PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:00 - 09:05 |
AppSec Village Welcome and Introductions
|
|
09:05 - 09:59 |
Colorful AppSec
|
Luis Gomes,Erez Yalon,Ped . . . |
10:00 - 10:45 |
Summer of Fuzz: MacOS
|
Jeremy Brown |
11:00 - 11:45 |
Vulnerability Inheritance - Attacking companies an . . .
|
Gal Nagli |
11:00 - 10:59 |
AppSec Village Capture the Flag Starts
|
|
12:00 - 12:45 |
Cross-document messaging technology, how to hack i . . .
|
Chen Gour-Arie |
13:00 - 13:45 |
Signed, Sealed, Delivered: Abusing Trust in Softwa . . .
|
Cheryl Biswas |
14:00 - 14:30 |
Poking bots for fun and profit in the age of async . . .
|
Emanuel Rodrigues |
15:00 - 15:45 |
Scaling static analysis for free: add additional c . . .
|
Erin Browning,Tim Faraci . . . |
16:00 - 16:59 |
DFDs Ain't That Bad
|
Izar Tarandach,Matthew Co . . . |
17:30 - 17:35 |
AppSec Quiz Time!
|
Eden Stroet |
| | |
Saturday |
|
|
09:00 - 09:05 |
AppSec Village Welcome and Introductions
|
|
09:05 - 09:59 |
Borrow a mentor
|
|
09:05 - 09:59 |
Scaling AppSec through Education
|
Grant Ongers (rewtd) |
10:00 - 10:45 |
I used AppSec skills to hack IoT, and so can you
|
Alexei Kojenov |
11:00 - 11:45 |
The Curious case of knowing the unknown
|
Vandana Verma Sehgal |
12:00 - 12:45 |
CSP is broken, let’s fix it
|
Amir Shaked |
12:00 - 14:30 |
(Workshop) - Integrating DAST tools into developer . . .
|
Joe Schottman |
13:00 - 13:45 |
When nothing goes right, push left. Designing logs . . .
|
Vee |
14:00 - 14:45 |
How I broke into Mexico City's justice system appl . . .
|
Alfonso Ruiz Cruz |
15:00 - 15:45 |
A Deep Dive Into Supply Chain Vulnerabilities: And . . .
|
Adam Schaal |
16:00 - 16:45 |
DevSecOps: Merging Security and Software Engineeri . . .
|
Magno Logan DELETE ME |
17:00 - 17:45 |
Can’t Stop the Code: Embrace the Code
|
Alton Crossley |
17:45 - 17:50 |
AppSec Quiz Time!
|
Eden Stroet |
| | |
Sunday |
|
|
09:00 - 09:05 |
AppSec Village Welcome and Introductions
|
|
09:05 - 09:45 |
"The Poisoned Diary": Supply Chain Attacks on Inst . . .
|
Yakov Shafranovich |
09:05 - 09:45 |
Borrow a mentor
|
|
10:00 - 10:45 |
Encryption for Developers
|
James McKee (punkcoder) |
11:00 - 11:45 |
AppSec 101: A Journey from Engineer to Hacker
|
Arjun Gopalakrishna |
12:00 - 12:45 |
Car Hacking + Bug Hunting Field Guide for Appsec H . . .
|
Jay Turla DELETE ME |
13:00 - 12:59 |
AppSec Village Capture the Flag Ends
|
|
13:00 - 13:45 |
0-Days & Nat 20's - CVSSv3 Through the Lens of Dun . . .
|
Alex "RedWedgeX" Hoffman |
14:00 - 14:45 |
Attacking Modern Environments Series: Attack Vecto . . .
|
Mazin Ahmed |
15:00 - 15:15 |
AppSec Quiz Time!
|
Eden Stroet |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
12:00 - 12:15 |
Adversary Village Kick-off
|
Abhijith B R |
12:15 - 12:59 |
Adversary Village Keynote
|
David Kennedy |
13:00 - 13:45 |
Look at me, I'm the Adversary now: Introduction to . . .
|
Samuel Kimmons |
13:45 - 14:45 |
From On-Prem to the Cloud - Hybrid AD attack path
|
Sergey Chubarov |
14:45 - 15:45 |
Exploiting Blue Team OPSEC failures with RedELK
|
Marc Smeets |
15:45 - 16:45 |
Everything is a C2 if you're brave enough
|
Luis Ángel Ramírez Mend . . . |
16:45 - 17:45 |
Designing a C2 Framework
|
Daniel "Rasta" Duggan |
17:45 - 19:59 |
(Workshop) Tradecraft Development in Adversary Sim . . .
|
Fatih Ozavci |
20:00 - 20:59 |
Panel discussion: Adversary simulation, emulation . . .
|
Tomer Bar,Samuel Kimmons, . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
The Way of The Adversary
|
Phillip Wylie |
11:00 - 13:15 |
(Workshop) From zero to hero: creating a reflectiv . . .
|
Jean Francois Maes |
13:15 - 13:59 |
(Tool Demo) Red Team Credentials Reconnaissance (O . . .
|
Shantanu Khandelwal |
14:00 - 14:59 |
Operation Bypass: Catch My Payload If You Can
|
Matthew Eidelberg |
15:00 - 15:45 |
(Tool Demo) PurpleSharp: Automated Adversary Simul . . .
|
Mauricio Velazco |
15:45 - 16:30 |
Phish Like An APT
|
Sanne Maasakkers |
16:30 - 17:15 |
(Tool Demo) Tenacity: An Adversary Emulation Tool . . .
|
Atul Nair,Harshal Tupsamu . . . |
17:15 - 18:15 |
C2Centipede: APT level C2 communications for commo . . .
|
Jose Garduno |
18:15 - 18:45 |
Lightning talk: Autonomous lateral movement
|
Stephan Wampouille |
18:45 - 19:45 |
Game Theory: Understanding and Strategy and Decept . . .
|
Juneau Jones |
19:45 - 20:30 |
(Tool Demo) New generation of PEAS
|
Carlos Polop |
20:30 - 21:30 |
Panel discussion: Is Adversary Emulation Too ___ F . . .
|
Jamie Williams,Cat Self,T . . . |
| | |
Sunday |
|
|
10:00 - 10:59 |
Panel discussion: Resilient cyber space: The role . . .
|
Abhijith B R,Jay Turla,Ma . . . |
11:00 - 11:45 |
(Tool Demo) Prelude Operator
|
David Hunt,Alex Manners |
11:45 - 12:30 |
APT: A Short History and An Example Attack
|
Mark Loveless |
12:30 - 13:15 |
(Tool Demo) ImproHound - Identify AD tiering viola . . .
|
Jonas Bülow Knudsen |
13:15 - 14:15 |
Scaling Up Offensive Pipelines
|
Gil Biton |
14:15 - 15:15 |
Signed, Sealed, Delivered: Comparing Chinese APTs . . .
|
Cheryl Biswas |
15:15 - 15:59 |
How I got COVID in a RedTeam: Social engineering a . . .
|
Daniel Isler |
16:00 - 16:59 |
Adversary Village Closing Ceremony
|
Adversary Village Team |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
17:00 - 16:59 |
COSTA (Coinbase Secure Trait Analyzer)
|
Peter Kacherginsky |
17:00 - 16:59 |
DeFi Must Change or Hacks Will Accelerate
|
Kadan Stadelmann |
21:00 - 20:59 |
Flash Loans Demystified
|
Anto Joseph |
21:00 - 20:59 |
Blockchain as a Threat Modeling Thinking Tool
|
Shinchul Park, Graduate S . . . |
21:00 - 20:59 |
Subtle and Not So Subtle Ways to Lose Your Cryptoc . . .
|
Josh McIntyre |
21:00 - 20:59 |
Will Secure Element Really Help Strengthen the Sec . . .
|
Byeongcheol Yoo |
21:00 - 20:59 |
Scaling Blockchains: A Novel Approach
|
Colin Cantrell |
21:00 - 20:59 |
Towards Understanding the Unlimited Approval in Et . . .
|
Dabao Wang |
21:00 - 20:59 |
Preventing Sandwich Attacks on DeFi Protocols usin . . .
|
Gokul Alex |
| | |
Friday |
|
|
10:00 - 10:15 |
Welcome Note
|
|
10:15 - 11:30 |
Key Note
|
|
11:30 - 11:59 |
BCOS Village Contest Overview
|
Reddcoin |
12:00 - 12:30 |
Polyswarm Talk
|
Kevin Leffew |
13:00 - 13:59 |
Catching (and Fixing) an Unlimited Burn Vulnerabil . . .
|
Nadir Akhtar |
14:30 - 15:59 |
Workshop - Decentralized Cloud
|
|
14:00 - 14:30 |
Blockchain Security Tools
|
Mila Paul |
16:00 - 16:30 |
Surviving 51% Attacks on Blockchains
|
Yaz Khoury |
16:30 - 17:30 |
Do You Really Own Your NFTs?
|
Francesco Piccoli,Steven . . . |
| | |
Saturday |
|
|
10:00 - 10:15 |
Welcome Note
|
Nathan,Ron Stoner |
10:15 - 11:30 |
Key Note – The Three Amigos: Money Laundering, C . . .
|
Daniel Garrie,David Cass |
11:30 - 11:59 |
Tryptich Talk
|
Sarang Noether, Ph.D. |
12:00 - 12:59 |
Ethereum Hacks & How to Stop Them
|
Michael Lewellen |
13:00 - 13:30 |
Certified Ethereum Professional (CEP) Overview
|
Abstrct |
13:30 - 13:59 |
Sla(sh*t)ing happens when you stake
|
Nadir Akhtar,Y L |
14:00 - 14:59 |
EIP-1559 Panel
|
|
15:00 - 15:59 |
Evils in the DeFi world
|
Minzhi He,Peiyu Wang |
16:00 - 16:30 |
The Wild West of DeFi Exploits
|
Anna Szeto |
| | |
Sunday |
|
|
10:15 - 11:30 |
Surviving DeFi: How to Prevent Economic Attacks
|
Jan Gorzny |
10:00 - 10:15 |
Welcome Note
|
Nathan,Ron Stoner |
11:30 - 12:30 |
Breaking Future Crypto Custody
|
Mehow Powers,Chris Odom |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:00 - 06:59 |
Table Top Exercise - Deus Ex Machina (Pre-registra . . .
|
|
10:00 - 13:59 |
Biohacking Village CTF: Hospital Under Siege (Pre- . . .
|
|
| | |
Friday |
|
|
10:00 - 10:45 |
Biohacking Village Welcome Keynote
|
Nina Alli |
10:00 - 17:59 |
Biohacking Village CTF: Hospital Under Siege (Pre- . . .
|
|
11:00 - 11:45 |
The Digital Physiome - How wearables can (and are) . . .
|
Jennifer Goldsack,Jessily . . . |
12:00 - 12:59 |
The Next Critical Infrastructure: Understanding th . . .
|
Charles Fracchia,Nathan C . . . |
13:30 - 14:30 |
At least ten questions for “Bad HIPPA Takes” ( . . .
|
Lucia Savage |
13:00 - 13:30 |
"Who Bears the Risk?" Why a Market Incentives Pers . . .
|
Matt McMahon,Shannon Lant . . . |
14:30 - 14:59 |
Open-Source Vaccine Developer Kits (VDKs) with RaD . . .
|
Alex Hoekstra |
15:00 - 15:30 |
Truth, Trust, and Biodefense
|
Eric Perakslis |
15:30 - 15:59 |
Healthcare Innovation With People of All Abilities
|
Joel Isaac,Pia Zaragoza |
16:00 - 16:59 |
No Aggregation Without Representation
|
Andrea Downing |
17:00 - 17:30 |
Lets Get Real About The Future State of Healthcare
|
Christian Dameff,Jeff 'R3 . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
How to Not Miss The Point: Reflections on Race, He . . .
|
Nia Johnson |
10:00 - 17:59 |
CTF: Hospital Under Siege (Pre-registration requir . . .
|
|
11:00 - 11:59 |
Chinese Military Bioweapons and Intimidation Opera . . .
|
RedDragon |
12:30 - 13:30 |
Cloud security for healthcare and life sciences
|
MIchelle Holko |
13:30 - 13:59 |
Securing the Internet of Biological Things
|
Thom Dixon |
14:00 - 14:59 |
The Real Story on Patching Medical Devices
|
Michael Murray |
15:00 - 16:45 |
OWASP & CSA IoT: Impacting Medical Security
|
Aaron Guzman |
16:45 - 16:59 |
A Cohort of Pirate Ships
|
Alex Pearlman |
17:00 - 17:30 |
The Little Things
|
Mixæl Laufer |
17:30 - 17:59 |
Playing with FHIR: hacking and securing healthcare . . .
|
Alissa Knight,Mitch Parke . . . |
| | |
Sunday |
|
|
07:00 - 06:59 |
Table Top Exercise - Biologia et Machina (Pre-regi . . .
|
|
10:30 - 10:59 |
Internet-of-Ingestible-Things Security by Design
|
Mariam Elgabry |
10:00 - 10:30 |
Cyber Defense Matrix in Healthcare
|
Sounil Yu |
10:00 - 12:59 |
CTF: Hospital Under Siege (Pre-registration requir . . .
|
|
11:00 - 11:59 |
Fishing or Hunting
|
Ohad Zaidenberg |
12:00 - 12:59 |
Red vs Blue vs Green : The ultimate battle of opin . . .
|
Ken Kato,Vee Schmitt |
13:30 - 13:59 |
It takes a village: Why you should join the Biohac . . .
|
Rob Suárez |
13:00 - 13:30 |
The Security of Your Digital DNA, from Inception t . . .
|
Garrett Schumacher |
14:00 - 14:30 |
Biohacking Village Wrap-Up
|
|
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:30 - 10:30 |
Yeet the leet with Osquery (Effective Threathuntin . . .
|
Sebastiaan Provost |
09:30 - 10:59 |
Attack and Detect with Prelude Operator and Securi . . .
|
Wes Lambert |
10:45 - 11:45 |
Velociraptor - Dig Deeper
|
Mike Cohen |
10:45 - 12:15 |
Windows Forensics 101 (Beginner)
|
Surya Teja Masanam |
12:00 - 12:30 |
This is what we thought would happen in 2021
|
Gert-Jan Bruggink |
13:30 - 13:59 |
Forensicating Endpoint Artifacts in the World of C . . .
|
Renzon Cruz |
14:15 - 15:15 |
Adventures in Pro Bono Digital Forensics Work
|
John Bambenek |
14:00 - 17:59 |
MacOs Workshop - Hunt for Red Apples: Ocean Lotus . . .
|
Cat Self,plug,Ben Bornhol . . . |
15:30 - 16:30 |
Uncovering covert network behaviors within critica . . .
|
Michael Raggo,Chester Hos . . . |
16:45 - 17:15 |
A SERVERLESS SIEM: DETECTING ALL BADDIES ON A BUDG . . .
|
Chen Cao |
16:30 - 17:59 |
Watch Out! And just skip the packer
|
Felipe Duarte |
17:30 - 17:59 |
Scope X: Hunt in the Ocean!
|
Meisam Eslahi |
| | |
Saturday |
|
|
09:00 - 09:15 |
I know who has access to my cloud, do you?
|
Igal Flegmann |
09:00 - 10:30 |
Wireshark for Incident Response & Threat Hunting
|
Michael Wylie |
10:15 - 11:15 |
Use DNS to detect your domains are abused for phis . . .
|
Karl Lovink a.k.a. Cyb0rg . . . |
11:30 - 11:59 |
What Machine Learning Can and Can't Do for Securit . . .
|
Wendy Edwards |
11:00 - 12:30 |
Tricks for the Triage of Adversarial Software
|
Dylan Barker,Quinten Bowe . . . |
11:00 - 12:30 |
BTV Presents: Malware Station - Maldoc Workshop
|
Clay (ttheveii0x) |
12:15 - 12:45 |
How do you ALL THE CLOUDS?
|
henry |
13:45 - 14:15 |
Leveraging NGFWs for Threat Hunting
|
Drimacus |
14:30 - 15:30 |
Modern Authentication for the Security Admin
|
Bailey Bercik,Mark Morowc . . . |
14:00 - 15:30 |
BTV Presents: Forensics Station - Workshop 1
|
Omenscan |
14:00 - 17:59 |
MacOs Workshop - Hunt for Red Apples: Ocean Lotus . . .
|
Cat Self,plug,Ben Bornhol . . . |
15:45 - 16:45 |
Uncomfortable Networking
|
Charles Rumford |
16:30 - 17:59 |
Ransomware ATT&CK and Defense with the Elastic Sta . . .
|
Ben Hughes,Daniel Chen,Fr . . . |
17:00 - 17:30 |
Structured Analytical Techniques for Improving Inf . . .
|
Rabbit |
| | |
Sunday |
|
|
10:00 - 10:59 |
BTV Presents: Threat Report Roulette
|
Blind Hacker JoeB,Will Th . . . |
11:15 - 12:15 |
BTV Presents: Welcome to #IRLIFE. A live IR TableT . . .
|
Clay (ttheveii0x),plug,Ch . . . |
12:30 - 12:59 |
Year of Mentoring: BTV’s Meet-a-Mentor Turns One
|
muteki |
13:30 - 13:59 |
BTV Closing Ceremony
|
|
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:00 - 19:59 |
DEF CON Human Registration (Badge Pickup) Open
|
|
09:00 - 20:59 |
Chillout Lounges
|
djdead,DJ Pie & Darren,ka . . . |
| | |
Friday |
|
|
08:00 - 16:59 |
DEF CON Human Registration (Badge Pickup) and Vacc . . .
|
|
09:00 - 20:59 |
Chillout Lounges
|
djdead,DJ Pie & Darren,ka . . . |
09:00 - 09:59 |
Welcome to Discord
|
Dark Tangent |
09:00 - 09:59 |
Making the DEF CON 29 Badge
|
Katie Whiteley,Michael Wh . . . |
10:00 - 10:59 |
Welcome To DEF CON - Dark Tangent & Making the DEF . . .
|
Dark Tangent,Katie Whitel . . . |
10:00 - 10:45 |
Gone Apple Pickin': Red Teaming macOS Environments . . .
|
Cedric Owens |
10:00 - 10:59 |
HTTP/2: The Sequel is Always Worse
|
James Kettle |
10:00 - 19:59 |
DEF CON Vendor Area Open
|
|
10:00 - 10:59 |
Community Roundtable - (De)Criminalizing Hacking A . . .
|
|
11:00 - 11:45 |
2021 - Our Journey Back To The Future Of Windows V . . .
|
Eran Segal,Tomer Bar |
11:00 - 11:59 |
Caught you - reveal and exploit IPC logic bugs ins . . .
|
Chuanda Ding,Yuebin Sun,Z . . . |
11:30 - 12:30 |
Community Roundtable - We can build it. We have th . . .
|
|
11:30 - 12:30 |
Community Roundtable - Toward a Global IoT Code of . . .
|
|
12:00 - 12:59 |
DHS REBOOTING CRITICAL INFRASTRUCTURE PROTECTION P . . .
|
Lily Newman,Alexander Kli . . . |
12:00 - 12:20 |
Your House is My House: Use of Offensive Enclaves . . .
|
Dimitry "Op_Nomad" Snezhk . . . |
12:00 - 12:20 |
Do you like to read? I know how to take over your . . .
|
Slava Makkaveev |
12:30 - 12:50 |
The Mechanics of Compromising Low Entropy RSA Keys
|
Austin Allshouse |
12:30 - 12:50 |
Worming through IDEs
|
David Dworken |
13:00 - 13:59 |
Ransomeware’s Big Year – from nuisance to “s . . .
|
DEF CON Policy Panel |
13:00 - 13:45 |
Sleight of ARM: Demystifying Intel Houdini
|
Brian Hong |
13:00 - 13:59 |
eBPF, I thought we were friends!
|
Guillaume Fournier,Sylvai . . . |
13:00 - 13:59 |
Policy Debrief - Myths and Legends of Section 230
|
|
14:00 - 14:45 |
MAVSH> Attacking from Above
|
Sach |
14:00 - 14:45 |
Hacking Humans with AI as a Service
|
Eugene Lim,Glenice Tan,Ta . . . |
14:00 - 14:59 |
Rotten code, aging standards, & pwning IPv4 parsin . . .
|
Kelly Kaoudis,Sick Codes |
14:30 - 15:30 |
Community Roundtable - Zero Trust, Critical Softwa . . .
|
|
14:30 - 15:30 |
Policy Debrief - Global Cyber Capacity Building - . . .
|
|
15:00 - 15:59 |
UFOs: Misinformation, Disinformation, and the Basi . . .
|
Richard Thieme AKA neural . . . |
15:00 - 15:45 |
Abusing SAST tools! When scanners do more than jus . . .
|
Rotem Bar |
15:00 - 15:59 |
ProxyLogon is Just the Tip of the Iceberg, A New A . . .
|
Orange Tsai |
15:30 - 16:30 |
Community Roundtable - 10 years after SOPA: where . . .
|
|
16:00 - 16:59 |
Defending against nation-state (legal) attack: how . . .
|
Bill "Woody" Woodcock |
16:00 - 16:45 |
Bundles of Joy: Breaking macOS via Subverted Appli . . .
|
Patrick Wardle |
16:00 - 16:59 |
The Unbelievable Insecurity of the Big Data Stack: . . .
|
Sheila A. Berta |
16:00 - 16:59 |
Community Roundtable - Volunteer Hacker Fire Depar . . .
|
|
17:00 - 18:59 |
Do No harm; Health Panel : Live version - A DEF CO . . .
|
DEF CON Policy Panel |
17:00 - 17:45 |
Phantom Attack: Evading System Call Monitoring
|
Junyuan Zeng,Rex Guo |
17:00 - 17:59 |
Warping Reality - creating and countering the next . . .
|
PatH |
18:00 - 18:45 |
Response Smuggling: Pwning HTTP/1.1 Connections
|
Martin Doyhenard |
18:00 - 18:59 |
How I use a JSON Deserialization 0day to Steal You . . .
|
Hao Xing,Zekai Wu |
20:00 - 21:59 |
DEF CON Movie Night - Tron
|
|
| | |
Saturday |
|
|
09:00 - 16:59 |
DEF CON Human Registration (Badge Pickup) and Vacc . . .
|
|
09:00 - 20:59 |
Chillout Lounges
|
djdead,DJ Pie & Darren,ka . . . |
10:00 - 19:59 |
DEF CON Vendor Area Open
|
|
10:00 - 10:59 |
Privacy Without Monopoly: Paternalism Works Well, . . .
|
Cory Doctorow |
10:00 - 10:45 |
High-Stakes Updates | BIOS RCE OMG WTF BBQ
|
Jesse Michael,Mickey Shka . . . |
10:00 - 10:45 |
Crossover Episode: The Real-Life Story of the Firs . . .
|
Chad Rikansrud (Bigendian . . . |
10:00 - 10:59 |
Community Roundtable - Supply Chain in the COVID E . . .
|
|
10:00 - 10:59 |
Community Roundtable - We need to talk about Norm . . .
|
|
11:00 - 11:59 |
Wibbly Wobbly, Timey Wimey – What's Really Insid . . .
|
Alexander Heinrich,jiska |
11:00 - 11:45 |
UPnProxyPot: fake the funk, become a blackhat prox . . .
|
Chad Seaman |
11:30 - 12:30 |
Community Roundtable - If only you knew
|
|
12:00 - 12:59 |
Bring Your Own Print Driver Vulnerability
|
Jacob Baines |
12:00 - 12:20 |
Racketeer Toolkit. Prototyping Controlled Ransomwa . . .
|
Dimitry "Op_Nomad" Snezhk . . . |
12:00 - 12:20 |
Time Turner - Hacking RF Attendance Systems (To Be . . .
|
Vivek Nair |
12:30 - 12:50 |
Hack the hackers: Leaking data over SSL/TLS
|
Ionut Cernica |
12:30 - 12:50 |
A new class of DNS vulnerabilities affecting many . . .
|
Ami Luttwak,Shir Tamari |
13:00 - 13:59 |
TEMPEST radio station
|
Paz Hameiri |
13:00 - 13:45 |
PINATA: PIN Automatic Try Attack
|
Salvador Mendoza |
13:00 - 13:45 |
Defeating Physical Intrusion Detection Alarm Wires
|
Bill Graydon |
13:00 - 14:59 |
Community Roundtable - RANSOMWARE: Combatting Rans . . .
|
|
14:00 - 14:59 |
Sneak into buildings with KNXnet/IP
|
Claire Vacherot |
14:00 - 14:45 |
SPARROW: A Novel Covert Communication Scheme Explo . . .
|
Chuck McAuley,Reza Soosah . . . |
14:00 - 14:45 |
Over-the-air remote code execution on the DEF CON . . .
|
Seth Kintigh |
15:00 - 15:45 |
Hacking G Suite: The Power of Dark Apps Script Mag . . .
|
Matthew Bryant |
15:00 - 15:45 |
Central bank digital currency, threats and vulnera . . .
|
Ian Vitek |
15:00 - 15:59 |
Breaking Secure Bootloaders
|
Christopher Wade |
16:00 - 16:45 |
New Phishing Attacks Exploiting OAuth Authenticati . . .
|
Jenko Hwong |
16:00 - 16:45 |
PunkSPIDER and IOStation: Making a Mess All Over t . . .
|
_hyp3ri0n aka Alejandro C . . . |
16:00 - 16:59 |
Adventures in MitM-land: Using Machine-in-the-Midd . . .
|
Eyal Karni,Sagi Sheinfeld . . . |
16:00 - 16:59 |
Community Roundtable - Thinking About Election Sec . . .
|
|
16:00 - 16:59 |
Community Roundtable - Implementing Cyber Solarium . . .
|
|
17:00 - 17:45 |
You're Doing IoT RNG
|
Allan Cecil - dwangoAC,Da . . . |
17:00 - 17:45 |
Hacking the Apple AirTags
|
Thomas Roth |
17:00 - 17:59 |
Don't Dare to Exploit - An Attack Surface Tour of . . .
|
Steven Seeley,Yuhao Weng, . . . |
18:00 - 18:59 |
HACKERS INTO THE UN? Engaging in the cyber discuss . . .
|
DEF CON Policy Panel |
18:00 - 18:45 |
Offensive Golang Bonanza: Writing Golang Malware
|
Benjamin Kurtz |
18:00 - 18:59 |
Vulnerability Exchange: One Domain Account For Mor . . .
|
Tianze Ding |
19:00 - 19:59 |
(Replay) UFOs: Misinformation, Disinformation, and . . .
|
Richard Thieme AKA neural . . . |
19:00 - 19:30 |
(Replay) Racketeer Toolkit. Prototyping Controlled . . .
|
Dimitry "Op_Nomad" Snezhk . . . |
20:00 - 21:59 |
DEF CON Movie Night - Upgrade
|
|
| | |
Sunday |
|
|
09:00 - 13:59 |
DEF CON Human Registration (Badge Pickup) and Vacc . . .
|
|
09:00 - 20:59 |
Chillout Lounges
|
DJ Pie & Darren,Louigi Ve . . . |
10:00 - 15:59 |
DEF CON Vendor Area Open
|
|
10:00 - 10:45 |
A Discussion with Agent X
|
Agent X |
10:00 - 10:59 |
Hi! I'm DOMAIN\Steve, please let me access VLAN2
|
Justin Perdok |
10:00 - 10:59 |
Taking Apart and Taking Over ICS & SCADA Ecosystem . . .
|
Mars Cheng,Selmon Yang |
11:00 - 11:45 |
The PACS-man Comes For Us All: We May Be Vaccinate . . .
|
Anze Jensterle,Babak Java . . . |
11:00 - 11:45 |
Glitching RISC-V chips: MTVEC corruption for harde . . .
|
Adam 'pi3' Zabrocki,Alex . . . |
11:00 - 11:59 |
Fuzzing Linux with Xen
|
Tamas K Lengyel |
12:00 - 12:45 |
DoS: Denial of Shopping – Analyzing and Exploiti . . .
|
Joseph Gabay |
12:00 - 12:45 |
No Key? No PIN? No Combo? No Problem! P0wning ATMs . . .
|
Roy Davis |
12:00 - 12:59 |
Breaking TrustZone-M: Privilege Escalation on LPC5 . . .
|
Laura Abbott,Rick Altherr |
13:00 - 13:45 |
Extension-Land: exploits and rootkits in your brow . . .
|
Barak Sternberg |
13:00 - 13:45 |
Why does my security camera scream like a Banshee? . . .
|
Rion Carter |
13:00 - 13:59 |
Timeless Timing Attacks
|
Mathy Vanhoef,Tom Van Goe . . . |
14:00 - 14:45 |
Robots with lasers and cameras (but no security): . . .
|
Dennis Giese |
14:00 - 14:45 |
Old MacDonald Had a Barcode, E-I-E-I CAR
|
Richard Henderson |
14:00 - 14:20 |
Instrument and Find Out: Writing Parasitic Tracers . . .
|
Jeff Dileo |
14:30 - 14:50 |
The Agricultural Data Arms Race: Exploiting a Trac . . .
|
Sick Codes |
15:00 - 15:59 |
(CANCELED) Discord Closing Ceremonies
|
Dark Tangent |
16:00 - 16:59 |
DEF CON Closing Ceremonies, Black Badge Ceremonies
|
Dark Tangent |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
07:00 - 07:59 |
Tabletop Exercise - GRIMM
|
|
10:00 - 10:59 |
Keynote - PW Singer
|
PW Singer |
10:30 - 11:30 |
Tabletop Exercise - GRIMM
|
|
11:30 - 12:30 |
Your Infrastructure is Encrypted: Protecting Criti . . .
|
David Etue,Ernie Bio,Jami . . . |
12:30 - 12:59 |
Do We Really Want to Live in the Cyberpunk World?
|
Mert Can Kilic |
13:00 - 13:59 |
Tabletop Exercise - GRIMM
|
|
13:00 - 13:30 |
Beetlejuice: The Lessons We Should Have Learned Fo . . .
|
Tim Yardley |
13:30 - 13:59 |
Scripts and Tools to Help Your ICS InfoSec Journey
|
Don C. Weber |
14:00 - 14:59 |
Consider the (Data) Source
|
Dan Gunter |
15:00 - 15:30 |
Approaches to Attract, Develop, and Retain an Indu . . .
|
John Ellis,Julia Atkinson |
15:30 - 15:59 |
It Takes a Village (and a generous grant): Student . . .
|
Alexander Vigovskiy,Chris . . . |
| | |
Saturday |
|
|
10:00 - 11:59 |
CybatiWorks Mission Station Workshop
|
Matthew Luallen |
12:00 - 12:59 |
Fireside Chat - August Cole
|
August Cole |
13:00 - 13:30 |
Toward a Collaborative Cyber Defense and Enhanced . . .
|
Lauren Zabierek |
13:30 - 13:59 |
Fortifying ICS - Hardening and Testing
|
Dieter Sarrazyn |
14:00 - 14:30 |
Crippling the Grid: Examination of Dependencies an . . .
|
Joe Slowik |
14:30 - 14:59 |
Leveraging SBOMs to Enhance ICS Security
|
Thomas Pace |
15:00 - 15:30 |
Smart Meters: I'm Hacking Infrastructure and So Sh . . .
|
Hash Salehi |
| | |
Sunday |
|
|
10:00 - 10:30 |
Bottom-Up and Top-Down: Exploiting Vulnerabilities . . .
|
Sharon Brizinov,Uri Katz |
10:30 - 10:59 |
Detecting Attackers Using Your Own Sensors with St . . .
|
Stefan Stephenson-Moe |
11:00 - 11:59 |
Top 20 Secure PLC Coding Practices
|
Sarah Fluchs,Vivek Ponnad . . . |
12:00 - 12:59 |
ICS Cyber Threat Intelligence (CTI) Information Sh . . .
|
Helio Sant'ana,John Felke . . . |
13:00 - 13:30 |
ICS Intrusion KillChain explained with real simula . . .
|
Javier Perez,Juan Escobar |
13:30 - 13:59 |
Building an ICS Firing Range (in our kitchen): Sha . . .
|
Moritz Thomas,Nico Leidec . . . |
14:00 - 14:59 |
ICS Jeopardy
|
Chris Sistrunk,Maggie Mor . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 13:59 |
The Joy of Reverse Engineering: Learning With Ghid . . .
|
Wesley McGrew |
10:00 - 13:59 |
Inspecting Signals from Satellites to Shock Collar . . .
|
Eric Escobar,Trenton Ivey |
10:00 - 13:59 |
Analysis 101 and 102 for the Incident Responder
|
Kristy Westphal |
10:00 - 13:59 |
House of Heap Exploitation
|
James Dolan,Maxwell Dulin . . . |
15:00 - 18:59 |
Windows Internals
|
Sam Bowne,Elizabeth Biddl . . . |
15:00 - 18:59 |
Secure messaging over unsecured transports
|
Ash |
15:00 - 18:59 |
Learning to Hack Bluetooth Low Energy with BLE CTF
|
Ryan Holeman |
15:00 - 18:59 |
Writing Golang Malware
|
Benjamin Kurtz |
| | |
Saturday |
|
|
10:00 - 13:59 |
From Zero to Hero in Web Security Research
|
Dikla Barda,Oded Vanunu,R . . . |
10:00 - 13:59 |
Bug bounty Hunting Workshop
|
David Patten,Philippe Del . . . |
10:00 - 13:59 |
Hacking the Metal: An Introduction to Assembly Lan . . .
|
eigentourist |
10:00 - 13:59 |
Digital Forensics and Incident Response Against th . . .
|
Michael Register,Michael . . . |
15:00 - 18:59 |
Network Analysis with Wireshark
|
Sam Bowne,Elizabeth Biddl . . . |
15:00 - 18:59 |
Analysis 101 and 102 for the Incident Responder
|
Kristy Westphal |
15:00 - 18:59 |
Evading Detection a Beginner's Guide to Obfuscatio . . .
|
Anthony "Cx01N" Rose,Jake . . . |
15:00 - 18:59 |
Advanced Wireless Attacks Against Enterprise Netwo . . .
|
Solstice |
| | |
Sunday |
|
|
10:00 - 13:59 |
Windows Internals
|
Sam Bowne,Elizabeth Biddl . . . |
10:00 - 13:59 |
From Zero to Hero in Web Security Research
|
Dikla Barda,Oded Vanunu,R . . . |
10:00 - 13:59 |
Modern Malware Analysis for Threat Hunters
|
Aaron Rosenmund,Ryan Chap . . . |
10:00 - 13:59 |
Hacking the Metal: An Introduction to Assembly Lan . . .
|
eigentourist |