PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:59 |
AppSec Village Keynote: From Camels to Collaborati . . .
|
Chris Roberts |
11:45 - 12:30 |
The attackers guide to exploiting secrets in the u . . .
|
Mackenzie Jackson |
11:00 - 11:45 |
Generative Adversarial Network (GAN) based autonom . . .
|
Ankur Chowdhary |
11:00 - 12:59 |
Hands-on GitHub Actions
|
Magno Logan |
11:00 - 12:59 |
vAPI : Vulnerable Adversely Programmed Interface
|
Tushar Kulkarni |
11:00 - 12:59 |
Spot the True Positives!
|
Backslash |
11:00 - 12:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
11:00 - 12:59 |
Defensive Coding and Hardened Javascript
|
Aaron Kumavis,Zbyszek Ten . . . |
12:30 - 13:15 |
DevSecOps Worst Practices
|
Tanya Janca |
13:15 - 13:59 |
The Dark Playground of CI/CD: Attack Delivery by G . . .
|
Kiyohito Yamamoto,Yusuke . . . |
13:00 - 14:59 |
AMA - Tib3rius
|
Tib3rius |
13:00 - 14:59 |
IDN-Squatting Detector
|
Gal Bitensky |
13:00 - 14:59 |
Fix The Flag: A Secure Programming Competition
|
Pedram Hayati |
13:00 - 14:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
13:00 - 14:59 |
Web Shells - What They Are And How To Hunt Them
|
Joe Schottman |
14:00 - 14:45 |
Living off the Land with Connectwise: How I Built . . .
|
Ken Pyle |
15:00 - 16:59 |
Finding bugs and scaling your security program wit . . .
|
Lewis Ardern |
15:00 - 16:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
15:00 - 16:59 |
How to Hide Behavior from Security Tools
|
Mike Larkin |
15:00 - 16:59 |
FlowMate and CSTC for Advanced Pentesting
|
Florian Haag,Matthias Gö . . . |
15:00 - 16:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
15:00 - 16:59 |
Faking GitHub Contributions
|
Alik Koldobsky,Tal Folkma . . . |
| | |
Saturday |
|
|
10:00 - 10:59 |
AppSec Village Keynote: Collaborative Security: Fo . . .
|
Maril Vernon |
11:00 - 11:45 |
Getting More Bang for your Buck:Appsec on a Limite . . .
|
Vandana Verma Sehgal,Vira . . . |
11:45 - 12:30 |
Discovering Shadow Vulnerabilities in Popular Open . . .
|
Gal Elbaz,Guy Kaplan |
11:00 - 12:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
11:00 - 12:59 |
Secure Code Review Challenge
|
Alon Lerner |
11:00 - 12:59 |
Spot the True Positives!
|
Backslash |
11:00 - 12:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
11:00 - 12:59 |
JWT Parkour
|
Louis Nyffenegger |
12:30 - 13:30 |
Not All Alerts Are Born Equal: Insights from AppSe . . .
|
Joe Christian,Kunal Bhatt . . . |
13:00 - 14:59 |
For Kids: Castle Defenders
|
Pentera |
13:30 - 14:15 |
Dress Code - Analysis of the current status of the . . .
|
Felipe Molina |
13:00 - 14:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
13:00 - 14:59 |
Open Source API Security for devsecops
|
Ankita Gupta,Ankush Jain |
13:00 - 14:59 |
The Ultimate AppSec Trivia Challenge
|
Probely |
13:00 - 14:59 |
Secure from Scratch: Secure Code Workshop for DEF . . .
|
Or Sahar,Yariv Tal |
14:15 - 14:59 |
MitmWs: A new way to pentest websocket application . . .
|
Jon F |
15:00 - 15:45 |
SusParams: Hypercharge your web testing with DATA
|
Jason Haddix |
15:45 - 16:30 |
Securing the Front Lines: Protecting Front-End App . . .
|
Dohyeon Kim,WooWon Kang |
15:00 - 16:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
15:00 - 16:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
15:00 - 16:59 |
Fix The Flag - Battle Challenge
|
Pedram Hayati |
15:00 - 16:59 |
Faking GitHub Reputation
|
Checkmarx |
15:00 - 16:59 |
Per-mission Impossible: Exploring the Android Perm . . .
|
Miłosz Gaczkowski,Willia . . . |
16:30 - 17:15 |
Breaking Barriers: A Deep Dive into Bypassing Next . . .
|
Muhammad Shahmeer |
| | |
Sunday |
|
|
09:30 - 10:15 |
WAF: Making a Problematic Security Tool Suck Less
|
Emile Spir,Emmanuelle Lej . . . |
10:15 - 10:59 |
Hacking GitHub Actions: Abusing GitHub and Azure f . . .
|
Magno Logan |
10:00 - 11:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
10:00 - 11:59 |
Secure Code Review Challenge
|
Checkmarx |
10:00 - 11:59 |
Hunt the Hacker - Detect compromises in your repos . . .
|
GitGuardian |
10:00 - 11:59 |
Pasteur - A C++ library to eliminate injections
|
Yariv Tal |
10:00 - 11:59 |
Enhancing Security for ReactJS Applications: Explo . . .
|
Jim Manico |
11:00 - 11:45 |
Threat modeling-based application security pipelin . . .
|
Larkins Carvalho,Nielet D . . . |
11:45 - 12:30 |
Android Applications and APIs hacking
|
Gabrielle Botbol |
12:00 - 13:59 |
Threat modelling fun session with OWASP Cornucopia
|
Spyros Gasteratos |
12:30 - 13:15 |
Unveiling the Dual Nature of ChatGPT and Copilot i . . .
|
Kalyani Pawar |
12:00 - 13:59 |
AMA - Jim Manico
|
Jim Manico |
12:00 - 13:59 |
How to Hide Behavior from Security Tools
|
Deepfactor |
12:00 - 13:59 |
Faking GitHub Reputation
|
Checkmarx |
12:00 - 13:59 |
Secure from Scratch: Secure Code Workshop
|
Or Sahar |
13:15 - 13:59 |
Scoping for Success (Building a Great Bug Bounty p . . .
|
Jeffrey Guerra,Logan MacL . . . |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
07:00 - 18:59 |
Human Registration Open
|
|
07:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 10:45 |
Boston Infinite Money Glitch: Hacking Transit Card . . .
|
Matthew Harris,Noah Gibso . . . |
11:30 - 12:15 |
Cracking Cicada 3301: The Future of Collaborative . . .
|
Artorias,Puck,Taiiwo,TheC . . . |
11:00 - 11:20 |
UNConventional Cybercrime: How a Bad Anti-Hacking . . .
|
Bill Budington,Katitza Ro . . . |
12:30 - 13:15 |
New Isn’t Always Novel: Grep’ing Your Way to $ . . .
|
James Horseman,Zach Hanle . . . |
13:30 - 14:15 |
Damned if you do - The risks of pointing out the e . . .
|
RenderMan,Thomas Dang |
14:30 - 15:15 |
Designing RFID Implants - How flipping the bird op . . .
|
Miana Ella Windall |
15:30 - 16:15 |
Nuthin But A G Thang: Evolution of Cellular Networ . . .
|
Tracy Mosley |
16:30 - 16:50 |
Small Leaks, Billions Of Dollars: Practical Crypto . . .
|
Nikolaos Makriyannis,Oren . . . |
17:30 - 18:45 |
DEF CON 101 - Welcome to DEF CON Panel
|
Jeff "The Dark Tangent" M . . . |
| | |
Friday |
|
|
08:00 - 19:59 |
Human Registration Open
|
|
08:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
09:00 - 09:45 |
Growing the Community of AI Hackers with the Gener . . .
|
Austin Carson,Rumman Chow . . . |
09:00 - 09:45 |
The Internals of Veilid, a New Decentralized Appli . . .
|
Christien "DilDog" Rioux, . . . |
09:30 - 10:15 |
Secretary of the Department of Homeland Security A . . .
|
Alejandro Mayorkas |
09:00 - 09:20 |
Welcome to DEF CON 31
|
Jeff "The Dark Tangent" M . . . |
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
09:00 - 09:45 |
The Hackers, The Lawyers, And The Defense Fund
|
Charley Snyder,Hannah Zha . . . |
10:30 - 11:15 |
Route to bugs: Analyzing the security of BGP messa . . .
|
Daniel dos Santos,Simon G . . . |
10:00 - 10:20 |
Look Ma I'm the CEO! Real-Time Video and Audio Dee . . .
|
Gal Zror |
10:00 - 17:59 |
Vendor Area Open
|
|
10:00 - 10:45 |
Contain Yourself: Staying Undetected Using the Win . . .
|
Daniel Avinoam |
10:30 - 10:50 |
Making The DEF CON 31 Badge
|
Mar Williams |
10:00 - 17:59 |
Exhibitor Area Open
|
|
10:00 - 10:45 |
The RingHopper Journey or How We Almost Zero-day . . .
|
Benny Zeltser,Jonathan Lu . . . |
10:00 - 17:59 |
Contest Area Open
|
|
10:00 - 10:45 |
A Different Uber Post Mortem
|
Joe Sullivan |
11:30 - 12:15 |
Civil Cyber Defense: Use Your Resources to Defend . . .
|
Austin Shamlin,Tiffany Ra . . . |
11:30 - 12:15 |
I Watched You Roll the Die: Unparalleled RDP Monit . . .
|
Andréanne Bergeron,Olivi . . . |
11:00 - 11:20 |
mTLS: when certificate authentication done wrong
|
Michael Stepankin |
11:00 - 11:45 |
SpamChannel: Spoofing Emails From 2 Million+ Domai . . .
|
Marcello "byt3bl33d3r" Sa . . . |
11:00 - 11:45 |
Defending KA-SAT: The detailed story of the respon . . .
|
Mark Colaluca,Nick Saunde . . . |
11:00 - 11:45 |
Warshopping - further dalliances in phreaking smar . . .
|
Joseph Gabay |
12:30 - 13:15 |
Defender-Pretender: When Windows Defender Updates . . .
|
Omer Attias,Tomer Bar |
12:30 - 13:15 |
A Pain in the NAS: Exploiting Cloud Connectivity t . . .
|
Noam Moshe,Sharon Brizino . . . |
12:00 - 12:45 |
Still Vulnerable Out of the Box: Revisiting the Se . . .
|
Angelos Stavrou,Mohamed E . . . |
12:00 - 12:20 |
GhostToken: Exploiting Google Cloud Platform App I . . .
|
Tal Skverer |
12:30 - 13:15 |
Backdoor in the Core - Altering the Intel x86 Inst . . .
|
Alexander Dalsgaard Krog, . . . |
12:00 - 13:59 |
Lonely Hackers Club - Resume Reviews & Career Advi . . .
|
|
12:00 - 12:45 |
You're Not George Clooney, and This Isn't Ocean's . . .
|
Andrew "Spike" Brandt |
13:30 - 14:15 |
Private Until Presumed Guilty
|
Allison Young,Diane Akerm . . . |
13:30 - 14:15 |
Private Keys in Public Places
|
Tom Pohl |
13:00 - 13:45 |
Over the Air, Under the Radar: Attacking and Secur . . .
|
Eugene Rodionov,Farzan Ka . . . |
13:30 - 14:15 |
Fantastic Ethertypes and Where to Find Them
|
Ricky "HeadlessZeke " Law . . . |
13:00 - 13:45 |
Living Next Door to Russia
|
Mikko Hypponen |
14:30 - 15:15 |
Second Breakfast: Implicit and Mutation-Based Ser . . .
|
Jonathan Birch |
14:00 - 14:20 |
There are no mushroom clouds in cyberwar
|
Mieke Eoyang |
14:30 - 14:50 |
DARPA Announces an AI Cyber Initiative, Live at DC . . .
|
Dave Weston,Heather Adkin . . . |
14:30 - 15:15 |
Getting a Migraine - uncovering a unique SIP bypas . . .
|
Anurag Bohra,Jonathan Bar . . . |
14:00 - 16:59 |
Lonely Hackers Club - Badgelife & Sticker Swap
|
|
14:00 - 14:20 |
Tracking the Worlds Dumbest Cyber-Mercenaries
|
Cooper Quintin |
14:30 - 14:50 |
"You can't cheat time" - Finding foes and yourself . . .
|
Lorenzo ”lopoc” Cococ . . . |
15:30 - 16:15 |
Game-Changing Advances in Windows Shellcode Analys . . .
|
Bramwell Brizendine,Jake . . . |
15:30 - 16:15 |
A Comprehensive Review on the Less-Traveled Road: . . .
|
NiNi Chen |
15:00 - 15:45 |
Shall we play a game? Just because a Large Languag . . .
|
Craig Martell |
15:30 - 16:15 |
Turning my virtual wallet into a skimming device: . . .
|
Dan Borgogno,Ileana Barri . . . |
15:00 - 15:45 |
CON trolling the weather
|
Paz Hameiri |
16:30 - 17:15 |
Malware design - abusing legacy Microsoft transpor . . .
|
R.J. "BeetleChunks" McDow . . . |
16:30 - 17:15 |
Nothing but Net: Leveraging macOS's Networking Fra . . .
|
Patrick Wardle |
16:00 - 16:45 |
Visual Studio Code is why I have (Workspace) Trust . . .
|
Paul Gerste,Thomas Chauch . . . |
16:30 - 17:15 |
certmitm: automatic exploitation of TLS certificat . . .
|
Aapo Oksman |
16:00 - 16:45 |
A Series of Unfortunate Events
|
Ben "NahamSec" Sadeghipou . . . |
17:30 - 18:15 |
Fireside Chat with the National Cyber Director Kem . . .
|
Kemba Walden |
17:00 - 17:20 |
HL7Magic: Medical Data Hacking Made Easy
|
Katie Inns |
17:30 - 17:50 |
Track the Planet! Mapping Identities, Monitoring P . . .
|
nyxgeek |
17:00 - 17:59 |
Lonely Hackers Club - Name That Noob
|
|
17:00 - 17:45 |
Legend of Zelda: Use After Free (TASBot glitches t . . .
|
Allan "dwangoAC" Cecil |
20:00 - 21:59 |
Ask the EFF
|
Cooper Quintin,Corynne Mc . . . |
| | |
Saturday |
|
|
09:00 - 09:45 |
Hack the Future: Why Congress and the White House . . .
|
Arati Prabhakar,Austin Ca . . . |
09:30 - 18:59 |
Human Registration Open
|
|
09:30 - 10:15 |
Badge of Shame: Breaking into Secure Facilities wi . . .
|
Dan "AltF4" Petro,David V . . . |
09:00 - 09:20 |
Assessing the Security of Certificates at Scale
|
Andrew Chi,Brandon Enrigh . . . |
09:00 - 09:45 |
Smashing the state machine: the true potential of . . .
|
James "albinowax" Kettle |
09:00 - 01:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
09:30 - 10:15 |
J4 Gate, The Hustler Poker Cheating Scandal invest . . .
|
Scott "Duckie" Melnick |
09:00 - 09:20 |
ELECTRONizing macOS privacy - a new weapon in your . . .
|
Wojciech Reguła |
09:00 - 11:59 |
Merch (formerly swag) Area Open -- README
|
|
10:00 - 10:45 |
Defeating VPN Always-On
|
Maxime Clementz |
10:00 - 17:59 |
Vendor Area Open
|
|
10:30 - 11:15 |
Calling it a 0-Day - Hacking at PBX/UC Systems
|
good_pseudonym |
10:00 - 10:45 |
Demystifying (& Bypassing) macOS's Background Task . . .
|
Patrick Wardle |
10:00 - 17:59 |
Exhibitor Area Open
|
|
10:30 - 11:15 |
Unlocking Doors from Half a Continent Away
|
Sam Haskins,Trevor "t1v0" . . . |
10:00 - 17:59 |
Contest Area Open
|
|
10:00 - 11:45 |
D0 N0 H4RM: A Healthcare Security Conversation
|
Christian "quaddi" Dameff . . . |
11:00 - 11:45 |
Spread spectrum techniques in disposable drones fo . . .
|
David Melendez,Gabriela " . . . |
11:30 - 12:15 |
Physical Attacks Against Smartphones
|
Christopher Wade |
11:00 - 11:45 |
Weaponizing Plain Text: ANSI Escape Sequences as a . . .
|
STÖK |
11:30 - 12:15 |
Apple's Predicament: NSPredicate Exploitation on m . . .
|
Austin Emmitt |
11:30 - 12:15 |
Mass Owning of Seedboxes - A Live Hacking Exhibiti . . .
|
Anon |
12:00 - 12:45 |
From Feature to Weapon: Breaking Microsoft Teams a . . .
|
Nestori Syynimaa |
12:30 - 13:15 |
Video-based Cryptanalysis: Extracting Secret Keys . . .
|
Ben Nassi,Ofek Vayner |
12:00 - 12:45 |
Internet censorship: what governments around the g . . .
|
Christopher Painter,Jeff . . . |
12:30 - 13:15 |
An Audacious Plan to Halt the Internet's Enshittif . . .
|
Cory Doctorow |
12:00 - 13:59 |
Lonely Hackers Club - Resume Reviews & Career Advi . . .
|
|
12:30 - 13:30 |
Metawar
|
Winn |
13:00 - 13:45 |
Azure B2C 0-Day: An Exploit Chain from Public Keys . . .
|
John Novak |
13:30 - 14:15 |
Meduza: How an exiled pirate media outlet breaks t . . .
|
Alex |
13:00 - 13:45 |
Looking into the future, what can we learn about h . . .
|
Nicolas Minvielle,Xavier . . . |
13:30 - 14:15 |
The GitHub Actions Worm: Compromising GitHub repos . . .
|
Asi Greenholts |
14:00 - 14:45 |
Power Corrupts; Corrupt It Back! Hacking Power Man . . .
|
Jesse Chick,Sam Quinn |
14:30 - 15:15 |
Exploiting OPC-UA in Every Possible Way: Practical . . .
|
Noam Moshe,Sharon Brizino . . . |
14:00 - 14:45 |
A SSLippery Slope: Unraveling the Hidden Dangers o . . .
|
Bill Demirkapi |
14:30 - 15:15 |
Contactless Overflow: Code execution in payment te . . .
|
Josep Pi Rodriguez |
14:00 - 16:59 |
Lonely Hackers Club - Badgelife & Sticker Swap
|
|
14:00 - 17:59 |
Off the record war story talks - Signs Ups On Site
|
|
15:00 - 15:45 |
Revolutionizing ELF binary patching with Shiva: A . . .
|
Ryan "ElfMaster" O'Neill |
15:30 - 16:15 |
Breaking BMC: The Forgotten Key to the Kingdom
|
Adam Zabrocki,Alex Teresh . . . |
15:00 - 15:45 |
Spooky authentication at a distance
|
Tamas "SkelSec" Jos |
15:30 - 16:15 |
ndays are also 0days: Can hackers launch 0day RCE . . .
|
Bohan Liu,GuanCheng Li,Zh . . . |
16:30 - 17:15 |
All information looks like noise until you break t . . .
|
David Pekoske,Jen Easterl . . . |
16:00 - 16:20 |
A Broken Marriage: Abusing Mixed Vendor Kerberos S . . .
|
Ceri Coburn |
16:30 - 16:50 |
Your Clocks Have Ears — Timing-Based Browser-Bas . . .
|
Dongsung “Donny” Kim |
16:00 - 16:45 |
Runtime Riddles: Abusing Manipulation Points in th . . .
|
Laurie Kirk |
16:30 - 17:15 |
Abortion Access in the Age of Surveillance
|
Corynne McSherry,Daly Bar . . . |
17:30 - 17:50 |
Lions and Tigers and Fancy Bears, Oh My!: A Cautio . . .
|
Jen Easterly,Scott Shapir . . . |
17:00 - 17:20 |
Silent Spring: Prototype Pollution Leads to Remote . . .
|
Mikhail Shcherbakov,Musar . . . |
17:00 - 17:20 |
Polynonce: An ECDSA Attack and Polynomial Dance
|
Marco Macchetti,Nils Amie . . . |
17:00 - 17:59 |
Lonely Hackers Club - Name That Noob
|
|
| | |
Sunday |
|
|
09:00 - 15:30 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 10:45 |
Vacuum robot security and privacy - prevent your r . . .
|
Dennis Giese |
10:00 - 15:59 |
Vendor Area Open
|
|
10:00 - 13:59 |
Human Registration Open
|
|
10:00 - 10:45 |
StackMoonwalk: A Novel approach to stack spoofing . . .
|
Alessandro "klezVirus" Ma . . . |
10:00 - 10:45 |
Cellular carriers hate this trick: Using SIM tunne . . .
|
Adrian "atrox" Dabrowski, . . . |
10:00 - 13:59 |
Exhibitor Area Open
|
|
10:00 - 10:20 |
Snoop unto them, as they snoop unto us
|
Michaud "5@\/@g3" Savage, . . . |
10:00 - 13:59 |
Contest Area Open
|
|
10:00 - 11:59 |
War Stories Off The Record AMA
|
|
11:00 - 11:45 |
Burrowing Through The Network: Contextualizing The . . .
|
Joe Slowik |
11:00 - 11:45 |
Advanced ROP Framework: Pushing ROP to Its Limits
|
Bramwell Brizendine,Shiva . . . |
11:00 - 11:45 |
The Art of Compromising C2 Servers: A Web Applicat . . .
|
Vangelis Stykas |
11:00 - 11:45 |
Unlocking hidden powers in Xtensa based Qualcomm W . . .
|
Daniel Wegemer |
12:00 - 12:45 |
LLMs at the Forefront: Pioneering the Future of Fu . . .
|
X |
12:00 - 12:45 |
#NoFilter: Abusing Windows Filtering Platform for . . .
|
Ron Ben-Yizhak |
12:00 - 12:45 |
Terminally Owned - 60 years of escaping
|
David Leadbeater |
12:00 - 12:45 |
Retro Exploitation: Using Vintage Computing Platfo . . .
|
Wesley McGrew |
13:00 - 13:45 |
Exploring Linux Memory Manipulation for Stealth an . . .
|
Carlos Polop,Yago Gutierr . . . |
13:00 - 13:45 |
The Price of Convenience: How Security Vulnerabili . . .
|
Omer Attias |
14:00 - 15:15 |
Panel: Hacker Court - Interactive Scenario
|
winn0na |
14:00 - 15:15 |
Contest Closing Ceremonies & Awards
|
|
14:00 - 15:15 |
TETRA tour de force: Jailbreaking digital radios a . . .
|
Carlo Meijer,Jos Wetzels, . . . |
15:30 - 17:30 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:55 |
Vulnerable by Design: Unguard, The Insecure Cloud- . . .
|
Christoph Wedenig,Simon A . . . |
10:00 - 11:55 |
SucoshScanny
|
Mustafa Bilgici,Tibet Ö . . . |
10:00 - 11:55 |
The Metasploit Framework
|
Spencer McIntyre |
10:00 - 11:55 |
T3SF (Technical TableTop Exercises Simulation Fram . . .
|
Federico Pacheco,Joaquin . . . |
10:00 - 11:55 |
Katalina
|
Gabi Cirlig |
10:00 - 11:55 |
Strix Interceptor
|
Lexie Thach |
12:00 - 13:55 |
CNAPPGoat
|
Igal Gofman,Noam Dahan |
12:00 - 13:55 |
Dracon
|
Spyros Gasteratos |
12:00 - 13:55 |
Build Inspector - A modern Javert on the trail of . . .
|
Jeremy Banker |
12:00 - 13:55 |
Ek47 – Payload Encryption with Environmental Key . . .
|
Kevin “Kent” Clark,Sk . . . |
12:00 - 13:55 |
FlowMate
|
Florian Haag,Nicolas Schi . . . |
12:00 - 13:55 |
Shufflecake, AKA Truecrypt on Steroids for Linux
|
Elia Anzuoni,Tommaso "tom . . . |
14:00 - 15:55 |
OWASP crAPI: Completely Ridiculous API
|
Jayesh Ahire,Roshan Piyus . . . |
14:00 - 15:55 |
OpenSSF Scorecard
|
Naveen Srinivasan,Neil Na . . . |
14:00 - 15:55 |
EvilnoVNC: Next-Gen Spear Phishing Attacks
|
Joel Gámez Molina |
14:00 - 15:55 |
Attack Surface Framework
|
Mike Henkelman,Prajwal Pa . . . |
14:00 - 15:55 |
Glyph
|
Corey Hartman |
14:00 - 15:55 |
Vacuum Robot Hacking
|
Dennis Giese |
| | |
Saturday |
|
|
10:00 - 11:55 |
Lambda Looter
|
Doug Kent,Rob Ditmer |
10:00 - 11:55 |
Lupo: Malware IOC Extractor
|
Vishal Thakur |
10:00 - 11:55 |
Veilid
|
Deth Veggie,TC Johnson |
10:00 - 11:55 |
Saturday
|
Joshua Herman |
10:00 - 11:55 |
The Wifydra: Multiheaded RF Panopticon
|
Lozaning |
10:00 - 11:55 |
USBvalve - Expose USB activity on the fly
|
Cesare Pizzi |
12:00 - 13:55 |
BBOT (Bighuge BLS OSINT Tool)
|
Joel "TheTechromancer" Mo . . . |
12:00 - 13:55 |
Abusing Microsoft SQL Server with SQLRecon
|
Sanjiv Kawa |
12:00 - 13:55 |
Red Wizard: user-friendly Red Teaming infrastructu . . .
|
Ben Brücker |
12:00 - 13:55 |
Am I Exploitable? (MI-X)
|
Ofri Ouzan,Yotam Perkal |
12:00 - 13:55 |
Kraken, a modular multi-language webshell for defe . . .
|
Raul Caro |
12:00 - 13:55 |
Pcapinator: Rise of the PCAP Machines
|
Henry Hill,Mike "d4rkm4tt . . . |
14:00 - 15:55 |
ThreatScraper: Automated Threat Intelligence Gathe . . .
|
Aaron "AJ" Morath,Scott G . . . |
14:00 - 15:55 |
RuleProcessorY & Gramify - Rule Optimization & Pas . . .
|
Niels Loozekoot |
14:00 - 15:55 |
HardHat Command & Control Framework
|
Jonathan Owens |
14:00 - 15:55 |
ProjectDiscovery Nuclei
|
Brendan O'Leary,Pj Metz |
14:00 - 15:55 |
ICS Forensics tool
|
Maayan Shaul,Ori Perez |
14:00 - 15:55 |
BLE CTF
|
Alek Amrani,Ryan Holeman |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:50 |
Building the Hacker Talent Pipeline Through Workfo . . .
|
Ashley Sequeira,Ayan Isla . . . |
10:00 - 11:50 |
US Cyber Policy 101
|
Harley Geiger,Lauren Zabi . . . |
12:00 - 12:50 |
The Promise and Perils of Planetary-Scale ISPs
|
J. Scott Christianson |
12:00 - 13:50 |
It's Coming from Inside the House: Next Steps for . . .
|
David Forscey,Emily Paull . . . |
12:00 - 13:50 |
International Cyber Policy 101
|
Adam Dobell,Ari Schwartz, . . . |
13:00 - 13:50 |
Securing the Supply Chain
|
Camille Stewart Gloster,E . . . |
14:00 - 14:50 |
What are your thoughts on AI assisted voice clonin . . .
|
Christine Barker |
14:00 - 14:50 |
Cyber Policy Adrift – Charting a Path Forward fo . . .
|
Blake Benson,Cliff Neve,J . . . |
15:00 - 15:50 |
Blocking Pathways into Cybercrime: Current Efforts . . .
|
Greg Francis,Jonathan Lus . . . |
15:00 - 16:50 |
A global approach to tackling software resilience
|
Allan Friedman,Camille St . . . |
16:00 - 16:50 |
I Am A Former National Cybersecurity Director, Ask . . .
|
Chris Inglis |
17:00 - 17:50 |
Keeping stores safe: how do we better secure apps . . .
|
Charlie Gladstone,David R . . . |
17:00 - 17:50 |
Demystifying Hacking for Government Officials
|
Brad Manuel,Jack Cable,Ja . . . |
| | |
Saturday |
|
|
10:00 - 10:50 |
What “Secure by Design” means for software bre . . .
|
Cassie Crossley,Christoph . . . |
10:00 - 11:50 |
How hackers can work with government, industry, ci . . .
|
Adrien Ogee,David Forscey . . . |
11:00 - 11:50 |
AI Caramba! A DC <> DEF CON interface on machin . . .
|
Austin Carson,Erick Galin . . . |
11:00 - 13:50 |
Secure by Design: Ask the Government Anything and . . .
|
Bob Lord,Cheri Caddy,Jack . . . |
12:00 - 13:50 |
Hands On a Cyber Policy Crisis: Testing Assumption . . .
|
Safa Shahwan Edwards |
12:00 - 12:50 |
The Coming War on Encryption, Part 3 (and how you . . .
|
India McKinney |
13:00 - 13:50 |
Beyond the Breach: Exploring Cybersecurity Policie . . .
|
Andrés Velázquez,Isabel . . . |
14:00 - 14:50 |
Let Night City Sleep - Governance Against a Cyberp . . .
|
Cameron Byrd,Clayton Dixo . . . |
14:00 - 15:50 |
Abating the Eye of Sauron: Help Combat Authoritari . . .
|
David Houston,Michaela Le . . . |
14:00 - 14:50 |
How can we encourage more hackers to engage with p . . .
|
Peter Stephens,Thomas Kra . . . |
15:00 - 15:50 |
Non-State Actors in the Russia/Ukraine Conflict
|
Dan Grobarcik,Marc Rogers . . . |
15:00 - 15:50 |
All Your Vulns are Belong to Terms & Conditions
|
Casey Ellis,David Rogers, . . . |
16:00 - 17:50 |
We're From the Government and We're Here to Help S . . .
|
Anjana Rajan,Brian Behlen . . . |
16:00 - 16:50 |
How do you solve a problem like Mirai - establishi . . .
|
Kat Megas,Peter Stephens |
17:00 - 17:50 |
Navigating the Digital Frontier: Advancing Cyber D . . .
|
Christopher Painter,Harry . . . |
| | |
Sunday |
|
|
10:00 - 10:50 |
Putting Your Money Where Your Cyber Is: A Guided D . . .
|
Andrea Matwyshyn |
11:00 - 11:50 |
Hangover Trivia: Cyber Policy Edition
|
Kurt Opsahl |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
11:00 - 11:59 |
Stories from the Trenches
|
Ben "NahamSec" Sadeghipou . . . |
12:00 - 12:59 |
Red Hot (Red Team TTPs)
|
Ralph May,Steve Borosh |
12:00 - 14:59 |
Build Your Own Cat-Shaped USB Hacking Tool! (with . . .
|
Alex Lynd |
12:00 - 12:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
12:00 - 13:59 |
An Introduction to SAML and its Security
|
Louis Nyffenegger |
12:00 - 12:59 |
IOCs + APTs = "Let's play a game!" - Hack your way . . .
|
Leo Cruz |
12:00 - 13:59 |
Scripting OWASP Amass for a Customized Experience
|
Jeff Foley |
13:00 - 13:59 |
Hunting & Exploiting DLL Sideloads
|
Matthew Nickerson,Nick Sw . . . |
13:00 - 13:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
13:00 - 13:59 |
AI-Driven Hacker's Toolkit: Using AI to Learn Pyth . . .
|
Omar Santos |
14:00 - 14:59 |
Hacking Web Apps and APIs with WebSploit Labs
|
Omar Santos |
14:00 - 15:59 |
Open Source Intelligence (OSINT) for Hackers
|
Lee McWhorter,Sandra Stib . . . |
14:00 - 15:59 |
How to [NOT] look like a Red Team
|
Michael Wylie |
14:00 - 14:59 |
How to prioritize Red Team Findings? Presenting CR . . .
|
Guillermo Buendia |
14:00 - 16:59 |
Kubernetes Offense
|
Michael Mitchell |
15:00 - 15:59 |
Hacking Web Apps and APIs with WebSploit Labs
|
Omar Santos |
15:00 - 15:59 |
Red Hot (Red Team TTPs)
|
Ralph May,Steve Borosh |
15:00 - 15:59 |
SSH Tunneling: Evading Network Detection and Creat . . .
|
Cory Wolff |
16:00 - 16:59 |
Malware Hunting an Offensive Approach
|
Filipi Pires |
16:00 - 16:59 |
Hacking Real Web Areas
|
Ilkin Javadov |
16:00 - 16:59 |
IOCs + APTs = "Let's play a game!" - Hack your way . . .
|
Leo Cruz |
16:00 - 16:59 |
Passwords Argh Us
|
Traveler |
16:00 - 16:59 |
Red Team Labs and Games for Kids
|
|
| | |
Saturday |
|
|
09:00 - 09:59 |
Android Applications and APIs Hacking
|
Gabrielle Botbol |
09:00 - 11:59 |
Build Your Own Cat-Shaped USB Hacking Tool! (with . . .
|
Alex Lynd |
09:00 - 09:59 |
Passwords Argh Us
|
Traveler |
09:00 - 10:59 |
Open Source Intelligence (OSINT) for Hackers
|
Lee McWhorter,Sandra Stib . . . |
09:00 - 09:59 |
Red Team Labs and Games for Kids
|
|
09:00 - 10:59 |
Hacking Meta Quest
|
Paul D. |
10:00 - 10:59 |
Hunting & Exploiting DLL Sideloads
|
Matthew Nickerson,Nick Sw . . . |
10:00 - 10:59 |
Red Hot (Red Team TTPs)
|
Ralph May,Steve Borosh |
10:00 - 10:59 |
Red Team Labs and Games for Kids
|
|
11:00 - 16:59 |
(In)Direct Syscalls: A Journey from High to Low
|
Daniel Feichter |
11:00 - 11:59 |
Passwords Argh Us
|
Traveler |
11:00 - 12:59 |
Artificial Intelligence for Red Team Operations
|
Peter Halberg |
12:00 - 12:59 |
Hacking Web Apps and APIs with WebSploit Labs
|
Omar Santos |
12:00 - 12:59 |
Red Hot (Red Team TTPs)
|
Ralph May,Steve Borosh |
12:00 - 13:59 |
Scripting OWASP Amass for a Customized Experience
|
Jeff Foley |
13:00 - 14:59 |
How to [NOT] look like a Red Team
|
Michael Wylie |
13:00 - 13:59 |
Storfield: A Quiet Methodology to Create Attacks i . . .
|
Cory Wolff |
13:00 - 16:59 |
How Most Internal Networks are Compromised: A Set . . .
|
Scott Brink |
14:00 - 14:59 |
IOCs + APTs = "Let's play a game!" - Hack your way . . .
|
Leo Cruz |
14:00 - 14:59 |
AI-Driven Hacker's Toolkit: Using AI to Learn Pyth . . .
|
Omar Santos |
15:00 - 15:59 |
Red Hot (Red Team TTPs)
|
Ralph May,Steve Borosh |
15:00 - 15:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
15:00 - 15:59 |
Malware Hunting an Offensive Approach
|
Filipi Pires |
16:00 - 16:59 |
How to prioritize Red Team Findings? Presenting CR . . .
|
Guillermo Buendia |
16:00 - 16:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
16:00 - 16:59 |
Hacking Web Apps and APIs with WebSploit Labs
|
Omar Santos |
| | |
Sunday |
|
|
09:00 - 09:59 |
Malware Hunting an Offensive Approach
|
Filipi Pires |
09:00 - 09:59 |
How to prioritize Red Team Findings? Presenting CR . . .
|
Guillermo Buendia |
09:00 - 10:59 |
Artificial Intelligence for Red Team Operations
|
Peter Halberg |
09:00 - 10:59 |
Recon for Red Teamers and Bug Hunters 2.0
|
Jason Haddix |
10:00 - 10:59 |
IOCs + APTs = "Let's play a game!" - Hack your way . . .
|
Leo Cruz |
10:00 - 10:59 |
Passwords Argh Us
|
Traveler |
11:00 - 11:59 |
OSINT Skills Lab Challenge
|
Lee McWhorter,Sandra Stib . . . |
11:00 - 11:59 |
Storfield: A Quiet Methodology to Create Attacks i . . .
|
Cory Wolff |
11:00 - 11:59 |
Hacking Web Apps and APIs with WebSploit Labs
|
Omar Santos |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 11:25 |
A Global Perspective On Election Integrity
|
Bryson Bort,Chris Krebs,K . . . |
10:00 - 10:30 |
Voting Village Opening Remarks
|
Catherine Terranova,Harri . . . |
11:30 - 12:20 |
Top 10 Hacks To Watch Out For From An Election Off . . .
|
John Odum |
11:30 - 11:59 |
VOTEC Corporation
|
John Medcalf |
11:45 - 12:20 |
Surprise Unboxing
|
Harri Hursti |
12:30 - 13:20 |
DISARM Workshop
|
Charles Smith,Dan Meidenb . . . |
12:30 - 13:15 |
Ghost in the (Voting) Machine: Failures in Electio . . .
|
Ashlee Benge |
13:20 - 14:05 |
Divided We Fall
|
Michael Moore |
13:30 - 14:20 |
The Fallacy Of Privacy
|
Antigone Peyton |
14:10 - 14:45 |
Risk Limiting Audits Of All Contests
|
Amanda Glazer |
14:50 - 15:20 |
Understand Your Trust Assumptions!
|
Carsten Schürmann |
14:30 - 15:20 |
Building Partnerships
|
Catherine Terranova,Maia . . . |
15:30 - 16:15 |
What Makes Hackers Extraordinary - It's A Gift!
|
D9 |
15:30 - 16:15 |
RLA Workshop
|
Amanda Glazer |
16:30 - 17:30 |
Election Preparation: 2024
|
Ashlee Benge,Jake Braun,J . . . |
| | |
Saturday |
|
|
10:30 - 12:30 |
First Timers Workshop
|
Tailor Herrarte |
10:30 - 11:25 |
I Can Shop Securely Online So Why Can't I Vote Onl . . .
|
David Jefferson,Harri Hur . . . |
10:00 - 10:30 |
Voting Village Opening Remarks
|
Catherine Terranova,Harri . . . |
11:30 - 12:15 |
Chinese Prototype Review
|
William Baggett |
11:30 - 11:59 |
VOTEC Corporation
|
John Medcalf |
12:30 - 13:20 |
Review: Surprise Unboxing
|
Harri Hursti |
12:55 - 13:40 |
Conflicting Security Reports from Halderman-Spring . . .
|
David Jefferson,Drew Spri . . . |
12:20 - 12:50 |
US private elections: the easy way in for foreign . . .
|
Scheme |
13:55 - 14:35 |
Political Polarization
|
Constantine Nicolaidis |
13:30 - 14:20 |
Interventions To Address Technology-Facilitated Vi . . .
|
Eric Davis,Hallie Stern,O . . . |
14:40 - 15:30 |
Democracy, Are You Citizen Or Subject?
|
Kendall Spencer |
14:30 - 15:20 |
Defense Community
|
Brian Stearns,Charles Smi . . . |
15:35 - 16:15 |
Influencing Voters Through Social Media, ADTECH, B . . .
|
Joe Schniebes |
15:30 - 16:20 |
2024 Election Threat Landscape
|
Catherine Terranova,Halli . . . |
16:30 - 17:30 |
The Impact Of Misinformation On Elections
|
Joe Schniebes,Maia Mazurk . . . |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:00 - 12:59 |
Protecting the AWS ecosystem - Misconfigurations, . . .
|
Rodrigo Montoro |
09:00 - 12:59 |
Applied Emulation - A Practical Approach to Emulat . . .
|
Sean Wilson,Sergei Franko . . . |
09:00 - 12:59 |
Hacking The Metal: An Intro to ARM Assembly Langua . . .
|
Eigentourist |
09:00 - 12:59 |
Pentesting Inductiral Control Systems: OCP-U-HACK . . .
|
Alexandrine Torrents,Arna . . . |
09:00 - 12:59 |
Introduction to Cryptographic Attacks (Pre-Registr . . .
|
Matt Cheung |
14:00 - 17:59 |
DotNet Malware Analysis Masterclass (Pre-Registrat . . .
|
Max 'Libra' Kersten |
14:00 - 17:59 |
These Port Scans are Trash: Improving Nmap by Writ . . .
|
Philip Young "Soldier of . . . |
14:00 - 17:59 |
Analysis 101 for Incident Responders (Pre-Registra . . .
|
Kristy Westphal |
14:00 - 17:59 |
Hide your kids, turn off your Wi-Fi, they Rogue AP . . .
|
Daniel Costantini,James H . . . |
14:00 - 17:59 |
Flipping the Coin: Red and Blue Teaming in Windows . . .
|
Angus "0x10f2c_" Strom,Tr . . . |
| | |
Friday |
|
|
09:00 - 12:59 |
House of Heap Exploitation (Pre-Registration Requi . . .
|
Elizabeth St. Germain,Ken . . . |
09:00 - 12:59 |
Getting into Trouble with Machine Learning Models . . .
|
Robert Koehlmoos |
09:00 - 12:59 |
Android App Hacking - Hacking for Good! (Pre-Regis . . .
|
Kavia Venkatesh,Maria Ure . . . |
09:00 - 12:59 |
Long Live the Empire: A C2 Workshop for Modern Red . . .
|
Dylan "CyberStryke" Butle . . . |
09:00 - 12:59 |
Snakes on a Screen: Taming Offensive IronPython Te . . .
|
Anthony "Coin" Rose,Ganno . . . |
14:00 - 17:59 |
Machine Learning for N00bs (Pre-Registration Requi . . .
|
Elizabeth Biddlecome,Irvi . . . |
14:00 - 17:59 |
How hackers can send feedback directly to policyma . . .
|
Amit Elazari,Harley Geige . . . |
14:00 - 17:59 |
Malware development on secured environment - Write . . .
|
Yoann Dequeker |
14:00 - 17:59 |
Learning to Hack Bluetooth Low Energy with BLE CTF . . .
|
Ryan Holeman |
14:00 - 17:59 |
Advanced WiFi Attacks for Red Team Professionals ( . . .
|
Raúl "r4ulcl" Calvo Laor . . . |
| | |
Saturday |
|
|
09:00 - 12:59 |
Email Detection Engineering and Threat Hunting Inb . . .
|
Alfie Champion,Josh Kamdj . . . |
09:00 - 12:59 |
Active Directory Attacks: The Good, The Bad, and T . . .
|
Aaron Rosenmund,Brandon D . . . |
09:00 - 12:59 |
The Petting Zoo: Breaking into CTFs (Pre-Registrat . . .
|
Christopher Forte,Robert . . . |
09:00 - 12:59 |
Creating and uncovering malicious containers Redux . . .
|
Adrian "threlfall" Wood,D . . . |
09:00 - 12:59 |
BLE Security 201 (Pre-Registration Required)
|
Maxine "Freqy" Filcher,Za . . . |
14:00 - 17:59 |
Introduction to Exploit Development (Pre-Registrat . . .
|
Elizabeth Biddlecome,Irvi . . . |
14:00 - 17:59 |
Hands-On TCP/IP Deep Dive with Wireshark - How thi . . .
|
Chris Greer |
14:00 - 17:59 |
The Joy of Reverse Engineering: Learning With Ghid . . .
|
Wesley McGrew |
14:00 - 17:59 |
Digital Forensics and Incident Response Against th . . .
|
Michael "S3curityNerd" Re . . . |
14:00 - 17:59 |
Starbase: open source graph security analysis (Pre . . .
|
Adam Pierson,Austin Kelle . . . |