| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 17:59 | Hands-on Attack and Breach Simulation exercises | Adversary Village Crew | 
| 10:00 - 17:59 | Adversary simulator and purple teaming hands-on bo . . . | Adversary Village Crew | 
| 10:00 - 17:59 | Adversary-Adventure Table-top Game | Adversary Village Crew | 
| 10:00 - 10:59 | Adversary Village keynote kick-off panel | Abhijith “Abx” B R,Br . . . | 
| 11:30 - 12:30 | Formidable Adversaries: Responding to Breaches, Ra . . . | Abhijith “Abx” B R,Ad . . . | 
| 11:00 - 12:59 | Modifying Impacket for Better OpSec | Ryan O'Donnell | 
| 12:30 - 12:59 | MFT: Malicious Fungible Tokens | Cybelle Oliveira ,Mauro E . . . | 
| 13:00 - 14:59 | Introduction to MITRE Caldera Through Adversary Em . . . | Rachel Murphy,Mark Perry | 
| 15:00 - 16:59 | Hands-on workshop |  | 
| 16:30 - 16:59 | Master Splinter’s initial physical access dojo:  . . . | Daniel Isler | 
| 17:00 - 17:59 | Red Teaming is broken; this panel will fix it. | Suneel Sundar,Niru Ragupa . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:30 | Sneaky Extensions: The MV3 Escape Artists | Vivek Ramachandran,Shoury . . . | 
| 10:30 - 10:59 | Tough Adversary? Don’t Blame Sun Tzu | Gregory Carpenter | 
| 10:00 - 17:59 | Adversary-Adventure Table-top Game | Adversary Village Crew | 
| 10:00 - 17:59 | Hands-on Attack and Breach Simulation exercises | Adversary Village Crew | 
| 10:00 - 17:59 | Adversary simulator and purple teaming hands-on bo . . . | Adversary Village Crew | 
| 10:00 - 10:59 | Adversarial AI: Disrupting Artificial Intelligence . . . | Chloé Messdaghi,Sebastia . . . | 
| 11:00 - 11:30 | Evading Modern Defenses When Phishing with Pixels | Melvin Langvik | 
| 11:00 - 11:59 | Power To The Purple | Tyler Casey,Trey Bilbrey | 
| 12:00 - 13:59 | Hands-on Kubernetes security with KubeHound (purpl . . . | Julien Terriac | 
| 14:00 - 15:59 | CopyCat: An Artist Guide to Adversary Forgery | Cat Self | 
| 16:00 - 17:59 | Cyberjutsu Path to a Digital Martial Art | Alexandre CABROL PERALES, . . . | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 11:59 | Adversary-Adventure Table-top Game | Adversary Village Crew | 
| 10:00 - 11:59 | Hands-on Attack and Breach Simulation exercises | Adversary Village Crew | 
| 10:00 - 11:59 | Correlating slow & stealthy APT traces hiding in t . . . | Ezz Tahoun | 
| 10:00 - 11:59 | Adversary simulator and purple teaming hands-on bo . . . | Adversary Village Crew | 
| 11:30 - 11:59 | Kubernetes Attack Simulation: The Definitive Guide | Leo Tsaousis | 
| 11:00 - 11:30 | Exploiting Voice Cloning in Adversarial Simulation | Mark Foudy | 
| 12:00 - 12:59 | Village closing | Adversary Village Crew | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 17:30 | Fix the Flag Wargame | Harley Wilson | 
| 10:15 - 10:45 | Winning big: AppSec Considerations From the Casino . . . | Aleise McGowan,Tennisha M . . . | 
| 11:00 - 12:59 | Arsenal: AI Goat | Ofir Yakobi,Shir Sadon | 
| 11:00 - 12:59 | Arsenal: CyberChef like Automation within BurpSuit . . . | Matthias Göhring,Florian . . . | 
| 11:00 - 13:59 | Mind-Controlling Other Applications: An intro to i . . . | ILOVEPIE | 
| 11:00 - 11:30 | Securing Frontends at Scale: Paving our Way to the . . . | Aaron Shim,jen-ozmen | 
| 11:45 - 12:15 | Ticking SQLi | Iggy | 
| 11:00 - 12:59 | Activity: Vulnerability Hunt - The Snippets Editio . . . | Mário Leitão-Teixeira | 
| 11:00 - 12:59 | Activity: Spot the Secrets: Finding Secrets Throug . . . | mcdwayne | 
| 11:00 - 12:59 | Activity: Spot the Reachable by Backslash | Czesia Glik,Yossi Pik | 
| 12:30 - 12:59 | Hacking Corporate Banking for Fun and Profit | Charles Waterhouse,Nikhil . . . | 
| 13:00 - 13:59 | Arsenal: GraphQL Armor - Open Source GraphQL Secur . . . | Antoine Carossio,Tristan  . . . | 
| 13:15 - 13:45 | SDLC Nightmares - Defeating Secure Code Review GPT . . . | Wang Zhilong,Xinzhi Luo | 
| 13:00 - 14:59 | Activity: Capture the Container by Chainguard | Jonathan Leitschuh | 
| 13:00 - 14:59 | Q&A With OWASP |  | 
| 13:00 - 14:59 | Activity: Test Your AppSec Knowledge by Deepfactor | Mike Larkin | 
| 14:45 - 15:15 | Threat Modeling in the Age of AI | Adam Shostack | 
| 14:00 - 14:30 | Relative Path File Injection: The Next Evolution i . . . | Ian Hickey | 
| 15:00 - 15:59 | Arsenal: HunterBounter - Swiss Army Knife for Bug  . . . | Utku Yildirim | 
| 15:00 - 15:59 | Arsenal: Introducing RAVEN - Discovering and Analy . . . | Elad Pticha,Oreen Livni | 
| 15:00 - 17:30 | The Open Source Fortress: Finding Vulnerabilities  . . . | iosifache | 
| 15:30 - 15:59 | Fine Grained Authorisation with Relationship-Based . . . | Ben Dechrai | 
| 15:00 - 16:59 | Activity: Spot the Secrets: Finding Secrets Throug . . . | mcdwayne | 
| 15:00 - 16:59 | Activity: Hacking Developers’ Trust – Faking G . . . | Tal Folkman,Ori Ron,Mári . . . | 
| 16:15 - 16:45 | I've got 99 problems but a prompt injection ain't  . . . | Chloé Messdaghi,Kasimir  . . . | 
| 17:00 - 17:30 | When Chatbots Go Rogue – Lessons Learned from Bu . . . | Andra,Javan Rasokat | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 17:30 | Fix the Flag Wargame | Harley Wilson | 
| 10:15 - 10:55 | Navigating the Cyber Security Labyrinth: Choose Yo . . . | punkcoder | 
| 11:00 - 11:59 | Arsenal: SCAGoat | Gaurav Joshi,HK,kvprashan . . . | 
| 11:00 - 13:59 | Application Threat Modeling with Trike | AreTillery | 
| 11:40 - 12:10 | Unlocking the Gates - Understanding Authentication . . . | Vikas Khanna | 
| 11:00 - 11:30 | BOLABuster: Harnessing LLMs for Automating BOLA De . . . | Jay Chen,Ravid Mazon | 
| 11:00 - 12:59 | Activity: Vulnerability Hunt - The Snippets Editio . . . | Mário Leitão-Teixeira | 
| 11:00 - 12:59 | Activity: API Security 101: Testing and Trivia by  . . . | Ankush Jain,Ankita Gupta | 
| 11:00 - 12:59 | Activity: Capture the Container by Chainguard | Jonathan Leitschuh | 
| 12:20 - 12:50 | Maturing Your Application Security Program | SheHacksPurple | 
| 13:00 - 14:30 | Arsenal: SanicDNS | Jasper Insinger | 
| 13:00 - 13:45 | Transforming AppSec: Protecting 'Everything as Cod . . . | Kunal Bhattacharya,Sara A . . . | 
| 13:00 - 14:59 | Activity: Spot the Reachable by Backslash | Czesia Glik,Yossi Pik | 
| 13:00 - 14:59 | Activity: Spot the Secrets: Finding Secrets Throug . . . | mcdwayne | 
| 14:40 - 15:10 | Engineers & Exploits: The Quest for Security | Andra,Spyros Gasteratos | 
| 14:00 - 14:30 | Web2 Meets Web3: Hacking Decentralized Application . . . | Peiyu Wang | 
| 15:00 - 16:59 | Injecting and Detecting Backdoors in Code Completi . . . | Ori Ron,Tal Folkman | 
| 15:20 - 15:50 | Speed Bumps and Speed Hacks: Adventures in Car Man . . . | David Sopas,Paulo A. Silv . . . | 
| 15:00 - 16:59 | Activity: Spot the Reachable by Backslash | Czesia Glik,Yossi Pik | 
| 15:00 - 16:59 | Activity: API Security 101: Testing and Trivia by  . . . | Ankush Jain,Ankita Gupta | 
| 16:40 - 17:10 | 0.0.0.0 Day: Exploiting Localhost APIs From The Br . . . | Avi Lumelsky,Gal Elbaz | 
| 16:00 - 16:30 | The Missing Link - How we collect and leverage SBO . . . | Cassie Crossley | 
| 17:20 - 17:50 | The Dark Side of Bug Bounty | Jason Haddix | 
|  |  |  | 
| Sunday |  |  | 
| 10:45 - 12:59 | Kubernetes Security: Hands-On Attack and Defense | alevsk | 
| 10:00 - 12:59 | Fix the Flag Wargame | Harley Wilson | 
| 10:15 - 10:45 | The Immortal Retrofuturism of Mainframe Computers  . . . | Michelle Eggers | 
| 11:00 - 12:59 | Arsenal: Kubescape - OSS security from left to rig . . . | ben@armosec.io | 
| 11:45 - 12:15 | Your CI/CD Pipeline Is Vulnerable, But It's Not Yo . . . | Elad Pticha,Oreen Livni | 
| 11:00 - 11:30 | Gridlock:  The Dual-Edged Sword of EV and Solar AP . . . | Vangelis Stykas | 
| 11:00 - 12:59 | Activity: Hacking Developers’ Trust – Faking G . . . | Tal Folkman,Ori Ron,Mári . . . | 
| 11:00 - 12:59 | Activity: Threat modelling fun session with OWASP  . . . | Andra | 
| 11:00 - 12:59 | Activity: Threat modelling fun session with OWASP  . . . | Konstantinos Papapanagiot . . . | 
| 12:30 - 12:59 | Using EPSS for Better Vulnerability Management | jgamblin | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 17:59 | Detect a Threat | TSA | 
| 10:00 - 17:59 | Defend the Airport CTF | IntelliGenesis and IG Lab . . . | 
| 10:00 - 17:59 | Darkstar Badge Challenge | Lockheed Martin | 
| 10:00 - 17:59 | CubeSat Simulator | AMSAT | 
| 10:00 - 17:59 | Bricks in the Air |  | 
| 10:00 - 17:59 | ARINC 664 CTF | Boeing | 
| 10:00 - 17:59 | A-ISAC Aviation Cybersecurity Challenge | A-ISAC and Embry-Riddle A . . . | 
| 10:00 - 17:59 | Hack-A-Sat Quals Challenges | Hack-A-Sat,Cromulence | 
| 10:00 - 17:59 | Drone Capture the Flag (CTF) | Dark Wolf | 
| 10:00 - 17:59 | Drone Flying Experience | Dark Wolf | 
| 10:00 - 17:59 | Drone Hacking Activity | Dark Wolf | 
| 10:00 - 17:59 | spacestudio and spacetower challenges | Exotrail,Hack-A-Sat | 
| 10:00 - 17:59 | Space Systems Security CTF – Platform Security | CT Cubed | 
| 10:00 - 17:59 | Drone Hacking Choose Your Own Adventure | Dark Wolf | 
| 10:00 - 17:59 | Space Grand Challenge Luna | CalPoly | 
| 10:00 - 17:59 | Selfie with a CubeSat | CalPoly | 
| 10:00 - 17:59 | Hack-A-Sat Digital Twin | Hack-A-Sat,Cromulence | 
| 10:00 - 17:59 | PTP Flight Challenge | Pen Test Partners | 
| 10:30 - 12:30 | Building the Ultimate Budget-Friendly Low Earth Or . . . | Victor Fernandez Minguill . . . | 
| 11:00 - 11:30 | An adversarial approach to Airline Revenue Managem . . . | Craig Lester | 
| 11:30 - 11:59 | Aviation cybersecurity lightning talk: Three topic . . . | Ken Munro | 
| 13:00 - 14:59 | BYOS – Bring Your Own Satellite | Tim Fowler | 
| 15:30 - 17:30 | Space Pirate Simulator | Michael Butler,Jacob Oakl . . . | 
| 15:30 - 15:59 | Ground Control to Major Threat - Hacking the Space . . . | Andrzej Olchawa | 
| 16:00 - 16:30 | Analyzing the Security of Satellite-Based Air Traf . . . | Martin Strohmeier | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 17:59 | spacestudio and spacetower challenges | Exotrail,Hack-A-Sat | 
| 10:00 - 17:59 | Drone Hacking Activity | Dark Wolf | 
| 10:00 - 17:59 | Hack-A-Sat Quals Challenges | Hack-A-Sat,Cromulence | 
| 10:00 - 17:59 | Detect a Threat | TSA | 
| 10:00 - 17:59 | PTP Flight Challenge | Pen Test Partners | 
| 10:00 - 17:59 | Selfie with a CubeSat | CalPoly | 
| 10:00 - 17:59 | Hack-A-Sat Digital Twin | Hack-A-Sat,Cromulence | 
| 10:00 - 17:59 | Space Grand Challenge Luna | CalPoly | 
| 10:00 - 17:59 | Drone Capture the Flag (CTF) | Dark Wolf | 
| 10:00 - 17:59 | Drone Hacking Choose Your Own Adventure | Dark Wolf | 
| 10:00 - 17:59 | Space Systems Security CTF – Platform Security | CT Cubed | 
| 10:00 - 17:59 | Drone Flying Experience | Dark Wolf | 
| 10:00 - 17:59 | Defend the Airport CTF | IntelliGenesis and IG Lab . . . | 
| 10:00 - 17:59 | Darkstar Badge Challenge | Lockheed Martin | 
| 10:00 - 17:59 | CubeSat Simulator | AMSAT | 
| 10:00 - 17:59 | Bricks in the Air |  | 
| 10:00 - 17:59 | ARINC 664 CTF | Boeing | 
| 10:00 - 17:59 | A-ISAC Aviation Cybersecurity Challenge | A-ISAC and Embry-Riddle A . . . | 
| 10:30 - 11:30 | Introduction to Drone Security | Hahna Kane Latonick | 
| 12:00 - 12:59 | Secure the Skies: A Modern Android Security Resear . . . | Jonathan Waterman | 
| 12:30 - 12:59 | GPS spoofing: it's about time, not just position | Ken Munro | 
| 13:30 - 14:30 | Open Source Drone Hacking Simulator | Nick Aleks,Rudy Mendoza | 
| 13:00 - 13:30 | Fly Catcher - How I Developed a Low-Cost Raspberry . . . | Angelina Tsuboi | 
| 13:30 - 13:59 | Small Satellite Modeling and Defender Software | Kyle Murbach | 
| 14:15 - 14:59 | RF Attacks on Aviation's Last Line of Defense Agai . . . | Giacomo Longo,Vincent Len . . . | 
| 16:00 - 16:59 | Choose your own adventure: Has your fleet been hac . . . | Ken Munro | 
| 16:30 - 16:59 | Offensive Security Testing: Safeguarding the Final . . . | Andrzej Olchawa | 
| 17:00 - 17:30 | From Theory to Reality: Demonstrating the Simplici . . . | Randi Tinney | 
| 17:30 - 17:59 | A dive into world of Aircraft PKI | Matt Gaffney | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 12:59 | Hack-A-Sat Quals Challenges | Hack-A-Sat,Cromulence | 
| 10:00 - 12:59 | Drone Hacking Activity | Dark Wolf | 
| 10:00 - 12:59 | spacestudio and spacetower challenges | Exotrail,Hack-A-Sat | 
| 10:00 - 12:59 | Drone Flying Experience | Dark Wolf | 
| 10:00 - 12:59 | Space Systems Security CTF – Platform Security | CT Cubed | 
| 10:00 - 12:59 | Drone Hacking Choose Your Own Adventure | Dark Wolf | 
| 10:00 - 12:59 | Space Grand Challenge Luna | CalPoly | 
| 10:00 - 12:59 | Selfie with a CubeSat | CalPoly | 
| 10:00 - 12:59 | Hack-A-Sat Digital Twin | Hack-A-Sat,Cromulence | 
| 10:00 - 12:59 | PTP Flight Challenge | Pen Test Partners | 
| 10:00 - 12:59 | Drone Capture the Flag (CTF) | Dark Wolf | 
| 10:00 - 12:59 | Detect a Threat | TSA | 
| 10:00 - 12:59 | Defend the Airport CTF | IntelliGenesis and IG Lab . . . | 
| 10:00 - 12:59 | Darkstar Badge Challenge | Lockheed Martin | 
| 10:00 - 12:59 | CubeSat Simulator | AMSAT | 
| 10:00 - 12:59 | Bricks in the Air |  | 
| 10:00 - 12:59 | ARINC 664 CTF | Boeing | 
| 10:00 - 12:59 | A-ISAC Aviation Cybersecurity Challenge | A-ISAC and Embry-Riddle A . . . | 
| 10:00 - 10:59 | How to Corrupt Youth to Cyber Focused Space Scienc . . . | RC Jones | 
| 11:00 - 12:59 | Watch The Skies: Build Your Own ADS-B receiver | Jim "Gurney" Ross | 
| 11:30 - 11:59 | Warflying in a Cessna | Matt Thomassen,Sean McKee . . . | 
| 12:00 - 12:30 | The Interplay between Safety and Security in Aviat . . . | Lillian Ash Baker | 
| 12:30 - 12:59 | Behind the Badge: How we used and abused hardware  . . . | Adam Batori,Robert Paffor . . . | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 11:30 | Building a Cyber Threat Intelligence Program from  . . . | Apurv Singh Gautam,Karan  . . . | 
| 10:00 - 10:30 | Incident Response 101: Part 1 (IR Overview, Lifecy . . . | Jason Romero | 
| 10:30 - 10:59 | Incident Response 101: Part 2 (Analyst Mindset and . . . | David "CountZ3r0" Roman | 
| 11:45 - 13:30 | Adventures in Android Triage Collection | Omenscan | 
| 11:15 - 12:15 | Cloud Native Security Platform for Defenders | Dafinga | 
| 12:30 - 13:30 | Stealer Logs: Automation, Analysis, & Espionage in . . . | Eric Clay,Nick Ascoli | 
| 14:00 - 15:59 | Area DC32: An Interactive Tabletop Takes Flight (A . . . | Aakin Patel,Caspian Kilke . . . | 
| 14:30 - 15:30 | BTV Conversations: Exploring the Cyberpsychology o . . . | Todd Fletcher | 
| 15:30 - 16:30 | BTV Conversations: Touch Grass to Combat Burnout | CtrlAltFu | 
| 17:00 - 17:59 | CTI is Dead, Long Live CTI: Reassessing Blue Team' . . . | Aurora Johnson,Ben Goerz, . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 11:59 | Securing the Cloud with Cloud Threat Intelligence  . . . | Natalie Simpson,Nivedita  . . . | 
| 10:00 - 10:30 | Obsidian: Forensics 101 Part 1 | Sarthak Taneja | 
| 10:30 - 10:59 | Obsidian: Forensics 101 Part 2 | Sarthak Taneja | 
| 11:15 - 12:15 | Use opensource AI to map alerts & logs into techni . . . | Ezz Tahoun | 
| 12:30 - 13:30 | Introduction to Creating Osquery Extensions: Enhan . . . | Kivanc Aydin | 
| 12:30 - 13:30 | From CTI to Creating Campaigns | Noah Lazzaro | 
| 14:00 - 14:59 | Store bought is fine, sometimes! | Jason Craig,Lauren Proehl . . . | 
| 15:00 - 15:59 | Hot SOC Topics for 2024: Feel the Spice! | Carson Zimmerman,Russ McR . . . | 
| 16:00 - 16:59 | Thrunting or DEATH! (A BTV Panel) | Joe Slowik,Randy Pargman, . . . | 
| 17:00 - 17:59 | Under the Hood: Incident Response at High Speed (A . . . | Angelo Violetti,David Zit . . . | 
|  |  |  | 
| Sunday |  |  | 
| 10:30 - 11:59 | Blue Team Careers: Do what you love, get paid for  . . . | Cyb0rg42,Dani,Shea Nangle . . . | 
| 12:00 - 12:30 | Blue Team Village Closing Ceremonies |  | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:30 - 11:15 | Spies and Bytes: Victory in the Digital Age | General Paul M. Nakasone | 
| 10:00 - 10:20 | Welcome to DEF CON | Jeff "The Dark Tangent" M . . . | 
| 10:00 - 10:45 | Mobile Mesh RF Network Exploitation: Getting the T . . . | Erwin Karincic,Woody | 
| 10:00 - 10:45 | Where’s the Money: Defeating ATM Disk Encryption | Matt Burch | 
| 10:30 - 11:15 | Defeating magic by magic:Using ALPC security fea . . . | WangJunJie Zhang,YiSheng  . . . | 
| 10:00 - 10:20 | Securing CCTV Cameras Against Blind Spots | Jacob Shams | 
| 10:00 - 10:45 | Behind Enemy Lines: Going undercover to breach the . . . | Jon DiMaggio | 
| 11:30 - 11:59 | Atomic Honeypot: A MySQL Honeypot That Drops Shell . . . | Alexander Rubin,Martin Ra . . . | 
| 11:30 - 12:15 | Listen to the whispers: web timing attacks that ac . . . | James "albinowax" Kettle | 
| 11:00 - 11:20 | No Symbols When Reversing? No Problem: Bring Your  . . . | Max "Libra" Kersten | 
| 11:30 - 12:45 | High Intensity Deconstruction: Chronicles of a Cry . . . | Babak Javadi,Aaron Levy,N . . . | 
| 11:30 - 12:30 | Custom, cheap, easy, and safe badges - without sta . . . | Joe "securelyfitz" FitzPa . . . | 
| 11:00 - 11:45 | The XZ Backdoor Story: The Undercover Operation Th . . . | Thomas Roccia | 
| 12:00 - 12:45 | Fireside Chat with DNSA Anne Neuberger | Anne Neuberger,Jeff "The  . . . | 
| 12:00 - 12:45 | On Your Ocean's 11 Team, I'm the AI Guy (technical . . . | Harriet Farlow | 
| 12:30 - 13:15 | Kicking in the Door to the Cloud: Exploiting Cloud . . . | Nick Frichette | 
| 12:00 - 13:15 | Veilid Dev and Community Meetup | The_Gibson | 
| 13:00 - 13:45 | If Existing Cyber Vulnerabilities Magically Disapp . . . | Dr. Stefanie Tompkins,Dr. . . . | 
| 13:00 - 13:45 | Sshamble: Unexpected Exposures in the Secure Shell | HD Moore,Rob King | 
| 13:30 - 14:15 | Digital Emblems: When markings are required under  . . . | Bill Woodcock | 
| 13:00 - 13:45 | Defeating EDR Evading Malware with Memory Forensic . . . | Andrew Case,Austin Seller . . . | 
| 13:30 - 14:15 | Xiaomi The Money - Our Toronto Pwn2Own Exploit and . . . | Ken Gannon,Ilyes Beghdadi | 
| 14:00 - 14:45 | DEF CON Unplugged: Cocktails & Cyber with Jeff & J . . . | Jen Easterly | 
| 14:00 - 14:45 | Optical Espionage: Using Lasers to Hear Keystrokes . . . | samy kamkar | 
| 14:30 - 15:15 | Breaching AWS Accounts Through Shadow Resources | Yakir Kadkoda,Michael Kat . . . | 
| 14:00 - 14:45 | The Way To Android Root: Exploiting Your GPU On Sm . . . | Xiling Gong,Eugene Rodion . . . | 
| 14:30 - 15:15 | Joe and Bruno's Guide to Hacking Time: Regeneratin . . . | Joe "Kingpin" Grand,Bruno . . . | 
| 15:00 - 15:59 | DC101 Panel | Nikita Kronenberg,Drew "a . . . | 
| 15:00 - 15:45 | Abusing Windows Hello Without a Severed Hand | Ceri Coburn,Dirk-jan Moll . . . | 
| 15:30 - 16:15 | Taming the Beast: Inside the Llama 3 Red Team Proc . . . | Aaron "dyn" Grattafiori,I . . . | 
| 15:00 - 15:45 | Android App Usage and Cell Tower Location: Private . . . | Ryan Johnson | 
| 15:30 - 16:15 | Social Engineering Like you’re Picard | Jayson E. Street | 
| 16:00 - 16:59 | Making the DEF CON 32 Badge | Mar Williams | 
| 16:00 - 16:45 | Eradicating Hepatitis C With BioTerrorism | Mixæl Swan Laufer | 
| 16:30 - 17:15 | Leveraging private APNs for mobile network traffic . . . | Aapo Oksman | 
| 16:00 - 16:45 | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE . . . | Michael Gorelik ,Arnold O . . . | 
| 16:30 - 17:15 | Why are you still, using my server for your intern . . . | Thomas Boejstrup Johansen | 
| 17:00 - 17:45 | Bricked & Abandoned: How To Keep The IoT From Beco . . . | Paul Roberts,Chris Wysopa . . . | 
| 17:00 - 17:45 | One for all and all for WHAD: wireless shenanigans . . . | Damien Cauquil,Romain Cay . . . | 
| 17:30 - 18:15 | Exploiting Bluetooth - from your car to the bank a . . . | Vladyslav Zubkov,Martin S . . . | 
| 17:00 - 17:45 | Breaking Secure Web Gateways (SWG) for Fun and Pro . . . | Vivek Ramachandran,Jeswin . . . | 
| 17:30 - 17:50 | Stranger in a Changed Land | Tony Sager | 
| 18:00 - 18:20 | DEF CON Franklin Project | Jacob H Braun | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:45 | The Pwnie Awards |  | 
| 10:30 - 11:15 | Gotta Cache ‘em all: bending the rules of web ca . . . | Martin Doyhenard | 
| 10:00 - 10:20 | Laundering Money | Michael Orlitzky | 
| 10:00 - 10:20 | Mutual authentication is optional | Xavier Zhang | 
| 10:30 - 11:15 | Smishing Smackdown: Unraveling the Threads of USPS . . . | S1nn3r | 
| 10:00 - 10:45 | Reverse Engineering MicroPython Frozen Modules: Da . . . | Wesley McGrew | 
| 10:00 - 11:45 | CULT OF THE DEAD COW & Friends Present: Prime Cuts . . . | Deth Veggie,Walter J. Sch . . . | 
| 11:00 - 11:45 | The Rise and Fall of Binary Exploitation | Stephen Sims | 
| 11:30 - 12:15 | QuickShell: Sharing is caring about an RCE attack  . . . | Or Yair,Shmuel Cohen | 
| 11:30 - 12:15 | Sudos and Sudon’ts - Peering inside Sudo for Win . . . | Michael "mtu" Torres | 
| 11:00 - 11:45 | SHIM me what you got - Manipulating Shim and Offic . . . | Ron Ben-Yizhak,David Shan . . . | 
| 12:00 - 12:45 | Disenshittify or die! How hackers can seize the me . . . | Cory Doctorow | 
| 12:30 - 13:15 | The Secret Life of a Rogue Device - Lost IT Assets . . . | Matthew "mandatory" Bryan . . . | 
| 12:30 - 13:15 | AMD Sinkclose: Universal Ring -2 Privilege Escalat . . . | Enrique Nissim,Krzysztof  . . . | 
| 12:00 - 12:45 | Grand Theft Actions: Abusing Self-Hosted GitHub Ru . . . | Adnan Khan,John Stawinski | 
| 12:00 - 12:59 | The wild and wonderful world of early Microprocess . . . | Michael Brown | 
| 12:00 - 12:45 | automobiles, alcohol, blood, sweat, and creative r . . . | atlas | 
| 13:00 - 13:45 | Fireside Chat with Jay Healey and National Cyber D . . . | Harry Coker Jr.,Jay Heale . . . | 
| 13:30 - 14:15 | NTLM - The Last Ride | Jim Rush,Tomais Williamso . . . | 
| 13:30 - 14:15 | Behind Enemy Lines: Engaging and Disrupting Ransom . . . | Vangelis Stykas | 
| 13:00 - 13:45 | OH-MY-DC: Abusing OIDC all the way to your cloud | Aviad Hahami | 
| 13:00 - 13:59 | All Your Keyboards Are Belong to US! | Federico Lucifredi | 
| 13:00 - 14:59 | Learn Zero Trust Network Security with Cloudflare |  | 
| 13:00 - 13:45 | Inside the FBI’s Secret Encrypted Phone Company  . . . | Joseph Cox | 
| 14:00 - 14:45 | SQL Injection Isn't Dead: Smuggling Queries at the . . . | Paul Gerste | 
| 14:30 - 15:15 | Troll Trapping Through TAS Tools - Exposing Speedr . . . | Allan "dwangoAC" Cecil | 
| 14:30 - 15:15 | ACE up the Sleeve: From getting JTAG on the iPhone . . . | Thomas "stacksmashing" Ro . . . | 
| 14:00 - 14:45 | Discovering and exploiting local attacks against t . . . | Jeffrey Hofmann,Colby Mor . . . | 
| 14:00 - 14:45 | Hacking Millions of Modems (and Investigating Who  . . . | Sam Curry | 
| 15:00 - 15:45 | Exploiting the Unexploitable: Insights from the Ki . . . | Mikhail Shcherbakov | 
| 15:30 - 16:15 | HookChain: A new perspective for Bypassing EDR Sol . . . | Helvio Carvalho Junior | 
| 15:30 - 16:15 | Unsaflok: Hacking millions of hotel locks | Lennert Wouters,Ian Carro . . . | 
| 15:00 - 15:45 | Measuring the Tor Network | Silvia Puglisi,Roger Ding . . . | 
| 15:00 - 15:59 | Real life hacking stories (that can’t be recorde . . . |  | 
| 15:00 - 15:45 | A Shadow Librarian in Broad Daylight: Fighting bac . . . | Daniel Messer | 
| 16:30 - 17:15 | Watchers being watched: Exploiting the Surveillanc . . . | Chanin Kim,Myeonghun Pak, . . . | 
| 16:00 - 16:20 | Compromising an Electronic Logging Device and Crea . . . | Jake Jepson,Rik Chatterje . . . | 
| 16:30 - 17:15 | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF . . . | Yan "Zardus" Shoshitaishv . . . | 
| 16:30 - 17:15 | Breaking the Beam: Exploiting VSAT Satellite Modem . . . | Vincent Lenders,Johannes  . . . | 
| 16:00 - 16:45 | Secrets and Shadows: Leveraging Big Data for Vulne . . . | Bill Demirkapi | 
| 16:00 - 16:45 | Encrypted newspaper ads in the 19th century - The  . . . | Elonka Dunin,Klaus Schmeh | 
| 17:30 - 18:15 | Iconv, set the charset to RCE: exploiting the glib . . . | Charles "cfreal" Fol | 
| 17:00 - 17:20 | Techniques for Creating Process Injection Attacks  . . . | Bramwell Brizendine,Shiva . . . | 
| 17:30 - 18:15 | Nano-Enigma: Uncovering the Secrets Within eFuse M . . . | Michal Grygarek,Martin Pe . . . | 
| 17:00 - 17:59 | Quantum Leap: The future of Computing and the secu . . . |  | 
| 17:00 - 17:45 | A Treasure Trove of Failures: What History’s Gre . . . | Pete Stegemeyer | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 10:45 | Splitting the email atom: exploiting parsers to by . . . | Gareth Heyes | 
| 10:00 - 10:45 | AWS CloudQuarry: Digging for secrets in public AMI . . . | Eduard Agavriloae,Matei J . . . | 
| 10:00 - 10:45 | Windows Downdate: Downgrade Attacks Using Windows  . . . | Alon Leviev | 
| 10:00 - 10:20 | Unlocking the Gates: Hacking a secure Industrial R . . . | Moritz Abrell | 
| 10:30 - 11:15 | Changing Global Threat Landscape with Rob Joyce an . . . | Rob Joyce,Jeff "The Dark  . . . | 
| 10:00 - 10:59 | Taking off the blindfold: Detecting persistent thr . . . | Gastón Aznarez,Octavio G . . . | 
| 10:00 - 10:45 | The not-so-silent type: Breaking network crypto in . . . | Jeffrey Knockel,Mona Wang | 
| 11:00 - 11:45 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfu . . . | Daniel Bohannon,Sabajete  . . . | 
| 11:00 - 11:45 | The hack, the crash and two smoking barrels. (And  . . . | Thomas "Cr0wTom" Sermpini . . . | 
| 11:00 - 11:45 | Dragon SlayingGuide: Bug Hunting In VMware Device  . . . | JiaQing Huang,Hao Zheng,Y . . . | 
| 11:30 - 12:15 | Open sesame - or how vulnerable is your stuff in e . . . | Dennis Giese,Braelynn | 
| 11:00 - 11:45 | Deception & Counter Deception – Defending Yourse . . . | Tom "Decius" Cross,Greg C . . . | 
| 12:00 - 12:45 | DriverJack: Turning NTFS and Emulated Read-only Fi . . . | Alessandro Magnosi | 
| 12:30 - 13:15 | Redefining V2G - How to use your vehicle as a game . . . | Timm Lauser,Jannis Hambor . . . | 
| 12:30 - 13:15 | AIxCC Closing Ceremonies | Andrew Carney,Perri Adams | 
| 12:00 - 12:20 | Solving the "Lover, Stalker, Killer" Murder with s . . . | Anthony Kava | 
| 12:30 - 13:15 | Clash, Burn, and Exploit: Manipulate Filters to Pw . . . | Kuan-Ting "HexRabbit" Che . . . | 
| 13:00 - 13:45 | Your AI Assistant has a Big Mouth: A New Side-Chan . . . | Yisroel Mirsky,Roy Weiss, . . . | 
| 13:30 - 14:15 | Incubated Machine Learning Exploits: Backdooring M . . . | Suha Sabi Hussain | 
| 13:30 - 14:45 | Contest Closing Ceremonies and Awards |  | 
| 13:30 - 14:15 | Bringing Down North Korea | Alejandro Caceres | 
| 14:00 - 14:45 | Abusing legacy railroad signaling systems | David Meléndez,Gabriela  . . . | 
| 15:00 - 17:45 | DEF CON Closing Ceremonies & Awards | Jeff "The Dark Tangent" M . . . | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 10:00 - 11:45 | Docker Exploitation Framework | Emmanuel Law,Rohit Pitke | 
| 10:00 - 11:45 | Zip It Up, Sneak It In - Introduction of apkInspec . . . | Kaloyan Velikov,Leonidas  . . . | 
| 10:00 - 11:45 | Volatile Vault - Data Exfiltration in 2024 | Moritz Laurin Thomas,Patr . . . | 
| 10:00 - 11:45 | Bluetooth Landscape Exploration & Enumeration Plat . . . | Paul Wortman | 
| 10:00 - 11:45 | Nebula - 3 Years of Kicking *aaS and Taking Userna . . . | Bleon Proko | 
| 10:00 - 11:45 | Cloud Offensive Breach and Risk Assessment (COBRA) | Anand Tiwari,Harsha Koush . . . | 
| 12:00 - 13:45 | distribRuted - Distributed Attack Framework | Ismail Melih Tas,Numan Oz . . . | 
| 12:00 - 13:45 | BypassIT - Using AutoIT & Similar Tools for Covert . . . | Ezra Woods,Mike Manrod | 
| 12:00 - 13:45 | Tengu Marauder | Leonardo Serrano,Lexie Th . . . | 
| 12:00 - 13:45 | Skynet | Craig Chamberlain,Rewanth . . . | 
| 12:00 - 13:45 | The World Wide Paraweb | Nathan Sidles | 
| 12:00 - 13:45 | Serberus | Patrick Kiley | 
| 14:00 - 15:45 | Automated Control Validation with Tommyknocker | Jeremy Banker | 
| 14:00 - 15:45 | HIDe & SEEK | Jonathan Fischer,Matthew  . . . | 
| 14:00 - 15:45 | SCAGoat - Exploiting Damn Vulnerable SCA Applicati . . . | Hare Krishna Rai,Prashant . . . | 
| 14:00 - 15:45 | Garak | Erick Galinkin,Leon Dercz . . . | 
| 14:00 - 15:45 | XenoboxX - Hardware Sandbox Toolkit | Cesare Pizzi | 
| 14:00 - 15:45 | Hopper - Distributed Fuzzer | Luciano Remes,Wade Cappa | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 11:45 | Maestro | Chris Thompson | 
| 10:00 - 11:45 | Tempest | Kirk Trychel | 
| 10:00 - 11:45 | 5Ghoul Framework - 5G NR Attacks & 5G OTA Fuzzing | Matheus Eduardo Garbelini . . . | 
| 10:00 - 11:45 | Testbed Virtual Factory | Borja Pintos Castro,Camil . . . | 
| 10:00 - 11:45 | Cyber Security Transformation Chef (CSTC) | Florian Haag,Matthias Gö . . . | 
| 10:00 - 11:45 | MITRE Caldera | Mark Perry,Rachel Murphy | 
| 12:00 - 13:45 | Open Hardware Design for BusKill Cord | Melanie Allen | 
| 12:00 - 13:45 | The Metasploit Framework v6.4 | Jack Heysel,Spencer McInt . . . | 
| 12:00 - 13:45 | CODASM - Hiding Payloads in Plain .text | Moritz Laurin Thomas | 
| 12:00 - 13:45 | GC2 - The First Serverless Command & Control | Lorenzo Grazian | 
| 12:00 - 13:45 | MPT - Pentest in Action | Jyoti Raval | 
| 12:00 - 13:45 | FACTION | Josh Summitt | 
| 14:00 - 15:45 | MITRE Caldera for OT | Blaine Jeffries,Devon Col . . . | 
| 14:00 - 15:45 | Vovk - Advanced YARA Rule Generator v2.0 | Benjamyn Whiteman,Vishal  . . . | 
| 14:00 - 15:45 | TheAllCommander 2.0 | Matthew Handy | 
| 14:00 - 15:45 | Drop-Pi | Doug Kent,Robert Ditmer | 
| 14:00 - 15:45 | Moriarty | Anthony “Coin” Rose,J . . . | 
| 14:00 - 15:45 | Farming Ndays with GreyNoise | Andrew Morris | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Wednesday |  |  | 
| 00:00 - 00:59 | Important Message |  | 
| 11:00 - 11:59 | The Unofficial DEF CON Shoot |  | 
| 17:00 - 05:59 | Linecon |  | 
|  |  |  | 
| Thursday |  |  | 
| 05:00 - 07:59 | Defcon.run |  | 
| 07:00 - 01:59 | Lost & Found |  | 
| 08:00 - 19:59 | Human Registration Open |  | 
| 08:00 - 17:59 | Merch (formerly swag) Area Open -- README |  | 
| 15:00 - 20:59 | Toxic BBQ |  | 
|  |  |  | 
| Friday |  |  | 
| 05:00 - 07:59 | Defcon.run |  | 
| 06:00 - 06:59 | CycleOverride DEF CON Bike Ride |  | 
| 08:00 - 19:59 | Human Registration Open |  | 
| 08:00 - 17:59 | Merch (formerly swag) Area Open -- README |  | 
| 08:00 - 01:59 | Lost & Found |  | 
| 08:15 - 10:30 | ️ISSCON |  | 
| 10:00 - 17:59 | Vendors and Exhibitors Open |  | 
| 10:00 - 17:59 | All content areas generally open |  | 
| 10:00 - 17:59 | Hard Hat Brigade - Community Space Open |  | 
| 10:00 - 17:59 | Hardware Hacking and Soldering Skills Village Open . . . |  | 
| 10:00 - 17:59 | Robo Sumo |  | 
| 10:00 - 17:59 | HHV Rube Goldberg Machine |  | 
| 10:00 - 17:59 | WISP Community & Inclusion Room |  | 
| 10:00 - 10:59 | Welcome / Badge & Swag Pick Up |  | 
| 10:00 - 17:59 | Game Hacking Community Activities & CTF |  | 
| 10:00 - 17:59 | Shell On Demand Appliance Machine (S.O.D.A. Machin . . . |  | 
| 10:00 - 15:59 | Retro Repair |  | 
| 10:00 - 15:59 | Dumb Terminal fun |  | 
| 10:00 - 15:59 | Small scale LAN party |  | 
| 10:00 - 15:59 | Show & Tell |  | 
| 10:00 - 17:59 | LHC Meshtastic Activities and CTF |  | 
| 10:00 - 17:59 | Egor's Keyboard Corner |  | 
| 10:00 - 12:59 | Resume Reviews |  | 
| 10:00 - 17:59 | Lonely Hackers Club Community Room Open |  | 
| 10:00 - 17:59 | LHC's Unofficial Sticker Swap Table |  | 
| 10:00 - 10:59 | Be Latino in Cybersecurity on markets outside LATA . . . | Salvador Mendonza,Lenin A . . . | 
| 10:00 - 17:59 | Open Events for DCNextGen |  | 
| 11:00 - 11:59 | Intro to Circuit Python (Badge class level 1) |  | 
| 11:30 - 17:30 | Book Signings |  | 
| 11:00 - 11:59 | Prendendo Fraudadores utilizando Técnicas de Red  . . . | Gustavo Roberto | 
| 12:00 - 12:45 | Bridging the Gap: How the American Legion Provides . . . | Chris Davis | 
| 12:00 - 12:30 | SQLi to Root Access: Exploiting a ISP infrastructu . . . | Ignacio Daniel Navarro | 
| 12:30 - 13:30 | Mexicans Together - Un vistazo a recientes investi . . . | Ashley Hiram M.,Isabel Ma . . . | 
| 13:00 - 13:45 | No CTF? No Problem! Leveraging Alternate Reality G . . . | John "2PAC" Smithberger | 
| 13:30 - 13:59 | De Escudo a Espada: Cómo un Antivirus Facilitó e . . . | R4v3n Bl4ck | 
| 14:00 - 14:59 | Hard Hat Brigade Maker Panel |  | 
| 14:00 - 15:59 | Friendship Bracelet Making |  | 
| 14:00 - 14:59 | Hack the Badge (Badge class level 2) |  | 
| 14:00 - 17:59 | Resume Reviews |  | 
| 14:00 - 14:45 | Book Signing: Visual Threat Intelligence: An Illus . . . | Thomas Roccia | 
| 14:00 - 14:59 | Amenaza persistente: UXHIL y la propagación de UR . . . | Jesika Juarez,Armando Agu . . . | 
| 15:00 - 17:59 | C2Society / DC702 Intro to CTFs |  | 
| 15:00 - 15:45 | Generative AI vs Crusty NCO | Col Travis Hartman | 
| 15:00 - 15:59 | Removing OPSEC from Cyber Predators and Threat Act . . . | Thiago Bordini | 
| 16:30 - 17:30 | So you wanna know how to make badges | c0ldbru | 
| 16:00 - 17:59 | Name the Noob |  | 
| 16:00 - 16:30 | Structural Insights: PDF Analysis for Detecting an . . . | Filipi Pires | 
| 16:30 - 16:59 | Chatbots for Cybersecurity | Lenin Alevski | 
| 17:00 - 17:59 | Cybersecurity Overview over LATAM-  Skills, Challe . . . | Leonardo Pigñer,Katherin . . . | 
| 17:30 - 21:30 | Ask the EFF |  | 
| 20:00 - 23:59 | DEF CON Movie Night |  | 
| 21:00 - 01:59 | Capitol Technology University (CTU) |  | 
|  |  |  | 
| Saturday |  |  | 
| 05:00 - 07:59 | Defcon.run |  | 
| 08:00 - 18:59 | Human Registration Open |  | 
| 08:00 - 01:59 | Lost & Found |  | 
| 09:00 - 14:59 | Merch (formerly swag) Area Open -- README |  | 
| 10:00 - 17:59 | All content areas generally open |  | 
| 10:00 - 17:59 | Vendors and Exhibitors Open |  | 
| 10:00 - 17:59 | Hard Hat Brigade - Community Space Open |  | 
| 10:00 - 17:59 | HHV Rube Goldberg Machine |  | 
| 10:00 - 17:59 | Robo Sumo |  | 
| 10:00 - 17:59 | Hardware Hacking and Soldering Skills Village Open . . . |  | 
| 10:00 - 17:59 | WISP Community & Inclusion Room |  | 
| 10:00 - 10:59 | Intro to Circuit Python (Badge class level 1) (Ove . . . |  | 
| 10:00 - 17:59 | Game Hacking Community Activities & CTF |  | 
| 10:00 - 17:59 | Shell On Demand Appliance Machine (S.O.D.A. Machin . . . |  | 
| 10:00 - 15:59 | Show & Tell |  | 
| 10:00 - 15:59 | Retro Repair |  | 
| 10:00 - 15:59 | Dumb Terminal fun |  | 
| 10:00 - 15:59 | Small scale LAN party |  | 
| 10:00 - 17:59 | LHC Meshtastic Activities and CTF |  | 
| 10:00 - 17:59 | Egor's Keyboard Corner |  | 
| 10:00 - 12:59 | Resume Reviews |  | 
| 10:00 - 17:59 | Lonely Hackers Club Community Room Open |  | 
| 10:00 - 17:59 | LHC's Unofficial Sticker Swap Table |  | 
| 10:30 - 11:30 | Protecting the Backbone of Our Modern World | Soledad Antelada Toledano | 
| 10:00 - 10:30 | Case Study: Hacking Smart Lock For Fun and Profit | Cesar Ortega Ortega | 
| 10:00 - 17:59 | Open Events for DCNextGen |  | 
| 11:00 - 11:59 | Hack the Badge (Badge class level 2) (Overflow if  . . . |  | 
| 11:30 - 12:30 | Cybersecurity for Emerging Tech (panelists would i . . . | Paulino Calderon | 
| 12:00 - 12:59 | Austin School For The Driven |  | 
| 12:00 - 12:45 | 3D Printing My Way to Sanity: The Self-Funding Hob . . . | Steve Dossey | 
| 12:30 - 13:30 | Threats in Space: The Dangerous Rise of GNSS Attac . . . | Isabel Manjarrez | 
| 13:30 - 14:15 | How we built our REDACTED THING this year, 5n4ck3y . . . | AND!XOR | 
| 13:00 - 13:45 | Don't go too far… your job is not done! | Chris Cleary | 
| 13:30 - 14:30 | DarkGate: Cazando a la amenaza y exponiendo su inf . . . | Nestor Sánchez | 
| 14:00 - 14:59 | Color Blasted Badge Making: How Hard Could It Be ? | Abhinav Panda,Bradán Lan . . . | 
| 14:00 - 14:59 | Hard Hat Brigade - Q&A Panel |  | 
| 14:00 - 15:45 | Friendship Bracelet Making |  | 
| 14:00 - 15:59 | DC Book Club Discussion |  | 
| 14:00 - 17:59 | Resume Reviews |  | 
| 14:00 - 14:45 | Navigating Bureaucracy: Strategies for a Post-Mili . . . | Nia Luckey | 
| 14:30 - 14:59 | Make all the things - Construa seus próprios "bri . . . | Christiane Borges Santos | 
| 15:45 - 15:59 | WISP Group Photo |  | 
| 15:00 - 17:59 | Name the Noob |  | 
| 15:00 - 15:45 | Cybersecurity for Veterans: Bridging the Gap from  . . . | Matt James | 
| 15:00 - 15:30 | Ransomware B-Sides: Los ransoms que nunca triunfar . . . | Mauro Eldritch,Cybelle Ol . . . | 
| 15:30 - 16:30 | Haciendo visible lo invisible: Observabilidad y tr . . . | Gastón Aznarez,Octavio G . . . | 
| 16:00 - 17:59 | Peer-to-Peer Mentoring and Networking with optiona . . . |  | 
| 16:30 - 17:59 | How is GenIA Impacting Cybersecurity: The good, Th . . . | Marco Figueroa | 
| 18:30 - 21:30 | EFF Tech Trivia |  | 
| 20:00 - 23:59 | DEF CON Movie Night |  | 
| 21:00 - 01:59 | Intigriti Hack Shack |  | 
|  |  |  | 
| Sunday |  |  | 
| 05:00 - 07:59 | Defcon.run |  | 
| 08:00 - 15:59 | Human Registration Open |  | 
| 08:00 - 14:59 | Lost & Found |  | 
| 10:00 - 12:59 | All content areas generally open |  | 
| 10:00 - 12:59 | Vendors and Exhibitors Open |  | 
| 10:00 - 12:59 | Hard Hat Brigade - Community Space Open |  | 
| 10:00 - 12:59 | Robo Sumo |  | 
| 10:00 - 12:59 | HHV Rube Goldberg Machine |  | 
| 10:00 - 12:59 | Hardware Hacking and Soldering Skills Village Open . . . |  | 
| 10:00 - 12:59 | WISP Community & Inclusion Room |  | 
| 10:00 - 10:59 | Secure From Scatch |  | 
| 10:00 - 10:59 | Game Hacking Community Activities & CTF |  | 
| 10:00 - 12:59 | Shell On Demand Appliance Machine (S.O.D.A. Machin . . . |  | 
| 10:00 - 12:59 | Dumb Terminal fun |  | 
| 10:00 - 12:59 | Retro Repair |  | 
| 10:00 - 12:59 | Small scale LAN party |  | 
| 10:00 - 12:59 | Show & Tell |  | 
| 10:00 - 12:59 | LHC Meshtastic Activities and CTF |  | 
| 10:00 - 11:59 | Egor's Keyboard Corner |  | 
| 10:00 - 12:59 | Lonely Hackers Club Community Room Open |  | 
| 10:00 - 11:59 | LHC's Unofficial Sticker Swap Table |  | 
| 10:00 - 10:59 | Threat Hunting + Intelligence, capabilities, skill . . . | Thiago Bordini,Mauro Eldr . . . | 
| 10:00 - 12:59 | Open Events for DCNextGen |  | 
| 11:00 - 11:59 | Detección de Vulnerabilidades mediante Instrument . . . | Asher Davila | 
| 12:00 - 12:59 | Hard Hat Brigade - Group Photo and People's Choice . . . |  | 
| 12:00 - 12:59 | DCNextGen Awards and Closing Ceremony |  | 
| 12:00 - 12:59 | Game Hacking Community Closing Talk & Awards Cerem . . . |  | 
| 12:00 - 12:59 | Abusando de Bitlocker para secuestrar información . . . | Eduardo Chavarro Ovalle | 
| 13:00 - 13:59 | Jeitinho Cibernético: A Convergência da Seguran . . . | Ueric Melo | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Friday |  |  | 
| 11:00 - 11:50 | The Art of Critical Thinking through an Adversaria . . . | Ben "NahamSec" Sadeghipou . . . | 
| 12:00 - 12:50 | Mining for Abandoned Gold in DNS | Matt Pawloski | 
| 12:00 - 12:50 | Modern Red Teaming: macOS, K8s, and Cloud | Chris Gates,int eighty (o . . . | 
| 12:00 - 12:50 | Abusing DevOps to Pivot Between Cloud and On-Prem | Colbert Zhu,Tom Porter | 
| 12:00 - 12:50 | Red Team Terraform Workshop | Moses Frost | 
| 12:00 - 12:50 | Bypassing Corporate controls on Mac Devices | Adwiteeya Agrawal,Ian Fos . . . | 
| 13:00 - 16:59 | DC NextGen / Youth Challenge Area at Red Team Vill . . . | RTV Staff | 
| 13:00 - 13:50 | Red Goes Purple: Executing the Attack Path | Omar Santos,Graham Helton . . . | 
| 13:00 - 13:50 | Adversary Simulation: Using Blue Eyes to See Red | Fred Wilmot,Sebastien Tri . . . | 
| 13:00 - 13:50 | Simulated Drone Hacking | Nick Aleks | 
| 13:00 - 14:50 | Badge Cloning:  A Penetration Tester's Guide to Ca . . . | Travis Weathers,Ralph May | 
| 14:00 - 14:50 | Physical Security - Bypassing Access Control Syste . . . | Andrew Johnson | 
| 14:00 - 14:50 | Level UP OSINT | Mishaal Khan | 
| 14:00 - 15:50 | Modifying Impacket for Better OpSec | Ryan O'Donnell | 
| 15:00 - 15:50 | Threat Emulation 101 | Trey Bilbrey | 
| 15:00 - 16:50 | New Skill Unlocked: C2 Infrastructure Automation | Josh Huff,Robert Pimentel | 
| 15:00 - 15:50 | GHOST in the Model: Generating AI-Assisted Threat  . . . | Sam Cosentino | 
| 16:00 - 16:50 | Mac-n-Cheese: How to Cook Up Delicious Electron Te . . . | Roberto Soares | 
| 16:00 - 16:50 | Thinking Outside the Kube - Finding and Exploiting . . . | Tomer Peled | 
| 16:00 - 16:50 | Building Your Red-Teaming Co-Pilot: Navigating the . . . | Gaspard Baye | 
| 16:00 - 16:59 | Blue Goes Purple: Purple Teams for Fun and Profit  . . . | Catherine J. Ullman,Jake  . . . | 
|  |  |  | 
| Saturday |  |  | 
| 10:00 - 10:50 | The Hybrid Horizon: Unleashing the Power of Azure  . . . | Chirag Savla,Raunak Parma . . . | 
| 10:00 - 10:50 | BOAZ, Yet Another layered Evasion Tool: Unveiling  . . . | Thomas X Meng | 
| 10:00 - 10:50 | DoH Deception: Evading ML-Based Tunnel Detection w . . . | Emanuel Valente | 
| 10:00 - 10:50 | Physical Red Teaming for Offensive Cyber Teams | Shawn Abelson,Ana Aslanis . . . | 
| 10:00 - 10:50 | Hacking the Skies – Satellite Red Teaming | Agostino Panico | 
| 11:00 - 11:50 | OSINT for Hackers | Lee McWhorter,Sandra Stib . . . | 
| 11:00 - 11:50 | Securing the Future with CoSAI: Identified Technic . . . | Omar Santos,Dan McInerney . . . | 
| 11:00 - 11:50 | Developing Evilginx Phishlets | Michael Donley | 
| 11:00 - 11:50 | RustOps | Jose Plascencia | 
| 11:00 - 11:50 | Island Hoping: Move from LOLBins to Living off Lan . . . | Moses Frost | 
| 12:00 - 16:59 | DC NextGen / Youth Challenge Area at Red Team Vill . . . | RTV Staff | 
| 12:00 - 12:50 | Insert coin: Hacking arcades for fun | Ignacio Daniel Navarro | 
| 12:00 - 12:50 | Developing Better Payloads with Automated Testing | Nick McClendon | 
| 12:00 - 12:50 | Tunnel Vision: Exploring VPN Post-Exploitation Tec . . . | Ori David | 
| 13:00 - 14:50 | An Operator's Guide: Hunting SCCM in the Real Worl . . . | Garrett Foster,Zachary St . . . | 
| 13:00 - 13:50 | macOS Red Team on Corporate Scenarios | Ricardo L0gan | 
| 13:00 - 13:50 | Building Surgical Implants: A Comprehensive Guide  . . . | John Rodriguez | 
| 14:00 - 14:50 | Cloud Offensive Breaches: The Graph-Based Exploita . . . | Filipi Pires | 
| 14:00 - 14:50 | Tempest c2: Use and Design | Kirk Trychel | 
| 14:00 - 14:50 | Combining Uncensored and Censored LLMs for Ransomw . . . | Muhammad Mudassar Yamin | 
| 15:00 - 15:50 | The Curious Case of Stealer Logs: Access & Espiona . . . | Eric Clay,Nick Ascoli | 
| 15:00 - 15:50 | Introduction to Kubernetes common attack technique . . . | Lenin Alevski | 
| 15:00 - 15:50 | Using Retrieval Augmented Generation (RAG), Langch . . . | Omar Santos | 
| 15:00 - 16:59 | Learning the New Amass Collection Engine | Jeff Foley | 
| 16:00 - 16:50 | Pipeline Pandemonium: How to Hijack the Cloud and  . . . | Blake Hudson | 
| 16:00 - 16:50 | Hacking Policy and Policy Hacking - A Red-Teamer H . . . | Amit Elazari | 
| 16:00 - 16:50 | Bespoke C2s are coming of age. | David "Icer" Maynor | 
|  |  |  | 
| Sunday |  |  | 
| 10:00 - 11:50 | DC NextGen / Youth Challenge Area at Red Team Vill . . . | RTV Staff | 
| 10:00 - 10:50 | From Runners to IdP Admin | Sim Cher Boon | 
| 10:00 - 10:50 | From Network to Network: Hands-On Pivoting Techniq . . . | Francisco Canteli | 
| 10:00 - 10:50 | IDOR in Financial Operations | Ilkin Javadov | 
| 10:00 - 10:50 | Hacking Processes: Introducing the Redteaming Proc . . . | Alex Gonzalez,Bobby R | 
| 10:00 - 10:59 | The Village Peoples' Panel - What Really Goes On i . . . | Justin,Matt Mayes,muteki, . . . | 
| 11:00 - 11:50 | The SIEMless Hack: Rewriting Reality with Log Inje . . . | Özgün Kültekin | 
| 11:00 - 11:50 | Threat hunting like a pentester | Ronald Gonzalez | 
| 11:00 - 11:50 | Red Team Infrastructure Setup and Automation | Aravind Prakash,Arun Nair . . . | 
| 11:00 - 11:50 | Supercharge your vuln finding workflow with automa . . . | Erik Hunstad,Alberto Rodr . . . | 
| PDT Times | Title | speaker | 
|  |  |  | 
| Thursday |  |  | 
| 09:00 - 12:59 | Sold Out - Offensive SCCM: Abusing Microsoft's C2  . . . | Chris Thompson,Duane Mich . . . | 
| 09:00 - 12:59 | Sold Out - Med Team vs Red Team: Intro into Medica . . . | Alex Delifer,Michael "v3g . . . | 
| 09:00 - 12:59 | Sold Out - Supercharge SAST: Semgrep Strategies fo . . . | Arjun Gopalakrishna,Gauta . . . | 
| 09:00 - 12:59 | Sold Out - Dissecting Malware for Defense - Crafti . . . | Francisco Perdomo,Josh St . . . | 
| 09:00 - 12:59 | Sold Out - Tracing The Pain Away - Practical Binar . . . | Sean ,Serrgei Frankoff | 
| 14:00 - 17:59 | Sold Out - Flipping the Coin: Red and Blue Teaming . . . | Angus Strom,Troy Defty | 
| 14:00 - 17:59 | Sold Out - Long Live Empire: A C2 Workshop for Mod . . . | Jake “Hubble” Krasnov . . . | 
| 14:00 - 17:59 | Sold Out - 64-bit Intel Assembly Language Programm . . . | Wesley McGrew | 
| 14:00 - 17:59 | Sold Out - Dodging the EDR Bullet: A Workshop on M . . . | Dimitri Di Cristofaro,Gio . . . | 
| 14:00 - 17:59 | Sold Out - Hide your kids, turn off your Wi-Fi, th . . . | James Hawk | 
|  |  |  | 
| Friday |  |  | 
| 09:00 - 12:59 | Sold Out - Traumatic Library Loading : If you want . . . | Yoann Dequeker | 
| 09:00 - 12:59 | Sold Out - Finding the Needle: An Introduction to  . . . | Kathy Zhu,Troy Defty | 
| 09:00 - 12:59 | Sold Out - Whitebox Web Exploit Development | Cale Smith,Priyanka Joshi | 
| 09:00 - 12:59 | Sold Out - Small Choices, Global Repercussions: A  . . . | Isabel Straw,Jorge Aceved . . . | 
| 09:00 - 12:59 | Sold Out - Machine Learning for N00bs | Elizabeth Biddlecome,Irvi . . . | 
| 14:00 - 17:59 | Sold Out - Ghidra Analysis & Automation Masterclas . . . | Max "Libra" Kersten | 
| 14:00 - 17:59 | Sold Out - Learning to Hack Bluetooth Low Energy w . . . | Alek Amrani,Ryan Holeman | 
| 14:00 - 17:59 | Sold Out - Hack the connected plant! | Alexandrine Torrents,Arna . . . | 
| 14:00 - 17:59 | Sold Out - From an attacker's lair to your home: A . . . | Sebastian Tapia De la tor . . . | 
| 14:00 - 17:59 | Sold Out - Dissecting and Defeating Ransomware's E . . . | Aaron Rosenmund,Josh Stro . . . | 
|  |  |  | 
| Saturday |  |  | 
| 09:00 - 12:59 | Sold Out - Sharp Security from All Angles: Masteri . . . | Or Sahar,Yariv Tal | 
| 09:00 - 12:59 | Sold Out - Hacking The Metal: A Spark of Intellige . . . | eigentourist | 
| 09:00 - 12:59 | Sold Out - Capture the Flag 101 | Micah Silverman | 
| 09:00 - 12:59 | Sold Out - Hacking Apps on Salesforce | Rodney David Beede | 
| 09:00 - 12:59 | Sold Out - Industrial Control Systems: how to secu . . . | Alexandrine Torrents | 
| 14:00 - 17:59 | Sold Out - Email Detection Engineering and Threat  . . . | Alfie Champion,Josh Kamdj . . . | 
| 14:00 - 17:59 | Sold Out - Crash Course in Physical Access Control . . . | Lorenzo Pedroncelli,Randy . . . | 
| 14:00 - 17:59 | Sold Out - Playing with RFID | Vinnie "kernelpaniek" Van . . . | 
| 14:00 - 17:59 | Sold Out - Master Class: Hands-On Machine Learning . . . | Solomon Sonya |