PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
Adversary Village - Village Open
|
|
10:00 - 17:59 |
Choose-your-own-Adversary-Adventure Tabletop Game
|
|
10:00 - 10:59 |
Adversary Village kick-off keynote panel
|
Marcus J.carey,Sanne Maas . . . |
11:00 - 16:59 |
Adversary Simulator Booth - Adversary attack simul . . .
|
|
11:00 - 16:59 |
Breach and attack simulation exercises - Guided br . . .
|
|
11:00 - 16:59 |
Cyberjutsu Path to a Digital Martial Art
|
|
11:00 - 12:59 |
From Intel to Emulation: Turning Threat Actor Tren . . .
|
Roxey Davis |
11:00 - 11:45 |
From adversarial to aligned, redefining purple tea . . .
|
Adam Pennington,Sydney Ma . . . |
13:00 - 14:59 |
Be The Threat!
|
Trey Bilbrey |
15:00 - 16:59 |
Cyberjutsu Path to a Digital Martial Art
|
Alexandre Cabrol-Perales, . . . |
15:00 - 15:45 |
Adversaries at War: Tactics, technologies, and les . . .
|
Gregory Carpenter,Barb Hi . . . |
15:45 - 16:30 |
Adversarial mindset, thinking like an attacker is . . .
|
Abhijith "Abx" B R,Keenan . . . |
17:00 - 17:59 |
Cultivating the Adversarial Mindset, Offensive Cyb . . .
|
Len Noe,Chris Glanden,Fil . . . |
17:00 - 17:30 |
Of Stochastic Parrots and Deterministic Predators: . . .
|
Bobby Kuzma,Michael Odell |
| | |
Saturday |
|
|
10:00 - 17:59 |
Adversary Village - Village Open
|
|
10:00 - 17:59 |
Choose-your-own-Adversary-Adventure Tabletop Game
|
|
10:00 - 12:59 |
Cyberjutsu Path to a Digital Martial Art
|
|
10:00 - 11:59 |
MITRE iCaldera: Purple Teaming in the Future
|
Ethan Michalak,Mark Perry |
11:00 - 16:59 |
Adversary Simulator Booth - Adversary attack simul . . .
|
|
11:00 - 11:30 |
Malware in the gist: How malicious packages on npm . . .
|
Paul "6mile" McCarty |
12:00 - 12:59 |
Modern defenses, ancient problems! Why adversaries . . .
|
Niru Ragupathy,Charlie Wa . . . |
12:30 - 12:59 |
Here and Now: Exploiting the Human Layer at the Ri . . .
|
Daniel Isler |
13:00 - 16:59 |
Breach and attack simulation exercises - Guided br . . .
|
|
13:00 - 14:59 |
Using Evil Human Digital Twins for Fun and Profit
|
Matthew Canham |
14:00 - 14:30 |
Blurred Lines of Cyber Threat Attribution: The Evo . . .
|
Seongsu Park |
15:00 - 16:59 |
Malware Attack in PDFs: An Adversary Real Attack A . . .
|
Filipi Pires |
15:30 - 15:59 |
Operational Twilight: APTs, OT, and the geopolitic . . .
|
Cybelle Oliveira |
15:00 - 15:30 |
Countering Forensics Software by Baiting Them
|
Weihan Goh,Joseph Lim,Isa . . . |
| | |
Sunday |
|
|
10:00 - 13:59 |
Adversary Village - Village Open
|
|
10:00 - 11:59 |
Breach and attack simulation exercises - Guided br . . .
|
|
10:00 - 11:59 |
Adversary Simulator Booth - Adversary attack simul . . .
|
|
10:00 - 11:59 |
Choose-your-own-Adversary-Adventure Tabletop Game
|
|
10:00 - 11:59 |
Cyberjutsu Path to a Digital Martial Art
|
|
10:00 - 10:59 |
Modern warfare and nation state sponsored cyber th . . .
|
Gordon "Fizzle" Boom,Bret . . . |
11:00 - 11:59 |
Just a TIP: DIY Your First Threat and Adversary In . . .
|
Ashley Stryker |
11:00 - 11:30 |
Red Russians: How Russian APT groups closely follo . . .
|
Will Thomas |
12:00 - 12:30 |
TotalTest 2.Oh!: Unleashing a Testing Program to B . . .
|
Nebu Varghese |
12:00 - 12:30 |
Letthemin: Facilitating High-Value Purple Teams Us . . .
|
Sarah Hume |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:30 - 11:30 |
AI Supply Chain: Generating AI SBOMs for Hugging F . . .
|
Helen Oakley |
10:15 - 12:15 |
Context & Cringe: Bringing Privacy into Threat Mod . . .
|
AviD,Kim Wuyts |
10:00 - 17:59 |
Fix the Flag Wargame (Day 1)
|
|
10:20 - 10:50 |
Scaling Bug Hunting in Open Source Software
|
Kyle Kelly |
11:00 - 11:30 |
The Death of XSS? Browser Security Features that E . . .
|
Javan Rasokat |
11:40 - 12:10 |
From Tests to Targets: Expanding DAST with Seleniu . . .
|
Sara Martinez Giner |
11:00 - 12:59 |
Artificially Insecure
|
Ken "cktricky" Johnson |
11:00 - 12:59 |
Critical Draw - How to Build a Culture of Security . . .
|
Vincent Cannone |
11:00 - 12:59 |
Finite State IoT Pentest Blitz
|
Larry Pesce |
12:00 - 12:59 |
Static Analysis Hero - Security Code Reviews for P . . .
|
Dustin Born,Matthias Göh . . . |
12:20 - 15:20 |
A Taste of Chrome V8 Exploitation
|
Hoseok Lee,Hyaesun Ji,Jae . . . |
12:20 - 12:50 |
Abusing the Rules: Detect and Defend Against Busin . . .
|
Antoine Carossio,Tristan . . . |
13:30 - 14:30 |
Introduction To SeVa [Secret Validator] - Secrets . . .
|
Leon Denard,Pramod Rana |
13:40 - 14:10 |
The AppSec Poverty Line: Minimal Viable Security
|
Tanya "SheHacksPurple" Ja . . . |
13:00 - 13:30 |
CVE Crisis: State of the Vulnerability Disclosure . . .
|
jgamblin |
13:00 - 14:59 |
Vulnerability Hunt - The Snippets Edition
|
Darren Meyer,Raphael Silv . . . |
13:00 - 14:59 |
Finite State IoT Pentest Blitz
|
Larry Pesce |
13:00 - 14:59 |
Color with Friends & Smallstep
|
Carl Tashian,Hunter Hawke |
14:20 - 14:50 |
Train How We Fight: Finding CVEs to Enhance Compet . . .
|
m4lwhere |
15:00 - 15:59 |
Inside KnoxSpy: Real-Time Visibility into MDM-Secu . . .
|
Subho Halder |
15:30 - 17:59 |
Mastering Frontend Security: A Hands-On Workshop t . . .
|
Aaron Shim,Mayra Robles |
15:00 - 15:30 |
Plug at Your Own Risk: End-to-End Security Analysi . . .
|
RoguePacket,RootRouge |
15:40 - 16:10 |
Pwn My Ride: Jailbreaking Cars with CarPlay
|
Avi Lumelsky,Gal Elbaz |
15:00 - 16:59 |
NPM Imposters - The malware detection card game
|
Mackenzie Jackson |
15:00 - 16:59 |
The Upgrade Lottery: The Odds Are Against You
|
Jenn Gile |
16:20 - 16:50 |
Beyond Assistants: Securing Agentic AI Systems and . . .
|
|
17:00 - 17:30 |
Red Teaming AI: How to Stress-Test LLM-Integrated . . .
|
Nnenna Ndukwe |
| | |
Saturday |
|
|
10:30 - 11:30 |
Catch the Flow: Securing CI/CD with Flowlyt
|
Arif,HK,Nandan Gupta,kvpr . . . |
10:00 - 12:59 |
Hackable.sol - Do you know how to hack smart contr . . .
|
Davide |
10:00 - 17:59 |
Fix the Flag Wargame (Day 2)
|
|
10:40 - 11:10 |
Cross-Site WebSocket Hijacking in 2025: Exploitati . . .
|
hyperreality |
10:00 - 10:30 |
Beyond Vibe Coding: Building Reliable AI AppSec To . . .
|
Emily Choi-Greene |
11:20 - 11:50 |
r/DIY: How Do We Build Our Own Code Scanning Platf . . .
|
Charan Akiri,Christopher . . . |
11:00 - 12:59 |
Critical Draw - How to Build a Culture of Security . . .
|
Vincent Cannone |
11:00 - 12:59 |
The Upgrade Lottery: The Odds Are Against You
|
Jenn Gile |
11:00 - 12:59 |
Color with Friends & Smallstep
|
Carl Tashian,Hunter Hawke |
12:00 - 12:59 |
Introduction to CICDGuard - Orchestrating visibili . . .
|
Pramod Rana |
12:40 - 13:10 |
Breaking the CI/CD Chain: Security Risks in GitHub . . .
|
Iggy,Michael Goberman,Sha . . . |
12:00 - 12:30 |
AI vs. the APTs: Using LLMs to discover malware an . . .
|
Mackenzie |
13:30 - 14:30 |
Exposor - A Contactless reconnaissance tool using . . .
|
Abdulla "Abu" Abdullayev |
13:15 - 15:15 |
Container Escapes 101
|
some-natalie |
13:20 - 13:50 |
The AppSec Program I Regret Building
|
Thomas Jost |
13:00 - 14:59 |
Critical Draw - How to Build a Culture of Security . . .
|
Vincent Cannone |
13:00 - 14:59 |
Vulnerability Hunt - The Snippets Edition
|
Darren Meyer,Raphael Silv . . . |
14:40 - 15:10 |
Hijacking AI Agents with ChatML Role Injection
|
Anit Hajdari,Armend Gashi . . . |
14:00 - 14:30 |
Memory Attacks in a Stateless World
|
Om Narayan,Rashmi |
15:00 - 15:59 |
PyIntruder: Customizable, CLI-Native Web Fuzzer
|
Nandan Gupta,Sagnik Halda . . . |
15:30 - 17:45 |
Reverse Engineering Modern Websites - Practical De . . .
|
Abraham De Leon Gutierrez . . . |
15:20 - 15:50 |
Plugins Gone Rogue: Attacking Developer Environmen . . .
|
Raphael Silva |
15:00 - 16:59 |
Artificially Insecure
|
Ken "cktricky" Johnson |
15:00 - 16:59 |
Color with Friends & Smallstep
|
Carl Tashian,Hunter Hawke |
15:00 - 16:59 |
Finite State IoT Pentest Blitz
|
Larry Pesce |
16:00 - 16:59 |
CyberChef like automation within BurpSuite - Let . . .
|
Matthias Göhring |
16:00 - 16:30 |
Desktop Applications: Yes, We Still Exist in the E . . .
|
Uday |
16:40 - 17:35 |
State of (Absolute) AppSec
|
Seth Law,Jason "jhaddix" . . . |
| | |
Sunday |
|
|
10:00 - 10:59 |
Spotter – Universal Kubernetes Security Engine
|
Madhu "madhuakula" Akula |
10:00 - 12:59 |
AppSec in the Shadows: Adversarial Tradecraft in A . . .
|
Roshan Piyush,Soujanya Na . . . |
10:00 - 11:45 |
Fix the Flag Wargame (Day 3)
|
|
10:20 - 10:50 |
Exploitable In The Wild CVE Appears! But Should We . . .
|
Liad Cohen,Moshe Siman To . . . |
11:30 - 12:30 |
Static Analysis Hero - Security Code Reviews for P . . .
|
Matthias Göhring |
11:50 - 11:59 |
CTF Award Ceremony
|
|
11:00 - 11:30 |
Chained Exploits: The Silent Takeover
|
Monish Alur Gowdru,cyberm . . . |
11:40 - 12:10 |
7 Vulns in 7 Days: Breaking Bloatware Faster Than . . .
|
Leon "leonjza" Jacobs |
11:00 - 12:59 |
NPM Imposters - The malware detection card game
|
Mackenzie Jackson |
11:00 - 12:59 |
Vulnerability Hunt - The Snippets Edition
|
Darren Meyer,Raphael Silv . . . |
12:00 - 12:59 |
SBOM Meetup
|
Erez Yalon,Allan Friedman |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 11:59 |
AI Red Team
|
Olesya Menon |
12:00 - 13:59 |
OpenAI: Meet our security research team!
|
Ian Brelinsky,Matthew Kni . . . |
12:30 - 13:15 |
AI in OT Should be Cheaper Than in IT
|
Daryl Haegley |
13:30 - 13:59 |
Driving Tech Forward: A Fireside Chat with Perri A . . .
|
Alexei Bulazel,Perri Adam . . . |
14:00 - 15:59 |
Microsoft Security with AI
|
David Caswell,Robert Soli . . . |
14:05 - 14:35 |
The Path Towards Self-Defending Systems
|
Heather Adkins |
14:40 - 15:20 |
From Data Security to Discovery: How ARPA-H is Usi . . .
|
Jennifer Roberts,Andy Kil . . . |
15:25 - 15:40 |
Autonomous System Demo
|
Mike Walker |
15:45 - 16:15 |
An update from the LLM scaling laws frontier
|
Jason Clinton |
16:00 - 17:50 |
Claude for Defenders: Beyond Automation to Augment . . .
|
Jackie Bow |
16:20 - 16:59 |
Orchestrating the Reasoners
|
Ken Harding,Jeff Casavant . . . |
17:00 - 17:30 |
Challenges and Lessons from the AIxCC Journey: A P . . .
|
Xinyu Xing |
17:30 - 17:59 |
“Robo Duck” Architecture
|
Tyler Nighswander |
| | |
Saturday |
|
|
10:00 - 11:59 |
Sec-Gemini
|
Dominik Swierad,Alex Kant . . . |
10:30 - 11:15 |
Applying DevSecOps Lessons to MLSecOps
|
Christopher Robinson,Sara . . . |
11:30 - 11:59 |
Impossible Until It Isn’t: DARPA, Disruption, an . . .
|
Stephen Winchell,Dr. Kath . . . |
12:00 - 13:59 |
Securing the Future with Claude
|
Newton Cheng |
12:10 - 12:50 |
The CMS.gov OSPO One Year Later: Launching the Age . . .
|
Remy DeCausemaker,Keith B . . . |
13:00 - 13:30 |
ARTIPHISHELL Intelligence
|
Wil Gibbs,Lukas Dresel |
13:40 - 14:10 |
All You Need Is a Fuzzing Brain: A Retrospective
|
Jeff Huang,Ze Sheng,Qingx . . . |
14:00 - 15:59 |
Microsoft Security with AI
|
David Caswell,Jared Graff . . . |
14:20 - 14:50 |
Testing 1, 2, 3 Testing: Automatically Finding and . . .
|
Dr. David Musliner,Dr. Ma . . . |
15:00 - 15:45 |
Security Research: OpenAI's reflections and direct . . .
|
Ian Brelinsky,Matthew Kni . . . |
16:00 - 17:59 |
OpenAI: Meet our security research team!
|
Ian Brelinsky,Matthew Kni . . . |
16:40 - 17:10 |
State of the Evals: Lessons from U.S. CAISI's Eval . . .
|
Maia Hamin |
16:00 - 16:30 |
Buckle Up, Buttercup - Our Experience Competing in . . .
|
Michael D. Brown |
17:15 - 17:45 |
Team Atlanta’s Takeaways from DARPA's AIxCC
|
Taesoo Kim |
| | |
Sunday |
|
|
10:30 - 11:15 |
The Challenge with Designing Challenging Challenge . . .
|
David Brumley,Isaac Goldt . . . |
11:30 - 12:15 |
The Human's Guide to Understanding AIxCC
|
Mark Griffin |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Up and Down Technique: Exposing Hidden Data from R . . .
|
Pedro "drop" Paniago |
10:00 - 10:30 |
Secret Life of an Automationist: Engineering the H . . .
|
Gunnar "g0lden" Andrews |
10:00 - 10:59 |
Prompt. Scan. Exploit: AI’s Journey Through Zero . . .
|
Diego "djurado" Jurado,Jo . . . |
10:00 - 10:59 |
Becoming a Caido Power User
|
Justin "rhynorater" Gardn . . . |
11:00 - 11:59 |
Keynote: Attacking AI
|
Jason "jhaddix" Haddix |
12:00 - 12:59 |
Voices from the Frontlines: Managing Bug Bounties . . .
|
Gabriel Nitu,Jay Dancer,T . . . |
12:00 - 12:59 |
Nuclei: Beyond The Basic Templates
|
Ben "nahamsec" Sadeghipou . . . |
13:30 - 14:30 |
Storytellers: Ethical Hackers in the Digital Spotl . . .
|
Ben "nahamsec" Sadeghipou . . . |
14:00 - 14:59 |
Securing Intelligence: How hackers are breaking mo . . .
|
Dane Sherrets,Shlomie Lib . . . |
14:30 - 15:30 |
Testing Trust Relationships: Breaking Network Boun . . .
|
Michael Gianarakis,Jordan . . . |
15:30 - 15:59 |
The Year of the Bounty Desktop: Bugs from Binaries
|
Parsia "CryptoGangsta" Ha . . . |
16:30 - 16:59 |
Hacking the Edge: Real-World ESI Injection Exploit . . .
|
Robert "nytr0gen" Vulpe |
16:00 - 16:30 |
To Pay or Not to Pay? The Battle Between Bug Bount . . .
|
Aaron "scriptingxss" Guzm . . . |
17:30 - 17:59 |
Exploiting the Off-chain ecosystem in Web 3 Bug Bo . . .
|
Bruno "BrunoModificato" H . . . |
17:00 - 17:30 |
VRP @ Google -- a look inside a large self-hosted . . .
|
Sam "erbbysam" Erb |
| | |
Saturday |
|
|
10:00 - 10:59 |
Regex For Hackers
|
Ben "nahamsec" Sadeghipou . . . |
10:00 - 10:59 |
The Ars0n Framework V2 Beta
|
Harrison "rs0n" Richardso . . . |
11:00 - 11:59 |
Magical Hacks
|
Inti "intidc" De Ceukelai . . . |
12:00 - 12:30 |
Sometimes you find bugs, sometimes bugs find you
|
Jasmin "JR0ch17" Landry |
12:00 - 12:59 |
From Component to Compromised: XSS via React creat . . .
|
Nick Copi |
13:00 - 13:59 |
Breaking the Chain: Advanced Offensive Strategies . . .
|
Roni "lupin" Carta,Adnan . . . |
13:00 - 14:30 |
Surfing through the Stream: Advanced HTTP Desync e . . .
|
Martin "tincho_508" Doyhe . . . |
15:00 - 15:30 |
Referral Beware, Your Rewards Are Mine
|
Whit "un1tycyb3r" Taylor |
15:00 - 16:30 |
From the Other Side: Bug Bounty Platforms on Triag . . .
|
Michelle Lopez,Michael "c . . . |
16:30 - 17:30 |
Hacking the Graph: Advanced Target Discovery with . . .
|
Jeff "caffix" Foley |
17:30 - 17:59 |
Cheat Code for Hacking on T-Mobile: From Inside th . . .
|
Elisa Gangemi |
| | |
Sunday |
|
|
10:00 - 11:30 |
Misaligned: AI Jailbreaking Panel
|
Jason "jhaddix" Haddix,Ba . . . |
11:00 - 11:59 |
Hacker vs. Triage: Inside the Bug Bounty Battlegro . . .
|
Richard "richeeta" Hyunho . . . |
11:00 - 11:30 |
Full Disclosure, Full Color: Badge-making story of . . .
|
Abhinav Pandagale |
11:30 - 11:59 |
Portswigger Awards: Top 10 web hacking techniques . . .
|
Portswigger |
12:00 - 12:59 |
Bug Bounty Village CTF Walkthrough
|
CTF.ae |
13:30 - 13:59 |
Bug Bounty Village Closing Ceremony
|
Bug Bounty Village Staff |
13:00 - 13:30 |
Bug Bounty Village CTF Awards
|
Bug Bounty Village Staff, . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:10 |
Cloud Village Opening
|
Jayesh Singh Chauhan |
10:10 - 10:50 |
We Know What You Did (in Azure) Last Summer
|
Karl Fosaaen,Thomas Ellin . . . |
10:50 - 11:30 |
The Hidden Path to Root: Shadow Resources, Roles, . . .
|
Yakir Kadkoda |
11:30 - 12:10 |
Hypervisor Hangover: Persistence Mechanisms on ESX . . .
|
JC (Crashwire),Nathan |
11:00 - 12:59 |
Hacking Kubernetes
|
Benjamin Koltermann |
11:00 - 12:59 |
Cryptojacking in the Cloud: Investigating Attacks . . .
|
Adelia Ibragimova |
12:30 - 12:59 |
AzDevRecon - Azure DevOps Enumeration Tool
|
Trouble1 |
12:10 - 12:30 |
Auths Gone Wild: When ‘Authenticated’ Means An . . .
|
Danielle Aminov,Yaara Shr . . . |
13:00 - 13:35 |
No Server, No Cry: the Ups and Downs of Building a . . .
|
David Melamed |
13:35 - 14:10 |
No IP, No Problem: Exfiltrating Data Behind IAP
|
Ariel Kalman |
13:30 - 15:30 |
TryHackMe - Azure Purple Teaming: Emulating and De . . .
|
Ariz Soriano |
13:30 - 15:30 |
Exploiting Public AWS Resources
|
Eduard Agavriloae |
14:40 - 15:20 |
Identity Crisis: The Unmanaged World of Azure Mana . . .
|
Alon Klayman,Eliraz Levi |
14:10 - 14:40 |
Transforming Identity Protection: Innovating with . . .
|
Filipi Pires |
15:50 - 16:30 |
May the Least Privilege Be With You: Exposing the . . .
|
Marios Gyftos,Nikos Vourd . . . |
15:20 - 15:50 |
Command and KubeCTL: Kubernetes Security for Pente . . .
|
Mark Manning |
16:00 - 17:59 |
Kubernetes Security: Hands-On Attack and Defense
|
Lenin Alevski |
16:00 - 17:59 |
pAWS: The Breach Has Happened. Can You Catch It?
|
Terrance DeJesus |
| | |
Saturday |
|
|
10:00 - 10:30 |
Spotter – Universal Kubernetes Security Engine
|
Madhu "madhuakula" Akula |
10:30 - 11:10 |
Exploring The Possibilities of Azure Fabric Abuses
|
Viktor Gazdag |
11:50 - 12:15 |
Sweet Deception: Deploying Honeypots and Honey Tok . . .
|
Ryan O'Donnell |
11:10 - 11:50 |
Weaponizing SageMaker AI: Real-World Offense in Ma . . .
|
Shani Peled |
11:00 - 12:59 |
Serverless but Not Defenseless: A Security Deep Di . . .
|
Nishant Sharma |
11:00 - 12:59 |
Kubernetes Security Scanner
|
Krishna Priya |
12:15 - 12:55 |
Building the Cross-Cloud Kill Chain: A DE's Playbo . . .
|
Gowthamaraj Rajendran |
12:55 - 13:25 |
SquarePhish 2.0 - Turning QR Codes into Entra ID P . . .
|
Nevada Romsdahl,Kam Taleb . . . |
13:25 - 14:05 |
Uncovering Hidden Threats: The Risks of Dangling I . . .
|
Gautam Peri |
13:30 - 15:30 |
Prowler - Maximize your Cloud Security Compliance . . .
|
Toni de la Fuente,Pedro M . . . |
13:30 - 14:45 |
Doing bad things for the right reasons: Vulnerabil . . .
|
Ryan Nolette,Albin Vattak . . . |
14:05 - 14:35 |
TencentGoat: An Intentionally Vulnerable Tencent C . . .
|
Muhammad Yuga Nugraha |
14:35 - 15:15 |
Restless Guests: From Subscription to Backdoor Int . . .
|
Simon Maxwell-Stewart |
15:15 - 15:55 |
Threat Modelling at Scale: Breaking Down Cloud Com . . .
|
Hanna Papirna,Emma Yuan F . . . |
15:55 - 16:35 |
whoAMI: Discovering and exploiting a large-scale A . . .
|
Seth Art |
16:35 - 17:05 |
Living off the Graph: Module-less Azure Recon & Ex . . .
|
Trevor |
16:00 - 17:59 |
Level Up Your CI/CD: Building a secure pipeline wi . . .
|
Andoni Alonso Fernández, . . . |
16:00 - 16:59 |
Conversational Security engineering across your aw . . .
|
Saransh Rana |
| | |
Sunday |
|
|
10:35 - 11:10 |
Quickstart for a Breach! When Official Installatio . . .
|
Michael Katchinskiy,Yossi . . . |
10:00 - 10:59 |
Braving the Storm-2372: The Tempest Decoded
|
Jenko Hwong |
10:30 - 11:30 |
The Misconfig Matrix: From Chaos to Control
|
Hari Pranav Arun Kumar,Ri . . . |
11:10 - 11:40 |
Don't trust Rufus, he's a mole - introducing KIEMP . . .
|
Golan Myers |
11:40 - 12:15 |
Cognito, Ergo Some Extra Permissions
|
Leo Tsaousis |
11:00 - 11:59 |
NoPrompt: Exposing Conditional Access Failures in . . .
|
Saksham Agrawal |
11:30 - 12:30 |
Pwning AWS: Exploiting Cloud Misconfigurations
|
Bhagavan Bollina,Deepak,J . . . |
12:15 - 12:55 |
Weaponizing SSM: Practical Exploits and Hardening . . .
|
Rodrigo Montoro |
12:55 - 13:15 |
Cloud Village Closing
|
Jayesh Singh Chauhan |
12:00 - 12:59 |
SESNSploit: Red Team Exploitation of AWS SES and S . . .
|
Hare Krishna Rai,Gaurav J . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:20 |
Welcome to DEF CON 33!
|
Jeff "The Dark Tangent" M . . . |
10:30 - 11:15 |
Fireside Chat with DT and General Paul M. Nakasone
|
Jeff "The Dark Tangent" M . . . |
10:00 - 10:45 |
Remote code execution via MIDI messages
|
Anna portasynthinca3 Anto . . . |
10:00 - 10:45 |
BitUnlocker: Leveraging Windows Recovery to Extrac . . .
|
Alon "alon_leviev" Leviev . . . |
10:00 - 10:20 |
Paywall Optional: Stream for Free with a New Techn . . .
|
Farzan Karimi |
10:30 - 11:15 |
No VPN Needed? Cryptographic Attacks Against the O . . .
|
Tom Tervoort |
10:00 - 10:45 |
The One Bitcoin Heist: Making a custom Hashcat mod . . .
|
Joseph "stoppingcart" Gab . . . |
11:30 - 12:15 |
DC101 Panel
|
Alethe Denis,Nikita Krone . . . |
11:00 - 11:45 |
Patching Critical Infrastructure: Announcing the W . . .
|
Andrew Carney,Stephen Win . . . |
11:00 - 11:45 |
Virtualization-Based (In)security - Weaponizing VB . . .
|
Ori David |
11:30 - 12:15 |
ChromeAlone: Transforming a Browser into a C2 Plat . . .
|
Michael "bouncyhat" Weber |
11:00 - 11:45 |
Inside Look at a Chinese Operational Relay Network
|
Michael "mtu" Torres,Zane . . . |
12:30 - 13:15 |
Ghosts in the Machine Check - Conjuring Hardware F . . .
|
Christopher "xoreaxeaxeax . . . |
12:00 - 12:45 |
Ghost Calls: Abusing Web Conferencing for Covert C . . .
|
Adam "UNC1739" Crosser |
12:00 - 12:45 |
Safe Harbor or Hostile Waters: Unveiling the Hidde . . .
|
Ji'an "azraelxuemo" Zhou, . . . |
12:30 - 13:15 |
Cash, Drugs, and Guns: Why Your Safes Aren't Safe
|
Mark Omo,James Rowley |
12:30 - 13:15 |
Edge of Tomorrow: Foiling Large Supply Chain Attac . . .
|
Maksim Shudrak |
12:00 - 12:20 |
The Ultimate Hack: Applying Lessons Learned from t . . .
|
John Mauger |
13:30 - 14:15 |
Recording PCAPs from Stingrays With a $20 Hotspot
|
Cooper "CyberTiger" Quint . . . |
13:00 - 13:45 |
What is Dead May Never Die: The Ghost of Internet . . .
|
George Hughey,Rohit Mothe |
13:00 - 13:45 |
Advanced Active Directory to Entra ID lateral move . . .
|
Dirk-jan Mollema |
13:30 - 14:15 |
Dead Made Alive Again: Bypassing Intent Destinatio . . .
|
Qidan "flanker_hqd" He |
13:30 - 14:15 |
Weaponizing Trust: Investigating a Threat Actor Ta . . .
|
Christophe Tafani-Dereepe . . . |
14:30 - 15:15 |
AppleStorm - Unmasking the Privacy Risks of Apple . . .
|
Yoav Magid |
14:00 - 14:45 |
DisguiseDelimit: Exploiting Synology NAS with Deli . . .
|
Ryan Emmons |
14:00 - 14:45 |
You snooze you lose: RPC-Racer winning RPC endpoin . . .
|
Ron Ben Yizhak |
14:30 - 15:15 |
Siri-ously Leaky: Exploring Overlooked Attack Surf . . .
|
Richard "richeeta" Hyunho . . . |
14:30 - 15:15 |
Firewalls Under Fire: China's 5+ year campaign to . . .
|
Andrew "Spike" Brandt |
15:30 - 16:15 |
Mastering Apple's Endpoint Security for Advanced m . . .
|
Patrick Wardle |
15:00 - 15:45 |
Gateways to Chaos - How We Proved Modems Are a Tic . . .
|
Chiao-Lin "Steven Meow" Y . . . |
15:00 - 15:45 |
From Spoofing to Tunneling: New Red Team's Network . . .
|
Shu-Hao, Tung 123ojp |
15:30 - 16:15 |
Unmasking the Snitch Puck: the creepy IoT surveill . . .
|
Reynaldo "buh0",nyx |
15:30 - 16:15 |
So Long, and Thanks for All the Phish
|
Harrison Sand,Erlend Leik . . . |
16:30 - 17:15 |
HTTP/1.1 Must Die! The Desync Endgame
|
James "albinowax" Kettle |
16:00 - 16:45 |
The (Un)Rightful Heir: My dMSA Is Your New Domain . . .
|
Yuval Gordon |
16:00 - 16:45 |
Infecting the Boot to Own the Kernel: Bootkits and . . .
|
Alejandro "TheMalwareGuar . . . |
16:30 - 17:15 |
Escaping the Privacy Sandbox with Client-Side Dean . . .
|
Eugene "spaceraccoon" Lim |
16:30 - 16:50 |
Killing Killnet
|
Alex Holden |
17:30 - 17:50 |
Rusty pearls: Postgres RCE on cloud databases
|
Tal "TLP" Peleg,Coby Abra . . . |
17:00 - 17:45 |
Orion - fuzzing workflow automation
|
Max Bazalii,Marius Fleisc . . . |
17:00 - 17:45 |
Emulating Embedded Linux Devices at Scale with Lig . . .
|
Sigusr Polke |
17:30 - 17:50 |
Silent Leaks: Harvesting Secrets from Shared Linux . . .
|
Cernica Ionut Cosmin |
17:00 - 17:45 |
Building a Malware Museum
|
Mikko Hypponen |
| | |
Saturday |
|
|
10:00 - 10:45 |
The 2025 Pwnie Awards
|
Ian Roos,Mark Trumpbour |
10:00 - 10:45 |
Making the DEF CON 33 Badge
|
Mar |
10:30 - 11:15 |
One Modem to Brick Them All: Exploiting Vulnerabil . . .
|
Marcell Szakály,Jan "SP3 . . . |
10:00 - 10:20 |
Turning Camera Surveillance on its Axis
|
Noam Moshe |
10:30 - 11:15 |
Kill Chain Reloaded: Abusing legacy paths for stea . . .
|
Alejandro "0xedh" Hernand . . . |
10:00 - 10:20 |
Binary Facades: Reversing approaches to extract em . . .
|
Patrick Wardle |
10:00 - 10:45 |
Where’s My Crypto, Dude? The Ultimate Guide to C . . .
|
Thomas "fr0gger_" Roccia |
11:00 - 11:45 |
How to secure unique ecosystem shipping 1 billion+ . . .
|
Adam "pi3" Zabrocki,Marko . . . |
11:00 - 11:45 |
The DOMino Effect: Automated Detection and Exploit . . .
|
Zhengyu Liu,Jianjia Yu |
11:30 - 12:15 |
Breakin 'Em All – Overcoming Pokemon Go's Anti-C . . .
|
Tal Skverer |
11:30 - 12:15 |
Original Sin of SSO: macOS PRT Cookie Theft & Entr . . .
|
Shang-De "HackerPeanutJoh . . . |
11:00 - 11:45 |
Man-in-the-Malware: Intercepting Adversarial Commu . . .
|
Ben "polygonben" Folland |
12:00 - 12:45 |
Client or Server? The Hidden Sword of Damocles in . . .
|
Ji'an "azraelxuemo" Zhou, . . . |
12:00 - 12:45 |
Help! Linux in my Webcam! (•_•)
|
Mickey Shkatov,Jesse Mich . . . |
12:30 - 13:15 |
Claude--Climbing a CTF Scoreboard Near You
|
Keane Lucas |
12:30 - 13:15 |
Diamonds Are For Hackers - Building the first full . . .
|
Mark "LargeCardinal" Carn . . . |
12:00 - 12:45 |
Not Just a Pipeline Leak: Reconstructing the Real . . .
|
Aviad Hahami |
13:00 - 13:45 |
Hackers Dropping Mid-Heist Selfies: LLM Identifies . . .
|
Olivier Bilodeau,Estelle . . . |
13:00 - 13:45 |
Thinking Like a Hacker in the Age of AI
|
Richard "neuralcowboy" Th . . . |
13:30 - 14:15 |
One Key, Two Key, I Just Stole Your goTenna Key
|
Erwin "Dollarhyde" Karinc . . . |
13:30 - 14:15 |
CTRAPS: CTAP Impersonation and API Confusion Attac . . .
|
Marco Casagrande,Daniele . . . |
13:00 - 13:45 |
Stories from a Tor dev
|
Roger "arma" Dingledine |
14:30 - 14:50 |
HaKCing OBD-II Emissions Testing
|
Archwisp |
14:00 - 14:20 |
RATs & Socks abusing Google Services
|
Valerio "MrSaighnal" Ales . . . |
14:00 - 14:45 |
Rebadged, Relabeled, and Rooted: Pwnage via the So . . .
|
Anthony "Coin" Rose,Jake . . . |
14:30 - 15:15 |
ReVault! Compromised by your Secure SoC
|
Philippe "phLaul" Laulher . . . |
14:30 - 16:15 |
Ask EFF
|
Alexis Hancock,Cooper "Cy . . . |
14:00 - 14:45 |
TSPU: Russia's Firewall and Defending Against the . . .
|
Benjamin "bmixonbaca" Mix . . . |
15:00 - 15:45 |
Browser Extension Clickjacking: One Click and Your . . .
|
Marek Tóth |
15:00 - 15:20 |
Shaking Out Shells with SSHamble
|
HD Moore |
15:30 - 16:15 |
Metal-as-a-Disservice: Exploiting Legacy Flaws in . . .
|
Bill Demirkapi |
15:30 - 16:15 |
Zero Trust, Total Bust - Breaking into thousands o . . .
|
David "johnnyspandex" Cas . . . |
15:00 - 15:45 |
Ghosts of REvil: An Inside Look with the Hacker Be . . .
|
Jon DiMaggio,John Fokker |
16:00 - 16:45 |
Turning Microsoft's Login Page into our Phishing I . . .
|
Keanu "RedByte" Nys |
16:30 - 17:15 |
Direct Memory, Access Everywhere
|
Joe "securelyfitz" FitzPa . . . |
16:30 - 17:15 |
De-Virtualizing the Dragon: Automated Unpacking an . . .
|
Agostino "Van1sh" Panico |
16:30 - 17:15 |
7 Vulns in 7 Days: Breaking Bloatware Faster Than . . .
|
Leon "leonjza" Jacobs |
16:00 - 16:45 |
"We are currently clean on OPSEC": The Signalgate . . .
|
Micah "micahflee" Lee |
17:00 - 17:45 |
Blind Trailer Shouting
|
Ben Gardiner |
17:30 - 17:50 |
Hacking Hotspots: Pre-Auth Remote Code Execution, . . .
|
Edward "Actuator" Warren |
17:30 - 17:50 |
Voice Cloning Air Traffic Control: Vulnerabilities . . .
|
Andrew "Helicopters of DC . . . |
17:30 - 17:50 |
OverLAPS: Overriding LAPS Logic
|
Antoine Goichot |
17:00 - 17:45 |
Amber64: Mining Hacker History from Over Half a Mi . . .
|
Wesley McGrew |
| | |
Sunday |
|
|
10:00 - 10:45 |
Invitation Is All You Need! Invoking Gemini for Wo . . .
|
Ben Nassi,Or "oryair1999" . . . |
10:00 - 10:45 |
SSH-nanigans: Busting Open the Mainframes Iron For . . .
|
Philip "Soldier of FORTRA . . . |
10:00 - 10:20 |
From Shanghai to the Shore: The Silent Threat in G . . .
|
Kenneth Miltenberger,Nich . . . |
10:30 - 11:15 |
Can't Stop the ROP: Automating Universal ASLR Bypa . . .
|
Bramwell Brizendine |
10:00 - 10:20 |
Mind the Data Voids: Hijacking Copilot Trust to De . . .
|
Tobias "ItsSixtyNein" Die . . . |
10:30 - 11:15 |
Jailbreaking the Hivemind: Finding and Exploiting . . .
|
Agostino "Van1sh" Panico |
10:00 - 10:45 |
Cyber Volunteering and Community Defense - DEF CON . . .
|
Sarah Powazek,Jake Braun, . . . |
11:00 - 11:45 |
Playing Dirty Without Cheating - Getting Banned fo . . .
|
Sam Collins,Marius Muench . . . |
11:00 - 11:45 |
Journey to the center of the PSTN: How I became a . . .
|
Enzo Damato |
11:30 - 12:15 |
Passkeys Pwned: Turning WebAuthn Against Itself
|
Shourya Pratap Singh,Jonn . . . |
11:30 - 12:15 |
Breaking Wi-Fi Easy Connect: A Security Analysis o . . .
|
George "sophron" Chatziso . . . |
11:00 - 11:45 |
Kill List: Hacking an Assassination Site on the Da . . .
|
Carl Miller,Chris Monteir . . . |
12:00 - 12:45 |
40 Years Of Phrack: Hacking, Zines & Digital Disse . . .
|
richinseattle,Netspooky,C . . . |
12:00 - 12:45 |
Turning your Active Directory into the attacker’ . . .
|
Quentin "quent0x1" Roland . . . |
12:30 - 13:15 |
Win-DoS Epidemic: A crash course in abusing RPC fo . . .
|
Or "oryair1999" Yair,Shah . . . |
12:30 - 13:15 |
Silent Signals: Exploiting Security and Privacy Si . . .
|
Gabriel Gegenhuber,Maximi . . . |
12:00 - 12:45 |
Carding, Sabotage & Survival: A Darknet Market Vet . . .
|
Godman666 |
13:30 - 13:50 |
Planting C4: Cross-Compatible External C2 for All . . .
|
Scott "ScottCTaylor12" Ta . . . |
13:30 - 14:15 |
SCCM: The tree that always bears bad fruits
|
Mehdi "kalimer0x00" Elyas . . . |
13:00 - 13:45 |
Unexpected Connections: How a vulnerability in obs . . .
|
Eaton Zveare,Roshan Piyus . . . |
13:30 - 14:59 |
Contest Closing Ceremonies & Awards
|
|
14:00 - 14:20 |
Loading Models, Launching Shells: Abusing AI File . . .
|
Cyrus Parzian |
14:00 - 14:20 |
How to Fake a Badge like a Pro: 11 Tips to Counter . . .
|
Russell Phillips |
15:00 - 17:59 |
DEF CON Closing Ceremonies & Awards
|
Jeff "The Dark Tangent" M . . . |
PDT Times |
Title |
speaker |
| | |
Saturday |
|
|
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
Influence Operations: Tactics, Defense, and Exploi . . .
|
Tom Cross,Greg Conti |
| | |
Sunday |
|
|
08:00 - 16:59 |
Influence Operations: Tactics, Defense, and Exploi . . .
|
Tom Cross,Greg Conti |
| | |
Monday |
|
|
08:00 - 16:59 |
Dodging the EDR bullet: A Training on Malware Stea . . .
|
Giorgio "gbyolo" Bernardi . . . |
08:00 - 16:59 |
Adversarial Thinking: The Art of Dangerous Ideas
|
Tom Cross,Greg Conti |
08:00 - 16:59 |
Hacking Modern Web Apps: Master the Future of Atta . . .
|
Abraham Aranguren,Anirudh . . . |
08:00 - 16:59 |
Loudmouth Security - Offensive IoT Exploitation
|
Loudmouth Security |
08:00 - 16:59 |
Active Directory Attacks for Red and Blue Teams - . . .
|
Nikhil,Manthan |
08:00 - 16:59 |
Advanced Cloud Incident Response in Azure and Micr . . .
|
Korstiaan Stam |
08:00 - 16:59 |
Azure Cloud Attacks for Red & Blue Teams - Beginne . . .
|
Nikhil |
08:00 - 16:59 |
Windows Payload Development: EDR Evasion and Initi . . .
|
Rey "Privesc" Bango,Kevin . . . |
08:00 - 16:59 |
Hack the Connected Plant!
|
Arnaud Soullié |
08:00 - 16:59 |
Hands-on Car Hacking & Automotive Cybersecurity
|
Kamel Ghali |
08:00 - 16:59 |
Attack and Defend Software Supply Chain
|
Anant Shrivastava |
08:00 - 16:59 |
Everyday Ghidra: Practical Windows Reverse Enginee . . .
|
John McIntosh |
08:00 - 16:59 |
Full-Stack Pentesting Laboratory: 100% Hands-On + . . .
|
Dawid Czagan |
08:00 - 16:59 |
Simulated Adversary: Tactics & Tools Training
|
Kenny Hess,Jayson E. Stre . . . |
08:00 - 16:59 |
Deep Dive into Fuzzing
|
Zubin Devnani,Dhiraj Mish . . . |
08:00 - 16:59 |
Offensive Development Practitioner Certification ( . . .
|
Jake Mayhew,Greg Hatcher |
08:00 - 16:59 |
AI SecureOps: Attacking & Defending AI Application . . .
|
Abhinav Singh |
08:00 - 16:59 |
Offensive Cyber Security Operations: Mastering Bre . . .
|
Abhijith "Abx" B R |
08:00 - 16:59 |
A Practical Approach to Breaking & Pwning Kubernet . . .
|
Madhu "madhuakula" Akula |
08:00 - 16:59 |
Hunting for Hackers by Deloitte
|
Kyle Smathers,Bobby Thoma . . . |
08:00 - 16:59 |
Solving Modern Cybersecurity Problems with AI
|
Michael "Bluescreenofwin" . . . |
08:00 - 16:59 |
Hacking Cryptography: Attacks, Tools, and Techniqu . . .
|
Ruben Gonzalez,Benjamin W . . . |
08:00 - 16:59 |
A Complete Practical Approach to Malware Analysis . . .
|
Sajan Shetty,Monnappa "Mo . . . |
08:00 - 16:59 |
BRIDGING THE GAP - An Introduction to IoT Security . . .
|
Will McCardell,Garrett Fr . . . |
08:00 - 16:59 |
Attacking & Securing CI/CD Pipeline Certification . . .
|
Raunak Parmar |
08:00 - 16:59 |
RFID and Electronic Physical Access Control System . . .
|
Deviant Ollam,Bryan Black . . . |
08:00 - 16:59 |
Software Defined Radios 101
|
Richard Shmel |
08:00 - 16:59 |
Harnessing LLMs for Application Security
|
Seth Law,Ken "cktricky" J . . . |
08:00 - 16:59 |
SOC 101 - SOC 1 Analyst Bootcamp
|
Rod Soto |
| | |
Tuesday |
|
|
08:00 - 16:59 |
Harnessing LLMs for Application Security
|
Seth Law,Ken "cktricky" J . . . |
08:00 - 16:59 |
Hunting for Hackers by Deloitte
|
Kyle Smathers,Bobby Thoma . . . |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
Medical Device Penetration Testing
|
|
08:00 - 16:59 |
RFID and Electronic Physical Access Control System . . .
|
Deviant Ollam,Bryan Black . . . |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
Attacking & Securing CI/CD Pipeline Certification . . .
|
Raunak Parmar |
08:00 - 16:59 |
Beginner's Guide to Attacks and Defenses
|
Sam Bowne,Kaitlyn Handelm . . . |
08:00 - 16:59 |
BRIDGING THE GAP - An Introduction to IoT Security . . .
|
Will McCardell,Garrett Fr . . . |
08:00 - 16:59 |
Software Defined Radios 101
|
Richard Shmel |
08:00 - 16:59 |
A Complete Practical Approach to Malware Analysis . . .
|
Sajan Shetty,Monnappa "Mo . . . |
08:00 - 16:59 |
Hacking Cryptography: Attacks, Tools, and Techniqu . . .
|
Ruben Gonzalez,Benjamin W . . . |
08:00 - 16:59 |
Solving Modern Cybersecurity Problems with AI
|
Michael "Bluescreenofwin" . . . |
08:00 - 16:59 |
SOC 101 - SOC 1 Analyst Bootcamp
|
Rod Soto |
08:00 - 16:59 |
A Practical Approach to Breaking & Pwning Kubernet . . .
|
Madhu "madhuakula" Akula |
08:00 - 16:59 |
AI SecureOps: Attacking & Defending AI Application . . .
|
Abhinav Singh |
08:00 - 16:59 |
Adversarial Thinking: The Art of Dangerous Ideas
|
Tom Cross,Greg Conti |
08:00 - 16:59 |
Offensive Cyber Security Operations: Mastering Bre . . .
|
Abhijith "Abx" B R |
08:00 - 16:59 |
Dodging the EDR bullet: A Training on Malware Stea . . .
|
Giorgio "gbyolo" Bernardi . . . |
08:00 - 16:59 |
Deep Dive into Fuzzing
|
Zubin Devnani,Dhiraj Mish . . . |
08:00 - 16:59 |
Offensive Development Practitioner Certification ( . . .
|
Jake Mayhew,Greg Hatcher |
08:00 - 16:59 |
Full-Stack Pentesting Laboratory: 100% Hands-On + . . .
|
Dawid Czagan |
08:00 - 16:59 |
Simulated Adversary: Tactics & Tools Training
|
Kenny Hess,Jayson E. Stre . . . |
08:00 - 16:59 |
Attack and Defend Software Supply Chain
|
Anant Shrivastava |
08:00 - 16:59 |
Everyday Ghidra: Practical Windows Reverse Enginee . . .
|
John McIntosh |
08:00 - 16:59 |
Hack the Connected Plant!
|
Arnaud Soullié |
08:00 - 16:59 |
Hands-on Car Hacking & Automotive Cybersecurity
|
Kamel Ghali |
08:00 - 16:59 |
Azure Cloud Attacks for Red & Blue Teams - Beginne . . .
|
Nikhil |
08:00 - 16:59 |
Windows Payload Development: EDR Evasion and Initi . . .
|
Rey "Privesc" Bango,Kevin . . . |
08:00 - 16:59 |
Active Directory Attacks for Red and Blue Teams - . . .
|
Nikhil,Manthan |
08:00 - 16:59 |
Advanced Cloud Incident Response in Azure and Micr . . .
|
Korstiaan Stam |
08:00 - 16:59 |
Hacking Modern Web Apps: Master the Future of Atta . . .
|
Abraham Aranguren,Anirudh . . . |
08:00 - 16:59 |
Loudmouth Security - Offensive IoT Exploitation
|
Loudmouth Security |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:00 - 12:59 |
Sold Out - Whitebox Web Exploit Dev (WWED)
|
Cale "calebot" Smith,Luke . . . |
09:00 - 12:59 |
Sold Out - Effectively Detecting Modern Malware wi . . .
|
Andrew Case,Lauren Pace,D . . . |
09:00 - 12:59 |
Sold Out - Open Source Malware 101 - Everything yo . . .
|
Paul "6mile" McCarty |
09:00 - 12:59 |
Sold Out - Introduction to Cryptographic Attacks
|
Matt Cheung |
09:00 - 12:59 |
Sold Out - Inside the Threat: Designing and Deploy . . .
|
Or Eshed,Aviad Gispan |
09:00 - 12:59 |
Sold Out - Accelerating Malware Analysis with WinD . . .
|
Joshua "jstrosch" Strosch . . . |
09:00 - 12:59 |
Sold Out - SnowGoat: Exposing Hidden Security Risk . . .
|
Lior Adar,Chen Levy Ben A . . . |
09:00 - 12:59 |
Sold Out - Medical Device Hacking: 201
|
Michael "v3ga" Aguilar,Al . . . |
14:00 - 15:59 |
Sold Out - Contextualizing alerts with relevant lo . . .
|
Ezz Tahoun |
14:00 - 17:59 |
Sold Out - 64-bit Intel Assembly Language Programm . . .
|
Wesley McGrew |
14:00 - 17:59 |
Sold Out - PLC Playground: Hands-On Industrial Con . . .
|
Anthony "Coin" Rose,Danie . . . |
14:00 - 17:59 |
Sold Out - Hands-on Kubernetes Attack & Defense Ma . . .
|
Madhu "madhuakula" Akula |
14:00 - 17:59 |
Sold Out - Analyzing and Creating Windows Shellcod . . .
|
Bramwell Brizendine,Austi . . . |
14:00 - 17:59 |
Sold Out - Obfuscation Reloaded: Modern Techniques . . .
|
Jake "Hubble" Krasnov,Vin . . . |
14:00 - 17:59 |
Sold Out - Dive into Windows Library Loading
|
Yoann "OtterHacker" DEQUE . . . |
14:00 - 17:59 |
Sold Out - Fine Tune your personal LLM assistant t . . .
|
Or Sahar,Yariv Tal |
| | |
Saturday |
|
|
09:00 - 12:59 |
Sold Out - Fortifying AI: Hands-On Training in Adv . . .
|
Vishal "Vish" Thakur,John . . . |
09:00 - 12:59 |
Sold Out - Hands-On Threat Hunting with Wireshark
|
Chris Greer |
09:00 - 12:59 |
Sold Out - Eliminating Bug Classes at Scale: Lever . . .
|
Javan Rasokat |
09:00 - 12:59 |
Sold Out - Pen-testing Cloud REST APIs
|
Rodney Beede |
09:00 - 12:59 |
Sold Out - Wi-Fi-So-Serious
|
James Hawk,Brian Burnett |
09:00 - 12:59 |
Sold Out - Practical YARA: Crafting Custom Rules f . . .
|
Joshua "jstrosch" Strosch . . . |
09:00 - 12:59 |
Sold Out - Reach the Nirvana
|
Yoann "OtterHacker" DEQUE . . . |
09:00 - 12:59 |
Sold Out - Advanced Ghidra Scripting & Automation
|
Max "Libra" Kersten |
14:00 - 17:59 |
Sold Out - Learning to Hack Bluetooth Low Energy w . . .
|
Ryan Holeman,Alek Amrani |
14:00 - 17:59 |
Sold Out - Putting EDRs in Their Place: Killing an . . .
|
Ryan "rj_chap" Chapman,Aa . . . |
14:00 - 17:59 |
Sold Out - From Prompt to Protection: A Practical . . .
|
Ashwin Iyer,Ritika Verma |
14:00 - 17:59 |
Sold Out - K8sploitation: Hacking Kubernetes the F . . .
|
Marcelo Ribeiro,Jeff Jord . . . |
14:00 - 17:59 |
Sold Out - Hacking The Metal: Into the GPU
|
eigentourist |
14:00 - 17:59 |
Sold Out - Hacker VPN
|
Eijah,Benjamin "Cave Twin . . . |
14:00 - 17:59 |
Sold Out - Defeating Malware Evasion: Techniques a . . .
|
Kyle "d4rksystem" Cucci,R . . . |
14:00 - 17:59 |
Sold Out - Deep-dive into modern network fingerpri . . .
|
Vlad Iliushin |
| | |
Sunday |
|
|
09:00 - 12:59 |
Sold Out - DIY Malware Emulation: Build It, Break . . .
|
Sebastian Tapia,Ricardo S . . . |
09:00 - 10:59 |
Sold Out - Provably exfiltrating data by breaking . . .
|
AtHeartEngineer,Sinu |
09:00 - 12:59 |
Sold Out - Hacking the connected plant: AI edition . . .
|
Arnaud Soullié,Alexandri . . . |
09:00 - 12:59 |
Sold Out - Creating malicious functional app on An . . .
|
HackeMate |
09:00 - 12:59 |
Sold Out - Cloud Forensics Workshop: Smart Grid Ed . . .
|
Kerry "Professor Kilroy" . . . |
09:00 - 12:59 |
Sold Out - Disrupting Digital Dataflows: A 101 on . . .
|
Preston Zen |
09:00 - 12:59 |
Sold Out - Hands-on IoT firmware extraction and fl . . .
|
Dennis Giese,Braelynn Lue . . . |
09:00 - 12:59 |
Sold Out - EMMC BGA Secrets, hack bga memory, no r . . .
|
Patrick "Gigstorm" Kiley |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
09:00 - 09:45 |
Tengu Marauder v2
|
Lexie "L3xic0n" Thach,Mun . . . |
09:00 - 09:45 |
Spotter - Universal Kubernetes Security Scanner an . . .
|
Madhu "madhuakula" Akula |
09:00 - 09:45 |
RETCON - Reticulum Embedded Turnkey Connection Ope . . .
|
Daniel "Varx" Beard |
09:00 - 09:45 |
TheTimeMachine
|
Arjun "T3R4_KAAL" Chaudha . . . |
09:00 - 09:45 |
SAMLSmith
|
Eric Woodruff,Tomer Nahum |
10:00 - 10:45 |
AIMaL - Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
10:00 - 10:45 |
AirBleed - Covert Bluetooth Plist Payload Injectio . . .
|
Ray "CURZE$" Cervantes,Yv . . . |
10:00 - 10:45 |
RETCON - Reticulum Embedded Turnkey Connection Ope . . .
|
Daniel "Varx" Beard |
10:00 - 10:45 |
Attack Flow and Root Cause Discovery - No LLMs, No . . .
|
Ezz Tahoun,Kevin Shi |
10:00 - 10:45 |
SAMLSmith
|
Eric Woodruff,Tomer Nahum |
11:00 - 11:45 |
Blackdagger - Cyber Workflow Automation Framework
|
Mahmut "ErdemOzgen" Erdem . . . |
11:00 - 11:45 |
BOAZ - A Multilayered Approach to AV/EDR Evasion E . . .
|
Thomas "XM20" Xuan Meng |
11:00 - 11:45 |
C4 - Cross Compatible Command and Control
|
Scott "ScottCTaylor12" Ta . . . |
11:00 - 11:45 |
Caldera for OT - Oops! All Software
|
Devon Colmer,Tony Webber |
11:00 - 11:45 |
rev.ng Decompiler
|
Pietro Fezzardi,Alessandr . . . |
12:00 - 12:45 |
Copycat - Identity Stealer Extension
|
Dakshitaa Babu,Shourya Pr . . . |
12:00 - 12:45 |
DVBE - Damn Vulnerable Browser Extension
|
Abhinav Khanna |
12:00 - 12:45 |
Empire 6.0
|
Vincent "Vinnybod" Rose,J . . . |
12:00 - 12:45 |
EntraGoat - A Deliberately Vulnerable Entra ID Env . . .
|
Tomer Nahum,Jonathan Elka . . . |
12:00 - 12:45 |
FLARE-VM
|
Joshua "jstrosch" Strosch . . . |
13:00 - 13:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
13:00 - 13:45 |
Have I Been Ransomed?
|
Juanma "M4C" Tejada |
13:00 - 13:45 |
Lex Sleuther
|
Aaron "KNOX" James |
13:00 - 13:45 |
Messenger - Proxies Here There and Everywhere
|
Skyler Knecht,Kevin Clark |
13:00 - 13:45 |
Unmanned Wireless Penetration Testing Device
|
Ayaan Qayyum,Omar Hamoude . . . |
14:00 - 14:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
14:00 - 14:45 |
MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . .
|
Shota "Sh1n0g1" Shinogi,S . . . |
14:00 - 14:45 |
WarHead
|
Vishal "Vish" Thakur,Davi . . . |
14:00 - 14:45 |
nRootTag - Exploiting Find My and Transforming Com . . .
|
Junming "Chapoly1305" Che . . . |
14:00 - 14:45 |
OAuthSeeker
|
Adam "UNC1739" Crosser |
15:00 - 15:45 |
Angry Magpie - DLP Bypass Simulator
|
Jeswin Mathai,Xian Xiang . . . |
15:00 - 15:45 |
GlytchC2 - Command Execution and Data Exfiltration . . .
|
Anıl Çelik,Emre Odaman |
15:00 - 15:45 |
WarHead
|
Vishal "Vish" Thakur,Davi . . . |
15:00 - 15:45 |
Robin - The Archaeologist of the Dark Web
|
Apurv "ASG_Sc0rpi0n" Sing . . . |
15:00 - 15:45 |
Beaconator C2 Framework
|
Mike "CroodSolutions" Man . . . |
16:00 - 16:45 |
PAPRa
|
Sean Marquez,Melanie "Gol . . . |
16:00 - 16:45 |
PatchLeaks
|
Huseyn "Khatai" Gadashov, . . . |
16:00 - 16:45 |
promptmap2
|
Utku Sen |
16:00 - 16:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
16:00 - 16:45 |
Dyna - Automating the OWASP MASTG with Offensive A . . .
|
Arjun "T3R4_KAAL" Chaudha . . . |
16:00 - 16:45 |
Audience Picked By Popular Demand Demo Lab
|
|
| | |
Saturday |
|
|
09:00 - 09:45 |
Cryptosploit
|
Matt Cheung |
09:00 - 09:45 |
TheTimeMachine
|
Arjun "T3R4_KAAL" Chaudha . . . |
09:00 - 09:45 |
AIMaL - Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
09:00 - 09:45 |
AirBleed - Covert Bluetooth Plist Payload Injectio . . .
|
Ray "CURZE$" Cervantes,Yv . . . |
09:00 - 09:45 |
Angry Magpie - DLP Bypass Simulator
|
Jeswin Mathai,Xian Xiang . . . |
10:00 - 10:45 |
Cryptosploit
|
Matt Cheung |
10:00 - 10:45 |
Beaconator C2 Framework
|
Mike "CroodSolutions" Man . . . |
10:00 - 10:45 |
Blackdagger - Cyber Workflow Automation Framework
|
Mahmut "ErdemOzgen" Erdem . . . |
10:00 - 10:45 |
BOAZ - A Multilayered Approach to AV/EDR Evasion E . . .
|
Thomas "XM20" Xuan Meng |
10:00 - 10:45 |
Attack Flow and Root Cause Discovery - No LLMs, No . . .
|
Ezz Tahoun,Kevin Shi |
11:00 - 11:45 |
Caldera for OT - Oops! All Software
|
Devon Colmer,Tony Webber |
11:00 - 11:45 |
Copycat - Identity Stealer Extension
|
Dakshitaa Babu,Shourya Pr . . . |
11:00 - 11:45 |
DVBE - Damn Vulnerable Browser Extension
|
Abhinav Khanna |
11:00 - 11:45 |
Empire 6.0
|
Vincent "Vinnybod" Rose,J . . . |
11:00 - 11:45 |
Unmanned Wireless Penetration Testing Device
|
Ayaan Qayyum,Omar Hamoude . . . |
12:00 - 12:45 |
EntraGoat - A Deliberately Vulnerable Entra ID Env . . .
|
Tomer Nahum,Jonathan Elka . . . |
12:00 - 12:45 |
FLARE-VM
|
Joshua "jstrosch" Strosch . . . |
12:00 - 12:45 |
GlytchC2 - Command Execution and Data Exfiltration . . .
|
Anıl Çelik,Emre Odaman |
12:00 - 12:45 |
Have I Been Ransomed?
|
Juanma "M4C" Tejada |
12:00 - 12:45 |
Lex Sleuther
|
Aaron "KNOX" James |
13:00 - 13:45 |
Messenger - Proxies Here There and Everywhere
|
Skyler Knecht,Kevin Clark |
13:00 - 13:45 |
Robin - The Archaeologist of the Dark Web
|
Apurv "ASG_Sc0rpi0n" Sing . . . |
13:00 - 13:45 |
Audience Picked By Popular Demand Demo Lab - TheTi . . .
|
Arjun "T3R4_KAAL" Chaudha . . . |
13:00 - 13:45 |
MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . .
|
Shota "Sh1n0g1" Shinogi,S . . . |
13:00 - 13:45 |
nRootTag - Exploiting Find My and Transforming Com . . .
|
Junming "Chapoly1305" Che . . . |
14:00 - 14:45 |
OAuthSeeker
|
Adam "UNC1739" Crosser |
14:00 - 14:45 |
PAPRa
|
Sean Marquez,Melanie "Gol . . . |
14:00 - 14:45 |
PatchLeaks
|
Huseyn "Khatai" Gadashov, . . . |
14:00 - 14:45 |
promptmap2
|
Utku Sen |
14:00 - 14:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
15:00 - 15:45 |
Dyna - Automating the OWASP MASTG with Offensive A . . .
|
Arjun "T3R4_KAAL" Chaudha . . . |
15:00 - 15:45 |
Metasploit's Latest Attack Capability and Workflow . . .
|
Spencer "ZeroSteiner" McI . . . |
15:00 - 15:45 |
rev.ng Decompiler
|
Pietro Fezzardi,Alessandr . . . |
15:00 - 15:45 |
Garuda Threat Hunting Framework
|
Monnappa "Monnappa22" K A . . . |
15:00 - 15:45 |
RETINA - Realtime Electronic Threat and Intrusion . . .
|
Cesare "Red5heep" Pizzi |
16:00 - 16:45 |
Tengu Marauder v2
|
Lexie "L3xic0n" Thach,Mun . . . |
16:00 - 16:45 |
C4 - Cross Compatible Command and Control
|
Scott "ScottCTaylor12" Ta . . . |
16:00 - 16:45 |
Garuda Threat Hunting Framework
|
Monnappa "Monnappa22" K A . . . |
16:00 - 16:45 |
Spotter - Universal Kubernetes Security Scanner an . . .
|
Madhu "madhuakula" Akula |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
Keysight CTF Challenge
|
|
10:00 - 17:59 |
Easy IoT App Hacking
|
|
10:00 - 10:59 |
Make your very own evil IoT Cat Lamp with WLED!
|
|
10:00 - 17:59 |
What’s the Matter with my smart home?
|
|
10:00 - 17:59 |
Firmware Decryption with Open Source Clues
|
|
10:00 - 17:59 |
Staring at You, Staring Inside You
|
|
10:00 - 17:59 |
IoT Intro Labs. New to all of this? You’re in th . . .
|
|
10:00 - 17:59 |
Discover GE Appliances!
|
|
10:00 - 17:59 |
From Hexeditor to Root, Multi Stage Approach to Ro . . .
|
|
10:00 - 17:59 |
Bootloader? I hardly know her!
|
|
10:30 - 10:59 |
10 Years of IoT Village: Insights in the World of . . .
|
Stephen Bono,Rachael Tubb . . . |
11:45 - 12:30 |
Never enough about cameras - The firmware encrypti . . .
|
Alexandru Lazar |
11:00 - 11:59 |
Go Malware Meets IoT: Challenges, Blind Spots, and . . .
|
Asher Davila,Chris Navarr . . . |
12:00 - 13:30 |
Build Your Own Meshtastic Node: Off-Grid, Encrypte . . .
|
|
13:45 - 15:15 |
Meshtastic for Hackers: Set up, Configure, & Deplo . . .
|
|
13:00 - 13:45 |
What is Dead May Never Die: The Immortality of SDK . . .
|
Richard "HeadlessZeke" La . . . |
15:00 - 15:30 |
Firmware Decryption: For, and By, the Cryptographi . . .
|
Craig Heffner |
16:00 - 18:30 |
Wifi security
|
|
17:30 - 17:59 |
Vibe School: Making dumb devices smart with AI
|
Katie "InsiderPhD" Paxton . . . |
| | |
Saturday |
|
|
10:00 - 17:59 |
Staring at You, Staring Inside You
|
|
10:00 - 17:59 |
Easy IoT App Hacking
|
|
10:00 - 11:30 |
Wi-Fi Self Defense & Hacker Hunting & For Beginner . . .
|
|
10:00 - 11:30 |
Learn BadUSB Hacking With the USB Nugget
|
|
10:00 - 17:59 |
What’s the Matter with my smart home?
|
|
10:00 - 17:59 |
Firmware Decryption with Open Source Clues
|
|
10:00 - 17:59 |
The Gang Recycles It’s Trash: Upcycling old IoT . . .
|
|
10:00 - 17:59 |
Keysight CTF Challenge
|
|
10:00 - 17:59 |
IoT Intro Labs. New to all of this? You’re in th . . .
|
|
10:00 - 17:59 |
From Hexeditor to Root, Multi Stage Approach to Ro . . .
|
|
10:00 - 17:59 |
Discover GE Appliances!
|
|
10:00 - 17:59 |
Bootloader? I hardly know her!
|
|
11:00 - 11:59 |
No Brain No Gain
|
Mehmet Önder Key,Temel D . . . |
12:30 - 13:30 |
Make your very own evil IoT Cat Lamp with WLED!
|
|
12:00 - 12:30 |
What’s Really in the Box? The Case for Hardware . . .
|
Allan Friedman |
13:45 - 14:15 |
The Things know What You Did Last Session
|
Will Bagget |
15:00 - 16:30 |
Build Your Own Meshtastic Node: Off-Grid, Encrypte . . .
|
|
15:30 - 15:59 |
Contextualizing alerts & logs at scale without que . . .
|
Ezz Tahoun |
16:45 - 18:15 |
Meshtastic for Hackers: Set up, Configure, & Deplo . . .
|
|
| | |
Sunday |
|
|
10:00 - 13:59 |
Easy IoT App Hacking
|
|
10:00 - 12:30 |
Wi-Fi Self Defense & Hacker Hunting & For Beginner . . .
|
|
10:00 - 13:59 |
What’s the Matter with my smart home?
|
|
10:00 - 13:59 |
Firmware Decryption with Open Source Clues
|
|
10:00 - 13:59 |
Staring at You, Staring Inside You
|
|
10:00 - 13:59 |
Bootloader? I hardly know her!
|
|
10:00 - 13:59 |
Discover GE Appliances!
|
|
10:00 - 13:59 |
Keysight CTF Challenge
|
|
10:00 - 13:59 |
From Hexeditor to Root, Multi Stage Approach to Ro . . .
|
|
10:00 - 13:59 |
IoT Intro Labs. New to all of this? You’re in th . . .
|
|
11:30 - 11:59 |
Unveiling IoT Vulnerabilities: From Backdoors to B . . .
|
Kai-Ching "Keniver" Wang, . . . |
12:00 - 12:30 |
Smart Devices, Dumb Resets? Testing Firmware Persi . . .
|
Matei Josephs |
13:00 - 13:59 |
Make your very own evil IoT Cat Lamp with WLED!
|
|
14:00 - 14:59 |
IoT Village book signing
|
|
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 10:30 |
Break Systems, Not Promises: I promised to do a ke . . .
|
Lena "LambdaMamba" Yu |
10:00 - 12:59 |
Getting started in Malware Analysis with Ghidra
|
Wesley McGrew |
10:40 - 11:10 |
Malware Matryoshka: Nested Obfuscation Techniques
|
Brian Baskin |
11:20 - 11:50 |
Cryptography is hard: Breaking the DoNex ransomwar . . .
|
Gijs Rijnders |
12:40 - 13:10 |
Grandoreiro & friends: brazilian banking trojans t . . .
|
Josep Albors |
12:00 - 12:30 |
KeePass, weaponized
|
Juho Jauhiainen |
13:40 - 13:55 |
Using Stardew Valley mods as a C2 and infostealer
|
Gecko |
14:30 - 14:59 |
The Cookie Heist: How Cybercriminals Are Outsmarti . . .
|
Mrigakshi Goel |
14:00 - 14:15 |
The creation of the Malmongotchi badge
|
Austin Worline |
14:00 - 17:59 |
Binary exploitation basics
|
Leigh Trinity |
15:50 - 16:20 |
The Beauty of Reversing Swift Malware
|
Chistopher Lopez |
15:10 - 15:40 |
Plain TXT, Malicious Context: Uncovering DNS Malwa . . .
|
Malachi Walker,Ian Campbe . . . |
16:30 - 16:59 |
Domain Fronting in 2025: a retro analysis
|
Tom Cope |
17:10 - 17:40 |
The Quantum Shift: Practical Post-Quantum Risk: Al . . .
|
Sean Prescott,Ted Carefoo . . . |
| | |
Saturday |
|
|
10:40 - 11:10 |
Your Static Tools Are Cute - My AI Ripped ZebLoade . . .
|
Anna Pham,Edward Crowder |
10:00 - 13:45 |
Malware and Monsters
|
Klaus Agnoletti,Glen Sore . . . |
10:00 - 10:30 |
Making Dirty Pictures - The Issue with DICOM
|
Michael "v3ga" Aguilar |
11:20 - 11:50 |
Smashing the Sandbox: Inside DBatLoader's Unique E . . .
|
Kyle "d4rksystem" Cucci |
12:00 - 12:59 |
I Can't RE (and You Can Too!)
|
Johnny Xmas |
13:40 - 14:15 |
Enshittification: It's Over 9000
|
Andrew "Spike" Brandt,Sam . . . |
14:00 - 17:59 |
Mac Malware Analysis
|
Patrick Wardle |
14:30 - 14:59 |
Compromising Threat Actor Communications
|
Ben "polygonben" Folland |
15:10 - 15:40 |
Unveiling the shadows: Digital Forensics evidence . . .
|
Neumann "scsideath" Lim,J . . . |
15:50 - 16:20 |
Deconstructing Malware Lineage with Graph Neural N . . .
|
David Rushmer |
16:30 - 16:59 |
Exposing Infosec Frauds and Foreign Agents Behind . . .
|
Cthulhu |
17:50 - 18:20 |
NO-HAVOC today, NO-HAVOC tomorrow
|
Samuel Gasparro,Daniel Wa . . . |
17:10 - 17:40 |
North Korea's Fur Shop: Poaching for Otters, Beave . . .
|
Mauro Eldritch,José Góm . . . |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
HavocAI Autonomous Surface Vessel Hacking
|
Daniel Morrisey |
10:30 - 10:59 |
MHV CTF 101
|
Duncan Woodbury |
10:00 - 10:30 |
MHV Overview 101
|
Kitty Hegemon |
11:00 - 11:59 |
Taiwan Digital Blockade Lite: Wargame
|
Jason Vogt |
12:00 - 13:30 |
CYBERCLAW (CYBERsecurity Card-based Learning And W . . .
|
Jared MacDonald |
14:00 - 14:59 |
MHV Badge 101
|
Nick Halt |
15:00 - 15:59 |
PLC Hacking 101
|
Brien Croteau |
15:45 - 16:30 |
Fighting the Digital Blockade: A View from Taiwan
|
Jason Vogt,Shin-Ming Chen . . . |
15:00 - 15:45 |
Threat Dynamics on the Seas
|
John Mauger,Michael Sulme . . . |
17:00 - 17:59 |
MHV CTF Recap - Daily
|
KennethSalt |
17:30 - 17:59 |
Hacking the Nautical Rules of the Road: Turn Left . . .
|
Amp,Data |
| | |
Saturday |
|
|
10:00 - 17:59 |
HavocAI Autonomous Surface Vessel Hacking
|
Daniel Morrisey |
10:30 - 10:59 |
MHV CTF 101
|
Duncan Woodbury |
10:00 - 10:30 |
MHV Overview 101
|
Kitty Hegemon |
10:30 - 10:59 |
How Computers Kill People: Marine Systems
|
Michael DeVolld,Austin Re . . . |
11:00 - 11:59 |
Taiwan Digital Blockade Lite: Wargame
|
Jason Vogt |
11:30 - 11:59 |
Red Alerts and Blue Oceans: Incident Response from . . .
|
Capt. Kit Louttit,Steve W . . . |
12:00 - 13:30 |
CYBERCLAW (CYBERsecurity Card-based Learning And W . . .
|
Jared MacDonald |
12:30 - 12:59 |
Boarding the VSAT: Real-World Exploits, Testbed Va . . .
|
Juwon Cho |
13:30 - 14:59 |
PLC Hacking 101
|
Brien Croteau |
14:30 - 14:59 |
Reverse Engineering Marine Engines: How to make po . . .
|
Alex Lorman |
15:00 - 16:30 |
Fingerprinting Maritime NMEA2000 Networks
|
Dean "TheDini" Macris |
15:30 - 15:59 |
Creating a Virtual Ship Environment Optimized for . . .
|
Jeff Greer,Laavanya Racha . . . |
15:00 - 15:30 |
Pirates of the North Sea
|
John Andre Bjørkhaug |
16:30 - 17:30 |
Taiwan Digital Blockade Lite: Wargame
|
Jason Vogt |
16:30 - 16:59 |
Resilient and Reconfigurable Maritime Comms.
|
AviNash Srinivasan |
16:00 - 16:30 |
State of the Pops: Mapping the Digital Waters
|
Vlatko Kosturjak,MJ Casad . . . |
16:30 - 16:59 |
Navigating the Invisible
|
Mehmet Önder Key,Furkan . . . |
16:00 - 16:30 |
Fingerprinting Maritime NMEA2000 Networks
|
Constantine Macris (TheDi . . . |
17:30 - 17:59 |
MHV CTF Recap - Daily
|
KennethSalt |
| | |
Sunday |
|
|
10:00 - 12:59 |
HavocAI Autonomous Surface Vessel Hacking
|
Daniel Morrisey |
10:00 - 11:30 |
CYBERCLAW (CYBERsecurity Card-based Learning And W . . .
|
Jared MacDonald |
12:30 - 12:59 |
Dead Reckoning: Hijacking Marine Autopilots
|
Carson Green,Rik Chatterj . . . |
13:00 - 13:30 |
MHV CTF - Closing and Awards
|
Duncan Woodbury |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
10:00 - 17:59 |
GEOSINT Playoffs
|
Dhruv Shah |
10:00 - 17:59 |
Live Recon Session
|
Himanshu Kumar Das,Ankur . . . |
10:00 - 10:50 |
KEYNOTE: Attack Surface in Motion: Why Today’s T . . .
|
Muslim Koser |
10:50 - 11:35 |
Discord OSINT: An Empathic Banana and a Data Scrap . . .
|
Zach Malinich |
11:00 - 12:59 |
Radio Recon Slot 1
|
Sudhanshu Chauhan |
11:35 - 12:10 |
Autonomous Video Hunter: AI Agents for Real-Time O . . .
|
Kevin Dela Rosa |
12:55 - 13:25 |
Robin: The Archaeologist of the Dark Web - Because . . .
|
Apurv "ASG_Sc0rpi0n" Sing . . . |
12:10 - 12:55 |
Pretty Good Pivot: Examining the PGP Key Pair Crea . . .
|
Sinwindie |
13:00 - 14:59 |
Do Your Own Recon Activity
|
Shubham Mittal |
13:25 - 14:10 |
From Dare to Discovery: How OSINT and Modern Recon . . .
|
Vladimir Tokarev |
14:10 - 14:55 |
Pre-Identifying DNS Wildcards: A New Standard of C . . .
|
Daniel Schwalbe |
14:55 - 15:40 |
Panel Discussion - The State of OSINT in 2025: The . . .
|
Ram Ganesh,Daniel Heinan, . . . |
15:00 - 17:05 |
Radio Recon Slot 2
|
Sudhanshu Chauhan |
15:40 - 16:15 |
OSINT Signals Pop Quiz!
|
Master Chen |
16:15 - 16:55 |
CTI-Agent: Automated battlecards from CTI reports
|
Mohamed Nabeel |
16:55 - 17:30 |
Plumbing The Plumber: A Playbook for Integration S . . .
|
Ryan Bonner |
17:30 - 18:10 |
Legal Entity-Driven Reconnaissance with OWASP Amas . . .
|
Jeff "caffix" Foley |
| | |
Saturday |
|
|
10:00 - 13:59 |
GEOSINT Playoffs
|
Dhruv Shah |
10:00 - 12:59 |
Live Recon Contest
|
Himanshu Kumar Das,Ankur . . . |
10:00 - 10:45 |
Mapping the Shadow War - From Estonia to Ukraine
|
Evgueni Erchov |
10:45 - 11:30 |
People as the Payload: OSINT Tactics for Identity . . .
|
Ankit Gupta,Shilpi Mittal |
11:00 - 12:59 |
Radio Recon Slot 3
|
Sudhanshu Chauhan |
11:30 - 12:15 |
OSINT Against the Machine: Fighting AI-Generated D . . .
|
Zoey Selman |
12:15 - 12:59 |
Panel Discussion Bug Bounty
|
Rohit Grover,Kumar Ashwin |
13:00 - 14:59 |
Do Your Own Recon Activity
|
Shubham Mittal |
13:00 - 14:59 |
Live Recon Internal Pre-Screening
|
Himanshu Kumar Das,Ankur . . . |
13:00 - 13:35 |
Connected Car Attack Surface Mapping: OSINT Techni . . .
|
Reuel Magistrado |
13:35 - 14:20 |
Investigating Foreign Tech from Online Retailers
|
Michael Portera |
14:00 - 15:30 |
GEOSINT Semi Finals
|
Dhruv Shah |
14:20 - 15:05 |
Plug and Prey: Scanning and Scoring Browser Extens . . .
|
Nishant Sharma,Shourya Pr . . . |
15:00 - 16:59 |
Radio Recon Slot 4
|
Sudhanshu Chauhan |
15:30 - 16:30 |
GEOSINT Final
|
Dhruv Shah |
15:00 - 17:25 |
Live Recon Judges Presentations
|
Himanshu Kumar Das,Ankur . . . |
15:50 - 16:35 |
Building Local Knowledge Graphs for OSINT: Bypassi . . .
|
Donald Pellegrino |
15:05 - 15:50 |
Inside the Shadows: Tracking RaaS Groups and Evolv . . .
|
John Dilgen |
16:35 - 17:20 |
How to Become One of Them: Deep Cover Operations i . . .
|
Sean Jones,Kaloyan Ivanov |
17:20 - 18:05 |
enumeraite: AI assisted web attack surface enumera . . .
|
Özgün Kültekin |
PDT Times |
Title |
speaker |
| | |
Friday |
|
|
11:00 - 11:50 |
Mind vs. Machine: Finding the Sweet Spot in Modern . . .
|
Ben "nahamsec" Sadeghipou . . . |
12:00 - 13:50 |
Beyond the Hype: Leveraging MITRE ATT&CK for a Han . . .
|
Frank Victory |
12:00 - 13:50 |
AIMaL: Artificially Intelligent Malware Launcher
|
Endrit Shaqiri,Natyra Sha . . . |
12:00 - 13:50 |
GlytchC2: Command execution and data exfiltration . . .
|
Anıl Çelik,Emre Odaman |
12:00 - 15:50 |
Instant API Hacker!
|
Corey Ball |
12:00 - 15:50 |
A Look into Using Native Godot Calls to Create Mal . . .
|
Aaron Hogan |
12:00 - 13:50 |
Bridge to Nowhere Good: When Azure Relay becomes a . . .
|
Edward Landers,Josh Huff, . . . |
12:00 - 12:50 |
Don't be LLaMe - The basics of attacking LLMs in y . . .
|
Alex Bernier,Brent Harrel . . . |
12:00 - 12:50 |
Stealing Browser Cookies: Bypassing the newest Chr . . .
|
Rafael Felix |
12:00 - 13:50 |
OSINT for Hackers
|
Lee McWhorter,Sandra Stib . . . |
13:00 - 13:50 |
Weaponizing Kestrel: Red Team Tradecraft for Hunti . . .
|
Daniel Benavides,Ronald G . . . |
13:00 - 13:50 |
Red Teaming Kubernetes: From App-Level CVEs to Ful . . .
|
Lenin Alevski |
14:00 - 15:50 |
Initial Access Tactics on MacOS
|
Adwiteeya Agrawal,Jianqia . . . |
14:00 - 15:50 |
Stealing Browser Cookies: Bypassing the newest Chr . . .
|
Rafael Felix |
14:00 - 14:50 |
Hack the Clock: Automating CVE Exploit searches to . . .
|
Jordan Bonagura |
14:00 - 14:50 |
Leveraging AI and MCP Servers for Automated Extern . . .
|
Shane Krause |
14:00 - 14:50 |
ModuleOverride – Changing a Tyre Whilst Driving
|
Alessandro Grisa,Ibai Cas . . . |
14:00 - 14:50 |
Adversary Intel Lab: Build Your First Threat Emula . . .
|
Fredrik Sandström |
15:00 - 15:50 |
Hybrid Attack
|
Jonathan Coradi |
15:00 - 15:50 |
From USB to C2
|
Will McGraw |
15:00 - 15:50 |
AI-Powered Web Applications: A New Era in Security . . .
|
Ilkin Javadov |
15:00 - 15:50 |
EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert . . .
|
Jose Plascencia |
| | |
Saturday |
|
|
10:00 - 10:55 |
Growing Red Team Village: What We’ve Learned Bui . . .
|
Barrett Darnell,Mike Lisi . . . |
11:00 - 16:50 |
BloodHound Enterprise CTF
|
Hugo van den Toorn,Joey D . . . |
11:00 - 14:50 |
Hacker Troll House
|
James Rice |
11:00 - 16:50 |
DNS-Based OSINT Tactics for Product and Service Di . . .
|
Rishi "rxerium" Chudasama |
11:00 - 16:50 |
Ransomware vs EDR: Inside the Attacker's Mind
|
Zoziel Freire |
11:00 - 11:50 |
Creating an AI Agent to Hack a Web Application
|
Omar Santos |
11:00 - 11:50 |
Malware Exploitation in PDFs: A Red Team Perspecti . . .
|
Filipi Pires |
11:00 - 11:50 |
Old Tactics, New Weapons: Abusing Modern Software . . .
|
Roberto Soares |
11:00 - 11:50 |
Whispers Through the Firewall: Data Exfiltration a . . .
|
Hubert Lin |
12:00 - 12:50 |
Getting Caught in Offensive Security
|
Graham Helton,Kevin Clark . . . |
13:00 - 14:50 |
Introduction to Operationalizing & Using C2 (w/ so . . .
|
Gabi Joseph,Josh Millsap |
13:00 - 14:50 |
StealthToken: Exploiting Identity Providers the Se . . .
|
Manish Gupta,Yash Bharadw . . . |
13:00 - 14:50 |
Building Your First Windows Malware Loader
|
Royce Yaezenko |
14:00 - 14:50 |
Red-for-Blue: Fortifying Applications through Acti . . .
|
Itsik Mantin |
15:00 - 16:50 |
Mythic, Ghostwriter, Nemesis, and Tying the Room T . . .
|
Michael Donley |
15:00 - 15:50 |
From Prey to Playbook: Learning about victim behav . . .
|
Megan Squire |
15:00 - 16:50 |
Redteam Infrastructure Vibez Edition
|
Moses Frost |
15:00 - 16:50 |
Go Hack Yourself: API Hacking for Beginners
|
Katie "InsiderPhD" Paxton . . . |
15:00 - 15:50 |
Level UP OSINT
|
Mishaal Khan |
16:00 - 16:50 |
Don the Mantle: Red Team Campaign Planning and Exe . . .
|
William Giles |
16:00 - 16:50 |
Tales from the NIST AI Pen Test Challenge - AI Pe . . .
|
Lee McWhorter |
| | |
Sunday |
|
|
10:00 - 11:50 |
Ask a Hiring Manger with Doug Mooney
|
Doug Mooney |
10:00 - 11:55 |
Attacking Kubernetes: Tools and Tactics to Comprom . . .
|
Lenin Alevski |
10:00 - 11:55 |
OSINT Challenges
|
Alex Ackerman,Lee McWhort . . . |
10:00 - 11:45 |
Ask a Hiring Manager with Troy Fridley
|
Troy Fridley |
10:00 - 11:45 |
Ask a Hiring Manager with Cory Wolff
|
Cory Wolff |
10:00 - 11:45 |
Ask a Hiring Manager with Peter Hefley
|
Peter Hefley |
PDT Times |
Title |
speaker |
| | |
Wednesday |
|
|
11:00 - 17:59 |
The Unofficial DEF CON Shoot
|
|
17:00 - 07:59 |
Linecon
|
|
| | |
Thursday |
|
|
06:00 - 07:59 |
Defcon.run
|
|
08:00 - 16:59 |
Merch (formerly swag) Area Open -- README
|
|
08:00 - 18:59 |
Human Registration Open
|
|
09:00 - 18:59 |
Lost & Found
|
|
12:00 - 12:59 |
Friends of Bill W
|
|
15:00 - 20:59 |
Toxic BBQ
|
|
16:00 - 18:59 |
DEF CON Holland Group Presents:
Drinking with t . . .
|
|
17:00 - 17:59 |
Friends of Bill W
|
|
19:00 - 20:59 |
DC702 Meetup
|
|
19:30 - 22:30 |
The KEVOPS Sellout Pool Party
|
|
20:00 - 01:59 |
Music Set / Entertainment (Chillout Stage, Thursda . . .
|
heckseven,Fling,N8,Palinu . . . |
| | |
Friday |
|
|
06:00 - 07:59 |
Defcon.run
|
|
08:00 - 17:59 |
Merch (formerly swag) Area Open -- README
|
|
08:00 - 18:59 |
Human Registration Open
|
|
10:00 - 10:45 |
Walking Tour Groups
|
|
10:30 - 11:15 |
Walking Tour Groups
|
|
10:00 - 10:59 |
Book Signing - Adversary Emulation with MITRE ATT& . . .
|
Drinor Selmanaj |
10:00 - 10:59 |
Book Signing - Cyber Calendar 2026 - Chris DeCarme . . .
|
Chris DeCarmen |
10:00 - 10:59 |
Packet Hacking Village Music
|
phreakocious |
10:00 - 01:59 |
Lost & Found
|
|
11:30 - 12:15 |
Walking Tour Groups
|
|
11:00 - 11:45 |
Walking Tour Groups
|
|
11:00 - 11:59 |
Book Signing - Jon DiMaggio/ No Starch Press
|
Jon DiMaggio |
11:00 - 11:59 |
Book Signing - Lindsay Kay / No Strach Press
|
|
11:00 - 11:59 |
Book Signing - Supply Chain Software Security-AI, . . .
|
Aamiruddin Syed |
11:00 - 11:59 |
Book Signing - Kyle Cucci/No Starch Press
|
Kyle "d4rksystem" Cucci |
11:00 - 11:59 |
Packet Hacking Village Music
|
phreakocious + n0pslide |
12:00 - 12:45 |
Walking Tour Groups
|
|
12:30 - 13:15 |
Walking Tour Groups
|
|
12:00 - 12:59 |
Book Signing - Travis Goodspeed/No Starch Press
|
Travis Goodspeed |
12:00 - 12:59 |
Book Signing - Firewalls Don't Stop Dragons: A Ste . . .
|
Carey Parker |
12:00 - 12:59 |
Friends of Bill W
|
|
12:00 - 12:59 |
Packet Hacking Village Music
|
mattrix |
13:00 - 13:45 |
Walking Tour Groups
|
|
13:30 - 14:15 |
Walking Tour Groups
|
|
13:00 - 13:59 |
Book Signing - Nick Aleks/No Starch Press
|
Nick Aleks |
13:00 - 13:59 |
Book Signing - Alex Matrosov/No Starch Press
|
Alex Matrosov |
13:37 - 13:59 |
Darknet Diaries x DCG Meet up
|
Ray [REDACTED],Jayson E. . . . |
13:00 - 13:59 |
Packet Hacking Village Music
|
Syntax + Luna (VJ) |
13:00 - 15:59 |
Free Ham Radio Exams
|
|
14:00 - 14:45 |
Walking Tour Groups
|
|
14:30 - 15:15 |
Walking Tour Groups
|
|
14:00 - 14:59 |
Book Signing - Philip Dursey/No Starch Press
|
Philip Dursey |
14:00 - 14:59 |
Book Signing - Alfie Champion/No Starch Press
|
Alfie Champion |
14:00 - 14:59 |
Packet Hacking Village Music
|
Deep Therapy |
15:00 - 15:45 |
Walking Tour Groups
|
|
15:30 - 16:15 |
Walking Tour Groups
|
|
15:00 - 15:59 |
Book Signing - JP Ausmasson/No Starch Press
|
JP Ausmasson |
15:00 - 15:59 |
Book Signing - Future of Hacking: The Rise of Cybe . . .
|
Laura S. Scherling |
15:00 - 15:59 |
Book Signing - Daniel Reilly/No Starch Press
|
Daniel Reilly |
15:00 - 15:59 |
Book Signing - The Hacker Mindset: A 5-Step Method . . .
|
Garrett Gee |
15:37 - 16:37 |
Jack Rhysider, Ray [REDACTED] and more 1337 hacker . . .
|
Ray [REDACTED],Jack Rhysi . . . |
15:00 - 15:59 |
Packet Hacking Village Music
|
Ray Derac |
16:00 - 17:59 |
Um, ACKtually...
|
|
16:00 - 16:45 |
Walking Tour Groups
|
|
16:30 - 17:15 |
Walking Tour Groups
|
|
16:00 - 16:59 |
Book Signing - Hunter Scott/No Starch Press
|
|
16:00 - 16:59 |
Book Signing - Breaking IN: A Practical Guide To S . . .
|
Ayman Elsawah |
16:00 - 16:59 |
Packet Hacking Village Music
|
Ray Derac |
16:00 - 17:59 |
Queercon Mixer
|
|
17:00 - 17:45 |
Walking Tour Groups
|
|
17:15 - 17:59 |
Walking Tour Groups
|
|
17:00 - 17:59 |
Book Signing - Kurtis Minder
|
|
17:30 - 21:30 |
Policy @ DEF CON Mixer
|
|
17:00 - 17:59 |
Friends of Bill W
|
|
17:00 - 17:59 |
Packet Hacking Village Music
|
Acid-T |
18:00 - 20:59 |
Spades Tournament & Game Night Social
|
|
18:00 - 20:59 |
Lawyers Meet
|
|
19:00 - 01:59 |
Hacker Karaoke
|
|
19:00 - 00:59 |
BlanketFort Con
|
|
20:00 - 23:59 |
Movie Night
|
|
20:00 - 22:59 |
DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup
|
|
20:00 - 01:59 |
Music Set / Entertainment (Chillout Stage, Friday)
|
Elipscion,Daemon Chadeau, . . . |
21:00 - 23:30 |
Women, gender non-conforming and non-binary meetup . . .
|
|
21:00 - 01:59 |
Arcade Party
|
|
21:00 - 23:59 |
IoT Village: 10 Years. 1,000 Devices. Infinite Vul . . .
|
|
22:00 - 01:59 |
+61: the Australian Embassy
|
|
| | |
Saturday |
|
|
06:00 - 07:59 |
Defcon.run
|
|
09:00 - 15:59 |
Merch (formerly swag) Area Open -- README
|
|
09:00 - 18:59 |
Human Registration Open
|
|
10:00 - 10:45 |
Walking Tour Groups
|
|
10:30 - 11:15 |
Walking Tour Groups
|
|
10:00 - 10:59 |
Book Signing - Cyber Calendar 2026 - Chris DeCarme . . .
|
Chris DeCarmen |
10:00 - 10:59 |
Book Signing - Adversary Emulation with MITRE ATT& . . .
|
Drinor Selmanaj |
10:00 - 10:59 |
Packet Hacking Village Music
|
Athlex |
10:00 - 01:59 |
Lost & Found
|
|
11:00 - 11:45 |
Walking Tour Groups
|
|
11:30 - 12:15 |
Walking Tour Groups
|
|
11:00 - 11:59 |
Book Signing - Corey Ball/No Starch Press
|
Corey Ball |
11:00 - 11:59 |
Book Signing - Patrick Wardle/ No Starch Press
|
Patrick Wardle |
11:00 - 11:59 |
Book Signing - Future of Hacking: The Rise of Cybe . . .
|
Laura S. Scherling |
11:00 - 11:59 |
Packet Hacking Village Music
|
n0pslide |
11:00 - 16:59 |
Free Ham Radio Exams
|
|
12:00 - 12:45 |
Walking Tour Groups
|
|
12:30 - 13:15 |
Walking Tour Groups
|
|
12:00 - 12:59 |
Book Signing - Casey Erdman/No Starch Press
|
Casey Edman |
12:00 - 12:59 |
Book Signing - Practical Lock Picking; Keys to the . . .
|
Deviant Ollam |
12:00 - 12:59 |
Book Signing - Kurtis Minder
|
|
12:00 - 13:59 |
DCG312 Meetup: Windy City Hackers Take Vegas
|
willasaywhat |
12:00 - 12:59 |
Friends of Bill W
|
|
12:00 - 12:59 |
Packet Hacking Village Music
|
mattrix |
13:00 - 13:45 |
Walking Tour Groups
|
|
13:30 - 14:15 |
Walking Tour Groups
|
|
13:00 - 13:59 |
Book Signing - Eugene Lim/ No Starch Press
|
Eugene "spaceraccoon" Lim |
13:00 - 13:59 |
Packet Hacking Village Music
|
Icetre Normal |
14:00 - 14:45 |
Walking Tour Groups
|
|
14:30 - 15:15 |
Walking Tour Groups
|
|
14:00 - 14:59 |
Book Signing - Fotis Chantizis/ No Starch Press
|
Fotis Chantizis |
14:00 - 14:59 |
Book Signing - Cyber Calendar 2026 - Chris DeCarme . . .
|
Chris DeCarmen |
14:00 - 14:59 |
Book Signing - Paulino Calderon/No Starch Press
|
Paulino Calderon |
14:00 - 14:59 |
Book Signing - The Hacker Mindset: A 5-Step Method . . .
|
Garrett Gee |
14:00 - 15:59 |
Sticker Swap at DEF CON 33
|
|
14:00 - 15:59 |
DC Book Club Discussion
|
|
14:00 - 14:59 |
Packet Hacking Village Music
|
Ap0ll0 |
15:00 - 15:45 |
Walking Tour Groups
|
|
15:30 - 16:15 |
Walking Tour Groups
|
|
15:00 - 15:59 |
Book Signing - Jason Andress/ No Starch Press
|
Jason Andress |
15:00 - 15:59 |
Book Signing - Firewalls Don't Stop Dragons: A Ste . . .
|
Carey Parker |
15:00 - 15:59 |
Book Signing - Kara Nance/No Starch Press
|
Kara Nance |
15:00 - 15:59 |
Book Signing - The Browser Security Field Manual A . . .
|
Audrey Adeline |
15:00 - 15:59 |
Packet Hacking Village Music
|
Ap0ll0 |
16:30 - 17:15 |
Walking Tour Groups
|
|
16:00 - 16:45 |
Walking Tour Groups
|
|
16:00 - 16:59 |
Book Signing - Phrack / No Starch Press
|
|
16:00 - 16:59 |
Book Signing - Breaking IN: A Practical Guide To S . . .
|
Ayman Elsawah |
16:00 - 16:59 |
Packet Hacking Village Music
|
Funktribe |
16:00 - 17:59 |
Queercon Mixer
|
|
17:15 - 17:59 |
Walking Tour Groups
|
|
17:00 - 17:45 |
Walking Tour Groups
|
|
17:30 - 21:30 |
Policy @ DEF CON Mixer
|
|
17:00 - 17:59 |
Friends of Bill W
|
|
17:00 - 17:59 |
Packet Hacking Village Music
|
Funktribe |
19:00 - 01:59 |
Hacker Karaoke
|
|
19:00 - 21:59 |
WISP + Blue Team Village Movie Night and Mixer
|
WISP + BTV |
19:30 - 22:59 |
DC NextGen
|
|
19:30 - 22:30 |
The DEF CON Pool Party
|
|
20:00 - 23:59 |
Movie Night
|
|
20:00 - 21:59 |
Conference Planners Meetup
|
|
20:00 - 23:59 |
The Jasmine Dragon
|
|
20:00 - 01:59 |
Music Set / Entertainment (Chillout Stage, Saturda . . .
|
0xdade,Dual Core,DJ null, . . . |
21:00 - 01:59 |
Cyberdelia Rave
|
|
21:00 - 01:59 |
Day of the Dead Hacker Party
|
|
21:00 - 01:59 |
GOTHCON
|
|
21:00 - 01:59 |
The Illuminati Party
|
|
21:00 - 01:59 |
VETCON 2025 Party
|
|
22:00 - 01:59 |
Call Center Village Party
|
|
| | |
Sunday |
|
|
06:00 - 07:59 |
Defcon.run
|
|
09:00 - 11:59 |
Human Registration Open
|
|
10:30 - 11:15 |
Walking Tour Groups
|
|
10:00 - 10:45 |
Walking Tour Groups
|
|
10:00 - 10:59 |
Book Signing - Ghost Hacker : How to hack human sp . . .
|
Jun “Ghost Hacker” Ka . . . |
10:00 - 10:59 |
Packet Hacking Village Music
|
kampf |
10:00 - 13:59 |
Lost & Found
|
|
11:00 - 11:45 |
Walking Tour Groups
|
|
11:30 - 12:15 |
Walking Tour Groups
|
|
11:00 - 11:59 |
Book Signing - Kurtis Minder
|
|
11:00 - 11:59 |
Book Signing - Micah Lee/ No Starch Press
|
Micah "micahflee" Lee |
11:00 - 11:59 |
Packet Hacking Village Music
|
tavoo |
11:00 - 12:59 |
Free Ham Radio Exams
|
|
12:00 - 12:45 |
Walking Tour Groups
|
|
12:30 - 13:15 |
Walking Tour Groups
|
|
12:00 - 12:59 |
Book Signing - Kurtis Minder
|
|
12:00 - 12:59 |
Friends of Bill W
|
|
13:00 - 13:45 |
Walking Tour Groups
|
|
13:15 - 13:59 |
Walking Tour Groups
|
|