DEF CON 17 - Thursday, July 30
13:00
Chéron, HighWiz, Kushner, Miss Jackalope, Moss, Noid, Ollam, Russr, Siviak, Thorn
DEF CON 101
Kiamilev, Murray
Effective Information Security Career Planning
Bryan, McGee
Hardware Black Magic - Building devices with FPGAs
Bryan
Hacking with GNURadio
Estis
Pre-Con Introduction to Lock Picking
15:00
DeGulielmo, Robbins
Hacking the Apple TV and Where your Forensic Data Lives
16:00
Krick
Con Kung-Fu: Defending Yourself @ DEF CON
Addict
DCFluX in: The Man with the Soldering Gun
Lockheed
DEF CON 1 - A Personal Account
Rennie
DC Network Session
16:30
Lentz
So You Got Arrested in Vegas...
DEF CON 17 - Friday, July 31
10:00
Liverani, Moss
Welcome to Defcon 17 with Dark Tangent and the Making of & Hacking the DC17 Badge
Hering
Perspective of the DoD Chief Security Officer
Beckstrom, jhind, Lineberry
Is your Iphone Pwned? Auditing, Attacking and Defending Mobile Devices
Gavas
Beckstrom's Law - A Model for Valuing Networks and Security
Granick
Catching DNS Tunnels with AI - A Talk About Artificial Intelligence, Geometry and Malicious Traffic
11:00
Merrill
Asymmetric Defense: How to Fight Off the NSA Red Team with Five People or Less
Jordan, Marks
Jailbreaking and the Law of Reversing
Rehrig
Is That You, Baby, or Just a Bridge in the Sky?
Aiello
Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly
11:30
Q & A with Bruce Schneier
Adair, Davidoff, Richard
Hacking the Wiimote and Wii Fit to Help the Disabled
12:00
TBA
Flick, Yestrumskas
0-day, gh0stnet and the inside story of the Adobe JBIG2 vulnerability
Marlinspike
Death of Anonymous Travel
Psifertex, Schlesinger
Cross Site Scripting Anonymous Browser 2.0
12:30
Wilhelm
More Tricks For Defeating SSL
Digividual
Cloud Security in Map/Reduce
13:00
Rose
Maximum CTF: Getting the Most Out of Capture the Flag
Mooney
Hacking WITH the iPod Touch
Luedke
Socially Owned in the Cloud
13:30
Marks
The Year In Computer Crime Cases
Ostrom
Deblaze - A Remote Method Enumeration Tool for Flex Servers
14:00
Mortman, Sambamoorthy
Subverting the World Of Warcraft API
Mogull
Advancing Video Application Attacks with Video Interception, Recording, and Replay
Dixon, Hansen, Ligh, Maynor, Pesce, Richard
Defcon Security Jam 2: The Fails Keep on Coming
Dzulfakar
Attacking SMS. It's No Longer Your BFF
14:30
Clark, Scott
Making Fun of Your Malware
Vedaa
Advanced MySQL Exploitation
15:00
Anonymous
That Awesome Time I Was Sued For Two Billion Dollars
Quist
Computer and Internet Security Law - A Year in Review 2008 - 2009
Liebrock, Long
Proxy Prank-o-Matic
15:30
Dingledine, Opsahl
Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization
Estis
Session Donation
16:00
Bankston
three point Oh.
von Lohmann
Why Tor is Slow, and What We're Doing About It
Eckersley, Hofmann, Ilyas, Jordan, Marks, Percoco
Ask EFF: The Year in Digital Civil Liberties
Brooks
Stealing Profits from Stock Market Spammers or: How I learned to Stop Worrying and Love the Spam
16:30
Aslanian, Raygoza
Malware Freak Show
17:00
Potter, Zusman
BitTorrent Hacks
Lodge
Automated Malware Similarity Analysis
17:30
Renda
Criminal Charges are not pursued: Hacking PKI
Christy, Fleischer
Fragging Game Servers
Convertino
Injecting Electromagnetic Pulses into Digital Devices
18:00
Dixon
Attacking Tor at the Application Layer
Appelbaum, Fried, Garcia, Garris, Gavas, Goodspeed, Grundy, Hering, Hopper, Idonisi, Kaminsky, Kwon, Manson, Marshall, Privette, Thieme, Turgeon, Turner, Wells
Meet the Feds 2009
18:30
Tarnovsky
Something about Network Security
Gates
Locally Exploiting Wireless Sensors
Ceballos
Hacking UFOlogy 102: The Implications of UFOs for Life, the Universe, and Everything
DEF CON 17 - Saturday, August 1
10:00
Liverani, Moyer, Schearer
"Smart" Parking Meter Implementations, Globalism, and You(aka Meter Maids Eat Their Young)
Budd, Hamiel
Breaking the "Unbreakable" Oracle with Metasploit
Chéron, Gademer
Hacker vs. Disasters Large and Small: Hacker Skills for Wilderness and Disaster Survival
Bailey, McRee
Weaponizing the Web: New Attacks on User-generated Content
Crowley, Kunkel
Old Skool Brought Back: A 1964 Modem Demo
11:00
Dunker, Torres
A Low Cost Spying Quadrotor for Global security Applications Using Hacked Commercial Digital Camera
Using Guided Missiles in Drive-Bys: Automatic browser fingerprinting and exploitation with Metasploit
Boyce, Rook
CSRF: Yeah, It Still Works
Savage
Air Traffic Control: Insecurity and ADS-B
12:00
Holt
RFID MythBusting
Johnson
Metasploit Goes Web
Searle
Personal Survival Preparedness
DiMaggio
The security risks of Web 2.0
Ollam
Packing and the Friendly Skies
12:30
Grand
Design and Implementation of a Quantum True Random Number Generator
13:00
Zoz
Failure
Smith
Identifying, Exploring, and Predicting Threats in the Russian Hacker Community
Ames, Ho, Kerb
Injectable Exploits: Two New Tools for Pwning Web Apps and Browsers
Lockheed
Unfair Use - Speculations on the Future of Piracy
14:00
Liverani
The Projects of "Prototype This!"
Prabhu, Song, Stolfo
MetaPhish
Waite
FOE -- Feeding Controversial News to Censored Countries (Without Using Proxy Servers)
Bowne, TK234
Abusing Firefox Addons
I)ruid, Lawshae, Siddharth
Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode
14:30
Calca, Day
Hardware Trojans: Infiltrating the Faraday Cage
15:00
Anguiano
PLA Information Warfare Development Timeline and Nodal Analysis
Anonymous
Hijacking Web 2.0 Sites with SSLstrip--Hands-on Training
Kershaw
The Making of the second SQL injection Worm
15:30
Spill
Picking Electronic Locks Using TCP Sequence Prediction
Ossmann
MSF Telephony
Steward
Hacking the Smart Grid
16:00
Sniff Keystrokes With Lasers/Voltmeters
Meer, Street
Hadoop: Apache's Open Source Implementation of Google's MapReduce Framework
Slaviero
Manipulation and Abuse of the Consumer Credit Reporting Agencies
16:10
Metasploit Evolved
Meterpreter Advances
16:30
Gates
An Open JTAG Debugger
16:50
Arvanitis
MSF Wifi
17:00
FX, Maynor, Zaborowski
Bluetooth, Smells Like Chicken
Alperovitch
"I Am Walking Through a City Made of Glass and I Have a Bag Full of Rocks"
Sachs, Schneck, Skoudis
Clobbering the Cloud
17:30
Beale
App Assessment the Metasploit Way
Dai Zovi
Doppelganger: The Web's Evil Twin
18:00
Eriksson
Router Exploitation
Bitton, Davis, Kotler, Silberman
Preparing for Cyber War: Strategy and Force Posture in the Information-Centric World
Endgrain, Kerb
The Middler 2.0: It's Not Just for Web Apps Anymore
Luedke
Sharepoint 2007 Knowledge Network Exposed
18:10
Rad
Macsploitation with Metasploit
18:30
Metula
Runtime Kernel Patching on Mac OS X
18:50
Amit, McCray
Metasploit Autopsy: Recontructing the Crime Scene
19:00
Latrope, Ne0nRa1n
The Day of the Updates
DEF CON 17 - Sunday, August 2
09:00
Skytalks
10:00
Biddulph, Harbour, Tarnovsky
Hello, My Name is /hostname/
Ceballos
Hacking, Biohacking, and the Future of Humanity
Tobias
Managed Code Rootkits - Hooking into Runtime Environments
Fiddler
Down the Rabbit Hole: Uncovering a Criminal Server
Bluzmanis
Advanced SQL Injection
World of Warcraft Subversion
11:00
Pollet
eXercise in Messaging and Presence Pwnage
Kibler, Louthan
Hacking Sleep: How to Build Your Very Own Sleep Lab
Cooper
Win at Reversing: Tracing and Sandboxing through Inline Hooking
Davis, etd, Hughes
Invisible Access: Electronic Access Control, Audit Trails and "High Security"
Ahmad, Dhyani
Hack like the Movie Stars: A Big-Screen Multi-Touch Network Monitor
11:30
Joaquin, Pitchford
Hack The Textbook
12:00
Miller, Richard
Unmasking You
Alonso
Good Vibrations: Hacking Motion Sickness on the Cheap
Dradis Framework - Sharing Information will get you Root
Finol
Who Invented the Proximity Card?
Beave, JFalcon
Wi-Fish Finder: Who Will Bite the Bait
12:30
Neulist
Attacks Against 2wire Residential Gateways
13:00
Reguly
Search And Seizure Explained - They Took My Laptop!
Harbour, Schrenk
Your Mind: Legal Status, Rights and Securing Yourself
Moulton, Ray
Tactical Fingerprinting Using Metadata, Hidden Info and Lost Data
Beth
Lockpicking Forensics
Farr
Cracking the Poor and the Rich: Discovering the Relationship Between Physical and Network Security
13:30
Clement, Honeywell
AAPL- Automated Analog Telephone Logging
14:00
Cough
Hackerspaces: The Legal Bases
Kiamilev, Talabis
Slight of Mind: Magic and Social Engineering
Rucci
Screen Scraper Tricks: Extracting Data from Difficult Websites
Vega
RAID Recovery: Recover your PORN by Sight and Sound
Goldy
30k Feet Look at WiFi
15:00
Aggarwal, Eston, Pierce, Siviak, Weir
Robot Shark Laser! What Hackerspaces Do
Gutmann
Confidence Game Theater
Clark
Dangerous Minds: The Art of Guerrilla Data Mining
Blaze
Protecting Against and Investigating Insider Threats (A methodical, multi-pronged approach to protecting your organization)
Hardy
USB Attacks: Fun with Plug & 0wn
16:00
Guerra, McGovern
Introduction to WiMAX Hacking
Ames, Farina
Social Zombies: Your Friends Want to Eat Your Brains
Daniel
Cracking 400,000 Passwords, or How to Explain to Your Roommate why the Power Bill is a Little High…
Sangster
The Psychology of Security Unusability
Ragsdale
De Gustibus, or Hacking your Tastebuds
17:00
Closing Ceremonies hosted by The Dark Tangent


Instructions

This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.

Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.