DEF CON 17
took place July 30, 2009 through Aug. 2, 2009 (13 years, 10 months ago)
at Riviera Hotel & Casino in Las Vegas, Nevada, USA.
The general admission cost for the conference was $120.00[1].
Presentations
Thursday, July 30, 2009
Friday, July 31, 2009
-
10:00 - Perspective of the DoD Chief Security Officer
-
10:00 - Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
-
10:00 - Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
-
10:00 - Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Network Traffic
-
10:00 - Beckstrom's Law - A Model for Valuing Networks and Security
-
11:00 - Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
-
11:00 - Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
-
11:00 - Jailbreaking and the Law of Reversing
-
11:00 - Is That You, Baby, or Just a Bridge in the Sky?
-
11:30 - Q & A with Bruce Schneier
-
11:30 - Hacking the Wiimote and Wii Fit to Help the Disabled
-
12:00 - TBA
-
12:00 - Death of Anonymous Travel
-
12:00 - 0-day, gh0stnet and the Inside Story of the Adobe JBIG2 Vulnerability
-
12:00 - Cross Site Scripting Anonymous Browser 2.0
-
12:30 - More Tricks For Defeating SSL
-
12:30 - Cloud Security in Map/Reduce
-
13:00 - Socially Owned in the Cloud
-
13:00 - Hacking WITH the iPod Touch
-
13:00 - Maximum CTF: Getting the Most Out of Capture the Flag
-
13:30 - Deblaze - A Remote Method Enumeration Tool for Flex Servers
-
13:30 - The Year In Computer Crime Cases
-
14:00 - Defcon Security Jam 2: The Fails Keep on Coming
-
14:00 - Advancing Video Application Attacks with Video Interception, Recording, and Replay
-
14:00 - Attacking SMS. It's No Longer Your BFF
-
14:00 - Subverting the World Of Warcraft API
-
14:30 - Making Fun of Your Malware
-
14:30 - Advanced MySQL Exploitation
-
15:00 - Proxy Prank-o-Matic
-
15:00 - That Awesome Time I Was Sued For Two Billion Dollars
-
15:00 - Computer and Internet Security Law - A Year in Review 2008 - 2009
-
15:30 - Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
-
15:30 - Session Donation
-
16:00 - three point Oh.
-
16:00 - Ask EFF: The Year in Digital Civil Liberties
-
16:00 - Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
-
16:00 - Why Tor is Slow, and What We're Doing About It
-
16:30 - Malware Freak Show
-
17:00 - BitTorrent Hacks
-
17:00 - Automated Malware Similarity Analysis
-
17:30 - Injecting Electromagnetic Pulses into Digital Devices
-
17:30 - Criminal Charges are not pursued: Hacking PKI
-
17:30 - Fragging Game Servers
-
18:00 - Meet the Feds 2009
-
18:00 - Attacking Tor at the Application Layer
-
18:30 - Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
-
18:30 - Something about Network Security
-
18:30 - Locally Exploiting Wireless Sensors
Saturday, Aug. 1, 2009
Sunday, Aug. 2, 2009
-
10:00 - Hacking, Biohacking, and the Future of Humanity
-
10:00 - Advanced SQL Injection
-
10:00 - Managed Code Rootkits - Hooking into Runtime Environments
-
10:00 - Down the Rabbit Hole: Uncovering a Criminal Server
-
10:00 - Hello, My Name is /hostname/
-
11:00 - Invisible Access: Electronic Access Control, Audit Trails and "High Security"
-
11:00 - eXercise in Messaging and Presence Pwnage
-
11:00 - Hacking Sleep: How to Build Your Very Own Sleep Lab
-
11:00 - Win at Reversing: Tracing and Sandboxing through Inline Hooking
-
11:00 - Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
-
11:30 - Hack The Textbook
-
12:00 - Dradis Framework - Sharing Information will get you Root
-
12:00 - Unmasking You
-
12:00 - Good Vibrations: Hacking Motion Sickness on the Cheap
-
12:00 - Who Invented the Proximity Card?
-
12:00 - Wi-Fish Finder: Who Will Bite the Bait
-
12:30 - Attacks Against 2wire Residential Gateway Routers
-
13:00 - Search And Seizure Explained - They Took My Laptop!
-
13:00 - Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
-
13:00 - Your Mind: Legal Status, Rights and Securing Yourself
-
13:00 - Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
-
13:00 - Lockpicking Forensics
-
13:30 - AAPL- Automated Analog Telephone Logging
-
14:00 - Hackerspaces: The Legal Bases
-
14:00 - Screen Scraper Tricks: Extracting Data from Difficult Websites
-
14:00 - 30k Feet Look at WiFi
-
14:00 - Slight of Mind: Magic and Social Engineering
-
14:00 - RAID Recovery: Recover your PORN by Sight and Sound
-
15:00 - Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
-
15:00 - Robot Shark Laser! What Hackerspaces Do
-
15:00 - Confidence Game Theater
-
15:00 - USB Attacks: Fun with Plug & 0wn
-
15:00 - Dangerous Minds: The Art of Guerrilla Data Mining
-
16:00 - De Gustibus, or Hacking your Tastebuds
-
16:00 - Social Zombies: Your Friends Want to Eat Your Brains
-
16:00 - The Psychology of Security Unusability
-
16:00 - Introduction to WiMAX Hacking
-
16:00 - Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
Unknown date
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.