Opening Ceremonies
Scanning Darkly
Kinetic Pwnage: Obliterating the Line Between Computers and the Physical World
Look Ma, No Exploits! – The Recon-ng Framework
Cognitive Injection: Reprogramming the Situation-Oriented Human OS
It’s Only a Game: Learning Security through Gaming
Pigs Don’t Fly – Why owning a typical network is so easy, and how to build a secure one.
Building An Information Security Awareness Program from Scratch
Gen Y—Getting Them to Talk Rather than Text at Work
Battle Scars And Friendly Fire: Threat Research Team War Stories
Practical Exploitation Using A Malicious Service Set Identifier (SSID)
IOCAware – Actively Collect Compromise Indicators and Test Your Entire Enterprise
Ooops, Now What? :: The Stolen Data Impact Model (SDIM)
Finding The Signal in the Noise: Quantifying Advanced Malware
Malware : testing malware scenarios on your network
Unmasking Miscreants
gitDigger: Creating useful wordlists from public GitHub repositories
JTAGulator: Assisted discovery of on-chip debug interfaces
Cash is King: Who’s Wearing Your Crown?
Anti-Forensics: Memory or something, I forget.
Applying the 32 Zombieland Rules to IT Security
Password Intelligence Project – Advanced Password Recovery and Modern Mitigation Strategies
PowerShell and Windows Throw the Best Shell Parties
Owning Computers Without Shell Access
Seeing red in your future?
Security Sucks, and You’re Wearing A Nursing Bra
The Mysterious Mister Hokum
Windows 0wn3d By Default
Tizen Security: Hacking the new mobile OS
Sixnet Tools: for poking at Sixnet Things
Promoting Your Security Program Like A Lobbyist.
TMI: How to attack SharePoint servers and tools to make it easier
Windows Attacks: AT is the new black
Appsec Tl;dr
Android 4.0: Ice Cream “Sudo Make Me a” Sandwich
RAWR – Rapid Assessment of Web Resources
Abusing LFI-RFI for Fun,Profit and Shells
Hardening Windows 8 apps for the Windows Store
The High Risk of Low Risk Applications
How Good is Your Phish
DIY Command & Control For Fun And *No* Profit
Hiding @ Depth – Exploring & Subverting NAND Flash memory
Decoding Bug Bounty Programs
Intro to Dynamic Access Control in Windows Server 2012
Evolutionary Security – Embracing Failure to Attain “Good Enough”
It’s Okay to Touch Yourself
Identifying Evil: An introduction to Reverse Engineering Malware and other software
IPv6 is here (kind of), what can I do with it?
Attacking the Next Generation Air Traffic Control System; Hackers, liquor and commercial airliners.
Patching Windows Executables with the Backdoor Factory
DIY Forensics: When Incident Response Morphs into Digital Forensics
ANOTHER Log to Analyze – Utilizing DNS to Discover Malware in Your Network
Collaborative Penetration Testing With Lair
How Im going to own your organization in just a few days.
Dancing with Dalvik
Antivirus Evasion through Antigenic Variation (Why the Blacklisting Approach to AV is Broken)
DEF CON Documentary