PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
Hands-on Attack and Breach Simulation exercises
|
Adversary Village Crew |
10:00 - 17:59 |
Adversary simulator and purple teaming hands-on bo . . .
|
Adversary Village Crew |
10:00 - 17:59 |
Adversary-Adventure Table-top Game
|
Adversary Village Crew |
10:00 - 10:59 |
Adversary Village keynote kick-off panel
|
Abhijith “Abx” B R,Br . . . |
11:30 - 12:30 |
Formidable Adversaries: Responding to Breaches, Ra . . .
|
Abhijith “Abx” B R,Ad . . . |
11:00 - 12:59 |
Modifying Impacket for Better OpSec
|
Ryan O'Donnell |
12:30 - 12:59 |
MFT: Malicious Fungible Tokens
|
Cybelle Oliveira ,Mauro E . . . |
13:00 - 14:59 |
Introduction to MITRE Caldera Through Adversary Em . . .
|
Rachel Murphy,Mark Perry |
15:00 - 16:59 |
Hands-on workshop
|
|
16:30 - 16:59 |
Master Splinter’s initial physical access dojo: . . .
|
Daniel Isler |
17:00 - 17:59 |
Red Teaming is broken; this panel will fix it.
|
Suneel Sundar,Niru Ragupa . . . |
| | |
Saturday |
|
|
10:00 - 10:30 |
Sneaky Extensions: The MV3 Escape Artists
|
Vivek Ramachandran,Shoury . . . |
10:30 - 10:59 |
Tough Adversary? Don’t Blame Sun Tzu
|
Gregory Carpenter |
10:00 - 17:59 |
Adversary-Adventure Table-top Game
|
Adversary Village Crew |
10:00 - 17:59 |
Hands-on Attack and Breach Simulation exercises
|
Adversary Village Crew |
10:00 - 17:59 |
Adversary simulator and purple teaming hands-on bo . . .
|
Adversary Village Crew |
10:00 - 10:59 |
Adversarial AI: Disrupting Artificial Intelligence . . .
|
Chloé Messdaghi,Sebastia . . . |
11:00 - 11:30 |
Evading Modern Defenses When Phishing with Pixels
|
Melvin Langvik |
11:00 - 11:59 |
Power To The Purple
|
Tyler Casey,Trey Bilbrey |
12:00 - 13:59 |
Hands-on Kubernetes security with KubeHound (purpl . . .
|
Julien Terriac |
14:00 - 15:59 |
CopyCat: An Artist Guide to Adversary Forgery
|
Cat Self |
16:00 - 17:59 |
Cyberjutsu Path to a Digital Martial Art
|
Alexandre CABROL PERALES, . . . |
| | |
Sunday |
|
|
10:00 - 11:59 |
Adversary-Adventure Table-top Game
|
Adversary Village Crew |
10:00 - 11:59 |
Hands-on Attack and Breach Simulation exercises
|
Adversary Village Crew |
10:00 - 11:59 |
Correlating slow & stealthy APT traces hiding in t . . .
|
Ezz Tahoun |
10:00 - 11:59 |
Adversary simulator and purple teaming hands-on bo . . .
|
Adversary Village Crew |
11:30 - 11:59 |
Kubernetes Attack Simulation: The Definitive Guide
|
Leo Tsaousis |
11:00 - 11:30 |
Exploiting Voice Cloning in Adversarial Simulation
|
Mark Foudy |
12:00 - 12:59 |
Village closing
|
Adversary Village Crew |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:30 |
Fix the Flag Wargame
|
Harley Wilson |
10:15 - 10:45 |
Winning big: AppSec Considerations From the Casino . . .
|
Aleise McGowan,Tennisha M . . . |
11:00 - 12:59 |
Arsenal: AI Goat
|
Ofir Yakobi,Shir Sadon |
11:00 - 12:59 |
Arsenal: CyberChef like Automation within BurpSuit . . .
|
Matthias Göhring,Florian . . . |
11:00 - 13:59 |
Mind-Controlling Other Applications: An intro to i . . .
|
ILOVEPIE |
11:00 - 11:30 |
Securing Frontends at Scale: Paving our Way to the . . .
|
Aaron Shim,jen-ozmen |
11:45 - 12:15 |
Ticking SQLi
|
Iggy |
11:00 - 12:59 |
Activity: Vulnerability Hunt - The Snippets Editio . . .
|
Mário Leitão-Teixeira |
11:00 - 12:59 |
Activity: Spot the Secrets: Finding Secrets Throug . . .
|
mcdwayne |
11:00 - 12:59 |
Activity: Spot the Reachable by Backslash
|
Czesia Glik,Yossi Pik |
12:30 - 12:59 |
Hacking Corporate Banking for Fun and Profit
|
Charles Waterhouse,Nikhil . . . |
13:00 - 13:59 |
Arsenal: GraphQL Armor - Open Source GraphQL Secur . . .
|
Antoine Carossio,Tristan . . . |
13:15 - 13:45 |
SDLC Nightmares - Defeating Secure Code Review GPT . . .
|
Wang Zhilong,Xinzhi Luo |
13:00 - 14:59 |
Activity: Capture the Container by Chainguard
|
Jonathan Leitschuh |
13:00 - 14:59 |
Q&A With OWASP
|
|
13:00 - 14:59 |
Activity: Test Your AppSec Knowledge by Deepfactor
|
Mike Larkin |
14:45 - 15:15 |
Threat Modeling in the Age of AI
|
Adam Shostack |
14:00 - 14:30 |
Relative Path File Injection: The Next Evolution i . . .
|
Ian Hickey |
15:00 - 15:59 |
Arsenal: HunterBounter - Swiss Army Knife for Bug . . .
|
Utku Yildirim |
15:00 - 15:59 |
Arsenal: Introducing RAVEN - Discovering and Analy . . .
|
Elad Pticha,Oreen Livni |
15:00 - 17:30 |
The Open Source Fortress: Finding Vulnerabilities . . .
|
iosifache |
15:30 - 15:59 |
Fine Grained Authorisation with Relationship-Based . . .
|
Ben Dechrai |
15:00 - 16:59 |
Activity: Spot the Secrets: Finding Secrets Throug . . .
|
mcdwayne |
15:00 - 16:59 |
Activity: Hacking Developers’ Trust – Faking G . . .
|
Tal Folkman,Ori Ron,Mári . . . |
16:15 - 16:45 |
I've got 99 problems but a prompt injection ain't . . .
|
Chloé Messdaghi,Kasimir . . . |
17:00 - 17:30 |
When Chatbots Go Rogue – Lessons Learned from Bu . . .
|
Andra,Javan Rasokat |
| | |
Saturday |
|
|
10:00 - 17:30 |
Fix the Flag Wargame
|
Harley Wilson |
10:15 - 10:55 |
Navigating the Cyber Security Labyrinth: Choose Yo . . .
|
punkcoder |
11:00 - 11:59 |
Arsenal: SCAGoat
|
Gaurav Joshi,HK,kvprashan . . . |
11:00 - 13:59 |
Application Threat Modeling with Trike
|
AreTillery |
11:40 - 12:10 |
Unlocking the Gates - Understanding Authentication . . .
|
Vikas Khanna |
11:00 - 11:30 |
BOLABuster: Harnessing LLMs for Automating BOLA De . . .
|
Jay Chen,Ravid Mazon |
11:00 - 12:59 |
Activity: Vulnerability Hunt - The Snippets Editio . . .
|
Mário Leitão-Teixeira |
11:00 - 12:59 |
Activity: API Security 101: Testing and Trivia by . . .
|
Ankush Jain,Ankita Gupta |
11:00 - 12:59 |
Activity: Capture the Container by Chainguard
|
Jonathan Leitschuh |
12:20 - 12:50 |
Maturing Your Application Security Program
|
SheHacksPurple |
13:00 - 14:30 |
Arsenal: SanicDNS
|
Jasper Insinger |
13:00 - 13:45 |
Transforming AppSec: Protecting 'Everything as Cod . . .
|
Kunal Bhattacharya,Sara A . . . |
13:00 - 14:59 |
Activity: Spot the Reachable by Backslash
|
Czesia Glik,Yossi Pik |
13:00 - 14:59 |
Activity: Spot the Secrets: Finding Secrets Throug . . .
|
mcdwayne |
14:40 - 15:10 |
Engineers & Exploits: The Quest for Security
|
Andra,Spyros Gasteratos |
14:00 - 14:30 |
Web2 Meets Web3: Hacking Decentralized Application . . .
|
Peiyu Wang |
15:00 - 16:59 |
Injecting and Detecting Backdoors in Code Completi . . .
|
Ori Ron,Tal Folkman |
15:20 - 15:50 |
Speed Bumps and Speed Hacks: Adventures in Car Man . . .
|
David Sopas,Paulo A. Silv . . . |
15:00 - 16:59 |
Activity: Spot the Reachable by Backslash
|
Czesia Glik,Yossi Pik |
15:00 - 16:59 |
Activity: API Security 101: Testing and Trivia by . . .
|
Ankush Jain,Ankita Gupta |
16:40 - 17:10 |
0.0.0.0 Day: Exploiting Localhost APIs From The Br . . .
|
Avi Lumelsky,Gal Elbaz |
16:00 - 16:30 |
The Missing Link - How we collect and leverage SBO . . .
|
Cassie Crossley |
17:20 - 17:50 |
The Dark Side of Bug Bounty
|
Jason Haddix |
| | |
Sunday |
|
|
10:45 - 12:59 |
Kubernetes Security: Hands-On Attack and Defense
|
alevsk |
10:00 - 12:59 |
Fix the Flag Wargame
|
Harley Wilson |
10:15 - 10:45 |
The Immortal Retrofuturism of Mainframe Computers . . .
|
Michelle Eggers |
11:00 - 12:59 |
Arsenal: Kubescape - OSS security from left to rig . . .
|
ben@armosec.io |
11:45 - 12:15 |
Your CI/CD Pipeline Is Vulnerable, But It's Not Yo . . .
|
Elad Pticha,Oreen Livni |
11:00 - 11:30 |
Gridlock: The Dual-Edged Sword of EV and Solar AP . . .
|
Vangelis Stykas |
11:00 - 12:59 |
Activity: Hacking Developers’ Trust – Faking G . . .
|
Tal Folkman,Ori Ron,Mári . . . |
11:00 - 12:59 |
Activity: Threat modelling fun session with OWASP . . .
|
Andra |
11:00 - 12:59 |
Activity: Threat modelling fun session with OWASP . . .
|
Konstantinos Papapanagiot . . . |
12:30 - 12:59 |
Using EPSS for Better Vulnerability Management
|
jgamblin |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
Detect a Threat
|
TSA |
10:00 - 17:59 |
Defend the Airport CTF
|
IntelliGenesis and IG Lab . . . |
10:00 - 17:59 |
Darkstar Badge Challenge
|
Lockheed Martin |
10:00 - 17:59 |
CubeSat Simulator
|
AMSAT |
10:00 - 17:59 |
Bricks in the Air
|
|
10:00 - 17:59 |
ARINC 664 CTF
|
Boeing |
10:00 - 17:59 |
A-ISAC Aviation Cybersecurity Challenge
|
A-ISAC and Embry-Riddle A . . . |
10:00 - 17:59 |
Hack-A-Sat Quals Challenges
|
Hack-A-Sat,Cromulence |
10:00 - 17:59 |
Drone Capture the Flag (CTF)
|
Dark Wolf |
10:00 - 17:59 |
Drone Flying Experience
|
Dark Wolf |
10:00 - 17:59 |
Drone Hacking Activity
|
Dark Wolf |
10:00 - 17:59 |
spacestudio and spacetower challenges
|
Exotrail,Hack-A-Sat |
10:00 - 17:59 |
Space Systems Security CTF – Platform Security
|
CT Cubed |
10:00 - 17:59 |
Drone Hacking Choose Your Own Adventure
|
Dark Wolf |
10:00 - 17:59 |
Space Grand Challenge Luna
|
CalPoly |
10:00 - 17:59 |
Selfie with a CubeSat
|
CalPoly |
10:00 - 17:59 |
Hack-A-Sat Digital Twin
|
Hack-A-Sat,Cromulence |
10:00 - 17:59 |
PTP Flight Challenge
|
Pen Test Partners |
10:30 - 12:30 |
Building the Ultimate Budget-Friendly Low Earth Or . . .
|
Victor Fernandez Minguill . . . |
11:00 - 11:30 |
An adversarial approach to Airline Revenue Managem . . .
|
Craig Lester |
11:30 - 11:59 |
Aviation cybersecurity lightning talk: Three topic . . .
|
Ken Munro |
13:00 - 14:59 |
BYOS – Bring Your Own Satellite
|
Tim Fowler |
15:30 - 17:30 |
Space Pirate Simulator
|
Michael Butler,Jacob Oakl . . . |
15:30 - 15:59 |
Ground Control to Major Threat - Hacking the Space . . .
|
Andrzej Olchawa |
16:00 - 16:30 |
Analyzing the Security of Satellite-Based Air Traf . . .
|
Martin Strohmeier |
| | |
Saturday |
|
|
10:00 - 17:59 |
spacestudio and spacetower challenges
|
Exotrail,Hack-A-Sat |
10:00 - 17:59 |
Drone Hacking Activity
|
Dark Wolf |
10:00 - 17:59 |
Hack-A-Sat Quals Challenges
|
Hack-A-Sat,Cromulence |
10:00 - 17:59 |
Detect a Threat
|
TSA |
10:00 - 17:59 |
PTP Flight Challenge
|
Pen Test Partners |
10:00 - 17:59 |
Selfie with a CubeSat
|
CalPoly |
10:00 - 17:59 |
Hack-A-Sat Digital Twin
|
Hack-A-Sat,Cromulence |
10:00 - 17:59 |
Space Grand Challenge Luna
|
CalPoly |
10:00 - 17:59 |
Drone Capture the Flag (CTF)
|
Dark Wolf |
10:00 - 17:59 |
Drone Hacking Choose Your Own Adventure
|
Dark Wolf |
10:00 - 17:59 |
Space Systems Security CTF – Platform Security
|
CT Cubed |
10:00 - 17:59 |
Drone Flying Experience
|
Dark Wolf |
10:00 - 17:59 |
Defend the Airport CTF
|
IntelliGenesis and IG Lab . . . |
10:00 - 17:59 |
Darkstar Badge Challenge
|
Lockheed Martin |
10:00 - 17:59 |
CubeSat Simulator
|
AMSAT |
10:00 - 17:59 |
Bricks in the Air
|
|
10:00 - 17:59 |
ARINC 664 CTF
|
Boeing |
10:00 - 17:59 |
A-ISAC Aviation Cybersecurity Challenge
|
A-ISAC and Embry-Riddle A . . . |
10:30 - 11:30 |
Introduction to Drone Security
|
Hahna Kane Latonick |
12:00 - 12:59 |
Secure the Skies: A Modern Android Security Resear . . .
|
Jonathan Waterman |
12:30 - 12:59 |
GPS spoofing: it's about time, not just position
|
Ken Munro |
13:30 - 14:30 |
Open Source Drone Hacking Simulator
|
Nick Aleks,Rudy Mendoza |
13:00 - 13:30 |
Fly Catcher - How I Developed a Low-Cost Raspberry . . .
|
Angelina Tsuboi |
13:30 - 13:59 |
Small Satellite Modeling and Defender Software
|
Kyle Murbach |
14:15 - 14:59 |
RF Attacks on Aviation's Last Line of Defense Agai . . .
|
Giacomo Longo,Vincent Len . . . |
16:00 - 16:59 |
Choose your own adventure: Has your fleet been hac . . .
|
Ken Munro |
16:30 - 16:59 |
Offensive Security Testing: Safeguarding the Final . . .
|
Andrzej Olchawa |
17:00 - 17:30 |
From Theory to Reality: Demonstrating the Simplici . . .
|
Randi Tinney |
17:30 - 17:59 |
A dive into world of Aircraft PKI
|
Matt Gaffney |
| | |
Sunday |
|
|
10:00 - 12:59 |
Hack-A-Sat Quals Challenges
|
Hack-A-Sat,Cromulence |
10:00 - 12:59 |
Drone Hacking Activity
|
Dark Wolf |
10:00 - 12:59 |
spacestudio and spacetower challenges
|
Exotrail,Hack-A-Sat |
10:00 - 12:59 |
Drone Flying Experience
|
Dark Wolf |
10:00 - 12:59 |
Space Systems Security CTF – Platform Security
|
CT Cubed |
10:00 - 12:59 |
Drone Hacking Choose Your Own Adventure
|
Dark Wolf |
10:00 - 12:59 |
Space Grand Challenge Luna
|
CalPoly |
10:00 - 12:59 |
Selfie with a CubeSat
|
CalPoly |
10:00 - 12:59 |
Hack-A-Sat Digital Twin
|
Hack-A-Sat,Cromulence |
10:00 - 12:59 |
PTP Flight Challenge
|
Pen Test Partners |
10:00 - 12:59 |
Drone Capture the Flag (CTF)
|
Dark Wolf |
10:00 - 12:59 |
Detect a Threat
|
TSA |
10:00 - 12:59 |
Defend the Airport CTF
|
IntelliGenesis and IG Lab . . . |
10:00 - 12:59 |
Darkstar Badge Challenge
|
Lockheed Martin |
10:00 - 12:59 |
CubeSat Simulator
|
AMSAT |
10:00 - 12:59 |
Bricks in the Air
|
|
10:00 - 12:59 |
ARINC 664 CTF
|
Boeing |
10:00 - 12:59 |
A-ISAC Aviation Cybersecurity Challenge
|
A-ISAC and Embry-Riddle A . . . |
10:00 - 10:59 |
How to Corrupt Youth to Cyber Focused Space Scienc . . .
|
RC Jones |
11:00 - 12:59 |
Watch The Skies: Build Your Own ADS-B receiver
|
Jim "Gurney" Ross |
11:30 - 11:59 |
Warflying in a Cessna
|
Matt Thomassen,Sean McKee . . . |
12:00 - 12:30 |
The Interplay between Safety and Security in Aviat . . .
|
Lillian Ash Baker |
12:30 - 12:59 |
Behind the Badge: How we used and abused hardware . . .
|
Adam Batori,Robert Paffor . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:30 |
Building a Cyber Threat Intelligence Program from . . .
|
Apurv Singh Gautam,Karan . . . |
10:00 - 10:30 |
Incident Response 101: Part 1 (IR Overview, Lifecy . . .
|
Jason Romero |
10:30 - 10:59 |
Incident Response 101: Part 2 (Analyst Mindset and . . .
|
David "CountZ3r0" Roman |
11:45 - 13:30 |
Adventures in Android Triage Collection
|
Omenscan |
11:15 - 12:15 |
Cloud Native Security Platform for Defenders
|
Dafinga |
12:30 - 13:30 |
Stealer Logs: Automation, Analysis, & Espionage in . . .
|
Eric Clay,Nick Ascoli |
14:00 - 15:59 |
Area DC32: An Interactive Tabletop Takes Flight (A . . .
|
Aakin Patel,Caspian Kilke . . . |
14:30 - 15:30 |
BTV Conversations: Exploring the Cyberpsychology o . . .
|
Todd Fletcher |
15:30 - 16:30 |
BTV Conversations: Touch Grass to Combat Burnout
|
CtrlAltFu |
17:00 - 17:59 |
CTI is Dead, Long Live CTI: Reassessing Blue Team' . . .
|
Aurora Johnson,Ben Goerz, . . . |
| | |
Saturday |
|
|
10:00 - 11:59 |
Securing the Cloud with Cloud Threat Intelligence . . .
|
Natalie Simpson,Nivedita . . . |
10:00 - 10:30 |
Obsidian: Forensics 101 Part 1
|
Sarthak Taneja |
10:30 - 10:59 |
Obsidian: Forensics 101 Part 2
|
Sarthak Taneja |
11:15 - 12:15 |
Use opensource AI to map alerts & logs into techni . . .
|
Ezz Tahoun |
12:30 - 13:30 |
Introduction to Creating Osquery Extensions: Enhan . . .
|
Kivanc Aydin |
12:30 - 13:30 |
From CTI to Creating Campaigns
|
Noah Lazzaro |
14:00 - 14:59 |
Store bought is fine, sometimes!
|
Jason Craig,Lauren Proehl . . . |
15:00 - 15:59 |
Hot SOC Topics for 2024: Feel the Spice!
|
Carson Zimmerman,Russ McR . . . |
16:00 - 16:59 |
Thrunting or DEATH! (A BTV Panel)
|
Joe Slowik,Randy Pargman, . . . |
17:00 - 17:59 |
Under the Hood: Incident Response at High Speed (A . . .
|
Angelo Violetti,David Zit . . . |
| | |
Sunday |
|
|
10:30 - 11:59 |
Blue Team Careers: Do what you love, get paid for . . .
|
Cyb0rg42,Dani,Shea Nangle . . . |
12:00 - 12:30 |
Blue Team Village Closing Ceremonies
|
|
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 11:15 |
Spies and Bytes: Victory in the Digital Age
|
General Paul M. Nakasone |
10:00 - 10:20 |
Welcome to DEF CON
|
Jeff "The Dark Tangent" M . . . |
10:00 - 10:45 |
Mobile Mesh RF Network Exploitation: Getting the T . . .
|
Erwin Karincic,Woody |
10:00 - 10:45 |
Where’s the Money: Defeating ATM Disk Encryption
|
Matt Burch |
10:30 - 11:15 |
Defeating magic by magic:Using ALPC security fea . . .
|
WangJunJie Zhang,YiSheng . . . |
10:00 - 10:20 |
Securing CCTV Cameras Against Blind Spots
|
Jacob Shams |
10:00 - 10:45 |
Behind Enemy Lines: Going undercover to breach the . . .
|
Jon DiMaggio |
11:30 - 11:59 |
Atomic Honeypot: A MySQL Honeypot That Drops Shell . . .
|
Alexander Rubin,Martin Ra . . . |
11:30 - 12:15 |
Listen to the whispers: web timing attacks that ac . . .
|
James "albinowax" Kettle |
11:00 - 11:20 |
No Symbols When Reversing? No Problem: Bring Your . . .
|
Max "Libra" Kersten |
11:30 - 12:45 |
High Intensity Deconstruction: Chronicles of a Cry . . .
|
Babak Javadi,Aaron Levy,N . . . |
11:30 - 12:30 |
Custom, cheap, easy, and safe badges - without sta . . .
|
Joe "securelyfitz" FitzPa . . . |
11:00 - 11:45 |
The XZ Backdoor Story: The Undercover Operation Th . . .
|
Thomas Roccia |
12:00 - 12:45 |
Fireside Chat with DNSA Anne Neuberger
|
Anne Neuberger,Jeff "The . . . |
12:00 - 12:45 |
On Your Ocean's 11 Team, I'm the AI Guy (technical . . .
|
Harriet Farlow |
12:30 - 13:15 |
Kicking in the Door to the Cloud: Exploiting Cloud . . .
|
Nick Frichette |
12:00 - 13:15 |
Veilid Dev and Community Meetup
|
The_Gibson |
13:00 - 13:45 |
If Existing Cyber Vulnerabilities Magically Disapp . . .
|
Dr. Stefanie Tompkins,Dr. . . . |
13:00 - 13:45 |
Sshamble: Unexpected Exposures in the Secure Shell
|
HD Moore,Rob King |
13:30 - 14:15 |
Digital Emblems: When markings are required under . . .
|
Bill Woodcock |
13:00 - 13:45 |
Defeating EDR Evading Malware with Memory Forensic . . .
|
Andrew Case,Austin Seller . . . |
13:30 - 14:15 |
Xiaomi The Money - Our Toronto Pwn2Own Exploit and . . .
|
Ken Gannon,Ilyes Beghdadi |
14:00 - 14:45 |
DEF CON Unplugged: Cocktails & Cyber with Jeff & J . . .
|
Jen Easterly |
14:00 - 14:45 |
Optical Espionage: Using Lasers to Hear Keystrokes . . .
|
samy kamkar |
14:30 - 15:15 |
Breaching AWS Accounts Through Shadow Resources
|
Yakir Kadkoda,Michael Kat . . . |
14:00 - 14:45 |
The Way To Android Root: Exploiting Your GPU On Sm . . .
|
Xiling Gong,Eugene Rodion . . . |
14:30 - 15:15 |
Joe and Bruno's Guide to Hacking Time: Regeneratin . . .
|
Joe "Kingpin" Grand,Bruno . . . |
15:00 - 15:59 |
DC101 Panel
|
Nikita Kronenberg,Drew "a . . . |
15:00 - 15:45 |
Abusing Windows Hello Without a Severed Hand
|
Ceri Coburn,Dirk-jan Moll . . . |
15:30 - 16:15 |
Taming the Beast: Inside the Llama 3 Red Team Proc . . .
|
Aaron "dyn" Grattafiori,I . . . |
15:00 - 15:45 |
Android App Usage and Cell Tower Location: Private . . .
|
Ryan Johnson |
15:30 - 16:15 |
Social Engineering Like you’re Picard
|
Jayson E. Street |
16:00 - 16:59 |
Making the DEF CON 32 Badge
|
Mar Williams |
16:00 - 16:45 |
Eradicating Hepatitis C With BioTerrorism
|
Mixæl Swan Laufer |
16:30 - 17:15 |
Leveraging private APNs for mobile network traffic . . .
|
Aapo Oksman |
16:00 - 16:45 |
Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE . . .
|
Michael Gorelik ,Arnold O . . . |
16:30 - 17:15 |
Why are you still, using my server for your intern . . .
|
Thomas Boejstrup Johansen |
17:00 - 17:45 |
Bricked & Abandoned: How To Keep The IoT From Beco . . .
|
Paul Roberts,Chris Wysopa . . . |
17:00 - 17:45 |
One for all and all for WHAD: wireless shenanigans . . .
|
Damien Cauquil,Romain Cay . . . |
17:30 - 18:15 |
Exploiting Bluetooth - from your car to the bank a . . .
|
Vladyslav Zubkov,Martin S . . . |
17:00 - 17:45 |
Breaking Secure Web Gateways (SWG) for Fun and Pro . . .
|
Vivek Ramachandran,Jeswin . . . |
17:30 - 17:50 |
Stranger in a Changed Land
|
Tony Sager |
18:00 - 18:20 |
DEF CON Franklin Project
|
Jacob H Braun |
| | |
Saturday |
|
|
10:00 - 10:45 |
The Pwnie Awards
|
|
10:30 - 11:15 |
Gotta Cache ‘em all: bending the rules of web ca . . .
|
Martin Doyhenard |
10:00 - 10:20 |
Laundering Money
|
Michael Orlitzky |
10:00 - 10:20 |
Mutual authentication is optional
|
Xavier Zhang |
10:30 - 11:15 |
Smishing Smackdown: Unraveling the Threads of USPS . . .
|
S1nn3r |
10:00 - 10:45 |
Reverse Engineering MicroPython Frozen Modules: Da . . .
|
Wesley McGrew |
10:00 - 11:45 |
CULT OF THE DEAD COW & Friends Present: Prime Cuts . . .
|
Deth Veggie,Walter J. Sch . . . |
11:00 - 11:45 |
The Rise and Fall of Binary Exploitation
|
Stephen Sims |
11:30 - 12:15 |
QuickShell: Sharing is caring about an RCE attack . . .
|
Or Yair,Shmuel Cohen |
11:30 - 12:15 |
Sudos and Sudon’ts - Peering inside Sudo for Win . . .
|
Michael "mtu" Torres |
11:00 - 11:45 |
SHIM me what you got - Manipulating Shim and Offic . . .
|
Ron Ben-Yizhak,David Shan . . . |
12:00 - 12:45 |
Disenshittify or die! How hackers can seize the me . . .
|
Cory Doctorow |
12:30 - 13:15 |
The Secret Life of a Rogue Device - Lost IT Assets . . .
|
Matthew "mandatory" Bryan . . . |
12:30 - 13:15 |
AMD Sinkclose: Universal Ring -2 Privilege Escalat . . .
|
Enrique Nissim,Krzysztof . . . |
12:00 - 12:45 |
Grand Theft Actions: Abusing Self-Hosted GitHub Ru . . .
|
Adnan Khan,John Stawinski |
12:00 - 12:59 |
The wild and wonderful world of early Microprocess . . .
|
Michael Brown |
12:00 - 12:45 |
automobiles, alcohol, blood, sweat, and creative r . . .
|
atlas |
13:00 - 13:45 |
Fireside Chat with Jay Healey and National Cyber D . . .
|
Harry Coker Jr.,Jay Heale . . . |
13:30 - 14:15 |
NTLM - The Last Ride
|
Jim Rush,Tomais Williamso . . . |
13:30 - 14:15 |
Behind Enemy Lines: Engaging and Disrupting Ransom . . .
|
Vangelis Stykas |
13:00 - 13:45 |
OH-MY-DC: Abusing OIDC all the way to your cloud
|
Aviad Hahami |
13:00 - 13:59 |
All Your Keyboards Are Belong to US!
|
Federico Lucifredi |
13:00 - 14:59 |
Learn Zero Trust Network Security with Cloudflare
|
|
13:00 - 13:45 |
Inside the FBI’s Secret Encrypted Phone Company . . .
|
Joseph Cox |
14:00 - 14:45 |
SQL Injection Isn't Dead: Smuggling Queries at the . . .
|
Paul Gerste |
14:30 - 15:15 |
Troll Trapping Through TAS Tools - Exposing Speedr . . .
|
Allan "dwangoAC" Cecil |
14:30 - 15:15 |
ACE up the Sleeve: From getting JTAG on the iPhone . . .
|
Thomas "stacksmashing" Ro . . . |
14:00 - 14:45 |
Discovering and exploiting local attacks against t . . .
|
Jeffrey Hofmann,Colby Mor . . . |
14:00 - 14:45 |
Hacking Millions of Modems (and Investigating Who . . .
|
Sam Curry |
15:00 - 15:45 |
Exploiting the Unexploitable: Insights from the Ki . . .
|
Mikhail Shcherbakov |
15:30 - 16:15 |
HookChain: A new perspective for Bypassing EDR Sol . . .
|
Helvio Carvalho Junior |
15:30 - 16:15 |
Unsaflok: Hacking millions of hotel locks
|
Lennert Wouters,Ian Carro . . . |
15:00 - 15:45 |
Measuring the Tor Network
|
Silvia Puglisi,Roger Ding . . . |
15:00 - 15:59 |
Real life hacking stories (that can’t be recorde . . .
|
|
15:00 - 15:45 |
A Shadow Librarian in Broad Daylight: Fighting bac . . .
|
Daniel Messer |
16:30 - 17:15 |
Watchers being watched: Exploiting the Surveillanc . . .
|
Chanin Kim,Myeonghun Pak, . . . |
16:00 - 16:20 |
Compromising an Electronic Logging Device and Crea . . .
|
Jake Jepson,Rik Chatterje . . . |
16:30 - 17:15 |
DEF CON Academy: Cultivating M4D SK1LLZ In the DEF . . .
|
Yan "Zardus" Shoshitaishv . . . |
16:30 - 17:15 |
Breaking the Beam: Exploiting VSAT Satellite Modem . . .
|
Vincent Lenders,Johannes . . . |
16:00 - 16:45 |
Secrets and Shadows: Leveraging Big Data for Vulne . . .
|
Bill Demirkapi |
16:00 - 16:45 |
Encrypted newspaper ads in the 19th century - The . . .
|
Elonka Dunin,Klaus Schmeh |
17:30 - 18:15 |
Iconv, set the charset to RCE: exploiting the glib . . .
|
Charles "cfreal" Fol |
17:00 - 17:20 |
Techniques for Creating Process Injection Attacks . . .
|
Bramwell Brizendine,Shiva . . . |
17:30 - 18:15 |
Nano-Enigma: Uncovering the Secrets Within eFuse M . . .
|
Michal Grygarek,Martin Pe . . . |
17:00 - 17:59 |
Quantum Leap: The future of Computing and the secu . . .
|
|
17:00 - 17:45 |
A Treasure Trove of Failures: What History’s Gre . . .
|
Pete Stegemeyer |
| | |
Sunday |
|
|
10:00 - 10:45 |
Splitting the email atom: exploiting parsers to by . . .
|
Gareth Heyes |
10:00 - 10:45 |
AWS CloudQuarry: Digging for secrets in public AMI . . .
|
Eduard Agavriloae,Matei J . . . |
10:00 - 10:45 |
Windows Downdate: Downgrade Attacks Using Windows . . .
|
Alon Leviev |
10:00 - 10:20 |
Unlocking the Gates: Hacking a secure Industrial R . . .
|
Moritz Abrell |
10:30 - 11:15 |
Changing Global Threat Landscape with Rob Joyce an . . .
|
Rob Joyce,Jeff "The Dark . . . |
10:00 - 10:59 |
Taking off the blindfold: Detecting persistent thr . . .
|
Gastón Aznarez,Octavio G . . . |
10:00 - 10:45 |
The not-so-silent type: Breaking network crypto in . . .
|
Jeffrey Knockel,Mona Wang |
11:00 - 11:45 |
(|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfu . . .
|
Daniel Bohannon,Sabajete . . . |
11:00 - 11:45 |
The hack, the crash and two smoking barrels. (And . . .
|
Thomas "Cr0wTom" Sermpini . . . |
11:00 - 11:45 |
Dragon SlayingGuide: Bug Hunting In VMware Device . . .
|
JiaQing Huang,Hao Zheng,Y . . . |
11:30 - 12:15 |
Open sesame - or how vulnerable is your stuff in e . . .
|
Dennis Giese,Braelynn |
11:00 - 11:45 |
Deception & Counter Deception – Defending Yourse . . .
|
Tom "Decius" Cross,Greg C . . . |
12:00 - 12:45 |
DriverJack: Turning NTFS and Emulated Read-only Fi . . .
|
Alessandro Magnosi |
12:30 - 13:15 |
Redefining V2G - How to use your vehicle as a game . . .
|
Timm Lauser,Jannis Hambor . . . |
12:30 - 13:15 |
AIxCC Closing Ceremonies
|
Andrew Carney,Perri Adams |
12:00 - 12:20 |
Solving the "Lover, Stalker, Killer" Murder with s . . .
|
Anthony Kava |
12:30 - 13:15 |
Clash, Burn, and Exploit: Manipulate Filters to Pw . . .
|
Kuan-Ting "HexRabbit" Che . . . |
13:00 - 13:45 |
Your AI Assistant has a Big Mouth: A New Side-Chan . . .
|
Yisroel Mirsky,Roy Weiss, . . . |
13:30 - 14:15 |
Incubated Machine Learning Exploits: Backdooring M . . .
|
Suha Sabi Hussain |
13:30 - 14:45 |
Contest Closing Ceremonies and Awards
|
|
13:30 - 14:15 |
Bringing Down North Korea
|
Alejandro Caceres |
14:00 - 14:45 |
Abusing legacy railroad signaling systems
|
David Meléndez,Gabriela . . . |
15:00 - 17:45 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:45 |
Docker Exploitation Framework
|
Emmanuel Law,Rohit Pitke |
10:00 - 11:45 |
Zip It Up, Sneak It In - Introduction of apkInspec . . .
|
Kaloyan Velikov,Leonidas . . . |
10:00 - 11:45 |
Volatile Vault - Data Exfiltration in 2024
|
Moritz Laurin Thomas,Patr . . . |
10:00 - 11:45 |
Bluetooth Landscape Exploration & Enumeration Plat . . .
|
Paul Wortman |
10:00 - 11:45 |
Nebula - 3 Years of Kicking *aaS and Taking Userna . . .
|
Bleon Proko |
10:00 - 11:45 |
Cloud Offensive Breach and Risk Assessment (COBRA)
|
Anand Tiwari,Harsha Koush . . . |
12:00 - 13:45 |
distribRuted - Distributed Attack Framework
|
Ismail Melih Tas,Numan Oz . . . |
12:00 - 13:45 |
BypassIT - Using AutoIT & Similar Tools for Covert . . .
|
Ezra Woods,Mike Manrod |
12:00 - 13:45 |
Tengu Marauder
|
Leonardo Serrano,Lexie Th . . . |
12:00 - 13:45 |
Skynet
|
Craig Chamberlain,Rewanth . . . |
12:00 - 13:45 |
The World Wide Paraweb
|
Nathan Sidles |
12:00 - 13:45 |
Serberus
|
Patrick Kiley |
14:00 - 15:45 |
Automated Control Validation with Tommyknocker
|
Jeremy Banker |
14:00 - 15:45 |
HIDe & SEEK
|
Jonathan Fischer,Matthew . . . |
14:00 - 15:45 |
SCAGoat - Exploiting Damn Vulnerable SCA Applicati . . .
|
Hare Krishna Rai,Prashant . . . |
14:00 - 15:45 |
Garak
|
Erick Galinkin,Leon Dercz . . . |
14:00 - 15:45 |
XenoboxX - Hardware Sandbox Toolkit
|
Cesare Pizzi |
14:00 - 15:45 |
Hopper - Distributed Fuzzer
|
Luciano Remes,Wade Cappa |
| | |
Saturday |
|
|
10:00 - 11:45 |
Maestro
|
Chris Thompson |
10:00 - 11:45 |
Tempest
|
Kirk Trychel |
10:00 - 11:45 |
5Ghoul Framework - 5G NR Attacks & 5G OTA Fuzzing
|
Matheus Eduardo Garbelini . . . |
10:00 - 11:45 |
Testbed Virtual Factory
|
Borja Pintos Castro,Camil . . . |
10:00 - 11:45 |
Cyber Security Transformation Chef (CSTC)
|
Florian Haag,Matthias Gö . . . |
10:00 - 11:45 |
MITRE Caldera
|
Mark Perry,Rachel Murphy |
12:00 - 13:45 |
Open Hardware Design for BusKill Cord
|
Melanie Allen |
12:00 - 13:45 |
The Metasploit Framework v6.4
|
Jack Heysel,Spencer McInt . . . |
12:00 - 13:45 |
CODASM - Hiding Payloads in Plain .text
|
Moritz Laurin Thomas |
12:00 - 13:45 |
GC2 - The First Serverless Command & Control
|
Lorenzo Grazian |
12:00 - 13:45 |
MPT - Pentest in Action
|
Jyoti Raval |
12:00 - 13:45 |
FACTION
|
Josh Summitt |
14:00 - 15:45 |
MITRE Caldera for OT
|
Blaine Jeffries,Devon Col . . . |
14:00 - 15:45 |
Vovk - Advanced YARA Rule Generator v2.0
|
Benjamyn Whiteman,Vishal . . . |
14:00 - 15:45 |
TheAllCommander 2.0
|
Matthew Handy |
14:00 - 15:45 |
Drop-Pi
|
Doug Kent,Robert Ditmer |
14:00 - 15:45 |
Moriarty
|
Anthony “Coin” Rose,J . . . |
14:00 - 15:45 |
Farming Ndays with GreyNoise
|
Andrew Morris |
PDT Times |
Title |
speaker |
| | |
Wednesday |
|
|
00:00 - 00:59 |
Important Message
|
|
11:00 - 11:59 |
The Unofficial DEF CON Shoot
|
|
17:00 - 05:59 |
Linecon
|
|
| | |
Thursday |
|
|
05:00 - 07:59 |
Defcon.run
|
|
07:00 - 01:59 |
Lost & Found
|
|
08:00 - 19:59 |
Human Registration Open
|
|
08:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
15:00 - 20:59 |
Toxic BBQ
|
|
| | |
Friday |
|
|
05:00 - 07:59 |
Defcon.run
|
|
06:00 - 06:59 |
CycleOverride DEF CON Bike Ride
|
|
08:00 - 19:59 |
Human Registration Open
|
|
08:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
08:00 - 01:59 |
Lost & Found
|
|
08:15 - 10:30 |
️ISSCON
|
|
10:00 - 17:59 |
Vendors and Exhibitors Open
|
|
10:00 - 17:59 |
All content areas generally open
|
|
10:00 - 17:59 |
Hard Hat Brigade - Community Space Open
|
|
10:00 - 17:59 |
Hardware Hacking and Soldering Skills Village Open . . .
|
|
10:00 - 17:59 |
Robo Sumo
|
|
10:00 - 17:59 |
HHV Rube Goldberg Machine
|
|
10:00 - 17:59 |
WISP Community & Inclusion Room
|
|
10:00 - 10:59 |
Welcome / Badge & Swag Pick Up
|
|
10:00 - 17:59 |
Game Hacking Community Activities & CTF
|
|
10:00 - 17:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 15:59 |
Retro Repair
|
|
10:00 - 15:59 |
Dumb Terminal fun
|
|
10:00 - 15:59 |
Small scale LAN party
|
|
10:00 - 15:59 |
Show & Tell
|
|
10:00 - 17:59 |
LHC Meshtastic Activities and CTF
|
|
10:00 - 17:59 |
Egor's Keyboard Corner
|
|
10:00 - 12:59 |
Resume Reviews
|
|
10:00 - 17:59 |
Lonely Hackers Club Community Room Open
|
|
10:00 - 17:59 |
LHC's Unofficial Sticker Swap Table
|
|
10:00 - 10:59 |
Be Latino in Cybersecurity on markets outside LATA . . .
|
Salvador Mendonza,Lenin A . . . |
10:00 - 17:59 |
Open Events for DCNextGen
|
|
11:00 - 11:59 |
Intro to Circuit Python (Badge class level 1)
|
|
11:30 - 17:30 |
Book Signings
|
|
11:00 - 11:59 |
Prendendo Fraudadores utilizando Técnicas de Red . . .
|
Gustavo Roberto |
12:00 - 12:45 |
Bridging the Gap: How the American Legion Provides . . .
|
Chris Davis |
12:00 - 12:30 |
SQLi to Root Access: Exploiting a ISP infrastructu . . .
|
Ignacio Daniel Navarro |
12:30 - 13:30 |
Mexicans Together - Un vistazo a recientes investi . . .
|
Ashley Hiram M.,Isabel Ma . . . |
13:00 - 13:45 |
No CTF? No Problem! Leveraging Alternate Reality G . . .
|
John "2PAC" Smithberger |
13:30 - 13:59 |
De Escudo a Espada: Cómo un Antivirus Facilitó e . . .
|
R4v3n Bl4ck |
14:00 - 14:59 |
Hard Hat Brigade Maker Panel
|
|
14:00 - 15:59 |
Friendship Bracelet Making
|
|
14:00 - 14:59 |
Hack the Badge (Badge class level 2)
|
|
14:00 - 17:59 |
Resume Reviews
|
|
14:00 - 14:45 |
Book Signing: Visual Threat Intelligence: An Illus . . .
|
Thomas Roccia |
14:00 - 14:59 |
Amenaza persistente: UXHIL y la propagación de UR . . .
|
Jesika Juarez,Armando Agu . . . |
15:00 - 17:59 |
C2Society / DC702 Intro to CTFs
|
|
15:00 - 15:45 |
Generative AI vs Crusty NCO
|
Col Travis Hartman |
15:00 - 15:59 |
Removing OPSEC from Cyber Predators and Threat Act . . .
|
Thiago Bordini |
16:30 - 17:30 |
So you wanna know how to make badges
|
c0ldbru |
16:00 - 17:59 |
Name the Noob
|
|
16:00 - 16:30 |
Structural Insights: PDF Analysis for Detecting an . . .
|
Filipi Pires |
16:30 - 16:59 |
Chatbots for Cybersecurity
|
Lenin Alevski |
17:00 - 17:59 |
Cybersecurity Overview over LATAM- Skills, Challe . . .
|
Leonardo Pigñer,Katherin . . . |
17:30 - 21:30 |
Ask the EFF
|
|
20:00 - 23:59 |
DEF CON Movie Night
|
|
21:00 - 01:59 |
Capitol Technology University (CTU)
|
|
| | |
Saturday |
|
|
05:00 - 07:59 |
Defcon.run
|
|
08:00 - 18:59 |
Human Registration Open
|
|
08:00 - 01:59 |
Lost & Found
|
|
09:00 - 14:59 |
Merch (formerly swag) Area Open -- README
|
|
10:00 - 17:59 |
All content areas generally open
|
|
10:00 - 17:59 |
Vendors and Exhibitors Open
|
|
10:00 - 17:59 |
Hard Hat Brigade - Community Space Open
|
|
10:00 - 17:59 |
HHV Rube Goldberg Machine
|
|
10:00 - 17:59 |
Robo Sumo
|
|
10:00 - 17:59 |
Hardware Hacking and Soldering Skills Village Open . . .
|
|
10:00 - 17:59 |
WISP Community & Inclusion Room
|
|
10:00 - 10:59 |
Intro to Circuit Python (Badge class level 1) (Ove . . .
|
|
10:00 - 17:59 |
Game Hacking Community Activities & CTF
|
|
10:00 - 17:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 15:59 |
Show & Tell
|
|
10:00 - 15:59 |
Retro Repair
|
|
10:00 - 15:59 |
Dumb Terminal fun
|
|
10:00 - 15:59 |
Small scale LAN party
|
|
10:00 - 17:59 |
LHC Meshtastic Activities and CTF
|
|
10:00 - 17:59 |
Egor's Keyboard Corner
|
|
10:00 - 12:59 |
Resume Reviews
|
|
10:00 - 17:59 |
Lonely Hackers Club Community Room Open
|
|
10:00 - 17:59 |
LHC's Unofficial Sticker Swap Table
|
|
10:30 - 11:30 |
Protecting the Backbone of Our Modern World
|
Soledad Antelada Toledano |
10:00 - 10:30 |
Case Study: Hacking Smart Lock For Fun and Profit
|
Cesar Ortega Ortega |
10:00 - 17:59 |
Open Events for DCNextGen
|
|
11:00 - 11:59 |
Hack the Badge (Badge class level 2) (Overflow if . . .
|
|
11:30 - 12:30 |
Cybersecurity for Emerging Tech (panelists would i . . .
|
Paulino Calderon |
12:00 - 12:59 |
Austin School For The Driven
|
|
12:00 - 12:45 |
3D Printing My Way to Sanity: The Self-Funding Hob . . .
|
Steve Dossey |
12:30 - 13:30 |
Threats in Space: The Dangerous Rise of GNSS Attac . . .
|
Isabel Manjarrez |
13:30 - 14:15 |
How we built our REDACTED THING this year, 5n4ck3y . . .
|
AND!XOR |
13:00 - 13:45 |
Don't go too far… your job is not done!
|
Chris Cleary |
13:30 - 14:30 |
DarkGate: Cazando a la amenaza y exponiendo su inf . . .
|
Nestor Sánchez |
14:00 - 14:59 |
Color Blasted Badge Making: How Hard Could It Be ?
|
Abhinav Panda,Bradán Lan . . . |
14:00 - 14:59 |
Hard Hat Brigade - Q&A Panel
|
|
14:00 - 15:45 |
Friendship Bracelet Making
|
|
14:00 - 15:59 |
DC Book Club Discussion
|
|
14:00 - 17:59 |
Resume Reviews
|
|
14:00 - 14:45 |
Navigating Bureaucracy: Strategies for a Post-Mili . . .
|
Nia Luckey |
14:30 - 14:59 |
Make all the things - Construa seus próprios "bri . . .
|
Christiane Borges Santos |
15:45 - 15:59 |
WISP Group Photo
|
|
15:00 - 17:59 |
Name the Noob
|
|
15:00 - 15:45 |
Cybersecurity for Veterans: Bridging the Gap from . . .
|
Matt James |
15:00 - 15:30 |
Ransomware B-Sides: Los ransoms que nunca triunfar . . .
|
Mauro Eldritch,Cybelle Ol . . . |
15:30 - 16:30 |
Haciendo visible lo invisible: Observabilidad y tr . . .
|
Gastón Aznarez,Octavio G . . . |
16:00 - 17:59 |
Peer-to-Peer Mentoring and Networking with optiona . . .
|
|
16:30 - 17:59 |
How is GenIA Impacting Cybersecurity: The good, Th . . .
|
Marco Figueroa |
18:30 - 21:30 |
EFF Tech Trivia
|
|
20:00 - 23:59 |
DEF CON Movie Night
|
|
21:00 - 01:59 |
Intigriti Hack Shack
|
|
| | |
Sunday |
|
|
05:00 - 07:59 |
Defcon.run
|
|
08:00 - 15:59 |
Human Registration Open
|
|
08:00 - 14:59 |
Lost & Found
|
|
10:00 - 12:59 |
All content areas generally open
|
|
10:00 - 12:59 |
Vendors and Exhibitors Open
|
|
10:00 - 12:59 |
Hard Hat Brigade - Community Space Open
|
|
10:00 - 12:59 |
Robo Sumo
|
|
10:00 - 12:59 |
HHV Rube Goldberg Machine
|
|
10:00 - 12:59 |
Hardware Hacking and Soldering Skills Village Open . . .
|
|
10:00 - 12:59 |
WISP Community & Inclusion Room
|
|
10:00 - 10:59 |
Secure From Scatch
|
|
10:00 - 10:59 |
Game Hacking Community Activities & CTF
|
|
10:00 - 12:59 |
Shell On Demand Appliance Machine (S.O.D.A. Machin . . .
|
|
10:00 - 12:59 |
Dumb Terminal fun
|
|
10:00 - 12:59 |
Retro Repair
|
|
10:00 - 12:59 |
Small scale LAN party
|
|
10:00 - 12:59 |
Show & Tell
|
|
10:00 - 12:59 |
LHC Meshtastic Activities and CTF
|
|
10:00 - 11:59 |
Egor's Keyboard Corner
|
|
10:00 - 12:59 |
Lonely Hackers Club Community Room Open
|
|
10:00 - 11:59 |
LHC's Unofficial Sticker Swap Table
|
|
10:00 - 10:59 |
Threat Hunting + Intelligence, capabilities, skill . . .
|
Thiago Bordini,Mauro Eldr . . . |
10:00 - 12:59 |
Open Events for DCNextGen
|
|
11:00 - 11:59 |
Detección de Vulnerabilidades mediante Instrument . . .
|
Asher Davila |
12:00 - 12:59 |
Hard Hat Brigade - Group Photo and People's Choice . . .
|
|
12:00 - 12:59 |
DCNextGen Awards and Closing Ceremony
|
|
12:00 - 12:59 |
Game Hacking Community Closing Talk & Awards Cerem . . .
|
|
12:00 - 12:59 |
Abusando de Bitlocker para secuestrar información . . .
|
Eduardo Chavarro Ovalle |
13:00 - 13:59 |
Jeitinho Cibernético: A Convergência da Seguran . . .
|
Ueric Melo |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
11:00 - 11:50 |
The Art of Critical Thinking through an Adversaria . . .
|
Ben "NahamSec" Sadeghipou . . . |
12:00 - 12:50 |
Mining for Abandoned Gold in DNS
|
Matt Pawloski |
12:00 - 12:50 |
Modern Red Teaming: macOS, K8s, and Cloud
|
Chris Gates,int eighty (o . . . |
12:00 - 12:50 |
Abusing DevOps to Pivot Between Cloud and On-Prem
|
Colbert Zhu,Tom Porter |
12:00 - 12:50 |
Red Team Terraform Workshop
|
Moses Frost |
12:00 - 12:50 |
Bypassing Corporate controls on Mac Devices
|
Adwiteeya Agrawal,Ian Fos . . . |
13:00 - 16:59 |
DC NextGen / Youth Challenge Area at Red Team Vill . . .
|
RTV Staff |
13:00 - 13:50 |
Red Goes Purple: Executing the Attack Path
|
Omar Santos,Graham Helton . . . |
13:00 - 13:50 |
Adversary Simulation: Using Blue Eyes to See Red
|
Fred Wilmot,Sebastien Tri . . . |
13:00 - 13:50 |
Simulated Drone Hacking
|
Nick Aleks |
13:00 - 14:50 |
Badge Cloning: A Penetration Tester's Guide to Ca . . .
|
Travis Weathers,Ralph May |
14:00 - 14:50 |
Physical Security - Bypassing Access Control Syste . . .
|
Andrew Johnson |
14:00 - 14:50 |
Level UP OSINT
|
Mishaal Khan |
14:00 - 15:50 |
Modifying Impacket for Better OpSec
|
Ryan O'Donnell |
15:00 - 15:50 |
Threat Emulation 101
|
Trey Bilbrey |
15:00 - 16:50 |
New Skill Unlocked: C2 Infrastructure Automation
|
Josh Huff,Robert Pimentel |
15:00 - 15:50 |
GHOST in the Model: Generating AI-Assisted Threat . . .
|
Sam Cosentino |
16:00 - 16:50 |
Mac-n-Cheese: How to Cook Up Delicious Electron Te . . .
|
Roberto Soares |
16:00 - 16:50 |
Thinking Outside the Kube - Finding and Exploiting . . .
|
Tomer Peled |
16:00 - 16:50 |
Building Your Red-Teaming Co-Pilot: Navigating the . . .
|
Gaspard Baye |
16:00 - 16:59 |
Blue Goes Purple: Purple Teams for Fun and Profit . . .
|
Catherine J. Ullman,Jake . . . |
| | |
Saturday |
|
|
10:00 - 10:50 |
The Hybrid Horizon: Unleashing the Power of Azure . . .
|
Chirag Savla,Raunak Parma . . . |
10:00 - 10:50 |
BOAZ, Yet Another layered Evasion Tool: Unveiling . . .
|
Thomas X Meng |
10:00 - 10:50 |
DoH Deception: Evading ML-Based Tunnel Detection w . . .
|
Emanuel Valente |
10:00 - 10:50 |
Physical Red Teaming for Offensive Cyber Teams
|
Shawn Abelson,Ana Aslanis . . . |
10:00 - 10:50 |
Hacking the Skies – Satellite Red Teaming
|
Agostino Panico |
11:00 - 11:50 |
OSINT for Hackers
|
Lee McWhorter,Sandra Stib . . . |
11:00 - 11:50 |
Securing the Future with CoSAI: Identified Technic . . .
|
Omar Santos,Dan McInerney . . . |
11:00 - 11:50 |
Developing Evilginx Phishlets
|
Michael Donley |
11:00 - 11:50 |
RustOps
|
Jose Plascencia |
11:00 - 11:50 |
Island Hoping: Move from LOLBins to Living off Lan . . .
|
Moses Frost |
12:00 - 16:59 |
DC NextGen / Youth Challenge Area at Red Team Vill . . .
|
RTV Staff |
12:00 - 12:50 |
Insert coin: Hacking arcades for fun
|
Ignacio Daniel Navarro |
12:00 - 12:50 |
Developing Better Payloads with Automated Testing
|
Nick McClendon |
12:00 - 12:50 |
Tunnel Vision: Exploring VPN Post-Exploitation Tec . . .
|
Ori David |
13:00 - 14:50 |
An Operator's Guide: Hunting SCCM in the Real Worl . . .
|
Garrett Foster,Zachary St . . . |
13:00 - 13:50 |
macOS Red Team on Corporate Scenarios
|
Ricardo L0gan |
13:00 - 13:50 |
Building Surgical Implants: A Comprehensive Guide . . .
|
John Rodriguez |
14:00 - 14:50 |
Cloud Offensive Breaches: The Graph-Based Exploita . . .
|
Filipi Pires |
14:00 - 14:50 |
Tempest c2: Use and Design
|
Kirk Trychel |
14:00 - 14:50 |
Combining Uncensored and Censored LLMs for Ransomw . . .
|
Muhammad Mudassar Yamin |
15:00 - 15:50 |
The Curious Case of Stealer Logs: Access & Espiona . . .
|
Eric Clay,Nick Ascoli |
15:00 - 15:50 |
Introduction to Kubernetes common attack technique . . .
|
Lenin Alevski |
15:00 - 15:50 |
Using Retrieval Augmented Generation (RAG), Langch . . .
|
Omar Santos |
15:00 - 16:59 |
Learning the New Amass Collection Engine
|
Jeff Foley |
16:00 - 16:50 |
Pipeline Pandemonium: How to Hijack the Cloud and . . .
|
Blake Hudson |
16:00 - 16:50 |
Hacking Policy and Policy Hacking - A Red-Teamer H . . .
|
Amit Elazari |
16:00 - 16:50 |
Bespoke C2s are coming of age.
|
David "Icer" Maynor |
| | |
Sunday |
|
|
10:00 - 11:50 |
DC NextGen / Youth Challenge Area at Red Team Vill . . .
|
RTV Staff |
10:00 - 10:50 |
From Runners to IdP Admin
|
Sim Cher Boon |
10:00 - 10:50 |
From Network to Network: Hands-On Pivoting Techniq . . .
|
Francisco Canteli |
10:00 - 10:50 |
IDOR in Financial Operations
|
Ilkin Javadov |
10:00 - 10:50 |
Hacking Processes: Introducing the Redteaming Proc . . .
|
Alex Gonzalez,Bobby R |
10:00 - 10:59 |
The Village Peoples' Panel - What Really Goes On i . . .
|
Justin,Matt Mayes,muteki, . . . |
11:00 - 11:50 |
The SIEMless Hack: Rewriting Reality with Log Inje . . .
|
Özgün Kültekin |
11:00 - 11:50 |
Threat hunting like a pentester
|
Ronald Gonzalez |
11:00 - 11:50 |
Red Team Infrastructure Setup and Automation
|
Aravind Prakash,Arun Nair . . . |
11:00 - 11:50 |
Supercharge your vuln finding workflow with automa . . .
|
Erik Hunstad,Alberto Rodr . . . |
PDT Times |
Title |
speaker |
| | |
Thursday |
|
|
09:00 - 12:59 |
Sold Out - Offensive SCCM: Abusing Microsoft's C2 . . .
|
Chris Thompson,Duane Mich . . . |
09:00 - 12:59 |
Sold Out - Med Team vs Red Team: Intro into Medica . . .
|
Alex Delifer,Michael "v3g . . . |
09:00 - 12:59 |
Sold Out - Supercharge SAST: Semgrep Strategies fo . . .
|
Arjun Gopalakrishna,Gauta . . . |
09:00 - 12:59 |
Sold Out - Dissecting Malware for Defense - Crafti . . .
|
Francisco Perdomo,Josh St . . . |
09:00 - 12:59 |
Sold Out - Tracing The Pain Away - Practical Binar . . .
|
Sean ,Serrgei Frankoff |
14:00 - 17:59 |
Sold Out - Flipping the Coin: Red and Blue Teaming . . .
|
Angus Strom,Troy Defty |
14:00 - 17:59 |
Sold Out - Long Live Empire: A C2 Workshop for Mod . . .
|
Jake “Hubble” Krasnov . . . |
14:00 - 17:59 |
Sold Out - 64-bit Intel Assembly Language Programm . . .
|
Wesley McGrew |
14:00 - 17:59 |
Sold Out - Dodging the EDR Bullet: A Workshop on M . . .
|
Dimitri Di Cristofaro,Gio . . . |
14:00 - 17:59 |
Sold Out - Hide your kids, turn off your Wi-Fi, th . . .
|
James Hawk |
| | |
Friday |
|
|
09:00 - 12:59 |
Sold Out - Traumatic Library Loading : If you want . . .
|
Yoann Dequeker |
09:00 - 12:59 |
Sold Out - Finding the Needle: An Introduction to . . .
|
Kathy Zhu,Troy Defty |
09:00 - 12:59 |
Sold Out - Whitebox Web Exploit Development
|
Cale Smith,Priyanka Joshi |
09:00 - 12:59 |
Sold Out - Small Choices, Global Repercussions: A . . .
|
Isabel Straw,Jorge Aceved . . . |
09:00 - 12:59 |
Sold Out - Machine Learning for N00bs
|
Elizabeth Biddlecome,Irvi . . . |
14:00 - 17:59 |
Sold Out - Ghidra Analysis & Automation Masterclas . . .
|
Max "Libra" Kersten |
14:00 - 17:59 |
Sold Out - Learning to Hack Bluetooth Low Energy w . . .
|
Alek Amrani,Ryan Holeman |
14:00 - 17:59 |
Sold Out - Hack the connected plant!
|
Alexandrine Torrents,Arna . . . |
14:00 - 17:59 |
Sold Out - From an attacker's lair to your home: A . . .
|
Sebastian Tapia De la tor . . . |
14:00 - 17:59 |
Sold Out - Dissecting and Defeating Ransomware's E . . .
|
Aaron Rosenmund,Josh Stro . . . |
| | |
Saturday |
|
|
09:00 - 12:59 |
Sold Out - Sharp Security from All Angles: Masteri . . .
|
Or Sahar,Yariv Tal |
09:00 - 12:59 |
Sold Out - Hacking The Metal: A Spark of Intellige . . .
|
eigentourist |
09:00 - 12:59 |
Sold Out - Capture the Flag 101
|
Micah Silverman |
09:00 - 12:59 |
Sold Out - Hacking Apps on Salesforce
|
Rodney David Beede |
09:00 - 12:59 |
Sold Out - Industrial Control Systems: how to secu . . .
|
Alexandrine Torrents |
14:00 - 17:59 |
Sold Out - Email Detection Engineering and Threat . . .
|
Alfie Champion,Josh Kamdj . . . |
14:00 - 17:59 |
Sold Out - Crash Course in Physical Access Control . . .
|
Lorenzo Pedroncelli,Randy . . . |
14:00 - 17:59 |
Sold Out - Playing with RFID
|
Vinnie "kernelpaniek" Van . . . |
14:00 - 17:59 |
Sold Out - Master Class: Hands-On Machine Learning . . .
|
Solomon Sonya |