DEF CON DC Talks Table

List of DEF CON talks in Tracks 1 thru 5

Villages and other Creators events are listed on the Creator Pages

One page  DC Talks Long List with Descriptions

“We are currently clean on OPSEC”: The Signalgate Saga
DC Talks Info
40 Years Of Phrack: Hacking, Zines & Digital Dissent
DC Talks Info
7 Vulns in 7 Days: Breaking Bloatware Faster Than It’s Built
DC Talks Info
Advanced Active Directory to Entra ID lateral movement techniques
DC Talks Info
Amber64: Mining Hacker History from Over Half a Million Commodore 64 Disks
DC Talks Info
AppleStorm – Unmasking the Privacy Risks of Apple Intelligence
DC Talks Info
Ask EFF
DC Talks Info
Binary Facades: Reversing approaches to extract embedded scripts in compiled macOS malware
DC Talks Info
BitUnlocker: Leveraging Windows Recovery to Extract BitLocker Secrets
DC Talks Info
Blind Trailer Shouting
DC Talks Info
Breakin ‘Em All – Overcoming Pokemon Go’s Anti-Cheat Mechanism
DC Talks Info
Breaking Wi-Fi Easy Connect: A Security Analysis of DPP
DC Talks Info
Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen
DC Talks Info
Building a Malware Museum
DC Talks Info
Can’t Stop the ROP: Automating Universal ASLR Bypasses for Windows
DC Talks Info
Carding, Sabotage & Survival: A Darknet Market Veteran’s Story
DC Talks Info
Cash, Drugs, and Guns: Why Your Safes Aren’t Safe
DC Talks Info
ChromeAlone: Transforming a Browser into a C2 Platform
DC Talks Info
Claude–Climbing a CTF Scoreboard Near You
DC Talks Info
Client or Server? The Hidden Sword of Damocles in Kafka
DC Talks Info
Contest Closing Ceremonies & Awards
DC Talks Info
CTRAPS: CTAP Impersonation and API Confusion Attacks on FIDO2
DC Talks Info
Cyber Volunteering and Community Defense – DEF CON Franklin and the Cyber Resilience Corps 1 Year In
DC Talks Info
DC101 Panel
DC Talks Info
De-Virtualizing the Dragon: Automated Unpacking and Deobfuscation of Nested VM-Based Protectors using Symbolic Execution and Taint Tracking
DC Talks Info
Dead Made Alive Again: Bypassing Intent Destination Checks and Reintroducing LaunchAnyWhere Privilege Escalation
DC Talks Info
DEF CON Closing Ceremonies & Awards
DC Talks Info
Diamonds Are For Hackers – Building the first fully open source and hackable Quantum Sensor
DC Talks Info
Direct Memory, Access Everywhere
DC Talks Info
DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks
DC Talks Info
Edge of Tomorrow: Foiling Large Supply Chain Attacks By Taking 5k Abandoned S3 Buckets from Malware and Benign Software
DC Talks Info
Emulating Embedded Linux Devices at Scale with Light-Touch Firmware Rehosting
DC Talks Info
Escaping the Privacy Sandbox with Client-Side Deanonymization Attacks
DC Talks Info
Fireside Chat with DT and General Paul M. Nakasone
DC Talks Info
Firewalls Under Fire: China’s 5+ year campaign to penetrate perimeter network defenses
DC Talks Info
From Shanghai to the Shore: The Silent Threat in Global Shipping
DC Talks Info
From Spoofing to Tunneling: New Red Team’s Networking Techniques for Initial Access and Evasion
DC Talks Info
Gateways to Chaos – How We Proved Modems Are a Ticking Time Bomb That Hackers Can Access Everywhere
DC Talks Info
Ghost Calls: Abusing Web Conferencing for Covert Command & Control
DC Talks Info
Ghosts in the Machine Check – Conjuring Hardware Failures for Cross-ring Privilege Escalation
DC Talks Info
Ghosts of REvil: An Inside Look with the Hacker Behind the Kaseya Ransomware Attack
DC Talks Info
Hackers Dropping Mid-Heist Selfies: LLM Identifies Information Stealer Infection Vector and Extracts IoCs
DC Talks Info
Hacking Hotspots: Pre-Auth Remote Code Execution, Arbitrary SMS & Adjacent Attacks on 5G and 4G/LTE Routers
DC Talks Info
HaKCing OBD-II Emissions Testing
DC Talks Info
Help! Linux in my Webcam! (•_•)
DC Talks Info
How to Fake a Badge like a Pro: 11 Tips to Counterfeiting Event Credentials
DC Talks Info
How to secure unique ecosystem shipping 1 billion+ cores?
DC Talks Info
HTTP/1.1 Must Die! The Desync Endgame
DC Talks Info
Infecting the Boot to Own the Kernel: Bootkits and Rootkits Development
DC Talks Info
Inside Look at a Chinese Operational Relay Network
DC Talks Info
Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite
DC Talks Info
Jailbreaking the Hivemind: Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem
DC Talks Info
Journey to the center of the PSTN: How I became a phone company, and why you should too.
DC Talks Info
Kill Chain Reloaded: Abusing legacy paths for stealth persistence
DC Talks Info
Kill List: Hacking an Assassination Site on the Dark Web
DC Talks Info
Killing Killnet
DC Talks Info
Loading Models, Launching Shells: Abusing AI File Formats for Code Execution
DC Talks Info
Making the DEF CON 33 Badge
DC Talks Info
Man-in-the-Malware: Intercepting Adversarial Communications
DC Talks Info
Mastering Apple’s Endpoint Security for Advanced macOS Malware Detection
DC Talks Info
Metal-as-a-Disservice: Exploiting Legacy Flaws in Cutting-Edge Clouds
DC Talks Info
Mind the Data Voids: Hijacking Copilot Trust to Deliver C2 Instructions with Microsoft Authority
DC Talks Info
No VPN Needed? Cryptographic Attacks Against the OPC UA Protocol
DC Talks Info
Not Just a Pipeline Leak: Reconstructing the Real Attack Behind tj-actions
DC Talks Info
One Key, Two Key, I Just Stole Your goTenna Key
DC Talks Info
One Modem to Brick Them All: Exploiting Vulnerabilities in the EV Charging Communication
DC Talks Info
Original Sin of SSO: macOS PRT Cookie Theft & Entra ID Persistence via Device Forgery
DC Talks Info
Orion – fuzzing workflow automation
DC Talks Info
OverLAPS: Overriding LAPS Logic
DC Talks Info
Passkeys Pwned: Turning WebAuthn Against Itself
DC Talks Info
Patching Critical Infrastructure: Announcing the Winners of DARPA’s AI Cyber Challenge
DC Talks Info
Paywall Optional: Stream for Free with a New Technique, Recursive Request Exploits (RRE)
DC Talks Info
Planting C4: Cross-Compatible External C2 for All Your Implants
DC Talks Info
Playing Dirty Without Cheating – Getting Banned for Fun and No Profit
DC Talks Info
RATs & Socks abusing Google Services
DC Talks Info
Rebadged, Relabeled, and Rooted: Pwnage via the Solar Supply Chain
DC Talks Info
Recording PCAPs from Stingrays With a $20 Hotspot
DC Talks Info
Remote code execution via MIDI messages
DC Talks Info
ReVault! Compromised by your Secure SoC
DC Talks Info
Rusty pearls: Postgres RCE on cloud databases
DC Talks Info
Safe Harbor or Hostile Waters: Unveiling the Hidden Perils of the TorchScript Engine in PyTorch
DC Talks Info
SCCM: The tree that always bears bad fruits
DC Talks Info
Shaking Out Shells with SSHamble
DC Talks Info
Silent Leaks: Harvesting Secrets from Shared Linux Environments
DC Talks Info
Silent Signals: Exploiting Security and Privacy Side-Channels in End-to-End Encrypted Messengers
DC Talks Info
Siri-ously Leaky: Exploring Overlooked Attack Surfaces Across Apple’s Ecosystem
DC Talks Info
So Long, and Thanks for All the Phish
DC Talks Info
SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix
DC Talks Info
Stories from a Tor dev
DC Talks Info
The (Un)Rightful Heir: My dMSA Is Your New Domain Admin
DC Talks Info
The 2025 Pwnie Awards
DC Talks Info
The DOMino Effect: Automated Detection and Exploitation of DOM Clobbering Vulnerability at Scale
DC Talks Info
The One Bitcoin Heist: Making a custom Hashcat module to solve a decade-old puzzle challenge
DC Talks Info
The Ultimate Hack: Applying Lessons Learned from the loss of TITAN to Maritime Cybersecurity
DC Talks Info
Thinking Like a Hacker in the Age of AI
DC Talks Info
TSPU: Russia’s Firewall and Defending Against the Future of Digital Repression
DC Talks Info
Turning Camera Surveillance on its Axis
DC Talks Info
Turning Microsoft’s Login Page into our Phishing Infrastructure
DC Talks Info
Turning your Active Directory into the attacker’s C2: modern Group Policy Objects enumeration and exploitation
DC Talks Info
Unexpected Connections: How a vulnerability in obscure dealer software could have unlocked your car from anywhere
DC Talks Info
Unmasking the Snitch Puck: the creepy IoT surveillance tech in the school bathroom
DC Talks Info
Virtualization-Based (In)security – Weaponizing VBS Enclaves
DC Talks Info
Voice Cloning Air Traffic Control: Vulnerabilities at Runway Crossings
DC Talks Info
Weaponizing Trust: Investigating a Threat Actor Targeting Security Researchers and Academics
DC Talks Info
Welcome to DEF CON 33!
DC Talks Info
What is Dead May Never Die: The Ghost of Internet Explorer in Windows: MapUrlToZone
DC Talks Info
Where’s My Crypto, Dude? The Ultimate Guide to Crypto Money Laundering (and How to Track It)
DC Talks Info
Win-DoS Epidemic: A crash course in abusing RPC for Win-DoS & Win-DDoS
DC Talks Info
You snooze you lose: RPC-Racer winning RPC endpoints against services
DC Talks Info
Zero Trust, Total Bust – Breaking into thousands of cloud-based VPNs with one bug
DC Talks Info