DEF CON 32 Creator Stage
DEF CON 32 Creator Stage and Village Overflow talks featuring hands-on hacking, hardware, and community presentations.
→ See editor’s top picks at DEF CON 32 Creator Stage
- Your Smartcard is Dumb A Brief History of Hacking Access Control Systems — Chad Shortman
In his DEF CON 32 talk, "Your Smartcard is Dumb: A Brief History of Hacking Access Control Systems," Chad Shortman takes the audience on a journey through decades of vulnerabilities in physical…
- What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams — Mager, Forte
This talk, "What To Expect When You’re Exploiting: 0Days Baby Monitors & Wi-Fi Cams," delves into the pervasive security vulnerabilities inherent in consumer-grade Wi-Fi cameras and baby monitors…
- Using AI Computer Vision in Your OSINT Data Analysis — Mike Raggo
In this DEF CON 32 talk, Mike Raggo, a seasoned veteran of the information security community, delves into the transformative potential of artificial intelligence (AI) and **computer vision** for…
- Offensive Security Testing Safeguarding the Final Frontier — Andrzej Olchawa
Andrzej Olchawa's DEF CON 32 talk, "Offensive Security Testing: Safeguarding the Final Frontier," delivers a stark warning about the security posture of critical space infrastructure, specifically…
- XR for All: Accessibility and Privacy for Disabled Users — Dylan Fox
Dylan Fox, Director of Operations for XR Access, delivered a compelling talk at DEF CON 32 titled "XR for All: Accessibility and Privacy for Disabled Users." The presentation underscored the…
- How State Laws Meant to Protect Children Raise Other Risks — Anthony Hendricks
In his thought-provoking DEF CON 32 presentation, "Wu-Tang is for the Children: How State Laws Meant to Protect Children Raise Other Risks," Anthony Hendricks, a cybersecurity and data privacy…
- Winning the Game of Active Directory — Brandon Colley
In his DEF CON 32 talk, "Winning the Game of Active Directory," Brandon Colley, a Senior Security Consultant at Trimark Security, challenged conventional notions of success in Active Directory (AD)…
- Warflying in a Cessna — Matt Thomassen, Sean McKeever
This talk, "Warflying in a Cessna," presented by Sean McKeever and Matt Thomassen at DEF CON 32, delves into the intriguing concept of collecting wireless access point data from the air. Drawing…
- V2GEvil: Ghost in the Wires — Pavel Khunt, Thomas Sermpinis aka Cr0wTom
The DEF CON 32 talk "V2GEvil: Ghost in the Wires" presented by Pavel Khunt and Thomas Sermpinis (also known as Cr0wTom) from Auxilium Pentest Labs, addresses the critical and often overlooked…
- War Games Red Team for OT Based on Real World Case Studies — Shishir Gupta
In this compelling talk at DEF CON 32, Shishir Gupta, a Technical Manager at Mandiant/Google, delved into the critical domain of red teaming and attack vectors for Operational Technology (OT)…
- You got a lighter I need to do some Electroporation — J. Utley, P. Rhodes, J. Hill
In an era where scientific advancement often feels confined to well-funded laboratories and academic institutions, "You got a lighter? I need to do some Electroporation" presented a refreshing and…
- The Past, Present, and Future of Bioweapons — Panel
This DEF CON 32 panel discussion, featuring Dr. Xavier Lewis Palmer, Meow, and Luke Potter, offered a compelling and accessible exploration of bioweapons, traversing their historical origins to…
- The Interplay between Safety and Security in Aviation Systems — Lillian Ash Baker
In a critical presentation at DEF CON 32, Lillian Ash Baker, a Product Security Engineer at The Boeing Company and Wisk Aero, delved into the fundamental relationship between safety and security in…
- RF Attacks on Aviation's Defense Against Mid-Air Collisions — G. Longo, V. Lenders
In an era of increasingly complex air traffic and millions of flights annually, the integrity of aviation's safety systems is paramount. This DEF CON 32 presentation, delivered by cybersecurity…
- Physical OSINT — Lukas McCullough
In his DEF CON 32 talk, "Physical OSINT," Lukas McCullough, a graduate student specializing in cybersecurity and criminal justice, illuminated the critical, yet often underestimated, intersection of…
- Curious Case of Alice&Bob: What You Can Do as Digital Investigators — Catherine Ullman
In "Curious Case of Alice&Bob: What You Can Do as Digital Investigators," Catherine Ullman, known as Investigator Chick, delivered a compelling and foundational talk at DEF CON 32, demystifying the…
- So you wanna know how to make badges — c0ldbru
In "So you wanna know how to make badges," c0ldbru, a solutions architect and the founder of Rot 13 Labs, delivered a practical and inspiring talk aimed at demystifying the process of creating…
- Psychic Paper: Making eink access badges accessible for anyone — Joshua Herman
In the DEF CON 32 talk "Psychic Paper: Making eink access badges accessible for anyone," Joshua Herman, also known as Zitterbewegung, unveiled a novel approach to physical red teaming and social…
- Preparing for the Future: A Discussion of our Rapidly Evolving Threat Landscape — Panel
This DEF CON 32 panel, organized by the IoT Village and moderated by Rachel, brought together industry experts to dissect the rapidly evolving cybersecurity landscape, with a particular focus on the…
- Student Engagement Doesn't Have to Suck — Dr Muhsinah Morris
In an era where educational methodologies often struggle to keep pace with rapid technological advancements, Dr. Muhsinah Morris, affectionately known as "Dr. Mom" by her students at Morehouse…
- Reverse engineering and hacking Ecovacs robots — Dennis Giese, Braelynn Hacker
This talk, presented by security researchers Dennis Giese and Braelynn Hacker at DEF CON 32, provides a comprehensive look into the security vulnerabilities and privacy risks inherent in Ecovacs IoT…
- Reflections on a Decade in Bug Bounties — Nikhil Shrivastava, Charlie Waterhouse
This DEF CON 32 talk, "Reflections on a Decade in Bug Bounties," offers a unique dual perspective on the evolving world of vulnerability research and disclosure. Presented by Nikhil Shrivastava, a…
- Programming a CTS-V Gauge Cluster into an ATS-V, out of pure spite — Varjitt Jeeva
In a compelling presentation at DEF CON 32, software engineer and automotive enthusiast Varjitt Jeeva detailed his journey to retrofit a fully digital gauge cluster into his Cadillac ATS-V. Driven…
- Practical Exploitation of DoS in Bug Bounty — Roni Lupin Carta
In this DEF CON 32 talk, Roni Lupin Carta, co-founder of Lupin Holmes, delves into the often-misunderstood and frequently dismissed realm of Denial-of-Service (DoS) vulnerabilities within bug bounty…
- Porn & Privacy — ET
In the rapidly evolving landscape of digital security, the talk "Porn & Privacy" by ET (Edna Johnson) at DEF CON 32 delivered a critical examination of the escalating threats to personal privacy…
- Open Source Hacker V. Government Lawyer — Rebecca Lively, Eddie Zaneski
"Open Source Hacker V. Government Lawyer" delves into the often-conflicting worlds of rapid open-source development and the stringent security and compliance requirements of the United States…
- Detecting persistent threats on Draytek devices — Octavio Gianatiempo, Gastón Aznarez
In an era where edge devices serve as critical gateways to corporate and home networks, their security has become paramount. The talk "Detecting persistent threats on Draytek devices" by Octavio…
- Sneaky Extensions The MV3 Escape Artists — Vivek Ramachandran, Shourya Pratap Singh
In "Sneaky Extensions: The MV3 Escape Artists," Vivek Ramachandran and Shourya Pratap Singh deliver a sobering assessment of the pervasive and often underestimated threat posed by malicious browser…
- SBOMs the Hard Way Hacking Bob the Minion — Larry Pesce
In his DEF CON 32 talk, "SBOMs the Hard Way Hacking Bob the Minion," Larry Pesce, Product Security Research and Analysis Director and Services Team Lead at Finite State, delves into the practical…
- Pick Your Poison: Navigating a secure clean energy transition — Emma Stewart
Emma Stewart's DEF CON 32 talk, "Pick Your Poison: Navigating a secure clean energy transition," delivers a stark warning about the often-overlooked national security implications of the global…
- Safecracking for Everyone — Jared Dygert
In "Safecracking for Everyone" at DEF CON 32, Jared Dygert, a seasoned lock sport enthusiast and safe manipulation expert, peeled back the layers of security surrounding common mechanical safe…
- Small Satellite Modeling and Defender Software — Kyle Murbach
In an era where space access is becoming increasingly democratized through initiatives like SpaceX's rideshare rocket launches, the proliferation of small satellites presents both immense…
- Signature-Based Detection Using Network Timing — Josh Pyorre
This article delves into Josh Pyorre's talk at DEF CON 32, titled "Signature-Based Detection Using Network Timing." The presentation, as indicated by its title, aims to explore novel methods for…
- RFID 101 — Ege Feyzioglu, Andrew M
In the contemporary landscape of physical security, **Radio-Frequency Identification (RFID)** systems are ubiquitous, silently facilitating access to buildings, streamlining public transit, and…
- Bypass 101 — Bill Graydon
In "Bypass 101," Bill Graydon from the Physical Security Village delivered a critical message for internal employees navigating the often-overlooked realm of physical security within their…
- Breaking Boundaries: Popping Shells in the Airgap w $10 & Arduino Magic — Daniel Beard
Daniel Beard's DEF CON 32 talk, "Breaking Boundaries: Popping Shells in the Airgap w $10 & Arduino Magic," challenges long-held assumptions about physical access security in medical device…
- Exposing the Occultations in Large Off-Grid Solar Systems — Dan Berte, Alexandru Lazar
In an era increasingly reliant on green energy solutions, the security of rapidly expanding solar infrastructure has become a critical, yet often overlooked, concern. This DEF CON 32 talk, "Exposing…
- Analyzing the Security of Satellite Based Air Traffic Control — Martin Strohmeier
In this DEF CON 32 talk, Martin Strohmeier from the Cyber Defense Campus, part of the Swiss Department of Defense, presented a comprehensive analysis of the security vulnerabilities inherent in…
- A dive into world of Aircraft PKI — Matt Gaffney
Matt Gaffney, a Principal Engineer at United Airlines and a lead at the Aerospace Village, delivered a compelling presentation at DEF CON 32, offering a "shallow dive" into the complex and critical…
- UDSonCAN Attacks Discovering Safety Critical Risks by Fuzzing — Seunghee Han
This talk, presented by Seunghee Han of Autocrypt at DEF CON 32, unveiled critical safety vulnerabilities discovered in "latest EV models" through the application of **UDS (Unified Diagnostic…
- The Village Peoples' Panel What Really Goes On in a Village — Panel
This panel session, titled "The Village Peoples' Panel: What Really Goes On in a Village," provided an insightful look into the vibrant and often unsung efforts behind the various specialized…
- Bluetooth Blues: Unmasking CVE 2023-52709-The TI BLE5-Stack Attack — Kevin Mitchell
In this compelling talk at DEF CON 32, Kevin Mitchell, a Senior Automotive Security Tester at Etos, unveiled a critical **denial-of-service (DoS)** vulnerability, designated as **CVE-2023-52709**…
- The wild and wonderful world of early Microprocessors w/a focus on 6502 — Michael Brown
Michael Brown’s DEF CON 32 talk, "The wild and wonderful world of early Microprocessors w/a focus on 6502," offers a captivating journey back to the foundational era of personal computing. While DEF…
- Building a secure resilient nationwide EV charging network — Harry Krejsa, Sarah Hipel
This talk, delivered by Harry Krejsa from the White House **Office of the National Cyber Director (ONCD)** and Sarah Hipel from the **Joint Office of Energy and Transportation**, addresses the…
- Behind the Badge:How we used hardware to make AV badge — Adam Batori, Robert Pafford
This talk, "Behind the Badge: How we used hardware to make AV badge," delivered by Adam Batori and Robert Pafford at DEF CON 32, delves into the intricate and often unconventional engineering…
- Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device — Andrew Bellini
Andrew Bellini's DEF CON 32 talk, "Anyone can hack IoT- Beginner’s Guide to Hacking Your First IoT Device," challenges the prevailing misconceptions that IoT hacking is prohibitively expensive or…
- Access Control Done Right the First Time — Tim Clevenger
In "Access Control Done Right the First Time," Tim Clevenger delivers a crucial talk that deviates from the typical DEF CON focus on bypasses, instead spotlighting the foundational importance of…
- 3DU Homo ex Machina — Lacey Harbour
Lacey Harbour's DEF CON 32 talk, "3DU Homo ex Machina," delves into the rapidly evolving landscape of medical device manufacturing, driven by the convergence of artificial intelligence (AI) and 3D…
- Attacks on GenAI data & using vector encryption to stop them — Patrick Walsh, Bob Wall
In this DEF CON 32 talk, Patrick Walsh and Bob Wall, co-founders of Ironcore Labs, shed critical light on the often-overlooked security vulnerabilities inherent in the data ecosystems surrounding…
- Simulating attacks against hydroelectric power plants — Julia Dewitz-Würzelberger
This talk, presented by Julia Dewitz-Würzelberger from Verbund, in collaboration with colleagues Sarah and Bernhard from Enviso, delves into the critical need for robust operational technology (OT)…
- Top War Stories from a TryHard Bug Bounty Hunter — Justin Rhynorater Gardner
Justin Gardner, known in the cybersecurity community as Rhynorater, took the stage at DEF CON 32 to share a treasure trove of real-world critical vulnerabilities he discovered during his extensive…
- Bridging Space and Medicine — Fernando De La Peña Llaca
This talk, presented by Fernando De La Peña Llaca at DEF CON 32, delves into the groundbreaking application of **holographic teleportation**, or **volumetric video**, within the extreme and…
- Tough Adversary Don’t Blame Sun Tzu — Gregory Carpenter, DrPH
In "Tough Adversary Don’t Blame Sun Tzu," Dr. Gregory Carpenter, a former NSA analyst, presents a compelling and deeply researched examination of the foundational philosophies and historical…
- The Risk and Reward of Distributed Industrial Control — Joe Slowik
- Color Blasted Badge Making: How Hard Could It Be — Abhinav Panda, Bradán Lane
This talk, presented at DEF CON 32, dives into the intricate and often challenging world of creating full-color, custom printed circuit board (PCB) badges. Abhinav Panda, a veteran of the "badge…
- Famous and Not So Famous Unsolved Codes — Elonka Dunin, Klaus
In a captivating presentation at DEF CON 32, renowned crypto experts Elonka Dunin and Klaus Schmeh delved into the intriguing world of **unsolved encrypted messages**, highlighting both widely…
- An adversarial approach to Airline Revenue Management Proving Ground — Craig Lester
Craig Lester's DEF CON 32 talk, "An adversarial approach to Airline Revenue Management Proving Ground," aims to shed light on the intricate, often opaque, systems that airlines use to price tickets…
- Navigating the Turbulent Skies of Aviation Cyber Regulation — M. Weigand, S. Wagner
This talk, "Flying Blind," delivered by Michael Weigand and Stewart Wagner at DEF CON 32, delves into the critical and often overlooked realm of cybersecurity within both civil and military…
- Exposing Attacks Hiding in the Sheer Noise of False Positives — E Tahoun, L Hamida
In his DEF CON 32 talk, "Exposing Attacks Hiding in the Sheer Noise of False Positives," Ez Tahoun delivered a compelling argument for a fundamental shift in how the cybersecurity industry…
- Data On Demand The challenges of building a privacy focused AI Device — Matt Domko
In "Data On Demand: The Challenges of Building a Privacy-Focused AI Device" at DEF CON 32, Matt Domko delivered a critical examination of the complexities inherent in developing consumer-grade AI…
- D0N0H4RM Cyber STEM Storytime — Panel
The "D0N0H4RM Cyber STEM Storytime" panel at DEF CON 32 brought together a distinguished group of experts from regulatory bodies, federal agencies, and the non-profit sector to address the…
- Hacker vs AI perspectives from an ex spy — Harriet Farlow
This DEF CON 32 talk, "Hacker vs AI perspectives from an ex spy," delivered by Harriet Farlow, offers a unique perspective on the intersection of artificial intelligence and security, viewed through…
- Responding to Breaches, Ransomware, and State Sponsored Threat Actors — Panel
This DEF CON 32 panel, titled "Responding to Breaches, Ransomware, and State Sponsored Threat Actors," brought together a distinguished group of cybersecurity experts to discuss the evolving…
- DIY Pharmaceuticals — Michael Laufer
This talk, presented by Michael Laufer at DEF CON 32, delves into the ambitious and potentially transformative world of **DIY Pharmaceuticals**. Laufer introduces the **Microlab**, an open-source…
- How we built our REDACTED THING this year, 5n4ck3y, && AMA Badge Panel — AND!XOR
The DEF CON 32 talk by the AND!XOR team, titled "How we built our REDACTED THING this year, 5n4ck3y, && AMA Badge Panel," offered an insightful, community-driven discussion into the intricate…
- Got 99 problems but prompt injection ain't pineapple — Chloé Messdaghi, Kasimir Schulz
In this DEF CON 32 talk, Chloé Messdaghi, Head of Threat Intelligence at Hidden Layer, takes the stage to demystify the complex landscape of Artificial Intelligence (AI) vulnerabilities. While the…
- Custom, cheap, easy, and safe badges without starting from scratch — securelyfitz
In this DEF CON 32 talk, hardware hacking and reverse engineering instructor securelyfitz (Joe) introduces an **open hardware badge design** aimed at simplifying the creation of custom, functional…
- Bypass 102 — Terry Luan, Karen Ng
In "Bypass 102," Terry Luan and Karen Ng delve into the crucial, yet often overlooked, realm of physical security vulnerabilities and their remediation. This talk serves as a practical follow-up to…
- From Easy Wins to Epic Challenges: Bounty Hunter Edition — Daniel Blaklis Le Gall
In "From Easy Wins to Epic Challenges: Bounty Hunter Edition," Daniel Blaklis Le Gall, a seasoned bug bounty hunter with an impressive track record, set out to share insights from his extensive…
- Exploiting Bluetooth from your car to the bank account — Vladyslav Zubkov, Martin Str
This talk, "Exploiting Bluetooth from your car to the bank account," presented at DEF CON 32, delves into the pervasive security vulnerabilities inherent in Bluetooth technology, spanning from…
- Hunters and Gatherers A Deep Dive into the World of Bug Bounties — Panel
This DEF CON 32 panel, "Hunters and Gatherers: A Deep Dive into the World of Bug Bounties," offers a comprehensive exploration of the bug bounty ecosystem from multiple vantage points. Featuring a…
- Eradicating Hepatitis C with BioTerrorism — Mixæl Swan Laufer
Mixæl Swan Laufer’s DEF CON 32 talk, "Eradicating Hepatitis C with BioTerrorism," is a powerful and provocative indictment of the global pharmaceutical industry and the intellectual property (IP)…
- Human Dignity in AI and Tech Policy — Jan Trzaskowski
In this thought-provoking DEF CON 32 talk, Jan Trzaskowski, a distinguished law professor from Copenhagen Business School and Aalborg University, delves into the profound ethical and societal…
- Leveraging AI for Smarter Bug Bounties — Diego Jurado, Joel Niemand Sec Noguera
In an era increasingly dominated by artificial intelligence, the security landscape is rapidly evolving. While much research has focused on "hacking AIs"—forcing models to leak information or behave…
- ICS 101 — Bryson Bort, Tom VanNorman
In "ICS 101," Bryson Bort and Tom VanNorman, co-founders of the **ICS Village**, deliver a foundational talk aimed at demystifying **Industrial Control Systems (ICS)** for the broader security…
- GPS spoofing it's about time, not just position — Ken Munro
Ken Munro's DEF CON 32 talk, "GPS spoofing it's about time, not just position," delves into the critical, yet often overlooked, vulnerability of Global Navigation Satellite System (GNSS)…
- MFT Malicious Fungible Tokens — Mauro Eldritch, Cybelle Oliveira
In their DEF CON 32 talk, "MFT Malicious Fungible Tokens," Mauro Eldritch and Cybelle Oliveira unveiled a groundbreaking approach to command and control (C2) infrastructure, leveraging the inherent…
- Master Splinter’s initial physical access dojo — Daniel Isler
In "Master Splinter’s initial physical access dojo," Daniel Isler, representing the Friendly Rats social engineering unit at Dreamlab Technologies, delivers a compelling narrative demonstrating the…
- GUR RIBYHGVBA BS PELCGBTENCUL — Jeff Man
In "THE EVOLUTION OF CRYPTOGRAPHY" (itself a ROT13 cipher for the talk's actual title), veteran cryptologist and former NSA Red Team architect Jeff Man takes attendees on a comprehensive journey…
- Fitness of Physical Red Teamers — Lucas Rooyakkers, Billy Graydon
In "Fitness of Physical Red Teamers," Lucas Rooyakkers and Billy Graydon deliver a compelling presentation that transcends typical discussions of digital vulnerabilities, delving into the…
- I am still the Captain now! — Paul Brownridge
In "I am still the Captain now!", Paul Brownridge, an experienced OT and maritime cybersecurity professional, delves into the complex and often overlooked cybersecurity landscape of large container…
- Evading Modern Defenses When Phishing with Pixels — Melvin Langvik
In an insightful talk at DEF CON 32, Melvin Langvik, known by his alias Flangvik, unveiled sophisticated techniques for bypassing contemporary email security defenses through novel QR code phishing…
- Locksport Competitions: Compete in the Olympics of Locks — Matt Burrough
This talk, presented by Matt Burrough and Jos Weers at DEF CON 32, offers a comprehensive introduction to the world of **Lock Sport competitions**. Far from being a mere hobby, Lock Sport is…
- Manufacturing Lessons Learned, Lessons Taught — Tim Chase
Tim Chase's DEF CON 32 talk, "Manufacturing Lessons Learned, Lessons Taught," delves into the unique cybersecurity challenges faced by the manufacturing sector. As a veteran of **Information Sharing…
- Introduction to IPv6 — Denis Smajlović
In his DEF CON 32 talk, "Introduction to IPv6," Denis Smajlović, a Principal Security Consultant at Nova Information Security, tackles the pervasive challenge of understanding **IPv6** within the…
- MoWireless MoProblems: Modular Wireless Survey Sys. & Data Analytics — G Horvath, W Tam
In the rapidly expanding landscape of wireless technologies, comprehensive data collection and analysis have become increasingly complex. The DEF CON 32 talk "MoWireless MoProblems: Modular Wireless…
- Dysfunctional Unity The Road to Nowhere — Michael v3ga Aguilar
In "Dysfunctional Unity: The Road to Nowhere," Michael Aguilar, a Principal Consultant with Secure Works' adversary group, delivers a critical examination of the fractured ecosystem surrounding…
- Exploiting Voice Cloning in Adversarial Simulation — Mark Foudy
In an era where voice biometrics are increasingly deployed for secure authentication, Mark Foudy's DEF CON 32 presentation, "Exploiting Voice Cloning in Adversarial Simulation," illuminated the…
- MicroHard More Like MicroEasy to Exploit — Ricky Lawshae
In "MicroHard More Like MicroEasy to Exploit," Ricky Lawshae, a Principal Security Researcher at Keysight Technologies, dissects the significant security vulnerabilities present in Microhard's…
- Incubated ML Exploits: Backdooring ML Pipelines w Input Handling Bugs — Suha Hussain
In an increasingly AI-driven world, the security of Machine Learning (ML) systems has become a paramount concern. Suha Hussain, an engineer at Trail of Bits specializing in AI and ML security…
- National Labs Use of XR — Martin Pratt
In this DEF CON 32 talk, Martin Pratt, a software engineer at the Pacific Northwest National Lab (PNNL), provided a comprehensive overview of how **Extended Reality (XR)** technologies –…
- Decoding Galah, an LLM Powered Web Honeypot — Adel Karimi
Adel Karimi's talk at DEF CON 32 introduced **Galah**, an innovative **Large Language Model (LLM)-powered web honeypot** designed to dynamically generate realistic HTTP responses. Named after an…
- Ground Control to Major Threat Hacking the Space Link Extension Protocol — Andrzej Olch
In his DEF CON 32 talk, "Ground Control to Major Threat: Hacking the Space Link Extension Protocol," Andrzej Olch challenges conventional wisdom regarding space system security. While much of the…
- Kubernetes Attack Simulation The Definitive Guide — Leo Tsaousis
In the rapidly evolving landscape of cloud-native infrastructure, securing Kubernetes clusters presents unique and complex challenges for organizations. Leo Tsaousis, a Senior Security Consultant at…
- How I hacked Learning Codes of the key job of a car assembled in my country — D. Erazo
This article delves into D. Erazo's compelling research presented at DEF CON 32, where he exposed critical vulnerabilities in the keyless entry systems of thousands of cars assembled in his home…
- Doors, Cameras, & Mantraps Oh my! — The Magician
This talk, "Doors, Cameras, & Mantraps Oh my!", delivered by The Magician at DEF CON 32, delves into the often-overlooked yet critical domain of **physical security**. Far from a mere lock-picking…
- Exploiting Bluetooth from your car to the bank account$$ — Yso, Martin Strohmeier
This talk, presented by Martin Strohmeier on behalf of his student Yso (Vladislav), delves into the pervasive and often overlooked security vulnerabilities inherent in **Bluetooth Classic**…
- How I Developed a Low Cost Raspberry Pi Based Device for ADS B Spoof — Angelina Tsuboi
Angelina Tsuboi's talk at DEF CON 32, titled "How I Developed a Low Cost Raspberry Pi Based Device for ADS B Spoof," introduces Fly Catcher, a personal project aimed at enhancing aviation security…
- From Theory to Reality Demonstrating the Simplicity of SPARTA Techniques — Randi Tinney
In this DEF CON 32 talk, Randi Tinney, a representative from The Aerospace Corporation and the lead developer for the **Space Attack Research and Tactic Analysis (SPARTA)** framework, presented a…
- Fool us Once, fool us twice Hacking Norwegian Banks — Per Thorsheim
In a revealing presentation at DEF CON 32, security expert Per Thorsheim, joined by Cecilia, exposed a critical vulnerability within Norway's highly digitized banking system. Their talk, "Fool us…
- Finding 0days in Vilo Home Routers — Justin Mott, Ava Petersen
This talk, presented by Justin Mott and Ava Petersen from Brigham Young University, delves into the process of discovering multiple zero-day vulnerabilities in Vilo home mesh WiFi routers. The…
- Top 10 Cybersecurity Trends in Critical Infrastructure for 2024 — Mars Cheng
In this DEF CON 32 presentation, Mars Cheng delivered a comprehensive overview of the critical cybersecurity landscape within Operational Technology (OT) environments, identifying the top 10 trends…
- Inside Dash Cam Custom Protocols and Discovered 0days — Hyo Jin Lee, Hanryeol Park
This presentation, "Inside Dash Cam Custom Protocols and Discovered 0days," delivered by Hyo Jin Lee and Hanryeol Park, delves into the often-overlooked security landscape of modern dash cameras…
- No Symbols When Reversing No Problem Bring Your Own Max ‘Libra’ Kersten — Panel
In the intricate world of binary analysis, the absence of symbolic information presents a significant hurdle for reverse engineers. Max 'Libra' Kersten's talk, "No Symbols When Reversing No Problem…
- Efficient Bug Bounty Automation Techniques — Gunnar Andrews
Gunnar Andrews' DEF CON 32 talk, "Efficient Bug Bounty Automation Techniques," delves into sophisticated methodologies for maximizing bug bounty hunter effectiveness by optimizing resource…
- Cybersecurity Schoolhouse Rock — Avi McGrady
In "Cybersecurity Schoolhouse Rock," Avi McGrady presents a compelling and urgent call to action for integrating **cybersecurity first principles** into the kindergarten through 12th-grade (K-12)…
- Differential privacy beyond algorithm: Challenges for deployment — Rachel Cummings
In this DEF CON 32 talk, Professor Rachel Cummings of Columbia University introduced the foundational concepts of **Differential Privacy (DP)**, a powerful and mathematically rigorous framework for…