DEF CON 17
took place July 30, 2009 through Aug. 2, 2009 (15 years, 4 months ago) at Riviera Hotel & Casino in Las Vegas, Nevada, USA.
The general admission cost for the conference was $120.00[1].
Presentations
Thursday, July 30, 2009
Friday, July 31, 2009
-
10:00 - Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
-
10:00 - Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic
-
10:00 - Beckstrom's Law - A Model for Valuing Networks and Security
-
10:00 - Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
-
10:00 - Perspective of the DoD Chief Security Officer
-
11:00 - Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
-
11:00 - Is That You, Baby, or Just a Bridge in the Sky?
-
11:00 - Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
-
11:00 - Jailbreaking and the Law of Reversing
-
11:30 - Hacking the Wiimote and Wii Fit to Help the Disabled
-
11:30 - Q & A with Bruce Schneier
-
12:00 - Death of Anonymous Travel
-
12:00 - TBA
-
12:00 - 0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
-
12:00 - Cross Site Scripting Anonymous Browser 2.0
-
12:30 - Cloud Security in Map/Reduce
-
12:30 - More Tricks For Defeating SSL
-
13:00 - Socially Owned in the Cloud
-
13:00 - Hacking WITH the iPod Touch
-
13:00 - Maximum CTF: Getting the Most Out of Capture the Flag
-
13:30 - Deblaze - A Remote Method Enumeration Tool for Flex Servers
-
13:30 - The Year In Computer Crime Cases
-
14:00 - Attacking SMS. It's No Longer Your BFF
-
14:00 - Advancing Video Application Attacks with Video Interception, Recording, and Replay
-
14:00 - Defcon Security Jam 2: The Fails Keep on Coming
-
14:00 - Subverting the World Of Warcraft API
-
14:30 - Making Fun of Your Malware
-
14:30 - Advanced MySQL Exploitation
-
15:00 - Proxy Prank-o-Matic
-
15:00 - Computer and Internet Security Law - A Year in Review 2008 - 2009
-
15:00 - That Awesome Time I Was Sued For Two Billion Dollars
-
15:30 - Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
-
15:30 - Session Donation
-
16:00 - three point Oh.
-
16:00 - Ask EFF: The Year in Digital Civil Liberties
-
16:00 - Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
-
16:00 - Why Tor is Slow, and What We're Doing About It
-
16:30 - Malware Freak Show
-
17:00 - Automated Malware Similarity Analysis
-
17:00 - BitTorrent Hacks
-
17:30 - Fragging Game Servers
-
17:30 - Criminal Charges are not pursued: Hacking PKI
-
17:30 - Injecting Electromagnetic Pulses into Digital Devices
-
18:00 - Meet the Feds 2009
-
18:00 - Attacking Tor at the Application Layer
-
18:30 - Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
-
18:30 - Something about Network Security
-
18:30 - Locally Exploiting Wireless Sensors
Saturday, Aug. 1, 2009
Sunday, Aug. 2, 2009
-
10:00 - Hacking, Biohacking, and the Future of Humanity
-
10:00 - Hello, My Name is /hostname/
-
10:00 - Managed Code Rootkits - Hooking into Runtime Environments
-
10:00 - Down the Rabbit Hole: Uncovering a Criminal Server
-
10:00 - Advanced SQL Injection
-
11:00 - Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
-
11:00 - Invisible Access: Electronic Access Control, Audit Trails and "High Security"
-
11:00 - Win at Reversing: Tracing and Sandboxing through Inline Hooking
-
11:00 - Hacking Sleep: How to Build Your Very Own Sleep Lab
-
11:00 - eXercise in Messaging and Presence Pwnage
-
11:30 - Hack The Textbook
-
12:00 - Who Invented the Proximity Card?
-
12:00 - Wi-Fish Finder: Who Will Bite the Bait
-
12:00 - Dradis Framework - Sharing Information will get you Root
-
12:00 - Good Vibrations: Hacking Motion Sickness on the Cheap
-
12:00 - Unmasking You
-
12:30 - Attacks Against 2wire Residential Gateway Routers
-
13:00 - Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
-
13:00 - Your Mind: Legal Status, Rights and Securing Yourself
-
13:00 - Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
-
13:00 - Lockpicking Forensics
-
13:00 - Search And Seizure Explained - They Took My Laptop!
-
13:30 - AAPL- Automated Analog Telephone Logging
-
14:00 - Hackerspaces: The Legal Bases
-
14:00 - Slight of Mind: Magic and Social Engineering
-
14:00 - 30k Feet Look at WiFi
-
14:00 - RAID Recovery: Recover your PORN by Sight and Sound
-
14:00 - Screen Scraper Tricks: Extracting Data from Difficult Websites
-
15:00 - Robot Shark Laser! What Hackerspaces Do
-
15:00 - Confidence Game Theater
-
15:00 - Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
-
15:00 - USB Attacks: Fun with Plug & 0wn
-
15:00 - Dangerous Minds: The Art of Guerrilla Data Mining
-
16:00 - Introduction to WiMAX Hacking
-
16:00 - The Psychology of Security Unusability
-
16:00 - Social Zombies: Your Friends Want to Eat Your Brains
-
16:00 - Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
-
16:00 - De Gustibus, or Hacking your Tastebuds
Unknown date
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.