DEF CON 18
took place July 30, 2010 through Aug. 1, 2010 (14 years, 4 months ago) at Riviera Hotel & Casino in Las Vegas, Nevada, USA.
The general admission cost for the conference was $140.00[1].
Presentations
Thursday, July 29, 2010
Friday, July 30, 2010
-
10:00 - Welcome and Making the DEF CON 18 Badge
-
10:00 - SIE Passive DNS and the ISC DNS Database
-
10:00 - oCTF: 5 years in 50 minutes
-
10:00 - How To Get Your FBI File (and Other Information You Want From the Federal Government)
-
10:00 - Perspectives on Cyber Security and Cyber Warfare
-
11:00 - Our Instrumented Lives: Sensors, Sensors, Everywhere...
-
11:00 - Open Public Sensors and Trend Monitoring
-
11:00 - Cloud Computing, a Weapon of Mass Destruction?
-
11:00 - Meet the Feds - CSI:TCP/IP
-
11:30 - FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
-
12:00 - Build a Lie Detector/Beat a Lie Detector
-
12:00 - How Unique Is Your Browser?
-
12:00 - Google Toolbar: The NARC Within
-
12:00 - DNS Systemic Vulnerabilities and Risk Management: A Discussion with the Experts
-
12:00 - Your ISP and the Government: Best Friends Forever.
-
12:30 - Crawling BitTorrent DHTs for Fun and Profit
-
13:00 - The Law of Laptop Search and Seizure
-
13:00 - Meet the Feds - Policy, Privacy, Deterrence and Cyber War
-
13:00 - How Hackers Won the Zombie Apocalypse
-
13:00 - Who Cares About IPv6?
-
13:00 - Token Kidnapping's Revenge
-
13:30 - Operating System Fingerprinting for Virtual Machines
-
14:00 - Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
-
14:00 - Web Application Fingerprinting with Static Files
-
14:00 - Enough Cyber Talk Already! Help get this Collaboration Engine Running!
-
14:00 - Search & Seizure & Golfballs
-
14:00 - Build your own UAV 2.0 - Wireless Mayhem from the Heavens!
-
14:30 - WRT54-TM, Media Center and Network Sniffer
-
15:00 - Tales from the Crypto
-
15:00 - Exploiting Digital Cameras
-
15:00 - Air Traffic Control Insecurity 2.0
-
15:00 - Exploiting Internet Surveillance Systems
-
15:00 - Open Letter - Call to Action
-
15:30 - FPGA Bitstream Reverse Engineering
-
16:00 - Of Bytes and Bullets
-
16:00 - Hacking Facebook Privacy
-
16:00 - Exploiting WebSphere Application Server's JSP Engine
-
16:00 - Like a Boss: Attacking JBoss
-
16:00 - VirGraff101: An Introduction to Virtual Graffiti
-
16:30 - Letting the Air Out of Tire Pressure Monitoring Systems
-
17:00 - Hacking Oracle From Web Apps
-
17:00 - Evilgrade, "You Still Have Pending Upgrades?"
-
17:00 - Mastering the Nmap Scripting Engine
-
17:00 - An Observatory for the SSLiverse
-
17:00 - DCFluX in: Moon-bouncer
-
17:30 - Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems
-
18:00 - Meet the EFF
-
18:00 - Weaponizing Lady GaGa, Psychosonic Attacks
-
18:00 - Bad Memories
-
18:00 - Be A Mentor!
-
18:00 - Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
-
18:30 - Your Boss is a Douchebag... How About You?
-
19:00 - Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
-
19:00 - Black Ops Of Fundamental Defense: Web Edition
-
19:00 - FOCA2: The FOCA Strikes Back
-
19:00 - Antique Exploitation (aka Terminator 3.11 for Workgroups
-
19:00 - Hacking and Protecting Oracle Database Vault
-
19:30 - Pwned By The Owner: What Happens When You Steal A Hacker's Computer
-
20:00 - Big Brother on the Big Screen: Fact/Fiction?
-
20:00 - Live Fire Exercise: Baltic Cyber Shield 2010
-
21:00 - Panel: Internet Wars
Saturday, July 31, 2010
Sunday, Aug. 1, 2010
Unknown date
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.