack McDowell
15:00 - 15:30 Indicators of Emulation (Intermediate) Ch33r10
16:00 - 16:30 Detecting The Not-PowerShell Gang (Intermediate) Mangatas Tondang
17:00 - 17:59 Discovering ELK The First Time - Lessons Learned O . . . TheDrPinky
18:30 - 18:59 Fighting a Virus with a Spreadsheet (Beginner) Allen Baranov
19:30 - 20:30 Purple On My Mind: Cost Effective Automated Advers . . . Mauricio Velazco
Saturday
09:00 - 09:59 Reversing with Dynamic Data Resolver (DDR) – Bes . . . Holger Unterbrink
10:30 - 10:59 O365Squatting (Intermediate) Juan Francisco,Jose Migue . . .
11:30 - 11:59 Low Value Indicators For High Value Decisions (Int . . . Allan Stojanovic,Spencer . . .
12:30 - 13:30 Incident Response Panel Russell Mosley,Vyrus,Litm . . .
14:00 - 14:59 Blue Team Village & Red Team Village Panel Joseph Mlodzìanowskì (c . . .
15:30 - 16:30 Practical Advice on Threat Hunting Panel Plug,Roberto Rodriguez,To . . .
17:00 - 17:59 Introducing the Meet a Mentor Program Scoubi,Plug,Litmoose,Xavi . . .
Sunday
16:00 - 16:59 Blue Team Village Closing Ceremony

Return to Index


Blue Team Village Workshops 1
Friday: 09:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 09:00 - 18:00
Location: #btv-general-text


PDT Times Title speaker
Thursday
11:15 - 11:59 Kibana: An Introduction Into OpenSOC CTF Tools TimDotZero
12:15 - 12:59 OpenSOC CTF Tool Demo: Moloch
13:15 - 13:59 Osquery: An Introduction Into OpenSOC CTF Tools Whitney Champion
14:15 - 14:59 Velociraptor: An Introduction Into OpenSOC CTF Too . . . Mike Cohen
15:15 - 15:59 Zeek: An Introduction Into OpenSOC CTF Tools Aaron Soto,Amber Graner
16:15 - 16:59 Suricata: An Introduction Into OpenSOC CTF Tools Josh
17:15 - 17:59 OpenSOC CTF Tool Demo: Thinkst Canary
Friday
10:00 - 11:30 Cypher for Defenders: Leveraging Bloodhound Data B . . . Scoubi
13:30 - 14:59 Turning Telemetry and Artifacts Into Information ( . . . Omenscan
16:30 - 17:59 Open-Source Tools for Hunting and Practical Intell . . . Joe Slowik
Saturday
09:00 - 10:30 Leveraging the critical YARA skills for Blue Teame . . . David Bernal Michelena
12:00 - 13:30 Tracer FIRE 9 (Intermediate) Andrew Chu
15:30 - 16:15 Defending Your UNIX Hosts (Intermediate) Daniel Ward,Samuel Gaspar . . .
Sunday
09:00 - 10:30 Introduction to Malware Analysis & Response (MA&R) . . . Michael Wylie
12:00 - 13:30 Deploying Pi-hole: More Than an Ad Blocker (Beginn . . . Ben Hughes
15:00 - 15:45 Azure AD Logs for the Blue Team (Intermediate) Mark Morowczynski

Return to Index


Blue Team Village Workshops 2
Friday: 09:00 - 18:00, Saturday: 09:00 - 18:00, Sunday: 09:00 - 18:00
Location: #btv-general-text


PDT Times Title speaker
Friday
11:30 - 13:30 An Introduction to Hunting Adversaries Using the A . . . Ben Bornholm
15:00 - 16:30 Threat Hunting with the Elastic Stack (Beginner) Ben Hughes
18:00 - 19:30 Data Analysis for Detection Research Through Jupyt . . . Roberto Rodriguez,Jose Ro . . .
Saturday
10:30 - 11:59 Wireshark for Incident Response & Threat Hunting ( . . . Michael Wylie
13:30 - 15:30 An Introduction to Hunting Adversaries Using the A . . . Ben Bornholm
16:30 - 17:59 A N00b's Intro to Building Your Own Lab (Beginner) Omar Santos
Sunday
10:30 - 11:59 Incident Response and the ATT&CK Matrix (Beginner) Sam Bowne
13:30 - 14:59 Cloud Security Monitoring on a Dime Store Budget ( . . . Wes Lambert

Return to Index


Car Hacking Village
Friday: 10:00-17:00, Saturday: 10:00-17:00, Sunday: 10:00-12:00
Location: #chv-welcome-text


PDT Times Title speaker
Friday
10:00 - 10:59 Adding new features by manipulating CAN bus Teejay
10:00 - 10:50 Automotive In-Vehicle Networks Kamel Ghali
11:00 - 11:59 PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS Ben Gardiner,Chris Poore
11:00 - 11:50 OBD and what we CAN do with it Infenet
12:00 - 12:59 Before J1939: A J1708/J1587 Protocol Decoder Thomas Hayes,Dan Salloum
12:00 - 12:50 Fundamentals of Diagnostic Requests over CAN Bus Robert Leale (CarFuCar)
13:00 - 13:50 Cluster fuzz! Mintynet
14:00 - 14:59 Realistic Trends in Vulnerability based on Hacking . . . Ryosuke Uematsu,Shogo Nak . . .
14:00 - 14:50 Bluetooth Security in Automotive Kamel Ghali
15:00 - 15:59 CAN be super secure: Bit Smashing FTW Brent Stone
15:00 - 15:50 Automotive Ethernet for the rest of us Infenet
16:00 - 16:59 Misbehavior Detection for V2X communication Jaime
16:00 - 16:50 Car (to Cloud) Talk: Using MQTT for Car Hacking Jaime
Saturday
10:00 - 10:59 Hacking TESLA Model 3 - NFC Relay Revisited Huajiang "Kevin2600" Chen . . .
10:00 - 10:50 Automotive In-Vehicle Networks Kamel Ghali
11:00 - 11:50 OBD and what we CAN do with it Infenet
12:00 - 12:59 Houston, we CAV a problem Vic Harkness
12:00 - 12:50 Fundamentals of Diagnostic Requests over CAN Bus Robert Leale (CarFuCar)
13:00 - 13:59 CMAP: Open Source Vehicle Services Mapping Tool fo . . . Robert Leale (CarFuCar)
13:00 - 13:50 Cluster fuzz! Mintynet
14:00 - 14:59 All Aboard the CAN Bus… or Motorcycle Derrick (CanBusDutch)
14:00 - 14:50 Bluetooth Security in Automotive Kamel Ghali
15:00 - 15:59 From Blackbox to Automotive Ransomware Nils Weiss,Enrico Pozzobo . . .
15:00 - 15:50 Automotive Ethernet for the rest of us Infenet
16:00 - 16:59 ChupaCarBrah: Open Source Hardware and Software fo . . . Marcelo Sacchetin
16:00 - 16:50 Car (to Cloud) Talk: Using MQTT for Car Hacking Jaime
Sunday
10:00 - 10:59 Hacking Ludicrous Mode on a Tesla (moar powerr!) Patrick Kiley

Return to Index


Cloud Village
Friday: 10:00-16:30, Saturday: 10:00-17:30, Sunday: 10:00-14:00
Location: #cloudv-general-text


PDT Times Title speaker
Friday
06:00 - 12:30 Cloud Village CTF
11:00 - 11:20 Opening Keynote
11:20 - 12:05 IAM Concerned: OAuth Token Hijacking in Google Clo . . . Jenko Hwong
12:05 - 12:50 Ransom in the Cloud Spencer Gietzen
12:50 - 13:25 Static analysis of Infrastructure as code: Terrafo . . . Barak Schoster
13:25 - 14:10 Can't Touch This: Detecting Lateral Movement in Ze . . . Phillip Marlow
14:10 - 16:30 Peeling Back the Layers and Peering Through the Cl . . . Wes Lambert
Saturday
11:00 - 11:45 Least privilege using infrastructure as code Nimrod Kor
11:45 - 12:30 How Blue Penetrates You Dani Goland,Mohsan Farid
12:30 - 13:15 21 Jump Server: Going Bastionless in the Cloud Colin Estep
13:15 - 13:59 Cloud Frontier Setu Parimi
14:00 - 14:45 Attacking the Helmsman Mohit Gupta
14:45 - 15:30 SaaSpocalypse - The Complexity and Power of AWS Cr . . . Alexandre Sieira
15:30 - 17:30 Discovering Cloud File Storage Artifacts Michael Wylie
Sunday
11:00 - 11:45 Cloud host base strategy by staging defensive tool . . . Michael Mimo
11:45 - 12:30 Remediation Framework - Auto respond to AWS nightm . . . Sahir Khan,Justin Paglier . . .
12:30 - 13:30 Cloud-Native Attack Detection and Simulation. Nick Jones
13:30 - 13:50 Closing Note

Return to Index


Contests and Events
Each Contest or Event has a Discord Channel. Check the DC28 CNE page for more info.


PDT Times Title speaker
Thursday
09:00 - 17:59 Darknet Contest
Friday
06:00 - 15:59 SEATF: Maritime Hacking CTF
09:00 - 17:59 AppSec Village CtF
09:00 - 17:59 Be the Match - registration drive
09:00 - 17:59 Bio-Hacking - Hospital Under Siege
09:00 - 17:59 Capture The Packet (CTP)
09:00 - 17:59 Car Hacking Village CTF
09:00 - 17:59 CMD+CTRL CyberRange
09:00 - 17:59 Crack Me If You Can (CMIYC)
09:00 - 17:59 Darknet Contest
09:00 - 17:59 (Before Con) Creative Writing Short Story Contest
09:00 - 17:59 Coindroids
09:00 - 17:59 The Gold Bug – Crypto and Privacy Village Puzzle
09:00 - 17:59 Hackfortress
09:00 - 17:59 H@cker Runw@y
09:00 - 17:59 HomebrewHardware Contest
09:00 - 17:59 ICS Hack the Plan[e]t
09:00 - 17:59 Defcon Ham Radio Fox Hunting Contest
09:00 - 17:59 Online MUD - EvilMog
09:00 - 17:59 The Schemaverse Championship
09:00 - 23:59 TeleChallenge
09:00 - 23:59 ULTIMATE Secure Coding Throwdown (Secure Code Warr . . .
09:00 - 17:59 Wireless Capture the Flag
09:00 - 17:59 lo57 Mystery Challenge
09:00 - 17:59 OSINTSECCryptoAIBlockchain
09:00 - 17:59 Social Engineer SECTF4Teens
10:00 - 19:59 DEF CON Scavenger Hunt
10:00 - 23:59 OpenSOC Blue Team CTF - General Round
17:00 - 18:59 EFF Tech Trivia Pub Quiz
18:00 - 19:59 War Story Bunker
18:00 - 19:59 Hacker Jeopardy
Saturday
00:00 - 23:59 TeleChallenge
00:00 - 23:59 ULTIMATE Secure Coding Throwdown (Secure Code Warr . . .
06:00 - 15:59 SEATF: Maritime Hacking CTF
09:00 - 17:59 AppSec Village CtF
09:00 - 17:59 Be the Match - registration drive
09:00 - 17:59 Bio-Hacking - Hospital Under Siege
09:00 - 17:59 Capture The Packet (CTP)
09:00 - 17:59 Car Hacking Village CTF
09:00 - 17:59 CMD+CTRL CyberRange
09:00 - 17:59 Crack Me If You Can (CMIYC)
09:00 - 17:59 Darknet Contest
09:00 - 17:59 (Before Con) Creative Writing Short Story Contest
09:00 - 17:59 Coindroids
09:00 - 17:59 The Gold Bug – Crypto and Privacy Village Puzzle
09:00 - 17:59 Hackfortress
09:00 - 17:59 H@cker Runw@y
09:00 - 17:59 HomebrewHardware Contest
09:00 - 17:59 ICS Hack the Plan[e]t
09:00 - 17:59 Defcon Ham Radio Fox Hunting Contest
09:00 - 17:59 Online MUD - EvilMog
09:00 - 17:59 The Schemaverse Championship
09:00 - 17:59 Wireless Capture the Flag
09:00 - 17:59 lo57 Mystery Challenge
09:00 - 17:59 OSINTSECCryptoAIBlockchain
09:00 - 17:59 Social Engineer SECTF4Teens
10:00 - 19:59 DEF CON Scavenger Hunt
10:00 - 13:59 SOHOpelessly Broken CTF
13:00 - 14:30 Film Festival: Project Immerse: A Deepfake Paranoi . . .
18:00 - 19:59 No Tech Talks
18:00 - 19:59 Hacker Jeopardy
18:30 - 19:59 Film Festival: Project Immerse: A Deepfake Paranoi . . .
20:00 - 21:59 Whose Slide is It Anyway
Sunday
00:00 - 11:59 TeleChallenge
00:00 - 15:59 ULTIMATE Secure Coding Throwdown (Secure Code Warr . . .
00:00 - 15:59 lo57 Mystery Challenge
00:00 - 15:59 OSINTSECCryptoAIBlockchain
00:00 - 15:59 Social Engineer SECTF4Teens
06:00 - 15:59 SEATF: Maritime Hacking CTF
09:00 - 17:59 AppSec Village CtF
09:00 - 17:59 Be the Match - registration drive
09:00 - 17:59 Bio-Hacking - Hospital Under Siege
09:00 - 17:59 Capture The Packet (CTP)
09:00 - 17:59 Car Hacking Village CTF
09:00 - 17:59 CMD+CTRL CyberRange
09:00 - 17:59 Crack Me If You Can (CMIYC)
09:00 - 11:59 Darknet Contest
09:00 - 17:59 (Before Con) Creative Writing Short Story Contest
09:00 - 17:59 Coindroids
09:00 - 17:59 The Gold Bug – Crypto and Privacy Village Puzzle
09:00 - 17:59 Hackfortress
09:00 - 17:59 H@cker Runw@y
09:00 - 17:59 HomebrewHardware Contest
09:00 - 17:59 ICS Hack the Plan[e]t
09:00 - 17:59 Defcon Ham Radio Fox Hunting Contest
09:00 - 11:59 OpenSOC Blue Team CTF - Finals Round
09:00 - 17:59 Online MUD - EvilMog
09:00 - 17:59 The Schemaverse Championship
09:00 - 17:59 Wireless Capture the Flag
10:00 - 11:59 DEF CON Scavenger Hunt
10:00 - 13:59 SOHOpelessly Broken CTF

Return to Index


Crypto & Privacy Village
Friday: 10:00 - 18:00 , Saturday: 10:00 - 18:00 , Sunday: 10:30 - 13:00
Location: #cpv-general-text


PDT Times Title speaker
Friday
10:00 - 10:59 STARTTLS is Dangerous Hanno Böck
11:00 - 11:59 LadderLeak: Breaking ECDSA With Less Than One Bit . . . Akira Takahashi,F. Novae . . .
12:00 - 12:59 The Norwegian Blue: A lesson in Privacy Engineerin . . . Eivind Arvesen
13:00 - 13:59 Dos, Donts and How-Tos of crypto building blocks u . . . Mansi Sheth
14:00 - 14:59 How to store sensitive information in 2020? Mansi Sheth
15:00 - 15:59 Workshop: Let's Talk About Abusability Testing Avi Zajac,Franchesca Spek . . .
16:00 - 16:59 DNS Privacy Matt Cheung
17:00 - 17:59 Fireside Chat: All about Section 230, the EARN IT . . . Cathy Gellis,Riana Pfeffe . . .
Saturday
10:00 - 10:59 Quantum Computers & Cryptography I. Shaheem
11:00 - 11:30 Online Ads as a Recon and Surveillance Tool Neil M
11:30 - 11:59 Who needs spyware when you have COVID-19 apps? A l . . . C. Nadal,J. DeBlois,M. . . .
12:00 - 12:59 Differential Privacy..more important than ever in . . . Aditi Joshi
13:00 - 13:59 Rights You Can’t Exercise Can’t Protect You: P . . . Ben Brook,Maritza Johnson . . .
14:00 - 14:59 Hacking like Paris Hilton 14 years later - and sti . . . Per Thorsheim
15:00 - 15:59 Online Voting: Theory and Practice Emily Stamm,Porter Adams
16:00 - 16:59 Next level stalker ware Cecilie Wian
17:00 - 17:59 Workshop: Let's Talk About Abusability Testing Avi Zajac,Franchesca Spek . . .
Sunday
10:30 - 10:59 European regulatory trends for Artificial Intellig . . . Julia Reinhardt
11:00 - 11:30 Fear, Uncertainty, and Doubt about Human Microchip . . . Zhanna Malekos Smith
11:30 - 11:59 What if we had TLS for phone numbers? An introduct . . . Kelley Robinson
12:00 - 12:59 Workshop: Let's Talk About Abusability Testing Avi Zajac,Franchesca Spek . . .
13:00 - 13:30 File Encryption For Actual Humans David Kane-Parry

Return to Index


Career Hacking Village
Friday: 1000 - 1800, Saturday: 1000 - 1800
Location: #cahv-general-text


PDT Times Title speaker
Friday
10:00 - 10:59 From Barista to Cyber Security Pro, Breaking the E . . . Alyssa Miller
11:00 - 11:59 But I Still Need A Job! Kirsten Renner
12:00 - 12:59 Hacking Security Leadership Pete Keenan
13:00 - 13:59 Key Ingredients for the Job Interviews (Virtual or . . . Roy Wattanasin
14:00 - 14:59 Pwning Your Resume Kris Rides
15:00 - 15:59 In theory, there is no difference between theory a . . . Pablo Breuer
16:00 - 16:59 Building Teams in the New Normal Mike Murray
17:00 - 17:59 Future Proofing Your Career Jenai Marinkovic
Saturday
10:00 - 10:59 Cons and Careers Steven Bernstein
11:00 - 11:59 The Individual Contributor to Tech Executive, or T . . . Amelie Koran
12:00 - 12:59 Entrepeneurial Adventures: What It Takes to Start . . . Bryson Bort
13:00 - 13:59 National Service Panel: Career Opportunities Suppo . . . John Felker,Diane Janosek . . .
14:00 - 14:59 Veteran Transition Tips Bob Wheeler
15:00 - 15:59 Drinks with Recruiters Kris Rides,Rachel Bozeman . . .

Return to Index


DEFCON Talk Tracks
Location: #track-1-live
Location: #track-1-live-qa


PDT Times Title speaker
Thursday
09:30 - 09:59 Discovering Hidden Properties to Attack Node.js ec . . . Feng Xiao
10:30 - 10:59 Room for Escape: Scribbling Outside the Lines of T . . . Alvaro Munoz,Oleksandr Mi . . .
11:30 - 11:59 DNSSECTION: A practical attack on DNSSEC Zone Walk . . . Hadrien Barral,Rémi Gér . . .
12:30 - 12:59 Hacking the Hybrid Cloud Sean Metcalf
13:30 - 13:59 Hacking traffic lights Rik van Duijn,Wesley Neel . . .
14:30 - 14:59 Hacking the Supply Chain – The Ripple20 Vulnerab . . . Ariel Schön,Moshe Kol,Sh . . .
15:30 - 15:59 Demystifying Modern Windows Rootkits Bill Demirkapi
16:30 - 16:59 Domain Fronting is Dead, Long Live Domain Fronting . . . Erik Hunstad
Friday
09:30 - 09:59 Welcome to DEF CON Safe Mode The Dark Tangent
10:30 - 10:59 Spectra—New Wireless Escalation Targets Francesco Gringoli,Jiska . . .
11:30 - 11:59 Pwn2Own Qualcomm compute DSP for fun and profit Slava Makkaveev
12:30 - 12:59 Detecting Fake 4G Base Stations in Real Time Cooper Quintin
13:30 - 13:59 When TLS Hacks You Joshua Maddux
14:30 - 14:59 Finding and Exploiting Bugs in Multiplayer Game En . . . Jack Baker
15:30 - 15:59 Don't Be Silly - It's Only a Lightbulb Eyal Itkin
16:30 - 16:59 Exploiting Key Space Vulnerabilities in the Physic . . . Bill Graydon
17:30 - 17:59 A Hacker’s guide to reducing side-channel attack . . . Elie Bursztein
18:30 - 18:59 Office Drama on macOS Patrick Wardle
Saturday
09:30 - 09:59 A Decade After Stuxnet's Printer Vulnerability: Pr . . . Peleg Hadar,Tomer Bar
10:30 - 10:59 Whispers Among the Stars: Perpetrating (and Preven . . . James Pavur
11:30 - 11:59 Don't Ruck Us Again - The Exploit Returns Gal Zror
12:30 - 12:59 Applied Ca$h Eviction through ATM Exploitation Brenda So,Trey Keown
13:30 - 13:59 How we recovered $XXX,000 in Bitcoin from an encry . . . Michael Stay
14:30 - 14:59 Abusing P2P to Hack 3 Million Cameras: Ain't Nobod . . . Paul Marrapese
15:30 - 15:59 Bypassing Biometric Systems with 3D Printing and E . . . Yamila Levalle
16:30 - 16:59 Reverse Engineering the Tesla Battery Management S . . . Patrick Kiley
17:30 - 17:59 Getting Shells on z/OS with Surrogat Chains Jake Labelle
20:00 - 21:59 Movie Stream - Lost World
Sunday
09:30 - 09:59 Evil Printer: How to Hack Windows Machines with Pr . . . Chuanda Ding,Zhipeng Huo
10:30 - 10:59 Bytes In Disguise Jesse Michael,Mickey Shka . . .
11:30 - 11:59 Only takes a Spark - Popping a shell on a 1000 nod . . . ayoul3
14:30 - 14:59 Beyond Root: Custom Firmware for Embedded Mobile C . . . Christopher Wade
15:30 - 15:59 Practical VoIP/UC Hacking Using Mr.SIP: SIP-Based . . . Ismail Melih Tas,Kubilay . . .
16:30 - 16:59 Lateral Movement and Privilege Escalation in GCP; . . . Allison Donovan,Dylan Ayr . . .
17:00 - 17:59 Closing Ceremonies The Dark Tangent

Return to Index


DEFCON Groups
Location: #dcg-stage-voice


PDT Times Title speaker
Saturday
10:00 - 10:59 OWASP API Top 10
11:00 - 11:59 Government Espionage on a School Lunch Budget
12:00 - 12:59 Basic OSINT: Mining Personal Data
13:00 - 13:15 Intro to DC858
13:15 - 13:59 Saving Yourself from Microsoft: It's by design
14:00 - 14:59 Understanding the Threat: Malicious Software, Mali . . .
15:00 - 15:15 Intro to DC603
15:15 - 15:59 DNS New World Order, version 1.4: QuadX! DoH! DoT! . . .
17:00 - 17:59 Introducing Melbourne DCG by Allen and Friends
Sunday
15:00 - 15:59 DEF CON Groups Panel Brent White / B1TK1LL3R,C . . .

Return to Index


DEFCON Demo Labs
Each DemoLab has a Discord Channel. Check the DC28 DemoLabs page for more info.


PDT Times Title speaker
Friday
10:00 - 11:50 Carnivore (Microsoft External Attack Tool) Chris Nevin
10:00 - 11:50 CIRCO v2: Cisco Implant Raspberry Controlled Opera . . . Emilio Couto
12:00 - 13:50 PyRDP: Remote Desktop Protocol Monster-in-the-Midd . . . Olivier Bilodeau
12:00 - 13:50 Mobile Security Framework - MobSF Ajin Abraham
14:00 - 15:50 jeopardize Utku Sen
16:00 - 17:55 redlure Matthew Creel
Saturday
10:00 - 11:50 jeopardize Utku Sen
10:00 - 11:50 Starkiller Vincent “Vinnybod” Ro . . .
12:00 - 13:50 Phirautee Viral Maniar
14:00 - 15:50 PyRDP: Remote Desktop Protocol Monster-in-the-Midd . . . Olivier Bilodeau,Alexandr . . .
16:00 - 17:55 CIRCO v2: Cisco Implant Raspberry Controlled Opera . . . Emilio Couto
16:00 - 17:55 Cotopaxi: IoT Protocols Security Testing Toolkit Jakub Botwicz
Sunday
10:00 - 11:50 redlure Matthew Creel
10:00 - 11:50 MalConfScan with Cuckoo Tomoaki Tani,Shusei Tomon . . .
12:00 - 13:50 Carnivore (Microsoft External Attack Tool) Chris Nevin
12:00 - 13:50 Starkiller

Return to Index


Entertainment
Check the DC28 Entertainment page for more info.


PDT Times Title speaker
Friday
18:00 - 18:59 Terrestrial Access Network
19:00 - 19:59 Acid T
20:00 - 20:59 Icetre Normal
21:00 - 21:59 Zebbler Encanti Experience
22:00 - 22:59 Ninjula
23:00 - 23:59 Shadowvex
Saturday
18:00 - 18:59 tense future
19:00 - 19:59 Mica Husky
20:00 - 20:59 Dj St3rling
21:00 - 21:59 Skittish & Bus
22:00 - 22:59 Miss Jackalope
23:00 - 23:59 Subxian

Return to Index


Ethics Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #ev-general-text


PDT Times Title speaker
Friday
10:00 - 10:59 Federal Communications Commission Comm. Geoffrey Starks
12:00 - 12:59 U.S. Privacy and Civil Liberties Oversight Board M . . . Travis LeBlanc
14:00 - 14:59 Models of Privacy Norms R. Jason Cronk,Ece Gumuse . . .
16:00 - 16:59 Security of Election Systems: A contract case stud . . . Rim Boujnah
Saturday
10:00 - 10:59 Killer Robots Reconsidered Diane Vavrichek,Larry Lew . . .
12:00 - 14:10 Vote @ Home Workshop Andrea Matwyshyn
14:10 - 15:20 Federal Trade Commision Comm. Rohit Chopra
15:20 - 16:30 Food and Drug Administration Jessica Wilkerson
16:30 - 17:40 TechCongress Leisel Bogan
Sunday
10:00 - 10:59 Blackmail, Extortion and the Ethics of Disclosure Michael Antonino
12:00 - 12:59 How to Start a Movement: Hackers Edition Chloé Messdaghi
14:00 - 14:59 Open Live Chat for all Speakers or another talk on . . . Ethics Village Staff

Return to Index


Fireside Lounge
Location: #fireside_lounge-voice


PDT Times Title speaker
Friday
20:00 - 20:59 D0 N0 H4RM: A Healthcare Security Conversation Ash Luft,Christian “qua . . .
21:00 - 21:59 Shrek, Juggs, and Toxic Trolls: a BADASS discussio . . . Katelyn Bowden,Rachel Lam . . .
Saturday
19:00 - 19:59 Ask the EFF/Meet the EFA Abi Hassen,Alexis Hancock . . .

Return to Index


Hardware Hacking Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #hhv-infobooth-text


PDT Times Title speaker
Friday
09:30 - 09:59 Meetup: Some HHV Challenges rehr
10:00 - 10:30 Learn to Solder the BadgeBuddy Kit Joseph Long (hwbxr)
11:00 - 11:59 Hardware hacking 101: There is plenty of room at t . . . Federico Lucifredi
12:30 - 12:59 onkeypress=hack(); Farith Pérez Sáez,Luis . . .
13:30 - 14:30 HackerBox 0057 Build Session Joseph Long (hwbxr)
14:30 - 14:59 Meetup: PCB Proto and Rework ShortTie
15:30 - 15:59 Meetup: Legacy Hardware ShortTie
17:30 - 17:59 Meetup: Some HHV Challenges rehr
18:00 - 18:59 Meetup: 3H: Hardware Happy Hour Chris Gammell
Saturday
08:30 - 08:59 Learn to Solder the BadgeBuddy Kit Joseph Long (hwbxr)
09:30 - 09:59 Hardware hacking 101: There is plenty of room at t . . . Federico Lucifredi
11:00 - 11:30 onkeypress=hack(); Farith Pérez Sáez,Luis . . .
12:00 - 12:30 Learn to Solder the BadgeBuddy Kit Joseph Long (hwbxr)
13:00 - 13:30 Meetup: Some HHV Challenges rehr
14:00 - 14:30 Meetup: Sourcing Parts bombnav
15:00 - 15:30 Meetup: OSS ASIC Josh Marks
16:00 - 16:30 Meetup: Certification Processes (UL, FCC, etc.) ShortTie
Sunday
09:00 - 09:30 Learn to Solder the BadgeBuddy Kit Joseph Long (hwbxr)
10:00 - 10:30 Meetup: Sourcing Parts bombnav
11:30 - 12:30 HackerBox 0057 Build Session Joseph Long (hwbxr)
12:30 - 12:59 Meetup: Wearables ShortTie
13:00 - 13:59 Importing vector graphics in to EagleCAD
14:00 - 14:30 Learn to Solder the BadgeBuddy Kit Joseph Long (hwbxr)

Return to Index


Ham Radio Village
Village: Friday: 10:00 - 16:00, Saturday: 10:00 - 16:00, Sunday: 10:00 - 14:00
Exams: Friday: 11:00 to 17:00, Saturday: 14:00 to 17:00, Sunday: 15:00 to 17:00


PDT Times Title speaker
Friday
10:00 - 10:15 Village Opening Remarks
11:00 - 13:59 Ham Radio USA License Exams (Friday)
11:00 - 11:59 Talking to Satellites
13:00 - 13:30 A Basic Ham Station Setup
14:00 - 14:59 So You Got an SDR: Common Signals and the Wiki
Saturday
10:00 - 10:59 Single Board Computers in Amateur Radio
11:30 - 12:30 Discussion: What makes a good ham radio operator?
13:30 - 13:59 Practice 'Net' via Discord
14:00 - 16:59 Ham Radio USA License Exams (Saturday)
15:00 - 15:30 OSTWERK Initiative
Sunday
10:00 - 11:30 The K0BAK Rover Van
13:00 - 13:30 APRS: Automatic Packet Reporting System Demo
14:30 - 14:45 Village Closing Commentary
15:00 - 17:59 Ham Radio USA License Exams (Sunday)

Return to Index


Hack the Sea Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #htsv-general-text


PDT Times Title speaker
Thursday
13:00 - 13:59 Dockside with the US Coast Guard
Friday
10:00 - 10:30 Yacht PWNed Stephen Gerling
12:00 - 12:59 Build a Raspberry AIS Dr. Gary Kessler
14:00 - 14:59 40,000 Leagues UUV Death Match Dr. Nina Kollars
Saturday
10:00 - 10:59 Speed 2: The Poseidon Adventure – When Cruise Sh . . . Andrew Tierney
11:00 - 11:59 Hack the SeaPod Grant Romundt
Sunday
11:00 - 11:59 Hack the SeaPod Fathom5

Return to Index


Industrial Control Systems Village
Friday: 09:00-18:00, Saturday: 09:00-18:00, Sunday: 09:00-12:00
Location: #ics-general-text


PDT Times Title speaker
Friday
09:00 - 09:59 Keynote Chris Krebs
10:15 - 10:45 ICS Village CTF Kick-Off Tom
11:00 - 11:30 Mission Kill: Process Targeting in ICS Attacks Joe Slowik
11:45 - 12:15 Vulnerability Discovery - Tips for Surviving and T . . . Dor Yardeni,Mike Lemley
12:30 - 13:30 On the insecure nature of turbine control systems . . . Alexander Korotin,Radu Mo . . .
13:45 - 14:45 The Journey of ICS Project Files - Visibility and . . . Nadav Erez
15:00 - 15:30 5 Quick Wins for Improving your ICS Cybersecurity . . . Austin Scott
15:45 - 16:45 PowerLine Truck Hacking: 2TOOLS4PLC4TRUCKS Ben Gardiner
Saturday
09:00 - 09:30 ICS SecOps: Active Defense Concept with Effective . . .
09:45 - 10:45 Confessions of an Offensive ICS Cyber Security Res . . . Marina Krotofil
11:00 - 11:59 Playing with Electricity: Hacking into Distributio . . . Can Demirel,Serkan Temel
12:15 - 13:15 Vivisecting PowerPC ac0rn,atlas 0f d00m
13:30 - 13:59 MITRE ICS ATT&CK Marie,Otis
14:15 - 15:15 Building a Physical Testbed for Blackstart Restora . . . Tim Yardley
15:30 - 16:30 Operationalizing Cyber Norms: Critical Infrastruct . . . Chris Kubecka
16:45 - 17:15 Industrial Cybersecurity in Mexico Octavio Fernandez,Victor . . .

Return to Index


Internet of Things Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-12:30
Location: #iotv-general-text


PDT Times Title speaker
Friday
09:15 - 09:45 How to get rights for hackers Chloé Messdaghi
10:00 - 10:30 IoT Hacking Stories in Real Life Besim Altinok
10:45 - 11:45 Getting Started – Building an IoT Hardware Hacki . . .
12:15 - 12:59 Exploring vulnerabilities in Smart Sex Toys, the e . . . Denise Giusto Bilic
13:15 - 13:59 IoT Under the Microscope: Vulnerability Trends in . . . Parker Wiksell
14:15 - 14:59 Hella Booters: Why IoT Botnets Aren't Going Anywhe . . . Netspooky
15:15 - 16:15 NAND Flash – Recovering File Systems from Extrac . . .
16:45 - 17:30 Assembling VULNtron: 4 CVEs that Turn a Teleconfer . . . Mark Bereza
17:45 - 18:15 Pandemic In Plaintext Troy Brown
18:30 - 19:15 The Joy of Coordinating Vulnerability Disclosure Daniel Gruss,CRob,Lisa Br . . .
Saturday
09:00 - 09:45 Hacking smart-devices for fun and profit: From exp . . . Barak Sternberg
10:00 - 10:45 Your connected world isn't yours anymore! - Remote . . . Dewank Pant,Shruti Lohani
11:00 - 11:59 Introduction to U-Boot Interaction and Hacking Garrett Enoch
12:30 - 13:15 Kicking Devices and Taking CVEs : The Zoomer’s G . . . Sanjana Sarda
13:45 - 14:15 In search of the perfect UPnP tool Trevor Stevado t1v0
14:30 - 15:20 The future of IoT Security “Baselines,” Standa . . . Amit Elazari,Anahit Tarkh . . .
15:30 - 16:30 Learning to Use Logic Analyzers Jonathan Stines
17:00 - 17:45 IoT Honeypots and taming Rogue appliances Kat Fitzgerald
18:00 - 18:45 Stepped on a Nail Matthew Byrdwell

Return to Index


Lock Bypass Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #lbv-social-text


PDT Times Title speaker
Friday
10:00 - 11:30 Bypass 101 + Q&A
11:30 - 12:59 DIY Bypass Tool Workshop + Q&A
13:00 - 14:59 General Q&A / Drop-in and Chat
15:00 - 16:30 Alarm Bypass + Q&A
16:30 - 16:59 General Q&A / Drop-in and Chat
Saturday
11:00 - 12:30 Bypass 101 + Q&A
12:30 - 13:59 Alarm Bypass + Q&A
14:00 - 15:30 Reconnaissance + Q&A
15:30 - 16:59 Bypass 101 + Q&A
Sunday
11:00 - 12:30 Bypass 101 + Q&A
14:00 - 15:30 DIY Bypass Tool Workshop + Q&A
15:30 - 16:59 General Q&A / Drop-in and Chat

Return to Index


Lock Pick Village
Friday: 09:00-18:00, Saturday: 09:00-18:00, Sunday: 09:00-17:00
Location: #lpv-general-text


PDT Times Title speaker
Friday
10:00 - 10:30 Intro to Lockpicking The Open Orginisation Of . . .
11:00 - 11:50 Key Duplication - It's not just for the movies! Tony Virelli
12:00 - 12:30 Intro to Lockpicking The Open Orginisation Of . . .
13:00 - 13:30 Hybrid PhySec tools - best of both worlds or just . . . d1dymu5
14:15 - 14:45 Intro to Lockpicking The Open Orginisation Of . . .
15:00 - 15:30 Doors, Cameras, and Mantraps OH MY! Dylan The Magician
16:15 - 16:45 Intro to Lockpicking The Open Orginisation Of . . .
Saturday
10:00 - 10:30 Intro to Lockpicking The Open Orginisation Of . . .
10:45 - 11:45 High Security Wafer Locks - An Oxymoron? zeefeene
12:00 - 12:30 Intro to Lockpicking The Open Orginisation Of . . .
13:00 - 13:45 Law School for Lockpickers Preston Thomas
14:15 - 14:45 Intro to Lockpicking The Open Orginisation Of . . .
15:00 - 15:59 Bobby Pins, More Effective Than Lockpicks? John the Greek
16:15 - 16:45 Intro to Lockpicking The Open Orginisation Of . . .
17:00 - 17:59 Intro to high security locks and lockpicking N∅thing
Sunday
10:00 - 10:30 Intro to Lockpicking The Open Orginisation Of . . .
11:00 - 11:50 Safecracking for Everyone! Jared Dygert
12:00 - 12:30 Intro to Lockpicking The Open Orginisation Of . . .
13:00 - 13:30 Keystone to the Kingdom Austin Marck
14:15 - 14:45 Intro to Lockpicking The Open Orginisation Of . . .
15:00 - 15:59 How I defeated the Western Electric 30c N∅thing
16:15 - 16:45 Intro to Lockpicking The Open Orginisation Of . . .

Return to Index


Monero Village
Thursday: 09:00-18:00,Friday: 09:00-18:00, Saturday: 09:00-18:00, Sunday: 09:00-17:00
Location: #mv-general-text


PDT Times Title speaker
Friday
09:50 - 09:59 Welcome Speech rehr
10:00 - 11:30 Keynote: Monero: Sound Money Safe Mode Dr. Daniel Kim
12:00 - 12:30 Proposed Mitigation Measures to Address a Disrupti . . . Dr. Francisco "ArticMine" . . .
13:00 - 13:59 This year's village badge Michael Schloh von Bennew . . .
14:30 - 15:30 Getting started with the Intervillage badge Michael Schloh von Bennew . . .
15:30 - 15:59 Monero Wallet Basics: Sending, Receiving, Proving rehr
16:00 - 16:59 Meme Competition
Saturday
10:00 - 11:30 Keynote: Monero: Sound Money Safe Mode Dr. Daniel Kim
12:00 - 12:59 Open Office Q&A w/ Monero Research Lab's Sarang Sarang
13:30 - 14:30 Badge Clinic Michael Schloh von Bennew . . .
15:00 - 15:30 Decentralization in a Centralized world rehr
16:00 - 16:30 Tricky Bundles: Smarter Dependency Management for . . . idk
16:30 - 16:59 Kahoot! Quiz
Sunday
10:00 - 11:30 Keynote: Monero: Sound Money Safe Mode Dr. Daniel Kim
12:00 - 12:30 You're not the money printer, or why we need to se . . . sgp
13:00 - 13:30 Locha Mesh: Monero off-the-grid Randy Brito
13:30 - 14:30 Badge Clinic Michael Schloh von Bennew . . .
15:30 - 15:59 Closing talk rehr

Return to Index


Payment Village
Friday: 10:00-14:00, Saturday: 10:00-14:00, Sunday: 10:00-14:00
Location: #pay-labs-text


PDT Times Title speaker
Friday
09:45 - 09:59 Welcome to the Payment Village Leigh-Anne Galloway
10:00 - 10:59 Making sense of EMV card data – decoding the TLV . . . Dr Steven J. Murdoch
11:00 - 11:59 Fear and Loathing in Payment Bug Bounty Timur Yunusov
Saturday
10:00 - 10:59 Identity Crisis: the mad rise of online account op . . . Uri Rivner
11:00 - 11:59 Online Banking Security Arkadiy Litvinenko
12:00 - 12:59 Trends in the online card payment security Dr Mohammed Aamir Ali
Sunday
10:00 - 10:59 PoS Terminal Security Uncovered Aleksei Stennikov
11:00 - 11:59 Architecting Modern Payment Gateways in .Net core . . . Menaka BaskerPillai

Return to Index


Packet Hacking Village Talks
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #phv-infobooth-text


PDT Times Title speaker
Friday
10:00 - 10:59 Media Analysis of Disinformation Campaigns Chet Hosmer,Mike Raggo
13:00 - 13:59 Dumpster Fires: 6 Things About IR I Learned by Bei . . . Dr. Catherine Ullman
16:00 - 16:59 Take Down the Internet! With Scapy C8 (John Hammond)
Saturday
10:00 - 10:59 The Vulnerability That Gmail Overlooked and Enabli . . . Özkan Mustafa Akkus
13:00 - 13:59 The Worst Mobile Apps Sam Bowne
Sunday
11:00 - 11:59 Packet Acquisition: Building the Haystack Chris Abella,Pete Anderso . . .

Return to Index


Packet Hacking Village Workshops
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #phv-infobooth-text


PDT Times Title speaker
Friday
13:00 - 14:59 Intrusion Analysis and Threat Hunting with Open So . . . Jack Mott,Jason Williams, . . .
16:00 - 17:59 Violent Python 3 Elizabeth Biddlecome,Irvi . . .
Saturday
09:00 - 10:59 Writing Wireshark Plugins for Security Analysis Jeswin Mathai,Nishant Sha . . .
13:00 - 14:59 Wireshark for Incident Response & Threat Hunting Michael Wylie
16:00 - 17:59 Advanced APT Hunting with Splunk Matt Toth,Robert Wagner
Sunday
09:00 - 12:59 Bad Active Directory (BAD) Dhruv Verma,Michael Rober . . .

Return to Index


Policy Village
Friday: 09:00-17:00, Saturday: 9:00-17:00, Sunday: 10:00-12:00
Location: #pol-general-text


PDT Times Title speaker
Friday
15:30 - 16:30 Election Security
Saturday
11:00 - 11:59 AMA w/@hackingdave & @kennwhite hackingdave,kennwhite
14:00 - 14:59 AMA w/Policymakers
16:00 - 16:59 Mis/Dis Information & Democracy

Return to Index


Password Village
Friday: 09:00-18:00, Saturday: 9:00-18:00, Sunday: 09:00-14:00
Location: #pwdv-general-text


PDT Times Title speaker
Friday
10:00 - 10:59 Getting Started with Hashcat Password Village Staff
13:00 - 13:30 Making Targeted Wordlists Password Village Staff
15:00 - 15:30 Result of Longer Passwords in Real World Applicati . . . Minga
16:00 - 16:59 From Printers to Silver Tickets or Something EvilMog
18:00 - 18:59 Getting Advanced with Hashcat Password Village Staff
21:00 - 21:30 Getting Started with Hashcat (Rebroadcast) Password Village Staff
21:30 - 21:59 Making Targeted Wordlists (Rebroadcast) Password Village Staff
22:00 - 22:30 Result of Longer Passwords in Real World Applicati . . . Minga
22:30 - 22:40 From Printers to Silver Tickets or Something (Rebr . . . EvilMog
22:40 - 23:30 Getting Advanced with Hashcat (Rebroadcast) Password Village Staff
Saturday
00:00 - 00:59 PathWell: Dynamic Password Strength Enforcement (R . . . Hank Leininger
10:00 - 10:59 Cracking at Extreme Scale: The Evolution of Hashst . . . Jeremi M Gosney (epixoip)
12:00 - 12:59 What the Shuck? Layered Hash Shucking Sam Croley (Chick3nman)
13:00 - 13:59 PathWell: Dynamic Password Strength Enforcement Hank Leininger
14:00 - 14:59 Practical PCFG Password Cracking Matt Weir
21:00 - 21:59 Cracking at Extreme Scale: The Evolution of Hashst . . . Jeremi M Gosney (epixoip)
22:00 - 22:59 Length 15 & No Change. Implementing NIST SP800-63B . . . Per Thorsheim
23:00 - 23:59 What the Shuck? Layered Hash Shucking (Rebroadcast . . . Sam Croley (Chick3nman)
Sunday
01:00 - 01:59 Practical PCFG Password Cracking (Rebroadcast) Matt Weir

Return to Index


Recon Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #rv-general-text


PDT Times Title speaker
Saturday
10:00 - 10:30 Twitter Word Phrequency Master Chen
11:00 - 11:30 Burnout is real Chloé Messdaghi
12:00 - 12:30 Hunting for Blue Mockingbird Coinminers Ladislav B
13:00 - 13:45 Ambly, the Smart Darknet Spider  Levi
14:00 - 14:30 COVID 1984_ Propaganda and Surveillance during a P . . . Mauro Cáseres

Return to Index


Rogue's Village
Friday: 10:00-18:00, Saturday: 10:00-18:00, Sunday: 10:00-14:00
Location: #rov-announcements-text


PDT Times Title speaker
Friday
11:00 - 11:59 Rogues Village Introduction Rogues Village Team
12:00 - 13:59 Google Maps Hacks Simon Weckert
14:00 - 14:59 Performance Daniel Roy
16:00 - 17:59 Pickpocketing @ Home James Harrison
Saturday
14:00 - 14:59 Performance Daniel Roy
16:00 - 17:59 Outs, Forces, and Equivoque: A treatise on how Ma . . . Brandon Martinez
Sunday
12:00 - 13:59 Rogues adventure & the intervillage badge Monero Village Team,Rogue . . .

Return to Index


Red Team Offense Village
Thursday: 07:00 - 24:00,Friday: 24hrs, Saturday: 24hrs, Sunday: until 17:00
Location: #rtv-briefings-text


PDT Times Title speaker
Thursday
07:30 - 07:59 Red Team Village Announcements and Remarks Joseph Mlodzìanowskì (c . . .
08:00 - 08:59 The Bug Hunter’s Methodology Jason Haddix
09:00 - 08:59 Red Team Village CTF - Prequal
09:15 - 10:15 Securing AND Pentesting the Great Spaghetti Monste . . . Kat Fitzgerald
10:30 - 11:30 Guerrilla Red Team: Decentralize the Adversary Christopher Cottrell
11:45 - 12:45 Evil Genius: Why you shouldn't trust that keyboard Farith Perez,Mauro Cáser . . .
13:00 - 13:59 Combining notebooks, datasets, and cloud for the u . . . Ryan Elkins
14:15 - 15:15 Deep Dive into Adversary Emulation - Ransomware Ed . . . Jorge Orchilles
15:30 - 16:30 Introducing DropEngine: A Malleable Payload Creati . . . Gabriel Ryan
16:45 - 17:45 Zero Trust - A Vision for Securing Cloud and Redef . . . Vandana Verma Sehgal
18:00 - 18:59 What college kids always get wrong, the art of att . . . Forrest Fuqua
19:15 - 20:15 Android Malware Adventures Kürşat Oğuzhan Akınc . . .
20:30 - 21:30 Making Breach and Attack Simulation Accessible and . . . Shay Nehmad
21:45 - 22:45 Android Application Exploitation Kyle Benac (aka @B3nac)
23:00 - 23:59 Offensive Embedded Exploitation : Getting hands di . . . Kaustubh Padwad
Friday
07:30 - 07:59 Red Team Village Opening Remarks Joseph Mlodzìanowskì (c . . .
08:00 - 08:59 Knock knock, who's there? Identifying assets in th . . . Tanner Barnes (aka @_Stat . . .
09:30 - 15:59 Red Team Village CTF - Finals
09:15 - 10:15 Red Teaming: Born from the Hacker Community Chris Wysopal
10:30 - 11:30 Panel: The Joy of Coordinating Vulnerability Discl . . . Daniel Gruss,CRob,Lisa Br . . .
11:45 - 12:45 How to hack SWIFT, SPID, and SPEI with basic hacki . . . Guillermo Buendia
13:00 - 13:59 Trust, but Verify: Maintaining Democracy In Spite . . . Allie Mellen
14:15 - 15:15 Grey Hat SSH: SShenanigans Evan Anderson
15:30 - 16:30 Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Auth . . . Justin Hutchens (“Hutch . . .
16:45 - 17:45 Enumerating Cloud File Storage Gems Michael Wylie
18:00 - 18:59 Total E(A)gression Alvaro Folgado Rueda
19:15 - 20:15 Password cracking beyond 15 characters and under $ . . . Travis Palmer
20:30 - 21:30 50 Shades of Sudo Abuse Tyler Boykin
21:45 - 22:45 ATTPwn: Adversarial Emulation and Offensive Techni . . . Fran Ramirez,Pablo Gonzal . . .
23:00 - 23:59 ERPwnage - a red team approach to targeting SAP Austin Marck
Saturday
01:00 - 01:59 Back to the future: Computer science and systems b . . . Dr Lorenz Adlung,Noa Novo . . .
02:15 - 03:15 Modern Red Team Tradecraft - Informing Defenders b . . . Sajal Thomas
03:30 - 04:30 Executing Red Team Scenarios with Built-in Scenari . . . Erdener Uyan,Gökberk Gü . . .
04:45 - 05:45 OU having a laugh? Petros Koutroumpis
06:00 - 06:59 All of the threats: Intelligence, modelling and hu . . . Tim Wadhwa-Brown
07:15 - 08:15 Catch Me if You Can Eduardo Arriols
08:30 - 09:30 Mechanizing the Methodology: Automating Discovery, . . . Daniel Miessler
09:45 - 10:45 Y'all Tryna Bypass Python 3.8 Audit Hooks or Nah? Leron Gray
11:00 - 11:59 Initial Compromise through Web Side Walter Cuestas
12:15 - 12:30 Inside the Mind of a Threat Actor: Beyond Pentesti . . . Phillip Wylie
12:45 - 13:45 The Student Roadmap to Becoming A Penetration Test . . . Jonathan Helmus
14:15 - 14:59 The Art of Balancing: A Burnout Talk Chloé Messdaghi
15:15 - 16:15 APTs <3 PowerShell and Why You Should Too Anthony Rose,Jake “Hubb . . .
16:30 - 17:30 Indicators of Emulation: Extra Spicy Adversary Emu . . . Ch33r10,haydnjohnson
17:45 - 18:45 Emulating an Adversary with Imperfect Intelligence Adam Pennington
19:00 - 19:59 Automating Threat Hunting on the Dark Web and othe . . . Apurv Singh Gautam
20:15 - 21:15 Bypassing in Mobile Network From Red-Team Points o . . . Ali Abdollahi
21:30 - 22:30 Sounds Legit: Why you shouldn't trust that speaker Luis Ángel Ramírez Mend . . .
22:45 - 23:59 Weaponized XSS - Moving Beyond Alert(1) Ray Doyle
Sunday
01:00 - 01:59 PatrOwl - Red flavour of SOC automation Nicolas MATTIOCCO
02:15 - 03:15 Reviewing MS08-067, Illustration Of An Old Chapter Etizaz Mohsin
03:30 - 04:30 RedTeamOps - Managing Red Team Infrastructure as a . . . Mert Can Coşkuner
04:45 - 05:45 From Discovery to Disclosure Ibad Shah
06:00 - 06:59 Hacking Zoom: a Hacker's Journey into Zoom Securit . . . Mazin Ahmed
07:15 - 08:15 PWN The World Chris Kubecka
08:30 - 09:30 Autonomous Security Analysis and Penetration Testi . . . Ankur Chowdhary
09:45 - 10:45 Kubernetes Goat - Vulnerable by Design Kubernetes . . . Madhu Akula
11:00 - 11:59 Breaking the Attack Chain Corey Ham,Matt Eidelberg
12:15 - 13:15 Hashes; Smothered, Covered, and Scattered: Modern . . . Lee Wangenheim
13:30 - 14:30 You're Adversary Within - The Golden Age of Inside . . . Adam Mashinchi
15:00 - 15:59 Have my keys been pwned? - API Edition José Hernandez,Rod Soto
16:00 - 16:59 Red Team Village Closing Ceremony and Announcement . . . Joseph Mlodzìanowskì (c . . .

Return to Index


Social Engineering Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #sev-general-text


PDT Times Title speaker
Friday
13:00 - 13:59 Live SE Q&A

Return to Index


Voting Machine Hacking Village
Friday: 10:00-17:00, Saturday: 10:00-17:00, Sunday: 10:00-14:00
Location: #vmhv-general-text


PDT Times Title speaker
Friday
10:00 - 10:30 Welcome and Kick-Off Harri Hursti,Matt Blaze,M . . .
10:30 - 10:59 Keynote Remarks: Representative Jackie Speier Jackie Speier
11:00 - 11:30 A Policy Approach to Resolving Cybersecurity Probl . . . Jody Westby
11:30 - 12:30 Hacking Democracy II: On Securing an Election Unde . . . Casey John Ellis,Kimber D . . .
12:30 - 12:59 See Something, Say Something Marten Mickos
13:00 - 13:59 A Panel with the Feds on Election Security Bryson Bort,David Imbordi . . .
14:00 - 14:30 Keynote Remarks: Senator Ron Wyden Ron Wyden
14:30 - 14:59 Chairman Benjamin Hovland, US Election Assistance . . . Benjamin Hovland
15:00 - 15:30 Secretary Kim Wyman, Washington Kim Wyman
20:00 - 20:59 Live Q&A with Special Guests Regarding "Kill Chain . . .
Saturday
10:00 - 10:30 War By Other Means: How Influence Operations Under . . . Ben Dubow
10:30 - 10:59 John Odum, Montpelier, VT John Odum
11:00 - 11:30 Heightened Election Security Risks Admist the Pand . . . Jack Cable,Alex Zaheer
11:30 - 11:59 Hack-a-Fax Forrest Senti,Mattie Gull . . .
12:00 - 12:30 Analysis of the Attack Data Collected During Mobil . . . Nimit Sawhney,Nailah Mims
12:30 - 12:59 Remote Online Balloting Delivery and Marking Optio . . . Susan Greenhalgh,Steve Ne . . .
13:00 - 13:30 Don’t Go Postal Over Mail In Voting Bianca Lewis
13:30 - 13:59 The Ballot is Busted Before the Blockchain: A Secu . . . Michael A. Specter
14:00 - 14:30 Vote-from-home? Review of Election Security on Rem . . . Sang-Oun Lee
14:30 - 14:59 Electronic Ballot Return Standards & Guidelines Forrest Senti,Mattie Gull . . .
15:30 - 15:59 A Lawyer's Reflections on Elections Cordero Alexander Delgadi . . .
15:00 - 15:30 Understanding Cyber-Attacks and Their Implications . . . Javier F. Patiño García
16:00 - 16:30 Protecting Elections with Data Science -- A Tool f . . . Stephanie Singer

Return to Index


Wireless Village
Friday: 09:00-19:00, Saturday: 09:00-19:00, Sunday: 09:00-17:00
Location: #wv-general-text


PDT Times Title speaker
Thursday
09:00 - 09:01 wicked wardriving with gps and glonass wytshadow
09:00 - 09:01 Introduction to WiFi Security Nishant Sharma
09:00 - 09:01 Wireless Blue Team Eric Escobar
09:00 - 09:01 DragonOS - How I kept busy during COVID19 cemaxecuter
09:00 - 09:01 The Basics Of Breaking BLE v3 FreqyXin
Friday
17:45 - 18:45 Wireless Village Fireside Talk
Sunday
12:00 - 12:59 Ghosting the PACS-man: New Tools and Techniques Iceman,Omikron

Return to Index

Talk/Event Descriptions


 

AIV - Saturday - 09:30-09:59 PDT


Title: "SECRETS ARE LIES, SHARING IS CARING, PRIVACY IS THEFT."- A Dive into Privacy Preserving Machine Learning
When: Saturday, Aug 8, 09:30 - 09:59 PDT
Where: AI Vlg

SpeakerBio:Nahid Farhady
No BIO available

Description:No Description available

AI Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/aivillage


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: (Before Con) Creative Writing Short Story Contest
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums and subreddit. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are sometimes overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

Forum: https://forum.defcon.org/node/231200

Discord: https://discord.com/channels/708208267699945503/711643275584340069

Twitter: https://twitter.com/dcshortstory


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: (Before Con) Creative Writing Short Story Contest
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums and subreddit. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are sometimes overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

Forum: https://forum.defcon.org/node/231200

Discord: https://discord.com/channels/708208267699945503/711643275584340069

Twitter: https://twitter.com/dcshortstory


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: (Before Con) Creative Writing Short Story Contest
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The DEF CON Short Story contest is a pre-con contest that is run entirely online utilizing the DEF CON forums and subreddit. This contest follows the theme of DEF CON for the year and encourages hackers to roll up their sleeves and write the best creative story that they can. The Short Story Contest encourages skills that are invaluable in the hacker’s world, but are sometimes overlooked. Creative writing in a contest setting helps celebrate creativity and originality in arenas other than hardware or software hacking and provides a creative outlet for individuals who may not have another place to tell their stories.

Forum: https://forum.defcon.org/node/231200

Discord: https://discord.com/channels/708208267699945503/711643275584340069

Twitter: https://twitter.com/dcshortstory


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Saturday - 10:00-10:45 PDT


Title: 10,000 Dependencies Under The Sea: Exploring and Securing Open source dependencies
When: Saturday, Aug 8, 10:00 - 10:45 PDT
Where: AppSec Vlg
Speakers:Gregg Horton,Ryan Slama

SpeakerBio:Gregg Horton
No BIO available
Twitter: @greggawatt

SpeakerBio:Ryan Slama
No BIO available

Description:
Come on our journey of creating scalable tooling and processes to automatically identify vulnerabilities in third-party libraries and handle the question of “ok we found this, who’s going to fix it?”

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Saturday - 12:30-13:15 PDT


Title: 21 Jump Server: Going Bastionless in the Cloud
When: Saturday, Aug 8, 12:30 - 13:15 PDT
Where: Cloud Vlg

SpeakerBio:Colin Estep
Colin Estep is currently a threat researcher at Netskope focused on AWS and GCP. Colin was previously the CSO at Sift Security (acquired by Netskope), where he helped move the product towards breach detection for IaaS. He was a senior engineer on the security teams at Netflix and Apple before joining Sift. He was also a FBI Agent specializing in Cyber crime, where he spent a fair amount of time coordinating with other countries to locate and arrest malware authors and botnet operators.
Twitter: @colinestep

Description:
If you are a customer of AWS, Azure, or GCP, you may have deployed your own bastion hosts to provide RDP or SSH access to your virtual machines. While bastions help to protect your infrastructure, there are challenges that come along with them, such as managing the identities, obtaining logs, and preventing SSH multiplexing attacks.

In this talk, we will briefly review bastion hosts and some of their shortcomings, as well as the SSH multiplexing attack. The SSH multiplexing attack uses a feature of SSH to pivot from a compromised laptop to your bastion hosts. From there, the attacker could use this feature to compromise other users and gain access to your virtual machines hosted in the cloud.

Finally, we’ll show you services that provide access to your virtual machines in all three major cloud providers that eliminate the need for bastion hosts. Some providers have more than one alternative. However, this presentation will not present all of the alternatives. It is focused on the services that generally take the following approach:

Users authenticate to the access service with their Identity and Access Management (IAM) credentials for the cloud provider. Once authenticated, the cloud service creates an encrypted tunnel with port forwarding, which runs SSH or RDP for the user.

The benefits of this approach include:
Public IP addresses are not required in order to access the virtual machines. It eliminates the possibility of compromising an entire organization with SSH multiplexing attacks. In some cases, disabling a user’s IAM credentials also removes SSH or RDP access. Cloud audit logs will capture metadata for RDP or SSH sessions, and in some cases, full session logs are easy to collect through the provider’s service. We’ll cover Session Manager in AWS, OS Login and Identity-Aware Proxy (IAP) in GCP, and the Bastion Service in Azure. You’ll see how the services work, how they help with identity management, and where to find the SSH sessions in logs. If you are migrating to any of these platforms, this could save you from having to go through the pain of deploying your own solutions!


YouTube: https://www.youtube.com/watch?v=gwBG_oKDINQ

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Friday - 11:00-11:45 PDT


Title: 2FA in 2020 and Beyond
When: Friday, Aug 7, 11:00 - 11:45 PDT
Where: AppSec Vlg

SpeakerBio:Kelley Robinson
Kelley works on the Account Security team at Twilio. Previously she worked in a variety of API platform and data engineering roles at startups. Her research focuses on authentication user experience and design trade-offs for different risk profiles and 2FA channels. Kelley lives in Brooklyn, is an avid home cook, and spends too much time on Twitter (@kelleyrobinson).
Twitter: @kelleyrobinson

Description:
Security professionals agree: SMS based Two-factor Authentication (2FA) is insecure, yet thousands of companies still employ this method to secure their customer-facing applications. This talk will look at the evolution of authentication and provide a data-driven analysis of the tradeoffs between the different types of factors available.

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

HTS - Friday - 14:00-14:59 PDT


Title: 40,000 Leagues UUV Death Match
When: Friday, Aug 7, 14:00 - 14:59 PDT
Where: Hack the Sea Vlg

SpeakerBio:Dr. Nina Kollars
No BIO available

Description:No Description available

Hack the Sea Village activities will be streamed to Twitch.

Twitch: https://twitch.tv/hackthesea


Return to Index    -    Add to    -    ics Calendar file

 

ICS - Friday - 15:00-15:30 PDT


Title: 5 Quick Wins for Improving your ICS Cybersecurity Posture
When: Friday, Aug 7, 15:00 - 15:30 PDT
Where: ICS Vlg

SpeakerBio:Austin Scott
With 18 years of industrial automation experience, Austin Scott (GICSP, CISSP, OSCP) is a Principal Industrial Penetration Tester at Dragos Inc., where he identifies cyber risk within industrial control networks. Before Dragos, Austin worked as part of the OT cybersecurity team at Sempra, Shell, and as an industrial cybersecurity consultant at Accenture. Austin is a SANS Cybersecurity Difference Maker (2015) winner for his industrial cybersecurity contributions. Austin has won the DEFCON UBER black badge and has also published three books on PLC programming.

Description:No Description available

ICS Village activities will be streamed to YouTube and Twitch.

YouTube: https://www.youtube.com/channel/UCI_GT2-OMrsqqglv0JijHhw

Twitch: https://www.twitch.tv/ics_village


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Friday - 20:30-21:30 PDT


Title: 50 Shades of Sudo Abuse
When: Friday, Aug 7, 20:30 - 21:30 PDT
Where: Red Team Vlg

SpeakerBio:Tyler Boykin
Tyler Boykin is a former 0602 (USMC), hobbyist infosec geek, and is a Security Engineer with By Light Professional IT Services LLC currently developing features for CyberCENTS (a By Light Offering). He currently holds a variety of industry credentials to include OSCE, OSCP, CISSP, CCNP, CCDP, and many others.

Description:
Privilege escalation often includes abusing pre-existing features on a system. This talk gives a quick overview of sudo, sudoers, and ways of leveraging misconfigurations to increase access. Included in this talk, are vectors that range from common low-hanging fruit to downright crafty.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Saturday - 15:00-15:59 PDT


Title: 7 Phases of Smart Contract Hacking
When: Saturday, Aug 8, 15:00 - 15:59 PDT
Where: Blockchain Vlg

SpeakerBio:Martin Abbatemarco
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 10:30-10:59 PDT


Title: 747 Walkthrough From A Hacker's Perspective
When: Sunday, Aug 9, 10:30 - 10:59 PDT
Where: Aerospace Vlg
Speakers:Alex Lomas,Ken Munro

SpeakerBio:Alex Lomas
Alex Lomas is Pen Test Partner’s aerospace specialist. Alex undertakes penetration testing of traditional IT, such as networks, web applications, and APIs, as well as more aviation-specific areas including airport operational technology and avionics embedded systems such as inflight entertainment and e-enabled aircraft.

SpeakerBio:Ken Munro
Ken Munro is Partner and Founder of Pen Test Partners, a firm of ethical hackers. He and colleagues hold private pilot’s licenses and have been interested in aviation security for many years. They also publish and blog about their research into aviation cyber security, covering topics from airborne connectivity, the potential risks of publicly available avionics component information, and even the entire attack surface of the modern airport. Ken and Pen Test Partners have also been invited to speak at various aviation industry events, and on aviation at specialist security events such as DEF CON’s Aviation Village, the Global Connected Aircraft Summit, and the Aviation ISAC Summit among others.

Description:
This will be a tour of an end of life 747 airframe, covering a 101 of the cockpit systems and avionics bays. We will also be explaining the various systems & threat surfaces.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

HRV - Friday - 13:00-13:30 PDT


Title: A Basic Ham Station Setup
When: Friday, Aug 7, 13:00 - 13:30 PDT
Where: Ham Radio Vlg

Description:
In this live demo, we'll go over a basic home ham radio station setup, including all of the components and how they work together.

This Ham Radio Village event will be held on Twitch. Related conversation will be held in the DEF CON Discord, channel #ham-presentation-text (Q&A).

Twitch: https://www.twitch.tv/hamradiovillage

#ham-presentation-text: https://discord.com/channels/708208267699945503/736674835413073991


Return to Index    -    Add to    -    ics Calendar file

 

DC - Saturday - 09:30-09:59 PDT


Title: A Decade After Stuxnet's Printer Vulnerability: Printing is still the Stairway to Heaven
When: Saturday, Aug 8, 09:30 - 09:59 PDT
Where: DEF CON Q&A Twitch
Speakers:Peleg Hadar,Tomer Bar

SpeakerBio:Peleg Hadar , Security Researcher at SafeBreach Labs
Peleg Hadar (@peleghd) is a security researcher, having 8+ years of unique experience in the sec field. Currently doing research @SafeBreach Labs, previously serving in various sec positions @IDF.

His experience involved security from many angles: starting with network research, and now mostly software research. Peleg likes to investigate mostly Microsoft Windows components.

Twitter: @peleghd

SpeakerBio:Tomer Bar , Research Team Leader at SafeBreach Labs
Tomer Bar is a security researcher and a research team leader with 15+ years of unique experience in the sec field. Currently leading the research team of SafeBreach Labs.

His experience involved vulnerability research, malware analysis, etc.


Description:
In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment centrifuges. In order to reach Iran's centrifuges, it exploited a vuln in the Windows Print Spooler service and gain code execution as SYSTEM. Due to the hype around this critical vuln, we (and probably everyone else) were pretty sure that this attack surface would no longer exist a decade later. We were wrong…

The first clue was that 2 out of 3 vulns which were involved in Stuxnet were not fully patched. That was the case also for the 3rd vuln used in Stuxnet, which we were able to exploit again in a different manner. It appears that Microsoft has barely changed the code of the Print Spooler mechanism over the last 20 years. We investigated the Print Spooler mechanism of Windows 10 Insider and found two 0-day vulns providing LPE and DoS (First one can also be used as a new persistence technique)


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 15:30-15:59 PDT


Title: A Deeper Dive Into ILS And ADS-B Spoofing
When: Saturday, Aug 8, 15:30 - 15:59 PDT
Where: Aerospace Vlg

SpeakerBio:Harshad Sathaye
Harshad is a Ph.D. candidate at Northeastern University and a soon-to-be student pilot. He is a cyber security enthusiast with research interests around wireless systems security, specifically navigation systems and development of secure cyber-physical systems

Description:
Modern aircraft heavily rely on several wireless technologies for communications control and navigation. Researchers demonstrated vulnerabilities in many aviation systems e.g., spoofing ILS signals to disrupt the landing, injecting ghost aircraft into airspace, spoof locations, and manipulate key communication messages. This presentation will give the viewers a better understanding of the fundamental problems associated with these critical systems and what makes spoofing attacks possible.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

DC - Friday - 17:30-17:59 PDT


Title: A Hacker’s guide to reducing side-channel attack surfaces using deep-learning
When: Friday, Aug 7, 17:30 - 17:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Elie Bursztein , Google
Elie Bursztein leads Google' security & anti-abuse research team. He has authored over fifty research papers in the field for which he was awarded 8 best papers awards and multiple industry distinctions including the Black Hat pwnie award. Born in Paris, he received a Ph.D. from ENS-cachan in 2008 before working at Stanford University and ultimately joining Google in 2011.
Twitter: @elie

Description:
in recent years, deep-learning based side-channel attacks have been proven to be very effective and opened the door to automated implementation techniques. Building on this line of work, this talk explores how to take the approach a step further and showcases how to leverage the recent advance in AI explainability to quickly assess which parts of the implementation is responsible for the information. Through a concrete set by step example, we will showcase the promise of this approach, its limitations, and how it can be used today.

This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Sunday - 11:00-11:45 PDT


Title: A Heaven for Hackers: Breaking a Web Security Virtual Appliances
When: Sunday, Aug 9, 11:00 - 11:45 PDT
Where: AppSec Vlg

SpeakerBio:Mehmet D. Ince
No BIO available
Twitter: @mdisec

Description:No Description available

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

VMV - Saturday - 15:30-15:59 PDT


Title: A Lawyer's Reflections on Elections
When: Saturday, Aug 8, 15:30 - 15:59 PDT
Where: Voting Vlg

SpeakerBio:Cordero Alexander Delgadillo , Attorney, Sublime Law, PLLC
No BIO available
Twitter: @CORDERO_ESQ

Description:
Join Cordero Alexander Delgadillo (@CORDERO_ESQ), a business and technology lawyer, and more recently a former political candidate, as he demonstrates that elections, especially local elections, are akin to information systems (even reasonably locked down systems), because both are highly susceptible to the very non-tech, human vulnerabilities (nefarious and negligent). In this talk Cordero will provide insight by:


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

BTVW2 - Saturday - 16:30-17:59 PDT


Title: A N00b's Intro to Building Your Own Lab (Beginner)
When: Saturday, Aug 8, 16:30 - 17:59 PDT
Where: Blue Team Vlg - Workshop Track 2

SpeakerBio:Omar Santos , Cisco
Omar Santos is an active member of the security community, where he leads several industry-wide initiatives and standard bodies. His active role helps businesses, academic institutions, state and local law enforcement agencies, and other participants that are dedicated to increasing the security of the critical infrastructure. Omar is the author of over 20 books and video courses; numerous white papers, and other articles. Omar is a Principal Engineer of Cisco’s Product Security Incident Response Team (PSIRT) where he mentors and lead engineers and incident managers during the investigation and resolution of security vulnerabilities. Omar is often presenting at many conferences and he is the co-lead of the DEF CON Red Team Village.
Twitter: @santosomar

Description:
This is a brief introduction of how to build your own virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem. Create a lab for offensive and defensive cybersecurity concepts. You will also learn and obtain access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems. Using tools like Proxmox or even OpenStack to build your own cyber range. In addition, you will also learn how to use tools like Vagrant and Ansible to automate a lot of tasks.

Numerous cybersecurity, malware analysis, and penetration testing tools and techniques have the potential to damage or destroy the target system or the underlying network. In addition, if malware is used in testing, there is the potential for infection and spread if testing in an Internet-connected testbed. This is a brief introduction (beginners and intermediate) were you will learn how to build your own virtualized, physical, or cloud-based environment to practice your skills in a safe ecosystem.

You will learn what you need to do to create a lab for offensive and defensive cybersecurity concepts. You will also learn and obtain access to numerous tools that you can use to practice your skills, from virtual machines (VMs), Docker containers, and intentionally vulnerable systems. You will learn how you can leverage tools like Proxmox, or even OpenStack to build your own cyber range. In addition, you will also learn how to use tools like Vagrant and Ansible to automate a lot of tasks. Vagrant files and Ansible playbooks will be shared during the class for you to build complex lab environments within minutes. We will also go over a few demos on how to create environments in cloud services such as AWS, Azure, Google Cloud, and Digital Ocean.


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

VMV - Friday - 13:00-13:59 PDT


Title: A Panel with the Feds on Election Security
When: Friday, Aug 7, 13:00 - 13:59 PDT
Where: Voting Vlg
Speakers:Bryson Bort,David Imbordino,Brig. Gen. William Hartman,Matthew Masterson,Cynthia Kaiser,Dan Kimmage

SpeakerBio:Bryson Bort
Founder of SCYTHE, next generation attack emulation platform; GRIMM, cybersecurity consultancy; ICS Village Co-Founder, 501c3 for ICS security awareness. Senior Fellow for Cyber/National Security at R Street and National Security Institute; Advisor to the Army Cyber Institute and DHS/CISA.

SpeakerBio:David Imbordino , Election Security Lead, National Security Agency
No BIO available

SpeakerBio:Brig. Gen. William Hartman , Commander, Cyber National Mission Force
No BIO available

SpeakerBio:Matthew Masterson , Senior Cybersecurity Advisor, CISA
No BIO available

SpeakerBio:Cynthia Kaiser , Deputy Chief of Analysis for National Security Cyber Threats, FBI
No BIO available

SpeakerBio:Dan Kimmage , Principal Deputy Coordinator, Global Engagement Center, Department of State
No BIO available

Description:
Elections are critical in a free and fair society. Public trust in election infrastructure begins with understanding what the Government has done with transparency and how the hacker community can help. We are all citizens and our voices should be heard.


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

VMV - Friday - 11:00-11:30 PDT


Title: A Policy Approach to Resolving Cybersecurity Problems inthe Election Process
When: Friday, Aug 7, 11:00 - 11:30 PDT
Where: Voting Vlg

SpeakerBio:Jody Westby , CEO, Global Cyber Risk LLC
No BIO available

Description:
Cybersecurity researchers keep identifying cybersecurity vulnerabilities in voting machines andin the election process, but not much happens in closing identified vulnerabilities. The privatesector vendors involved in voter registration, manufacturing and programming voting machines,and vote tabulation are less than responsive and few have not provided evidence that they havestrong cybersecurity programs that meet best practices and standards and regular have cyberrisk assessments performed. This presentation will put forward a federal policy approach thatwill help correct these problems and advance the integrity of elections across the country.


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 11:00-11:30 PDT


Title: A View From The Cockpit: Exploring Pilot Reactions To Attacks On Avionic Systems
When: Saturday, Aug 8, 11:00 - 11:30 PDT
Where: Aerospace Vlg

SpeakerBio:Matt Smith
Matt is a Postdoctoral Research Associate in the System Security Lab led by Prof. Ivan Martinovic, at the Department of Computer Science, University of Oxford. His research looks at the security of wireless systems in aviation, most recently focusing on the impacts of attacks on safety systems. Prior to this, Matt completed his PhD in the Department of Computer Science, University of Oxford, covering avionic data links and the effects of attacks in the cockpit. He holds a Masters degree in Computer Science from the University of Warwick.

Description:
Researchers have been crafting attacks on aviation systems for almost a decade now, on wireless technologies like ADS-B and ACARS to In Flight Entertainment (IFE) devices. Many attacks seek to affect what the pilots see or how the aircraft is flown. Although we can work out what should happen in theory, does this translate to practice? In this talk, we describe how we investigated this using a flight simulator and 30 type-rated commercial pilots.

In particular, we will discuss:
- What happens when your aircraft thinks you are on collision course - but nothing is there, - How pilots respond when landing guidance puts you at the wrong end of the runway (i.e. the reverse Die Hard), - Can attackers push flight crew into switching systems off?

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 08:00-19:59 PDT


Title: A-ISAC CTF
When: Saturday, Aug 8, 08:00 - 19:59 PDT
Where: Aerospace Vlg

Description:
Aviation is under attack! A Tier 1 airport is in chaos!

Ticketing kiosks, airline servers, flight information displays, transportation security, runway lights, aircraft, and other critical systems have all been compromised. And there are indicators that airport insiders may have colluded with hackers to bring the airport to its knees!

It’s up to you now. YOU have 24 hours to research and investigate this crisis to regain control of the targeted airport and its airspace. From collecting evidence (and flags) to restoring all compromised assets and assisting impacted stakeholders, the clock is ticking!

Its time to apply everything you know about cybersecurity (e.g., password cracking, log analysis, computer forensics, and ethical hacking), intelligence (e.g., OSINT), and aviation (e.g., crew, avionics, air traffic control communications, airline operations, security screening, airport information systems, and aviation cyber-physical systems) to help the airport return to normal operations.

You have been given full authority to do whatever it takes to catch the hackers, seize back control of the airport, and restore aviation operations.


Discord: https://discord.com/channels/708208267699945503/734477413186273400


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 08:00-19:59 PDT


Title: A-ISAC CTF
When: Friday, Aug 7, 08:00 - 19:59 PDT
Where: Aerospace Vlg

Description:
Aviation is under attack! A Tier 1 airport is in chaos!

Ticketing kiosks, airline servers, flight information displays, transportation security, runway lights, aircraft, and other critical systems have all been compromised. And there are indicators that airport insiders may have colluded with hackers to bring the airport to its knees!

It’s up to you now. YOU have 24 hours to research and investigate this crisis to regain control of the targeted airport and its airspace. From collecting evidence (and flags) to restoring all compromised assets and assisting impacted stakeholders, the clock is ticking!

Its time to apply everything you know about cybersecurity (e.g., password cracking, log analysis, computer forensics, and ethical hacking), intelligence (e.g., OSINT), and aviation (e.g., crew, avionics, air traffic control communications, airline operations, security screening, airport information systems, and aviation cyber-physical systems) to help the airport return to normal operations.

You have been given full authority to do whatever it takes to catch the hackers, seize back control of the airport, and restore aviation operations.


Discord: https://discord.com/channels/708208267699945503/734477413186273400


Return to Index    -    Add to    -    ics Calendar file

 

DC - Saturday - 14:30-14:59 PDT


Title: Abusing P2P to Hack 3 Million Cameras: Ain't Nobody Got Time for NAT
When: Saturday, Aug 8, 14:30 - 14:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Paul Marrapese , Security Researcher
Paul Marrapese (OSCP) is a security researcher from San Jose, CA. His work has resulted in the discovery of critical vulnerabilities affecting millions of IoT devices around the world, and has been featured on Krebs on Security, Forbes, Wired, ZDNet, and several security podcasts. Paul specializes in offensive security as part of the red team at a large enterprise cloud company. His interests include reverse engineering, music production, photography, and recently software-defined radio. Rumor has it that he makes a mean batch of cold-brew coffee.
Twitter: @PaulMarrapese

Description:
To a hacker, making a bug-ridden IoT device directly accessible to the Internet sounds like an insanely bad idea. But what's truly insane is that millions of IoT devices are shipping with features that expose them to the Internet the moment they come online, even in the presence of NAT and firewalls. P2P, or “peer-to-peer”, is a convenience feature designed to make the lives of users easier, but has the nasty side effect of making attackers’ lives easier as well.

Come for the story of how supply chain vulnerabilities in modern IP cameras, baby monitors, and even alarm systems are putting millions at risk for eavesdropping and remote compromise. We'll talk about the hoards of IoT devices that exist outside of Shodan's reach and the botnet-like infrastructure they rely on. Learn how to find P2P networks and how to exploit them to jump firewalls, steal camera passwords over the Internet, and correlate devices to physical addresses. We'll demonstrate how to snoop on someone's video simply by using your own camera – and how someone may be snooping on your video, too.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

ENT - Friday - 19:00-19:59 PDT


Title: Acid T
When: Friday, Aug 7, 19:00 - 19:59 PDT
Where: See Description or Village

Description:
DEF CON 28 may be cancelled, but our parties cannot be stopped! Tune in for a massive virtual party that will shake the NET

Forum: https://forum.defcon.org/node/230970

Discord: https://discord.com/channels/708208267699945503/735624334302904350

Twitch: https://www.twitch.tv/defcon_music

Facebook: https://www.facebook.com/dj.sm0ke

Twitter: https://twitter.com/DJ_Sm0ke

YouTube: https://www.youtube.com/channel/UC55xsENb9PKz-IKB5zodYGA/featured

SoundCloud: https://soundcloud.com/acid_t


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 10:00-10:59 PDT


Title: Adding new features by manipulating CAN bus
When: Friday, Aug 7, 10:00 - 10:59 PDT
Where: Car Hacking Vlg 001

SpeakerBio:Teejay
No BIO available

Description:
Overview of how I added a front camera to my vehicle last year by utilizing CAN


#chv-track001-text: https://discord.com/channels/708208267699945503/735650705930453173

YouTube: https://www.youtube.com/watch?v=VvojAHUej1Q&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack001


Return to Index    -    Add to    -    ics Calendar file

 

PHVW - Saturday - 16:00-17:59 PDT


Title: Advanced APT Hunting with Splunk
When: Saturday, Aug 8, 16:00 - 17:59 PDT
Where: Packet Hacking Vlg - Workshop
Speakers:Matt Toth,Robert Wagner

SpeakerBio:Matt Toth , Security Strategist, Splunk
Matt Toth is a Security Strategist at Splunk with over 20 years of experience in the Information Technology industry, with a focus on Cyber Security. Working with the US Department of Defense, he has led teams in CyberWar simulations, and has advised senior leadership on new attack vectors and threat actors.

SpeakerBio:Robert Wagner , Security Strategist
Robert Wagner is a security professional with 20+ years of InfoSec experience. He is a co-founder of "Hak4Kidz.com", an organizer with Burbsec and BurbSecCon in Chicago, and is on the Board of Directors of the ISSA Chicago Chapter.

Description:
You wanna learn how to hunt the APTs? This is the workshop for you. Using a real-worldish dataset, this workshop will teach you how to hunt the "fictional" APT group Taedonggang. We discuss the Diamond model, hypothesis building, LM Kill Chain, and Mitre ATT&CK framework and how these concepts can frame your hunting. Using Splunk and OSINT, we will hunt for APT activity riddling a small startup's network. During the event, you will be presented a hypothesis and conduct your own hunts, whether it is for persistence, exfiltration, c2 or other adversary tactics. Heck, there might be some PowerShell to be found, too. We will regroup and review the specific hunt and discuss findings and what opportunities we have to operationalize these findings as well. At the end, we give you a dataset and tools to take home and try newly learned techniques yourself.

This workshop requires registration. If you are registered, please proceed to #phv-infobooth-text and you'll be given access to join.

#phv-infobooth-text: https://discord.com/channels/708208267699945503/708242376883306526


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Saturday - 12:30-13:30 PDT


Title: Advancing Medical Device Security – How collaboration between providers, manufacturers, and pen testers is advancing what’s possible with security.
When: Saturday, Aug 8, 12:30 - 13:30 PDT
Where: BioHacking Vlg

SpeakerBio:Mitchell Parker
Mitchell Parker is the CISO of a $6.5B integrated delivery network (IU Health) that runs 17 hospitals and hundreds of clinics, and is responsible for securing the networks that the devices which support them live on. He is also a vice chair of IEEE P2733, Trust, Integrity, Privacy, Protection, Safety, and Security for the Internet of Medical Things.

Description:
This panel features five industry folks working toward improving medical device security through multiple channels and methods and discussing how provider, vendor, and security collaborations are leading toward significant improvements in medical device security.

These panelists and moderator represent the organizations working to actively collaborate between the independent researchers, device vendors, information security officers, clinical engineering, electronic medical records vendors, and security companies with a goal of continual improvement. These 5 represent part of a significantly larger effort, and have contributed to open standards.


BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:30-09:59 PDT


Title: Aerospace Village Badge
When: Saturday, Aug 8, 09:30 - 09:59 PDT
Where: Aerospace Vlg

SpeakerBio:Rick Hansen
Professor Rick Hansen teaches cybersecurity and IoT at Capitol Technology University. He performs original research in vulnerability assessment for embedded systems and telecommunications. Rick also serves as the CEO of APS Global llc which provides cybersecurity, research, and training to government and industry. Rick is an Air Force veteran with degrees in computer science and electronic engineering. He volunteers with Capitol’s Astronautical Engineering program, assisting students with payloads operating in near-space and low-earth orbit. Professor Hansen was honored to be featured in this year’s NSA Centers of Excellence in Cyber Defense video (https://www.captechu.edu/student-experience/centers-and-labs/center-cybersecurity-research-and-analysis-ccra). Last year Rick’s DEFCON presentation focused on exploiting vulnerabilities in automotive LIDAR, which was the focus of this article by Unicorn Riot (https://unicornriot.ninja/2019/hacking-lidar-changing-what-autonomous-vehicles-see/).

Description:
Inexpensive Software-Defined Radios (SDRs) can be used to receive digital communications from aircraft and satellites. This talk presents simple experiments in receiving these communications and assessing the associated strengths and vulnerabilities. This year’s Aerospace Village Badge can be used as an antenna for receiving aviation and satellite data. Materials can be purchased from Amazon and attendees will be able to follow along with the video.

This event will be coordinated on the DEF CON Discord server, in channel #av-terminal-text.


Discord: https://discord.com/channels/708208267699945503/732392946350948423


Return to Index    -    Add to    -    ics Calendar file

 

AIV - Saturday - 15:00-15:30 PDT


Title: AI vs. Airplanes and IT-Security: What Security Regulations Teach Us About AI Governance
When: Saturday, Aug 8, 15:00 - 15:30 PDT
Where: AI Vlg

SpeakerBio:Laurin Weissinger
No BIO available

Description:No Description available

AI Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/aivillage


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 14:00-14:59 PDT


Title: All Aboard the CAN Bus… or Motorcycle
When: Saturday, Aug 8, 14:00 - 14:59 PDT
Where: Car Hacking Vlg 002

SpeakerBio:Derrick (CanBusDutch)
Derrick is a corporate IT infrastructure professional, Cyber security hobbyist and motorcycle enthusiast, with more than a decade involved in the fields. When Derrick isn’t consulting for major firms in the San Francisco area, feeding his autodidact addiction, or working on independent projects, he can be briefly seen as a blur passing you on the highway.

Description:
Follow me as my passion for motorcycles, goes head first into my passion for computers, and I build tools and software to reverse engineer my motorcycle's CAN system. Python scripts, microcontrollers, pulse width modulation, some potentiometers, and a bit of what I like to call “Ruthless Engineering”, has helped me finally reach the pinnacle of CAN bus packet reversing. We’ll cover some engine simulation, execute some packet capture session analysis, and put it all back together again, for the development of an aftermarket gauge cluster.


#chv-track002-text: https://discord.com/channels/708208267699945503/739564953014632579

YouTube: https://www.youtube.com/watch?v=5DYhXbWkWoA&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack002


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 06:00-06:59 PDT


Title: All of the threats: Intelligence, modelling and hunting through an ATT&CKers lens
When: Saturday, Aug 8, 06:00 - 06:59 PDT
Where: Red Team Vlg

SpeakerBio:Tim Wadhwa-Brown
Tim Brown joined Cisco as part of their acquisition of Portcullis for whom he worked for almost 12 years. He is equally happy performing white box assessments with access to source code or where necessary diving into proprietary binaries and protocols using reverse engineering methodologies. Tim has contributed to a number of Cisco’s bespoke methodologies covering subjects as diverse as risk and compliance, secure development and host hardening. Tim has looked at targets as varied as risk, mainframes, MPLS, power stations, cars, banking middleware and devops as well as supporting Cisco's SOC and incident response capability. Outside of the customer driven realm of information assurance, Tim is also a prolific researcher with papers on UNIX, KDE, Vista, Active Directory and web application security to his name. Tim is credited with almost 150 vulnerability advisories covering both kernel and userland, remote and local. Most recently Tim spoke at to the ATT&CK community on some of his use of ATT&CK for data science and threat hunting research. Tim particularly like to bug hunt enterprise UNIX solutions.

Description:
ATT&CK is a game changer and where it works, it can enable both blue and red teams to co-exist and work effectively together. However, what happens when it falls short and the threat intelligence and hypotheses don't exist? How do you build threat intelligence and threat hunt hypotheses from first principles. What do attackers on UNIX do when bitcoin miners aren't their motivation? I’ll go into:
* The target I chose and why – we have ~40 years’ experience looking at UNIX from an offensive standpoint, why wouldn't attackers * Building a collection worksheet and the information you'll need to track * Figuring out what TTPs the bad guys are using to attack UNIX when no-one has documented them previously – faced with a lack of DFIR reports, how do you validate your hypotheses * Working out whether your customer is exposed and why this matters * Translating concepts we see in the wild into things our customer can consume * What this means for users of ATT&CK

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

POV - Saturday - 11:00-11:59 PDT


Title: AMA w/@hackingdave & @kennwhite
When: Saturday, Aug 8, 11:00 - 11:59 PDT
Where: See Description or Village
Speakers:hackingdave,kennwhite

SpeakerBio:hackingdave
No BIO available
Twitter: @hackingdave

SpeakerBio:kennwhite
No BIO available
Twitter: @kennwhite

Description:
This event requires registration. Please see the link below for more information.

Registration: https://www.eventbrite.com/e/def-con-policy-ama-ask-a-hacker-with-hackingdave-kennwhite-tickets-115981562977


Return to Index    -    Add to    -    ics Calendar file

 

POV - Saturday - 14:00-14:59 PDT


Title: AMA w/Policymakers
When: Saturday, Aug 8, 14:00 - 14:59 PDT
Where: See Description or Village

Description:
This event requires registration. Please see the below link for more information.

Registration: https://www.eventbrite.com/e/def-con-policy-ama-ask-a-policymaker-with-tbd-tickets-115983414515


Return to Index    -    Add to    -    ics Calendar file

 

RCV - Saturday - 13:00-13:45 PDT


Title: Ambly, the Smart Darknet Spider 
When: Saturday, Aug 8, 13:00 - 13:45 PDT
Where: Recon Vlg

SpeakerBio:Levi
No BIO available

Description:
Combating cybercriminal activity requires quick turnover time between detecting indicators of attack and moving to protect or remediate the malicious activity. Currently, investigations slow down at the bottleneck of manual labor required to identify and evaluate cyber threat intelligence before making an actionable decision. While this can be an issue on the Clearnet, it becomes a more difficult problem for analysts on the Darknet. This leaves cybersecurity analysts in a position of constant responsiveness, rather than endorsing a position of preemptive protection.

To minimize the need for manual labor in the triage stage of cyber threat intelligence identification and preliminary evaluation on the darknet, Ambly, a smart darknet spider, is currently under development. Utilizing this tool will help identify darknet webpages containing cyber threat intelligence and produce a report ranking webpages for further human evaluation.

Ambly is a tool designed for interacting with the Tor network, hosted by the Tor Project. By connecting to the onion routers, Ambly is able to access ‘.onion’ URLs and begin crawling while gathering information. During the development cycle for Ambly, further layers of machine-learning modules are being added, including Natural Language Processing (NLP) classifications, language identification, and leading toward further development into cyber threat intelligence identification. This is an ongoing and dynamic research endeavor with future updates eminent. Main Talking Points:
- OSINT into CTI
- Difficulties of CTI on the Darknet
- Ambly’s current abilities for intelligence gathering. - The future of Ambly and Darknet CTI.


Recon Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/c/ReconVillage

#rv-talks-text: https://discord.com/channels/708208267699945503/737048009732522014


Return to Index    -    Add to    -    ics Calendar file

 

BTVW2 - Saturday - 13:30-15:30 PDT


Title: An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner)
When: Saturday, Aug 8, 13:30 - 15:30 PDT
Where: Blue Team Vlg - Workshop Track 2

SpeakerBio:Ben Bornholm
No BIO available

Description:
Have you ever wondered, how should I get started in Threat Hunting? How should I start? What should I hunt for? What tools should I use? How should I do it? Have you always wanted to hunt an APT? Then this intro level workshops is the right place for you. Our workshop will introduce hunting an APT style attack to detect malicious activity at each stage of an attack’s lifecycle.

This workshop will introduce you to the Attack Lifecycle model to create a fundamental framework for hunting adversaries. Our workshop will have you hunt an APT style attack to detect malicious activity at each stage of an attack’s lifecycle. This will enable you to connect information found at one stage as leverage for hunting in another stage.

Participants of this workshop will have the following takeaways: - A fundamental understanding of the attacker mindset - A fundamental understanding of the phases of the Attack Lifecycle - Knowledge of the tools and techniques used by attackers - An ability to hunt for attacker tools and techniques using a SIEM - Exposure to an APT style attack
- IMPORTANT: This is a 101 Intro Workshop


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

BTVW2 - Friday - 11:30-13:30 PDT


Title: An Introduction to Hunting Adversaries Using the Attack Lifecycle Methodology (Beginner)
When: Friday, Aug 7, 11:30 - 13:30 PDT
Where: Blue Team Vlg - Workshop Track 2

SpeakerBio:Ben Bornholm
No BIO available

Description:
Have you ever wondered, how should I get started in Threat Hunting? How should I start? What should I hunt for? What tools should I use? How should I do it? Have you always wanted to hunt an APT? Then this intro level workshops is the right place for you. Our workshop will introduce hunting an APT style attack to detect malicious activity at each stage of an attack’s lifecycle.

This workshop will introduce you to the Attack Lifecycle model to create a fundamental framework for hunting adversaries. Our workshop will have you hunt an APT style attack to detect malicious activity at each stage of an attack’s lifecycle. This will enable you to connect information found at one stage as leverage for hunting in another stage.

Participants of this workshop will have the following takeaways: - A fundamental understanding of the attacker mindset - A fundamental understanding of the phases of the Attack Lifecycle - Knowledge of the tools and techniques used by attackers - An ability to hunt for attacker tools and techniques using a SIEM - Exposure to an APT style attack
- IMPORTANT: This is a 101 Intro Workshop


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

VMV - Saturday - 12:00-12:30 PDT


Title: Analysis of the Attack Data Collected During Mobile Voting Pilots
When: Saturday, Aug 8, 12:00 - 12:30 PDT
Where: Voting Vlg
Speakers:Nimit Sawhney,Nailah Mims

SpeakerBio:Nimit Sawhney , Co-Founder and CSO, Voatz, Inc.
No BIO available

SpeakerBio:Nailah Mims , Principal Security Engineer/Analyst, Voatz, Inc.
No BIO available

Description:
Since 2018, we have been experimenting with smartphone-app based mobile voting for a very small number of voters across various jurisdictions in the United States. The small-scale nature of these pilots has not prevented attackers and researchers from around the world from attempting to break into the platform at multiple levels. In this paper, we present the significant amount of attack data that has been collected over the past couple of years and an early analysis of the nature of these attack attempts, their lethality, origins, etc. We also present the mitigation measures that have worked and the ones that haven’t. Lastly, we will also dive deeper into a couple of very significant attack attempts and present a detailed analysis of the threat vectors, the attack modality, duration, etc. All this data is being shared in the public domain for the very first time and an anonymized dataset will be available for open downloads. We hope that it will further inform research in this space.


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Thursday - 21:45-22:45 PDT


Title: Android Application Exploitation
When: Thursday, Aug 6, 21:45 - 22:45 PDT
Where: Red Team Vlg

SpeakerBio:Kyle Benac (aka @B3nac)
Kyle Benac (aka @B3nac) currently works as a full time Security Researcher at Acronis SCS. Prior to this, he obtained his Bachelors of Science in Software Development and Security while active duty Air Force. He really enjoys hacking Android applications and participating in bug bounty programs. Creator of the InjuredAndroid Capture the Flag (CTF) training application and developer of HackerOne’s BountyPay Android application. Listed as a Top Contributor for the OWASP mobile security testing guide with over 58 contributions to the manual. 
Twitter: @B3nac

Description:
Android applications are treasure chests of potential bugs waiting to be discovered. Having a structured, streamlined approach greatly improves your efficiency and assessment accuracy. This talk will go over methods used to identify the type of mobile framework to better assess possible attack vectors. Examples will be provided to demonstrate how to exploit those vectors.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Friday - 12:00-12:45 PDT


Title: Android Bug Foraging
When: Friday, Aug 7, 12:00 - 12:45 PDT
Where: AppSec Vlg
Speakers:João Morais,Pedro Umbelino

SpeakerBio:João Morais
No BIO available
Twitter: @jmoraissec

SpeakerBio:Pedro Umbelino
No BIO available
Twitter: @kripthor

Description:
In this session, we will analyze four real-world examples of different high impact android vulnerabilities. We will show how we discover, developed, and leveraged the vulnerabilities into a fully working proof-of-concept, devised meaningful attack scenarios (demos included), and how our work was approached by the different vendors.

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Thursday - 19:15-20:15 PDT


Title: Android Malware Adventures
When: Thursday, Aug 6, 19:15 - 20:15 PDT
Where: Red Team Vlg
Speakers:Kürşat Oğuzhan Akıncı,Mert Can Coşkuner

SpeakerBio:Kürşat Oğuzhan Akıncı
Kürşat Oğuzhan Akıncı is a Security Engineer at Trendyol. He is also a team leader of Blackbox Cyber Security which is Turkey's first cyber security volunteer group, coordinator and mentor of Turkcell CyberCamp and Turkish Airlines CyberTakeOff. In his free time Kürşat is performing security researches in the form of bug bounty in which he has found several vulnerabilities in critical institutions such as NSA as well as helping Mert Can to break into C&Cs.

SpeakerBio:Mert Can Coşkuner
Mert Can Coşkuner is a Security Engineer at Trendyol. He is maintaining a Penetration Testing and Malware Analysis blog at medium.com/@mcoskuner. In his free time Mert Can is performing mobile malware research and threat intelligence.

Description:
Android malware is evolving every day and they are everywhere, even in Google Play Store. Malware developers have found ways to bypass Google's Bouncer as well as antivirus solutions and many alternative techniques to operate like Windows malware do. Using benign looking application working as a dropper is just one of them. This talk is about android malware on Google Play Store and targeting Turkey. The talk will cover; Techniques to Analyze Samples: Unencrypted samples are often used to retrieve personal informations to sell and do not have obfuscation. Encrypted samples however are used for much sophisticated tasks like stealing banking information. They decrypt themselves by getting the key from a twitter account who owned by the malware developer and operate by communicating with the C&C. Also, most banking samples are using techniques like screen injection and dependency injection which is mostly used by android application developers. Bypassing Anti- Techniques: To be able to dynamically analyze the sample, defeating anti- techniques are often needed. We will introduce some (known) Frida scripts to be able to defeat common anti- checks malware uses. Extracting IoCs: Extracting twitter account as well as C&C from encrypted samples are often critical to perform threat intelligence over samples. Extracting IoCs while assets are still active was crucial for our research since we are also aiming to takeover C&Cs. We will introduce (known) automatization technique to extract twitter account, decryption key and C&C address. 4. Extract Stolen Information from C&Cs: In order to extract information from C&C, one should act swiftly. The speed of extraction process is critical since the actors change C&Cs often. We will give a detailed walkthrough about how we approach C&Cs as a target and extract the informations. The samples and informations in the talk is the product of our researches over many bankbot samples as well as other Turkish malware developer actors' samples. Detailed talk outline
• Google Play Store and Malware
• Common Android Malware Types
• Campaigns Aiming Turkish Users
• How To Approach An Android Malware — Techniques to Analyze • How To Approach An Android Malware — Defeating Anti-
Techniques • How To Approach An Android Malware — Decrypting Bankbots • How To Approach An Android Malware — IoC Extraction • C&Cs — What Are They
• C&Cs — How To Infiltrate and Extract Information

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Friday - 15:00-15:45 PDT


Title: API (in)Security TOP 10: Guided tour to the Wild Wild World of APIs
When: Friday, Aug 7, 15:00 - 15:45 PDT
Where: AppSec Vlg
Speakers:David Sopas,Paulo Silva

SpeakerBio:David Sopas
No BIO available
Twitter: @dsopas

SpeakerBio:Paulo Silva
No BIO available
Twitter: @pauloasilva_com

Description:
Do you speak API? Surely you do, even if you don't notice them in your world wide web everyday use. APIs are proved to be beneficial for business, but with great power comes great responsibility and some of them have serious problems. Last year we put a lot of effort to build and release the OWASP API Security Top 10 project. Then, we decided to go wild and have some fun. Now we will present our findings, from OWASP API Security Top 10 to lots of fun and profit. Join us to learn common API pitfalls: how to find and abuse them. It won't hurt. Unless your data is in there...

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

DC - Saturday - 12:30-12:59 PDT


Title: Applied Ca$h Eviction through ATM Exploitation
When: Saturday, Aug 8, 12:30 - 12:59 PDT
Where: DEF CON Q&A Twitch
Speakers:Brenda So,Trey Keown

SpeakerBio:Brenda So , Security Researcher, Red Balloon Security
Brenda is a security researcher at Red Balloon Security. She earned her Bachelors in Electrical Engineering at The Cooper Union. She has spoken about reverse engineering at Hushcon West and CSAW. She has also organized the ATM CTF challenge at major conferences such as Recon and Defcon. When not messing around with ATMs, she is brewing a nice gallon of beer at her homebrew setup.
Twitter: @Sosogun3

SpeakerBio:Trey Keown , Security Researcher, Red Balloon Security
Trey is a security researcher at Red Balloon Security focusing on securing embedded devices and firmware reverse-engineering automation. He is the co-creator of an ATM CTF challenge which has taken place at Re:con, CSAW, Hushcon, Summercon, and the IoT Village at DEF CON 27. He has also been a speaker at Hushcon West and CSAW.
Twitter: @TreyKeown

Description:
ATMs are networked computers that dispense cash, so naturally they’re uniquely interesting devices to examine. We all remember ATM jackpotting from a decade ago. Unfortunately, it doesn’t look like ATM security has improved for some common models since then.

We present our reverse engineering process for working with an ATM and modifying its firmware. For this, we became our own "bank" by creating software that's able to speak the obscure protocols used by ATMs. For working with the device software at a low level, we restored JTAG access, defeated code signing, and developed custom debugging tools. We then leveraged this research to discover two 0-day network-based attacks, which we will demonstrate live. The first vulnerability takes advantage of the ATM’s remote administration interface, which can lead to arbitrary code execution and total device compromise. The second vulnerability is in the OEM’s implementation of a common middleware for ATM peripherals. This allows for command injection and jackpotting of ATMs over the network.

The high barrier to entry for even legally opening up one of these devices has left a lot of attack surface area unchecked. Through this talk, we want to shed light on the state of ATM security and encourage the security community to continue to challenge ATM vendors to do better.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Friday - 11:00-12:59 PDT


Title: Applying Pysa to Identify Python Security Vulnerabilities
When: Friday, Aug 7, 11:00 - 12:59 PDT
Where: AppSec Vlg

SpeakerBio:Graham Bleaney
No BIO available
Twitter: @GrahamBleaney

Description:
The Product Security teams at Facebook make extensive use of static analysis to find security vulnerabilities. We use systems like Zoncolan and the open source Python Static Analyzer (Pysa) on a daily basis. Using static analysis helped us find more than 1100 security bugs in 2018, accounting for more than a third of the bugs found by the application security team in that timeframe.

In this tutorial, we’ll cover the basics of static analysis, how to set up Pysa, and how you can write and run rules to identify vulnerabilities in your own codebase. We’ll also cover how Pysa deals with false positives and discuss its limitations as a tool. Each new concept you learn will immediately be reinforced by a practical exercise.

Attendees should leave this tutorial with all the tools they need to start applying static analysis to their Python projects at work and in open source. A computer with Python, Pip, and Git is required for this workshop. Attendees will need to pip install pyre-check and set up a small sample project.


AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: AppSec Village CtF
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CTFs test your skills, challenge your ingenuity and push mental boundaries. But what is even MORE AWESOME than a regular CTF?

A (CTF)2!! A competition that stretches your creative mind as a task author and makes you step up your game as a task player. This year, AppSec Village @ DEF CON 28 invites you to compete in both roles!


Forum: https://forum.defcon.org/node/232292

Discord: https://discord.com/channels/708208267699945503/728703600586522739

Twitter: https://twitter.com/appsec_village

Web: https://www.appsecvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: AppSec Village CtF
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CTFs test your skills, challenge your ingenuity and push mental boundaries. But what is even MORE AWESOME than a regular CTF?

A (CTF)2!! A competition that stretches your creative mind as a task author and makes you step up your game as a task player. This year, AppSec Village @ DEF CON 28 invites you to compete in both roles!


Forum: https://forum.defcon.org/node/232292

Discord: https://discord.com/channels/708208267699945503/728703600586522739

Twitter: https://twitter.com/appsec_village

Web: https://www.appsecvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: AppSec Village CtF
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CTFs test your skills, challenge your ingenuity and push mental boundaries. But what is even MORE AWESOME than a regular CTF?

A (CTF)2!! A competition that stretches your creative mind as a task author and makes you step up your game as a task player. This year, AppSec Village @ DEF CON 28 invites you to compete in both roles!


Forum: https://forum.defcon.org/node/232292

Discord: https://discord.com/channels/708208267699945503/728703600586522739

Twitter: https://twitter.com/appsec_village

Web: https://www.appsecvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

HRV - Sunday - 13:00-13:30 PDT


Title: APRS: Automatic Packet Reporting System Demo
When: Sunday, Aug 9, 13:00 - 13:30 PDT
Where: Ham Radio Vlg

Description:
In this live demo, we'll go over what APRS is, what you can do with it, and a quick primer on how to get started.

This Ham Radio Village event will be held on Twitch. Related conversation will be held in the DEF CON Discord, channel #ham-presentation-text (Q&A).

Twitch: https://www.twitch.tv/hamradiovillage

#ham-presentation-text: https://discord.com/channels/708208267699945503/736674835413073991


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 15:15-16:15 PDT


Title: APTs <3 PowerShell and Why You Should Too
When: Saturday, Aug 8, 15:15 - 16:15 PDT
Where: Red Team Vlg
Speakers:Anthony Rose,Jake “Hubbl3” Krasnov

SpeakerBio:Anthony Rose
Anthony “Cx01N” Rose, CISSP, is the Chief Operating Officer of BC-Security and Lead Pentester at Merculite Security. He has more than a decade’s worth of experience in digital communications, working with Red and Blue teams, and as an electrical engineer. His research has focused on wireless networks and embedded systems security. Anthony leveraged his research at DEF CON 24, where he published his work revealing wide-spread vulnerabilities in Bluetooth locks and brought awareness to the masses. His workshop at DEF CON 27 resulted in the reboot of the post-exploitation framework, Empire, which he actively develops and maintains.

SpeakerBio:Jake “Hubbl3” Krasnov
Jake “Hubbl3” Krasnov is the Chief Executive Officer of BC-Security. He spent the first half of his career as an astronautical engineer overseeing rocket modifications for the Air Force. He then moved into offensive security, running operational cyber testing for fighter aircraft and operating on a red team. His most recent focus has been on developing cybersecurity testing tools for embedded systems. He was an instructor at DEF CON 27, where he taught AMSI evasion techniques and his most recent efforts contributed to the resurrection of the post-exploitation framework Empire.

Description:
Quite often, you may have heard people mention, “Why should you bother learning PowerShell, isn’t it dead?” or “Why not just use C#?” Many individuals in the offensive security field have a common misconception that PowerShell is obsolete for red team operations. Meanwhile, it remains one of the primary attack vectors employed by Advanced Persistent Threats (APTs). APTs are known for implementing sophisticated hacking tactics, techniques, and procedures (TTPs) to gain access to a system for an extended period of time. Their actions typically focus on high-value targets, which leave potentially crippling consequences to both nation-states and corporations. It is crucial that Red Teams accurately emulate real-world threats and do not ignore viable attack options. For this talk, we will walk through how many threat actors adapt and employ PowerShell tools. Our discussion begins with examining how script block logging and AMSI are powerful anti-offensive PowerShell measures. However, the implementation of script block logging places a technical burden on organizations to conduct auditing on a substantial amount of data. While AMSI is trivial to bypass for any capable adversary. Finally, we will demonstrate APT-like PowerShell techniques that remain incredibly effective against the latest generation of network defenses.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

PAYV - Sunday - 11:00-11:59 PDT


Title: Architecting Modern Payment Gateways in .Net core with Azure
When: Sunday, Aug 9, 11:00 - 11:59 PDT
Where: Payment Vlg

SpeakerBio:Menaka BaskerPillai
No BIO available

Description:
In this session am going to explain how to work with payment gateways and how to implement a secured payment gateways in .net core web Apps. This session also includes some core concepts of Azure that plays an important role in transaction.

Payment Village activities will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/paymentvillage

YouTube: https://www.youtube.com/channel/UCivO-5rpPcv89Wt8okBW21Q


Return to Index    -    Add to    -    ics Calendar file

 

FSL - Saturday - 19:00-19:59 PDT


Title: Ask the EFF/Meet the EFA
When: Saturday, Aug 8, 19:00 - 19:59 PDT
Where: DEF CON Fireside Twitch
Speakers:Abi Hassen,Alexis Hancock,Elliot,Emilie St-Pierre,Eva Galperin,Hannah Zhao,Kurt Opsahl,nash,Rory Mir,Tracy Rosenberg

SpeakerBio:Abi Hassen
Abi Hassen is an attorney, technologist, and co-founder of the Black Movement-Law Project (BMLP), a legal support rapid response group that grew out of the uprisings in Ferguson, Baltimore, and elsewhere. He is currently a partner at O'Neill and Hassen LLP; a law practice focused on indigent criminal defense. Prior to his current work, he was the Mass Defense Coordinator at the National Lawyers Guild. Abi has also worked as a political campaign manager and strategist, union organizer, and community organizer. Abi conducts training, speaks, and writes on topics of race, technology, (in)justice, and the law.

SpeakerBio:Alexis Hancock
Alexis works to secure the web by working on HTTPS Everywhere. She has previously been a web developer and system administrator for 7 years and a statistician in the education realm. She has earned degrees from the Rochester Institute of Technology in Media Arts and Technology (B.Sc.) and The New School in Organizational Change Management (MS). She is very passionate about encryption and tech equity for all and has been assisting activists and educators with their tech needs for almost 10 years.

SpeakerBio:Elliot
Elliot is a motion artist and creative coder who works in interactive, fabrication, and large scale immersive experiences. Elliot blends visual work with an interest in mutual aid, security, and privacy online. Based in Brooklyn.

SpeakerBio:Emilie St-Pierre , Security Ambassador
Emilie St-Pierre is the Security Ambassador for Future Ada, a Spokane-based non-profit advocating for diversity and inclusion in STEAM. For the past six years, she has used her experience as an offensive security professional to provide privacy and security education within her community. Through her work with Future Ada, she has established free regular workshops and one-on-one technical support to the public. Emilie's focus has been to provide these workshops and services to underrepresented members of the public.

SpeakerBio:Eva Galperin , Director of Cybersecurity
Eva Galperin is EFF's Director of Cybersecurity. Prior to 2007, when she came to work for EFF, Eva worked in security and IT in Silicon Valley and earned degrees in Political Science and International Relations from SFSU. Her work is primarily focused on providing privacy and security for vulnerable populations around the world. To that end, she has applied the combination of her political science and technical background to everything from organizing EFF's Tor Relay Challenge, to writing privacy and security training materials (including Surveillance Self Defense and the Digital First Aid Kit), and publishing research on malware in Syria, Vietnam, Kazakhstan. When she is not collecting new and exotic malware, she practices aerial circus arts and learning new languages.

SpeakerBio:Hannah Zhao
Hannah is a staff attorney at EFF focusing on criminal justice and privacy issues, and is part of the Coder's Rights Project. Prior to joining EFF, Hannah represented criminal defendants on appeal in state and federal courts in New York, Illinois, and Missouri, and also worked at the human rights NGO, Human Rights in China. While pursuing her law degree at Washington University in St. Louis, she represented indigent defendants and refugee applicants in Durban, South Africa, and studied international law at Utrecht University in the Netherlands. She also competed in, and remains involved with, the Philip C. Jessup International Moot Court Competition, including as a problem author in 2019. In college, Hannah studied Computer Science and Management at Rensselaer Polytechnic Institute. In her spare time, she likes to climb things.

SpeakerBio:Kurt Opsahl , Deputy Executive Director and General Counsel, EFF
Kurt Opsahl is the Deputy Executive Director and General Counsel of the Electronic Frontier Foundation. In addition to representing clients on civil liberties, free speech and privacy law, Opsahl counsels on EFF projects and initiatives. Opsahl is the lead attorney on the Coders' Rights Project, and is representing several companies who are challenging National Security Letters. Before joining EFF, Opsahl worked at Perkins Coie, where he represented technology clients with respect to intellectual property, privacy, defamation, and other online liability matters, including working on Kelly v. Arribasoft, MGM v. Groksterand CoStar v. LoopNet. For his work responding to government subpoenas, Opsahl is proud to have been called a "rabid dog" by the Department of Justice. Prior to Perkins, Opsahl was a research fellow to Professor Pamela Samuelson at the U.C. Berkeley School of Information Management & Systems. Opsahl received his law degree from Boalt Hall, and undergraduate degree from U.C. Santa Cruz. Opsahl co-authored "Electronic Media and Privacy Law Handbook." In 2007, Opsahl was named as one of the "Attorneys of the Year" by California Lawyer magazine for his work on the O'Grady v. Superior Court appeal. In 2014, Opsahl was elected to the USENIX Board of Directors.

SpeakerBio:nash
nash leads EFF's grassroots, student, and community organizing efforts. As the lead coordinator of the Electronic Frontier Alliance, nash works to support the Alliance's member organizations in educating their neighbors on digital-privacy best practices, and advocating for privacy and innovation protecting policy and legislation.

SpeakerBio:Rory Mir
Rory is a Grassroots Advocacy Organizer primarily working on the Electronic Frontier Alliance. They are also a doctoral student of psychology at the City University of New York Graduate Center studying activist pedagogy. Before coming to the EFF they were active in several New York City groups including the Cypurr Collective, a member of the EFA engaging in community education on matters of cybersecurity. A long time advocate for open education and open science, they want to break down any barriers folks face to free expression, creativity, or knowledge.

SpeakerBio:Tracy Rosenberg
Tracy Rosenberg has worked as Media Alliance's Executive Director since 2007 and coordinates Oakland Privacy, a citizens coalition that works regionally to defend the right to privacy and enhance public transparency and oversight regarding the use of surveillance techniques and equipment. OP has written use policies and impact reports for a variety of surveillance technologies, conducted research and investigations, and developed frameworks for the implementation of equipment with respect for civil rights, privacy protections, and community control. Tracy blogs on media policy and surveillance and is published frequently around the country. She currently sits on the board of the Alliance for Community Media Western Region and Common Frequency serves on the anchor committee of the Media Action Grassroots Network

Description:
Join the Electronic Frontier Foundation—the nation's premiere digital civil liberties group fighting for freedom and privacy in the computer age—for a candid chat about how the law is racing to catch up with technological change and discovery.

Then meet representatives from Electronic Frontier Alliance (eff.org/fight) allied community and campus organizations from across the country. These technologists and advocates are working within their communities to educate and empower their neighbors in the fight for data privacy and digital rights.

This discussion will include updates on current EFF issues such as the government's effort to compromise free expression online, the fight to end face surveillance, updates on cases and legislation affecting security research, and discussion of EFF's technology projects empowering users with greater control of what information they share online.

Half of this session will be given over to question-and-answer, so it's your chance to ask EFF questions about the law, surveillance and technology issues that are important to you.

Discord: https://discord.com/channels/708208267699945503/738141986476916826


DEF CON Fireside Lounges will be live-streamed on Twitch.

Twitch: https://www.twitch.tv/defconorg

#fireside-lounge-text: https://discord.com/channels/708208267699945503/738141986476916826


Return to Index    -    Add to    -    ics Calendar file

 

IOT - Friday - 16:45-17:30 PDT


Title: Assembling VULNtron: 4 CVEs that Turn a Teleconference Robot into a Spy
When: Friday, Aug 7, 16:45 - 17:30 PDT
Where: IOT Vlg

SpeakerBio:Mark Bereza
Mark Bereza is a security researcher and new addition to McAfee's Advanced Threat Research team. A recent alumnus of Oregon State's Computer Science systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems. Mark previously presented at DEFCON 27, less than 6 months after graduating college.

Description:
Once limited to the realm of science fiction, robotics now play a vital role in many industries, including manufacturing, agriculture, and even medicine. Despite this, the kind of robot that interfaces with humans directly, outside of the occasional toy or vacuum, threatens to remain an inhabitant of fiction for the foreseeable future.

temi, a “personal robot” created by Roboteam, may help make that fiction a reality. temi is a smart device for consumer, enterprise, retail, and even medical environments that is capable of both autonomous movement and teleconferencing. It’s precisely this functionality, however, that makes it a valuable target for hackers. Unlike a simple camera exploit, a compromised temi grants an attacker mobility in addition to audio/video, greatly increasing their ability to spy on victims in the most private of situations - their homes, medical appointments, or workplaces.

Not knowing when to quit, McAfee Advanced Threat Research uncovered four 0-day vulnerabilities in the temi. We’ll show how an attacker armed with nothing besides the victim’s phone number could exploit these vulnerabilities to intercept or join an existing temi call, gain video access, and even obtain “owner” privileges, granting the ability to remotely control the robot – all with zero authentication.


IOT Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/iotvillage


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Friday - 15:00-15:59 PDT


Title: Attacking and Defending Blockchain Nodes
When: Friday, Aug 7, 15:00 - 15:59 PDT
Where: Blockchain Vlg

SpeakerBio:Peter Kacherginsky
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 08:30-08:59 PDT


Title: Attacking Flight Management Systems: This Is Your Captain Speaking, We Have A Small Problem!
When: Saturday, Aug 8, 08:30 - 08:59 PDT
Where: Aerospace Vlg
Speakers:Javad Dadgar,Mohammad-Reza Zamiri,Reza Dorosti

SpeakerBio:Javad Dadgar
Javad Dadgar is an independent security researcher. He is currently working as a red teamer and part-time bug bounty hunter with 4 years of experience. Also he is interested in the aviation industry.

SpeakerBio:Mohammad-Reza Zamiri
Mohammad-Reza Zamiri is a cybersecurity researcher with more than 8 years of experience. His research focuses on computer and network security, with an emphasis on detecting vulnerabilities and threats, penetration testing, as well as embedded or cyber-physical systems. He has published several research papers and presented on top conferences including (ACM CCS, ACSAC, Kaspersky) and currently is working as a senior security analyst. He also likes to play CTF and was the champion of the first national ICS CTF(2019) in Iran.

SpeakerBio:Reza Dorosti
Reza Dorosti is a software reverse engineer with more than 15 years of experience with performing dynamic analysis of software binaries and also assembly language, including x86, ARM, MIPS. He is a fan of embedded devices security.

Description:
Modern aircrafts are heavily relied on flight management systems to automate a wide variety of in-flight tasks, including producing flight plans, reducing the workload on the pilot, or allow the airplane to hook up the autopilot. Vulnerabilities in such systems could allow an attacker to manipulate critical data that are important during a flight.

In this talk, we will present the result of our research on the security of a famous flight management system and how we managed to detect a weakness in its security mechanism using reverse engineering. Then we will discuss possible risk scenarios regarding manipulation of mentioned critical data.

During this research, we have found a method to modify the navigation data on a flight management computer and also identified some risk scenarios that we think could cause some problems. We hope this may lead to future research and make the aviation industry more secure.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Saturday - 14:00-14:45 PDT


Title: Attacking the Helmsman
When: Saturday, Aug 8, 14:00 - 14:45 PDT
Where: Cloud Vlg

SpeakerBio:Mohit Gupta
Mohit has been a Security Consultant at F-Secure Consulting (previously known as MWR InfoSecurity) for the past four years with one of his specialiastions in containerisation and orchestration technologies. Mohit leads the delivery of security services in these areas, and has been involved in a wide variety of offensive and defensive security engagements involving Docker, Docker Swarm and Kubernetes. In addition to this, he has developed and led training both externally and internally for these areas.
Twitter: @_Skybound

Description:
Kubernetes is rapidly growing in popularity and is the most popular technology for container orchestration. However, it also brings its own set of challenges and security issues which may lead to novel or unexpected attack scenarios. This talk aims to go over various areas of Kubernetes security and ways that Kubernetes features could be leveraged by an attacker. It will review the core architecture and functionality of Kubernetes from a security perspective, and cover most of the common Kubernetes security features, including Pod Security Policies, Network Policies, and RBAC.

These discussions will be underlined by examples of attack paths that have been found in real-world environments, discussing how it was possible to exploit misconfigurations to escalate privileges with the end goal of compromising the cluster and breaking out into the broader environment.


YouTube: https://www.youtube.com/watch?v=gwBG_oKDINQ

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Friday - 21:45-22:45 PDT


Title: ATTPwn: Adversarial Emulation and Offensive Techniques Collaborative Project
When: Friday, Aug 7, 21:45 - 22:45 PDT
Where: Red Team Vlg
Speakers:Fran Ramirez,Pablo Gonzalez

SpeakerBio:Fran Ramirez
Fran Ramirez has a University degree in Computing Engineering, a Certificate of higher education in Industrial and Digital Electronics, and a Master's degree in Cybersecurity. He has experience working as an IT Senior System Engineer in the USA and Canada, consolidating IT technologies and datacenters. He began working as a Security Researcher at Telefonica and ElevenPaths in 2017. Francisco has also co-written books about Docker and Machine Learning, and been a speaker at Mobile World Congress (Barcelona), Black Hat Europe Arsenal (London), Hacktivity (Hungary), LeHack (Paris) and many other conferences.

SpeakerBio:Pablo Gonzalez
Pablo Gonzalez has a University degree in Computing Engineering and Master's degree in Cybersecurity. He has presented at Black Hat Europe Arsenal (2017, 2018, 2019), BlackHat USA Arsenal 2020, EkoParty 2018, 8dot8 Chile, DragonJAR Colombia, RootedCON, LeHACK 2019, etc. He is a Microsoft MVP 2017-2020. Pablo has written several computer security books, including Metasploit for Pentesters, Ethical Hacking, Pentesting with Kali, Metasploit hacking, Got Root and PowerShell pentesting. He is also a co-founder of flu-project and the founder of hackersClub. With more than 10 years working in cybersecurity and teaching several masters in cybersecurity in Spain, he is currently working as Project/Team Manager and Security Researcher at Telefonica (Ideas Locas department).

Description:
ATTPwn is a computer security open source tool designed to emulate adversaries. The tool aims to bring emulation of a real threat into closer contact with implementations based on the techniques and tactics from the MITRE ATT&CK framework. The goal is to simulate how a threat works in an intrusion scenario, where the threat has been successfully deployed. It is focused on Microsoft Windows systems through the use of the Powershell command line. This enables the different techniques based on MITRE ATT&CK to be applied. ATTPwn is designed to allow the emulation of adversaries as for a Red Team exercise and to verify the effectiveness and efficiency of the organization's controls in the face of a real threat. Furthermore, ATTPwn provides the possibility of knowledge transfer between users. This knowledge is exchanged through implementation of ATT&CK techniques. This new user-generated knowledge can be shared with the community through a special feature within ATTPwn. The collaborative part of ATTPwn enhances the know-how that every users can bring to the community in the shape of offensive techniques, which are always being mapped with ATT&CK.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 19:00-19:59 PDT


Title: Automating Threat Hunting on the Dark Web and other nitty-gritty things
When: Saturday, Aug 8, 19:00 - 19:59 PDT
Where: Red Team Vlg

SpeakerBio:Apurv Singh Gautam
Apurv Singh Gautam is pursuing his Master's in Cybersecurity from Georgia Tech. He commenced work in Threat Intel/Hunting 2 years ago. Throughout his professional career, he worked on hunting threats from both clear web and dark web and is also involved in performing HUMINT on the d2web. He is very passionate about giving back to the community and has already conducted several talks and seminars in local security meetups, schools, and colleges. He loves volunteering with Cybrary and Station X to help students make their way in Cybersecurity. He looks forward to the end of the day to play and stream one of the AAA games Rainbow Six Siege.

Description:
What's the hype with the dark web? Why are security researchers focusing more on the dark web? How to perform threat hunting on the dark web? If you are curious about the answers to these questions, then this talk is for you. Dark web hosts several sites where criminals buy, sell, and trade goods and services like drugs, weapons, exploits, etc. Hunting on the dark web can help identify, profile, and mitigate any organization risks if done timely and appropriately. This is why threat intelligence obtained from the dark web can be crucial for any organization. In this presentation, you will learn why threat hunting on the dark web is necessary, different methodologies to perform hunting, the process after hunting, and how hunted data is analyzed. The main focus of this talk will be automating the threat hunting on the dark web. You will also get to know what operational security (OpSec) is and why it is essential while performing hunting on the dark web and how you can employ it in your daily life.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 15:00-15:50 PDT


Title: Automotive Ethernet for the rest of us
When: Friday, Aug 7, 15:00 - 15:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Infenet
Lifelong hacker and hacker of all the things. Founder of Enterprise Offensive Security, creator of security tools for DevOps Engineers such as auto-remediation using AWS Lambda and CIS Compliance Scanning Tools, SSO implementations on the Service Provider and Identity Provider side(s). Simulated Advanced Persistent Threat Actor. Started DEFCON group in Detroit DC313 and Director of #misec Detroit.

Description:
Discover the latest in Automotive Ethernet adoption, learn who is using Automotive Ethernet and why are they using Automotive Ethernet.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 15:00-15:50 PDT


Title: Automotive Ethernet for the rest of us
When: Saturday, Aug 8, 15:00 - 15:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Infenet
Lifelong hacker and hacker of all the things. Founder of Enterprise Offensive Security, creator of security tools for DevOps Engineers such as auto-remediation using AWS Lambda and CIS Compliance Scanning Tools, SSO implementations on the Service Provider and Identity Provider side(s). Simulated Advanced Persistent Threat Actor. Started DEFCON group in Detroit DC313 and Director of #misec Detroit.

Description:
Discover the latest in Automotive Ethernet adoption, learn who is using Automotive Ethernet and why are they using Automotive Ethernet.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 10:00-10:50 PDT


Title: Automotive In-Vehicle Networks
When: Friday, Aug 7, 10:00 - 10:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Kamel Ghali
Kamel Ghali is a veteran of the automotive security industry, with experience working both within the automotive industry and as an external consultant. His passion for automotive security goes beyond his work, with him volunteering as an instructor for the Society of Automotive Engineers (SAE) Cyber Auto Challenge and leading the Japanese branch of the Automotive Security Research Group (ASRG). He's a two-time finalist of the Car Hacking Village's annual DefCon CTF and active member of the CHV community. He currently works at White Motion, an automotive cybersecurity firm based in Tokyo, Japan.

Description:
Modern vehicles are home to tens of Electronic Control Units (ECUs) that each manage a different subsystem of the vehicle. With the control of the vehicle distributed across so many machines, sharing information in a robust, timely manner becomes a necessity. In-Vehicle Networks were developed to meet these communication needs, bringing functionality optimized for the automotive environment into the industry. In this CHV101 lecture, we'll explore the different In-Vehicle Network technologies used in vehicles today and each of their strengths and applications.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 10:00-10:50 PDT


Title: Automotive In-Vehicle Networks
When: Saturday, Aug 8, 10:00 - 10:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Kamel Ghali
Kamel Ghali is a veteran of the automotive security industry, with experience working both within the automotive industry and as an external consultant. His passion for automotive security goes beyond his work, with him volunteering as an instructor for the Society of Automotive Engineers (SAE) Cyber Auto Challenge and leading the Japanese branch of the Automotive Security Research Group (ASRG). He's a two-time finalist of the Car Hacking Village's annual DefCon CTF and active member of the CHV community. He currently works at White Motion, an automotive cybersecurity firm based in Tokyo, Japan.

Description:
Modern vehicles are home to tens of Electronic Control Units (ECUs) that each manage a different subsystem of the vehicle. With the control of the vehicle distributed across so many machines, sharing information in a robust, timely manner becomes a necessity. In-Vehicle Networks were developed to meet these communication needs, bringing functionality optimized for the automotive environment into the industry. In this CHV101 lecture, we'll explore the different In-Vehicle Network technologies used in vehicles today and each of their strengths and applications.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Sunday - 08:30-09:30 PDT


Title: Autonomous Security Analysis and Penetration Testing (ASAP)
When: Sunday, Aug 9, 08:30 - 09:30 PDT
Where: Red Team Vlg

SpeakerBio:Ankur Chowdhary
Ankur Chowdhary is a PhD candidate at Arizona State University (ASU). His research interests include Cloud Security, Software Defined Networks, and application of Artificial Intelligence and Machine Learning in the field of cybersecurity. Ankur has over 5 years of cybersecurity industry experience. He has worked for companies like CSC Pvt. Ltd., Republic Services, Blackberry Pvt. Ltd., and Bishop Fox. Ankur has co-authored over 25 research papers and one textbook in the field of cybersecurity. Ankur co-founded cybersecurity startup CyNET LLC (2017). Ankur has been quite active in cybersecurity education. Ankur was ASU’s National Cybersecurity Defense Competition (NCCDC) captain (2015-2018), and he is current team coach (2018-). He co-founded hacking club DevilSec in 2019 to teach offensive and defensive security to students at ASU.

Description:
Penetration Testing (Pentesting) involves skilled cybersecurity professionals generating a plan of attack for finding and exploiting vulnerabilities in the networks, and applications. The current procedure used in pen-testing is semi-automated at best and requires significant human effort. Moreover, the plan of attack followed by pen-testers may not yield best outcomes in terms of exploiting vulnerabilities in the provided time. Our framework, ASAP utilizes software vulnerabilities and network topology information to provide an artificial intelligence-based automated attack plan. Our framework Autonomous Security Analysis and Penetration Testing (ASAP) utilizes the reachability information between different network hosts and software vulnerabilities to generate a state transition graph known as attack graph. Each state in the attack graph represents the current privilege of the attacker. The attack graph also encodes information about the possible next state transitions in the network. In effect attack graph maps all possible exploits and privilege escalations possible in a network. This information is provided to Artificial Intelligence (AI) module. The AI module utilizes a popular framework known as Partially Observable Markov Decision Process (POMDP) to encode uncertainty over different state transitions, and reward obtained by attackers on achieving different privilege levels. The output generated by the AI module - Attack Policy provides the best course of action for a penetration tester/ red team member in the current network setup. The attack policy generated by the ASAP framework can be deployed on target enterprise networks using automated exploitation tools such as Metasploit. Based on our experimental evaluation in a cloud network setup, the attack policy generated by our framework does significantly better than human penetration testers in terms of finding and exploiting vulnerabilities in a network.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 09:00-15:59 PDT


Title: Aviation Privacy Treasure Hunt
When: Friday, Aug 7, 09:00 - 15:59 PDT
Where: Aerospace Vlg

SpeakerBio:Martin Strohmeier
Martin Strohmeier is a Junior Research Fellow of Kellogg College, University of Oxford and a Senior Scientist at the Swiss Cyber Defence Campus.The main focus of his work has been the design, implementation, and analysis of security protocols for cyber-physical systems, specifically those used in critical infrastructures such as aviation (civil and military). Using these domains as a driver for the real-world applicability of his research, his work has been published in many diverse venues, spanning wireless communications, cryptography, systems security, sensor networking, privacy, and aviation.

After his DPhil, he has been extending his interests towards areas of open-source intelligence, privacy issues in aviation and satellite environments, and most recently adversarial machine learning. Martin is also a co-founder of the aviation research network OpenSky where he is responsible for communication and research activities.


Description:
This OSINT CTF sends the participant on a wild treasure hunt across open aviation data, demonstrating the severe impact of some of the issues surrounding aviation tracking and datalink privacy. The participants will learn how the lack of security in wireless protocols affects the privacy of passengers and aircraft operators alike and how to exploit them. This treasure hunt will cover privacy leaks on datalinks and ATC communication used by corporate, government, military and commercial aircraft. We will actively engage with countermeasures and mitigations, showing which ones are helpful and which ones are not. This will include the most current industry attempts, including the FAA’s Privacy ICAO Address programme and ACARS encryption measures. For this CTF, we will use a mixture of OSINT data sources available on the web, exclusive real-world datasets, and mock data based on our research over the past five years.

Return to Index    -    Add to    -    ics Calendar file

 

BTVW1 - Sunday - 15:00-15:45 PDT


Title: Azure AD Logs for the Blue Team (Intermediate)
When: Sunday, Aug 9, 15:00 - 15:45 PDT
Where: Blue Team Vlg - Workshop Track 1

SpeakerBio:Mark Morowczynski
Mark Morowczynski (@markmorow) is a Principal Program Manager on the customer success team in the Microsoft Identity division. He spends most of his time working with customers on their deployments of Azure Active Directory. Previously he was Premier Field Engineer supporting Active Directory, Active Directory Federation Services and Windows Client performance. He was also one of the founders of the AskPFEPlat blog. He's spoken at various industry events such as Black Hat 2019, Bsides, Microsoft Ignite, Microsoft Inspire, Microsoft Ready, Microsoft MVP Summits, The Cloud Identity Summit, SANs Security Summits and TechMentor. He can be frequently found on Twitter as @markmorow arguing about baseball and making sometimes funny gifs.
Twitter: @markmorow

Description:
As enterprises move to cloud resources like Office365 and Azure AD it is imperative that they proactively monitor and protect against potential threats. But these vast quantities of security data are of no value if you, as a security admin, cannot make sense of it. In this session we'll explore the data that's available in Azure AD logs, how to integrate it with 3rd party SIEMs and get actionable insights from it. We'll also share the best practices on consuming Azure AD logs based on our insights from working with large enterprises.
Outline
Understanding the different types of logs in Azure AD (Sign-In, Audit, Risk, Application) what data is in each of them. (15 mins) Example Conditional Access Sign-in Logs (2 mins) Example Service Principal Log (2 mins) Understanding how to send logs to SIEMS (5 mins) Demo Configuring Azure Monitor Event Hub to send to 3rd party SIEM (2 mins) Understanding key events to look for and why (10 mins) Demo Using Azure work books and Log Analytics to look for key events (5 mins) Q and A (Remaining time)

This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

AIV - Friday - 10:30-10:59 PDT


Title: Baby's First 100 MLSec Words
When: Friday, Aug 7, 10:30 - 10:59 PDT
Where: AI Vlg

SpeakerBio:erickgalinkin
No BIO available
Twitter: @erickgalinkin

Description:No Description available

AI Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/aivillage


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 01:00-01:59 PDT


Title: Back to the future: Computer science and systems biology 
When: Saturday, Aug 8, 01:00 - 01:59 PDT
Where: Red Team Vlg
Speakers:Dr Lorenz Adlung,Noa Novogroder

SpeakerBio:Dr Lorenz Adlung
Dr. Lorenz Adlung (@lorenzadlung) obtained his PhD from Heidelberg University in Germany. Since 2017 he's a visiting scientist at the Weizmann Institute of Science in Israel working in the field of computational biology, with strong emphasis on both, the computation and the biology. Besides his profession, his main passion is science communication, preferably through poetry and performance.

SpeakerBio:Noa Novogroder
Noa Novogroder (@noanovo) graduated from the first round of the Israeli cyber security academy and is currently a master student at the Weizmann Institute of Science in Israel. Before turning into biology, she’s worked for several years at Checkpoint, an Israeli high-tech company in the field of cyber security. In her free time, she likes to swim and offer cure to obese mice.
Twitter: @noanovo

Description:
Which creature implemented code injection 1.5 billion years before any computer malware did? What is the decoding algorithm being used in each of our cells to run the program written in our genes? As computer scientists, we are pushing the edge to develop disruptive technologies for the future. In fact, we can learn from an industry that has been evolving since long before humankind existed: The evolution of biological systems. With our proposal we hope to show the incredible parallels between bacteria and computer malware, the complex algorithms implemented in each of our cells, and how each plays a pivotal role in furthering the research of the other. This lecture will take the audience on an educational journey through both disciplines. This will foster interdisciplinary collaboration and inspire innovative solutions to future challenges for instance in the context of synthetic biology (i.e. creating artificial life), or personalized medicine (i.e. machine learning to treat patients). We are made up of trillions of computational devices. The cells within our body are information-processing units, with memory, storage, cooling and communication devices. Hardware for executable programs was very successfully shaped during the evolution of uncountable biological entities. We are presenting a wormhole between the two parallel universes of computer science and systems biology. A leap through space and time will allow us to connect the evolution of life with recent advances in computer science. An intimate exchange between the computational and the biological spheres is a prerequisite for future generations to work together on aspects of gene editing, robotics and artificial intelligence. As an incentive, we will perform a small quiz during our lecture with attractive prizes. It is our firm belief that we are the right team to foster discussions on life-inspired computer (r)evolution. Lorenz holds a PhD in Systems Biology and works as a freelancing author, consultant and keynote speaker besides being a visiting scientist at the Weizmann Institute of Science, Israel. Noa is a cyber-security expert with seven years of work experience in a high-profile IT company in Israel. Together we will stir an interactive debate on the subject.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

PHVW - Sunday - 09:00-12:59 PDT


Title: Bad Active Directory (BAD)
When: Sunday, Aug 9, 09:00 - 12:59 PDT
Where: Packet Hacking Vlg - Workshop
Speakers:Dhruv Verma,Michael Roberts,Xiang Wen Kuan

SpeakerBio:Dhruv Verma , Senior Security Consultant, NCC Group
Dhruv Verma is a Senior Security Consultant at NCC Group, an information security firm specializing in application, network, and mobile security. Dhruv has extensive experience performing infrastructure assessments with a special interest in Windows Active Directory environments and projects involving social engineering vectors. He has gotten domain admin on multiple client networks by chaining together vulnerabilities in a very unique and interesting fashion. For instance, Dhruv combined a misconfigured Jenkins server with a AWS IAM privilege escalation attack to gain Domain Admin on an enterprise network via a clone'n'pwn attack.

SpeakerBio:Michael Roberts , Senior Security Consultant, NCC Group
Michael Roberts is a Senior Security Consultant with NCC Group. Michael performs web, mobile application and network penetration tests, and has a passion for virtual reality and cooking outside of work life. Michael holds an bachelor's degree in computer and information technology from Purdue University.

SpeakerBio:Xiang Wen Kuan , Security Consultant, NCC Group
Xiang Wen Kuan is a Security Consultant at NCC Group. Kuan has conducted some infrastructure assessments and first started BAD under the supervision of Dhruv and Michael as his intern project at NCC. Kuan is as exciting as Kashi cereal and likes to eat free food at hacker events.

Description:
This is an introductory to intermediate level Windows active directory (AD) training. The training has two parts: a lecture component, where we'll cover how active directory works and the core things you need to know to attack it effectively, and a series of hands-on labs modeled after real attacks we've performed on client environments. The training will be heavily lab focused, with each student receiving their own AWS environment to play with. The labs are based off of how real modern networks look, not example test environments, and successfully completing each lab involves chaining together multiple vulnerabilities in a realistic kill chain methodology to get domain admin.

This workshop requires registration. If you are registered, please proceed to #phv-infobooth-text and you'll be given access to join.

#phv-infobooth-text: https://discord.com/channels/708208267699945503/708242376883306526


Return to Index    -    Add to    -    ics Calendar file

 

MOV - Saturday - 13:30-14:30 PDT


Title: Badge Clinic
When: Saturday, Aug 8, 13:30 - 14:30 PDT
Where: Monero Vlg

SpeakerBio:Michael Schloh von Bennewitz
No BIO available

Description:
With the help of a close range circuit camera, Michael illustrates the circuits of several recent conference hardware devices, including prototype models. Devices in circulation and on display include: DC28 Intervillage Badge DC27 Rising Badge 35C3 Blockchain DC26/BCOS Badge HCPP19 Badge HCPP18 Badge This is not a speech presentation, rather it is an easy office hours with show and tell to invite questions and answers about low power electronic devices. Visit the Badge Clinic on any day of Defcon in the Monero Village channel.

Monero Village activities will be streamed to Twitch and YouTube.

Twitch: https://www.twitch.tv/monerovillage/

YouTube: https://www.youtube.com/c/monerocommunityworkgroup/

#mv-general-text: https://discord.com/channels/708208267699945503/732733510288408676


Return to Index    -    Add to    -    ics Calendar file

 

MOV - Sunday - 13:30-14:30 PDT


Title: Badge Clinic
When: Sunday, Aug 9, 13:30 - 14:30 PDT
Where: Monero Vlg

SpeakerBio:Michael Schloh von Bennewitz
No BIO available

Description:
With the help of a close range circuit camera, Michael illustrates the circuits of several recent conference hardware devices, including prototype models. Devices in circulation and on display include: DC28 Intervillage Badge DC27 Rising Badge 35C3 Blockchain DC26/BCOS Badge HCPP19 Badge HCPP18 Badge This is not a speech presentation, rather it is an easy office hours with show and tell to invite questions and answers about low power electronic devices. Visit the Badge Clinic on any day of Defcon in the Monero Village channel.

Monero Village activities will be streamed to Twitch and YouTube.

Twitch: https://www.twitch.tv/monerovillage/

YouTube: https://www.youtube.com/c/monerocommunityworkgroup/

#mv-general-text: https://discord.com/channels/708208267699945503/732733510288408676


Return to Index    -    Add to    -    ics Calendar file

 

DCG - Saturday - 12:00-12:59 PDT


Title: Basic OSINT: Mining Personal Data
When: Saturday, Aug 8, 12:00 - 12:59 PDT
Where: DEF CON Groups

Description:
Presentation by DC574 (Indiana, USA)

All DEF CON Groups presentations are happening in AltSpace.

AltSpace: https://account.altvr.com/events/1520704529866162594

Listen @ #dcg-stage-voice: https://discord.com/channels/708208267699945503/740428852999880704

Interact @ #dcg-stage-text: https://discord.com/channels/708208267699945503/710379858429083698


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Saturday - 09:00-09:59 PDT


Title: Be Like Water: What Bruce Lee Can Teach Us About AppSec
When: Saturday, Aug 8, 09:00 - 09:59 PDT
Where: AppSec Vlg

SpeakerBio:Fredrick "Flee" Lee
No BIO available
Twitter: @fredrickl

Description:
Every few years, security “thought leaders” tell us what is the one, proper way to practice application security. I’m just as guilty of this as anyone else in the “industry”. But, it turns out there isn’t just one true style of effective AppSec. This talk walks through my path of letting go of dogma, finding my style, and returning back to always being a student of the game. “Absorb what is useful, reject what is useless, add what is essentially your own.”

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Be the Match - registration drive
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Be the Match registration drive is returning once again! Swing by and check out one of the coolest biohacks out there, and how you could be the next person to save a life through cellular therapy.

Discord: https://discord.com/channels/708208267699945503/711643405004046457

Web: https://bethematch.org


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Be the Match - registration drive
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Be the Match registration drive is returning once again! Swing by and check out one of the coolest biohacks out there, and how you could be the next person to save a life through cellular therapy.

Discord: https://discord.com/channels/708208267699945503/711643405004046457

Web: https://bethematch.org


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Be the Match - registration drive
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Be the Match registration drive is returning once again! Swing by and check out one of the coolest biohacks out there, and how you could be the next person to save a life through cellular therapy.

Discord: https://discord.com/channels/708208267699945503/711643405004046457

Web: https://bethematch.org


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 12:00-12:59 PDT


Title: Before J1939: A J1708/J1587 Protocol Decoder
When: Friday, Aug 7, 12:00 - 12:59 PDT
Where: Car Hacking Vlg 002
Speakers:Thomas Hayes,Dan Salloum

SpeakerBio:Thomas Hayes
Thomas Hayes is a Hardware Engineer at Bendix Commercial Vehicle Systems in Elyria, OH and a member of the SAE J1939 committees. In his current role, he manages the hardware process for braking and other heavy vehicle systems from brainstorming with napkin drawings to the creation of full PCBs to product testing and manufacturing. Prior to Bendix Thomas held design and leadership roles in a number of venture backed startups and worked in simulation technology for the aviation industry. In his spare time, Thomas enjoys rebuilding vintage motorcycles and teaching kids how to solder without burning their fingers off: success rate unknow.

SpeakerBio:Dan Salloum
Daniel Salloum is a Reverse Engineer by title and curious at heart. He is currently employed by Assured Information Security where he spends his days doing security evaluations and creating tools that help. His background as both a system administrator and programmer help him to navigate system innards. If it must be done more than twice, he'll script it. If it can be recreated in a few hours, it probably will be. Daniel has recently been accepted into the world of ham radio, and may be heard on the airwaves at some point. This is his first conference and expects it won't be the last.

Description:
Medium and heavy duty equipment communicate over vehicle networks using a number of protocols and busses. While researching the interaction between tractors and semi-trailers, we identified the presence of two legacy protocols, J1708 (physical layer), and J1587 (transport layer). The current mechanisms to capture and decode this data do not promote cost efficient data DISCOVERY, but as a team, we have developed techniques that will allow us to use existing diagnostic hardware to capture and decode J1587, and J1708, messages from the vehicle bus.

pretty_1587, our software application, has been designed to process input streams and convert SAE J1708 and J1587 messages to a convenient format that a user can read or pass to another software application. Our open source python code has been designed to be versatile and to work with the output of existing diagnostic tools and can consume data over network sockets, from files, or from stdin, allowing most hardware solutions that interface directly with the serial bus will be able to pass data to pretty_1587 to decode the data contained in the J1587 messages.



#chv-track002-text: https://discord.com/channels/708208267699945503/739564953014632579

YouTube: https://www.youtube.com/watch?v=5DYhXbWkWoA&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack002


Return to Index    -    Add to    -    ics Calendar file

 

DC - Sunday - 14:30-14:59 PDT


Title: Beyond Root: Custom Firmware for Embedded Mobile Chipsets
When: Sunday, Aug 9, 14:30 - 14:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Christopher Wade , Security Consultant at Pen Test Partners
Chris is a seasoned security researcher and consultant. His main focuses are in reverse engineering hardware, fingerprinting USB vulnerabilities and playing with Software Defined Radios, with his key strength lying in firmware analysis, which he utilizes as part of the hardware testing team at Pen Test Partners.

Description:
Rooting a smartphone is often considered the ultimate method to allow a user to take complete control of their device. Despite this, many smartphones contain hardware which is closed off to any modification. This talk aims to show how this hardware can be reverse engineered in order to bypass its protections and further expand its functionality.

Using proprietary NFC Controllers as an example, we will cover analysis of the protocols used by the chips, how the firmware protections could be broken, and how custom firmware could be developed and deployed to the phone with no hardware modifications. This will include methodologies for analyzing weaknesses in firmware update protocols, leveraging the Unicorn CPU Emulator to bypass debugging restrictions, and techniques for reverse engineering the hardware capabilities of an unknown chip in order to implement custom features. This will end with demonstration of a smartphone with passive NFC sniffing capabilities and expanded tag emulation functionality.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Bio-Hacking - Hospital Under Siege
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Adversaries have gained a foothold in your local hospital and are increasing their control over clinical systems and medical devices. Soon they make it clear they’re not after patient records or financial information, but are out to disrupt care delivery and put patients lives at risk. Your team received an urgent request to use your blue, red, and purple team skills to defend against the escalating attacks, attempt to unmask the adversary, and - above all - protect patient lives.

Hospital Under Siege is a scenario-driven Capture the Flag contest run by the Biohacking Village, pitting teams of participants against adversaries and against a clock, to protect human life and public safety. Participants will compete against each other on both real and simulated medical devices, in the fully immersive Biohacking Village: Device Lab, laid out as a working hospital. Teams of any size are welcome, as are players from all backgrounds and skill levels. Challenges will be tailored for all skill levels and draw from expertise areas including forensics, RF hacking, network exploitation techniques, web security, protocol reverse engineering, hardware hacking, and others. You will hack actual medical devices and play with exotic protocols like DICOM, HL7 and FHIR.


Forum: https://forum.defcon.org/node/232894

Discord: https://discord.com/channels/708208267699945503/711643365120278540

Twitter: https://twitter.com/DC_BHV

Web: https://www.villageb.io/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Bio-Hacking - Hospital Under Siege
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Adversaries have gained a foothold in your local hospital and are increasing their control over clinical systems and medical devices. Soon they make it clear they’re not after patient records or financial information, but are out to disrupt care delivery and put patients lives at risk. Your team received an urgent request to use your blue, red, and purple team skills to defend against the escalating attacks, attempt to unmask the adversary, and - above all - protect patient lives.

Hospital Under Siege is a scenario-driven Capture the Flag contest run by the Biohacking Village, pitting teams of participants against adversaries and against a clock, to protect human life and public safety. Participants will compete against each other on both real and simulated medical devices, in the fully immersive Biohacking Village: Device Lab, laid out as a working hospital. Teams of any size are welcome, as are players from all backgrounds and skill levels. Challenges will be tailored for all skill levels and draw from expertise areas including forensics, RF hacking, network exploitation techniques, web security, protocol reverse engineering, hardware hacking, and others. You will hack actual medical devices and play with exotic protocols like DICOM, HL7 and FHIR.


Forum: https://forum.defcon.org/node/232894

Discord: https://discord.com/channels/708208267699945503/711643365120278540

Twitter: https://twitter.com/DC_BHV

Web: https://www.villageb.io/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Bio-Hacking - Hospital Under Siege
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Adversaries have gained a foothold in your local hospital and are increasing their control over clinical systems and medical devices. Soon they make it clear they’re not after patient records or financial information, but are out to disrupt care delivery and put patients lives at risk. Your team received an urgent request to use your blue, red, and purple team skills to defend against the escalating attacks, attempt to unmask the adversary, and - above all - protect patient lives.

Hospital Under Siege is a scenario-driven Capture the Flag contest run by the Biohacking Village, pitting teams of participants against adversaries and against a clock, to protect human life and public safety. Participants will compete against each other on both real and simulated medical devices, in the fully immersive Biohacking Village: Device Lab, laid out as a working hospital. Teams of any size are welcome, as are players from all backgrounds and skill levels. Challenges will be tailored for all skill levels and draw from expertise areas including forensics, RF hacking, network exploitation techniques, web security, protocol reverse engineering, hardware hacking, and others. You will hack actual medical devices and play with exotic protocols like DICOM, HL7 and FHIR.


Forum: https://forum.defcon.org/node/232894

Discord: https://discord.com/channels/708208267699945503/711643365120278540

Twitter: https://twitter.com/DC_BHV

Web: https://www.villageb.io/


Return to Index    -    Add to    -    ics Calendar file

 

ETV - Sunday - 10:00-10:59 PDT


Title: Blackmail, Extortion and the Ethics of Disclosure
When: Sunday, Aug 9, 10:00 - 10:59 PDT
Where: Ethics Vlg

SpeakerBio:Michael Antonino
No BIO available

Description:
This will be a live talk.


Twitch: https://www.twitch.tv/ethicsvillage

#ev-talks-voice: https://discord.com/channels/708208267699945503/730299696454696980

#ev-general-text: https://discord.com/channels/708208267699945503/732732980342030449


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Saturday - 13:00-13:30 PDT


Title: Blockchain for Cyber Defense: Will it be as good as you think?
When: Saturday, Aug 8, 13:00 - 13:30 PDT
Where: Blockchain Vlg
Speakers:Seungjoo,Suhyeon Lee

SpeakerBio:Seungjoo
No BIO available

SpeakerBio:Suhyeon Lee
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

BTVT1 - Saturday - 14:00-14:59 PDT


Title: Blue Team Village & Red Team Village Panel
When: Saturday, Aug 8, 14:00 - 14:59 PDT
Where: Blue Team Vlg - Talks Track 1
Speakers:Joseph Mlodzìanowskì (cedoXx),Adam Mashinchi,Plug,Dani,Jorge Orchilles,David J. Bianco

SpeakerBio:Joseph Mlodzìanowskì (cedoXx)
No BIO available
Twitter: @cedoxX

SpeakerBio:Adam Mashinchi
Adam Mashinchi is SCYTHE's VP of Product Management where he leads the project management, design, and quality assurance departments for SCYTHE's product portfolio. Before SCYTHE, Adam defined and managed the development of enterprise security and privacy solutions with an emphasis on usable encryption at a global scale and led numerous technical integration projects with a variety of partners and services.
Twitter: @adam_mashinchi

SpeakerBio:Plug
No BIO available
Twitter: @plugxor

SpeakerBio:Dani
No BIO available
Twitter: @_ChezDaniela

SpeakerBio:Jorge Orchilles
No BIO available
Twitter: @jorgeorchilles

SpeakerBio:David J. Bianco
David is a defensive security researcher specializing in incident detection & response. HIs major focus areas are threat hunting and the strategic consumption of Cyber Threat Intelligence. He's currently a Principal Engineer, Cybersecurity at a major US retailer.

David is probably most well known as the originator of the Pyramid of Pain and the Hunting Maturity Model. You can follow him online via Twitter @DavidJBianco or subscribe to his blog, Enterprise Detection & Response.

Twitter: @DavidJBianco

Description:No Description available

Blue Team Village activities in 'Talks Track 1' will be streamed to Twitch.

Twitch: https://twitch.tv/BlueTeamVillage


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 14:00-14:50 PDT


Title: Bluetooth Security in Automotive
When: Friday, Aug 7, 14:00 - 14:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Kamel Ghali
Kamel Ghali is a veteran of the automotive security industry, with experience working both within the automotive industry and as an external consultant. His passion for automotive security goes beyond his work, with him volunteering as an instructor for the Society of Automotive Engineers (SAE) Cyber Auto Challenge and leading the Japanese branch of the Automotive Security Research Group (ASRG). He's a two-time finalist of the Car Hacking Village's annual DefCon CTF and active member of the CHV community. He currently works at White Motion, an automotive cybersecurity firm based in Tokyo, Japan.

Description:
Bluetooth is a short-range cable replacement technology that is found in millions of IoT devices around the world. Due to its ubiquity and breadth of functionality, it's been seen in vehicles as early as the late 2000s. While commonly used for phonebook access, hands-free phone usage, and media control, Bluetooth is nonetheless an important vector to consider when analyzing a vehicle's security case. In this CHV101 lecture, we'll explore Bluetooth as a technology and its relevance to automotive cybersecurity.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 14:00-14:50 PDT


Title: Bluetooth Security in Automotive
When: Saturday, Aug 8, 14:00 - 14:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Kamel Ghali
Kamel Ghali is a veteran of the automotive security industry, with experience working both within the automotive industry and as an external consultant. His passion for automotive security goes beyond his work, with him volunteering as an instructor for the Society of Automotive Engineers (SAE) Cyber Auto Challenge and leading the Japanese branch of the Automotive Security Research Group (ASRG). He's a two-time finalist of the Car Hacking Village's annual DefCon CTF and active member of the CHV community. He currently works at White Motion, an automotive cybersecurity firm based in Tokyo, Japan.

Description:
Bluetooth is a short-range cable replacement technology that is found in millions of IoT devices around the world. Due to its ubiquity and breadth of functionality, it's been seen in vehicles as early as the late 2000s. While commonly used for phonebook access, hands-free phone usage, and media control, Bluetooth is nonetheless an important vector to consider when analyzing a vehicle's security case. In this CHV101 lecture, we'll explore Bluetooth as a technology and its relevance to automotive cybersecurity.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

LPV - Saturday - 15:00-15:59 PDT


Title: Bobby Pins, More Effective Than Lockpicks?
When: Saturday, Aug 8, 15:00 - 15:59 PDT
Where: Lockpick Vlg

SpeakerBio:John the Greek
No BIO available

Description:
When should you not have picks in your pocket? Answer, never... but

This course will present to the novice and the less prepared suggestions for improvising lockpicks when the proper tools are not on hand as well as techniques of bypass that are more effective than trying to pick a lock especially when you don't have the proper tools on hand. This class is ideal for our current situation! Those interested should look around their locations for the following:

Bobby pins
Paper clips (big ones)
Pocket clips from ink pens (Pilot rollerball) Old Wind Shield Wipers
Spark Plug Gappers
Bra Underwire

... and my favorite
Street cleaner bristles

The course will take approximately and hour


Lockpick Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/toool_us


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 13:30-13:59 PDT


Title: Breakdown Of The FAA's Privacy ICAO Address Program
When: Sunday, Aug 9, 13:30 - 13:59 PDT
Where: Aerospace Vlg

SpeakerBio:Gui Michel
Gui is a Master student in the joint degree in Cybersecurity at EPFL and ETH Zürich. His research interests lie in distributed systems, computer security and privacy.

Description:
The FAA launched the Privacy ICAO Address (PIA) program in January 2020 to address privacy concerns in General Aviation in the United States. This talk will present an analysis on the privacy performance of this program in its current state and our predictions for the future. We will demonstrate that it is possible to identify aircraft despite being enrolled in the program, using ADS-B data from crowdsourced networks. The privacy loss of participating aircraft over time is quantified through a purpose-built privacy simulator, showing that tracking is possible, even with a much greater participation in the program in the future. To address these issues, we will present two solutions that could significantly improve the privacy of the PIA program going forward.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Sunday - 11:00-11:59 PDT


Title: Breaking the Attack Chain
When: Sunday, Aug 9, 11:00 - 11:59 PDT
Where: Red Team Vlg
Speakers:Corey Ham,Matt Eidelberg

SpeakerBio:Corey Ham
Corey Ham & Matt Eidelberg are principal consultants/leaders within Optiv's advanced services sub-team. Together they have 13 years combined experience delivering offensive security engagements for clients, along with personal tool development and research.

SpeakerBio:Matt Eidelberg
Corey Ham & Matt Eidelberg are principal consultants/leaders within Optiv's advanced services sub-team. Together they have 13 years combined experience delivering offensive security engagements for clients, along with personal tool development and research. Matthew has presented at multiple conferences across North America.

Description:
Despite the rising tide of security maturity, targeted attack chains are often successful due to systemic weaknesses in how modern IT administrators and blue teams operate. This talk gives the attacker's perspective on how common attack chains can be stopped before they spiral out of control. This talk is fueled by two red team operators field experience in attacking modern enterprise environments. It will cover various tactics and techniques that are used with high success during red team engagements, as well as specific countermeasures that would hamper the success of the described attack chains. The speakers will cover a hypothetical red team style engagement, starting from a limited-knowledge basis on the Internet, moving to an internal foothold, leading to data compromise. This talk will focus on technical details at an executive level, and will be performed in a "debrief" style with no technical specifics or demos.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 12:00-17:59 PDT


Title: Bricks in the Air
When: Friday, Aug 7, 12:00 - 17:59 PDT
Where: Aerospace Vlg Workshop

Description:
A huge hit at Def Con 27, we’ve partnered with the Defense Digital Service to bring back Bricks-In-The-Air for #DEFCON28SafeMode. Whether you’re a noob or a pro, this is your chance to attempt sending messages to mock LEGO aircraft over I2C to learn and experiment with direct injection attacks on a data bus.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:00-15:59 PDT


Title: Bricks in the Air
When: Saturday, Aug 8, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
A huge hit at Def Con 27, we’ve partnered with the Defense Digital Service to bring back Bricks-In-The-Air for #DEFCON28SafeMode. Whether you’re a noob or a pro, this is your chance to attempt sending messages to mock LEGO aircraft over I2C to learn and experiment with direct injection attacks on a data bus.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 09:00-13:59 PDT


Title: Bricks in the Air
When: Sunday, Aug 9, 09:00 - 13:59 PDT
Where: Aerospace Vlg Workshop

Description:
A huge hit at Def Con 27, we’ve partnered with the Defense Digital Service to bring back Bricks-In-The-Air for #DEFCON28SafeMode. Whether you’re a noob or a pro, this is your chance to attempt sending messages to mock LEGO aircraft over I2C to learn and experiment with direct injection attacks on a data bus.

Return to Index    -    Add to    -    ics Calendar file

 

HTS - Friday - 12:00-12:59 PDT


Title: Build a Raspberry AIS
When: Friday, Aug 7, 12:00 - 12:59 PDT
Where: Hack the Sea Vlg

SpeakerBio:Dr. Gary Kessler
No BIO available

Description:No Description available

Hack the Sea Village activities will be streamed to Twitch.

Twitch: https://twitch.tv/hackthesea


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Sunday - 11:00-11:59 PDT


Title: Building a Microcontroller Bitcoin Address Generator
When: Sunday, Aug 9, 11:00 - 11:59 PDT
Where: Blockchain Vlg
Speakers:chaintuts,Josh McIntyre

SpeakerBio:chaintuts
No BIO available

SpeakerBio:Josh McIntyre
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

ICS - Saturday - 14:15-15:15 PDT


Title: Building a Physical Testbed for Blackstart Restoration under Cyber Fire
When: Saturday, Aug 8, 14:15 - 15:15 PDT
Where: ICS Vlg

SpeakerBio:Tim Yardley
No BIO available

Description:No Description available

ICS Village activities will be streamed to YouTube and Twitch.

YouTube: https://www.youtube.com/channel/UCI_GT2-OMrsqqglv0JijHhw

Twitch: https://www.twitch.tv/ics_village


Return to Index    -    Add to    -    ics Calendar file

 

BTVT1 - Friday - 13:30-14:30 PDT


Title: Building BLUESPAWN: An Open-Source, Active Defense & EDR Software (Intermediate)
When: Friday, Aug 7, 13:30 - 14:30 PDT
Where: Blue Team Vlg - Talks Track 1
Speakers:Jake Smith,Jack McDowell

SpeakerBio:Jake Smith
Jake is recent graduate of the University of Virginia where he studied Computer Science and Cybersecurity. During his time in school, he was a Rodman Scholar and served as President of the Computer and Network Security (CNS) Club at UVA. In addition, he co-started UVA’s Cyber Defense and Offense Teams to compete in the Collegiate Cyber Defense Competition (CCDC) and Collegiate Penetration Testing Competition (CPTC). Outside of school, Jake co-founded MetaCTF, a cybersecurity training company, which has run CTF events across the United States and beyond.
Twitter: @jtsmith282

SpeakerBio:Jack McDowell
No BIO available

Description:
Our team has developed BLUESPAWN, a fully open-source, active defense and EDR tool for Windows. While there are ample offensive oriented tools publicly available, there is very little on the defensive side. We aim to use this project to demonstrate how modern-day security solutions work by building our own from the ground up. In addition, we integrate a number of popular community libraries and tools such as MITRE ATT&CK, DoD STIGs, YARA, and PE-Sieve with one goal: to enable any security analyst to quickly detect, identify, and eliminate malicious activity on a system.

In today’s world, computers running Microsoft’s Windows operating system remain a top target for threat actors given its popularity. While there are a number of commercial defensive cybersecurity tools and multi-purpose system analysis programs such as SysInternals, this software is often closed-source, operates in a black-box manner, or requires a payment to obtain. These characteristics impose costs for both attackers and defenders. In particular, while the restrictions prevent attackers from knowing exactly what these tools detect, defenders often end up not having a good understanding of how their tools work or exactly what malicious activity they can identify.

Building on prior work and other open-source software, our team decided to create BLUESPAWN. This open-source program is an active defense and endpoint detection & response (EDR) tool designed to quickly prevent, detect, and eliminate malicious activity on a Windows system. In addition, BLUESPAWN is centered around the MITRE ATT&CK Framework and the Department of Defense’s published STIGs. We have also integrated popular malware analysis libraries such as VirusTotal’s YARA to increase the tool’s effectiveness and accessibility. Currently, our team is developing the alpha version of the client which can already detect real-world malware. In the future, we will continue to build out the client and eventually integrate both a server component for controlling clients and a cloud component to deliver enhanced detection capabilities.

Github: https://github.com/ION28/BLUESPAWN


Blue Team Village activities in 'Talks Track 1' will be streamed to Twitch.

Twitch: https://twitch.tv/BlueTeamVillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 13:00-13:59 PDT


Title: Building Connections Across The Aviation Ecosystem
When: Friday, Aug 7, 13:00 - 13:59 PDT
Where: Aerospace Vlg
Speakers:Katie Noble,Al Burke,Jeff Troy,Jen Ellis,John Craig,Randy Talley (CISA),Sidd Gejji

SpeakerBio:Katie Noble , Intel Corp
Katie currently serves as a Director of PSIRT and Bug Bounty at Intel Corp. Where she leads the cyber security vulnerability Bug Bounty program, researcher outreach, and strategic planning efforts. Previous to this position, Katie served as the Section Chief of the Vulnerability Management and Coordination at the Department of Homeland Security, Cyber and Infrastructure Security Agency (CISA) where she led DHS’ primary operations arm for coordinating the responsible disclosure and mitigation of identified cyber vulnerabilities in control systems, enterprise, hardware and software. Katies team is credited by the Secretary of Homeland Security with the coordination and public disclosure of over 20,000 cyber security vulnerabilities within a two year period. Katie is a highly accomplished manager with over 14 years of U.S. Government experience, both in the Intelligence Community and Cyber Security Program Management. She has operated at all levels from individual contributor as an Intelligence Analyst for the National Intelligence Community to Senior Policy Advisor for White House led National Security Council (NSC) Cyber programs. Her work has directly impacted the decision making of the NSC, Defense Information Systems Agency, Office of the Director of National Intelligence, Department of Defense, Federal Communications Commission, Central Intelligence Agency, U.S. Coast Guard, U.K.Ministry of Defense, Canadian Government agencies, and Australian Cabinet Ministry.

SpeakerBio:Al Burke , Associate Deputy Director, Air Force Cyberspace Operations and Warfighter Communications
Mr. Alan W. Burke is the Associate Deputy Director, Air Force Cyberspace Operations and Warfighter Communications and the DOD Chair for the interagency Aviation Cyber Initiative Task Force. Most recently he was a Distinguished Graduate of the College of Information and Cyberspace, National Defense University. He has 36-years of combined active military and government service in the U.S. Air Force and Department of Defense. Previously, he was Chief of the Integrated Air and Missile Defense (IAMD) Division, U.S. Air Forces in Europe-Africa responsible for integrating joint and coalition air, space and missile defense capabilities in support of the Joint Force Air Component Commander and implementation of Presidential policy for missile defense in Europe. On active duty, Colonel Burke was the Director, Operations Support Group and Deputy Director, Warfighter Support Center, Missile Defense Agency (MDA) that delivered global support for Ballistic Missile Defense operations and led the initial Missile Defense Agency Ballistic Missile Defense system deployments in Israel. His active duty service includes operational, staff and command experience in nuclear missile operations, space surveillance, space control, missile warning, national-level command and control, air and missile defense, military training and education, and Research, Development, Test and Evaluation.

SpeakerBio:Jeff Troy , President, CEO, Aviation ISAC
Over the past three years, Jeff developed the A-ISAC comprehensive strategy, led the team’s expansion of the Aviation ISACs services, and tripled membership. He established relationships with global regulators, industry associations, and private sector companies to drive cyber risk reduction across the aviation eco-system. Concurrently, Jeff employed by General Electric and is on the Board of Directors, National Defense ISAC. ND-ISAC provides cutting edge cyber security training, intelligence development and a trusted information sharing environment for US cleared defense contractors. Jeff spent 25 years as a Special Agent of the FBI. He retired as the Deputy Assistant Director for Cyber National Security and Cyber Criminal Investigations.

SpeakerBio:Jen Ellis , Rapid7
Jen Ellis is the vice president of community and public affairs at Rapid7 and her primary focus is on advancing cybersecurity for all by building productive collaboration between those in the security community and those operating outside it. She works extensively with security researchers, technology providers and operators, and various government entities to help them understand and address cybersecurity challenges. She believes effective collaboration is our only path forward to reducing cybercrime and protecting consumers and businesses. Jen is a nonresident fellow of the Atlantic Council, sits on the boards of the Center for Cybersecurity Policy and Law, I Am The Cavalry, and the Aerospace Village, and is a member of the board of advisors for the CyberPeace Institute. She has testified before U.S. Congress and spoken at numerous security or business conferences.

SpeakerBio:John Craig , Boeing
John Craig is currently the Chief Engineer of Cabin, Network and Security Systems and Product Security Officer for Boeing Commercial Airplanes. In this role, he is responsible for cabin systems, connectivity, onboard networks, cyber security, and airborne software design and implementation. In addition, he is the chairman of the board of the Aviation Information Sharing and Analysis Center, formed to encourage sharing of cyber threat information within the aviation industry. He is on the policy board and program management committee of RTCA to provide input for policy and programs for the aviation. In his 34 years of aviation experience, he has held roles in Electrical Subsystems, Engine Systems, Avionics, Cabin Systems, Onboard Networks, and Connectivity Systems. He is experienced in large scale systems development, software developmental programs and, as a previous FAA Designated Engineering Representative, knowledge of airplane certification programs.

SpeakerBio:Randy Talley (CISA)
Mr. Talley is a Senior Advisor assigned to the U.S. Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) located in Arlington, VA. He uses his aviation expertise and operational Homeland Security background to provide aviation-specific advice to CISA leadership. In his primary role, Mr. Talley serves as the DHS Lead for the Aviation Cyber Initiative (ACI), a Tri-Chaired Task Force assigned to collaborate across the Federal Government, aviation industry and the research community to reduce risks and improve resilience within the Nation’s Aviation Ecosystem.

SpeakerBio:Sidd Gejji , FAA
Siddharth (Sidd) Gejji is a Manager in the Federal Aviation Administration (FAA) Office of Information Security and Privacy, within the FAA Office of Information and Technology. Mr. Gejji leads the Aviation Ecosystem Stakeholder Engagement Branch, which is a team of experts responsible for conducting cybersecurity stakeholder engagements throughout the Aviation Ecosystem, including in the Airlines, Airports, Aviation Management, and Aircraft areas. Mr. Gejji serves as a Tri-Chair for the U.S. Aviation Cyber Initiative (ACI). The ACI is a US Government task force with Tri-Chairs from Department of Homeland Security (DHS), Department of Defense (DoD), and FAA. Mr. Gejji and his team support this important interagency mission to reduce cybersecurity risks and improve cyber resilience to support safe, secure, and efficient operations of the Nation’s Aviation Ecosystem. Prior to his current engagement, Sidd spent 12 years in various roles at the FAA, most notably in the FAA Office of Policy where he served as an Acting Manager of the Systems and Policy Analysis Group. He also spent a year on detail to the U.S. Senate Commerce, Science, and Transportation Committee.

Description:
Across the Aviation Ecosystem, there is an increased effort to collaborate and coordinate to protect Information Technology (IT) and Operational Technology (OT) systems at airports, airlines, aviation management, and manufacturers and vendors via the supply chain. This diverse panel will share their insights and current activities between government, industry, and the security research community. Learn how you can participate in and ensure the safety and security of the Aviation Ecosystem.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

CRV - Friday - 16:00-16:59 PDT


Title: Building Teams in the New Normal
When: Friday, Aug 7, 16:00 - 16:59 PDT
Where: Career Hacking Vlg

SpeakerBio:Mike Murray
No BIO available

Description:
2020 has created massive change across our industry, both from the perspective of COVID-19 as well as the social movements that have changed the way we view ourselves. Nowhere has this affected the industry more than the experience by which we onboard employees - as an example, before 2020, even most remote employees had in person interviews in the process. In short, the "new normal" that is evolving requires us to hire and interview differently. From where and how we find (especially diverse) candidates, our interview processes and the way we onboard employees in to our culture, everything requires a thoughtful new approach. In this talk, Mike will talk about everything he has learned and how he has modified his own processes to promote diversity, find the best people to join the team, and brought them aboard as part of the culture.

Career Hacking Village activities can be watched on YouTube.

CHV YouTube: https://www.youtube.com/channel/UCxF_PpndJEoi4fsrQx6yuQw


Return to Index    -    Add to    -    ics Calendar file

 

RCV - Saturday - 11:00-11:30 PDT


Title: Burnout is real
When: Saturday, Aug 8, 11:00 - 11:30 PDT
Where: Recon Vlg

SpeakerBio:Chloé Messdaghi
Chloé Messdaghi is the VP of Strategy at Point3 Security. She is a security researcher advocate who strongly believes that information security is a humanitarian issue. Besides her passion to keep people safe and empowered online & offline, she is driven to fight for hacker rights. She is the founder of WomenHackerz & the President and cofounder of Women of Security (WoSEC), podcaster for ITSP Magazine's The Uncommon Journey, and runs the Hacker Book Club.

Description:
Mental health is an ongoing issue within infosec before and during COVID-19. There's a fine balance between hacking and personal life. Majority of the time, they cross over. This talk shares an overview of the warning signs, symptoms, and practices to prevent burnout and how to deal with burnout to keep balanced.

Recon Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/c/ReconVillage

#rv-talks-text: https://discord.com/channels/708208267699945503/737048009732522014


Return to Index    -    Add to    -    ics Calendar file

 

CRV - Friday - 11:00-11:59 PDT


Title: But I Still Need A Job!
When: Friday, Aug 7, 11:00 - 11:59 PDT
Where: Career Hacking Vlg

SpeakerBio:Kirsten Renner
No BIO available

Description:
As if finding your next gig wasn't already a challenge, now we have to do it in the midst of a pandemic. Let's talk about the new hurdles, how to get around them and the classic fundamentals like searching, networking, and negotiating

Career Hacking Village activities can be watched on YouTube.

CHV YouTube: https://www.youtube.com/channel/UCxF_PpndJEoi4fsrQx6yuQw


Return to Index    -    Add to    -    ics Calendar file

 

DC - Saturday - 15:30-15:59 PDT


Title: Bypassing Biometric Systems with 3D Printing and Enhanced Grease Attacks
When: Saturday, Aug 8, 15:30 - 15:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Yamila Levalle , Researcher at Dreamlab Technologies
Yamila Vanesa Levalle is an Information Systems Engineer, Security Researcher and Offensive Security Professional with more than 15 years of experience in the InfoSec area.

Yamila currently works as Security Researcher and Consultant at Dreamlab Technologies where she specializes in offensive techniques, conducts researches, gives trainings and write papers and blog posts. She is an international security conferences speaker and has presented her researches at important events such as BlackHat Arsenal Vegas, PHDays Moscow, Northsec Montreal, AusCERT Australia, 8.8 Security Conference Vegas, SCSD Fribourg, Ekoparty Ekolabs, OWASP Latam Tour and others. She has taught ethical hacking courses for women, CTF courses for beginners and several information security trainings.


Description:
Due to the well-known vulnerabilities in traditional authentication methods through users, passwords and tokens; biometric systems began to be widely implemented in millions of devices with the aim of having a more practical authentication system for users and -supposedly- more robust in terms of security.

Security researchers were not far behind and started to analyze the security of these biometric controls. In recent years, different techniques have been presented to bypass the authentication of, for example, the smartphones that began to implement these systems.

What is new in this talk? avoiding focusing on a particular device, we have gone deeper studying the operation of the sensors implemented in different biometric systems (Optical, Capacitive, Ultrasonic, Facial, etc.) and consequently, we discovered new techniques to bypass them. Through this talk, we will show how to fool biometric sensors by the enhanced grease attacks and, even better, the techniques to succeed at bypassing these controls using 3D printing.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 20:15-21:15 PDT


Title: Bypassing in Mobile Network From Red-Team Points of View
When: Saturday, Aug 8, 20:15 - 21:15 PDT
Where: Red Team Vlg

SpeakerBio:Ali Abdollahi
Ali Abdollahi is a cyber security expert with over 8 years of experience working in a variety of security fields. Ali is a full-time consultant helping clients with product security testing, reverse engineering, penetration testing, exploit developing, red-teaming, secure coding, and more, giving him ample opportunity to use his skills in a diversity of ways. In addition, He is instructor, author and board of review at Hakin9 company. Ali is a self-confessed bug hunter, publisher of many vulnerabilities and CVEs. Ali is a regular speaker and trainer at industry conferences.
Twitter: @AliAbdollahi2

Description:
This talk focus on reviewing implementation of new security features in mobile networks as well as detecting techniques and bypassing methods from red team perspective . The scope of the illustration include both radio (SDR) and signalling core network attacks. - The outline of the presentation // max 500 words One of the most complicated network is mobile telecom network. There are some segments include signalling, charging, packet data, Radio etc. Still there are many security holes that allow attackers to compromise the network and however telecom companies enable security mechanisms and put some security devices. In this talk, I will cover common high-tech security solutions used by telecom operators and and all ways to detect and after that bypass it as well as security recommendations to prevent theses activities. In this talk I will start the presentation with recent telecom abuse and related hacking news in 2019. In the next section I will cover common mobile network vulnerabilities and architecture. After that illustrate security of radio access network (RAN) and bypassing scenarios and techniques: 1. Mobile Phone Registration (IMEI policies) Bypass 2. Bypassing Unrevealed Ciphering Algorithms 3. 5G, LTE/LTE Advanced Bypass
The next part of the talk will be assign to Circuit Switch network (Signaling) and the technical bypass techniques are as below: 1. Home Routing Detection
2. Bypassing Home Routing
3. Signalling Firewall Detection
4. Bypassing Signalling Firewall
And at the final section I will explain security solutions to defend against these malicious techniques.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

DC - Sunday - 10:30-10:59 PDT


Title: Bytes In Disguise
When: Sunday, Aug 9, 10:30 - 10:59 PDT
Where: DEF CON Q&A Twitch
Speakers:Jesse Michael,Mickey Shkatov

SpeakerBio:Jesse Michael
Jesse MichaelJesse Michael is an experienced security researcher focused on vulnerability detection and mitigation who has worked at all layers of modern computing environments from exploiting worldwide corporate network infrastructure down to hunting vulnerabilities inside processors at the hardware design level. His primary areas of expertise include reverse engineering embedded firmware and exploit development. He has also presented research at DEF CON, Black Hat, PacSec, Hackito Ergo Sum, Ekoparty, and BSides Portland.
Twitter: @JesseMichael

SpeakerBio:Mickey Shkatov
Mickey has been doing security research for almost a decade, one of specialties is simplifying complex concepts and finding security flaws in unlikely places. He has seen some crazy things and lived to tell about them at security conferences all over the world, his past talks range from web pentesting to black badges and from hacking cars to BIOS firmware.
Twitter: @HackingThings

Description:
Non-Volatile Memory. EVERY computer has it, from the chip that stores your BIOS to the controller that runs your laptop trackpad and even your new fancy USB-C monitor. These small nooks of storage can be (ab)used by anyone to store data or code without causing any side effects and none would be the wiser. We will show you more than one example of how this is possible and walk through everything you need to know to do it, too. In this talk, we will describe how to hide persistence in these obscure memory chips using simple tools that we are releasing as open source. We will show multiple ways to accomplish this without detection. On the defensive front, we’ll discuss what can be done to detect and lock down systems.

This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 09:00-15:59 PDT


Title: Cal Poly Workshop - Simulated Satellite Communications on Raspberry Pi
When: Friday, Aug 7, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Users will need to purchase own equiptment before the workshop/challenge is run. (users will attempt to see simulated altitude, battery level, telemetry data from the mock satellite. It will be awesome because, we will expose participants new to the convergence of space and cybersecurity a crawl/beginner experience to gain their interest. It's designed as a workshop. The Convergence of Space & Cybersecurity Innovation.

The goal of this workshop would be to construct a “CubeSat Simulator Lite https://github.com/alanbjohnston/CubeSatSim/wiki” specifically https://github.com/alanbjohnston/CubeSatSim/wiki/CubeSat-Simulator-Lite.

We would run through the installation of the software via a screensharing method. We’d show participants how to setup a Raspberry Pi, set up the device, install the necessary packages, attach a necessary antenna, and view the transmitted data using a software defined radio.

Building materials:
Raspberry Pi Kit - https://www.amazon.com/dp/B07BCC8PK7/ Software Defined Radio - https://www.amazon.com/dp/B011HVUEME/


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:00-15:59 PDT


Title: Cal Poly Workshop - Simulated Satellite Communications on Raspberry Pi
When: Saturday, Aug 8, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Users will need to purchase own equiptment before the workshop/challenge is run. (users will attempt to see simulated altitude, battery level, telemetry data from the mock satellite. It will be awesome because, we will expose participants new to the convergence of space and cybersecurity a crawl/beginner experience to gain their interest. It's designed as a workshop. The Convergence of Space & Cybersecurity Innovation.

The goal of this workshop would be to construct a “CubeSat Simulator Lite https://github.com/alanbjohnston/CubeSatSim/wiki” specifically https://github.com/alanbjohnston/CubeSatSim/wiki/CubeSat-Simulator-Lite.

We would run through the installation of the software via a screensharing method. We’d show participants how to setup a Raspberry Pi, set up the device, install the necessary packages, attach a necessary antenna, and view the transmitted data using a software defined radio.

Building materials:
Raspberry Pi Kit - https://www.amazon.com/dp/B07BCC8PK7/ Software Defined Radio - https://www.amazon.com/dp/B011HVUEME/


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 09:00-15:59 PDT


Title: Cal Poly Workshop - Simulated Satellite Communications on Raspberry Pi
When: Sunday, Aug 9, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Users will need to purchase own equiptment before the workshop/challenge is run. (users will attempt to see simulated altitude, battery level, telemetry data from the mock satellite. It will be awesome because, we will expose participants new to the convergence of space and cybersecurity a crawl/beginner experience to gain their interest. It's designed as a workshop. The Convergence of Space & Cybersecurity Innovation.

The goal of this workshop would be to construct a “CubeSat Simulator Lite https://github.com/alanbjohnston/CubeSatSim/wiki” specifically https://github.com/alanbjohnston/CubeSatSim/wiki/CubeSat-Simulator-Lite.

We would run through the installation of the software via a screensharing method. We’d show participants how to setup a Raspberry Pi, set up the device, install the necessary packages, attach a necessary antenna, and view the transmitted data using a software defined radio.

Building materials:
Raspberry Pi Kit - https://www.amazon.com/dp/B07BCC8PK7/ Software Defined Radio - https://www.amazon.com/dp/B011HVUEME/


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 15:00-15:59 PDT


Title: CAN be super secure: Bit Smashing FTW
When: Friday, Aug 7, 15:00 - 15:59 PDT
Where: Car Hacking Vlg 002

SpeakerBio:Brent Stone
No BIO available

Description:
Bit smashing CAN transceivers are already on the market and cost pennies. Using them would make vehicles, robots, and medical devices effectively immune from almost every layer 2 attack including denial of service. Brent explains why this security measure works so well. This is also a call to action for industries using exclusively multicast ICS protocols like CAN to invest the <$5/platform to greatly improve their product's security.


#chv-track002-text: https://discord.com/channels/708208267699945503/739564953014632579

YouTube: https://www.youtube.com/watch?v=5DYhXbWkWoA&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack002


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Friday - 13:25-14:10 PDT


Title: Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments
When: Friday, Aug 7, 13:25 - 14:10 PDT
Where: Cloud Vlg

SpeakerBio:Phillip Marlow
Phillip Marlow is a cybersecurity and DevOps engineer. He helps organizations understand how to adopt DevOps practices to increase their security rather than sacrifice it in the name of speed. Phillip holds several security, cloud, and agile certifications and is currently pursuing a Master’s Degree in Information Security Engineering at SANS Technology Institute.
Twitter: @wolramp

Description:
Attackers frequently use valid accounts to access servers with sensitive data. This gives them ninja-like stealth in most environments, but this session will show you how to turn the tables and use a zero-touch environment to catch them.

Zero-touch environments are a product of the fast-moving world of DevOps which is being adopted by an increasing number of successful companies including Google. This session will show that by leveraging the constraints of this environment, we can identify malicious network traffic which would otherwise blend into the noise.

This proposal is based on active research and new details may emerge during preparation of the final session. A brief overview of expected included topics:

• Why care about DevOps and Zero-Touch? • How application servers are deployed in traditional environments • What lateral movement with valid credentials looks like in traditional environments • How deployment works in Zero-Touch environments • What lateral movement with valid credentials looks like in zero-touch • Detecting the lateral movement with existing network sensors


Return to Index    -    Add to    -    ics Calendar file

 

ASV - Saturday - 15:00-15:45 PDT


Title: Can't Touch This: Detecting Lateral Movement in Zero-Touch Environments
When: Saturday, Aug 8, 15:00 - 15:45 PDT
Where: AppSec Vlg

SpeakerBio:Phillip Marlow
Phillip Marlow is a cybersecurity and DevOps engineer. He helps organizations understand how to adopt DevOps practices to increase their security rather than sacrifice it in the name of speed. Phillip holds several security, cloud, and agile certifications and is currently pursuing a Master’s Degree in Information Security Engineering at SANS Technology Institute.
Twitter: @wolramp

Description:
Zero-touch environments are a product of the fast-moving world of DevOps which is being adopted by an increasing number of successful companies. This session will show that by leveraging the constraints of this environment, we can identify malicious network traffic which would otherwise blend into the noise.

AppSec Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/channel/UCpT8Ll0b9ZLj1DeEQQz7f0A


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Capture The Packet (CTP)
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come compete in the world’s most challenging cyber defense competition based on the Aries Security Cyber Range. Tear through the challenges, traverse a hostile enterprise class network, and diligently analyze what is found in order to make it out unscathed. Not only glory, but prizes await those that emerge victorious from this upgraded labyrinth, so only the best prepared and battle hardened will escape the crucible. Follow us on Twitter or Facebook (links below) to get notifications for dates and times your team will compete, as well as what prizes will be awarded.

Twitter capturetp: https://twitter.com/capturetp

Twitter wallofsheep: https://twitter.com/wallofsheep

Discord: https://discord.com/channels/708208267699945503/711643512625430529

Web: https://www.capturethepacket.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Capture The Packet (CTP)
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come compete in the world’s most challenging cyber defense competition based on the Aries Security Cyber Range. Tear through the challenges, traverse a hostile enterprise class network, and diligently analyze what is found in order to make it out unscathed. Not only glory, but prizes await those that emerge victorious from this upgraded labyrinth, so only the best prepared and battle hardened will escape the crucible. Follow us on Twitter or Facebook (links below) to get notifications for dates and times your team will compete, as well as what prizes will be awarded.

Twitter capturetp: https://twitter.com/capturetp

Twitter wallofsheep: https://twitter.com/wallofsheep

Discord: https://discord.com/channels/708208267699945503/711643512625430529

Web: https://www.capturethepacket.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Capture The Packet (CTP)
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come compete in the world’s most challenging cyber defense competition based on the Aries Security Cyber Range. Tear through the challenges, traverse a hostile enterprise class network, and diligently analyze what is found in order to make it out unscathed. Not only glory, but prizes await those that emerge victorious from this upgraded labyrinth, so only the best prepared and battle hardened will escape the crucible. Follow us on Twitter or Facebook (links below) to get notifications for dates and times your team will compete, as well as what prizes will be awarded.

Twitter capturetp: https://twitter.com/capturetp

Twitter wallofsheep: https://twitter.com/wallofsheep

Discord: https://discord.com/channels/708208267699945503/711643512625430529

Web: https://www.capturethepacket.com/


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 16:00-16:50 PDT


Title: Car (to Cloud) Talk: Using MQTT for Car Hacking
When: Friday, Aug 7, 16:00 - 16:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Jaime
Jaime is an EE turned software developer turned security researcher. She caught the infosec bug through playing CTFs, and now works at GRIMM hacking cars. In her spare time, she adds LEDs to things and hangs out with her dog.

Description:
As with IoT, cars are becoming increasingly "smart". In the automotive and trucking world, this means adding the ability to collect real-time telemetry data, gather information for predictive maintenance, as well as consumer features like remote lock/unlock. This talk will cover the internals of how MQTT--a lightweight messaging protocol frequently used in automotive and IoT--works, and how it's used in automotive applications.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 16:00-16:50 PDT


Title: Car (to Cloud) Talk: Using MQTT for Car Hacking
When: Saturday, Aug 8, 16:00 - 16:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Jaime
Jaime is an EE turned software developer turned security researcher. She caught the infosec bug through playing CTFs, and now works at GRIMM hacking cars. In her spare time, she adds LEDs to things and hangs out with her dog.

Description:
As with IoT, cars are becoming increasingly "smart". In the automotive and trucking world, this means adding the ability to collect real-time telemetry data, gather information for predictive maintenance, as well as consumer features like remote lock/unlock. This talk will cover the internals of how MQTT--a lightweight messaging protocol frequently used in automotive and IoT--works, and how it's used in automotive applications.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Car Hacking Village CTF
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come learn, hack, play at the Car Hacking Village. The village is an open, collaborative space to hack actual vehicles that you don't have to worry about breaking! Don't have tools? We'll loan you some. Never connected to a car? We'll show you how. Don't know where the controllers are? We'll show you how to take it apart.

Additionally we'll host a Donkey Car race. Check out our web site for up to date info.

Want to race? Check out of full car simulator(s).

Want to learn more about automotive hacking and cyber security? Check out our talks.

Want to hack mobility scooters? Yes! We'll do that to.

Also, check out the CHV CTF.


Discord: https://discord.com/channels/708208267699945503/711643596658311229

Twitter: https://twitter.com/CarHackVillage

Web: https://www.carhackingvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Car Hacking Village CTF
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come learn, hack, play at the Car Hacking Village. The village is an open, collaborative space to hack actual vehicles that you don't have to worry about breaking! Don't have tools? We'll loan you some. Never connected to a car? We'll show you how. Don't know where the controllers are? We'll show you how to take it apart.

Additionally we'll host a Donkey Car race. Check out our web site for up to date info.

Want to race? Check out of full car simulator(s).

Want to learn more about automotive hacking and cyber security? Check out our talks.

Want to hack mobility scooters? Yes! We'll do that to.

Also, check out the CHV CTF.


Discord: https://discord.com/channels/708208267699945503/711643596658311229

Twitter: https://twitter.com/CarHackVillage

Web: https://www.carhackingvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Car Hacking Village CTF
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Come learn, hack, play at the Car Hacking Village. The village is an open, collaborative space to hack actual vehicles that you don't have to worry about breaking! Don't have tools? We'll loan you some. Never connected to a car? We'll show you how. Don't know where the controllers are? We'll show you how to take it apart.

Additionally we'll host a Donkey Car race. Check out our web site for up to date info.

Want to race? Check out of full car simulator(s).

Want to learn more about automotive hacking and cyber security? Check out our talks.

Want to hack mobility scooters? Yes! We'll do that to.

Also, check out the CHV CTF.


Discord: https://discord.com/channels/708208267699945503/711643596658311229

Twitter: https://twitter.com/CarHackVillage

Web: https://www.carhackingvillage.com/


Return to Index    -    Add to    -    ics Calendar file

 

DL - Sunday - 12:00-13:50 PDT


Title: Carnivore (Microsoft External Attack Tool)
When: Sunday, Aug 9, 12:00 - 13:50 PDT
Where: See Description or Village

SpeakerBio:Chris Nevin
Senior Security Consultant at NCCGroup

Description:
Carnivore is a username enumeration and password spraying tool for Microsoft services (Skype for Business, ADFS, RDWeb, Exchange and Office 365). It originally began as an on-premises Skype for Business enumeration/spray tool as I was finding that these days, organizations often seem to have locked down their implementations of Exchange, however, Skype for Business has been left externally accessible, and has not received as much attention from previous penetration tests due to the lack of tools as impactful as Mailsniper. Overtime this was improved and built upon to bring the same service discovery, username enumeration and password spraying capability to Skype, ADFS, RDWeb, Exchange, and O365 all in the same tool. Carnivore includes new post compromise functionality for Skype for Business (pulling the internal address list and user presence through the API), and smart detection of the username format for all services. As a practical means of entry into an organisation – numerous external penetration tests have uncovered an on-premises Skype for Business or ADFS server even for organisations that have moved Mail/SSO/etc to the cloud.

Audience: Offense


Interact @ #dl-nevin-carnivore-text: https://discord.com/channels/708208267699945503/730256550442041373

Watch @ #dl-video1-voice: https://discord.com/channels/708208267699945503/734027693250576505

Github: https://github.com/ReverendThing/Carnivore

Forum: https://forum.defcon.org/node/233116


Return to Index    -    Add to    -    ics Calendar file

 

DL - Friday - 10:00-11:50 PDT


Title: Carnivore (Microsoft External Attack Tool)
When: Friday, Aug 7, 10:00 - 11:50 PDT
Where: See Description or Village

SpeakerBio:Chris Nevin
Senior Security Consultant at NCCGroup

Description:
Carnivore is a username enumeration and password spraying tool for Microsoft services (Skype for Business, ADFS, RDWeb, Exchange and Office 365). It originally began as an on-premises Skype for Business enumeration/spray tool as I was finding that these days, organizations often seem to have locked down their implementations of Exchange, however, Skype for Business has been left externally accessible, and has not received as much attention from previous penetration tests due to the lack of tools as impactful as Mailsniper. Overtime this was improved and built upon to bring the same service discovery, username enumeration and password spraying capability to Skype, ADFS, RDWeb, Exchange, and O365 all in the same tool. Carnivore includes new post compromise functionality for Skype for Business (pulling the internal address list and user presence through the API), and smart detection of the username format for all services. As a practical means of entry into an organisation – numerous external penetration tests have uncovered an on-premises Skype for Business or ADFS server even for organisations that have moved Mail/SSO/etc to the cloud.

Audience: Offense


Interact @ #dl-nevin-carnivore-text: https://discord.com/channels/708208267699945503/730256550442041373

Watch @ #dl-video2-voice: https://discord.com/channels/708208267699945503/734027778646867988

Github: https://github.com/ReverendThing/Carnivore

Forum: https://forum.defcon.org/node/233116


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 07:15-08:15 PDT


Title: Catch Me if You Can
When: Saturday, Aug 8, 07:15 - 08:15 PDT
Where: Red Team Vlg

SpeakerBio:Eduardo Arriols
Eduardo Arriols is RootPointer's Founder, a Cybersecurity Startup. Previously, he has worked for 6 years as head of Red Team teams in different organizations, coordinating and developing only advanced intrusion exercises (Red Team) at the international level (America, South America and Europe). Undergraduate and postgraduate university professor at U-tad University, where he teaches in the different courses of the Software Engineering degree. Likewise, he also teaches in different postgraduate courses at other Spanish Universities like UCLM and URJC. Author of the book "The Company's Red Team" by the 0xWord publisher (Spanish), which describes the Red Team concept, and how to run intrusion simulations on an organization at a technical level. Security researcher and speaker at national and international conferences such as RootedCON, Navaja Negra, STIC Conference (CCN-Cert) or 8.8 Security Conference (Chile and Bolivia).

Description:
The presentation will show, from a technical point of view, how to deploy backdoors to guarantee access to an organization. Initially, a brief review about types of persistance, locations where it can be deploy and common aspects to be taken into account will be carried out, to then go on to describe all the details that allow a Red Team to guarantee access to the entity without the organization being able to detect it or being able to expel the attacker before the attacker re-enters using another alternative persistence. The presentation will feature the following highlights: - General introduction to the concepts necessary to understand the details regarding the scenarios where it is necessary to deploy persistence in an organization (in real intrusion). - Reverse connection typology such as situations where there is direct access to the Internet, connection via proxy, proxy with authentication, DNS, … - Infrastructure and techniques for persistence deployment, indicating the type of servers and advanced techniques such as Domain fronting, IP laundry, ... - Traditional deployment of persistence on an organization both in existing systems in DMZ, internal servers, workstations, Cloud servers, Active Directory, … - Alternative persistence to guarantee unknown access through users with predictable credentials based on password history, Wireless backdoor on workstations (in both directions), extracting internal WiFi passwords, pivoting through resource reconstruction, periodic tasks to modify AD setting, monthly Outlook rules configured and upload interna GAL table of users, visual information extraction using screen and others. - Anti-forensic techniques for the deployment of persistence, to avoid the identification of these by the Security team. - Types of behavior to act and techniques when the security team detects a persistence, allowing access to the entity to be recovered before having lost access to company. The combined use of the exposed techniques and actions, as will be shown in the presentation, means that the security team does not have the ability to expel the Red Team in any case, allowing the intrusion to be carried out with greater freedom. The presentation is the result of experience in developing deep Red Team exercises on the main organizations in Spain (IBEX35), as well as large banking and industrial entities in Europe and America for more than 6 years. After the presentation, an Open Source tool will be published to help in the development of the persistence deployment.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

VMV - Friday - 14:30-14:59 PDT


Title: Chairman Benjamin Hovland, US Election Assistance Commission
When: Friday, Aug 7, 14:30 - 14:59 PDT
Where: Voting Vlg

SpeakerBio:Benjamin Hovland , Chairman, U.S. Election Assistance Commission
No BIO available

Description:No Description available


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 11:30-11:59 PDT


Title: Checklist For Aviation Vulnerability Disclosure: Don't Go It Alone
When: Saturday, Aug 8, 11:30 - 11:59 PDT
Where: Aerospace Vlg

SpeakerBio:Jay Angus
Mr. Jay Angus is a career civil servant with 16 years of experience as a federal employee. He currently serves as the federal lead for the Industrial Control Systems Vulnerability Management and Coordination program within Cybersecurity Infrastructure Security Agency. Prior to joining CISA, he worked for 10 years as an Information Assurance Manager at Naval Hospital Pensacola and SpaWar.

In his current role, he manages day to day operations within the Cybersecurity Infrastructure Security Agency ICS vulnerability disclosure program. As the federal lead for this program he provides oversight of the responsible disclosure of Industrial Control Systems, IoT equipment, and medical devices. One of the significant challenges of this mission space is developing the trust of vendors, asset owners, and researchers, while providing actionable mitigation and remediation strategies to the system owners across the sixteen critical infrastructure sectors.


Description:
Cybersecurity vulnerabilities are ever present in IT and OT systems and the aerospace sector is not exempt from these findings. What should a researcher or vendor do when they find a vulnerability? This is a common question but can have many and variety complex answers. Showing how a few simple steps by each participant in the process of coordinated disclosure can decrease the stress of the efforts and result in trust among researchers and a more resilient aviation sector.

Major points will focus on:
- What researchers should be doing in preparation of disclosure. - When a researcher should be looking for help with coordination. - Questions vendor should be asking in preparation of a public disclosure. - Each disclosure is a unique event and should be leveraged to build upon.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Saturday - 16:00-16:30 PDT


Title: Chinese Military Labratory Mission + COVID-19
When: Saturday, Aug 8, 16:00 - 16:30 PDT
Where: BioHacking Vlg

SpeakerBio:The Red Dragon
No BIO available

Description:
Chinese Military Labratory Mission + COVID-19 discusses respectful research regarding military labs in the People's Republic of China and potential implications for weaponizing viruses, such as COVID-19. Audience will receive a filled experienced trip in the Chinese Military bio-weapons programs.

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 16:00-16:59 PDT


Title: ChupaCarBrah: Open Source Hardware and Software for Interacting with your Vehicle CAN Bus
When: Saturday, Aug 8, 16:00 - 16:59 PDT
Where: Car Hacking Vlg 002

SpeakerBio:Marcelo Sacchetin
No BIO available

Description:
Commercial products for interacting with CAN can be pricey and not easily extensible. Some good open source hardware are very often out of stock by distributors. ChupaCarBrah is a Python based device for sending and receiving CAN messages from your vehicle that requires just a BeagleBone Blue and some wiring.

We cover how to build a device 100% based on open source software and hardware. It makes it more affordable, and easy to use/extend. It is designed for newcomers to the car hacking community, and also for more seasoned hackers that will be able to leverage a single board computer attached to the car's CAN bus. As an example on how to extend it, we show how to use cellular LTE network to exfiltrate all the OBDII/CAN and GPS data to the cloud. It is pretty useful specially for remotely monitoring the car, and also for online training and/or virtual meetings. All source code and detailed instructions on how to install, assemble and use the device are shared on Github and Hackster.io.



#chv-track002-text: https://discord.com/channels/708208267699945503/739564953014632579

YouTube: https://www.youtube.com/watch?v=5DYhXbWkWoA&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack002


Return to Index    -    Add to    -    ics Calendar file

 

DL - Saturday - 16:00-17:55 PDT


Title: CIRCO v2: Cisco Implant Raspberry Controlled Operations
When: Saturday, Aug 8, 16:00 - 17:55 PDT
Where: See Description or Village

SpeakerBio:Emilio Couto
Emilio Couto (@ekio_jp) is a Security Consultant with more than 20 years of experience in the network and security field.Born and raised in Argentina, he is currently located in Japan where multitasking between language, culture and technologies is a must.Over the last decade focusing mainly on Finance IT and presenting tools in conferences (DEF CON, BlackHat Asia, HITB, Code Blue, AV Tokyo and SECCON).In his spare time he enjoys 3D printing, tinkering electronics and home-made IoT devices.
Twitter: @ekio_jp

Description:
Designed under Raspberry Pi and aimed for Red Team Ops, we take advantage of "Sec/Net/Dev/Ops" enterprise tools to capture network credentials in stealth mode

Audience: Offense/Hardware


Interact @ #dl-couto-circo-v2-text: https://discord.com/channels/708208267699945503/730256145771659335

Watch @ #dl-video2-voice: https://discord.com/channels/708208267699945503/734027778646867988

Github: https://github.com/ekiojp/circo

Forum: https://forum.defcon.org/node/233127


Return to Index    -    Add to    -    ics Calendar file

 

DL - Friday - 10:00-11:50 PDT


Title: CIRCO v2: Cisco Implant Raspberry Controlled Operations
When: Friday, Aug 7, 10:00 - 11:50 PDT
Where: See Description or Village

SpeakerBio:Emilio Couto
Emilio Couto (@ekio_jp) is a Security Consultant with more than 20 years of experience in the network and security field.Born and raised in Argentina, he is currently located in Japan where multitasking between language, culture and technologies is a must.Over the last decade focusing mainly on Finance IT and presenting tools in conferences (DEF CON, BlackHat Asia, HITB, Code Blue, AV Tokyo and SECCON).In his spare time he enjoys 3D printing, tinkering electronics and home-made IoT devices.
Twitter: @ekio_jp

Description:
Designed under Raspberry Pi and aimed for Red Team Ops, we take advantage of "Sec/Net/Dev/Ops" enterprise tools to capture network credentials in stealth mode

Audience: Offense/Hardware


Interact @ #dl-couto-circo-v2-text: https://discord.com/channels/708208267699945503/730256145771659335

Watch @ #dl-video1-voice: https://discord.com/channels/708208267699945503/734027693250576505

Github: https://github.com/ekiojp/circo

Forum: https://forum.defcon.org/node/233127


Return to Index    -    Add to    -    ics Calendar file

 

DC - Sunday - 17:00-17:59 PDT


Title: Closing Ceremonies
When: Sunday, Aug 9, 17:00 - 17:59 PDT
Where: See Description or Village

SpeakerBio:The Dark Tangent
No BIO available

Description:
The closing ceremonies will be streamed on the DEF CON Twitch. There will be a live Q&A session during part of the event, and questions can be posted in #track-1-live-qa.

Twitch: https://www.twitch.tv/defconorg

#track-1-live-qa: https://discord.com/channels/708208267699945503/733079691145117848


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Sunday - 13:30-13:50 PDT


Title: Closing Note
When: Sunday, Aug 9, 13:30 - 13:50 PDT
Where: Cloud Vlg

Description:

YouTube: https://www.youtube.com/watch?v=DSipgVlsAfo

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

MOV - Sunday - 15:30-15:59 PDT


Title: Closing talk
When: Sunday, Aug 9, 15:30 - 15:59 PDT
Where: Monero Vlg

SpeakerBio:rehr
No BIO available

Description:No Description available

Monero Village activities will be streamed to Twitch and YouTube.

Twitch: https://www.twitch.tv/monerovillage/

YouTube: https://www.youtube.com/c/monerocommunityworkgroup/

#mv-general-text: https://discord.com/channels/708208267699945503/732733510288408676


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Saturday - 13:15-13:59 PDT


Title: Cloud Frontier
When: Saturday, Aug 8, 13:15 - 13:59 PDT
Where: Cloud Vlg

SpeakerBio:Setu Parimi
Setu Parimi is a Cloud Security Architect with specialization towards defense-in-depth and incident response in the cloud-native environments.
Twitter: @setuparimi

Description:
Cloud Frontier is a security monitoring tool for Internet Facing Assets in AWS, GCP, and Azure. It can be quickly deployed into AWS and will periodically enumerate internet-facing IP addresses, Domain Names, Block Storages, CDNs, and Object Storage resources from AWS, GCP, and Azure.

The results from this enumeration process are pushed into a DynamoDB and then are sent to analyzers using an asynchronous queuing system. Analyzers use Shodan, VirusTotal, URLScan.io, Mozilla Observatory, and whois to provide insights around the following:

-Web Reputation
-IP Reputation
-DNS Information
-GeoIP Information
-IP and Domain Blacklist check etc
License: MIT License


YouTube: https://www.youtube.com/watch?v=gwBG_oKDINQ

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Sunday - 11:00-11:45 PDT


Title: Cloud host base strategy by staging defensive tools for Threat Hunting and Forensics
When: Sunday, Aug 9, 11:00 - 11:45 PDT
Where: Cloud Vlg

SpeakerBio:Michael Mimo
No BIO available
Twitter: @securitydevops

Description:
Cloud instance forensic acquisition presents certain challenges to forensics teams. Traditional forensic methods usually are not effective in the cloud. Access and networks are designed differently than in an on-premise Data Center. Forward thinking strategies need to be implemented so that Incident Response Cyber teams can effectively use forensically sound methods to examine artifacts on hosts.

My talk is about how to prepare your organization for forensic acquisitions in a cloud infrastructure. I will quickly cover how to prepare a fleet of systems for memory and physical disk forensics. The targets are AWS EC2 instances but could be applied to any other cloud providers host provisioning infrastructure. I will focus on the process and infrastructure required to do this level of inspection. By the end you will be able to apply these strategies to activities such as Threat Hunting.

Many organizations struggle with implementing Threat Hunting programs with orchestration in mind to capture memory and disk level forensics. How does a Cyber team respond to an alert they receive from a cloud host? How can they quickly collect artifacts for further forensic inspection? Last, how can you best secure the forensics infrastructure from where you launch the orchestrated forensic examiner systems?

The first part of my talk will describe the infrastructure required to be in the place to support forensic orchestration. I will outline a strategy: servers, tools, storage, and protective measures to ensure that forensic activities are conducted behind a cloud of secrecy. Maintaining stealth mode is critically important to enabling the forensic team to do their job while the business is not impacted by the investigative activities.

In the second part, we will examine the pipeline process to implement solutions in EC2 instances with pre-configured memory and acquisition tools ready to be tapped into by the forensic team. I will discuss some of the challenges encountered when conducting forensics with the different AWS hypervisor solutions.

As a result, testing each design of the Linux instances with your forensics tools is an important part of the process. Do not expect the forensic tools to work seamlessly when the architecture teams switch fundamental infrastructure designs. Each phase of the AMI delivery pipeline needs to be tested and verified that the Cyber team can continue to perform their investigations without running into challenges during a real incident. Do not wait until forensics is really needed to only find out that the tools designed did not perform their job.


YouTube: https://www.youtube.com/watch?v=DSipgVlsAfo

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

BTVW2 - Sunday - 13:30-14:59 PDT


Title: Cloud Security Monitoring on a Dime Store Budget (Beginner)
When: Sunday, Aug 9, 13:30 - 14:59 PDT
Where: Blue Team Vlg - Workshop Track 2

SpeakerBio:Wes Lambert
Wes Lambert is a Senior Engineer at Security Onion Solutions, where he helps companies to implement enterprise security monitoring solutions and better understand their computer networks. Wes is a huge fan of open source software projects, and loves to solve problems and enhance organizational security using completely free and easily deploy-able tools.
Twitter: @therealwlambert

Description:
As organizations continue to rely on the cloud to run critical production workloads and store potentially sensitive data, it is more important than ever to understand our cloud infrastructure, and implement monitoring to assist in providing greater insight into the "goings on” of cloud environments. In this workshop, attendees will learn how they can leverage free and open source tools to enable effective network security monitoring for major cloud providers, extending their visibility, providing greater overall context with regard to their organization's network traffic, and identifying anomalies that otherwise might have gone unnoticed.

This workshop will address the following topics:

Introduction to NSM (Network Security Monitoring Concepts) - key NSM concepts will be discussed/explained Major cloud providers, and native mechanisms to facilitate network security monitoring AWS/Google Cloud

Packet mirroring - we'll discuss what packet mirroring is, and how it can be utilized Cloud provider-specific core NSM/infrastructure/networking concepts and implementation - in this section, we'll discuss the components of each cloud provider's infrastructure, and how it relates to our approach to network security monitoring

        AWS
        Google Cloud

Automating deployment for cloud environments - in this section, we'll discuss how to automate deployment of cloud security monitoring (for free), as well as how to quickly and easily spin up and environment for testing, academia, or even a PoC for a potential production deployment.


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

CLV - Friday - 06:00-12:30 PDT


Title: Cloud Village CTF
When: Friday, Aug 7, 06:00 - 12:30 PDT
Where: See Description or Village

Description:
Registrations Open - 6 AM PDT 7th August 2020 CTF start time - August 7th 11 AM PDT
CTF close time - August 9th 12:30 PM PDT

The winners will be announced on August 9th 1:30 PM PDT at the closing note


CTF Site: https://cloudvillagectf.co/


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Sunday - 12:30-13:30 PDT


Title: Cloud-Native Attack Detection and Simulation.
When: Sunday, Aug 9, 12:30 - 13:30 PDT
Where: Cloud Vlg

SpeakerBio:Nick Jones
Nick Jones is the cloud security lead and a senior security consultant at F-Secure Consulting (formerly MWR InfoSecurity), where he focuses on AWS security in mature, cloud-native organisations and large enterprises. He has a number of years experience delivering offensive security assessments and services to a broad client base. When he's not delivering offensively-focused engagements, he's typically found working with clients to help them develop their security operations and attack detection capabilities.
Twitter: @nojonesuk

Description:
The cloud brings a broad range of benefits from a security perspective, including network isolation by default, strong identity controls and unprecedented visibility. It does, however, bring many changes and unique challenges of its own when compared to an on-premise estate, with modern cloud environments make heavy use of containerisation, serverless functions and other new paradigms. As such, many of the data sources used for threat hunting and attack detection in traditional environments are no longer available. In addition, most attacks consist of abusing legitimate functionality, making it challenging at times to differentiate the malicious from the benign.

Based on first-hand experience attacking and defending large enterprises, this talk will compare and contrast the benefits and challenges of attack detection in the cloud against on-premise detection, and highlight some of the key advantages, common pitfalls and key data sources. It will also offer advice and guidance on developing your own cloud attack detection capabilities in house.

Lastly, it will present Leonidas - a cloud native toolchain that allows users to easily define, simulate and detect new attack vectors and techniques against cloud environments, all tied back to the MITRE ATT&CK framework. This will include deploying and using Leonidas, constructing and executing an attack path end-to-end, and how to implement your own test cases. It'll also cover Leonidas into your detection stack to track improvement over time and support learning and skills development within your team.


YouTube: https://www.youtube.com/watch?v=DSipgVlsAfo

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Friday - 13:00-13:50 PDT


Title: Cluster fuzz!
When: Friday, Aug 7, 13:00 - 13:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Mintynet
Network / security architect that has a passion for car hacking, found vulnerabilities in his own car and also private Car bug bounties. Now runs Car Hacking Village UK and is part of the team behind CHV at defcon

LinkedIn https://www.linkedin.com/in/mintynet/ Twitter: https://twitter.com/mintynet
Website: www.mintynet.com

Twitter: @mintynet

Description:
How to get started in #carhacking using cheap CAN hardware and an instrument cluster, shows the hardware needed and an example of a cluster. Then show some fuzzing of the cluster, including some tips for the CTF.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 13:00-13:50 PDT


Title: Cluster fuzz!
When: Saturday, Aug 8, 13:00 - 13:50 PDT
Where: Car Hacking Vlg 101

SpeakerBio:Mintynet
Network / security architect that has a passion for car hacking, found vulnerabilities in his own car and also private Car bug bounties. Now runs Car Hacking Village UK and is part of the team behind CHV at defcon

LinkedIn https://www.linkedin.com/in/mintynet/ Twitter: https://twitter.com/mintynet
Website: www.mintynet.com

Twitter: @mintynet

Description:
How to get started in #carhacking using cheap CAN hardware and an instrument cluster, shows the hardware needed and an example of a cluster. Then show some fuzzing of the cluster, including some tips for the CTF.


#chv-101-talks-text: https://discord.com/channels/708208267699945503/735651343007744051

YouTube: https://www.youtube.com/watch?v=N4y_K4GGsLs


Return to Index    -    Add to    -    ics Calendar file

 

CHV - Saturday - 13:00-13:59 PDT


Title: CMAP: Open Source Vehicle Services Mapping Tool for noobs
When: Saturday, Aug 8, 13:00 - 13:59 PDT
Where: Car Hacking Vlg 001

SpeakerBio:Robert Leale (CarFuCar)
Robert Leale (@carfucar) is an automotive hacker and a founding member of the Car Hacking Village. For more information please visit carhackingvillage.com/about
Twitter: @carfucar

Description:
CMAP works to catalog open services on vehicle Ex is by using the Diagnostic Scanning to automatically capture as much information as possible from your vehicle.


#chv-track001-text: https://discord.com/channels/708208267699945503/735650705930453173

YouTube: https://www.youtube.com/watch?v=VvojAHUej1Q&feature=youtu.be

Twitch: https://www.twitch.tv/chvtrack001


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: CMD+CTRL CyberRange
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CMD+CTRL has evolved! Slip into an immersive scenario, spanning an entire corporate cloud environment. Intelligent chatbots acting as skilled hackers will guide you every step of the way, as you perform recon, social engineering, data exfiltration, privilege escalation and much more. Move through websites, servers, accounts and cloud services, all in an effort to thwart an evil CEO and corrupt corporation. Just don’t get caught, or you may have to burn it all down to cover your tracks!

Forum: https://forum.defcon.org/node/231474

Discord: https://discord.com/channels/708208267699945503/711643642388807800

Twitter: https://twitter.com/SecInnovation


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: CMD+CTRL CyberRange
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CMD+CTRL has evolved! Slip into an immersive scenario, spanning an entire corporate cloud environment. Intelligent chatbots acting as skilled hackers will guide you every step of the way, as you perform recon, social engineering, data exfiltration, privilege escalation and much more. Move through websites, servers, accounts and cloud services, all in an effort to thwart an evil CEO and corrupt corporation. Just don’t get caught, or you may have to burn it all down to cover your tracks!

Forum: https://forum.defcon.org/node/231474

Discord: https://discord.com/channels/708208267699945503/711643642388807800

Twitter: https://twitter.com/SecInnovation


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: CMD+CTRL CyberRange
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
CMD+CTRL has evolved! Slip into an immersive scenario, spanning an entire corporate cloud environment. Intelligent chatbots acting as skilled hackers will guide you every step of the way, as you perform recon, social engineering, data exfiltration, privilege escalation and much more. Move through websites, servers, accounts and cloud services, all in an effort to thwart an evil CEO and corrupt corporation. Just don’t get caught, or you may have to burn it all down to cover your tracks!

Forum: https://forum.defcon.org/node/231474

Discord: https://discord.com/channels/708208267699945503/711643642388807800

Twitter: https://twitter.com/SecInnovation


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Coindroids
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The year is 20X5 and humanity has fallen: now there are only Coindroids. The machines we designed to manage our finances have supplanted and destroyed the human race by turning our own economy against us. Now they battle each other in the ruins of our fallen cities, driven by a single directive: money is power.

Battle your way to the top of the leaderboard by attacking rival droids and completing hidden challenges.

New to cryptocurrencies? No DEFCOIN to play with? Not a problem! Just come visit our booth in the contest area and we can help get you started.


Forum: https://forum.defcon.org/node/233033

Discord: https://discord.com/channels/708208267699945503/711643539573833878

Twitter: https://twitter.com/coindroids

Web: https://www.coindroids.com


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Coindroids
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The year is 20X5 and humanity has fallen: now there are only Coindroids. The machines we designed to manage our finances have supplanted and destroyed the human race by turning our own economy against us. Now they battle each other in the ruins of our fallen cities, driven by a single directive: money is power.

Battle your way to the top of the leaderboard by attacking rival droids and completing hidden challenges.

New to cryptocurrencies? No DEFCOIN to play with? Not a problem! Just come visit our booth in the contest area and we can help get you started.


Forum: https://forum.defcon.org/node/233033

Discord: https://discord.com/channels/708208267699945503/711643539573833878

Twitter: https://twitter.com/coindroids

Web: https://www.coindroids.com


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Coindroids
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
The year is 20X5 and humanity has fallen: now there are only Coindroids. The machines we designed to manage our finances have supplanted and destroyed the human race by turning our own economy against us. Now they battle each other in the ruins of our fallen cities, driven by a single directive: money is power.

Battle your way to the top of the leaderboard by attacking rival droids and completing hidden challenges.

New to cryptocurrencies? No DEFCOIN to play with? Not a problem! Just come visit our booth in the contest area and we can help get you started.


Forum: https://forum.defcon.org/node/233033

Discord: https://discord.com/channels/708208267699945503/711643539573833878

Twitter: https://twitter.com/coindroids

Web: https://www.coindroids.com


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Thursday - 13:00-13:59 PDT


Title: Combining notebooks, datasets, and cloud for the ultimate automation factory
When: Thursday, Aug 6, 13:00 - 13:59 PDT
Where: Red Team Vlg

SpeakerBio:Ryan Elkins
Ryan Elkins leads the cloud security architecture program for Eli Lilly and Company. Elkins has over 12 years of security experience leading programs across the financial, insurance, and pharmaceutical industries. Throughout his career, he has developed cloud and application security programs, managed a global security services center, performed security consulting, and has led a global information security program. Elkins holds the CISSP and CCSP certifications, a bachelors degree in Computer Technology, and a masters degree in Information Security.

Description:
The technological landscape is rapidly transforming into a data driven, automated, and measured ecosystem. Cloud is an enabler for businesses to become more agile, scalable, and global to maintain a competitive advantage. There are numerous opportunities for red teamers to adopt these same modern strategies to level up their skills, platforms, and yes, even reporting. Attendees will learn how to begin integrating cloud capabilities, scientific notebooks, and aggregated datasets into a highly efficient operating model. We will walkthrough cloud technologies including AWS SageMaker, Athena, Lambda, and API Gateway to build an end-to-end ecosystem of automation. This session will provide demos, accelerators, and code releases to make both routine processes and innovative techniques faster, repeatable, and scalable. "

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

ICS - Saturday - 09:45-10:45 PDT


Title: Confessions of an Offensive ICS Cyber Security Researcher
When: Saturday, Aug 8, 09:45 - 10:45 PDT
Where: ICS Vlg

SpeakerBio:Marina Krotofil
No BIO available

Description:No Description available

ICS Village activities will be streamed to YouTube and Twitch.

YouTube: https://www.youtube.com/channel/UCI_GT2-OMrsqqglv0JijHhw

Twitch: https://www.twitch.tv/ics_village


Return to Index    -    Add to    -    ics Calendar file

 

CRV - Saturday - 10:00-10:59 PDT


Title: Cons and Careers
When: Saturday, Aug 8, 10:00 - 10:59 PDT
Where: Career Hacking Vlg

SpeakerBio:Steven Bernstein
No BIO available

Description:
When I got my first job out in the real world, I thought: this is it: All I’m ever going to need to know for my career, for my job. Got a rude awakening that was one of those worthwhile lessons taught outside of school: invest in becoming a lifelong learner. How do you come across new ideas to keep things fresh? To borrow a saying, if you’re the smartest person in the room, you’re in the wrong room! Attending conferences is one way to learn about different viewpoints. Revisiting ideas is one way to renew our minds and impact the way we think. Peeking into points along a career path will demonstrate an approach to keeping an eye on constant growth, while watching out for warning signs for burn out. Compete against yourself and you’ll Maybe it was the dialog in the scene or suddenly understanding what the writer must have been thinking. The point is, the introduction of new ideas is essential to keep adding value to ourselves and the things we do

Career Hacking Village activities can be watched on YouTube.

CHV YouTube: https://www.youtube.com/channel/UCxF_PpndJEoi4fsrQx6yuQw


Return to Index    -    Add to    -    ics Calendar file

 

DL - Saturday - 16:00-17:55 PDT


Title: Cotopaxi: IoT Protocols Security Testing Toolkit
When: Saturday, Aug 8, 16:00 - 17:55 PDT
Where: See Description or Village

SpeakerBio:Jakub Botwicz
Jakub Botwicz works as a Principal Security Engineer at Samsung Poland R&D Center leading a team of security researchers. He has more than 15 years of experience in information security and previously worked in one of the worlds leading payment card service providers, Big4 consulting company and vendor of network encryption devices. Jakub holds a PhD degree from Warsaw University of Technology and security community certificates including: GWAPT, CISSP, ECSA. Currently, he works providing security assessments (static and dynamic analysis) of different mobile and IoT components.

Description:
Cotopaxi is a set of tools for security testing of Internet of Things devices using specific network IoT/IIoT/M2M protocols (e.g. AMQP, CoAP, MQTT, DTLS, mDNS, QUIC).

Audience: IoT, AppSec


Interact @ #dl-botwicz-cotopaxi-text: https://discord.com/channels/708208267699945503/730256477792632924

Watch @ #dl-video1-voice: https://discord.com/channels/708208267699945503/734027693250576505

Github: https://github.com/Samsung/cotopaxi/

Forum: https://forum.defcon.org/node/233117


Return to Index    -    Add to    -    ics Calendar file

 

RCV - Saturday - 14:00-14:30 PDT


Title: COVID 1984_ Propaganda and Surveillance during a Pandemic
When: Saturday, Aug 8, 14:00 - 14:30 PDT
Where: Recon Vlg

SpeakerBio:Mauro Cáseres
Mauro Cáseres (@mauroeldritch) is an argentine hacker and speaker. He spoke at DEF CON 26 Las Vegas (Recon & Data Duplication Villages), DevFest Siberia, DragonJAR Colombia, Roadsec Brasil, and DC7831 Nizhny Novgorod. Currently working as SecOps for the Argentine Ministry of Production.
Twitter: @mauroeldritch

Description:
What does a propaganda apparatus look like from the inside? How do groups dedicated to setting trends and censoring the opposition act? What if your government forces you to install an app that tracks you during the pandemic? What if we infiltrate a sock puppet account to understand all this better?

The official political propaganda and digital surveillance in Argentina are not new. However, in the last fifteen years, both phenomena have adopted in their favor a new technological approach worthy of study, with the emergence of companies dedicated to manufacturing online trends; cyber militancy groups aimed at setting up debates, responding to them or denouncing rival trends in a coordinated way; the project to establish an exclusive social network for pro-government and “against the establishment” militants (sponsored by the Government itself); the rise of state digital surveillance after the implementation of a Cyber ​​Patrol Protocol, and the permanent monitoring of citizens through a mandatory mobile government application during the COVID-19 Pandemic. This work aims not only to review the previous events, but also to detail the two greatest milestones of political propaganda and digital surveillance in Argentina today: the political propaganda apparatus on social networks and the digital privacy abuses caused by the government application CUIDAR-COVID19 (ar.gob.coronavirus).

For the first case, a fictitious account (sock puppet) will be infiltrated within the propaganda apparatus on social networks to achieve a detailed technical dissection of its entire operation (including its interventions and actors). Our own cyber intelligence tool, Venator.lua, will be used to obtain and process data. The following section will be devoted to the study of privacy abuses caused by the mandatory government application CUIDAR-COVID19, reverse engineering it and analyzing its source code.


Recon Village activities will be streamed to YouTube.

YouTube: https://www.youtube.com/c/ReconVillage

#rv-talks-text: https://discord.com/channels/708208267699945503/737048009732522014


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 12:00-17:59 PDT


Title: CPX SimpleSat
When: Friday, Aug 7, 12:00 - 17:59 PDT
Where: Aerospace Vlg Workshop

Description:
Can you Hack-A-Sat? You won’t know until you try! Intended for noobs, CPX SimpleSat was built to allow you to experiment with attacking a mock satellite through a ground station, mimicking the types of commands used in Hack-a-Sat to gain control of the Satellite. No previous experience required. Just curiosity and a willingness to learn!

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:00-15:59 PDT


Title: CPX SimpleSat
When: Saturday, Aug 8, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Can you Hack-A-Sat? You won’t know until you try! Intended for noobs, CPX SimpleSat was built to allow you to experiment with attacking a mock satellite through a ground station, mimicking the types of commands used in Hack-a-Sat to gain control of the Satellite. No previous experience required. Just curiosity and a willingness to learn!

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 09:00-13:59 PDT


Title: CPX SimpleSat
When: Sunday, Aug 9, 09:00 - 13:59 PDT
Where: Aerospace Vlg Workshop

Description:
Can you Hack-A-Sat? You won’t know until you try! Intended for noobs, CPX SimpleSat was built to allow you to experiment with attacking a mock satellite through a ground station, mimicking the types of commands used in Hack-a-Sat to gain control of the Satellite. No previous experience required. Just curiosity and a willingness to learn!

Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Crack Me If You Can (CMIYC)
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In its tenth year, the premier password cracking contest "Crack Me If You Can" is returning to DEFCON. The world's best password cracking teams are assembled and are awaiting the hardest 48 hours of their year.

Every year, the contest has a different surprise/twist. One year it was all international passwords, last year it was password rotation and BCRYPT, and 10 years ago it was capital letters. Oh the humanity!

This year the teams will be cracking hashes, generated by the CMIYC team, using plain-texts donated by famous hackers and Internet founders. Time for you to test your password cracking skills against your heroes.

Teams have 48 hours to crack as many passwords as possible using what ever resources they can legally assemble. Teams are split into "PRO" (for the large, professional password cracking teams) and "STREET" for smaller teams, or beginners.

Each year the "Crack Me If You Can" team gives away hundreds of free password cracking shirts in the Contest area.


Forum: https://forum.defcon.org/node/231475

Discord: https://discord.com/channels/708208267699945503/711644827053457478

Twitter: https://twitter.com/CrackMeIfYouCan

Web: https://contest-2020.korelogic.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Crack Me If You Can (CMIYC)
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In its tenth year, the premier password cracking contest "Crack Me If You Can" is returning to DEFCON. The world's best password cracking teams are assembled and are awaiting the hardest 48 hours of their year.

Every year, the contest has a different surprise/twist. One year it was all international passwords, last year it was password rotation and BCRYPT, and 10 years ago it was capital letters. Oh the humanity!

This year the teams will be cracking hashes, generated by the CMIYC team, using plain-texts donated by famous hackers and Internet founders. Time for you to test your password cracking skills against your heroes.

Teams have 48 hours to crack as many passwords as possible using what ever resources they can legally assemble. Teams are split into "PRO" (for the large, professional password cracking teams) and "STREET" for smaller teams, or beginners.

Each year the "Crack Me If You Can" team gives away hundreds of free password cracking shirts in the Contest area.


Forum: https://forum.defcon.org/node/231475

Discord: https://discord.com/channels/708208267699945503/711644827053457478

Twitter: https://twitter.com/CrackMeIfYouCan

Web: https://contest-2020.korelogic.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Crack Me If You Can (CMIYC)
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In its tenth year, the premier password cracking contest "Crack Me If You Can" is returning to DEFCON. The world's best password cracking teams are assembled and are awaiting the hardest 48 hours of their year.

Every year, the contest has a different surprise/twist. One year it was all international passwords, last year it was password rotation and BCRYPT, and 10 years ago it was capital letters. Oh the humanity!

This year the teams will be cracking hashes, generated by the CMIYC team, using plain-texts donated by famous hackers and Internet founders. Time for you to test your password cracking skills against your heroes.

Teams have 48 hours to crack as many passwords as possible using what ever resources they can legally assemble. Teams are split into "PRO" (for the large, professional password cracking teams) and "STREET" for smaller teams, or beginners.

Each year the "Crack Me If You Can" team gives away hundreds of free password cracking shirts in the Contest area.


Forum: https://forum.defcon.org/node/231475

Discord: https://discord.com/channels/708208267699945503/711644827053457478

Twitter: https://twitter.com/CrackMeIfYouCan

Web: https://contest-2020.korelogic.com/


Return to Index    -    Add to    -    ics Calendar file

 

PWDV - Saturday - 21:00-21:59 PDT


Title: Cracking at Extreme Scale: The Evolution of Hashstack (Rebroadcast)
When: Saturday, Aug 8, 21:00 - 21:59 PDT
Where: Password Vlg

SpeakerBio:Jeremi M Gosney (epixoip)
No BIO available

Description:No Description available

Password Village events will be streamed to both YouTube and Twitch concurrently.

Twitch: https://twitch.tv/passwordvillage

YouTube: https://youtube.com/channel/UCqVng_SmexXf4TW3AVdMIyQ


Return to Index    -    Add to    -    ics Calendar file

 

PWDV - Saturday - 10:00-10:59 PDT


Title: Cracking at Extreme Scale: The Evolution of Hashstack
When: Saturday, Aug 8, 10:00 - 10:59 PDT
Where: Password Vlg

SpeakerBio:Jeremi M Gosney (epixoip)
No BIO available

Description:No Description available

Password Village events will be streamed to both YouTube and Twitch concurrently.

Twitch: https://twitch.tv/passwordvillage

YouTube: https://youtube.com/channel/UCqVng_SmexXf4TW3AVdMIyQ


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Friday - 14:00-14:59 PDT


Title: Creating a decentralized storage for Kubernetes with Tardigrade and Velero
When: Friday, Aug 7, 14:00 - 14:59 PDT
Where: Blockchain Vlg

SpeakerBio:Kevin Leffew
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 11:00-11:59 PDT


Title: Critical Aerospace Cybersecurity: How Hacking And Designing Aerospace Systems Is Changing
When: Sunday, Aug 9, 11:00 - 11:59 PDT
Where: Aerospace Vlg
Speakers:Lawrence Rowell,Nathalie Feyt,Yannick Le Ray

SpeakerBio:Lawrence Rowell
Lawrence Rowell is the Product Security Officer for Thales Inflyt Experience. His responsibilities include cybersecurity governance, strategy and risk management for all business line products. He supports the continuous integration of cybersecurity in the product lifecycle from development to ongoing operations. He leads the cybersecurity product roadmap that includes new cybersecurity features and offerings. Lawrence also has 15 years of experience with cybersecurity in the finance industry, leading the cybersecurity program for a fortune 500 financial company. He graduated with an MS in Telecommunications Management from Oklahoma State University.

SpeakerBio:Nathalie Feyt
Nathalie Feyt - has worldwide responsibility of security activities for Thales Avionics, as Chief Product Security Officer. She leads the security solutions roadmap for the Thales aviation portfolio covering both airborne and ground operation systems to develop new generations of safe and secure avionics, enabling in-flight connectivity and digitalization of aviation operations. She also supports the governance of cybersecurity risks for products in operations. At a European policy level, she is the Chair of Cybersecurity for the ASD taskforce, and at the national level for France she is the Technical Expert Referee for Thales at Conseil de Cybersécurité du Transport Aérien.

SpeakerBio:Yannick Le Ray
Yannick Le Ray is an engineering graduate from Ecole Polytechnique of Montreal. He joined Thales in 2003 where he held a number of positions in bid and product management for air defence command & control systems as well as communication intelligence. Since 2018, Yannick has the worldwide responsibility of cybersecurity for the Thales aeronautics vertical including Air Traffic Management, Avionics & Airports.

Description:
Aerospace is changing – Its digital transformation must now be synonymous with being cyber secure. In-cabin systems are looking more like your everyday living room and the numerous potential entry points must be tested for security. During this session we will take you through the offensive testing that we put systems through to show you what is happening to improve the life cycle of aviation systems thanks to cybersecurity-by-design principles influenced by a hack/fix process.

From design to operation, blue teams and red teams are working together for a first line of defense to help identify vulnerabilities and ensure more robust and resilient systems – systems which we all rely on, and must be certified by Airworthiness Authorities when safety is at stake.

Join Nathalie Feyt, Lawrence Rowell and Yannick Le Ray as they lead a presentation on securing avionics, passenger systems, and air traffic management systems, and show how industry designs, attacks, learns and improves aerospace systems.

This event will be coordinated on the DEF CON Discord server, in channel #av-space-text.


Discord: https://discord.com/channels/708208267699945503/732394328105943180


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Friday - 13:00-13:30 PDT


Title: Cryptocurrencies have superusers?
When: Friday, Aug 7, 13:00 - 13:30 PDT
Where: Blockchain Vlg

SpeakerBio:Mark Nesbitt
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Friday - 16:15-16:45 PDT


Title: Cybersecurity informed consent for medical devices
When: Friday, Aug 7, 16:15 - 16:45 PDT
Where: BioHacking Vlg

Description:
Building on conversation within the Biohacking Village at DEFCON 27, and expertise in clinical care and implementation science (Dameff, Doerr, Tully), cybersecurity in healthcare (Coravos, Dameff, Tully), device policy and regulation (Coravos, Doerr), and informed consent (Doerr), we have defined a framework for “cybersecurity informed consent,”(CIC) a platform we hope will help directly address the patient (and clinician) awareness gap of the cybersecurity vulnerabilities of connected devices, enhancing the ecosystem of trust.(Tully, et al., 2020) In February 2020, we convened a 30-person advisory team comprised of white hat hackers, clinicians, and device makers focused on identifying potentially appropriate clinical scenarios for a demonstration of CIC, informed by legal and policy research performed by Science & Society Certificate Capstone students from Duke University (phase 2). We will present an overview of this work for comment and discussion as we move into the third phase of our project: implementation and assessment of CIC within the clinic.

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 12:00-12:59 PDT


Title: Cybersecurity Lessons Learned From Human Spaceflight
When: Sunday, Aug 9, 12:00 - 12:59 PDT
Where: Aerospace Vlg

SpeakerBio:Pam Melroy
Pam Melroy is a retired US Air Force test pilot and former NASA astronaut and Space Shuttle commander. After NASA she worked at Lockheed Martin on the Orion lunar exploration vehicle program, the Federal Aviation Administration’s Office of Commercial Space Transportation, and at DARPA. She is now an independent consultant and advisor.

Description:
Space is incredibly important in our daily lives – providing the GPS navigation on our phone and in our financial system, national security communications throughout the world, and remote sensing of weather conditions and other indicators of the health of the Earth. We’ve had a very complacent attitude about our satellites because physical access has been impossible. Now we know our key infrastructure is at threat on the ground, and it is in space as well from both physical and cyber threats. There are many important lessons to be learned about the software approach to human space flight and its high standards for software error rate and redundancy, tiered levels of access, distributed architecture, command protocols, and there are mistakes to learn from as well. The space industry is changing very rapidly. With commercial space stations, lunar exploration, and nation states competing for achievements – and resources – in space, we must understand the implications and prepare for the challenges ahead.

This event will be coordinated on the DEF CON Discord server, in channel #av-space-text.


Discord: https://discord.com/channels/708208267699945503/732394328105943180


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 15:00-15:59 PDT


Title: Cybersecurity Meets Aviation Regulation
When: Sunday, Aug 9, 15:00 - 15:59 PDT
Where: Aerospace Vlg
Speakers:Aaron Cornelius,Tim Brom

SpeakerBio:Aaron Cornelius
Aaron Cornelius is a Senior Security Researcher at GRIMM specializing in the security of automotive, aerospace, critical infrastructure and industrial control systems. Aaron has over 15 years developing embedded and safety critical systems for telecom, aviation, medical, and industrial applications.

SpeakerBio:Tim Brom
Tim Brom is the Managing, Senior Security Researcher for Embedded Systems at GRIMM specializing in automotive security research. Tim has over ten years experience as a software developer and security researcher with a focus on automotive, aerospace, critical infrastructure and industrial control systems. Additionally, Tim has contributed extensively to the development of CanCat, GRIMM’s open source CAN bus reverse-engineering tool, and CANT, a tool for interacting with CAN bus at the electrical layer. Tim was the lead engineer in the development of GRIMM’s car-hacking workbenches. Tim has also had publications about car-hacking tools and techniques, including on the Macchina M2.

Description:
Software development for aviation is highly regulated, and process driven. The current processes, as defined in DO-178C and related standards, originate from a history of designing and testing mechanical components. In the past you designed a part and once installed it only had to be monitored for physical condition. It was assumed that maintenance procedures would be able to identify which components are in flight condition and which are not. But now that there are USB ports and iPads in the cockpit, do these previous assumptions remain valid? How can we ensure that flight systems are not compromised after being installed? What can be done to help ensure aviation systems are secure?

There are 4 primary areas of concern on a modern aircraft: - Maintenance interfaces - What is necessary to ensure that software communicating with the aircraft is correct and operates in a secure manner? - Passenger interfaces - What is necessary to ensure that systems passengers interact with cannot interfere with the aircraft operation? - Crew accessible interfaces - What is necessary to ensure that the crew cannot accidentally connect a malicious device to flight systems? - Pre-flight software validation - Is there a procedure that could be used to ensure that the software running on aircraft systems is 100% correct and unmodified?

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

BTVW1 - Friday - 10:00-11:30 PDT


Title: Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI (Intermediate)
When: Friday, Aug 7, 10:00 - 11:30 PDT
Where: Blue Team Vlg - Workshop Track 1

SpeakerBio:Scoubi
Mathieu Saulnier is a “Security Enthusiast” ©@h3xstream. He has held numerous positions as a consultant within several of Quebec’s largest institutions. For the last 8 years he has been focused on putting in place a few SOC and has specialized in detection (Blue Team), content creation and mentorship. He worked as a « Senior Security Architect » and acted as “Adversary Detection Team Lead” and “Threat Hunting Team Lead” for one of Canada’s largest carrier for many years and is now SOC Team Lead in a large financial institution. He loves to give talk and had the honor to do so at GoSec, BSidesCharm, NorthSec, BSidesLV, Defcon’s BTV and Derbycon.
Twitter: @ScoubiMtl

Description:
Bloodhound stores AD data in a Neo4j. The UI allows you to get some information out of the box, but that is only the tip of the iceberg. Using Cypher if you can think it, you can visualize it!

The workshop will start with a quick presentation of BloodHound (BH). This is to make sure everybody understands the product as I very often meet security practitioners that never heard of the tool. (5 minutes)

The participants will be provided with test data, either in JSON format (a few KB) that can import in the BH UI or as a Neo4j database (very big). The reason to provide both is that BH is now detected by many AV as a Hacking tool and I don't want to exclude participants who come with their work computer. Those files will be provided ahead of time via Dropbox or similar file sharing site.

The first part of the workshop will go over the various objects present in BH: Computers, Groups, OU, Domains, etc. and the properties of those objects. We will learn how to interact with them using both the UI and the Neo4j Web Console (NWC). We will then use the prebuilt queries from the BH UI and use them in the NWC. From there we will start modifying them and see what impact it has. Debugging techniques will be shown. (~20 minutes)

After that we will go into a bit more advance query type, for example multiple relationships and chaining queries together. A few examples will be provided and the participants will be able to replicate the queries and see the result. (~30 minutes)

Finally, the participants will receive a list of questions and they will need to build the Cypher Queries themselves in order to find the answer. I will be there to assist them and debug their queries as needed. (~30 minutes)


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

FSL - Friday - 20:00-20:59 PDT


Title: D0 N0 H4RM: A Healthcare Security Conversation
When: Friday, Aug 7, 20:00 - 20:59 PDT
Where: DEF CON Fireside Twitch
Speakers:Ash Luft,Christian “quaddi” Dameff,Jeff “r3plicant” Tully,Suzanne Schwartz,Vidya Murthy

SpeakerBio:Ash Luft , Software Engineer Starfish Medical
Ash Luft is an Embedded Software Engineer with a background in Computer Science, Biochemistry, and Electrical Engineering. With industry experience in Software and Biomedical Device Development, Ash specializes in designing for and implementing safety, security, and privacy in Clinical IoT and Medical Devices. Ash is passionate about protecting patient outcomes while delivering cost-effective, high quality solutions.

SpeakerBio:Christian “quaddi” Dameff , MD, Physician & Medical Director of Security at The University of California San Diego
Christian (quaddi) Dameff MD is an Assistant Professor of Emergency Medicine, Biomedical Informatics, and Computer Science (Affiliate) at the University of California San Diego. He is also a hacker, former open capture the flag champion, and prior DEF CON/RSA/Blackhat/HIMSS speaker. Published works include topics such as therapeutic hypothermia after cardiac arrest, novel drug targets for myocardial infarction patients, and other Emergency Medicine related works with an emphasis on CPR optimization. Published security research topics including hacking critical healthcare infrastructure, medical devices and the effects of malware on patient care. This is his sixteenth DEF CON.
Twitter: @CDameffMD

SpeakerBio:Jeff “r3plicant” Tully , MD, Anesthesiologist at The University of California Davis
Jeff (r3plicant) Tully is an anesthesiologist, pediatrician and security researcher with an interest in understanding the ever-growing intersections between healthcare and technology.
Twitter: @JeffTullyMD

SpeakerBio:Suzanne Schwartz , MD, Associate Director for Science and Strategic Partnerships at the US Food and Drug Administration FDA
Dr. Suzanne Schwartz’s programmatic efforts in medical device cybersecurity extend beyond incident response to include raising awareness, educating, outreach, partnering and coalition-building within the Healthcare and Public Health Sector (HPH) as well as fostering collaborations across other government agencies and the private sector. Suzanne has been recognized for Excellence in Innovation at FDA’s Women’s History Month on March 1st 2018 for her work in Medical Device Cybersecurity. Suzanne chairs CDRH’s Cybersecurity Working Group, tasked with formulating FDA’s medical device cybersecurity policy. She also co-chairs the Government Coordinating Council (GCC) for the HPH Critical Infrastructure Sector, focusing on the sector’s healthcare cybersecurity initiatives.

SpeakerBio:Vidya Murthy , Vice President Operations, MedCrypt
Vidya is fascinated by the impact of cybersecurity on the healthcare space. Beginning her career in consulting, she realized a passion for healthcare and worked for global medical device manufacturer Becton Dickinson. She has since joined MedCrypt, a company focused on bringing cybersecurity leading practices to medical device manufacturers. Vidya holds an MBA from the Wharton School.

Description:
It is certainly a time of discovery- though the truths revealed by the COVID-19 crisis can be bitter and bleak. At a time when all attention is focused on the ERs and ICUs that make up the battle’s front lines, it is easy to cast aside old warnings to focus solely on the clinical war. But the need for safety and security only increases in the face of a pandemic- and healthcare cybersecurity is no different. From testing to ventilators, every facet of our response to COVID-19 depends on trustworthy and reliable technology.

D0 No H4rm- DEF CON’s continuing conversation on healthcare returns for another up close (but not too close) and personal dialogue between hackers at the top of their fields- from the halls of the FDA to the cutting edge of medical devices security research for an all-encompassing look at what we need to focus on in the age of COVID. Moderated by physician hackers quaddi and r3plicant, this perennially packed event aims to recruit the talent, ingenuity, and vision of the DEF CON family for the challenges we face both now and after the immediate crisis passes.

Discord: https://discord.com/channels/708208267699945503/738141986476916826

This fireside is available on YouTube, direct-download from DEF CON Media (MP4, SRT), and is part of the DC28 Torrent.

YouTube: https://www.youtube.com/watch?v=fAU7V3pvj1Q

MP4: https://media.defcon.org/DEF%20CON%2028/DEF%20CON%20Safe%20Mode%20video%20and%20slides/DEF%20CON%20Safe%20Mode%20-%20Christian%20%E2%80%9Cquaddi%E2%80%9D%20Dameff%20MD%20and%20panel%20-%20D0%20N0%20H4RM-%20A%20Healthcare%20Security%20Conversation.mp4

SRT: https://media.defcon.org/DEF%20CON%2028/DEF%20CON%20Safe%20Mode%20video%20and%20slides/DEF%20CON%20Safe%20Mode%20-%20Christian%20%E2%80%9Cquaddi%E2%80%9D%20Dameff%20MD%20and%20panel%20-%20D0%20N0%20H4RM-%20A%20Healthcare%20Security%20Conversation.srt

Torrent: https://media.defcon.org/DEF%20CON%2028/DEF%20CON%2028.torrent


DEF CON Fireside Lounges will be live-streamed on Twitch.

Twitch: https://www.twitch.tv/defconorg

#fireside-lounge-text: https://discord.com/channels/708208267699945503/738141986476916826


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Thursday - 09:00-17:59 PDT


Title: Darknet Contest
When: Thursday, Aug 6, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Here at Darknet, We are a Real Life (RL) Massively Multiplayer Online Role Playing Game (MMORPG), where we teach you real life skills and you get in-game points for it. Some may call this Gamified learning. We assume no prior knowledge on a subject, teach you the basics, then challenge you to use what you have learned. Our contest has a range of quests, starting with simple tasks and working your way up to very complex problems.

In the past we have taught you how to lock pick, crack wifi, create a PGP Key and communicate online safely, as well as soldering, programming, and code cracking, just to name a few.From there we would have sent you on quests to go to the different villages to learn something from them, and then come back and test your skills.

But alas, we have been forced underground…And while the physical aspect of the conference has moved online, so have we. This year we will be focusing on the skills you will learn, past skills you will refresh, and your interactions with the community. There will not be a points scoreboard this year. Many of you who have previously bought the Darknet 8 Badge have not unlocked the full features. We have quests for you to learn how to interact, develop, and reprogram it. It’s time to Learn, Teach, and Play Agents, are you ready?


Info: https://dcdark.net/

Discord: https://discordapp.com/channels/708208267699945503/735849065593438248/737077762845704224

Twitter DCDarkNet: https://twitter.com/DCDarknet

Twitter Holon: https://twitter.com/Holon_Network


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Darknet Contest
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Here at Darknet, We are a Real Life (RL) Massively Multiplayer Online Role Playing Game (MMORPG), where we teach you real life skills and you get in-game points for it. Some may call this Gamified learning. We assume no prior knowledge on a subject, teach you the basics, then challenge you to use what you have learned. Our contest has a range of quests, starting with simple tasks and working your way up to very complex problems.

In the past we have taught you how to lock pick, crack wifi, create a PGP Key and communicate online safely, as well as soldering, programming, and code cracking, just to name a few.From there we would have sent you on quests to go to the different villages to learn something from them, and then come back and test your skills.

But alas, we have been forced underground…And while the physical aspect of the conference has moved online, so have we. This year we will be focusing on the skills you will learn, past skills you will refresh, and your interactions with the community. There will not be a points scoreboard this year. Many of you who have previously bought the Darknet 8 Badge have not unlocked the full features. We have quests for you to learn how to interact, develop, and reprogram it. It’s time to Learn, Teach, and Play Agents, are you ready?


Info: https://dcdark.net/

Discord: https://discordapp.com/channels/708208267699945503/735849065593438248/737077762845704224

Twitter DCDarkNet: https://twitter.com/DCDarknet

Twitter Holon: https://twitter.com/Holon_Network


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Darknet Contest
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
Here at Darknet, We are a Real Life (RL) Massively Multiplayer Online Role Playing Game (MMORPG), where we teach you real life skills and you get in-game points for it. Some may call this Gamified learning. We assume no prior knowledge on a subject, teach you the basics, then challenge you to use what you have learned. Our contest has a range of quests, starting with simple tasks and working your way up to very complex problems.

In the past we have taught you how to lock pick, crack wifi, create a PGP Key and communicate online safely, as well as soldering, programming, and code cracking, just to name a few.From there we would have sent you on quests to go to the different villages to learn something from them, and then come back and test your skills.

But alas, we have been forced underground…And while the physical aspect of the conference has moved online, so have we. This year we will be focusing on the skills you will learn, past skills you will refresh, and your interactions with the community. There will not be a points scoreboard this year. Many of you who have previously bought the Darknet 8 Badge have not unlocked the full features. We have quests for you to learn how to interact, develop, and reprogram it. It’s time to Learn, Teach, and Play Agents, are you ready?


Info: https://dcdark.net/

Discord: https://discordapp.com/channels/708208267699945503/735849065593438248/737077762845704224

Twitter DCDarkNet: https://twitter.com/DCDarknet

Twitter Holon: https://twitter.com/Holon_Network


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-11:59 PDT


Title: Darknet Contest
When: Sunday, Aug 9, 09:00 - 11:59 PDT
Where: See Description or Village

Description:
Here at Darknet, We are a Real Life (RL) Massively Multiplayer Online Role Playing Game (MMORPG), where we teach you real life skills and you get in-game points for it. Some may call this Gamified learning. We assume no prior knowledge on a subject, teach you the basics, then challenge you to use what you have learned. Our contest has a range of quests, starting with simple tasks and working your way up to very complex problems.

In the past we have taught you how to lock pick, crack wifi, create a PGP Key and communicate online safely, as well as soldering, programming, and code cracking, just to name a few.From there we would have sent you on quests to go to the different villages to learn something from them, and then come back and test your skills.

But alas, we have been forced underground…And while the physical aspect of the conference has moved online, so have we. This year we will be focusing on the skills you will learn, past skills you will refresh, and your interactions with the community. There will not be a points scoreboard this year. Many of you who have previously bought the Darknet 8 Badge have not unlocked the full features. We have quests for you to learn how to interact, develop, and reprogram it. It’s time to Learn, Teach, and Play Agents, are you ready?


Info: https://dcdark.net/

Discord: https://discordapp.com/channels/708208267699945503/735849065593438248/737077762845704224

Twitter DCDarkNet: https://twitter.com/DCDarknet

Twitter Holon: https://twitter.com/Holon_Network


Return to Index    -    Add to    -    ics Calendar file

 

BTVW2 - Friday - 18:00-19:30 PDT


Title: Data Analysis for Detection Research Through Jupyter Notebooks 101 (Beginner)
When: Friday, Aug 7, 18:00 - 19:30 PDT
Where: Blue Team Vlg - Workshop Track 2
Speakers:Roberto Rodriguez,Jose Rodriguez

SpeakerBio:Roberto Rodriguez
Roberto Rodriquez is a threat researcher and security engineer at the Microsoft Threat Intelligence Center (MSTIC) R&D team.

He is also the author of several open source projects, such as the Threat Hunter Playbook, Mordor, OSSEM, HELK and others, to aid the community development of techniques and tooling for threat research. He is also the founder of a new community movement to empower others in the InfoSec community named Open Threat Research.

Blog at https://medium.com/@Cyb3rWard0g

Twitter: @Cyb3rWard0g
https://medium.com/@Cyb3rWard0g

SpeakerBio:Jose Rodriguez
Jose is currently part of the ATT&CK team where he is currently revamping the concept of data sources. He is also one of the founders of Open Threat Research (OTR) and author of open source projects such as Infosec Jupyter Book, Open Source Security Event Metadata (OSSEM), Mordor, and Openhunt.
Twitter: @Cyb3rPandaH

Description:
Please see https://cfc.blueteamvillage.org/call-for-content-2020/talk/GCUYNN/ for pre-reqs.

From a detection research perspective, even after learning how to simulate a threat actor technique and generate some data in your lab environment, you might still struggle to know what to do with it. In some cases, you might need to filter, transform, correlate and visualize your data to come up with the right detection logic. In this workshop, we will walk you through a few basic data analysis techniques using open source and SIEM agnostic tools such as Jupyter Notebooks which are not only used by large organizations, but also can be deployed at home for free. Pre Requirements

Basics of Python
(optional) A computer with Docker Installed. If you are planning on deploying Jupyter in your own system, we will show you how to deploy it via Docker. It is not necessary since we are going to use BinderHub to interact with Jupyter Notebooks throughout the whole workshop.

Outline

Introduction to Jupyter Notebooks (10 mins) * Deployment Options
* Binder Project

Introduction to Apache Spark (5 mins)
* Spark Engine
* Spark SQL & DataFrames

Data Analysis Process 101 (10 mins)

We need data! (Mordor Project) (5 mins) * Download Datasets
* Raw Data -> DataFrame

A few data analysis techniques: (1 hour) * filter
* transform
* correlate
* visualize


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

BHV - Friday - 09:30-10:45 PDT


Title: DAY1 KEYNOTE: The Trust Talks
When: Friday, Aug 7, 09:30 - 10:45 PDT
Where: BioHacking Vlg
Speakers:Nina Alli,Vee Schmitt,Yusuf Henriques,Josh O'Connor,Cannibal,Devabhaktuni Srikrishna,Najla Lindsay,Nate DeNicola

SpeakerBio:Nina Alli
No BIO available

SpeakerBio:Vee Schmitt
Patient, Hacker

SpeakerBio:Yusuf Henriques
Army Veteran, Entrepreneur

SpeakerBio:Josh O'Connor
Recording Producer, Future Social Worker

SpeakerBio:Cannibal
Hacker, Maker

SpeakerBio:Devabhaktuni Srikrishna
Data Scientist

SpeakerBio:Najla Lindsay
DFIR Scientist, BHV Speaker Ops

SpeakerBio:Nate DeNicola , MD
Telehealth, Physician

Description:
Nina Alli, Executive Director of the Biohacking Village, interviews folks in the biomedical and health industry for their insight and thoughts on where healthcare is and calls to action. They were not informed of the questions, these are real reactions and real talk.

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Saturday - 10:00-10:45 PDT


Title: DAY2 KEYNOTE: Understanding DIYBio and Community Labs - A Social Science Approach
When: Saturday, Aug 8, 10:00 - 10:45 PDT
Where: BioHacking Vlg

SpeakerBio:Yong-Bee
Yong-Bee is a doctoral candidate at George Mason’s Biodefense program. He studies how biotechnology and society are expanding the population of those participating in the life sciences. He loves to go for hikes, travel outside the US, play video games, and strike up conversations with random people.

Description:
The Do-It-Yourself Biology (DIYBio) community arose starting in the mid-2000's. This community falls is typically described in two ways in public discourse. More conservative elements paint this community as a cause of concern - increased access to life sciences technology, knowledge, and capabilities raises concerns that community members may produce biological products for harmful purposes. More progressive elements highlight that the self-enforcing nature of the community mitigates harmful outcomes, and that the DIYBio community can also contribute to society by addressing gaps in science education, innovation, and workforce training.

This presentation will be a distillation of work I have been doing during my PhD work to build a better understanding of community labs - one of several significant segments of the DIYBio community. I will provide a risk assessment framework that national security experts appear to use in assessing risks from emerging technologies and related phenomena. I will then describe how this risk assessment framework may interpret DIYBio as an emerging threat to national security. The remainder of the presentation will be on presenting the nuances that complicate this allegedly straightforward assessment.


BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Sunday - 10:00-10:59 PDT


Title: DAY3 KEYNOTE: Why is Security Hard?
When: Sunday, Aug 9, 10:00 - 10:59 PDT
Where: BioHacking Vlg

SpeakerBio:Seth Carmody , PhD
Seth Carmody, PhD is the Vice President of Regulatory Strategy at MedCrypt. Prior to MedCrypt, Dr. Carmody worked as the cybersecurity program manager at the U.S. FDA's Center for Devices. Carmody brings eight years of experience in guiding medical device technology policy.

Description:
Security debt, the byproduct of market incentives, creates risk for healthcare stakeholders. The manifestation of that risk into harm and the resulting impact do not necessarily change active market incentives. As result, there is a series of cascading failures in the development, regulation, and maintenance of healthcare technology. Therefore, to make a significant impact on the security posture of healthcare and medical devices in particular, a system of policy and technological solutions must; align with active market incentives, enhance the effect of latent market incentives, or create new market incentives. A comprehensive solution is explored.

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 12:00-17:59 PDT


Title: DDSAT-1
When: Friday, Aug 7, 12:00 - 17:59 PDT
Where: Aerospace Vlg Workshop

Description:
If CPX SimpleSat was, well, too simple, try your hand at hacking DDSat-1. Here you’ll get to experiment with RF exploitation by attacking a mock satellite over RF while it is talking to a mock ground station. You’ll be able to mimic the style of RF commands being generated as a part of Hack-a-Sat, but in a more simplified and user friendly manner.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:00-15:59 PDT


Title: DDSAT-1
When: Saturday, Aug 8, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
If CPX SimpleSat was, well, too simple, try your hand at hacking DDSat-1. Here you’ll get to experiment with RF exploitation by attacking a mock satellite over RF while it is talking to a mock ground station. You’ll be able to mimic the style of RF commands being generated as a part of Hack-a-Sat, but in a more simplified and user friendly manner.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 09:00-13:59 PDT


Title: DDSAT-1
When: Sunday, Aug 9, 09:00 - 13:59 PDT
Where: Aerospace Vlg Workshop

Description:
If CPX SimpleSat was, well, too simple, try your hand at hacking DDSat-1. Here you’ll get to experiment with RF exploitation by attacking a mock satellite over RF while it is talking to a mock ground station. You’ll be able to mimic the style of RF commands being generated as a part of Hack-a-Sat, but in a more simplified and user friendly manner.

Return to Index    -    Add to    -    ics Calendar file

 

MOV - Saturday - 15:00-15:30 PDT


Title: Decentralization in a Centralized world
When: Saturday, Aug 8, 15:00 - 15:30 PDT
Where: Monero Vlg

SpeakerBio:rehr
No BIO available

Description:No Description available

Monero Village activities will be streamed to Twitch and YouTube.

Twitch: https://www.twitch.tv/monerovillage/

YouTube: https://www.youtube.com/c/monerocommunityworkgroup/

#mv-general-text: https://discord.com/channels/708208267699945503/732733510288408676


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Saturday - 11:00-11:59 PDT


Title: Decentralized Finance (DeFi) - ready for prime time ?
When: Saturday, Aug 8, 11:00 - 11:59 PDT
Where: Blockchain Vlg

SpeakerBio:Ryan Rubin
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Thursday - 14:15-15:15 PDT


Title: Deep Dive into Adversary Emulation - Ransomware Edition
When: Thursday, Aug 6, 14:15 - 15:15 PDT
Where: Red Team Vlg

SpeakerBio:Jorge Orchilles
Jorge Orchilles is the Chief Technology Officer of SCYTHE and co-creator of the C2 Matrix project. He led the offensive security team at Citi for over 10 years; a SANS Certified Instructor; author of Security 564: Red Team Exercises and Adversary Emulation; founding member of MITRE Engenuity Center of Threat-Informed Defense; CVSSv3.1 working group voting member; co-author of a Framework for the Regulatory Use of Penetration Testing in the Financial Services Industry; ISSA Fellow; and NSI Technologist Fellow. Jorge holds post-graduate degrees from Stanford and Florida International University in Advanced Computer Security & Master of Science. 

Description:
A day hardly goes by without hearing about another ransomware attack. This talk will focus on how to emulate a ransomware attack without introducing risk. We will understand how ransomware works, learn how criminals are evolving to get paid, create an adversary emulation plan that is safe but valuable for enterprises, and discuss how to defend against ransomware attacks.

Adversary Emulation is a type of ethical hacking engagement where the Red Team emulates how an adversary operates, leveraging the same tactics, techniques, and procedures (TTPs), against a target organization. The goal of these engagements is to train and improve people, process, and technology. This is in contrast to a penetration test that focuses on testing technology and preventive controls. Adversary emulations are performed using a structured approach following industry methodologies and frameworks (such as MITRE ATT&CK) and leverage Cyber Threat Intelligence to emulate a malicious actor that has the opportunity, intent, and capability to attack the target organization. Adversary Emulations may be performed in a blind manner (Red Team Engagement) or non-blind (Purple Team) with the Blue Team having full knowledge of the engagement.


Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 09:00-15:59 PDT


Title: Deep Space Networking
When: Friday, Aug 7, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Deep space communications utilize TCP/IP protocols with some added assistance from a TCP Convergence Layer and the Bundle Protocol. In this workshop, participants will examine the store-and-forward techniques used to transmit "bundles" of information from one host to another via a relay system. Using the latest version of Wireshark, participants will examine the TCP Convergence Header and locate the first packet of a bundle and the first and second legs of the relay process, as reassembled by Wireshark. After identifying the content contained within the bundle, participants will create a filter to locate the last packet of a bundle and examine key fields of the Bundle Protocol, including fields that define priority, destination type, endpoint IDs, and reporting of bundle delivery.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Saturday - 09:00-15:59 PDT


Title: Deep Space Networking
When: Saturday, Aug 8, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Deep space communications utilize TCP/IP protocols with some added assistance from a TCP Convergence Layer and the Bundle Protocol. In this workshop, participants will examine the store-and-forward techniques used to transmit "bundles" of information from one host to another via a relay system. Using the latest version of Wireshark, participants will examine the TCP Convergence Header and locate the first packet of a bundle and the first and second legs of the relay process, as reassembled by Wireshark. After identifying the content contained within the bundle, participants will create a filter to locate the last packet of a bundle and examine key fields of the Bundle Protocol, including fields that define priority, destination type, endpoint IDs, and reporting of bundle delivery.

Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 09:00-15:59 PDT


Title: Deep Space Networking
When: Sunday, Aug 9, 09:00 - 15:59 PDT
Where: Aerospace Vlg Workshop

Description:
Deep space communications utilize TCP/IP protocols with some added assistance from a TCP Convergence Layer and the Bundle Protocol. In this workshop, participants will examine the store-and-forward techniques used to transmit "bundles" of information from one host to another via a relay system. Using the latest version of Wireshark, participants will examine the TCP Convergence Header and locate the first packet of a bundle and the first and second legs of the relay process, as reassembled by Wireshark. After identifying the content contained within the bundle, participants will create a filter to locate the last packet of a bundle and examine key fields of the Bundle Protocol, including fields that define priority, destination type, endpoint IDs, and reporting of bundle delivery.

Return to Index    -    Add to    -    ics Calendar file

 

DCG - Sunday - 15:00-15:59 PDT


Title: DEF CON Groups Panel
When: Sunday, Aug 9, 15:00 - 15:59 PDT
Where: DEF CON Groups
Speakers:Brent White / B1TK1LL3R,Casey Bourbonnais / ADAM_915,Jayson E. Street,April C Wright

SpeakerBio:Brent White / B1TK1LL3R
Brent is a Sr. Security Consultant at NTT Security as well as a Trusted Advisor for the Tennessee Department of Safety and Homeland Security on the topics of Physical and Cyber Security. He is also the founder of the Nashville DEF CON group (DC615), and is the Global Coordinator for the DEF CON conference “Groups” program. He has held the role of Web/Project Manager and IT Security Director for a global franchise company as well as Web Manager and information security positions for multiple television personalities and television shows on The Travel Channel.
Twitter: @brentwdesign

SpeakerBio:Casey Bourbonnais / ADAM_915
No BIO available
Twitter: @Bourbonnais_c

SpeakerBio:Jayson E. Street
Jayson E. Street is the VP of InfoSec at SphereNY ... He is also DEF CON Groups Global Ambassador. Jayson battled a dragon during the Fire Run in Barcelona Spain. He 'accidentally broke into a shark tank in the Dominican Republic and climbed the pyramid of Giza (until the guards carrying AK-47s expressed their displeasure). He consulted with the Secret Service in 2007 on the WIFI security of the White House, and has had tea with a Lebanese General in Beirut. Jayson never finished High School but does have his GED. His first book is used as course material at four colleges in three countries (that he knows of), and he has spoken at numerous universities in the US and gave an eight-hour lecture at the Beijing Institute of Technology in 2014. Outside of standardized education, Jayson has spoken numerous times at DEF CON, at the first six DerbyCons and at many other Cons (Hack in Paris, Nuit Du Hack, IT-Defense, SYSCAN360, PH-Neutral, etc....) around the world. He was also on the David Letterman show (seriously) though he is still waiting for Stephen Colbert to have him on his show! Jayson is only one degree away from Kevin Bacon after awkward hugging Oliver Stone and Jimmy Fallon. He started in security and law enforcement over 30 years ago and has always striven to make things more secure. Jayson has been in the Information Security industry for over 18 years, and once broke into a high scale hotel in the South of France - barefoot - wearing Teenage Mutant Ninja Turtles pajamas. He was also noted as the best janitor of all McDonald's in the South East Texas region for 2 consecutive years.

SpeakerBio:April C Wright
April C. Wright is a hacker, author, teacher, and community leader who has been breaking, making, fixing, and defending the security of global critical communications and connections for over 25 years. She is an international speaker and trainer, educating and advising on matters of privacy and information security with the goal of safeguarding the digital components we rely on every day. April has held roles on defensive, operational, adversarial, and development teams throughout her career and is currently a Senior Application Security Architect. Her book, “Fixing An Insecure Software Life Cycle” was published through O’Reilly, and she is currently writing a new book to be published by No Starch Press. She is a co-host for the SecurityWeekly family of webcasts. April has spoken and contributed to numerous worldwide security conferences (often during repeat appearances), including BlackHat on three continents, DEF CON on two continents, DerbyCon, GRRcon, Layer 8, Hack in Paris, DefCamp Romania, ITWeb South Africa. She has also presented for the US Government and industry organizations such as OWASP and ISSA. She has started multiple small businesses including a non-profit and a photography studio. April currently handles communications for the Official DEF CON Groups global community outreach, and in 2017 she co-founded the local Boston meetup “DC617”. April has collected dozens of certifications to add capital letters at the end of her name, almost died in Dracula’s secret staircase, and once read on The Onion that researchers at the University of North Carolina released a comprehensive report in 2014 confirming her status as the “most significant and interesting person currently inhabiting the earth”, and it was on ‘teh internet’ so it must be true.
Twitter: @aprilwright

Description:
Do you love DEF CON? Do you hate having to wait for it all year? Well, thanks to DEF CON groups, you're able to carry the spirit of DEF CON with you year round, and with local people, transcending borders, languages, and anything else that may separate us! In this moderated panel, your DEF CON groups team who works behind the scenes to make DCG possible will discuss what DCG is all about, getting involved in the community, starting your own local group, and Q&A.

Twitch: https://www.twitch.tv/jaysonstreet

Interact @ #dcg-stage-text: https://discord.com/channels/708208267699945503/710379858429083698


All DEF CON Groups presentations are happening in AltSpace.

AltSpace: https://account.altvr.com/events/1520704529866162594

Listen @ #dcg-stage-voice: https://discord.com/channels/708208267699945503/740428852999880704

Interact @ #dcg-stage-text: https://discord.com/channels/708208267699945503/710379858429083698


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 10:00-19:59 PDT


Title: DEF CON Scavenger Hunt
When: Friday, Aug 7, 10:00 - 19:59 PDT
Where: See Description or Village

Description:
While everyone in the world finds themselves socially distanced and in some level of quarantine, we are bringing the DEF CON Scavenger Hunt to you. As this year is so different, teams will be limited to one person.

The list will drop at 10AM on Friday, with items to produce and tasks to accomplish until the game ends at noon on Sunday. You will be competing for glory, bragging rights, and prizes (that you can pick up at the table, during the next in-person DEF CON).


Forum: https://forum.defcon.org/node/232938

Discord: https://discord.com/channels/708208267699945503/711049278163779605

Twitter: https://twitter.com/DefConScavHunt

Web: http://defconscavhunt.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 10:00-19:59 PDT


Title: DEF CON Scavenger Hunt
When: Saturday, Aug 8, 10:00 - 19:59 PDT
Where: See Description or Village

Description:
While everyone in the world finds themselves socially distanced and in some level of quarantine, we are bringing the DEF CON Scavenger Hunt to you. As this year is so different, teams will be limited to one person.

The list will drop at 10AM on Friday, with items to produce and tasks to accomplish until the game ends at noon on Sunday. You will be competing for glory, bragging rights, and prizes (that you can pick up at the table, during the next in-person DEF CON).


Forum: https://forum.defcon.org/node/232938

Discord: https://discord.com/channels/708208267699945503/711049278163779605

Twitter: https://twitter.com/DefConScavHunt

Web: http://defconscavhunt.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 10:00-11:59 PDT


Title: DEF CON Scavenger Hunt
When: Sunday, Aug 9, 10:00 - 11:59 PDT
Where: See Description or Village

Description:
While everyone in the world finds themselves socially distanced and in some level of quarantine, we are bringing the DEF CON Scavenger Hunt to you. As this year is so different, teams will be limited to one person.

The list will drop at 10AM on Friday, with items to produce and tasks to accomplish until the game ends at noon on Sunday. You will be competing for glory, bragging rights, and prizes (that you can pick up at the table, during the next in-person DEF CON).


Forum: https://forum.defcon.org/node/232938

Discord: https://discord.com/channels/708208267699945503/711049278163779605

Twitter: https://twitter.com/DefConScavHunt

Web: http://defconscavhunt.com/


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 09:00-17:59 PDT


Title: Defcon Ham Radio Fox Hunting Contest
When: Friday, Aug 7, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In the world of amateur radio, groups of hams will often put together a transmitter hunt (also called "fox hunting") in order to hone their radio direction finding skills to locate one or more hidden radio transmitters broadcasting. The Defcon Fox Hunt will require participants to locate a number of hidden radio transmitters broadcasting at very low power which are hidden throughout the conference. Each transmitter will provide a clue or one time use ticket which will prove the player found the fox transmitter. A map with rough search areas will be given to participants to guide them on their hunt. Additional hints and tips will be provided throughout Defcon at the contest table to help people who find themselves stuck. A small prize to be determined will be given to each participant who locates all of the foxes each day. In previous years a custom made embroidered velcro-backed patch was given out or a "fun" trophy. The patches are always a big hit so it's likely we'll do that again this year if selected.

Forum: https://forum.defcon.org/node/232947

Discord: https://discord.com/channels/708208267699945503/711645275902574633

Twitter: https://twitter.com/richsentme

Web: https://defcon27foxhunt.com


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Saturday - 09:00-17:59 PDT


Title: Defcon Ham Radio Fox Hunting Contest
When: Saturday, Aug 8, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In the world of amateur radio, groups of hams will often put together a transmitter hunt (also called "fox hunting") in order to hone their radio direction finding skills to locate one or more hidden radio transmitters broadcasting. The Defcon Fox Hunt will require participants to locate a number of hidden radio transmitters broadcasting at very low power which are hidden throughout the conference. Each transmitter will provide a clue or one time use ticket which will prove the player found the fox transmitter. A map with rough search areas will be given to participants to guide them on their hunt. Additional hints and tips will be provided throughout Defcon at the contest table to help people who find themselves stuck. A small prize to be determined will be given to each participant who locates all of the foxes each day. In previous years a custom made embroidered velcro-backed patch was given out or a "fun" trophy. The patches are always a big hit so it's likely we'll do that again this year if selected.

Forum: https://forum.defcon.org/node/232947

Discord: https://discord.com/channels/708208267699945503/711645275902574633

Twitter: https://twitter.com/richsentme

Web: https://defcon27foxhunt.com


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Sunday - 09:00-17:59 PDT


Title: Defcon Ham Radio Fox Hunting Contest
When: Sunday, Aug 9, 09:00 - 17:59 PDT
Where: See Description or Village

Description:
In the world of amateur radio, groups of hams will often put together a transmitter hunt (also called "fox hunting") in order to hone their radio direction finding skills to locate one or more hidden radio transmitters broadcasting. The Defcon Fox Hunt will require participants to locate a number of hidden radio transmitters broadcasting at very low power which are hidden throughout the conference. Each transmitter will provide a clue or one time use ticket which will prove the player found the fox transmitter. A map with rough search areas will be given to participants to guide them on their hunt. Additional hints and tips will be provided throughout Defcon at the contest table to help people who find themselves stuck. A small prize to be determined will be given to each participant who locates all of the foxes each day. In previous years a custom made embroidered velcro-backed patch was given out or a "fun" trophy. The patches are always a big hit so it's likely we'll do that again this year if selected.

Forum: https://forum.defcon.org/node/232947

Discord: https://discord.com/channels/708208267699945503/711645275902574633

Twitter: https://twitter.com/richsentme

Web: https://defcon27foxhunt.com


Return to Index    -    Add to    -    ics Calendar file

 

BTVW1 - Saturday - 15:30-16:15 PDT


Title: Defending Your UNIX Hosts (Intermediate)
When: Saturday, Aug 8, 15:30 - 16:15 PDT
Where: Blue Team Vlg - Workshop Track 1
Speakers:Daniel Ward,Samuel Gasparro

SpeakerBio:Daniel Ward
Information Security / Linux Systems Engineer, based in Strasbourg, France.

My background is comprised largely of Linux Systems Administration, Architecture & Engineering, data recovery / incident response.

Twitter: @ghostinthecable

SpeakerBio:Samuel Gasparro
No BIO available

Description:
Over the past 7 months, I have created an open-source monitoring suite called Secsuite. Secsuite is a fully automated Threat Detection, System Monitorization / Notifier suite for UNIX Sysadmins & Users alike. Secsuite has multiple packages, the focus in this workshop shall be Inframon, which is able to monitor, defend & notify you about your infrastructure, probing your hosts for: - Apache Server Status
- Bandwidth Usage
- CPU Load Averages & Temperatures
- Disk Space Usage
- Latency time
- Memory (RAM) Usage
- Users Monitor

Over the past 7 months, I have created an open-source monitoring suite called Secsuite. Secsuite is a fully automated Threat Detection, System Monitorization / Notifier suite for UNIX Sysadmins & Users alike. Secsuite has multiple packages, the focus in this workshop shall be Inframon, which is able to monitor, defend & notify you about your infrastructure, probing your hosts for: - Apache Server Status
- Bandwidth Usage
- CPU Load Averages & Temperatures
- Disk Space Usage
- Latency time
- Memory (RAM) Usage
- Users Monitor


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

DC - Thursday - 15:30-15:59 PDT


Title: Demystifying Modern Windows Rootkits
When: Thursday, Aug 6, 15:30 - 15:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Bill Demirkapi , Independent Security Researcher
Bill is a student at the Rochester Institute of Technology with an intense passion for Windows Internals. Bill's interests include game hacking, reverse engineering malware, and exploit development. In his pursuit to make the world a better place, Bill constantly looks for the next big vulnerability following the motto "break anything and everything".
Twitter: @BillDemirkapi

Description:
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode. We'll walk through writing a rootkit from scratch, discussing how to load a rootkit, how to communicate with a rootkit, and how to hide a rootkit. With every method, we'll look into the drawbacks ranging from usability to detection vectors. The best part? We'll do this all under the radar, evading PatchGuard and anti-virus.

This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

BTVW1 - Sunday - 12:00-13:30 PDT


Title: Deploying Pi-hole: More Than an Ad Blocker (Beginner)
When: Sunday, Aug 9, 12:00 - 13:30 PDT
Where: Blue Team Vlg - Workshop Track 1

SpeakerBio:Ben Hughes
Ben Hughes (@CyberPraesidium) brings over 15 years of diverse experience in cyber security, IT, and law. He leads Polito's commercial services including pen testing, DFIR, and threat hunting. Prior to joining Polito, Ben worked on APT hunt teams at federal and commercial clients. He holds CISSP, GWAPT, and GCFA certifications.
Twitter: @CyberPraesidium

Description:
Pi-hole is a popular open source DNS server that can block ads network-wide, before they even reach your browser. As it effectively functions as a DNS sinkhole, Pi-hole can be configured to securely handle DNS requests for your network devices and automatically block not just ads, but a variety of malicious traffic. This workshop will walk you through how to quickly deploy Pi-hole to protect your home network or in a lab environment. A Raspberry Pi is optional; a Docker container, lightweight virtual machine, or even an old computer will work just fine.

This hands-on workshop will cover the following training outline: * Intro to Pi-hole
* Main features and latest features in the brand new 5.0 release * Deployment options * Network design and DNS/DHCP considerations * HA/failover considerations
* Initial install and configuration
* Using blacklists and whitelists
* Viewing metrics and logs
* What's next? Advanced features and possibilities


This is a workshop that requires pre-registration. Details for how to participate in this workshop can be obtained by contacting the Blue Team Village staff.

Return to Index    -    Add to    -    ics Calendar file

 

DC - Friday - 12:30-12:59 PDT


Title: Detecting Fake 4G Base Stations in Real Time
When: Friday, Aug 7, 12:30 - 12:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Cooper Quintin , Senior Staff Technologist, EFF
Cooper is a security researcher and Senior Staff Technologist with the EFF threat lab. He has worked on projects such as Privacy Badger and Canary Watch. With his colleagues at threat lab he has helped discover state sponsored malware and nation state actors such as Dark Caracal and Operation Manul. He has also performed security trainings for activists, non profit workers and ordinary folks around the world. He also was a co-founder of the Hackbloc hacktivist collective and published several issues of the DIY hacker zine "Hack This Zine." In his spare time he enjoys playing music and playing with his kid and imagining a better future.

Description:
4G based IMSI catchers such as the Hailstorm are becoming more popular with governments and law enforcement around the world, as well as spies, and even criminals. Until now IMSI catcher detection has focused on 2G IMSI catchers such as the Stingray which are quickly falling out of favor. In this talk we will tell you how 4G IMSI Catchers might work to the best of our knowledge, and what they can and can't do. We demonstrate a brand new software project to detect fake 4G base stations, with open source software and relatively cheap hardware. And finally we will present a comprehensive plan to dramatically limit the capabilities of IMSI catchers (with the long term goal of making them useless once and for all).

This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

AIV - Sunday - 09:00-09:30 PDT


Title: Detecting hand-crafted social engineering emails with a bleeding-edge neural language model
When: Sunday, Aug 9, 09:00 - 09:30 PDT
Where: AI Vlg
Speakers:Younghoo Lee,Joshua Saxe

SpeakerBio:Younghoo Lee
No BIO available

SpeakerBio:Joshua Saxe
No BIO available

Description:No Description available

AI Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/aivillage


Return to Index    -    Add to    -    ics Calendar file

 

BTVT1 - Friday - 16:00-16:30 PDT


Title: Detecting The Not-PowerShell Gang (Intermediate)
When: Friday, Aug 7, 16:00 - 16:30 PDT
Where: Blue Team Vlg - Talks Track 1

SpeakerBio:Mangatas Tondang
Professionally, Mangatas is a Threat Hunter for one of the major Canadian Telecommunication company. As a blue teamers, he is passionate on learning and breaking the hacking tools to pieces and try to develop detection against them. He also love following and building detection from the recent intelligence report on different APT groups. Coming from a school that taught him broad spectrum of Information Security, he also love exploring application security, reverse engineering, and script tools that can help him and his coworkers. He wouldn't be here without community support, that's why he love to give security training for other people and currently he is also a member of CTF challenge development team for his almamater. Outside the Security world, He is a guitarist and also "wannabe" astrophotographer.
Twitter: @tas_kmanager

Description:
Since the advancement of security features released in PowerShell version 5, Red Team folks are forced to not use PowerShell to have successful and undetectable engagements. Some of them even push the boundary and created their own Not-PowerShell tools and released it to the public. As a Blue Teamer, this means we need to reinforce our perimeter against these tools. This talk will uncovers some of the popular Not-PowerShell tools followed by how the blue teams can still spot these tools and build detection on it.

This talk will look into several not-powershell tools and craft several detection tactics based on their mechanism. We will utilize common logging tools, Sysmon and Windows Logs (Integrated to SIEM).

We will start with Introduction and will quickly go through the common mechanism used by the not-powershell tools

Tools we are going to look at are:
- InvisiShell
- NoPowerShell
- PowerShdll
- PowerLessShell
- And some other tools with similar mechanism

After getting familiar with the mechanisms, we will put our blue hat back and see what artifacts left by these tools and build reliable detection for each mechanisms leaving small room for false positives. At the end of the day, the blue team will be awarded with some queries (also known as rules or use cases) that they can use and deploy at their own SIEM solution.


Blue Team Village activities in 'Talks Track 1' will be streamed to Twitch.

Twitch: https://twitch.tv/BlueTeamVillage


Return to Index    -    Add to    -    ics Calendar file

 

CPV - Saturday - 12:00-12:59 PDT


Title: Differential Privacy..more important than ever in the world of Covid-19
When: Saturday, Aug 8, 12:00 - 12:59 PDT
Where: Crypto & Privacy Vlg

SpeakerBio:Aditi Joshi
Aditi Joshi works in Google Cloud's Security and Privacy Engineering team. Before Google, she was focused on data privacy research especially in health care with a focus on user trust at the core. She joined Google because she was excited about the work that Google was doing in privacy on a massive scale. She believes that privacy is a human right and will continue to work towards that end.

Description:
The goal of this talk is to explain the concept of anonymization and differential privacy, as well as offer up Codelabs and modules with the purpose of explaining Google’s open source Differential Privacy library and other tools for implementation purposes. We will offer up our Covid Mobility reports as a case study and talk about the importance of privacy preserving aggregation from a social science perspective.

Crypto & Privacy Village activities will be streamed to YouTube and Twitch.

Twitch: https://twitch.tv/cryptovillage

YouTube: https://www.youtube.com/channel/UCGWMS6k9rg9uOf3FmYdjwwQ


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Friday - 14:00-14:30 PDT


Title: Digital Health Technologies in the NIH All of Us Research Program
When: Friday, Aug 7, 14:00 - 14:30 PDT
Where: BioHacking Vlg

SpeakerBio:Michelle Holko , PhD, PMP
Michelle Holko, PhD, PMP, is a White House Presidential Innovation Fellow working with NIH’s All of Us Research Program. Her technical expertise is in genomics and bioinformatics, and her work lies at the intersection of health and health security, technology, data/analytics, and biosecurity policy.

Description:
The National Institutes of Health’s (NIH) All of Us Research Program (AoURP) aims to enroll at least one million US participants from diverse backgrounds; collect electronic health record (EHR) data, survey data, physical measurements, biospecimens for genomics and other assays, and digital health data; and create a researcher database and tools to enable precision medicine research. Since inception, digital health technologies (DHT) have been envisioned as integral to achieving the goals of the program. A “bring your own device” (BYOD) pilot for collecting Fitbit data from participants’ devices was developed with more recent integration of Apple HealthKit data donation and additional DHTs planned in the future. This presentation will describe 1) the initial process to assess, curate, and include Fitbit BYOD data in the All of Us Researcher Workbench, 2) the diversity and assessment of under-represented in biomedical research (UBR) in Fitbit BYOD participants compared with overall AoU participant population, and 3) future DHT studies planned for AoURP.

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

CLV - Saturday - 15:30-17:30 PDT


Title: Discovering Cloud File Storage Artifacts
When: Saturday, Aug 8, 15:30 - 17:30 PDT
Where: Cloud Vlg

SpeakerBio:Michael Wylie , Director of Cybersecurity Services, Richey May Technology Solution
Michael Wylie (Twitter: @TheMikeWylie), MBA, CISSP is the Director of Cybersecurity Services at Richey May Technology Solutions. In his role, Michael is responsible for delivering information assurance by means of vulnerability assessments, cloud security, penetration tests, risk management, and training. Michael has developed and taught numerous courses for the U.S. Department of Defense, DEFCON, Universities, and for clients around the world. Michael is the winner of numerous SANS challenge coins and holds the following credentials: CISSP, CCNA R&S, CCNA CyberOps, GMON, GPEN, TPN, CEH, CEI, VCP-DCV, CHPA, PenTest+, Security+, Project+, and more.
Twitter: @TheMikeWylie

Description:
Organizational data is rapidly moving to the cloud, but it's not always intentional. The shift from on-premise data storage to the cloud constitutes a significant challenge and risk to the modern enterprise. The use of cloud file storage applications is on the rise for both consumer and business systems, which results in interesting data and metadata siting on endpoints. In this talk, we'll examine the large footprints of popular cloud file storage applications such as OneDrive and Box - learning what information can be enumerated from each cloud file storage solution. In some scenarios, data can be carved out from cache, restoring sensitive documents no longer on an endpoint.

Attendees will:

The slides and labs will take a deep dive into Microsoft OneDrive, Google Drive, Dropbox, Box, and Citrix ShareFile to first understand what is known about the applications and artifacts left behind, then move into hands-on labs to analyze registry keys, log files, and other traces left behind by the applications.


YouTube: https://www.youtube.com/watch?v=gwBG_oKDINQ

#cloudv-general-text: https://discord.com/channels/708208267699945503/732733373172285520


Return to Index    -    Add to    -    ics Calendar file

 

BTVT1 - Friday - 17:00-17:59 PDT


Title: Discovering ELK The First Time - Lessons Learned Over 2 Years (Beginner)
When: Friday, Aug 7, 17:00 - 17:59 PDT
Where: Blue Team Vlg - Talks Track 1

SpeakerBio:TheDrPinky
Dr. Pinky has been a computer scientist for the US Air Force for the last six years. She specializes in threat hunting and digital forensics for both Linux and Windows operating systems. You can find DrPinky in the infosec area as the social media coordinator for BSides San Antonio, participating in the San Antonio Hackers Association (SAHA), and presenting at events such as SANS Blue Team Summit and Texas Cyber Summit.
Twitter: @TheDrPinky

Description:
ELK has become one of the favorite tools of blue teamers across the world. However, when you’re first getting used to ELK, you may be overwhelmed and not fully understanding what is happening. There is more to do with it than simply feed in logs and search it in a pretty web UI! This talk will focus on things I wish I knew about ELK back when I was first learning it to help provide some quick wins for those new to ELK, and maybe a few tidbits for those who already use it.

Elastic, Logstash, and Kibana (ELK) continue to keep becoming more popular with blue teamers - there’s plenty of documentation, you can custom develop anything you want with it due to the fact it’s open source, and it’s free! However, those first starting out with ELK can become quickly overwhelmed. When these people finally get the hang of ELK, they still may be missing some critical understanding that limits them - why can’t I filter by hostname? What do these pretty yellow triangles really mean? This is because most people will get used to just Kibana - not rest of the stack. In this talk I’ll cover lessons I wish I learned a lot sooner about ELK that would have helped me out - and hopefully they help you too!

Lesson 1: Elastic and Kibana are NOT the same. Going into the differences, why they get confused, and what the actual differences are.

Lesson 2: Logstash is more powerful than you give it credit for, but is incredibly overwhelming. Here’s some ways to get some quick bang for buck.

Lesson 3: How do you go about feeding in your own custom documents to ELK? This will quickly go into popular ways to feed logs into ELK, and if that doesn’t help, how to feed in other information to ELK through a more manual approach. Never know when a custom script output would be better put in elastic!

Lesson 4: Don’t forget about your Linux logs! With Linux we may be more used to relying on rsyslog to forward everything - but this most likely just captures your application logs. What about the equivalency of event logs on Linux? This will (very) briefly introduce auditd, how to forward it to ELK, and how to best parse through it.


Blue Team Village activities in 'Talks Track 1' will be streamed to Twitch.

Twitch: https://twitch.tv/BlueTeamVillage


Return to Index    -    Add to    -    ics Calendar file

 

DC - Thursday - 09:30-09:59 PDT


Title: Discovering Hidden Properties to Attack Node.js ecosystem
When: Thursday, Aug 6, 09:30 - 09:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Feng Xiao , security researcher at Georgia Tech
Feng Xiao is a security researcher at Georgia Tech. His research interests include software/system security. He has published three papers on top security venues such as DEFCON, IEEE S&P, and CCS.
https://fxiao.me/

Description:
Node.js is widely used for developing both server-side and desktop applications. It provides a cross-platform execution environment for JavaScript programs. Due to the increasing popularity, the security of Node.js is critical to web servers and desktop clients.

We present a novel attack method against the Node.js platform, called hidden property abusing (HPA). The new attack leverages the widely-used data exchanging feature of JavaScript to tamper critical program states of Node.js programs, like server-side applications. HPA entitles remote attackers to launch serious attacks, such as stealing confidential data, bypassing security checks, and launching denial of service attacks. To help developers detect the HPA issues of their Node.js applications, we develop a tool, named LYNX, that utilizes hybrid program analysis to automatically reveal HPA vulnerabilities and even synthesize exploits. We apply LYNX on a set of widely-used Node.js programs and identify 13 previously unknown vulnerabilities. LYNX successfully generates 10 severe exploits. We have reported all of our findings to the Node.js community. At the time of paper writing, we have received the confirmation of 12 vulnerabilities and got 12 CVEs assigned. Moreover, we collaborated with an authoritative public vulnerability database to help them use a new vulnerability notion and description in related security issues.

The talk consists of four parts. First, we will introduce recent offensive research on Node.js. Second, we will introduce HPA by demonstrating an exploit on a widely-used web framework. Third, we will explain how to leverage program analysis techniques to automatically detect and exploit HPA. In the end, we will have a comprehensive evaluation which discusses how we identified 13 HPA 0days with the help of our detection method.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

HRV - Saturday - 11:30-12:30 PDT


Title: Discussion: What makes a good ham radio operator?
When: Saturday, Aug 8, 11:30 - 12:30 PDT
Where: Ham Radio Vlg

Description:
Panel discussion around what makes a good ham operator, as opposed to a 'lid' (a bad operator). We'll also talk about all of the strange lingo ham radio loves to use.

This Ham Radio Village event will be held on Twitch. Related conversation will be held in the DEF CON Discord, channel #ham-presentation-text (Q&A).

Twitch: https://www.twitch.tv/hamradiovillage

#ham-presentation-text: https://discord.com/channels/708208267699945503/736674835413073991


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Sunday - 13:00-13:30 PDT


Title: Dissecting Wireless Privacy In Aviation
When: Sunday, Aug 9, 13:00 - 13:30 PDT
Where: Aerospace Vlg

SpeakerBio:Martin Strohmeier
Martin Strohmeier is a Junior Research Fellow of Kellogg College, University of Oxford and a Senior Scientist at the Swiss Cyber Defence Campus.The main focus of his work has been the design, implementation, and analysis of security protocols for cyber-physical systems, specifically those used in critical infrastructures such as aviation (civil and military). Using these domains as a driver for the real-world applicability of his research, his work has been published in many diverse venues, spanning wireless communications, cryptography, systems security, sensor networking, privacy, and aviation.

After his DPhil, he has been extending his interests towards areas of open-source intelligence, privacy issues in aviation and satellite environments, and most recently adversarial machine learning. Martin is also a co-founder of the aviation research network OpenSky where he is responsible for communication and research activities.


Description:
A multitude of wireless technologies are used within air traffic communication. From a conceptual perspective, all of them are insecure as confidentiality was never part of their design and they could not keep up with the change in threat models. This talk analyzes the current state of wireless privacy in aviation, covering air traffic control and datalink communication. We show how combining publicly available data sources enables global tracking of every aircraft for anyone interested. In particular, we present various case studies to demonstrate how anyone can undermine the privacy of military, governmental and corporate operators. Finally, we look at some industry responses and illustrate the futility of the current attempts to maintain privacy for aircraft owners in a world of ubiquitous sensor surveillance.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

BHV - Saturday - 15:15-15:59 PDT


Title: DIY Diabetics and a Million Boluses
When: Saturday, Aug 8, 15:15 - 15:59 PDT
Where: BioHacking Vlg
Speakers:Dr. Mike Rushanan,Julian Suleder

SpeakerBio:Dr. Mike Rushanan
Dr. Mike Rushanan is the Director of Medical Security at Harbor Labs and is a security expert in diabetes management. Dr. Rushanan received his PhD in Computer Science through the Johns Hopkins University Health and Medical Security Lab studying under Dr. Avi Rubin.

SpeakerBio:Julian Suleder
Julian Suleder is a Security Analyst & Researcher at ERNW Research GmbH in Heidelberg, Germany. His research interest is the security of medical devices as he holds a master’s degree in medical informatics from Heidelberg University and Heilbronn University, Germany.

Description:No Description available

BioHacking Village activities will be streamed to Twitch and YouTube.

Twitch: https://m.twitch.tv/biohackingvillage/profile

YouTube: https://www.youtube.com/channel/UCm1Kas76P64rs2s1LUA6s2Q/


Return to Index    -    Add to    -    ics Calendar file

 

ENT - Saturday - 20:00-20:59 PDT


Title: Dj St3rling
When: Saturday, Aug 8, 20:00 - 20:59 PDT
Where: See Description or Village

Description:
Performing for his second year in a row at DEF CON, Dj St3rling loves to spin electronic music. When he's not making music, he enjoys: bowling, eating tacos, sleeping, and CTF!

Forum: https://forum.defcon.org/node/230970

Discord: https://discord.com/channels/708208267699945503/735624334302904350

Location: https://www.twitch.tv/defcon_music

Facebook: https://www.facebook.com/OfficialDjSt3rling

Soundcloud: https://soundcloud.com/theycallmest3r

Instagram: https://www.instagram.com/theycallmest3r/


Return to Index    -    Add to    -    ics Calendar file

 

DCG - Saturday - 15:15-15:59 PDT


Title: DNS New World Order, version 1.4: QuadX! DoH! DoT! Da Fuq?
When: Saturday, Aug 8, 15:15 - 15:59 PDT
Where: DEF CON Groups

Description:
Presentation by DC603 (New Hampshire, USA)

All DEF CON Groups presentations are happening in AltSpace.

AltSpace: https://account.altvr.com/events/1520704529866162594

Listen @ #dcg-stage-voice: https://discord.com/channels/708208267699945503/740428852999880704

Interact @ #dcg-stage-text: https://discord.com/channels/708208267699945503/710379858429083698


Return to Index    -    Add to    -    ics Calendar file

 

CPV - Friday - 16:00-16:59 PDT


Title: DNS Privacy
When: Friday, Aug 7, 16:00 - 16:59 PDT
Where: Crypto & Privacy Vlg

SpeakerBio:Matt Cheung
Matt developed his interest and skills in cryptography during graduate work in Mathematics and Computer Science. During this time he had an internship at HRL Laboratories LLC working on implementing elliptic curve support for a Secure (in the honest-but-curious model) Two-Party Computation protocol. From there he implemented the version secure in the malicious model. He currently works as an Application Security Consultant at Veracode, but continues to learn about cryptography in his spare time.

Description:
While there are many protocols such as https that encrypt network sessions to preserve the security and privacy of that communication, typically the first step is a DNS query. DNS, being a plaintext protocol, can compromise the privacy of a user. In this talk we will discuss what can be currently done and potential future protocols such as Oblivious DNS.

Crypto & Privacy Village activities will be streamed to YouTube and Twitch.

Twitch: https://twitch.tv/cryptovillage

YouTube: https://www.youtube.com/channel/UCGWMS6k9rg9uOf3FmYdjwwQ


Return to Index    -    Add to    -    ics Calendar file

 

DC - Thursday - 11:30-11:59 PDT


Title: DNSSECTION: A practical attack on DNSSEC Zone Walking
When: Thursday, Aug 6, 11:30 - 11:59 PDT
Where: DEF CON Q&A Twitch
Speakers:Hadrien Barral,Rémi Géraud-Stewart

SpeakerBio:Hadrien Barral , Hacker
Hadrien Barral is an R&D engineer, focusing on security and high-assurance software. He enjoys hacking on exotic hardware.

SpeakerBio:Rémi Géraud-Stewart , Hacker
Rémi Géraud-Stewart is a cryptologist and security expert with École Normale Supérieure in Paris, focusing on intrusion and cyberwarfare.

Description:
Domain Name System (DNS) is an ubiquitous and essential component of the Internet. It performs translations between identifiers and resources (mostly domain names and computers, but not only), yet remains often invisible to the user. But DNS is not harmless: although not intended to be a general purpose database, it has been extended to incorporate additional types of information. Including information that should not be there.

In this talk we show how to exploit DNSSEC zone walking to perform advanced recon operations, on a real case, namely to obtain client private information from a large European cloud provider. This constitutes the first practical zone walking attack at such a scale.

Using this exploit we collected a substantial amount of private information, enough to share some interesting statistics. By the end of this talk, you will have everything you need to know to perform similar attacks -- and resist them.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

DC - Thursday - 16:30-16:59 PDT


Title: Domain Fronting is Dead, Long Live Domain Fronting: Using TLS 1.3 to evade censors, bypass network defenses, and blend in with the noise
When: Thursday, Aug 6, 16:30 - 16:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Erik Hunstad , CTO, SIXGEN
Erik Hunstad is a security expert and researcher who realized the power of programming and security when he coded an algorithm to reduce the search space of possible Master Lock combinations in RAPTOR. Erik is the CTO and Adversary Emulation Lead at SIXGEN where he specializes in deploying the latest offensive security techniques against customers. He previously worked for the Department of Defense.
Twitter: @SixGenInc

Description:
Domain fronting, the technique of circumventing internet censorship and monitoring by obfuscating the domain of an HTTPS connection was killed by major cloud providers in April of 2018. However, with the arrival of TLS 1.3, new technologies enable a new kind of domain fronting. This time, network monitoring and internet censorship tools are able to be fooled on multiple levels. This talk will give an overview of what domain fronting is, how it used to work, how TLS 1.3 enables a new form of domain fronting, and what it looks like to network monitoring. You can circumvent censorship and monitoring today without modifying your tools using an open source TCP and UDP pluggable transport tool that will be released alongside this talk.

This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

DC - Friday - 15:30-15:59 PDT


Title: Don't Be Silly - It's Only a Lightbulb
When: Friday, Aug 7, 15:30 - 15:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Eyal Itkin , Vulnerability Researcher at Check Point Software Technologies
Eyal Itkin is a vulnerability researcher in the Malware and Vulnerability Research group at Check Point Software Technologies. Eyal has an extensive background in security research, that includes years of experience in embedded network devices and protocols, bug bounties from all popular interpreter languages, and an award by Microsoft for his CFG enhancement white paper. When not breaking RDP or FAX, he loves bouldering, swimming, and thinking about the next target for his research.
Twitter: @EyalItkin

Description:
A few years ago, a team of academic researchers showed how they can take over and control smart lightbulbs, and how this in turn allows them to create a chain reaction that can spread throughout a modern city. Their research brought up an interesting question: aside from triggering a blackout (and maybe a few epilepsy seizures), could these lightbulbs pose a serious risk to our network security? Could attackers somehow bridge the gap between the physical IoT network (the lightbulbs) and even more appealing targets, such as the computer network in our homes, offices or even our smart cities?

We’re here to tell you the answer is: Yes.

Join us as we take a deep dive into the world of ZigBee IoT devices. Continuing from where the previous research left off, we go right to the core: the smart hub that acts as a bridge between the IP network and the ZigBee network. And let me tell you this, this harsh embedded environment is surely not on our side. With a maximal message size of less than 128 bytes, complex state machines and various strict timing constraints, this challenge is going to be tough.

After a long journey, we finally made it. By masquerading as a legitimate ZigBee lightbulb, we were able to exploit vulnerabilities we found in the bridge, which enabled us to infiltrate the lucrative IP network using a remote over-the-air ZigBee exploit.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

DC - Saturday - 11:30-11:59 PDT


Title: Don't Ruck Us Again - The Exploit Returns
When: Saturday, Aug 8, 11:30 - 11:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Gal Zror , Research team leader in Aleph Research
Gal Zror is a research team leader in Aleph Research group at HCL AppScan, based in Herzliya Israel. Gal has extensive experience with vulnerability research and specialized in embedded systems and protocols. Gal is also an amateur boxer and a tiki culture enthusiast.
Twitter: @waveburst

Description:
From the researchers who brought to you "Don't Ruck Us Too Hard" comes a brand new follow-up research. This summer! We will show that all of Ruckus Wireless "ZoneDirector" and the ""Unleashed"" devices are still vulnerable.

This follow-up research includes six new vulnerabilities, such as command injection, information leakage, credentials overwrite, and stack overflow and XSS. With these vulnerabilities, we were able to achieve two new and different pre-auth RCEs. Combined with the first research, that is five entirely different RCEs in total. We also found that Ruckus did not fix some of the vulnerabilities from the first research correctly, and they are still exploitable by using a very neat payload :).

Other cool stuff about this research:
We will share a new Ghidra script we used to map the critical sections in the webserver binary that were later found vulnerable. We managed to fingerprinted Universities and Organizations that were vulnerable from the internet. BlackHat uses Ruckus Wireless for Wi-Fi solutions.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

VMV - Saturday - 13:00-13:30 PDT


Title: Don’t Go Postal Over Mail In Voting
When: Saturday, Aug 8, 13:00 - 13:30 PDT
Where: Voting Vlg

SpeakerBio:Bianca Lewis , Founder and CEO, Girls Who Hack; Secure OpenVote
No BIO available

Description:
As the previous DEF CON Voting Villages have proved, our voting equipment and infrastructure are very vulnerable to multiple types of attacks. But now, with everything that’s going on in the world ,voting by mail is the new vulnerable thing! Instead of focusing on problems and broken things, this talk will focus on simple fixes that vendors and governments can put into action right now. Starting with the registering to vote, then moving through parts of the entire system, BiaSciLab will offer suggestions on how simple practices and changes in thinking can improve the security of the entire system.

Last year, in the Voting Village BiaSciLab did a talk on the election systems problems and howto fix them. This year with voting by mail, new problems are appearing! Like States not allowing people to vote by mail! Breaking down these flaws and offering real solutions for each one, BiaSciLab will bring hope in the face of this daunting and complex security problem in these hard times.



YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

LPV - Friday - 15:00-15:30 PDT


Title: Doors, Cameras, and Mantraps OH MY!
When: Friday, Aug 7, 15:00 - 15:30 PDT
Where: Lockpick Vlg

SpeakerBio:Dylan The Magician
No BIO available

Description:
Lockpicking, door bypassing, and physical security are among the more eye catching components of an on premises risk assessment. It always draws the most questions and gets the most staff popping over to see what's going on. I suppose it's because the physical space is personal, it isn't digital and hence it draws more focus. I do on premises risk assessment and I want to tell you a bit about how the process goes with my company and share my personal philosophies on how I do my engagements. What I hope to gain is a stronger focus on Physical Security, or PhysSec, in the Cybersecurity domain.

Lockpick Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/toool_us


Return to Index    -    Add to    -    ics Calendar file

 

CPV - Friday - 13:00-13:59 PDT


Title: Dos, Donts and How-Tos of crypto building blocks using Java
When: Friday, Aug 7, 13:00 - 13:59 PDT
Where: Crypto & Privacy Vlg

SpeakerBio:Mansi Sheth
Mansi Sheth is a Principal Security Researcher at Veracode Inc. In her career, she has been involved with breaking, defending and building secure applications. Mansi researches various languages and technologies, finds insecure usage in customer code and suggests automation measures in finding vulnerabilities for Veracode's Binary Static Analysis service. She is an avid traveller with the motto "If not now, then when?”

Description:
Do you feel unequipped to understand real world crypto attacks? Are you overwhelmed with the over-abundance of choices provided by any modern cryptography API, to make a secure decision while choosing a randomness provider, encryption scheme or digital signature APIs? Are you on top of all the latest happenings in cryptographic communities, to know which cryptographic primitives is deemed broken? Due to sheer lack of documentation of the chosen API, do you feel paralyzed on where and how to start designing or analyzing any cryptographic systems?

If any of these answers are "yes", come join me in this talk. I will be going over each cryptographic primitive like Random Number Generators, Encryption/Decryption algorithms, message authentication codes, digital signatures, password storage etc pointing out dos and donts based on evaluating bunch of leading cryptographic implementations. Java being one of the most widely used enterprise language, and simultaneously one of the most chaotic cryptography architecture, we chose it to get into some live coding exercises to showcase its secure usage, while also future-proofing your cryptographic applications.


Crypto & Privacy Village activities will be streamed to YouTube and Twitch.

Twitch: https://twitch.tv/cryptovillage

YouTube: https://www.youtube.com/channel/UCGWMS6k9rg9uOf3FmYdjwwQ


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Friday - 13:30-13:59 PDT


Title: Double Spending in BSV, is it Possible?
When: Friday, Aug 7, 13:30 - 13:59 PDT
Where: Blockchain Vlg

SpeakerBio:Poming Lee
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

WLV - Thursday - 09:00-09:01 PDT


Title: DragonOS - How I kept busy during COVID19
When: Thursday, Aug 6, 09:00 - 09:01 PDT
Where: Wireless Vlg

SpeakerBio:cemaxecuter
I'd rather keep my job experience private. I am from a small town, but have been all over. I've met the developers of OpenWRT in Germany, developed my own line of dual mesh radios under the AWDMESH name, back when OpenMesh used the OM1P's, put together the ZoneMinder DVD using remastersys, and now fast forward I've put all my effort during COVID19 into making the Linux distributions called DragonOS 10, DragonOS LTS, and DragonOS Focal specifically for SDRs.

I've easily put hundreds and hundreds of hours into testing and making everything work along with making videos for YouTube in the hopes they'll help others develop a passion for Linux and SDRs.

A buddy of mine by the name of Rick from Wireless Village encouraged me to talk about DragonOS 10/LTS and now my latest work, DragonOS Focal.


Description:
Intro
Why I started DragonOS
What is DragonOS
What problems and challenges I had to overcome What companies and developers helped and who donated equipment

This talk is available on YouTube.


Talk: https://www.youtube.com/watch?v=69k1Dmr2Ruk


Return to Index    -    Add to    -    ics Calendar file

 

CRV - Saturday - 15:00-15:59 PDT


Title: Drinks with Recruiters
When: Saturday, Aug 8, 15:00 - 15:59 PDT
Where: Career Hacking Vlg
Speakers:Kris Rides,Rachel Bozeman,Matt Duren,Pete Radloff

SpeakerBio:Kris Rides
No BIO available

SpeakerBio:Rachel Bozeman
No BIO available

SpeakerBio:Matt Duren
No BIO available

SpeakerBio:Pete Radloff
No BIO available

Description:
Recruiters are people too, but given the backlashes we have seen along with the poor spam messages from "recruiters" you would think otherwise. So a group of recruiters familiar with the community will sit down over drinks and share some of their horror stories. From this you will learn how to improve your job search, your interviewing and maybe come to enjoy working with recruiters.

Career Hacking Village activities can be watched on YouTube.

CHV YouTube: https://www.youtube.com/channel/UCxF_PpndJEoi4fsrQx6yuQw


Return to Index    -    Add to    -    ics Calendar file

 

PHVT - Friday - 13:00-13:59 PDT


Title: Dumpster Fires: 6 Things About IR I Learned by Being a Firefighter
When: Friday, Aug 7, 13:00 - 13:59 PDT
Where: Packet Hacking Vlg - Talk

SpeakerBio:Dr. Catherine Ullman , Sr. Information Security Forensic Analyst
Dr. Catherine J. Ullman (Twitter: @investigatorchi) is a security researcher, speaker, and Senior Information Security Forensic Analyst at University at Buffalo with over 20 years of highly technical experience. In her current role, Cathy is a data forensics and incident response (DFIR) specialist, performing incident management, intrusion detection, investigative services, and personnel case resolution in a dynamic academic environment. She additionally builds security awareness amongst faculty and staff via a comprehensive department-wide program which educates and informs users about how to prevent and detect social engineering threats, and how to compute and digitally communicate safely. Cathy has presented at numerous prestigious information security conferences including DEF CON and Hacker Halted. In her (minimal) spare time, she enjoys visiting her adopted two-toed sloth Flash at the Buffalo zoo, researching death and the dead, and learning more about hacking things to make the world a more secure place.
Twitter: @investigatorchi

Description:
Threats surround us like a ring of burning fire. Unfortunately, incident response doesn't come naturally to an operational mindset where the focus tends to be on reactive problem solving. As a volunteer firefighter for over twenty years, investigatorchic has learned a lot about what is and isnt effective. There are surprising parallels between fighting real-life fires and the fire-fighting that passes for today's incident response. For example, striking a balance between swift response and patient reflection is often the difference between life and death, in a very literal sense for the firefighter and a figurative sense for the security professional. It's also all too easy to get tunnel vision and focus on the wrong areas, costing precious time. The security world is full of dumpster fires these days, so join this session to learn from a good firefighter what makes a good security person.


YouTube: http://youtube.com/wallofsheep

Twitch: http://twitch.tv/wallofsheep

Facebook: http://facebook.com/wallofsheep/

Periscope: https://t.co/gnl7JLlftA?amp=1


Return to Index    -    Add to    -    ics Calendar file

 

CNE - Friday - 17:00-18:59 PDT


Title: EFF Tech Trivia Pub Quiz
When: Friday, Aug 7, 17:00 - 18:59 PDT
Where: See Description or Village

Description:
EFF's team of technology experts have crafted challenging trivia about the fascinating, obscure, and trivial aspects of digital security, online rights, and Internet culture. Competing teams will plumb the unfathomable depths of their knowledge, but only the champion hive mind will claim the First Place Tech Trivia Plaque and EFF swag pack. The second and third place teams will also win great EFF gear.

Forum: https://forum.defcon.org/node/232941

Discord: https://discord.com/channels/708208267699945503/711644552573747350

Twitter: https://twitter.com/EFF

Web: https://eff.org


Return to Index    -    Add to    -    ics Calendar file

 

POV - Friday - 15:30-16:30 PDT


Title: Election Security
When: Friday, Aug 7, 15:30 - 16:30 PDT
Where: See Description or Village

Description:
This event requires registration. Please see the below URL for details.

Registration: https://www.eventbrite.com/e/def-con-community-roundtable-election-security-tickets-115977739541


Return to Index    -    Add to    -    ics Calendar file

 

VMV - Saturday - 14:30-14:59 PDT


Title: Electronic Ballot Return Standards & Guidelines
When: Saturday, Aug 8, 14:30 - 14:59 PDT
Where: Voting Vlg
Speakers:Forrest Senti,Mattie Gullixson

SpeakerBio:Forrest Senti , Director of Business & Government Affairs, National Cybersecurity Center
No BIO available

SpeakerBio:Mattie Gullixson , Secure the Vote Project Manager, National Cybersecurity Center
No BIO available

Description:
The emergence of new electronic ballot return methods creates an opportunity for greater vote access and potential enfranchisement, but also raises concerns about security in an increasingly tumultuous cyber-election landscape. The challenge of security is further compounded by a lack of proactive guidance from the federal level on developing these new technologies, leaving a gap in the secure development of the technologies to adopt an elections framework and approach to security. Experts from the National Cybersecurity Center (NCC) will offer a draft of security guidelines for the new electronic ballot return platforms to consider, and for federal agencies to adopt. The guidelines format mimics the Voluntary Voting System Guidelines created by the Election Assistance Commission.


YouTube: https://www.youtube.com/watch?v=GTiltX4vwLA

Twitch: https://www.twitch.tv/votingvillagedc


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 17:45-18:45 PDT


Title: Emulating an Adversary with Imperfect Intelligence
When: Saturday, Aug 8, 17:45 - 18:45 PDT
Where: Red Team Vlg

SpeakerBio:Adam Pennington
Adam Pennington (@_whatshisface) leads ATT&CK at The MITRE Corporation and collected much of the intelligence leveraged in creating ATT&CK’s initial techniques. He has spent much of his 11 years with MITRE studying and preaching the use of deception for intelligence gathering. Prior to joining MITRE, Adam was a researcher at Carnegie Mellon's Parallel Data Lab and earned his BS and MS degrees in Computer Science and Electrical and Computer Engineering as well as the 2017 Alumni Service Award from Carnegie Mellon University. Adam has presented and published in a number of venues including FIRST CTI, USENIX Security and ACM Transactions on Information and System Security.
Twitter: @ _whatshisface

Description:
Adversary emulation has become an increasingly common type of engagement where red teams look to known threat groups to inspire the actions and behaviors used. While scoping activity might make operating easier, emulation introduces a new set of challenges to planning. How do you know how an adversary behaves? What do you do if you only know part of the picture? How do you turn all of that into a plan? In this talk I’ll examine how we can start building an adversary profile from the open source intel in MITRE ATT&CK. Open source intel often doesn’t give a complete picture of an adversary, and I’ll talk about some of where these gaps come from, how to spot them, and some ways of filling them in. I’ll work through a process for turning the profile we’ve created into an adversary emulation plan expressed in ATT&CK and how we can stay aligned with that plan as we operate.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

CRV - Saturday - 12:00-12:59 PDT


Title: Entrepeneurial Adventures: What It Takes to Start A Company
When: Saturday, Aug 8, 12:00 - 12:59 PDT
Where: Career Hacking Vlg

SpeakerBio:Bryson Bort
Founder of SCYTHE, next generation attack emulation platform; GRIMM, cybersecurity consultancy; ICS Village Co-Founder, 501c3 for ICS security awareness. Senior Fellow for Cyber/National Security at R Street and National Security Institute; Advisor to the Army Cyber Institute and DHS/CISA.

Description:
So you’re not crazy, you just want to start your own company. Which kinda takes a level of crazy to pull it off. We’ll talk through what it takes to be an entrepreneur, ideation and the phases of startup, different kinds of companies (service, product, non-profit), how and why (or why not) to raise capital, types of investors, legal requirements, working (or not) with friends, challenges, building total/service addressable market size, back-office administration, employee benefits, equity, pricing, Intellectual Property Rights, economics, and resources for more information and networking. Will include anecdotes and insights my experiences starting several companies and from multiple Founders across the spectrum.

Career Hacking Village activities can be watched on YouTube.

CHV YouTube: https://www.youtube.com/channel/UCxF_PpndJEoi4fsrQx6yuQw


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Friday - 16:45-17:45 PDT


Title: Enumerating Cloud File Storage Gems
When: Friday, Aug 7, 16:45 - 17:45 PDT
Where: Red Team Vlg

SpeakerBio:Michael Wylie , Director of Cybersecurity Services, Richey May Technology Solution
Michael Wylie (Twitter: @TheMikeWylie), MBA, CISSP is the Director of Cybersecurity Services at Richey May Technology Solutions. In his role, Michael is responsible for delivering information assurance by means of vulnerability assessments, cloud security, penetration tests, risk management, and training. Michael has developed and taught numerous courses for the U.S. Department of Defense, DEFCON, Universities, and for clients around the world. Michael is the winner of numerous SANS challenge coins and holds the following credentials: CISSP, CCNA R&S, CCNA CyberOps, GMON, GPEN, TPN, CEH, CEI, VCP-DCV, CHPA, PenTest+, Security+, Project+, and more.
Twitter: @TheMikeWylie

Description:
Organizational data is rapidly moving to the cloud, but it's not always intentional. The shift from on-premise data storage to the cloud constitutes a significant challenge and risk to the modern enterprise. The use of cloud file storage applications is on the rise for both consumer and business systems, which results in interesting data and metadata siting on endpoints. In this talk, we'll examine the large footprints of popular cloud file storage applications such as OneDrive and Box - learning what information can be enumerated from each cloud file storage solution. In some scenarios, data can be carved out from cache, restoring sensitive documents no longer on an endpoint.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Friday - 23:00-23:59 PDT


Title: ERPwnage - a red team approach to targeting SAP
When: Friday, Aug 7, 23:00 - 23:59 PDT
Where: Red Team Vlg

SpeakerBio:Austin Marck
No BIO available

Description:
The crown jewels are ripe for the taking. ERP systems like SAP are being targeted more than ever and red teams need the tools to demonstrate these threats. We'll demonstrate the TTPs needed to emulate real threats with lateral movement techniques in, out, and between SAP systems.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

CPV - Sunday - 10:30-10:59 PDT


Title: European regulatory trends for Artificial Intelligence: same impact on US as GDPR?
When: Sunday, Aug 9, 10:30 - 10:59 PDT
Where: Crypto & Privacy Vlg

SpeakerBio:Julia Reinhardt
Julia is based in San Francisco and works as a tech policy consultant and privacy professional. As a Mozilla Fellow in Residence, she assesses opportunities and limitations of European approaches on Trustworthy AI in Silicon Valley and their potential for US businesses and advocacy.

In her first career as a German diplomat, she worked, among others, in EU negotiations on GDPR and on doing outreach and communicating for Germany in the Western US. Inspired by the Silicon Valley tech and policy network she built over the years and her understanding of EU policy-making, she has been consulting tech companies and non-profits in the Bay Area on European tech regulation for four years now. She holds an M.A. in International Relations from Sciences Po Paris, an M.A. in European Studies from Universität Osnabrück, and completed graduate and postgraduate coursework at UC Berkeley, American University of Beirut and Stanford University.


Description:
My paper focuses on how the European Ethics Guidelines for Trustworthy AI will be implemented – whether directly or indirectly and if at all – in Silicon Valley. My perspective incorporates also other related EU regulation that affects AI, in particular the GDPR and the deriving obligation to implement the principles of “privacy by design” and “privacy by default” (Art. 25 GDPR).

During my Mozilla Fellowship (April 2020 through April 2021), I work on finding out what impact the new European Ethics Guidelines for Trustworthy AI will have on US businesses, how useful they find these, as well as how they’re evaluated by activists, and whether we therefore will see a similar trend with them as we saw with the GDPR. I want to share with DEFCON Privacy Village an insight into my research and what this means for Silicon Valley positions on future EU regulation.


Crypto & Privacy Village activities will be streamed to YouTube and Twitch.

Twitch: https://twitch.tv/cryptovillage

YouTube: https://www.youtube.com/channel/UCGWMS6k9rg9uOf3FmYdjwwQ


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Thursday - 11:45-12:45 PDT


Title: Evil Genius: Why you shouldn't trust that keyboard
When: Thursday, Aug 6, 11:45 - 12:45 PDT
Where: Red Team Vlg
Speakers:Farith Perez,Mauro Cáseres

SpeakerBio:Farith Perez
No BIO available

SpeakerBio:Mauro Cáseres
Mauro Cáseres (@mauroeldritch) is an argentine hacker and speaker. He spoke at DEF CON 26 Las Vegas (Recon & Data Duplication Villages), DevFest Siberia, DragonJAR Colombia, Roadsec Brasil, and DC7831 Nizhny Novgorod. Currently working as SecOps for the Argentine Ministry of Production.
Twitter: @mauroeldritch

Description:No Description available

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

DC - Sunday - 09:30-09:59 PDT


Title: Evil Printer: How to Hack Windows Machines with Printing Protocol
When: Sunday, Aug 9, 09:30 - 09:59 PDT
Where: DEF CON Q&A Twitch
Speakers:Chuanda Ding,Zhipeng Huo

SpeakerBio:Chuanda Ding , Senior Researcher, Tencent Security Xuanwu Lab
Chuanda Ding is a senior security researcher on Windows platform security. He leads EcoSec team at Tencent Security Xuanwu Lab. He was a speaker at Black Hat Europe 2018, DEF CON China 2018, CanSecWest 2017, CanSecWest 2016, and QCon Beijing 2016.
Twitter: @FlowerCode_

SpeakerBio:Zhipeng Huo , Senior Researcher, Tencent Security Xuanwu Lab
Zhipeng Huo is a senior security researcher on Windows and macOS platform security at Tencent Security Xuanwu Lab. He reported Microsoft Edge sandbox escape bugs in 2017, 2018, and 2020. He was a speaker at Black Hat Europe 2018.
Twitter: @R3dF09

Description:
Printer Spooler service, one of the important services in Microsoft Windows, has existed for more than 25 years. It runs at highest privilege level, unsandboxed, does networking, and dynamically loads third-party binaries. What could possibly go wrong?

In this talk, we will walk you through an incredibly fun bug we have discovered in printer spooler service. It can be exploited both locally and remotely, escapes sandbox, executes arbitrary code, and also elevates to SYSTEM. While Microsoft managed to develop the most restrictive sandbox for Microsoft Edge, this bug easily goes through it like it's a sieve.

We will talk in detail the implementation of this ancient service, the method we used to discover and exploit the bug, and also throw in some tips and tricks for logic bugs in between.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

RTV - Saturday - 03:30-04:30 PDT


Title: Executing Red Team Scenarios with Built-in Scenario Place
When: Saturday, Aug 8, 03:30 - 04:30 PDT
Where: Red Team Vlg
Speakers:Erdener Uyan,Gökberk Gülgün

SpeakerBio:Erdener Uyan
Erdener Uyan has worked in the field of information security for over 10 years as an engineer, researcher, practitioner and educator. His wide-ranging career has spanned many areas of information security, including research and development of very high-assurance, multi-level secure systems for use in government and the military, research and development of cryptographic systems, and general IT security and compliance for commercial organizations in the industries. Uyan earned his PhD degree in Cryptography at the Middle East Technical University.

SpeakerBio:Gökberk Gülgün
Gökberk Gülgün has worked in the field of information security for over 6 years as an engineer, researcher, practitioner and educator. Currently, Offensive security engineer at an industry-leading bank based in the Turkey. Plans and conducts full-scope Red Team engagements that simulate realistic, targeted, attacks. Responsible for performing host infrastructure penetration testing, physical security assessments, web and mobile application testing, social engineering engagements, source code reviews, embedded device assessments, and wireless penetration tests.In the past, he has given several presentations on Malware Analysis, Red Team Operations, discovered 0days and IoT security.

Description:
Red Team activities are undoubtedly one of the fastest developing solutions against the cyber attacks of today. In this talk, we'll take a look at our work on an open-source proactive machine learning powered automation tool that performs red team simulations. This automation tool provides the opportunity to try out all available attack scenarios, thereby helping the community, especially organizations, to develop mechanisms to protect against these attacks before attackers do. Currently, red, blue and purple teams are improving day by day with the contributions made by open source. We will demonstrate the scenario playbook developed to collect the scenarios prepared for the red, blue and purple team on a single scenario place. The aim of this playbook is to protect the systems from such attack vectors, to examine the attack scenarios, to protect their systems by viewing the protection mechanisms and to contribute to these scenarios. With the built-in Scenario Place, people can either run these scenarios or check the scenario configurations on their systems. All scenario titles are prepared in accordance with MITRE and Cyber Kill Chain. All scenarios from various teams such as Atomic Red Team, Mitre and TIBER-EU are fed into the application as input.

Red Team Village events will be streamed to YouTube and Twitch.

Twitch: https://www.twitch.tv/redteamvillage


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 14:00-14:59 PDT


Title: Experimental Aviation, Risks And Rewards
When: Friday, Aug 7, 14:00 - 14:59 PDT
Where: Aerospace Vlg

SpeakerBio:Patrick Kiley , Principal Security Consultant, Rapid7
Patrick Kiley (GXPN, GPEN, GAWN, GCIH, CISSP, MCSE) has over 18 years of information security experience working with both private sector employers and the Department of Energy/National Nuclear Security Administration (NNSA). While he was with the NNSA he built the NNSA's SOC and spent several years working for emergency teams. Patrick has performed research in Avionics security and Internet connected transportation platforms. Patrick has experience in all aspects of penetration testing, security engineering, hardware hacking, IoT, Autonomous Vehicles and CAN bus.
Twitter: @gigstorm

Description:
This talk will cover a hacker’s perspective of building your own aircraft, what I consider to be the ultimate maker/hacker project. Over 10 years ago, I decided to see if I could build an aircraft from a set of plans. The model I chose was a 4 seat AeroCanard FG, a somewhat controversial derivative of the Cozy Mark IV. The Cozy itself was also a derivative, basically a widened version of the Burt Rutan designed Long EZ. This talk will cover why someone would choose to build their own aircraft. All of these topics will cover the risk as I see it as a professional who has been in the information risk field his entire professional career.

I will complete the talk with some discussion around becoming a test pilot, what you will become when you finally fly your creation.

This event will be coordinated on the DEF CON Discord server, in channel #av-aviation-text.


Discord: https://discord.com/channels/708208267699945503/732394164209057793


Return to Index    -    Add to    -    ics Calendar file

 

BCV - Sunday - 12:00-12:40 PDT


Title: exploit insecure crypto wallet
When: Sunday, Aug 9, 12:00 - 12:40 PDT
Where: Blockchain Vlg
Speakers:Minzhi He,peiyu wang

SpeakerBio:Minzhi He
No BIO available

SpeakerBio:peiyu wang
No BIO available

Description:No Description available

Blockchain Village activities will be streamed to Twitch.

Twitch: https://www.twitch.tv/blockchainvillage


Return to Index    -    Add to    -    ics Calendar file

 

DC - Friday - 16:30-16:59 PDT


Title: Exploiting Key Space Vulnerabilities in the Physical World
When: Friday, Aug 7, 16:30 - 16:59 PDT
Where: DEF CON Q&A Twitch

SpeakerBio:Bill Graydon , Principal, Research, GGR Security
Bill Graydon is a principal researcher at GGR Security, where he hacks everything from locks and alarms to critical infrastructure; this has given him some very fine-tuned skills for breaking stuff. He’s passionate about advancing the security field through research, teaching numerous courses, giving talks, and running DEF CON’s Lock Bypass Village. He’s received various degrees in computer engineering, security, and forensics and comes from a broad background of work experience in cyber security, software development, anti-money laundering, and infectious disease detection.

Description:
Imagine being able to get together with a few of your co-workers, look at your office keys and derive a building master key. Or you may not have any working key at all: you could impression the lock, or use one of the many ways we’ll present in this talk to put together little bits of information from a lock to create a working key.

We apply information theory - the concept behind the “entropy” of a password - in an easy to understand way to show how every little bit of information about a system can be used to defeat it. The audience will be able to pull any key out of their pocket and understand how it works and how an attacker can create it covertly, and open whatever lock it is for, or even a lock it isn’t for, that shares the same system.

We’ll explain how to produce either a single final key, or a set small enough to economically brute force - and release a software tool to let anyone quickly try out all possibilities in an easy-to-visualize way.

Finally, we will discuss possible solutions to these problems and introduce vulnerabilities our research has uncovered in high-security systems like Medeco, Abloy, and Mul-T-Lock - including releasing a set of only 159 possible top level master key codes for certain large Medeco mastered systems.


This is a live Question & Answer stream. You'll want to have watched the corresponding pre-recorded talk prior to this Q&A session.

All DEF CON Q&A streams will happen on Twitch. Discussions and attendee-to-speaker participation will happen on Discord (#track-1-live).


Twitch: https://www.twitch.tv/defconorg

#track-1-live: https://discord.com/channels/708208267699945503/733079621402099732


Return to Index    -    Add to    -    ics Calendar file

 

AEV - Friday - 17:00-17:59 PDT


Title: Exploiting Spacecraft
When: Friday, Aug 7, 17:00 - 17:59 PDT
Where: Aerospace Vlg

SpeakerBio:Brandon Bailey
Brandon Bailey is a cybersecurity senior project leader at The Aerospace Corporation. He has more than 14 years of experience supporting the intelligence and civil space arena. Bailey’s specialties include vulnerability assessments/ penetration testing for space systems and infusing secure coding principles within the software supply chain. Before joining Aerospace, Bailey worked for NASA, where he was responsible for building and maintaining a software testing and research laboratory to include a robust cybersecurity range as well as spearheading innovative cybersecurity assessments of ground infrastructure that support NASA’s mission operations. While at NASA, Bailey was honored with several group and individual awards, including NASA’s Exceptional Service Medal for his landmark cybersecurity work, NASA’s Early Career Achievement Award, and NASA Agency Honor Awards for Information Assurance/Cybersecurity. He has also contributed to teams who have received honorable mention in the 2012 and 2016 NASA’s Software of the Year competition. Bailey graduated summa cum laude with a bachelor’s degree in electrical engineering from West Virginia University and currently holds multiple certifications in the cybersecurity field. He recently co-authored Aerospace’s Center for Space Policy and Strategy’s Defending Spacecraft in the Cyber Domain paper which outlines security principles that can be applied on-board the spacecraft to improve its security posture.

Description:
This presentation will describe the high-level cyber threat landscape for space systems and focus on three examples: Command Replay Attack, Command Link Intrusion, and Denial of Service using GPS jamming. These three attacks were performed using high fidelity ground-to-space simulators to demonstrate the benefit of performing such research using simulation. These simulations leverage many of the same software components used in operations today for several operational missions. Recommendations are provided on how to protect against the attacks and references are provided so the audience can build their own simulations to begin their own research.

This event will be coordinated on the DEF CON Discord server, in channel #av-space-text.


Discord: https://discord.com/channels/708208267699945503/732394328105943180


Return to Index    -    Add to    -    ics Calendar file

 

IOT - Friday - 12:15-12:59 PDT


Title: Exploring vulnerabilities in Smart Sex Toys, the exciting side of IoT research
When: Friday, Aug 7, 12:15 - 12:59 PDT
Where: IOT Vlg

SpeakerBio:Denise Giusto Bilic
Denise Giusto Bilic is an Information Systems Engineer graduated from the National Technological University of Argentina. Nowadays she specializes in mobile and IoT security.

Denise currently works as a Security Researcher at ESET, where part of her job is preparing technical and educational materials related to information security. She has participated as a speaker in many international security conferences. She is also a co-organizer of NotPinkCon Security Conference.


Description:
Smart sex toys are a huge topic – and we’re not talking about their size! The Internet of Things (IoT) has triggered many personal items to become connected and smart, watches, toothbrushes, glasses and even toilets, to name just a few. The adult toy market has not been left behind with new models of toys that include the opportunity to connect them to the Internet and allow them to be remotely controlled.

IoT devices and their vulnerabilities are frequently discussed in the media, and sex toys are not the exception. Many of them have holes in them. Keep focused, we mean holes and bugs in the software. This is despite the sensitivity of the extremely personal information they handle. We analyzed the security of the Android applications that control the most frequently purchased models of connected sexual pleasure devices, to determine the extent to which the confidentiality of user data could be vulnerable. Our research revealed interesting security flaws derived from both the impl