(with many thanks to Anonymous)
- Download presentations separately in PDF files (Can download the whole folder by choosing "Download folder" button)
- Defcon 18 bittorrent (faster)
- Defcon 18 Audio in MP3 files
Please use Bittorrent for the full CD or download presenations above.
List of included presentations, papers, and extras (in alphabitical order) -- 106 presentations
- A New Approach to Digital Forensic Methodology And !!BUSTED!! Case studies David C. Smith Samuel Petreski
- A Survey and Examination of the Adequacy of the Laws Related to Cyber Warfare. Dondi ―spookdoctor06‖ West
- Advanced Format String Attacks Presented by Paul Haas
- Air Traffic Control Insecurity 2.0 Righter Kunkel
- Analyzing vulnerability assessment data the easy way… Schuberg Philis Seccubus
- Attack the Key Own the Lock. datagram & Schuyler Towne
- Attacking .NET Applications at Runtime Jon McCoy
- Attacking JBoss like a Boss Krpata
- au.bug William-LeGrand
- Be a Mentor Marisa Fagan InfoSec Mentors Project
- BlindElephant:Web Application Fingerprinting With Static Files Patrick Thomas
- Blitzableiter –BETA Release Countering Flash Exploits Felix "FX" Lindner
- Browser Based Defenses x06d
- Build a Lie Detector / Beat a Lie Detector. Rain, J03b34r
- Building a Security Operations Center with little or no money. Pyorre
- Changing Threats To Privacy Marlinspike
- Cloud ComputingA Weapon of Mass Destruction? David M. N. Bryan
- Connection Strings Chema Alonso Informática 64
- Constricting the Web. Offensive Python for Web Hackers Nathan Hamiel, Marcin Wielgoszewski
- Crawling Bittorrent DHTs for Fun and Profit Scott Wolchok
- Cyber [Crime|War] Connecting the dots Iftach Ian Amit Managing Partner, Security & Innovation
- Cyberterrorism & the Security of the National Drinking Water Infrastructure John McNabb
- DCFluX in: Moon-Bouncer Matt Krick, DCFluX – K3MK Chief Engineer, New West Broadcasting Systems, Inc.
- Defcon Comedy Jam 3D Or Not 3D? PANEL
- Electronic Weapons Tim Otto, aka mage2
- Embedded devices, an AntiVirus-free safe hideout for Malware Ahn Ki-Chan, Ha Dong-Joo
- evilgrade, "You STILL have pending upgrades!“ Francisco Amato / Federico Kirschbaum
- Exploitable Assumptions Doktor Zoz, Dr. Foley, and Eric Schmiedl
- Exploitation on ARM Technique and bypassing defense mechanisms STRI/Advance Technology Lab/Security
- Exploiting Digital Cameras Oren Isacson, Alfredo Ortega
- Exploiting Internet Surveillance Systems Decius
- Exploiting SCADA Systems JBrown
- Exploiting WebSphere Application Server's JSP Engine Schaller
- ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically Jeongwook Oh
- Extras java by Lee-Pahl
- F.O.E.Feed Over Email A Proxy-less RSS Reader For Users in Internet Censored Countries Sho Ho
- Function hooking for OSX and Linux Joe Damato
- Gaming in the glass safe. Games, DRM, and Privacy. Ferdinand Schober
- Go Go Gadget Python Nick Waite FurkanCayçı
- Google Toolbar: The NARC Within gtoolbarsnoop.py Bryner
- Hacking and protecting Oracle Database Vault Esteban Martínez Fayó
- Hacking DOCSIS for Fun and Profit Blake SElf Bytemytaco
- Hacking Oracle from web apps Sumit Siddharth, Aleksander Gorkowienko
- Hacking The Future: Weaponizing the Next Generation PANEL
- Hardware Black Magic:Designing Printed Circuit Boards Dr. Fouad (Dr. K) Kiamilev, Corey (c0re) Lange, Stephen (afterburn) Janansky
- Hardware Hacking for us dumb software guys Arduinos
- How To Get Your FBI File (and Other Information You Want From the Federal Government) Hofmann
- How to Hack Millions of Routers Craig Heffner
- How Unique is Your Browser? a report on the Panopticlick experiment Peter Eckersley
- Improving Antivirus Accuracy with Hypervisor Assisted Analysis Danny Quist
- Industrial Cyber Security From the Perspective of the Power Sector Revision 1 Wade Polk.Paul Malkewicz.Jaroslav Novak
- INSECURITY ENGINEERING: Locks, Lies, and Videotape Tobias-Fiddler-Bluzmanis
- IPv6: No Longer Optional John CurranPresident & CEO ARIN
- IPv6@ARIN Matt Ryanczak
- Jong-il and me: How to build a cyber army to attack the U.S. Charlie Miller
- Kartograph Elie Bursztein and Jocelyn Lagarenne Stanford University
- Katana: Portable Multi-Boot Security Suite JP Dunning DefCon 2010
- KenjiUrada
- Letting the Air Out of Tire Pressure Monitoring Systems Mike MetzgerKim Jong
- Live fire exercise:Baltic Cyber Shield 2010 Kenneth Geers
- Lord of the Bing Taking Back Search Engine Hacking From Google and Bing Francis Brown and Rob Ragan Stach & Liu, LLC
- Malware Freakshow 2 Nicholas J. Percoco & Jibran Ilyas
- Mastering the Nmap Scripting Engine Fyodor and David Fifield
- Mind Games Extras by Theime
- Mobile Privacy: Tor On The iPhone And Other Unusual Devices Marco Bonetti - CutAway s.r.l.
- Multiplayer Metasploit Tag-Team Pen Testing and Reporting Ryan Linn
- My Life As A Spyware Developer Why I’m Probably Going to Hell Pejski
- Open Data Source Analysis Daniel “whopis” Burroughs
- Operating System Fingerprinting for Virtual Machines Nguyen Anh Quynh
- PCI: Compromising Controls and Compromising Security PANEL
- PHP-Nuke_exploit.php.php Brooks
- Physical Security (You’re Doing It Wrong) A.P. Delchi
- Programmable HID USB Keyboard House for pen-testing Adrian Crenshaw
- Pwned by the Owner Zoz
- ʻpyREticʼ – In memory reverse engineering for obfuscated Python bytecode Rich Smith
- Razorback Mullen-Pentney
- Repelling the Wily Insider Matias Madou
- Resilient Botnet Command and Control with Tor Dennis Brown
- SCADA and ICS for Security Experts: How to Avoid Cyberdouchery James Arlen, CISA
- Searching for Malware: A Review of Attackers’ Use of Search Engines to Lure Victims Paul Judge, David Maynor
- Securing MMOs A Security rofessional’s View From the Inside
- Security Measurement and Assuring Reliability through metrics Technology ( SMART) Applying Reliability Metrics to Security Vulnerabilities Wayne Zage, Dolores Zage, Blake Self
- SHODAN for Penetration Testers Michael “theprez98” Schearer
- Sniper Forensics “One Shot, One Kill” Christopher E. Pogue - Trustwave
- So Many Ways to Slap a YoHo: Hacking Facebook & YoVille Tom Stracener “Strace”, EvilAdamSmith, Sean Barnum
- Social Engineering. Street
- Tales from the Crypto G. Mark Hardy
- The Anatomy of Drug Testing Fiekert
- The Year of HD Voice --2010 Who, what, where, how? (Actually, who, how, where, what) Doug Mohney
- This is not the droid you’re looking for… Nicholas J. Percoco & Christian Papathanasiou
- This needs to be fixed. Jokes, vulnerabilities, and analysis of commit statements. Logan Lodge, Bruce Potter
- Token Kidnapping's Revenge Cesar Cerrudo Argeniss
- TOOLSMITHING AN IDA BRIDGE: A TOOL BUILDING CASE STUDY Adam Pridgen Matt Wollenweber
- Training the Next Generation of Hardware Hackers Teaching Computer Organization and Assembly Language Hands-On with Embedded Systems Kongs-Kane
- Trolling with Math frank^2
- Universal RF Usb Keyboard Emulation Device URFUKED by Monta Elkins
- VirGraf101:An Introduction to Virtual Graffiti Tottenkoph
- Wardriving the smart Grid. Practical approaches to attacking utility packet radios Shawn Moyer,Nathan Keltner
- We don’t need no stinkin’ badges! Hacking electronic door access controllers Shawn Merdinger
- Weaponizing Lady GaGa PsychoSonic Attacks BSmith
- Web Services We Just Don’t Need Mike Bailey
- Who Cares About IPv6? Sam Bowne City College San Francisco
- WiMAX Hacking 2010 Pierce Goldy aSmig
- WPA Too! Md Sohail Ahmad, AirTight Networks
- You Spent All That Money ...And You Still Got Owned Joe McCray
- Your boss is a douchebag...How about you? effffn
Mediafire link is dead. It was working less than 24 hours ago.
ReplyDeleteSorry my bad english. I hope you reupload it again to MF.
Thanks!
It is not dead, just too many requests at once and causes MF timeouts. Try again or use bittorrent (it is faster too)
ReplyDeleteYea, i downloaded it using Bittorrent. It's generall faster than other "direct downloads" websites except for mf
ReplyDelete