Welcome to the "One Schedule to Rule them All!". Thank you for your interest by using this. This is an attempt to make things easier for you, the DEF CON attendee, to figure out the when/what/where during the chaos of DEF CON 31.
It started out simple. I had a Kindle and wanted an ebook of the schedule so I didn't have to wear out the paper pamphlet by pulling it out after every talk to figure out where to go next. Back then there was only the main DEF CON tracks, not really any Villages, and production of the ebooks were easy. Over time the Village system developed with a resulting multiplication in complexity, both for attendees and for my production. The offerings no longer include epub and mobi formats and instead now include html, csv, PDF, ical, public Google calendar, and mysql dump format files. Hopefully you'll find something of use.
The intent is still to be a resource to answer the question at the end of an hour of "What's next?"
As a general rule I do not include:
Be sure to check out the Links section at the bottom of this. Most all of the events listed here were derived from these links and a Infoboot data feed. There is much more going on at DEF CON than what is listed here.
Check out the Guides/Tips/FAQs links if you're new to Las Vegas. And finally, this is only as good as the ideas and information used to generate it.
I welcome your constructive suggestions and comments. Please send them to qumqats@outel.org
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:59 |
AppSec Village Keynote: From Camels to Collaborati . . .
|
Chris Roberts |
11:45 - 12:30 |
The attackers guide to exploiting secrets in the u . . .
|
Mackenzie Jackson |
11:00 - 11:45 |
Generative Adversarial Network (GAN) based autonom . . .
|
Ankur Chowdhary |
11:00 - 12:59 |
Hands-on GitHub Actions
|
Magno Logan |
11:00 - 12:59 |
vAPI : Vulnerable Adversely Programmed Interface
|
Tushar Kulkarni |
11:00 - 12:59 |
Spot the True Positives!
|
Backslash |
11:00 - 12:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
11:00 - 12:59 |
Defensive Coding and Hardened Javascript
|
Aaron Kumavis,Zbyszek Ten . . . |
12:30 - 13:15 |
DevSecOps Worst Practices
|
Tanya Janca |
13:15 - 13:59 |
The Dark Playground of CI/CD: Attack Delivery by G . . .
|
Kiyohito Yamamoto,Yusuke . . . |
13:00 - 14:59 |
AMA - Tib3rius
|
Tib3rius |
13:00 - 14:59 |
IDN-Squatting Detector
|
Gal Bitensky |
13:00 - 14:59 |
Fix The Flag: A Secure Programming Competition
|
Pedram Hayati |
13:00 - 14:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
13:00 - 14:59 |
Web Shells - What They Are And How To Hunt Them
|
Joe Schottman |
14:00 - 14:45 |
Living off the Land with Connectwise: How I Built . . .
|
Ken Pyle |
15:00 - 16:59 |
Finding bugs and scaling your security program wit . . .
|
Lewis Ardern |
15:00 - 16:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
15:00 - 16:59 |
How to Hide Behavior from Security Tools
|
Mike Larkin |
15:00 - 16:59 |
FlowMate and CSTC for Advanced Pentesting
|
Florian Haag,Matthias Gö . . . |
15:00 - 16:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
15:00 - 16:59 |
Faking GitHub Contributions
|
Alik Koldobsky,Tal Folkma . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
AppSec Village Keynote: Collaborative Security: Fo . . .
|
Maril Vernon |
11:00 - 11:45 |
Getting More Bang for your Buck:Appsec on a Limite . . .
|
Vandana Verma Sehgal,Vira . . . |
11:45 - 12:30 |
Discovering Shadow Vulnerabilities in Popular Open . . .
|
Gal Elbaz,Guy Kaplan |
11:00 - 12:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
11:00 - 12:59 |
Secure Code Review Challenge
|
Alon Lerner |
11:00 - 12:59 |
Spot the True Positives!
|
Backslash |
11:00 - 12:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
11:00 - 12:59 |
JWT Parkour
|
Louis Nyffenegger |
12:30 - 13:30 |
Not All Alerts Are Born Equal: Insights from AppSe . . .
|
Joe Christian,Kunal Bhatt . . . |
13:00 - 14:59 |
For Kids: Castle Defenders
|
Pentera |
13:30 - 14:15 |
Dress Code - Analysis of the current status of the . . .
|
Felipe Molina |
13:00 - 14:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
13:00 - 14:59 |
Open Source API Security for devsecops
|
Ankita Gupta,Ankush Jain |
13:00 - 14:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
13:00 - 14:59 |
Secure from Scratch: Secure Code Workshop for DEF . . .
|
Or Sahar,Yariv Tal |
14:15 - 14:59 |
MitmWs: A new way to pentest websocket application . . .
|
Jon F |
15:00 - 15:45 |
SusParams: Hypercharge your web testing with DATA
|
Jason Haddix |
15:45 - 16:30 |
Securing the Front Lines: Protecting Front-End App . . .
|
Dohyeon Kim,WooWon Kang |
15:00 - 16:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
15:00 - 16:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
15:00 - 16:59 |
Fix The Flag - Battle Challenge
|
Pedram Hayati |
15:00 - 16:59 |
Faking GitHub Reputation
|
Checkmarx |
15:00 - 16:59 |
Per-mission Impossible: Exploring the Android Perm . . .
|
Miłosz Gaczkowski,Willia . . . |
16:30 - 17:15 |
Breaking Barriers: A Deep Dive into Bypassing Next . . .
|
Muhammad Shahmeer |
| | |
Sunday |
|
|
09:30 - 10:15 |
WAF: Making a Problematic Security Tool Suck Less
|
Emile Spir,Emmanuelle Lej . . . |
10:15 - 10:59 |
Hacking GitHub Actions: Abusing GitHub and Azure f . . .
|
Magno Logan |
10:00 - 11:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
10:00 - 11:59 |
Secure Code Review Challenge
|
Checkmarx |
10:00 - 11:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
10:00 - 11:59 |
Pasteur - A C++ library to eliminate injections
|
Yariv Tal |
10:00 - 11:59 |
Enhancing Security for ReactJS Applications: Explo . . .
|
Jim Manico |
11:00 - 11:45 |
Threat modeling-based application security pipelin . . .
|
Larkins Carvalho,Nielet D . . . |
11:45 - 12:30 |
Android Applications and APIs hacking
|
Gabrielle Botbol |
12:00 - 13:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
12:30 - 13:15 |
Unveiling the Dual Nature of ChatGPT and Copilot i . . .
|
Kalyani Pawar |
12:00 - 13:59 |
AMA - Jim Manico
|
Jim Manico |
12:00 - 13:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
12:00 - 13:59 |
Faking GitHub Reputation
|
Checkmarx |
12:00 - 13:59 |
Secure from Scratch: Secure Code Workshop
|
Or Sahar |
13:15 - 13:59 |
Scoping for Success (Building a Great Bug Bounty p . . .
|
Jeffrey Guerra,Logan MacL . . . |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:00 - 18:59 |
Human Registration Open
|
|
07:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 10:45 |
Boston Infinite Money Glitch: Hacking Transit Card . . .
|
Matthew Harris,Noah Gibso . . . |
11:30 - 12:15 |
Cracking Cicada 3301: The Future of Collaborative . . .
|
Artorias,Puck,Taiiwo,TheC . . . |
11:00 - 11:20 |
UNConventional Cybercrime: How a Bad Anti-Hacking . . .
|
Bill Budington,Katitza Ro . . . |
12:30 - 13:15 |
New Isn’t Always Novel: Grep’ing Your Way to $ . . .
|
James Horseman,Zach Hanle . . . |
13:30 - 14:15 |
Damned if you do - The risks of pointing out the e . . .
|
RenderMan,Thomas Dang |
14:30 - 15:15 |
Designing RFID Implants - How flipping the bird op . . .
|
Miana Ella Windall |
15:30 - 16:15 |
Nuthin But A G Thang: Evolution of Cellular Networ . . .
|
Tracy Mosley |
16:30 - 16:50 |
Small Leaks, Billions Of Dollars: Practical Crypto . . .
|
Nikolaos Makriyannis,Oren . . . |
17:30 - 18:45 |
DEF CON 101 - Welcome to DEF CON Panel
|
Jeff "The Dark Tangent" M . . . |
| | |
Friday |
|
|
08:00 - 19:59 |
Human Registration Open
|
|
08:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
09:00 - 09:45 |
Growing the Community of AI Hackers with the Gener . . .
|
Austin Carson,Rumman Chow . . . |
09:00 - 09:45 |
The Internals of Veilid, a New Decentralized Appli . . .
|
Christien "DilDog" Rioux, . . . |
09:30 - 10:15 |
Secretary of the Department of Homeland Security A . . .
|
Alejandro Mayorkas |
09:00 - 09:20 |
Welcome to DEF CON 31
|
Jeff "The Dark Tangent" M . . . |
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
09:00 - 09:45 |
The Hackers, The Lawyers, And The Defense Fund
|
Charley Snyder,Hannah Zha . . . |
10:30 - 11:15 |
Route to bugs: Analyzing the security of BGP messa . . .
|
Daniel dos Santos,Simon G . . . |
10:00 - 10:20 |
Look Ma I'm the CEO! Real-Time Video and Audio Dee . . .
|
Gal Zror |
10:00 - 17:59 |
Vendor Area Open
|
|
10:00 - 10:45 |
Contain Yourself: Staying Undetected Using the Win . . .
|
Daniel Avinoam |
10:30 - 10:50 |
Making The DEF CON 31 Badge
|
Mar Williams |
10:00 - 17:59 |
Exhibitor Area Open
|
|
10:00 - 10:45 |
The RingHopper Journey or How We Almost Zero-day . . .
|
Benny Zeltser,Jonathan Lu . . . |
10:00 - 17:59 |
Contest Area Open
|
|
10:00 - 10:45 |
A Different Uber Post Mortem
|
Joe Sullivan |
11:30 - 12:15 |
Civil Cyber Defense: Use Your Resources to Defend . . .
|
Austin Shamlin,Tiffany Ra . . . |
11:30 - 12:15 |
I Watched You Roll the Die: Unparalleled RDP Monit . . .
|
Andréanne Bergeron,Olivi . . . |
11:00 - 11:20 |
mTLS: when certificate authentication done wrong
|
Michael Stepankin |
11:00 - 11:45 |
SpamChannel: Spoofing Emails From 2 Million+ Domai . . .
|
Marcello "byt3bl33d3r" Sa . . . |
11:00 - 11:45 |
Defending KA-SAT: The detailed story of the respon . . .
|
Mark Colaluca,Nick Saunde . . . |
11:00 - 11:45 |
Warshopping - further dalliances in phreaking smar . . .
|
Joseph Gabay |
12:30 - 13:15 |
Defender-Pretender: When Windows Defender Updates . . .
|
Omer Attias,Tomer Bar |
12:30 - 13:15 |
A Pain in the NAS: Exploiting Cloud Connectivity t . . .
|
Noam Moshe,Sharon Brizino . . . |
12:00 - 12:45 |
Still Vulnerable Out of the Box: Revisiting the Se . . .
|
Angelos Stavrou,Mohamed E . . . |
12:00 - 12:20 |
GhostToken: Exploiting Google Cloud Platform App I . . .
|
Tal Skverer |
12:30 - 13:15 |
Backdoor in the Core - Altering the Intel x86 Inst . . .
|
Alexander Dalsgaard Krog, . . . |
12:00 - 13:59 |
Lonely Hackers Club - Resume Reviews & Career Advi . . .
|
|
12:00 - 12:45 |
You're Not George Clooney, and This Isn't Ocean's . . .
|
Andrew "Spike" Brandt |
13:30 - 14:15 |
Private Until Presumed Guilty
|
Allison Young,Diane Akerm . . . |
13:30 - 14:15 |
Private Keys in Public Places
|
Tom Pohl |
13:00 - 13:45 |
Over the Air, Under the Radar: Attacking and Secur . . .
|
Eugene Rodionov,Farzan Ka . . . |
13:30 - 14:15 |
Fantastic Ethertypes and Where to Find Them
|
Ricky "HeadlessZeke " Law . . . |
13:00 - 13:45 |
Living Next Door to Russia
|
Mikko Hypponen |
14:30 - 15:15 |
Second Breakfast: Implicit and Mutation-Based Ser . . .
|
Jonathan Birch |
14:00 - 14:20 |
There are no mushroom clouds in cyberwar
|
Mieke Eoyang |
14:30 - 14:50 |
DARPA Announces an AI Cyber Initiative, Live at DC . . .
|
Dave Weston,Heather Adkin . . . |
14:30 - 15:15 |
Getting a Migraine - uncovering a unique SIP bypas . . .
|
Anurag Bohra,Jonathan Bar . . . |
14:00 - 16:59 |
Lonely Hackers Club - Badgelife & Sticker Swap
|
|
14:00 - 14:20 |
Tracking the Worlds Dumbest Cyber-Mercenaries
|
Cooper Quintin |
14:30 - 14:50 |
"You can't cheat time" - Finding foes and yourself . . .
|
Lorenzo ”lopoc” Cococ . . . |
15:30 - 16:15 |
Game-Changing Advances in Windows Shellcode Analys . . .
|
Bramwell Brizendine,Jake . . . |
15:30 - 16:15 |
A Comprehensive Review on the Less-Traveled Road: . . .
|
NiNi Chen |
15:00 - 15:45 |
Shall we play a game? Just because a Large Languag . . .
|
Craig Martell |
15:30 - 16:15 |
Turning my virtual wallet into a skimming device: . . .
|
Dan Borgogno,Ileana Barri . . . |
15:00 - 15:45 |
CON trolling the weather
|
Paz Hameiri |
16:30 - 17:15 |
Malware design - abusing legacy Microsoft transpor . . .
|
R.J. "BeetleChunks" McDow . . . |
16:30 - 17:15 |
Nothing but Net: Leveraging macOS's Networking Fra . . .
|
Patrick Wardle |
16:00 - 16:45 |
Visual Studio Code is why I have (Workspace) Trust . . .
|
Paul Gerste,Thomas Chauch . . . |
16:30 - 17:15 |
certmitm: automatic exploitation of TLS certificat . . .
|
Aapo Oksman |
16:00 - 16:45 |
A Series of Unfortunate Events
|
Ben "NahamSec" Sadeghipou . . . |
17:30 - 18:15 |
Fireside Chat with the National Cyber Director Kem . . .
|
Kemba Walden |
17:00 - 17:20 |
HL7Magic: Medical Data Hacking Made Easy
|
Katie Inns |
17:30 - 17:50 |
Track the Planet! Mapping Identities, Monitoring P . . .
|
nyxgeek |
17:00 - 17:59 |
Lonely Hackers Club - Name That Noob
|
|
17:00 - 17:45 |
Legend of Zelda: Use After Free (TASBot glitches t . . .
|
Allan "dwangoAC" Cecil |
20:00 - 21:59 |
Ask the EFF
|
Cooper Quintin,Corynne Mc . . . |
| | |
Saturday |
|
|
09:00 - 09:45 |
Hack the Future: Why Congress and the White House . . .
|
Arati Prabhakar,Austin Ca . . . |
09:30 - 18:59 |
Human Registration Open
|
|
09:30 - 10:15 |
Badge of Shame: Breaking into Secure Facilities wi . . .
|
Dan "AltF4" Petro,David V . . . |
09:00 - 09:20 |
Assessing the Security of Certificates at Scale
|
Andrew Chi,Brandon Enrigh . . . |
09:00 - 09:45 |
Smashing the state machine: the true potential of . . .
|
James "albinowax" Kettle |
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
09:30 - 10:15 |
J4 Gate, The Hustler Poker Cheating Scandal invest . . .
|
Scott "Duckie" Melnick |
09:00 - 09:20 |
ELECTRONizing macOS privacy - a new weapon in your . . .
|
Wojciech Reguła |
09:00 - 11:59 |
Merch (formerly swag) Area Open -- README
|
|
10:00 - 10:45 |
Defeating VPN Always-On
|
Maxime Clementz |
10:00 - 17:59 |
Vendor Area Open
|
|
10:30 - 11:15 |
Calling it a 0-Day - Hacking at PBX/UC Systems
|
good_pseudonym |
10:00 - 10:45 |
Demystifying (& Bypassing) macOS's Background Task . . .
|
Patrick Wardle |
10:00 - 17:59 |
Exhibitor Area Open
|
|
10:30 - 11:15 |
Unlocking Doors from Half a Continent Away
|
Sam Haskins,Trevor "t1v0" . . . |
10:00 - 17:59 |
Contest Area Open
|
|
10:00 - 11:45 |
D0 N0 H4RM: A Healthcare Security Conversation
|
Christian "quaddi" Dameff . . . |
11:00 - 11:45 |
Spread spectrum techniques in disposable drones fo . . .
|
David Melendez,Gabriela " . . . |
11:30 - 12:15 |
Physical Attacks Against Smartphones
|
Christopher Wade |
11:00 - 11:45 |
Weaponizing Plain Text: ANSI Escape Sequences as a . . .
|
STÖK |
11:30 - 12:15 |
Apple's Predicament: NSPredicate Exploitation on m . . .
|
Austin Emmitt |
11:30 - 12:15 |
Mass Owning of Seedboxes - A Live Hacking Exhibiti . . .
|
Anon |
12:00 - 12:45 |
From Feature to Weapon: Breaking Microsoft Teams a . . .
|
Nestori Syynimaa |
12:30 - 13:15 |
Video-based Cryptanalysis: Extracting Secret Keys . . .
|
Ben Nassi,Ofek Vayner |
12:00 - 12:45 |
Internet censorship: what governments around the g . . .
|
Christopher Painter,Jeff . . . |
12:30 - 13:15 |
An Audacious Plan to Halt the Internet's Enshittif . . .
|
Cory Doctorow |
12:00 - 13:59 |
Lonely Hackers Club - Resume Reviews & Career Advi . . .
|
|
12:30 - 13:30 |
Metawar
|
Winn |
13:00 - 13:45 |
Azure B2C 0-Day: An Exploit Chain from Public Keys . . .
|
John Novak |
13:30 - 14:15 |
Meduza: How an exiled pirate media outlet breaks t . . .
|
Alex |
13:00 - 13:45 |
Looking into the future, what can we learn about h . . .
|
Nicolas Minvielle,Xavier . . . |
13:30 - 14:15 |
The GitHub Actions Worm: Compromising GitHub repos . . .
|
Asi Greenholts |
14:00 - 14:45 |
Power Corrupts; Corrupt It Back! Hacking Power Man . . .
|
Jesse Chick,Sam Quinn |
14:30 - 15:15 |
Exploiting OPC-UA in Every Possible Way: Practical . . .
|
Noam Moshe,Sharon Brizino . . . |
14:00 - 14:45 |
A SSLippery Slope: Unraveling the Hidden Dangers o . . .
|
Bill Demirkapi |
14:30 - 15:15 |
Contactless Overflow: Code execution in payment te . . .
|
Josep Pi Rodriguez |
14:00 - 16:59 |
Lonely Hackers Club - Badgelife & Sticker Swap
|
|
14:00 - 17:59 |
Off the record war story talks - Signs Ups On Site
|
|
15:00 - 15:45 |
Revolutionizing ELF binary patching with Shiva: A . . .
|
Ryan "ElfMaster" O'Neill |
15:30 - 16:15 |
Breaking BMC: The Forgotten Key to the Kingdom
|
Adam Zabrocki,Alex Teresh . . . |
15:00 - 15:45 |
Spooky authentication at a distance
|
Tamas "SkelSec" Jos |
15:30 - 16:15 |
ndays are also 0days: Can hackers launch 0day RCE . . .
|
Bohan Liu,GuanCheng Li,Zh . . . |
16:30 - 17:15 |
All information looks like noise until you break t . . .
|
David Pekoske,Jen Easterl . . . |
16:00 - 16:20 |
A Broken Marriage: Abusing Mixed Vendor Kerberos S . . .
|
Ceri Coburn |
16:30 - 16:50 |
Your Clocks Have Ears — Timing-Based Browser-Bas . . .
|
Dongsung “Donny” Kim |
16:00 - 16:45 |
Runtime Riddles: Abusing Manipulation Points in th . . .
|
Laurie Kirk |
16:30 - 17:15 |
Abortion Access in the Age of Surveillance
|
Corynne McSherry,Daly Bar . . . |
17:30 - 17:50 |
Lions and Tigers and Fancy Bears, Oh My!: A Cautio . . .
|
Jen Easterly,Scott Shapir . . . |
17:00 - 17:20 |
Silent Spring: Prototype Pollution Leads to Remote . . .
|
Mikhail Shcherbakov,Musar . . . |
17:00 - 17:20 |
Polynonce: An ECDSA Attack and Polynomial Dance
|
Marco Macchetti,Nils Amie . . . |
17:00 - 17:59 |
Lonely Hackers Club - Name That Noob
|
|
| | |
Sunday |
|
|
09:00 - 15:30 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 10:45 |
Vacuum robot security and privacy - prevent your r . . .
|
Dennis Giese |
10:00 - 15:59 |
Vendor Area Open
|
|
10:00 - 13:59 |
Human Registration Open
|
|
10:00 - 10:45 |
StackMoonwalk: A Novel approach to stack spoofing . . .
|
Alessandro "klezVirus" Ma . . . |
10:00 - 10:45 |
Cellular carriers hate this trick: Using SIM tunne . . .
|
Adrian "atrox" Dabrowski, . . . |
10:00 - 13:59 |
Exhibitor Area Open
|
|
10:00 - 10:20 |
Snoop unto them, as they snoop unto us
|
Michaud "5@\/@g3" Savage, . . . |
10:00 - 13:59 |
Contest Area Open
|
|
10:00 - 11:59 |
War Stories Off The Record AMA
|
|
11:00 - 11:45 |
Burrowing Through The Network: Contextualizing The . . .
|
Joe Slowik |
11:00 - 11:45 |
Advanced ROP Framework: Pushing ROP to Its Limits
|
Bramwell Brizendine,Shiva . . . |
11:00 - 11:45 |
The Art of Compromising C2 Servers: A Web Applicat . . .
|
Vangelis Stykas |
11:00 - 11:45 |
Unlocking hidden powers in Xtensa based Qualcomm W . . .
|
Daniel Wegemer |
12:00 - 12:45 |
LLMs at the Forefront: Pioneering the Future of Fu . . .
|
X |
12:00 - 12:45 |
#NoFilter: Abusing Windows Filtering Platform for . . .
|
Ron Ben-Yizhak |
12:00 - 12:45 |
Terminally Owned - 60 years of escaping
|
David Leadbeater |
12:00 - 12:45 |
Retro Exploitation: Using Vintage Computing Platfo . . .
|
Wesley McGrew |
13:00 - 13:45 |
Exploring Linux Memory Manipulation for Stealth an . . .
|
Carlos Polop,Yago Gutierr . . . |
13:00 - 13:45 |
The Price of Convenience: How Security Vulnerabili . . .
|
Omer Attias |
14:00 - 15:15 |
Panel: Hacker Court - Interactive Scenario
|
winn0na |
14:00 - 15:15 |
Contest Closing Ceremonies & Awards
|
|
14:00 - 15:15 |
TETRA tour de force: Jailbreaking digital radios a . . .
|
Carlo Meijer,Jos Wetzels, . . . |
15:30 - 17:30 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:55 |
Vulnerable by Design: Unguard, The Insecure Cloud- . . .
|
Christoph Wedenig,Simon A . . . |
10:00 - 11:55 |
SucoshScanny
|
Mustafa Bilgici,Tibet Ö . . . |
10:00 - 11:55 |
The Metasploit Framework
|
Spencer McIntyre |
10:00 - 11:55 |
T3SF (Technical TableTop Exercises Simulation Fram . . .
|
Federico Pacheco,Joaquin . . . |
10:00 - 11:55 |
Katalina
|
Gabi Cirlig |
10:00 - 11:55 |
Strix Interceptor
|
Lexie Thach |
12:00 - 13:55 |
CNAPPGoat
|
Igal Gofman,Noam Dahan |
12:00 - 13:55 |
Dracon
|
Spyros Gasteratos |
12:00 - 13:55 |
Build Inspector - A modern Javert on the trail of . . .
|
Jeremy Banker |
12:00 - 13:55 |
Ek47 – Payload Encryption with Environmental Key . . .
|
Kevin “Kent” Clark,Sk . . . |
12:00 - 13:55 |
FlowMate
|
Florian Haag,Nicolas Schi . . . |
12:00 - 13:55 |
Shufflecake, AKA Truecrypt on Steroids for Linux
|
Elia Anzuoni,Tommaso "tom . . . |
14:00 - 15:55 |
OWASP crAPI: Completely Ridiculous API
|
Jayesh Ahire,Roshan Piyus . . . |
14:00 - 15:55 |
OpenSSF Scorecard
|
Naveen Srinivasan,Neil Na . . . |
14:00 - 15:55 |
EvilnoVNC: Next-Gen Spear Phishing Attacks
|
Joel Gámez Molina |
14:00 - 15:55 |
Attack Surface Framework
|
Mike Henkelman,Prajwal Pa . . . |
14:00 - 15:55 |
Glyph
|
Corey Hartman |
14:00 - 15:55 |
Vacuum Robot Hacking
|
Dennis Giese |
| | |
Saturday |
|
|
10:00 - 11:55 |
Lambda Looter
|
Doug Kent,Rob Ditmer |
10:00 - 11:55 |
Lupo: Malware IOC Extractor
|
Vishal Thakur |
10:00 - 11:55 |
Veilid
|
Deth Veggie,TC Johnson |
10:00 - 11:55 |
Saturday
|
Joshua Herman |
10:00 - 11:55 |
The Wifydra: Multiheaded RF Panopticon
|
Lozaning |
10:00 - 11:55 |
USBvalve - Expose USB activity on the fly
|
Cesare Pizzi |
12:00 - 13:55 |
BBOT (Bighuge BLS OSINT Tool)
|
Joel "TheTechromancer" Mo . . . |
12:00 - 13:55 |
Abusing Microsoft SQL Server with SQLRecon
|
Sanjiv Kawa |
12:00 - 13:55 |
Red Wizard: user-friendly Red Teaming infrastructu . . .
|
Ben Brücker |
12:00 - 13:55 |
Am I Exploitable? (MI-X)
|
Ofri Ouzan,Yotam Perkal |
12:00 - 13:55 |
Kraken, a modular multi-language webshell for defe . . .
|
Raul Caro |
12:00 - 13:55 |
Pcapinator: Rise of the PCAP Machines
|
Henry Hill,Mike "d4rkm4tt . . . |
14:00 - 15:55 |
ThreatScraper: Automated Threat Intelligence Gathe . . .
|
Aaron "AJ" Morath,Scott G . . . |
14:00 - 15:55 |
RuleProcessorY & Gramify - Rule Optimization & Pas . . .
|
Niels Loozekoot |
14:00 - 15:55 |
HardHat Command & Control Framework
|
Jonathan Owens |
14:00 - 15:55 |
ProjectDiscovery Nuclei
|
Brendan O'Leary,Pj Metz |
14:00 - 15:55 |
ICS Forensics tool
|
Maayan Shaul,Ori Perez |
14:00 - 15:55 |
BLE CTF
|
Alek Amrani,Ryan Holeman |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:50 |
Building the Hacker Talent Pipeline Through Workfo . . .
|
Ashley Sequeira,Ayan Isla . . . |
10:00 - 11:50 |
US Cyber Policy 101
|
Harley Geiger,Lauren Zabi . . . |
12:00 - 12:50 |
The Promise and Perils of Planetary-Scale ISPs
|
J. Scott Christianson |
12:00 - 13:50 |
It's Coming from Inside the House: Next Steps for . . .
|
David Forscey,Emily Paull . . . |
12:00 - 13:50 |
International Cyber Policy 101
|
Adam Dobell,Ari Schwartz, . . . |
13:00 - 13:50 |
Securing the Supply Chain
|
Camille Stewart Gloster,E . . . |
14:00 - 14:50 |
What are your thoughts on AI assisted voice clonin . . .
|
Christine Barker |
14:00 - 14:50 |
Cyber Policy Adrift – Charting a Path Forward fo . . .
|
Blake Benson,Cliff Neve,J . . . |
15:00 - 15:50 |
Blocking Pathways into Cybercrime: Current Efforts . . .
|
Greg Francis,Jonathan Lus . . . |
15:00 - 16:50 |
A global approach to tackling software resilience
|
Allan Friedman,Camille St . . . |
16:00 - 16:50 |
I Am A Former National Cybersecurity Director, Ask . . .
|
Chris Inglis |
17:00 - 17:50 |
Keeping stores safe: how do we better secure apps . . .
|
Charlie Gladstone,David R . . . |
17:00 - 17:50 |
Demystifying Hacking for Government Officials
|
Brad Manuel,Jack Cable,Ja . . . |
| | |
Saturday |
|
|
10:00 - 10:50 |
What “Secure by Design” means for software bre . . .
|
Cassie Crossley,Christoph . . . |
10:00 - 11:50 |
How hackers can work with government, industry, ci . . .
|
Adrien Ogee,David Forscey . . . |
11:00 - 11:50 |
AI Caramba! A DC <> DEF CON interface on machin . . .
|
Austin Carson,Erick Galin . . . |
11:00 - 13:50 |
Secure by Design: Ask the Government Anything and . . .
|
Bob Lord,Cheri Caddy,Jack . . . |
12:00 - 13:50 |
Hands On a Cyber Policy Crisis: Testing Assumption . . .
|
Safa Shahwan Edwards |
12:00 - 12:50 |
The Coming War on Encryption, Part 3 (and how you . . .
|
India McKinney |
13:00 - 13:50 |
Beyond the Breach: Exploring Cybersecurity Policie . . .
|
Andrés Velázquez,Isabel . . . |
14:00 - 14:50 |
Let Night City Sleep - Governance Against a Cyberp . . .
|
Cameron Byrd,Clayton Dixo . . . |
14:00 - 15:50 |
Abating the Eye of Sauron: Help Combat Authoritari . . .
|
David Houston,Michaela Le . . . |
14:00 - 14:50 |
How can we encourage more hackers to engage with p . . .
|
Peter Stephens,Thomas Kra . . . |
15:00 - 15:50 |
Non-State Actors in the Russia/Ukraine Conflict
|
Dan Grobarcik,Marc Rogers . . . |
15:00 - 15:50 |
All Your Vulns are Belong to Terms & Conditions
|
Casey Ellis,David Rogers, . . . |
16:00 - 17:50 |
We're From the Government and We're Here to Help S . . .
|
Anjana Rajan,Brian Behlen . . . |
16:00 - 16:50 |
How do you solve a problem like Mirai - establishi . . .
|
Kat Megas,Peter Stephens |
17:00 - 17:50 |
Navigating the Digital Frontier: Advancing Cyber D . . .
|
Christopher Painter,Harry . . . |
| | |
Sunday |
|
|
10:00 - 10:50 |
Putting Your Money Where Your Cyber Is: A Guided D . . .
|
Andrea Matwyshyn |
11:00 - 11:50 |
Hangover Trivia: Cyber Policy Edition
|
Kurt Opsahl |