DEF CON 17
took place July 30, 2009 through Aug. 2, 2009 (14 years, 8 months ago)
at Riviera Hotel & Casino in Las Vegas, Nevada, USA.
The general admission cost for the conference was $120.00[1].
Presentations
Thursday, July 30, 2009
Friday, July 31, 2009
-
10:00 - Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic
-
10:00 - Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
-
10:00 - Perspective of the DoD Chief Security Officer
-
10:00 - Beckstrom's Law - A Model for Valuing Networks and Security
-
10:00 - Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
-
11:00 - Is That You, Baby, or Just a Bridge in the Sky?
-
11:00 - Jailbreaking and the Law of Reversing
-
11:00 - Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
-
11:00 - Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
-
11:30 - Q & A with Bruce Schneier
-
11:30 - Hacking the Wiimote and Wii Fit to Help the Disabled
-
12:00 - Death of Anonymous Travel
-
12:00 - 0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
-
12:00 - Cross Site Scripting Anonymous Browser 2.0
-
12:00 - TBA
-
12:30 - More Tricks For Defeating SSL
-
12:30 - Cloud Security in Map/Reduce
-
13:00 - Hacking WITH the iPod Touch
-
13:00 - Socially Owned in the Cloud
-
13:00 - Maximum CTF: Getting the Most Out of Capture the Flag
-
13:30 - The Year In Computer Crime Cases
-
13:30 - Deblaze - A Remote Method Enumeration Tool for Flex Servers
-
14:00 - Advancing Video Application Attacks with Video Interception, Recording, and Replay
-
14:00 - Attacking SMS. It's No Longer Your BFF
-
14:00 - Subverting the World Of Warcraft API
-
14:00 - Defcon Security Jam 2: The Fails Keep on Coming
-
14:30 - Making Fun of Your Malware
-
14:30 - Advanced MySQL Exploitation
-
15:00 - Proxy Prank-o-Matic
-
15:00 - Computer and Internet Security Law - A Year in Review 2008 - 2009
-
15:00 - That Awesome Time I Was Sued For Two Billion Dollars
-
15:30 - Session Donation
-
15:30 - Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
-
16:00 - Why Tor is Slow, and What We're Doing About It
-
16:00 - Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
-
16:00 - Ask EFF: The Year in Digital Civil Liberties
-
16:00 - three point Oh.
-
16:30 - Malware Freak Show
-
17:00 - BitTorrent Hacks
-
17:00 - Automated Malware Similarity Analysis
-
17:30 - Criminal Charges are not pursued: Hacking PKI
-
17:30 - Fragging Game Servers
-
17:30 - Injecting Electromagnetic Pulses into Digital Devices
-
18:00 - Meet the Feds 2009
-
18:00 - Attacking Tor at the Application Layer
-
18:30 - Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
-
18:30 - Locally Exploiting Wireless Sensors
-
18:30 - Something about Network Security
Saturday, Aug. 1, 2009
Sunday, Aug. 2, 2009
-
10:00 - Advanced SQL Injection
-
10:00 - Managed Code Rootkits - Hooking into Runtime Environments
-
10:00 - Down the Rabbit Hole: Uncovering a Criminal Server
-
10:00 - Hello, My Name is /hostname/
-
10:00 - Hacking, Biohacking, and the Future of Humanity
-
11:00 - Hacking Sleep: How to Build Your Very Own Sleep Lab
-
11:00 - eXercise in Messaging and Presence Pwnage
-
11:00 - Invisible Access: Electronic Access Control, Audit Trails and "High Security"
-
11:00 - Win at Reversing: Tracing and Sandboxing through Inline Hooking
-
11:00 - Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
-
11:30 - Hack The Textbook
-
12:00 - Good Vibrations: Hacking Motion Sickness on the Cheap
-
12:00 - Dradis Framework - Sharing Information will get you Root
-
12:00 - Who Invented the Proximity Card?
-
12:00 - Wi-Fish Finder: Who Will Bite the Bait
-
12:00 - Unmasking You
-
12:30 - Attacks Against 2wire Residential Gateway Routers
-
13:00 - Search And Seizure Explained - They Took My Laptop!
-
13:00 - Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
-
13:00 - Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
-
13:00 - Your Mind: Legal Status, Rights and Securing Yourself
-
13:00 - Lockpicking Forensics
-
13:30 - AAPL- Automated Analog Telephone Logging
-
14:00 - Screen Scraper Tricks: Extracting Data from Difficult Websites
-
14:00 - Hackerspaces: The Legal Bases
-
14:00 - Slight of Mind: Magic and Social Engineering
-
14:00 - 30k Feet Look at WiFi
-
14:00 - RAID Recovery: Recover your PORN by Sight and Sound
-
15:00 - Confidence Game Theater
-
15:00 - USB Attacks: Fun with Plug & 0wn
-
15:00 - Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
-
15:00 - Dangerous Minds: The Art of Guerrilla Data Mining
-
15:00 - Robot Shark Laser! What Hackerspaces Do
-
16:00 - Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
-
16:00 - Introduction to WiMAX Hacking
-
16:00 - De Gustibus, or Hacking your Tastebuds
-
16:00 - Social Zombies: Your Friends Want to Eat Your Brains
-
16:00 - The Psychology of Security Unusability
Unknown date
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.