DEF CON 18
took place July 30, 2010 through Aug. 1, 2010 (13 years, 2 months ago)
at Riviera Hotel & Casino in Las Vegas, Nevada, USA.
The general admission cost for the conference was $140.00[1].
Presentations
Thursday, July 29, 2010
Friday, July 30, 2010
-
10:00 - Perspectives on Cyber Security and Cyber Warfare
-
10:00 - oCTF: 5 years in 50 minutes
-
10:00 - How To Get Your FBI File (and Other Information You Want From the Federal Government)
-
10:00 - Welcome and Making the DEF CON 18 Badge
-
10:00 - SIE Passive DNS and the ISC DNS Database
-
11:00 - Meet the Feds - CSI:TCP/IP
-
11:00 - Cloud Computing, a Weapon of Mass Destruction?
-
11:00 - Open Public Sensors and Trend Monitoring
-
11:00 - Our Instrumented Lives: Sensors, Sensors, Everywhere...
-
11:30 - FOE‚ The Release of Feed Over Email, a Solution to Feed Controversial News to Censored Countries
-
12:00 - Google Toolbar: The NARC Within
-
12:00 - DNS Systemic Vulnerabilities and Risk Management: A Discussion with the Experts
-
12:00 - Your ISP and the Government: Best Friends Forever.
-
12:00 - How Unique Is Your Browser?
-
12:00 - Build a Lie Detector/Beat a Lie Detector
-
12:30 - Crawling BitTorrent DHTs for Fun and Profit
-
13:00 - Who Cares About IPv6?
-
13:00 - Meet the Feds - Policy, Privacy, Deterrence and Cyber War
-
13:00 - Token Kidnapping's Revenge
-
13:00 - How Hackers Won the Zombie Apocalypse
-
13:00 - The Law of Laptop Search and Seizure
-
13:30 - Operating System Fingerprinting for Virtual Machines
-
14:00 - Web Application Fingerprinting with Static Files
-
14:00 - Enough Cyber Talk Already! Help get this Collaboration Engine Running!
-
14:00 - Lord of the Bing: Taking Back Search Engine Hacking from Google and Bing
-
14:00 - Search & Seizure & Golfballs
-
14:00 - Build your own UAV 2.0 - Wireless Mayhem from the Heavens!
-
14:30 - WRT54-TM, Media Center and Network Sniffer
-
15:00 - Air Traffic Control Insecurity 2.0
-
15:00 - Open Letter - Call to Action
-
15:00 - Exploiting Digital Cameras
-
15:00 - Exploiting Internet Surveillance Systems
-
15:00 - Tales from the Crypto
-
15:30 - FPGA Bitstream Reverse Engineering
-
16:00 - VirGraff101: An Introduction to Virtual Graffiti
-
16:00 - Of Bytes and Bullets
-
16:00 - Hacking Facebook Privacy
-
16:00 - Like a Boss: Attacking JBoss
-
16:00 - Exploiting WebSphere Application Server's JSP Engine
-
16:30 - Letting the Air Out of Tire Pressure Monitoring Systems
-
17:00 - Evilgrade, "You Still Have Pending Upgrades?"
-
17:00 - Mastering the Nmap Scripting Engine
-
17:00 - DCFluX in: Moon-bouncer
-
17:00 - Hacking Oracle From Web Apps
-
17:00 - An Observatory for the SSLiverse
-
17:30 - Training the Next Generation of Hardware Hackers -- Teaching Computer Organization and Assembly Language Hands-on with Embedded Systems
-
18:00 - Weaponizing Lady GaGa, Psychosonic Attacks
-
18:00 - Drivesploit: Circumventing Both Automated AND Manual Drive-By-Download Detection
-
18:00 - Meet the EFF
-
18:00 - Be A Mentor!
-
18:00 - Bad Memories
-
18:30 - Your Boss is a Douchebag... How About You?
-
19:00 - Black Ops Of Fundamental Defense: Web Edition
-
19:00 - Getting Root: Remote Viewing, Non-local Consciousness, Big Picture Hacking, and Knowing Who You Are
-
19:00 - Hacking and Protecting Oracle Database Vault
-
19:00 - FOCA2: The FOCA Strikes Back
-
19:00 - Antique Exploitation (aka Terminator 3.11 for Workgroups
-
19:30 - Pwned By The Owner: What Happens When You Steal A Hacker's Computer
-
20:00 - Live Fire Exercise: Baltic Cyber Shield 2010
-
20:00 - Big Brother on the Big Screen: Fact/Fiction?
-
21:00 - Panel: Internet Wars
Saturday, July 31, 2010
Sunday, Aug. 1, 2010
Unknown date
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.