DEF CON 33
takes place Aug. 7, 2025 through Aug. 10, 2025 (in 1 week, 5 days) at Las Vegas Convention Center in Las Vegas, Nevada, USA.
The general admission cost for the conference is $500.00[1].
Presentations
Friday, Aug. 8, 2025
Saturday, Aug. 9, 2025
Sunday, Aug. 10, 2025
-
09:00 - EMMC BGA Secrets, hack bga memory, no reballing necessary: Learn how to safely remove EMMC memory modules, hack them and then reinstall, without the difficult process of trying to reball the BGA. Workshop
-
09:00 - Cloud Forensics Workshop: Smart Grid Edition Workshop
-
09:00 - Creating malicious functional app on Android Workshop
-
09:00 - Hands-on IoT firmware extraction and flash forensics Workshop
-
09:00 - DIY Malware Emulation: Build It, Break It, Detect It Workshop
-
09:00 - Provably exfiltrating data by breaking TLS in the right ways Workshop
-
09:00 - Hacking the connected plant: AI edition! Workshop
-
09:00 - Disrupting Digital Dataflows: A 101 on how 2 detect, analyze, & disrupt digital systems by reverse engineering real-world Electronic Warfare techniques from Ukraine at the hardware level Workshop
-
10:00 - From Shanghai to the Shore: The Silent Threat in Global Shipping
-
10:00 - Mind the Data Voids: Hijacking Copilot Trust to Deliver C2 Instructions with Microsoft Authority
-
10:00 - Invitation Is All You Need! Invoking Gemini for Workspace Agents with a Simple Google Calendar Invite
-
10:00 - SSH-nanigans: Busting Open the Mainframes Iron Fortress through Unix
-
10:00 - Cyber Volunteering and Community Defense - DEF CON Franklin and the Cyber Resilience Corps 1 Year In
-
10:30 - Jailbreaking the Hivemind: Finding and Exploiting Kernel Vulnerabilities in the eBPF Subsystem
-
10:30 - Can't Stop the ROP: Automating Universal ASLR Bypasses for Windows
-
11:00 - Kill List: Hacking an Assassination Site on the Dark Web
-
11:00 - Journey to the center of the PSTN: How I became a phone company, and why you should too.
-
11:00 - Playing Dirty Without Cheating - Getting Banned for Fun and No Profit
-
11:30 - Passkeys Pwned: Turning WebAuthn Against Itself
-
11:30 - Breaking Wi-Fi Easy Connect: A Security Analysis of DPP
-
12:00 - Carding, Sabotage & Survival: A Darknet Market Veteran’s Story
-
12:00 - Phrack Panel
-
12:00 - Turning your Active Directory into the attacker’s C2: modern Group Policy Objects enumeration and exploitation
-
12:30 - Silent Signals: Exploiting Security and Privacy Side-Channels in End-to-End Encrypted Messengers
-
12:30 - Win-DoS Epidemic: A crash course in abusing RPC for Win-DoS & Win-DDoS
-
13:00 - Unexpected Connections: How a vulnerability in obscure dealer software could have unlocked your car from anywhere
-
13:30 - SCCM: The tree that always bears bad fruits
-
13:30 - Contest Closing Ceremonies & Awards
-
13:30 - Planting C4: Cross-Compatible External C2 for All Your Implants
-
14:00 - How to Fake a Badge like a Pro: 11 Tips to Counterfeiting Event Credentials
-
14:00 - Loading Models, Launching Shells: Abusing AI File Formats for Code Execution
-
15:00 - DEF CON Closing Ceremonies & Awards
- ^ This price is meant to give a general idea of the cost of attending the conference. Many conferences have varying prices based on number of days of attendance, early registration, tiers of support, or additional costs for workshops or trainings. The price here is meant to represent the most common cost for the majority of attendees. See the conference's homepage, if applicable, for details.