PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 11:15 |
Spies and Bytes: Victory in the Digital Age
|
General Paul M. Nakasone |
10:00 - 10:20 |
Welcome to DEF CON
|
Jeff "The Dark Tangent" M . . . |
10:00 - 10:45 |
Mobile Mesh RF Network Exploitation: Getting the T . . .
|
Erwin Karincic,Woody |
10:00 - 10:45 |
Where’s the Money: Defeating ATM Disk Encryption
|
Matt Burch |
10:30 - 11:15 |
Defeating magic by magic:Using ALPC security fea . . .
|
WangJunJie Zhang,YiSheng . . . |
10:00 - 10:20 |
Securing CCTV Cameras Against Blind Spots
|
Jacob Shams |
10:00 - 10:45 |
Behind Enemy Lines: Going undercover to breach the . . .
|
Jon DiMaggio |
11:30 - 11:59 |
Atomic Honeypot: A MySQL Honeypot That Drops Shell . . .
|
Alexander Rubin,Martin Ra . . . |
11:30 - 12:15 |
Listen to the whispers: web timing attacks that ac . . .
|
James "albinowax" Kettle |
11:00 - 11:20 |
No Symbols When Reversing? No Problem: Bring Your . . .
|
Max "Libra" Kersten |
11:30 - 12:45 |
High Intensity Deconstruction: Chronicles of a Cry . . .
|
Babak Javadi,Aaron Levy,N . . . |
11:30 - 12:30 |
Custom, cheap, easy, and safe badges - without sta . . .
|
Joe "securelyfitz" FitzPa . . . |
11:00 - 11:45 |
The XZ Backdoor Story: The Undercover Operation Th . . .
|
Thomas Roccia |
12:00 - 12:45 |
Fireside Chat with DNSA Anne Neuberger
|
Anne Neuberger,Jeff "The . . . |
12:00 - 12:45 |
On Your Ocean's 11 Team, I'm the AI Guy (technical . . .
|
Harriet Farlow |
12:30 - 13:15 |
Kicking in the Door to the Cloud: Exploiting Cloud . . .
|
Nick Frichette |
12:00 - 13:15 |
Veilid Dev and Community Meetup
|
The_Gibson |
13:00 - 13:45 |
If Existing Cyber Vulnerabilities Magically Disapp . . .
|
Dr. Stefanie Tompkins,Dr. . . . |
13:00 - 13:45 |
Sshamble: Unexpected Exposures in the Secure Shell
|
HD Moore,Rob King |
13:30 - 14:15 |
Digital Emblems: When markings are required under . . .
|
Bill Woodcock |
13:00 - 13:45 |
Defeating EDR Evading Malware with Memory Forensic . . .
|
Andrew Case,Austin Seller . . . |
13:30 - 14:15 |
Xiaomi The Money - Our Toronto Pwn2Own Exploit and . . .
|
Ken Gannon,Ilyes Beghdadi |
14:00 - 14:45 |
DEF CON Unplugged: Cocktails & Cyber with Jeff & J . . .
|
Jen Easterly |
14:00 - 14:45 |
Optical Espionage: Using Lasers to Hear Keystrokes . . .
|
samy kamkar |
14:30 - 15:15 |
Breaching AWS Accounts Through Shadow Resources
|
Yakir Kadkoda,Michael Kat . . . |
14:00 - 14:45 |
The Way To Android Root: Exploiting Your GPU On Sm . . .
|
Xiling Gong,Eugene Rodion . . . |
14:30 - 15:15 |
Joe and Bruno's Guide to Hacking Time: Regeneratin . . .
|
Joe "Kingpin" Grand,Bruno . . . |
15:00 - 15:59 |
DC101 Panel
|
Nikita Kronenberg,Drew "a . . . |
15:00 - 15:45 |
Abusing Windows Hello Without a Severed Hand
|
Ceri Coburn,Dirk-jan Moll . . . |
15:30 - 16:15 |
Taming the Beast: Inside the Llama 3 Red Team Proc . . .
|
Aaron "dyn" Grattafiori,I . . . |
15:00 - 15:45 |
Android App Usage and Cell Tower Location: Private . . .
|
Ryan Johnson |
15:30 - 16:15 |
Social Engineering Like you’re Picard
|
Jayson E. Street |
16:00 - 16:59 |
Making the DEF CON 32 Badge
|
Mar Williams |
16:00 - 16:45 |
Eradicating Hepatitis C With BioTerrorism
|
Mixæl Swan Laufer |
16:30 - 17:15 |
Leveraging private APNs for mobile network traffic . . .
|
Aapo Oksman |
16:00 - 16:45 |
Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE . . .
|
Michael Gorelik ,Arnold O . . . |
16:30 - 17:15 |
Why are you still, using my server for your intern . . .
|
Thomas Boejstrup Johansen |
17:00 - 17:45 |
Bricked & Abandoned: How To Keep The IoT From Beco . . .
|
Paul Roberts,Chris Wysopa . . . |
17:00 - 17:45 |
One for all and all for WHAD: wireless shenanigans . . .
|
Damien Cauquil,Romain Cay . . . |
17:30 - 18:15 |
Exploiting Bluetooth - from your car to the bank a . . .
|
Vladyslav Zubkov,Martin S . . . |
17:00 - 17:45 |
Breaking Secure Web Gateways (SWG) for Fun and Pro . . .
|
Vivek Ramachandran,Jeswin . . . |
17:30 - 17:50 |
Stranger in a Changed Land
|
Tony Sager |
18:00 - 18:20 |
DEF CON Franklin Project
|
Jacob H Braun |
| | |
Saturday |
|
|
10:00 - 10:45 |
The Pwnie Awards
|
|
10:30 - 11:15 |
Gotta Cache ‘em all: bending the rules of web ca . . .
|
Martin Doyhenard |
10:00 - 10:20 |
Laundering Money
|
Michael Orlitzky |
10:00 - 10:20 |
Mutual authentication is optional
|
Xavier Zhang |
10:30 - 11:15 |
Smishing Smackdown: Unraveling the Threads of USPS . . .
|
S1nn3r |
10:00 - 10:45 |
Reverse Engineering MicroPython Frozen Modules: Da . . .
|
Wesley McGrew |
10:00 - 11:45 |
CULT OF THE DEAD COW & Friends Present: Prime Cuts . . .
|
Deth Veggie,Walter J. Sch . . . |
11:00 - 11:45 |
The Rise and Fall of Binary Exploitation
|
Stephen Sims |
11:30 - 12:15 |
QuickShell: Sharing is caring about an RCE attack . . .
|
Or Yair,Shmuel Cohen |
11:30 - 12:15 |
Sudos and Sudon’ts - Peering inside Sudo for Win . . .
|
Michael "mtu" Torres |
11:00 - 11:45 |
SHIM me what you got - Manipulating Shim and Offic . . .
|
Ron Ben-Yizhak,David Shan . . . |
12:00 - 12:45 |
Disenshittify or die! How hackers can seize the me . . .
|
Cory Doctorow |
12:30 - 13:15 |
The Secret Life of a Rogue Device - Lost IT Assets . . .
|
Matthew "mandatory" Bryan . . . |
12:30 - 13:15 |
AMD Sinkclose: Universal Ring -2 Privilege Escalat . . .
|
Enrique Nissim,Krzysztof . . . |
12:00 - 12:45 |
Grand Theft Actions: Abusing Self-Hosted GitHub Ru . . .
|
Adnan Khan,John Stawinski |
12:00 - 12:59 |
The wild and wonderful world of early Microprocess . . .
|
Michael Brown |
12:00 - 12:45 |
automobiles, alcohol, blood, sweat, and creative r . . .
|
atlas |
13:00 - 13:45 |
Fireside Chat with Jay Healey and National Cyber D . . .
|
Harry Coker Jr.,Jay Heale . . . |
13:30 - 14:15 |
NTLM - The Last Ride
|
Jim Rush,Tomais Williamso . . . |
13:30 - 14:15 |
Behind Enemy Lines: Engaging and Disrupting Ransom . . .
|
Vangelis Stykas |
13:00 - 13:45 |
OH-MY-DC: Abusing OIDC all the way to your cloud
|
Aviad Hahami |
13:00 - 13:59 |
All Your Keyboards Are Belong to US!
|
Federico Lucifredi |
13:00 - 14:59 |
Learn Zero Trust Network Security with Cloudflare
|
|
13:00 - 13:45 |
Inside the FBI’s Secret Encrypted Phone Company . . .
|
Joseph Cox |
14:00 - 14:45 |
SQL Injection Isn't Dead: Smuggling Queries at the . . .
|
Paul Gerste |
14:30 - 15:15 |
Troll Trapping Through TAS Tools - Exposing Speedr . . .
|
Allan "dwangoAC" Cecil |
14:30 - 15:15 |
ACE up the Sleeve: From getting JTAG on the iPhone . . .
|
Thomas "stacksmashing" Ro . . . |
14:00 - 14:45 |
Discovering and exploiting local attacks against t . . .
|
Jeffrey Hofmann,Colby Mor . . . |
14:00 - 14:45 |
Hacking Millions of Modems (and Investigating Who . . .
|
Sam Curry |
15:00 - 15:45 |
Exploiting the Unexploitable: Insights from the Ki . . .
|
Mikhail Shcherbakov |
15:30 - 16:15 |
HookChain: A new perspective for Bypassing EDR Sol . . .
|
Helvio Carvalho Junior |
15:30 - 16:15 |
Unsaflok: Hacking millions of hotel locks
|
Lennert Wouters,Ian Carro . . . |
15:00 - 15:45 |
Measuring the Tor Network
|
Silvia Puglisi,Roger Ding . . . |
15:00 - 15:59 |
Real life hacking stories (that can’t be recorde . . .
|
|
15:00 - 15:45 |
A Shadow Librarian in Broad Daylight: Fighting bac . . .
|
Daniel Messer |
16:30 - 17:15 |
Watchers being watched: Exploiting the Surveillanc . . .
|
Chanin Kim,Myeonghun Pak, . . . |
16:00 - 16:20 |
Compromising an Electronic Logging Device and Crea . . .
|
Jake Jepson,Rik Chatterje . . . |
16:30 - 17:15 |
DEF CON Academy: Cultivating M4D SK1LLZ In the DEF . . .
|
Yan "Zardus" Shoshitaishv . . . |
16:30 - 17:15 |
Breaking the Beam: Exploiting VSAT Satellite Modem . . .
|
Vincent Lenders,Johannes . . . |
16:00 - 16:45 |
Secrets and Shadows: Leveraging Big Data for Vulne . . .
|
Bill Demirkapi |
16:00 - 16:45 |
Encrypted newspaper ads in the 19th century - The . . .
|
Elonka Dunin,Klaus Schmeh |
17:30 - 18:15 |
Iconv, set the charset to RCE: exploiting the glib . . .
|
Charles "cfreal" Fol |
17:00 - 17:20 |
Techniques for Creating Process Injection Attacks . . .
|
Bramwell Brizendine,Shiva . . . |
17:30 - 18:15 |
Nano-Enigma: Uncovering the Secrets Within eFuse M . . .
|
Michal Grygarek,Martin Pe . . . |
17:00 - 17:59 |
Quantum Leap: The future of Computing and the secu . . .
|
|
17:00 - 17:45 |
A Treasure Trove of Failures: What History’s Gre . . .
|
Pete Stegemeyer |
| | |
Sunday |
|
|
10:00 - 10:45 |
Splitting the email atom: exploiting parsers to by . . .
|
Gareth Heyes |
10:00 - 10:45 |
AWS CloudQuarry: Digging for secrets in public AMI . . .
|
Eduard Agavriloae,Matei J . . . |
10:00 - 10:45 |
Windows Downdate: Downgrade Attacks Using Windows . . .
|
Alon Leviev |
10:00 - 10:20 |
Unlocking the Gates: Hacking a secure Industrial R . . .
|
Moritz Abrell |
10:30 - 11:15 |
Changing Global Threat Landscape with Rob Joyce an . . .
|
Rob Joyce,Jeff "The Dark . . . |
10:00 - 10:59 |
Taking off the blindfold: Detecting persistent thr . . .
|
Gastón Aznarez,Octavio G . . . |
10:00 - 10:45 |
The not-so-silent type: Breaking network crypto in . . .
|
Jeffrey Knockel,Mona Wang |
11:00 - 11:45 |
(|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfu . . .
|
Daniel Bohannon,Sabajete . . . |
11:00 - 11:45 |
The hack, the crash and two smoking barrels. (And . . .
|
Thomas "Cr0wTom" Sermpini . . . |
11:00 - 11:45 |
Dragon SlayingGuide: Bug Hunting In VMware Device . . .
|
JiaQing Huang,Hao Zheng,Y . . . |
11:30 - 12:15 |
Open sesame - or how vulnerable is your stuff in e . . .
|
Dennis Giese,Braelynn |
11:00 - 11:45 |
Deception & Counter Deception – Defending Yourse . . .
|
Tom "Decius" Cross,Greg C . . . |
12:00 - 12:45 |
DriverJack: Turning NTFS and Emulated Read-only Fi . . .
|
Alessandro Magnosi |
12:30 - 13:15 |
Redefining V2G - How to use your vehicle as a game . . .
|
Timm Lauser,Jannis Hambor . . . |
12:30 - 13:15 |
AIxCC Closing Ceremonies
|
Andrew Carney,Perri Adams |
12:00 - 12:20 |
Solving the "Lover, Stalker, Killer" Murder with s . . .
|
Anthony Kava |
12:30 - 13:15 |
Clash, Burn, and Exploit: Manipulate Filters to Pw . . .
|
Kuan-Ting "HexRabbit" Che . . . |
13:00 - 13:45 |
Your AI Assistant has a Big Mouth: A New Side-Chan . . .
|
Yisroel Mirsky,Roy Weiss, . . . |
13:30 - 14:15 |
Incubated Machine Learning Exploits: Backdooring M . . .
|
Suha Sabi Hussain |
13:30 - 14:45 |
Contest Closing Ceremonies and Awards
|
|
13:30 - 14:15 |
Bringing Down North Korea
|
Alejandro Caceres |
14:00 - 14:45 |
Abusing legacy railroad signaling systems
|
David Meléndez,Gabriela . . . |
15:00 - 17:45 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |