Village Talk List

Friday 10:00 - 10:59 LHC First Time DEF CON Meetup 10:00 - 12:59 Sticker Swap 10:00 - 11:59 LHC Capture the Flag 13:15 - 13:59 Hard Hat Brigade Creations Q&A MrBill,M0nkeyDrag0n,Hydro . . . Saturday 10:00 - 12:59 Sticker Swap 10:00 - 11:59 LHC Capture the Flag 15:00 - 15:45 Hard Hat Brigade Organizer Panel MrBill,M0nkeyDrag0n,Hydro . . . Sunday 10:00 - 12:59 Sticker Swap

ADV - Adversary Village

Location: LVCCWest-Level1-Hall2-W702 - Map
Home Page: https://adversaryvillage.org


PDT Times Title speaker
Friday
11:00 - 11:45 From adversarial to aligned, redefining purple tea . . . Adam Pennington,Sydney Ma . . .
15:45 - 16:30 Adversarial mindset, thinking like an attacker is . . . Abhijith "Abx" B R,Keenan . . .
15:00 - 15:45 Adversaries at War: Tactics, technologies, and les . . . Gregory Carpenter,Barb Hi . . .
17:00 - 17:30 Of Stochastic Parrots and Deterministic Predators: . . . Bobby Kuzma,Michael Odell
Saturday
11:00 - 11:30 Malware in the gist: How malicious packages on npm . . . Paul McCarty
14:00 - 14:30 Blurred Lines of Cyber Threat Attribution: The Evo . . . Seongsu Park
15:30 - 15:59 Operational Twilight: APTs, OT, and the geopolitic . . . Cybelle Oliveira
15:00 - 15:30 Countering Forensics Software by Baiting Them Weihan Goh,Joseph Lim,Isa . . .
Sunday
11:00 - 11:30 Red Russians: How Russian APT groups closely follo . . . Will Thomas
11:00 - 11:30 Here and Now: Exploiting the Human Layer at the Ri . . . Daniel Isler
12:00 - 12:30 TotalTest 2.Oh!: Unleashing a Testing Program to B . . . Nebu Varghese
12:00 - 12:30 Letthemin: Facilitating High-Value Purple Teams Us . . . Sarah Hume

Return to Index

AIV - Artificial Intelligence Village

Location: LVCCWest-Level3-W314-W316 - Map
Home Page: https://aivillage.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732733090568339536


PDT Times Title speaker
Saturday
14:15 - 14:59 Assessing the Capabilities Gap Between Foundation . . . Justin W. Lin
16:30 - 17:15 Impact of Frontier AI on the Landscape of Cybersec . . . Dawn Song

Return to Index

ASV - Aerospace Village

Location: LVCCWest-Level1-Hall2-W503 - Map
Home Page: https://aerospacevillage.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732393044363444264


PDT Times Title speaker
Friday
15:00 - 15:30 VDP in Aviation - How it shouldn't be done! Matt Gaffney
16:30 - 16:59 Burning, trashing, spacecraft crashing: a collecti . . . Andrzej Olchawa,Milenko S . . .
17:00 - 17:30 Moonlight Defender - Purple Teaming in Space! Ben Hawkins
17:00 - 17:30 Satellite Networks Under Siege: Cybersecurity Chal . . . Roee Idan
Saturday
14:00 - 14:30 Red Teaming Space: Hacking the Final Frontier Tim Fowler
Sunday
10:00 - 10:59 Behind the Badge: How We Used and Abused Hardware . . . Adam Batori,Robert Paffor . . .
11:00 - 11:30 Hacking Space to Defend It: Generating IoBs with S . . . Brandon Bailey

Return to Index

BBV - Bug Bounty Village

Location: LVCCWest-Level3-W326 - Map
Home Page: https://bugbountydefcon.com/


PDT Times Title speaker
Friday
10:00 - 10:30 Secret Life of an Automationist: Engineering the H . . . Gunnar "g0lden" Andrews
10:00 - 10:59 Prompt. Scan. Exploit: AI’s Journey Through Zero . . . Diego "djurado" Jurado,Jo . . .
10:00 - 10:59 Becoming a Caido Power User Justin "rhynorater" Gardn . . .
11:00 - 11:59 Attacking AI Jason "jhaddix" Haddix
12:00 - 12:59 Voices from the Frontlines: Managing Bug Bounties . . . Gabriel Nitu,Jay Dancer,T . . .
12:00 - 12:59 Nuclei: Beyond The Basic Templates Ben "nahamsec" Sadeghipou . . .
13:30 - 14:30 Creator Panel Discussion Ben "nahamsec" Sadeghipou . . .
14:00 - 14:59 Securing Intelligence: How hackers are breaking mo . . . Dane Sherrets,Shlomie Lib . . .
14:30 - 15:30 Testing Trust Relationships: Breaking Network Boun . . . Michael Gianarakis,Jordan . . .
15:30 - 15:59 The Year of the Bounty Desktop: Bugs from Binaries Parsia "CryptoGangsta" Ha . . .
16:00 - 16:30 To Pay or Not to Pay? The Battle Between Bug Bount . . . Aaron "scriptingxss" Guzm . . .
16:30 - 16:59 Hacking the Edge: Real-World ESI Injection Exploit . . . Robert "nytr0gen" Vulpe
17:00 - 17:30 VRP @ Google -- a look inside a large self-hosted . . . Sam "erbbysam" Erb
17:30 - 17:59 Exploiting the Off-chain ecosystem in Web 3 Bug Bo . . . Bruno "BrunoModificato" H . . .
Saturday
10:00 - 10:59 Nuclei: Beyond The Basic Templates Ben "nahamsec" Sadeghipou . . .
10:00 - 10:59 The Ars0n Framework V2 Beta Harrison "rs0n" Richardso . . .
11:00 - 11:59 Magical Hacks Inti "intidc" De Ceukelai . . .
12:00 - 12:30 Sometimes you find bugs, sometimes bugs find you Jasmin "JR0ch17" Landry
12:00 - 12:59 From Component to Compromised: XSS via React creat . . . Nick Copi
13:00 - 13:59 Breaking the Chain: Advanced Offensive Strategies . . . Roni "lupin" Carta,Adnan . . .
13:00 - 14:30 Surfing through the Stream: Advanced HTTP Desync e . . . Martin "tincho_508" Doyhe . . .
15:00 - 15:30 Referral Beware, Your Rewards Are Mine Whit "un1tycyb3r" Taylor
15:00 - 16:30 Platform Panel about Triage Michelle Lopez,Michael "c . . .
16:30 - 17:30 Hacking the Graph: Advanced Target Discovery with . . . Jeff "caffix" Foley
17:30 - 17:59 Cheat Code for Hacking on T-Mobile: From Inside th . . . Elisa Gangemi
Sunday
10:00 - 10:59 Bug Bounty Village Social Hour
11:00 - 11:59 Hacker vs. Triage: Inside the Bug Bounty Battlegro . . . Richard "richeeta" Hyunho . . .
11:00 - 11:30 Hacking at Scale with AI Agents: Building an Auton . . . Vanshal Gaur
11:00 - 11:30 Full Disclosure, Full Color: Badge-making story of . . . Abhinav Pandagale
11:30 - 11:59 Portswigger Awards: Top 10 web hacking techniques . . . Portswigger
12:00 - 12:59 Bug Bounty Village CTF Walkthrough CTF.ae
13:00 - 13:30 Bug Bounty Village CTF Awards Bug Bounty Village Staff, . . .
13:30 - 13:59 Bug Bounty Village Closing Ceremony Bug Bounty Village Staff

Return to Index

BHV - Bio Hacking Village

Location: LVCCWest-Level1-Hall2-W606 - Map
Home Page: https://www.villageb.io/
DC Discord Chan: https://discord.com/channels/708208267699945503/735273390528528415


PDT Times Title speaker
Friday
10:30 - 10:59 Quantum-Resistant Healthcare Katarina Amrichova
11:00 - 15:59 accessDenied: Step Into the Scenario. Deal the Con . . . Jack Voltaic
13:45 - 14:30 Digital Casualties: Documenting Cyber-Induced Pati . . . Jorge Acevedo Canabal,Sco . . .
16:00 - 16:30 Bio-Cryptography is the Game-Genie in a post quant . . . James Utley
17:00 - 17:30 They deployed Health AI on us. We’re bringing th . . . Andrea Downing
17:30 - 17:59 How AI + Hardware can Transforming Point-of-Care W . . . PamirAI
Saturday
11:00 - 13:59 Operation Europa Crisis: A Tabletop Simulation Nathan Case
11:00 - 15:59 accessDenied: Step Into the Scenario. Deal the Con . . . Jack Voltaic
15:00 - 15:30 Digital First Responders: Fixing Patient Safety G . . . Jennifer Schieferle Uhlen . . .
Sunday
11:30 - 11:59 Bare Metal Reverse Engineering SolaSec
11:30 - 11:59 ​​Introducing CIPHER: The Open-Source Platform . . . Isabel Straw

Return to Index

CHV - Car Hacking Village

Location: LVCCWest-Level1-Hall2-W602 - Map
Home Page: https://www.carhackingvillage.com/
DC Discord Chan: https://discord.com/channels/708208267699945503/732722838942777474


PDT Times Title speaker
Friday
12:30 - 12:59 How API flaws led to admin access to over 1,000 US . . . Eaton Zveare
14:30 - 14:59 Modern Odometer Manipulation collin,oblivion
16:00 - 16:30 Hacking a head unit with malicious PNG Danilo Erazo
16:30 - 16:59 Context Aware Anomaly Detection in Automotive CAN . . . Ravi Rajput
16:30 - 16:59 Smart Bus Smart Hacking: From Free WiFi to Total C . . . Chiao-Lin "Steven Meow" Y . . .
Saturday
13:00 - 13:30 Uncovering the Secrets of Tire Pressure Monitoring . . . Yago Lizarribar
17:00 - 17:59 One Modem to Brick Them All: Exploiting Vulnerabil . . . Marcell Szakály,Sebastia . . .
Sunday
10:00 - 10:59 Blind Trailer Shouting Ben Gardiner

Return to Index

CON - Contests

Home Page: https://defcon.outel.org/dcwp/dc33/activities/contests-list/
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_CON


PDT Times Title speaker
Thursday
12:00 - 12:59 Hac-Man - Remote play available
Friday
10:00 - 11:59 Aw, man...pages!
10:00 - 17:59 Hac-Mac Contest Booth Open
12:00 - 16:59 Kubernetes Learning CTF (Non-competitive) w/ Suppo . . .
13:00 - 14:59 Pub Quiz at DEF CON
19:00 - 20:59 AI Art Battle
20:00 - 21:59 Hacker Jeopardy
22:30 - 00:30 Whose Slide Is It Anyway?
Saturday
10:00 - 11:59 DEF CON Beard and Mustache Contest
10:00 - 16:59 Kubernetes Learning CTF (Non-competitive) w/ Suppo . . .
10:30 - 17:30 Kubernetes Competitive CTF
10:00 - 17:59 Hac-Mac Contest Booth Open
10:00 - 10:59 The Pwnie Awards
13:00 - 14:59 Taskmooster
16:00 - 17:59 Hack3r Runw@y Contest
19:00 - 21:59 EFF Tech Trivia
20:00 - 21:59 Hacker Jeopardy
22:30 - 00:30 Feet Feud (Hacker Family Feud)
Sunday
10:00 - 11:59 Kubernetes Learning CTF (Non-competitive) w/ Suppo . . .
10:00 - 12:59 Hac-Mac Contest Booth Open
12:00 - 12:59 Hac-Man - Remote play available
12:00 - 12:59 Hac-Man - Remote play available
12:00 - 12:59 Hac-Man - Remote play available

Return to Index

CPV - Crypto Privacy Village

Location: LVCCWest-Level1-Hall1-W403 - Map
Home Page: https://cryptovillage.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732734002011832320


PDT Times Title speaker
Friday
10:00 - 10:05 Crypto Privacy Village: Welcome Crypto Privacy Village St . . .
12:00 - 12:59 Behind The Dashboard - (Lack Of) Automotive Privac . . . Lior ZL,Jacob Avidar
12:30 - 12:59 Back to Basics: Building Resilient Cyber Defenses Yael Grauer
13:00 - 13:59 A Tale of Weeds and Roses: Propagating the Right D . . . Irene Mo,Alyssa Coley
14:30 - 14:59 QRAMM: The Cryptographic Migration to a Post-Quant . . . Emily Fane,Abdel Sy Fane
16:30 - 16:59 The depths that marketers will plummet to 4dw@r3
Saturday
10:00 - 10:05 Crypto Privacy Village: Welcome Crypto Privacy Village St . . .
10:00 - 10:59 Gold Bug: Puzzle Panel with Friends
11:00 - 11:59 Illuminating the Dark Corners of AI: Extracting Pr . . . Patrick Walsh
12:00 - 12:59 Cracking Chaos: Making, Using, and Breaking PRNGs 1nfocalypse
Sunday
10:30 - 10:45 Intro to Ciphers [Mini Workshop/Talk] Crypto Privacy Village St . . .
10:00 - 10:05 Crypto Privacy Village: Welcome Crypto Privacy Village St . . .
10:00 - 10:30 Escaping the Privacy Sandbox with Client-Side Dean . . . Eugene "spaceraccoon" Lim
11:00 - 11:30 You Can Mix but You Can’t Hide: Uncovering Node . . . Alexis Cao
12:30 - 12:59 Crypto Privacy Village: Closing Remarks Crypto Privacy Village St . . .

Return to Index


PDT Times Title speaker
Friday
10:00 - 11:50 AML Cryptocurrency Compliance Joseph,Chelsea Button
10:00 - 17:59 WipeOut XL hi-score tournament
10:00 - 17:59 Career Fair: Interview Tips and Referral Krity Kharbanda,Aastha Sa . . .
10:15 - 10:59 Silent Sabotage: How Nation-State Hackers Turn Hum . . . Nathan Case,Jon McCoy
10:00 - 17:59 Memorial Chamber Open
11:00 - 11:59 Cryptocurrency Opening Keynote Michael "MSvB" Schloh von . . .
12:00 - 13:50 Red Teaming Financial Defenses Wei Hong,Chloe Chong
12:00 - 12:59 Tunnelpocalypse Rich Compton
13:00 - 13:59 Rebuild The World: Access to secure software depen . . . Tom Berek,Farid Zakaria,D . . .
14:00 - 15:50 Evolution and History of Drain and Approval Attack . . . utvecklas,George
14:00 - 14:30 Off-Grid Datarunning in Oppresive Regimes: Sneaker . . . Robert "LambdaCalculus" M . . .
14:45 - 15:30 Introduction of Loong Community & Financial Identi . . . Noel Wong,KC Wong
15:30 - 16:30 EFF/Hackers.town RayHunter build clinic
15:30 - 15:59 Grind vs Gleam: Building Reddit's DDoS Resilience Pratik Lotia,Spencer Koch
16:00 - 17:50 Applied Cryptocurrency Hardware Param D Pithadia,Michael . . .
16:30 - 16:59 Quiet Confidence: An Introvert's Journey to Techni . . . Emma Fang
17:00 - 17:59 Badgelife: Lessons from Years of Do’s, Don’ts, . . . Abhinav Pandagale,MakeItH . . .
Saturday
10:00 - 11:50 Cryptocurrency Enforcement Actions Veronika,Chelsea Button
10:00 - 17:59 Career Fair: Resume Review Ruchira Pokhriyal,Harini . . .
10:15 - 10:59 Private, Private, Private: Access Everywhere Meghan Jacquot
10:00 - 17:59 Memorial Chamber Open
11:00 - 11:59 Cryptocurrency Weekend Keynote Chelsea Button,Nick "c7fi . . .
12:00 - 13:50 Hacking Custody and Exchanges Sky Gul,Andrea
12:00 - 12:59 Rayhunter Internals oopsbagel,Cooper "CyberTi . . .
12:00 - 12:59 DDoS: The Next Generation Andrew Cockburn
14:00 - 15:50 Oblivious Access to Blockchains Elaine Shi,Afonso Tinoco
14:30 - 14:59 #ReclaimTech - A community movement Janet Vertesi,Andy Hull
14:00 - 14:30 Surviving the Dataclysm: Resistance through Resili . . . Rebecah Miller
14:00 - 14:30 Tech Reclaimers
16:00 - 17:50 Cryptocurrency Nodes and Relays Diego "rehrar" Salazar,Da . . .
17:00 - 17:59 Breaking In: Real Paths Into Cybersecurity from Ha . . . Eva Benn,Rosie "Lady Cybe . . .
Sunday
10:00 - 11:50 Let's Break Enigma! Rigo Salazar,Luke Szramow . . .
10:00 - 13:59 Memorial Chamber Open
11:00 - 11:45 Creating Integrated Threat Surveillance: AI + OSIN . . . Desiree Wilson
12:00 - 13:50 Self Custodial Wallet Use HalFinneyIsMyHomeBoy
12:00 - 12:59 Passing the Torch: Mentoring and Protecting Our St . . . Sam Comini,Navaar Johnson

Return to Index

DCG - DEF CON Groups



PDT Times Title speaker
Saturday
13:00 - 13:59 DEF CON Groups (DCGs): Keeping the Signal Alive Al . . . Adam915,Jayson E Street,A . . .

Return to Index


PDT Times Title speaker
Friday
10:00 - 10:20 Welcome to DEF CON 33! Jeff "The Dark Tangent" M . . .
10:30 - 11:15 DC101 Panel
10:00 - 10:45 Remote code execution via MIDI messages Anna portasynthinca3 Anto . . .
10:00 - 10:45 BitUnlocker: Leveraging Windows Recovery to Extrac . . . Alon "alon_leviev" Leviev . . .
10:00 - 10:20 Paywall Optional: Stream for Free with a New Techn . . . Farzan Karimi
10:30 - 11:15 No VPN Needed? Cryptographic Attacks Against the O . . . Tom Tervoort
10:00 - 10:45 The One Bitcoin Heist: Making a custom Hashcat mod . . . Joseph "stoppingcart" Gab . . .
11:00 - 11:45 Virtualization-Based (In)security - Weaponizing VB . . . Ori David
11:30 - 12:15 ChromeAlone: Transforming a Browser into a C2 Plat . . . Michael "bouncyhat" Weber
11:00 - 11:45 Inside Look at a Chinese Operational Relay Network Michael "mtu" Torres,Zane . . .
12:30 - 13:15 Ghosts in the Machine Check - Conjuring Hardware F . . . Christopher "xoreaxeaxeax . . .
12:00 - 12:45 Ghost Calls: Abusing Web Conferencing for Covert C . . . Adam "UNC1739" Crosser
12:00 - 12:45 Safe Harbor or Hostile Waters: Unveiling the Hidde . . . Ji'an "azraelxuemo" Zhou, . . .
12:30 - 13:15 Cash, Drugs, and Guns: Why Your Safes Aren't Safe Mark Omo,James Rowley
12:00 - 12:20 The Ultimate Hack: Applying Lessons Learned from t . . . Rear Admiral John Mauger
12:30 - 13:15 Edge of Tomorrow: Foiling Large Supply Chain Attac . . . Maksim Shudrak
13:30 - 14:15 Recording PCAPs from Stingrays With a $20 Hotspot Cooper "CyberTiger" Quint . . .
13:00 - 13:45 What is Dead May Never Die: The Ghost of Internet . . . George Hughey,Rohit Mothe
13:00 - 13:45 Advanced Active Directory to Entra ID lateral move . . . Dirk-jan Mollema
13:30 - 14:15 Dead Made Alive Again: Bypassing Intent Destinatio . . . Qidan "flanker_hqd" He
13:30 - 14:15 Weaponizing Trust: Investigating a Threat Actor Ta . . . Christophe Tafani-Dereepe . . .
14:00 - 14:45 DisguiseDelimit: Exploiting Synology NAS with Deli . . . Ryan Emmons
14:00 - 14:45 You snooze you lose: RPC-Racer winning RPC endpoin . . . Ron Ben Yizhak
14:30 - 15:15 Siri-ously Leaky: Exploring Overlooked Attack Surf . . . Richard "richeeta" Hyunho . . .
14:30 - 15:15 Firewalls Under Fire: China's 5+ year campaign to . . . Andrew "Spike" Brandt
15:30 - 16:15 Mastering Apple's Endpoint Security for Advanced m . . . Patrick Wardle
15:00 - 15:45 Gateways to Chaos - How We Proved Modems Are a Tic . . . Chiao-Lin "Steven Meow" Y . . .
15:00 - 15:45 From Spoofing to Tunneling: New Red Team's Network . . . Shu-Hao, Tung 123ojp
15:30 - 16:15 Unmasking the Snitch Puck: the creepy IoT surveill . . . Reynaldo "buh0",nyx
15:30 - 16:15 So Long, and Thanks for All the Phish Harrison Sand,Erlend Leik . . .
16:30 - 17:15 HTTP/1.1 Must Die! The Desync Endgame James "albinowax" Kettle
16:00 - 16:45 The (Un)Rightful Heir: My dMSA Is Your New Domain . . . Yuval Gordon
16:00 - 16:45 Infecting the Boot to Own the Kernel: Bootkits and . . . Alejandro "TheMalwareGuar . . .
16:30 - 17:15 Escaping the Privacy Sandbox with Client-Side Dean . . . Eugene "spaceraccoon" Lim
16:30 - 16:50 Killing Killnet Alex Holden
17:30 - 17:50 Rusty pearls: Postgres RCE on cloud databases Tal "TLP" Peleg,Coby Abra . . .
17:00 - 17:45 Orion - fuzzing workflow automation Max Bazalii,Marius Fleisc . . .
17:00 - 17:45 Emulating Embedded Linux Devices at Scale with Lig . . . Sigusr Polke
17:30 - 17:50 Silent Leaks: Harvesting Secrets from Shared Linux . . . Cernica Ionut Cosmin
17:00 - 17:45 Building a Malware Museum Mikko Hypponen
Saturday
10:00 - 10:45 AppleStorm - Unmasking the Privacy Risks of Apple . . . Yoav Magid
10:00 - 10:20 Turning Camera Surveillance on its Axis Noam Moshe
10:30 - 11:15 One Modem to Brick Them All: Exploiting Vulnerabil . . . Marcell Szakály,Jan "SP3 . . .
10:00 - 10:20 Binary Facades: Reversing approaches to extract em . . . Patrick Wardle
10:30 - 11:15 Kill Chain Reloaded: Abusing legacy paths for stea . . . Alejandro "0xedh" Hernand . . .
10:00 - 10:45 Where’s My Crypto, Dude? The Ultimate Guide to C . . . Thomas "fr0gger_" Roccia
11:00 - 11:45 How to secure unique ecosystem shipping 1 billion+ . . . Adam "pi3" Zabrocki,Marko . . .
11:00 - 11:45 The DOMino Effect: Automated Detection and Exploit . . . Zhengyu Liu,Jianjia Yu
11:30 - 12:15 Breakin 'Em All – Overcoming Pokemon Go's Anti-C . . . Tal Skverer
11:30 - 12:15 Original Sin of SSO: macOS PRT Cookie Theft & Entr . . . Shang-De "HackerPeanutJoh . . .
11:00 - 11:45 Man-in-the-Malware: Intercepting Adversarial Commu . . . Ben "polygonben" Folland
12:00 - 12:45 Client or Server? The Hidden Sword of Damocles in . . . Ji'an "azraelxuemo" Zhou, . . .
12:00 - 12:45 Help! Linux in my Webcam! (•_•) Mickey Shkatov,Jesse Mich . . .
12:30 - 13:15 Claude--Climbing a CTF Scoreboard Near You Keane Lucas
12:30 - 13:15 Diamonds Are For Hackers - Building the first full . . . Mark "LargeCardinal" Carn . . .
12:00 - 12:45 Not Just a Pipeline Leak: Reconstructing the Real . . . Aviad Hahami
13:00 - 13:45 Hackers Dropping Mid-Heist Selfies: LLM Identifies . . . Olivier Bilodeau,Estelle . . .
13:00 - 13:45 Thinking Like a Hacker in the Age of AI Richard "neuralcowboy" Th . . .
13:30 - 14:15 One Key, Two Key, I Just Stole Your goTenna Key Erwin "Dollarhyde" Karinc . . .
13:30 - 14:15 CTRAPS: CTAP Impersonation and API Confusion Attac . . . Marco Casagrande,Daniele . . .
13:00 - 13:45 Stories from a Tor dev Roger "arma" Dingledine
14:00 - 14:20 RATs & Socks abusing Google Services Valerio "MrSaighnal" Ales . . .
14:30 - 14:50 HaKCing OBD-II Emissions Testing Archwisp
14:00 - 14:45 Rebadged, Relabeled, and Rooted: Pwnage via the So . . . Anthony "Coin" Rose,Jake . . .
14:30 - 15:15 ReVault! Compromised by your Secure SoC Philippe "phLaul" Laulher . . .
14:30 - 16:15 Ask EFF Hannah Zhao,Alexis Hancoc . . .
14:00 - 14:45 TSPU: Russia's Firewall and Defending Against the . . . Benjamin "bmixonbaca" Mix . . .
15:00 - 15:45 Browser Extension Clickjacking: One Click and Your . . . Marek Tóth
15:00 - 15:20 Shaking Out Shells with SSHamble HD Moore
15:30 - 16:15 Metal-as-a-Disservice: Exploiting Legacy Flaws in . . . Bill Demirkapi
15:30 - 16:15 Zero Trust, Total Bust - Breaking into thousands o . . . David "johnnyspandex" Cas . . .
15:00 - 15:45 Ghosts of REvil: An Inside Look with the Hacker Be . . . Jon DiMaggio,John Fokker
16:00 - 16:45 Turning Microsoft's Login Page into our Phishing I . . . Keanu "RedByte" Nys
16:30 - 17:15 Direct Memory, Access Everywhere Joe "securelyfitz" FitzPa . . .
16:30 - 17:15 De-Virtualizing the Dragon: Automated Unpacking an . . . Agostino "Van1sh" Panico
16:30 - 17:15 7 Vulns in 7 Days: Breaking Bloatware Faster Than . . . Leon "leonjza" Jacobs
16:00 - 16:45 "We are currently clean on OPSEC": The Signalgate . . . Micah "micahflee" Lee
17:00 - 17:45 Blind Trailer Shouting Ben Gardiner
17:30 - 17:50 Hacking Hotspots: Pre-Auth Remote Code Execution, . . . Edward "Actuator" Warren
17:30 - 17:50 Voice Cloning Air Traffic Control: Vulnerabilities . . . Andrew "Helicopters of DC . . .
17:30 - 17:50 OverLAPS: Overriding LAPS Logic Antoine Goichot
17:00 - 17:45 Amber64: Mining Hacker History from Over Half a Mi . . . Wesley McGrew
Sunday
10:00 - 10:45 Invitation Is All You Need! Invoking Gemini for Wo . . . Ben Nassi,Or "oryair1999" . . .
10:00 - 10:45 SSH-nanigans: Busting Open the Mainframes Iron For . . . Philip "Soldier of FORTRA . . .
10:00 - 10:20 From Shanghai to the Shore: The Silent Threat in G . . . Kenneth Miltenberger,Nich . . .
10:30 - 11:15 Can't Stop the ROP: Automating Universal ASLR Bypa . . . Bramwell Brizendine
10:00 - 10:20 Mind the Data Voids: Hijacking Copilot Trust to De . . . Tobias "ItsSixtyNein" Die . . .
10:30 - 11:15 Jailbreaking the Hivemind: Finding and Exploiting . . . Agostino "Van1sh" Panico
10:00 - 10:45 Cyber Volunteering and Community Defense - DEF CON . . . Sarah Powazek,Jake Braun, . . .
11:00 - 11:45 Playing Dirty Without Cheating - Getting Banned fo . . . Sam Collins,Marius Muench . . .
11:00 - 11:45 Journey to the center of the PSTN: How I became a . . . Enzo Damato
11:30 - 12:15 Passkeys Pwned: Turning WebAuthn Against Itself Shourya Pratap Singh,Jonn . . .
11:30 - 12:15 Breaking Wi-Fi Easy Connect: A Security Analysis o . . . George "sophron" Chatziso . . .
11:00 - 11:45 Kill List: Hacking an Assassination Site on the Da . . . Carl Miller,Chris Monteir . . .
12:00 - 12:45 Phrack Panel
12:00 - 12:45 Turning your Active Directory into the attacker’ . . . Quentin "croco_byte" Rola . . .
12:30 - 13:15 Win-DoS Epidemic: A crash course in abusing RPC fo . . . Or "oryair1999" Yair,Shah . . .
12:30 - 13:15 Silent Signals: Exploiting Security and Privacy Si . . . Gabriel Gegenhuber,Maximi . . .
12:00 - 12:45 Carding, Sabotage & Survival: A Darknet Market Vet . . . Godman666
13:30 - 13:50 Planting C4: Cross-Compatible External C2 for All . . . Scott "ScottCTaylor12" Ta . . .
13:30 - 14:15 SCCM: The tree that always bears bad fruits Mehdi "kalimer0x00" Elyas . . .
13:00 - 13:45 Unexpected Connections: How a vulnerability in obs . . . Eaton Zveare,Roshan Piyus . . .
13:30 - 14:59 Contest Closing Ceremonies & Awards
14:00 - 14:20 Loading Models, Launching Shells: Abusing AI File . . . Cyrus Parzian
14:00 - 14:20 How to Fake a Badge like a Pro: 11 Tips to Counter . . . Russell Phillips
15:00 - 17:59 DEF CON Closing Ceremonies & Awards Jeff "The Dark Tangent" M . . .

Return to Index


PDT Times Title speaker
Friday
09:00 - 12:59 Whitebox Web Exploit Dev (WWED) Cale "calebot" Smith,Luke . . .
09:00 - 12:59 Effectively Detecting Modern Malware with Volatili . . . Andrew Case,Lauren Pace,D . . .
09:00 - 12:59 Open Source Malware 101 - Everything you always wa . . . Paul "6mile" McCarty
09:00 - 12:59 Introduction to Cryptographic Attacks Matt Cheung
09:00 - 12:59 Inside the Threat: Designing and Deploying Malicio . . . Or Eshed,Aviad Gispan
09:00 - 12:59 Accelerating Malware Analysis with WinDbg Time Tra . . . Joshua "jstrosch" Strosch . . .
09:00 - 12:59 SnowGoat: Exposing Hidden Security Risks and Leaki . . . Lior Adar,Chen Levy Ben A . . .
09:00 - 12:59 Medical Device Hacking: 201 Michael "v3ga" Aguilar,Al . . .
14:00 - 17:59 Contextualizing alerts with relevant logs and even . . . Ezz Tahoun
14:00 - 17:59 64-bit Intel Assembly Language Programming for Hac . . . Wesley McGrew
14:00 - 17:59 PLC Playground: Hands-On Industrial Control System . . . Anthony "Coin" Rose,Danie . . .
14:00 - 17:59 Hands-on Kubernetes Attack & Defense Masterclass Madhu "madhuakula" Akula
14:00 - 17:59 Analyzing and Creating Windows Shellcode for Hacke . . . Bramwell Brizendine,Austi . . .
14:00 - 17:59 Obfuscation Reloaded: Modern Techniques for Evadin . . . Jake "Hubble" Krasnov,Vin . . .
14:00 - 17:59 Dive into Windows Library Loading Yoann "OtterHacker" DEQUE . . .
14:00 - 17:59 Fine Tune your personal LLM assistant to Secure co . . . Or Sahar,Yariv Tal
Saturday
09:00 - 12:59 Fortifying AI: Hands-On Training in Adversarial At . . . Vishal "Vish" Thakur,John . . .
09:00 - 12:59 Hands-On Threat Hunting with Wireshark Chris Greer
09:00 - 12:59 Eliminating Bug Classes at Scale: Leveraging Brows . . . Javan Rasokat
09:00 - 12:59 Pen-testing Cloud REST APIs Rodney Beede
09:00 - 12:59 Wi-Fi-So-Serious James Hawk,Brian Burnett
09:00 - 12:59 Practical YARA: Crafting Custom Rules for Targeted . . . Joshua "jstrosch" Strosch . . .
09:00 - 12:59 Reach the Nirvana Yoann "OtterHacker" DEQUE . . .
09:00 - 12:59 Advanced Ghidra Scripting & Automation Max "Libra" Kersten
14:00 - 17:59 Learning to Hack Bluetooth Low Energy with BLE CTF Ryan Holeman,Alek Amrani
14:00 - 17:59 Putting EDRs in Their Place: Killing and Silencing . . . Ryan "rj_chap" Chapman,Aa . . .
14:00 - 17:59 From Prompt to Protection: A Practical Guide to Bu . . . Ashwin Iyer,Ritika Verma
14:00 - 17:59 K8sploitation: Hacking Kubernetes the Fun Way Marcelo Ribeiro,Jeff Jord . . .
14:00 - 17:59 Hacking The Metal: Into the GPU eigentourist
14:00 - 17:59 Hacker VPN Eijah,Benjamin "Cave Twin . . .
14:00 - 17:59 Defeating Malware Evasion: Techniques and Counterm . . . Kyle "d4rksystem" Cucci,R . . .
14:00 - 17:59 Deep-dive into modern network fingerprinting Vlad Iliushin
Sunday
09:00 - 12:59 DIY Malware Emulation: Build It, Break It, Detect . . . Sebastian Tapia,Ricardo S . . .
09:00 - 12:59 Provably exfiltrating data by breaking TLS in the . . . AtHeartEngineer,Sinu
09:00 - 12:59 Hacking the connected plant: AI edition! Arnaud Soullié,Alexandri . . .
09:00 - 12:59 Creating malicious functional app on Android HackeMate
09:00 - 12:59 Cloud Forensics Workshop: Smart Grid Edition Kerry "Professor Kilroy" . . .
09:00 - 12:59 Disrupting Digital Dataflows: A 101 on how 2 detec . . . Preston Zen
09:00 - 12:59 Hands-on IoT firmware extraction and flash forensi . . . Dennis Giese,Braelynn Lue . . .
09:00 - 12:59 EMMC BGA Secrets, hack bga memory, no reballing ne . . . Patrick "Gigstorm" Kiley

Return to Index

DDV - Data Duplication Village

Location: LVCCWest-Level2-W225 - Map
Home Page: https://dcddv.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732732641694056478


PDT Times Title speaker
Thursday
16:00 - 18:59 DDV starts accepting drives for duplication
Friday
10:00 - 16:59 DDV open and accepting drives for duplication
13:00 - 13:59 Tracking 300k+ drives: What we’ve learned after . . . Pat Patterson,Stephanie D . . .
15:00 - 15:59 MFT2: More Fungible Threats Mauro Eldritch,Nelson Col . . .
Saturday
10:00 - 16:59 DDV open and accepting drives for duplication
13:00 - 13:59 Tracking 300k+ drives: What we’ve learned after . . . Pat Patterson,Stephanie D . . .
15:00 - 15:59 MFT2: More Fungible Threats Mauro Eldritch,Nelson Col . . .
Sunday
10:00 - 10:59 Last chance to pick up drives at the DDV

Return to Index

DL - DEF CON DemoLabs

Home Page: https://forum.defcon.org/node/252635
Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_DL


PDT Times Title speaker
Friday
09:00 - 09:45 Dyna - Automating the OWASP MASTG with Offensive A . . . Arjun "T3R4_KAAL" Chaudha . . .
09:00 - 09:45 Spotter - Universal Kubernetes Security Scanner an . . . Madhu "madhuakula" Akula
09:00 - 09:45 RETCON - Reticulum Embedded Turnkey Connection Ope . . . Daniel "Varx" Beard
09:00 - 09:45 TheTimeMachine Arjun "T3R4_KAAL" Chaudha . . .
09:00 - 09:45 SAMLSmith Eric Woodruff,Tomer Nahum
10:00 - 10:45 AIMaL - Artificially Intelligent Malware Launcher Endrit Shaqiri,Natyra Sha . . .
10:00 - 10:45 AirBleed - Covert Bluetooth Plist Payload Injectio . . . Ray "CURZE$" Cervantes,Yv . . .
10:00 - 10:45 RETCON - Reticulum Embedded Turnkey Connection Ope . . . Daniel "Varx" Beard
10:00 - 10:45 Attack Flow and Root Cause Discovery - No LLMs, No . . . Ezz Tahoun,Kevin Shi
10:00 - 10:45 SAMLSmith Eric Woodruff,Tomer Nahum
11:00 - 11:45 Blackdagger - Cyber Workflow Automation Framework Mahmut "ErdemOzgen" Erdem . . .
11:00 - 11:45 BOAZ - A Multilayered Approach to AV/EDR Evasion E . . . Thomas "XM20" Xuan Meng
11:00 - 11:45 C4 - Cross Compatible Command and Control Scott "ScottCTaylor12" Ta . . .
11:00 - 11:45 Caldera for OT - Oops! All Software Devon Colmer,Tony Webber
11:00 - 11:45 rev.ng Decompiler Pietro Fezzardi,Alessandr . . .
12:00 - 12:45 Copycat - Identity Stealer Extension Dakshitaa Babu,Shourya Pr . . .
12:00 - 12:45 DVBE - Damn Vulnerable Browser Extension Abhinav Khanna
12:00 - 12:45 Empire 6.0 Vincent "Vinnybod" Rose,J . . .
12:00 - 12:45 EntraGoat - A Deliberately Vulnerable Entra ID Env . . . Tomer Nahum,Jonathan Elka . . .
12:00 - 12:45 FLARE-VM Joshua "jstrosch" Strosch . . .
13:00 - 13:45 Cryptosploit Matt Cheung
13:00 - 13:45 Have I Been Ransomed? Juanma "M4C" Tejada
13:00 - 13:45 Lex Sleuther Aaron "KNOX" James
13:00 - 13:45 Messenger - Proxies Here There and Everywhere Skyler Knecht,Kevin Clark
13:00 - 13:45 Unmanned Wireless Penetration Testing Device Ayaan Qayyum,Omar Hamoude . . .
14:00 - 14:45 Metasploit's Latest Attack Capability and Workflow . . . Spencer "ZeroSteiner" McI . . .
14:00 - 14:45 MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . . Shota "Sh1n0g1" Shinogi,S . . .
14:00 - 14:45 Nebula - 4 Years and Still Kicking *aaS Bleon "Gl4ssesbo1" Proko
14:00 - 14:45 nRootTag - Exploiting Find My and Transforming Com . . . Junming "Chapoly1305" Che . . .
14:00 - 14:45 OAuthSeeker Adam "UNC1739" Crosser
15:00 - 15:45 WarHead Vishal "Vish" Thakur,Davi . . .
15:00 - 15:45 GlytchC2 - Command Execution and Data Exfiltration . . . Anil Celik,Emre Odaman
15:00 - 15:45 Angry Magpie - DLP Bypass Simulator Jeswin Mathai,Xian Xiang . . .
15:00 - 15:45 Robin - The Archaeologist of the Dark Web Apurv "ASG_Sc0rpi0n" Sing . . .
15:00 - 15:45 Beaconator C2 Framework Mike "CroodSolutions" Man . . .
16:00 - 16:45 PAPRa Sean Marquez,Melanie "Gol . . .
16:00 - 16:45 PatchLeaks Huseyn "Khatai" Gadashov
16:00 - 16:45 promptmap2 Utku Sen
16:00 - 16:45 RETINA - Realtime Electronic Threat and Intrusion . . . Cesare "Red5heep" Pizzi
16:00 - 16:45 Tengu Marauder v2 Lexie "L3xic0n" Thach,Mun . . .
Saturday
09:00 - 09:45 Cryptosploit Matt Cheung
09:00 - 09:45 TheTimeMachine Arjun "T3R4_KAAL" Chaudha . . .
09:00 - 09:45 AIMaL - Artificially Intelligent Malware Launcher Endrit Shaqiri,Natyra Sha . . .
09:00 - 09:45 AirBleed - Covert Bluetooth Plist Payload Injectio . . . Ray "CURZE$" Cervantes,Yv . . .
09:00 - 09:45 Angry Magpie - DLP Bypass Simulator Jeswin Mathai,Xian Xiang . . .
10:00 - 10:45 Attack Flow and Root Cause Discovery - No LLMs, No . . . Ezz Tahoun,Kevin Shi
10:00 - 10:45 Beaconator C2 Framework Mike "CroodSolutions" Man . . .
10:00 - 10:45 Blackdagger - Cyber Workflow Automation Framework Mahmut "ErdemOzgen" Erdem . . .
10:00 - 10:45 BOAZ - A Multilayered Approach to AV/EDR Evasion E . . . Thomas "XM20" Xuan Meng
10:00 - 10:45 WarHead Vishal "Vish" Thakur,Davi . . .
11:00 - 11:45 Caldera for OT - Oops! All Software Devon Colmer,Tony Webber
11:00 - 11:45 Copycat - Identity Stealer Extension Dakshitaa Babu,Shourya Pr . . .
11:00 - 11:45 DVBE - Damn Vulnerable Browser Extension Abhinav Khanna
11:00 - 11:45 Empire 6.0 Vincent "Vinnybod" Rose,J . . .
11:00 - 11:45 Unmanned Wireless Penetration Testing Device Ayaan Qayyum,Omar Hamoude . . .
12:00 - 12:45 EntraGoat - A Deliberately Vulnerable Entra ID Env . . . Tomer Nahum,Jonathan Elka . . .
12:00 - 12:45 FLARE-VM Joshua "jstrosch" Strosch . . .
12:00 - 12:45 GlytchC2 - Command Execution and Data Exfiltration . . . Anil Celik,Emre Odaman
12:00 - 12:45 Have I Been Ransomed? Juanma "M4C" Tejada
12:00 - 12:45 Lex Sleuther Aaron "KNOX" James
13:00 - 13:45 Messenger - Proxies Here There and Everywhere Skyler Knecht,Kevin Clark
13:00 - 13:45 Robin - The Archaeologist of the Dark Web Apurv "ASG_Sc0rpi0n" Sing . . .
13:00 - 13:45 MPIT - Matrix Prompt Injection Tool and ShinoLLMAp . . . Shota "Sh1n0g1" Shinogi,S . . .
13:00 - 13:45 Nebula - 4 Years and Still Kicking *aaS Bleon "Gl4ssesbo1" Proko
13:00 - 13:45 nRootTag - Exploiting Find My and Transforming Com . . . Junming "Chapoly1305" Che . . .
14:00 - 14:45 OAuthSeeker Adam "UNC1739" Crosser
14:00 - 14:45 PAPRa Sean Marquez,Melanie "Gol . . .
14:00 - 14:45 PatchLeaks Huseyn "Khatai" Gadashov
14:00 - 14:45 promptmap2 Utku Sen
14:00 - 14:45 RETINA - Realtime Electronic Threat and Intrusion . . . Cesare "Red5heep" Pizzi
15:00 - 15:45 Dyna - Automating the OWASP MASTG with Offensive A . . . Arjun "T3R4_KAAL" Chaudha . . .
15:00 - 15:45 Metasploit's Latest Attack Capability and Workflow . . . Spencer "ZeroSteiner" McI . . .
15:00 - 15:45 rev.ng Decompiler Pietro Fezzardi,Alessandr . . .
15:00 - 15:45 Garuda Threat Hunting Framework Monnappa "Monnappa22" K A . . .
15:00 - 15:45 RETINA - Realtime Electronic Threat and Intrusion . . . Cesare "Red5heep" Pizzi
16:00 - 16:45 Tengu Marauder v2 Lexie "L3xic0n" Thach,Mun . . .
16:00 - 16:45 Metasploit's Latest Attack Capability and Workflow . . . Spencer "ZeroSteiner" McI . . .
16:00 - 16:45 C4 - Cross Compatible Command and Control Scott "ScottCTaylor12" Ta . . .
16:00 - 16:45 Garuda Threat Hunting Framework Monnappa "Monnappa22" K A . . .
16:00 - 16:45 Spotter - Universal Kubernetes Security Scanner an . . . Madhu "madhuakula" Akula

Return to Index

ESV - Embedded Systems Village

Location: LVCCWest-Level1-Hall1-W401 - Map
Home Page: https://embeddedvillage.org/


PDT Times Title speaker
Saturday
10:00 - 10:59 How Not to IoT: Lessons in Security Failures Zoltan "zh4ck" Balazs

Return to Index

GHV - Game Hacking Village

Location: LVCCWest-Level1-Hall1-W402
Home Page: https://gamehacking.gg/


PDT Times Title speaker
Friday
14:00 - 14:45 Game Hacking 101 Julian "Julez" Dunning
Saturday
13:00 - 13:45 What Game Hackers teach us about Offensive Securit . . . Joe "Juno" Aurelio

Return to Index

HHV - Hardware Hacking and Solder Skills Villages

Location: LVCCWest-Level1-Hall2-W802 - Map
Home Page: https://dchhv.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732728536149786665


PDT Times Title speaker
Friday
17:00 - 17:59 All your keyboards are belong to us! Federico Lucifredi
Saturday
14:00 - 14:59 The Missing Link: Draytek’s New RCEs Complete th . . . Octavio Gianatiempo,Gasto . . .
Sunday
12:30 - 12:59 The Power(Point) Glove Parsia "CryptoGangsta" Ha . . .

Return to Index

HRV - Ham Radio Village

Location: LVCCWest-Level3-W321 - Map
Home Page: https://hamvillage.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732733631667372103


PDT Times Title speaker
Friday
13:00 - 15:59 Free Ham Radio Exams
Saturday
11:00 - 16:59 Free Ham Radio Exams
Sunday
11:00 - 12:59 Free Ham Radio Exams

Return to Index

ICSV - Industrial Control Systems Village

Location: LVCCWest-Level1-Hall2-W805 - Map
Home Page: https://www.icsvillage.com/
DC Discord Chan: https://discord.com/channels/708208267699945503/735938018514567178


PDT Times Title speaker
Friday
10:30 - 10:59 Hull Integrity: Applying MOSAICS to Naval Mission . . . Michael Frank
10:00 - 10:30 Safeguarding the Industrial Frontier: OT SOC & Inc . . . Adam Robbie
10:00 - 10:30 Fear vs. Physics: Diagnosing Grid Chaos Emma Stewart
15:30 - 15:59 Locked Down, Not Locked Out: How I Escaped Your Se . . . Aaron Boyd
17:30 - 17:59 Crossing the Line: Advanced Techniques to Breach t . . . Christopher Nourrie
Saturday
10:00 - 10:30 Critically Neglected: Cybersecurity for buildings Thomas Pope
13:00 - 13:30 Deploying Deception in Depth for ICS Brent Muir
14:00 - 14:30 OT Network Segmentation Planning, Implementation, . . . Tony Turner
15:00 - 15:30 There and Back Again: Discovering OT devices acros . . . Rob King
Sunday
10:30 - 10:59 Don’t Cry Wolf: Evidence-based assessments of IC . . . Jimmy Wylie,Sam Hanson
11:30 - 11:59 Intro to Common Industrial Protocol Exploitation Trevor Flynn
12:30 - 12:59 The Worst ICS/OT Love Story Ever Told Mike Holcomb

Return to Index

IOTV - Internet Of Things Village

Location: LVCCWest-Level1-Hall2-W605 - Map
Home Page: https://www.iotvillage.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732734565604655114


PDT Times Title speaker
Friday
10:30 - 10:59 10 Years of IoT Village: Insights in the World of . . . Stephen Bono,Rachael Tubb . . .
11:45 - 12:30 Never enough about cameras - The firmware encrypti . . . Alexandru Lazar
11:00 - 11:59 Go Malware Meets IoT: Challenges, Blind Spots, and . . . Asher Davila
13:00 - 13:45 What is Dead May Never Die: The Immortality of SDK . . . Richard "HeadlessZeke" La . . .
15:00 - 15:59 Contextualizing alerts & logs at scale without que . . . Ezz Tahoun
17:30 - 17:59 Vibe School: Making dumb devices smart with AI Katie "InsiderPhD" Paxton . . .
Saturday
11:00 - 11:59 No Brain No Gain Mehmet Önder Key,Temel D . . .
12:00 - 12:30 What’s Really in the Box? The Case for Hardware . . . Allan Friedman
13:45 - 14:15 The Things know What You Did Last Session Will Baggett
Sunday
11:30 - 11:59 Unveiling IoT Vulnerabilities: From Backdoors to B . . . Kai-Ching "Keniver" Wang
12:00 - 12:30 Smart Devices, Dumb Resets? Testing Firmware Persi . . . Matei Josephs
12:00 - 12:30 Firmware Decryption: For, and By, the Cryptographi . . . Craig Heffner

Return to Index

MHV - Maritime Hacking Village

Location: LVCCWest-Level1-Hall2-W504
Home Page: https://maritimehackingvillage.com/


PDT Times Title speaker
Friday
15:00 - 15:45 Threat Dynamics on the Seas RADM John Mauger,Michael . . .
15:45 - 16:30 Fighting the Digital Blockade: A View from Taiwan Deputy Minister Herming C . . .
17:30 - 17:59 Hacking the Nautical Rules of the Road: Turn Left . . . Amp,Data
Saturday
10:30 - 10:59 Navigating the Invisible Mehmet Önder Key,Furkan . . .
11:30 - 11:59 State of the Pops: Mapping the Digital Waters Vlatko Kosturjak,MJ Casad . . .
15:00 - 15:30 Pirates of the North Sea John Andre Bjørkhaug
16:30 - 16:59 Resilient and Reconfigurable Maritime Comms. AviNash Srinivasan
16:30 - 16:59 How Computers Kill People: Marine Systems Michael DeVolld,Austin Re . . .
16:00 - 16:30 Dead Reckoning: Hijacking Marine Autopilots Carson Green,Rik Chatterj . . .
16:00 - 16:30 Fingerprinting Maritime NMEA2000 Networks Constantine Macris (TheDi . . .
Sunday
12:30 - 12:59 Red Alerts and Blue Oceans: Incident Response from . . . Capt. Kit Louttit,Steve W . . .

Return to Index

MISC - Misc

Sched Page: https://defcon.outel.org/defcon33/dc33-dc33-consolidated_page.html#villist_MISC


PDT Times Title speaker
Wednesday
11:00 - 17:59 The Unofficial DEF CON Shoot
17:00 - 07:59 Linecon
Thursday
06:00 - 07:59 Defcon.run
08:00 - 18:59 Human Registration Open
09:00 - 18:59 Lost & Found
15:00 - 20:59 Toxic BBQ
Friday
06:00 - 07:59 Defcon.run
08:00 - 18:59 Human Registration Open
10:00 - 01:59 Lost & Found
10:30 - 11:30 AixCC Award Announcement
10:00 - 10:59 Book Signing - Adversary Emulation with MITRE ATT& . . . Drinor Selmanaj
10:00 - 10:59 Book Signing - Cyber Calendar 2026 - Chris DeCarme . . . Chris DeCarmen
11:00 - 11:59 Book Signing - Jon DiMaggio/ No Starch Press Jon DiMaggio
11:00 - 11:59 Book Signing - Supply Chain Software Security-AI, . . . Aamiruddin Syed
12:00 - 12:59 Book Signing - Travis Goodspeed/No Starch Press Travis Goodspeed
12:00 - 12:59 Book Signing - Firewalls Don't Stop Dragons: A Ste . . . Carey Parker
13:00 - 13:59 Book Signing - Nick Aleks/No Starch Press Nick Aleks
13:00 - 13:59 Book Signing - Alex Matrosov/No Starch Press Alex Matrosov
14:00 - 14:59 Book Signing - Philip Dunsey/No Starch Press Philip Dunsey
14:00 - 14:59 Book Signing - Alfie Champion/No Starch Press Alfie Champion
15:00 - 15:59 Book Signing - JP Ausmasson/No Starch Press JP Ausmasson
15:00 - 15:59 Book Signing - Future of Hacking: The Rise of Cybe . . . Laura S. Scherling, EdD
15:00 - 15:59 Book Signing - Daniel Reilly/No Starch Press Daniel Reilly
15:00 - 15:59 Book Signing - The Hacker Mindset: A 5-Step Method . . . Garrett Gee
16:00 - 17:59 Um, ACKtually...
16:00 - 16:59 Book Signing - - Jim O'Gorman/No Starch Press
16:00 - 16:59 Book Signing - Breaking IN: A Practical Guide To S . . . Ayman Elsawah
19:00 - 01:59 Hacker Karaoke
Saturday
06:00 - 07:59 Defcon.run
09:00 - 18:59 Human Registration Open
10:00 - 01:59 Lost & Found
10:00 - 10:59 Book Signing - Kyle Cucci/No Starch Press Kyle "d4rksystem" Cucci
10:00 - 10:59 Book Signing - Cyber Calendar 2026 - Chris DeCarme . . . Chris DeCarmen
10:00 - 10:59 Book Signing - Patrick Wardle/ No Starch Press Patrick Wardle
10:00 - 10:59 Book Signing - Adversary Emulation with MITRE ATT& . . . Drinor Selmanaj
11:00 - 11:59 Book Signing - Corey Ball/No Starch Press Corey Ball
11:00 - 11:59 Book Signing - Casey Edman/No Starch Press Casey Edman
11:00 - 11:59 Book Signing - Future of Hacking: The Rise of Cybe . . . Laura S. Scherling, EdD
12:00 - 12:59 Book Signing - Micah Lee/ No Starch Press Micah "micahflee" Lee
12:00 - 12:59 Book Signing - Practical Lock Picking; Keys to the . . . Deviant Ollam
13:00 - 13:59 Book Signing - Eugene Lim/ No Starch Press Eugene "spaceraccoon" Lim
14:00 - 14:59 Book Signing - Fotis Chantizis/ No Starch Press Fotis Chantizis
14:00 - 14:59 Book Signing - Cyber Calendar 2026 - Chris DeCarme . . . Chris DeCarmen
14:00 - 14:59 Book Signing - Paulino Calderon/No Starch Press Paulino Calderon
14:00 - 14:59 Book Signing - The Hacker Mindset: A 5-Step Method . . . Garrett Gee
14:00 - 15:59 DC Book Club Discussion
15:00 - 15:59 Book Signing - Jason Andress/ No Starch Press Jason Andress
15:00 - 15:59 Book Signing - Kara Nance/No Starch Press Kara Nance
15:00 - 15:59 Book Signing - The Browser Security Field Manual A . . . Audrey Adeline
16:00 - 16:59 Book Signing - Breaking IN: A Practical Guide To S . . . Ayman Elsawah
19:00 - 01:59 Hacker Karaoke
Sunday
06:00 - 07:59 Defcon.run
09:00 - 11:59 Human Registration Open
10:00 - 13:59 Lost & Found
10:00 - 10:59 Book Signing - Ghost Hacker : How to hack human sp . . . Jun “Ghost Hacker” Ka . . .

Return to Index

MWV - Malware Village

Location: LVCCWest-Level1-Hall1-W303
Home Page: https://malwarevillage.org/


PDT Times Title speaker
Friday
10:00 - 10:30 Break Systems, Not Promises: I promised to do a ke . . . Lena "LambdaMamba" Yu
10:00 - 12:59 Getting started in Malware Analysis with Ghidra Wesley McGrew
10:40 - 11:10 Malware Matryoshka: Nested Obfuscation Techniques Brian Baskin
11:20 - 11:50 Cryptography is hard: Breaking the DoNex ransomwar . . . Gijs Rijnders
12:00 - 12:30 KeePass, weaponized Juho Jauhiainen
12:40 - 13:10 Grandoreiro & friends: brazilian banking trojans t . . . Josep Albors
13:40 - 13:55 Using Stardew Valley mods as a C2 and infostealer Gecko
14:30 - 14:59 Compromising Threat Actor Communications Ben "polygonben" Folland
14:00 - 14:15 The creation of the Malmongotchi badge Austin Worline
14:00 - 17:59 Binary exploitation basics Leigh Trinity
15:50 - 16:20 Silent Sigma: Unraveling Iranian APT's 0-Day Warf . . . Christopher Dio Chavez
15:10 - 15:40 North Korea's Fur Shop: Poaching for Otters, Beave . . . Mauro Eldritch,José Góm . . .
16:30 - 16:59 ClickFix: The Malware Delivery Technique Enabling . . . Arda Büyükkaya
17:50 - 18:20 Domain Fronting in 2025: a retro analysis Tom Cope
17:10 - 17:40 The Beauty of Reversing Swift Malware Chistopher Lopez
Saturday
10:00 - 10:30 Making Dirty Pictures - The Issue with DICOM Michael "v3ga" Aguilar
10:00 - 12:59 Malware and Monsters Klaus Agnoletti
10:40 - 11:10 Your Static Tools Are Cute - My AI Ripped ZebLoade . . . Anna Pham,Edward Crowder
11:20 - 11:50 Smashing the Sandbox: Inside DBatLoader's Unique E . . . Kyle "d4rksystem" Cucci
12:00 - 12:10 I Can't RE (and You Can Too!) Johnny Xmas
13:40 - 14:15 Enshittification: It's Over 9000 Lena "LambdaMamba" Yu,And . . .
14:30 - 14:59 The Cookie Heist: How Cybercriminals Are Outsmarti . . . Mrigakshi Goel
14:00 - 17:59 Mac Malware Analysis Patrick Wardle
15:50 - 16:20 Deconstructing Malware Lineage with Graph Neural N . . . David Rushmer
15:10 - 15:40 Unveiling the shadows: Digital Forensics evidence . . . Neumann "scsideath" Lim,J . . .
16:00 - 16:30 Exposing Infosec Frauds and Foreign Agents Behind . . . Cthulhu
17:50 - 18:20 NO-HAVOC today, NO-HAVOC tomorrow Lena "LambdaMamba" Yu,Sam . . .
17:10 - 17:40 The Quantum Shift: Practical Post-Quantum Risk: Al . . . Sean Prescott,Ted Carefoo . . .
Sunday
16:00 - 16:30 Exposing Infosec Frauds and Foreign Agents Behind . . . Cthulhu

Return to Index


PDT Times Title speaker
Friday
10:15 - 10:30 Intro to village Leigh-Anne Galloway
10:30 - 10:59 Card testing workshop Vince Sloan
11:00 - 11:59 BT hacking Dan Bongiorno
11:00 - 11:59 Carding is Dead, Long Live Carding: How MaaS is fu . . . Federico Valentini,Alessa . . .
11:00 - 11:59 More is less
12:00 - 12:30 Risk and payments across the ecosystem Gary Kao
14:00 - 14:45 The challenges of Sub-dermal Payments Amal Graafstra
15:00 - 15:30 Passkeys in payments Dan Pelegro
16:00 - 16:30 Network tokens Sanjeev Sharma
Saturday
10:15 - 10:30 Intro to village Leigh-Anne Galloway
10:30 - 10:59 Card testing workshop Vince Sloan
11:00 - 11:59 Frida for reverse engineering payment applications Ileana Barrionuevo
11:00 - 11:59 GenAI red teaming for Payment Fraud Karthik Tadinada,Martyn H . . .
11:00 - 11:59 The social engineering industry
14:00 - 14:45 Voices of the Industry: A Fireside Chat with Payme . . . Leigh-Anne Galloway,Giust . . .
15:00 - 15:30 Beyond the Stack: How External Failures Impact Pay . . . Tapan Khilnani
16:30 - 17:30 Brazil's aPIXcalypse - How real time payments turn . . . Anchises Moraes

Return to Index


PDT Times Title speaker
Thursday
12:00 - 12:59 Friends of Bill W
16:00 - 18:59 DEF CON Holland Group Presents: 
Drinking with t . . .
17:00 - 17:59 Friends of Bill W
19:00 - 20:59 DC702 Meetup
19:30 - 22:30 The KEVOPS Sellout Pool Party
Friday
06:00 - 10:59 Cycle Override
12:00 - 12:59 Friends of Bill W
16:00 - 16:30 Cybersecurity in Latin America: The Untold Stories . . . Giovanni Cruz Forero
16:00 - 17:59 Queercon Mixer
17:00 - 17:59 Friends of Bill W
18:00 - 20:59 Lawyers Meet
18:00 - 20:59 Spades Tournament & Game Night Social
18:00 - 21:59 BIC Village Game Night
19:00 - 00:59 BlanketFort Con
20:00 - 22:59 DC404/DC678/DC770/DC470 (Atlanta Metro) Meetup
21:00 - 23:30 Women, gender non-conforming and non-binary meetup . . .
21:00 - 01:59 Arcade Party
21:00 - 23:59 IoT Village 10th Birthday Party
22:00 - 01:59 +61: the Australian Embassy
Saturday
12:00 - 12:59 Friends of Bill W
14:00 - 15:59 Sticker Swap at DEF CON 33
16:00 - 17:59 Queercon Mixer
17:00 - 17:59 Friends of Bill W
19:30 - 22:59 DC NextGen
19:30 - 22:30 The DEF CON Pool Party
20:00 - 23:59 The Jasmine Dragon
21:00 - 01:59 Cyberdelia Rave
21:00 - 01:59 Day of the Dead Hacker Party
21:00 - 01:59 GOTHCON
21:00 - 01:59 The Illuminati Party
21:00 - 01:59 VETCON 2025 Party
22:00 - 01:59 Call Center Village Party
Sunday
12:00 - 12:59 Friends of Bill W

Return to Index

PHV - Packet Hacking Village

Location: LVCCWest-Level3-W303-W310 - Map
Home Page: https://www.wallofsheep.com/
DC Discord Chan: https://discord.com/channels/708208267699945503/708242376883306526


PDT Times Title speaker
Friday
13:00 - 13:59 Teaching Your Reverse Proxy to Think: Fingerprint- . . . Adel Karimi
Saturday
13:00 - 13:59 Deepfake Image and Video Detection   Mike Raggo
16:00 - 16:59 SSH Honeypots and Walkthrough Workshops: A History Ryan Mitchell
17:00 - 17:59 Hacking Context for Auto Root Cause and Attack Flo . . . Ezz Tahoun

Return to Index

PLV - Policy Village

Location: LVCCWest-Level2-W234 - Map
Home Page: https://defcon.org/policy/


PDT Times Title speaker
Friday
11:00 - 11:45 State of Open Source in the Federal Government Jordan Kasper
11:45 - 12:30 Dark Capabilities: When Tech Companies Become Thre . . . Tom Cross,Greg Conti
13:00 - 13:45 Takes All Kinds: Building Onramps for Emergency We . . . Quinn Dombrowski
13:45 - 14:30 Third-Party Access Granted: A Postmortem on Studen . . . Sharlene Toney
15:00 - 15:45 What Europeans are doing right about cyber securit . . . Muhammad Mudassar Yamin,E . . .
15:45 - 16:30 Secure Code Is Critical Infrastructure: Hacking Po . . . Tanya "SheHacksPurple" Ja . . .
Saturday
16:00 - 16:30 China's Health Sector Ambitions and Information Ne . . . Amelia Shapiro
Sunday
12:30 - 12:59 Legalizing Ethical Hacking: A Global Safe Harbor f . . . Miracle "OWOLABI" Abiodun

Return to Index

PSV - Physical Security Village

Location: LVCCWest-Level1-Hall2-W804 - Map
Home Page: https://www.physsec.org/
DC Discord Chan: https://discord.com/channels/708208267699945503/732732893830447175


PDT Times Title speaker
Friday
12:00 - 12:59 Flipping Locks - Remote Badge Cloning with the Fli . . . Langston Clements,Dan Gog . . .
14:00 - 14:59 Hacking Hotel Locks; The Saflok Vulnerabilities Ex . . . Noah Holland,Josh Stiebel
16:30 - 16:59 Access Control Done Right the First Time Tim Clevenger
Saturday
12:00 - 12:59 From Pwn to Plan: Turning Physical Exploits Into U . . . Shawn
12:00 - 12:59 How NOT to Perform Covert Entry Assessments by WeH . . . Brent White,Tim Roberts
16:00 - 16:30 Your Passkey is Weak: Phishing the Unphishable Chad Spensky
Sunday
10:00 - 10:59 Intro to Physical Security Bypass Karen Ng,Matthew Cancilla
10:00 - 10:59 Elevators 101 Bobby Graydon,Ege Feyziog . . .
12:00 - 12:59 Airport Security! - S01 E008 - Breaking into your . . . Hector Cuevas Cruz

Return to Index

QTV - Quantum Village

Location: LVCCWest-Level1-Hall1-W206 - Map
Home Page: https://quantumvillage.org/


PDT Times Title speaker
Friday
10:00 - 10:59 QC Intro Sohum Thakkar
12:00 - 12:59 EduQ: A DIY Self-Education Platform for Hackers to . . . Yann Allain
16:00 - 17:59 Quantum Table Top Threat Modelling Jaya Baloo
Saturday
10:00 - 11:15 Quantum Pictorialism for Hackers Bob Coecke
16:30 - 17:15 Post-Quantum Panic: When Will the Cracking Begin, . . . Konstantinos Karagiannis

Return to Index

RTV - Red Team Village

Location: LVCCWest-Level1-Hall1-W405-Red Team Village - Map
Home Page: https://redteamvillage.io/


PDT Times Title speaker
Friday
08:30 - 09:59 Cyber Wargames: King of the Hill
09:00 - 14:59 Cyber Wargames: Strategic Operations
11:00 - 11:50 Mind vs. Machine: Finding the Sweet Spot in Modern . . . Ben "nahamsec" Sadeghipou . . .
12:00 - 13:50 AIMaL: Artificially Intelligent Malware Launcher Endrit Shaqiri,Natyra Sha . . .
12:00 - 13:50 GlytchC2: Command execution and data exfiltration . . . Anıl Çelik,Emre Odaman
12:00 - 15:50 Instant API Hacker! Corey Ball
12:00 - 13:50 Vector Space Manipulation in LLMs Muhammad Mudassar Yamin
12:00 - 13:50 Bridge to Nowhere Good: When Azure Relay becomes a . . . Edward Landers,Josh Huff, . . .
12:00 - 12:50 Don't be LLaMe - The basics of attacking LLMs in y . . . Alex Bernier,Brent Harrel . . .
12:00 - 12:50 Stealing Browser Cookies: Bypassing the newest Chr . . . Rafael Felix
12:00 - 13:50 OSINT for Hackers Lee McWhorter,Sandra Stib . . .
13:00 - 13:50 Weaponizing Kestrel: Red Team Tradecraft for Hunti . . . Daniel Benavides,Ronald G . . .
13:00 - 13:50 Red Teaming Kubernetes: From App-Level CVEs to Ful . . . Lenin Alevski
14:00 - 15:50 Initial Access Tactics on MacOS Adwiteeya Agrawal,Jianqia . . .
14:00 - 15:50 Stealing Browser Cookies: Bypassing the newest Chr . . . Rafael Felix
14:00 - 15:50 A Look into Using Native Godot Calls to Create Mal . . . Aaron Hogan
14:00 - 14:50 Hack the Clock: Automating CVE Exploit searches to . . . Jordan Bonagura
14:00 - 14:50 Leveraging AI and MCP Servers for Automated Extern . . . Shane Krause
14:00 - 14:50 ModuleOverride – Changing a Tyre Whilst Driving Alessandro Grisa,Ibai Cas . . .
14:00 - 14:50 Adversary Intel Lab: Build Your First Threat Emula . . . Fredrik Sandström
15:00 - 16:59 Cyber Wargames: Redteam Rumble
15:00 - 15:50 Hybrid Attack Jonathan Coradi
15:00 - 15:50 From USB to C2 Will McGraw
15:00 - 15:50 AI-Powered Web Applications: A New Era in Security . . . Ilkin Javadov
15:00 - 15:50 EncryptedClientHelloWorld: TLSv1.3 ECH As A Covert . . . Jose Plascencia
Saturday
08:30 - 09:59 Cyber Wargames: King of the Hill
09:00 - 14:59 Cyber Wargames: Strategic Operations
10:00 - 10:55 Growing Red Team Village: What We’ve Learned Bui . . . Barrett Darnell,Mike Lisi . . .
11:00 - 16:50 BloodHound Enterprise CTF Hugo van den Toorn,Joey D . . .
11:00 - 14:50 Hacker Troll House James Rice
11:00 - 16:50 DNS-Based OSINT Tactics for Product and Service Di . . . Rishi "rxerium" Chudasama
11:00 - 16:50 Ransomware vs EDR: Inside the Attacker's Mind Zoziel Freire
11:00 - 11:50 Creating an AI Agent to Hack a Web Application Omar Santos
11:00 - 11:50 Malware Exploitation in PDFs: A Red Team Perspecti . . . Filipi Pires
11:00 - 11:50 Old Tactics, New Weapons: Abusing Modern Software . . . Roberto Soares
11:00 - 11:50 Whispers Through the Firewall: Data Exfiltration a . . . Hubert Lin
12:00 - 12:50 Getting Caught in Offensive Security Graham Helton,Kevin Clark . . .
13:00 - 14:50 Introduction to Operationalizing & Using C2 (w/ so . . . Gabi Joseph,Josh Millsap
13:00 - 14:50 StealthToken: Exploiting Identity Providers the Se . . . Manish Gupta,Yash Bharadw . . .
13:00 - 14:50 Building Your First Windows Malware Loader Royce Yaezenko
15:00 - 16:59 Cyber Wargames: Redteam Rumble
15:00 - 16:50 Mythic, Ghostwriter, Nemesis, and Tying the Room T . . . Michael Donley
15:00 - 15:50 From Prey to Playbook: Learning about victim behav . . . Megan Squire
15:00 - 16:50 Redteam Infrastructure Vibez Edition Moses Frost
15:00 - 16:50 Go Hack Yourself: API Hacking for Beginners Katie "InsiderPhD" Paxton . . .
15:00 - 15:50 Level UP OSINT Mishaal Khan
16:00 - 16:50 Don the Mantle: Red Team Campaign Planning and Exe . . . William Giles
16:00 - 16:50 Tales from the NIST AI Pen Test Challenge - AI Pe . . . Lee McWhorter
Sunday
10:00 - 11:55 Attacking Kubernetes: Tools and Tactics to Comprom . . . Lenin Alevski
10:00 - 11:55 OSINT Challenges Alex Ackerman,Lee McWhort . . .
10:00 - 11:45 Ask a Hiring Manager with Troy Fridley Troy Fridley
10:00 - 11:45 Ask a Hiring Manager with Cory Wolff Cory Wolff
10:00 - 11:45 Ask a Hiring Manager with Peter Hefley Peter Hefley

Return to Index

SEV - Social Engineering Village

Location: LVCCWest-Level3-W317-W319 - Map
Home Page: https://www.se.community/
DC Discord Chan: https://discord.com/channels/708208267699945503/732733952867172382


PDT Times Title speaker
Friday
08:30 - 08:59 Social Engineering Community Village Greeting and . . . Brent "TheDukeZip" Dukes
08:30 - 17:59 Social Engineering Community Village - Village Ope . . .
09:00 - 11:59 SEC Vishing Competition (SECVC)
12:00 - 13:30 Improv
13:30 - 15:30 SEC Vishing Competition (SECVC)
15:30 - 15:59 Improv
16:00 - 16:59 SEC Vishing Competition (SECVC)
17:00 - 17:59 Cold Calls
Saturday
10:30 - 10:55 Hacking the First Amendment: A press photographer' . . . Mansoor Ahmad,Brad Ammerm . . .
10:00 - 10:25 10 Lessons from the Frontlines of AI Vishing: From . . . Matt Holland,Enrico Facci . . .
10:00 - 17:59 Social Engineering Community Village - Village Ope . . .
11:00 - 11:25 The Devil Wears Headsets Cronkitten
11:30 - 11:55 The Human Vulnerability: Social Engineering in a H . . . fir3d0g
12:30 - 15:30 Battle of the Bots: Vishing Edition
12:00 - 12:30 Do Scammers dream of electric Phish? Lessons learn . . . Daniel Marques
15:30 - 17:59 Cold Calls
Sunday
10:00 - 10:45 Social Engineering Community Village - Contest Awa . . .
10:00 - 11:30 Social Engineering Community Village - Village Ope . . .
10:45 - 11:30 Cold Calls

Return to Index


PDT Times Title speaker
Saturday
10:00 - 10:45 Anotomy of Telecom Malware Akib Sayyed

Return to Index


PDT Times Title speaker
Saturday
08:00 - 16:59 Beginner's Guide to Attacks and Defenses Sam Bowne,Kaitlyn Handelm . . .
08:00 - 16:59 Medical Device Penetration Testing
08:00 - 16:59 Influence Operations: Tactics, Defense, and Exploi . . . Tom Cross,Greg Conti
Sunday
08:00 - 16:59 Influence Operations: Tactics, Defense, and Exploi . . . Tom Cross,Greg Conti
Monday
08:00 - 16:59 Dodging the EDR bullet: A Training on Malware Stea . . . Giorgio "gbyolo" Bernardi . . .
08:00 - 16:59 Adversarial Thinking: The Art of Dangerous Ideas Tom Cross,Greg Conti
08:00 - 16:59 Hacking Modern Web Apps: Master the Future of Atta . . . Abraham Aranguren,Anirudh . . .
08:00 - 16:59 Loudmouth Security - Offensive IoT Exploitation Loudmouth Security
08:00 - 16:59 Active Directory Attacks for Red and Blue Teams - . . . Nikhil,Manthan
08:00 - 16:59 Advanced Cloud Incident Response in Azure and Micr . . . Korstiaan Stam
08:00 - 16:59 Azure Cloud Attacks for Red & Blue Teams - Beginne . . . Nikhil
08:00 - 16:59 Windows Payload Development: EDR Evasion and Initi . . . Rey "Privesc" Bango,Kevin . . .
08:00 - 16:59 Hack the Connected Plant! Arnaud Soullié
08:00 - 16:59 Hands-on Car Hacking & Automotive Cybersecurity Kamel Ghali
08:00 - 16:59 Attack and Defend Software Supply Chain Anant Shrivastava
08:00 - 16:59 Everyday Ghidra: Practical Windows Reverse Enginee . . . John McIntosh
08:00 - 16:59 Full-Stack Pentesting Laboratory: 100% Hands-On + . . . Dawid Czagan
08:00 - 16:59 Simulated Adversary: Tactics & Tools Training Kenny Hess,Jayson E. Stre . . .
08:00 - 16:59 Deep Dive into Fuzzing Zubin Devnani,Dhiraj Mish . . .
08:00 - 16:59 Offensive Development Practitioner Certification ( . . . Jake Mayhew,Greg Hatcher
08:00 - 16:59 AI SecureOps: Attacking & Defending AI Application . . . Abhinav Singh
08:00 - 16:59 Offensive Cyber Security Operations: Mastering Bre . . . Abhijith "Abx" B R
08:00 - 16:59 A Practical Approach to Breaking & Pwning Kubernet . . . Madhu "madhuakula" Akula
08:00 - 16:59 Hacking Cryptography: Attacks, Tools, and Techniqu . . . Ruben Gonzalez,Benjamin W . . .
08:00 - 16:59 Solving Modern Cybersecurity Problems with AI “K” Singh,Michael "Bl . . .
08:00 - 16:59 Harnessing LLMs for Application Security Seth Law,Ken Johnson
08:00 - 16:59 A Complete Practical Approach to Malware Analysis . . . Sajan Shetty,Monnappa "Mo . . .
08:00 - 16:59 BRIDGING THE GAP - An Introduction to IoT Security . . . Will McCardell,Garrett Fr . . .
08:00 - 16:59 Attacking & Securing CI/CD Pipeline Certification . . . Raunak Parmar
08:00 - 16:59 RFID and Electronic Physical Access Control System . . . Deviant Ollam,Bryan Black . . .
08:00 - 16:59 Software Defined Radios 101 Richard Shmel
08:00 - 16:59 Hunting for Hackers by Deloitte Kyle Smathers,Bobby Thoma . . .
08:00 - 16:59 SOC 101 - SOC 1 Analyst Bootcamp Rod Soto
Tuesday
08:00 - 16:59 Software Defined Radios 101 Richard Shmel
08:00 - 16:59 SOC 101 - SOC 1 Analyst Bootcamp Rod Soto
08:00 - 16:59 Hacking Cryptography: Attacks, Tools, and Techniqu . . . Ruben Gonzalez,Benjamin W . . .
08:00 - 16:59 Beginner's Guide to Attacks and Defenses Sam Bowne,Kaitlyn Handelm . . .
08:00 - 16:59 Beginner's Guide to Attacks and Defenses Sam Bowne,Kaitlyn Handelm . . .
08:00 - 16:59 RFID and Electronic Physical Access Control System . . . Deviant Ollam,Bryan Black . . .
08:00 - 16:59 Beginner's Guide to Attacks and Defenses Sam Bowne,Kaitlyn Handelm . . .
08:00 - 16:59 Attacking & Securing CI/CD Pipeline Certification . . . Raunak Parmar
08:00 - 16:59 Medical Device Penetration Testing
08:00 - 16:59 BRIDGING THE GAP - An Introduction to IoT Security . . . Will McCardell,Garrett Fr . . .
08:00 - 16:59 Medical Device Penetration Testing
08:00 - 16:59 A Complete Practical Approach to Malware Analysis . . . Sajan Shetty,Monnappa "Mo . . .
08:00 - 16:59 Medical Device Penetration Testing
08:00 - 16:59 Solving Modern Cybersecurity Problems with AI “K” Singh,Michael "Bl . . .
08:00 - 16:59 Harnessing LLMs for Application Security Seth Law,Ken Johnson
08:00 - 16:59 A Practical Approach to Breaking & Pwning Kubernet . . . Madhu "madhuakula" Akula
08:00 - 16:59 Hunting for Hackers by Deloitte Kyle Smathers,Bobby Thoma . . .
08:00 - 16:59 AI SecureOps: Attacking & Defending AI Application . . . Abhinav Singh
08:00 - 16:59 Adversarial Thinking: The Art of Dangerous Ideas Tom Cross,Greg Conti
08:00 - 16:59 Offensive Cyber Security Operations: Mastering Bre . . . Abhijith "Abx" B R
08:00 - 16:59 Dodging the EDR bullet: A Training on Malware Stea . . . Giorgio "gbyolo" Bernardi . . .
08:00 - 16:59 Deep Dive into Fuzzing Zubin Devnani,Dhiraj Mish . . .
08:00 - 16:59 Offensive Development Practitioner Certification ( . . . Jake Mayhew,Greg Hatcher
08:00 - 16:59 Full-Stack Pentesting Laboratory: 100% Hands-On + . . . Dawid Czagan
08:00 - 16:59 Simulated Adversary: Tactics & Tools Training Kenny Hess,Jayson E. Stre . . .
08:00 - 16:59 Attack and Defend Software Supply Chain Anant Shrivastava
08:00 - 16:59 Everyday Ghidra: Practical Windows Reverse Enginee . . . John McIntosh
08:00 - 16:59 Hack the Connected Plant! Arnaud Soullié
08:00 - 16:59 Hands-on Car Hacking & Automotive Cybersecurity Kamel Ghali
08:00 - 16:59 Azure Cloud Attacks for Red & Blue Teams - Beginne . . . Nikhil
08:00 - 16:59 Windows Payload Development: EDR Evasion and Initi . . . Rey "Privesc" Bango,Kevin . . .
08:00 - 16:59 Active Directory Attacks for Red and Blue Teams - . . . Nikhil,Manthan
08:00 - 16:59 Advanced Cloud Incident Response in Azure and Micr . . . Korstiaan Stam
08:00 - 16:59 Hacking Modern Web Apps: Master the Future of Atta . . . Abraham Aranguren,Anirudh . . .
08:00 - 16:59 Loudmouth Security - Offensive IoT Exploitation Loudmouth Security

Return to Index