Hope it is not a copyright violation and won't cause too much hate. I know Defcon will post better and complete data soon but many / most attendees did not receive the presentation CDs to their great sadness because there were not enough CDs available for all. Many authors and attendees published Defcon and Blackhat presentations online as well -you can track them via Twitter
You can download it here for now. Check Defcon website often, they will post it soon. The list of files of the speaker materials is below. The zip file also includes short stories. Please note that some presentations submitted for the DVD were somewhat / significantly different from what was presented. But better this than nothing, right?
SPEAKER MATERIALS - LIST OF PRESENTATIONS
DEFCON 21 DOWNLOAD HERE - 394MB Zip
Las Vegas BSides 2013 - materials are here BSides Las Vegas 2013
Abraham Kang and Dinis Cruz
DEFCON-21-Kang-Cruz-RESTing-On-Your-Laurels-Will-Get-You-Pwned.pdf
Alejandro Caceres
DEFCON-21-Caceres-Massive-Attacks-With-Distributed-Computing.pdf
Alexandre Pinto
DEFCON-21-Pinto-Defending-Networks-Machine-Learning-WP.pdf
DEFCON-21-Pinto-Defending-Networks-Machine-Learning.pdf
Amber Baldet
DEFCON-21-Baldet-Suicide-Intervention-Risk-Assessment-Tactics.pdf
Andy Davis
DEFCON-21-Davis-Revealing-Embedded-Fingerprints.pdf
Balint Seeber
DEFCON-21-Balint-Seeber-All-Your-RFz-Are-Belong-to-Me.pdf
Bogdan Alecu
DEFCON-21-Bogdan-Alecu-Attacking-SIM-Toolkit-with-SMS-WP.pdf
DEFCON-21-Bogdan-Alecu-Business-Logic-Flaws-in-MO.pdf
Brendan O'Connor
DEFCON-21-OConnor-Stalking-a-City-for-Fun-and-Frivolity.pdf
Brian Gorenc and Jasiel Spelman
DEFCON-21-Gorenc-Spelman-Java-Every-days-WP.pdf
DEFCON-21-Gorenc-Spelman-Java-Every-days.pdf
Chris John Riley
DEFCON-21-Riley-Defense-by-Numbers.pdf
Chris Sumner and Randall Wald
DEFCON-21-Sumner-Wald-Prediciting-Susceptibility-To-Social-Bots-On-Twitter.pdf
Christine Dudley
DEFCON-21-Dudley-Privacy-In-DSRC-Connected-Vehicles.pdf
Craig Young
DEFCON-21-Young-Google-Skeleton-Key.pdf
---Extras
DEFCON-21-Craig-Young-Android-PoC-StockView-with-SSL.apk
DEFCON-21-Craig-Young-Android-PoC-StockView.apk
DEFCON-21-Craig-Young-Android-PoC-TubeApp.apk
DEFCON-21-Craig-Young-StockView-ExampleCode.java
Crowley and Panel
DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0-WP.pdf
DEFCON-21-Crowley-Savage-Bryan-Home-Invasion-2.0.pdf
| ---Extras
---upnp_request_gen
LICENSE.txt
readme.txt
upnp_request_gen.php
Dan Griffin
DEFCON-21-Dan-Griffin-Protecting-Data.pdf
Daniel Chechik
DEFCON-21-Chechik-Utilizing-Popular-Websites-for-Malicious-Purposes-Using-RDI.pdf
Daniel Selifonov
DEFCON-21-Selifonov-A-Password-is-Not-Enough-Why-Disk-Encryption-is-Broken.pdf
Eric Fulton and Daniel Zolnikov
DEFCON-21-Fulton-Zolnikov-The-Politics-of-Privacy-and-Technology.pdf
Eric Milam
DEFCON-21-Milam-Getting-The-Goods-With-smbexec.pdf
Eric Robi and Michael Perklin
DEFCON-21-Robi-Perklin-Forensic-Fails.txt
Etemadieh and Panel
DEFCON-21-Etemadieh-Panel-Google-TV-Secure-Boot-Exploit-GTVHacker.pdf
Fatih Ozavci
DEFCON-21-Ozavci-VoIP-Wars-Return-of-the-SIP.pdf
| ---Extras
DEFCON-21-viproy-voipkit.tgz
Flipper
DEFCON-21-Flipper-10000-Yen.pdf
| ---Extras
| Defcon 21 - 10000 Yen Source Code.txt
| OpenGlider BoM.pdf
| OpenGlider V0.1.x_t.txt
| x35 coordinates.sldcrv.txt
|
---OpenGlider IGES Files
Franz Payer
DEFCON-21-Payer-Exploiting-Music-Streaming-with-JavaScript.pdf
Gregory Pickett
DEFCON-21-Pickett-Lets-Screw-With-NMAP.pdf
| ---Extras
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Specifications.pdf
DEFCON-21-Pickett-Lets-Screw-With-NMAP-Transformations.pdf
platform.zip
scans.zip
Hunter Scott
DEFCON-21-Scott-Security-in-Cognitive-Radio-Networks.pdf
Jacob Thompson
DEFCON-21-Thompson-CREAM-Cache-Rules-Evidently-Ambiguous-Misunderstood.pdf
Jaeson Schultz
DEFCON-21-Schultz-Examining-the-Bitsquatting-Attack-Surface-WP.pdf
Jason Staggs
DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper.pdf
| ---Extras
DEFCON-21-CANClockProof-of-ConceptDemo.wmv
DEFCON-21-CANClockSource.pde
DEFCON-21-MINI-Cooper-Crash-Test.wmv
Jim Denaro
DEFCON-21-Denaro-How-to-Disclose-or-Sell-an-Exploit.pdf
Joe Bialek
DEFCON-21-Bialek-PowerPwning-Post-Exploiting-by-Overpowering-Powershell.pdf
| ---Extras
DEFCON-21-Invoke-ReflectivePEInjection.ps1.txt
Joe Grand
DEFCON-21-Grand-JTAGulator.pdf
| ---Extras
| DEFCON-21-jtagulatorassembly.pdf
| DEFCON-21-jtagulatorblockdiagram.pdf
| DEFCON-21-jtagulatorbom.pdf
| DEFCON-21-jtagulatorschematic.pdf
| DEFCON-21-jtagulatortestproc.pdf
|
Firmware 1.1 (b9b49b3)
---Gerbers B
John Ortiz
DEFCON-21-Ortiz-Fast-Forensics-Using-Simple-Statistics-and-Cool-Tools.pdf
| ---Extras
DEFCON-21-Ortiz-TOOLSCustom.zip
DEFCON-21-Ortiz-TOOLSFreeDownload.zip
Joseph Paul Cohen
| ---Extras
| DEFCON-21-blucat.base64
|
---blucat-r50
Justin Engler and Paul Vines
DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking-WP.pdf
DEFCON-21-Engler-Vines-Electromechanical-PIN-Cracking.pdf
| ---Extras
DEFCON-21-Codepartslistinstructions.zip
Justin Hendricks
DEFCON-21-Justin-Hendricks-So-You-Think-Your-Domain-Controller-Is-Secure.pdf
Karl Koscher and Eric Butler
DEFCON-21-Koscher-Butler-The-Secret-Life-of-SIM-Cards.pdf
Lawrence and Panel
DEFCON-21-Lawrence-Johnson-Karpman-Key-Decoding-and-Duplication-Schlage.pdf
| ---Extras
DEFCON-21-config.scad
DEFCON-21-key.scad
Marc Weber Tobias and Tobias Bluzmanis
DEFCON-21-Tobias-Bluzmanis-Insecurity-A-Failure-of-Imagination.pdf
Marion Marschalek
DEFCON-21-Marschalek-Thorny-Malware.pdf
| ---Extras
DEFCON-21-Marschalek-MalwareBase64.txt
DEFCON-21-Marschalek-Thorny-Malware-Analysis-Report.pdf
Melissa Elliott
DEFCON-21-Elliott-noisefloor-URLS-reference.txt
Michael Perklin
DEFCON-21-Perklin-ACL-Steganography.pdf.pdf
| ---Extras
| ACLEncode.sln
| README.txt
|
Michael Schrenk
DEFCON-21-Schrenk-How-my-Botnet-Defeated-Russian-Hackers.pdf
Ming Chow
DEFCON-21-Chow-Abusing-NoSQL-Databases.pdf
Neil Sikka
DEFCON-21-Sikka-EMET-4.0-PKI-Mitigation.pdf
Nicolas Oberli
DEFCON-21-Oberli-Please-Insert-Inject-More-Coins.pdf
Nikhil Mittal
DEFCON-21-Mittal-Powerpreter-Post-Exploitation-Like-a-Boss.pdf
| ---Extras
Nikhil_Mittal_Powerpreter_Code.psm1
Pau Oliva Fora
DEFCON-21-Fora-Defeating-SEAndroid.pdf
Philip Polstra
DEFCON-21-Polstra-We-are-Legion-Pentesting.pdf
| ---Extras
DEFCON-21-Philip-Polstra-code.py.txt
Phorkus and Evilrob
DEFCON-21-Phorkus-Evilrob-Hacking-Embedded-Devices-Bad-things-to-Good-hardware.pdf
Piotr Duszynski
DEFCON-21-Duszynski-Cyber-Offenders.pdf
Pukingmonkey
DEFCON-21-Pukingmonkey-The-Road-Less-Surreptitiously-Traveled.pdf
| ---Extras
01_ALPR_detector_proof_of_concept.mp4
02_ezpass_detector_of_open_road_tolling.mp4
03_ezpass_detector_of_hidden_reader.mp4
04_ezpass_detector_of_hidden_reader_with_toll_tag_sensor.mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds-(1).mp4
DEFCON-21-05ezpassdetectortimessquaretomsgin90seconds.mp4
arduino-micro
Remy Baumgarten
DEFCON-21-Baumgarten-Mach-O-Viz-WP.pdf
DEFCON-21-Baumgarten-Mach-O-Viz.pdf
Richard Thieme
DEFCON-21-Richard-Thieme-UFOs-and-Govt.pdf
| ---Extras
DEFCON-21-Richard Thieme-UFOs-and-Govt-Resources.txt
Ricky HIll
DEFCON-21-Ricky-Hill-Phantom-Drone.pdf
Robert Clark
DEFCON-21-Clark-Legal-Aspects-of-Full-Spectrum-Computer-Network-Active-Defense.pdf
Robert Stucke
DEFCON-21-Stucke-DNS-Hazards.pdf
Runa A Sandvik
DEFCON-21-Sandvik-Safety-of-the-Tor-Network.pdf
Ryan Holeman
DEFCON-21-Holeman-The-Bluetooth-Device-Database.pdf
---Extras
---src
analytics
Sam Bowne
DEFCON-21-Bowne-SSD-Data-Evap.pdf
Sam Bowne and Matthew Prince
DEFCON-21-Bowne-Prince-Evil-DoS-Attacks-and-Strong-Defenses.pdf
Scott Behrens and Brent Bandelgar
DEFCON-21-Behrens-Bandelgar-MITM-All-The-IPv6-Things.pdf
Teal Rogers and Alejandro Caceres
DEFCON-21-Rogers-Caceres-The-Dawn-of-Web-30.pdf
Tom Keenan
DEFCON-21-Tom-Keenan-Torturing-Open-Government-Systems-for-Fun.pdf
Tom Steele and Dan Kottman
DEFCON-21-Steele-Kottman-Collaborative-Penetration-Testing-With-Lair.pdf
Tony Mui and Wai-leng
DEFCON-21-Miu-Lee-Kill-em-All-DDoS-Protection-Total-Annihilation.pdf
| ---Extras
Vaagn Toukharian and Tigran Gevorgyan
DEFCON-21-Toukharian-Gevorgyan-HTTP-Time-Bandit.pdf
Wesley McGrew
DEFCON-21-McGrew-Pwn-The-Pwn-Plug .pdf
DEFCON-21-McGrew-Pwn-The-Pwn-Plug-WP.pdf
| ---Extras
DEFCON-21-community1.1vswireless1.1.txt
DEFCON-21-exploitpacketpayload.dat
DEFCON-21-originalubootenv.txt
DEFCON-21-ubi.py
WiK and Mubix
DEFCON-21-WiK-Mubix-gitDigger.pdf
Zak Blacher
DEFCON-21-Blacher-Transcending-Cloud-Limitations.pdf
| ---Extras
DEFCON-21-Scripted-Demo.tar
DEFCON-21-source-Code-dpk-master.zip
Zoz
DEFCON-21-Zoz-Hacking-Driverless-Vehicles.pdf
bughardy and Eagle1753
DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT-WP.pdf
DEFCON-21-bughardy-Eagle1753-OPT-circumventing-in-MIFARE-ULTRALIGHT.pdf
m0nk
DEFCON-21-m0nk-BoutiqueKit.pdf
soen
DEFCON-21-soen-Evolving-Exploits-Through-Genetic-Algorithms.pdf
really thanks for this
ReplyDeleteThe link is down, anyone could send a mirror ?
ReplyDeleteIt is not down, just over capacity sometimes
ReplyDeleteThis is a mirror https://dl.dropboxusercontent.com/u/15104027/Defcon%2021%20-%202013%20Speaker%20Presentaitons%20DVD.zip
Gracias
ReplyDeleteThanks for sharing this will be very helpful since I missed.... DAM women!
ReplyDeleteAwesome, thank you!
ReplyDeleteThank you.
ReplyDeleteThanks! found via cryptome
ReplyDeletethanks to the hackers who keep us safe
Just saw that @_defcon_ posted another set of materials on Twitter- Benjamin Caudill's "Offensive Forensics: CSI for Badguys".
ReplyDeleteLinks - Slides:http://www.rhinosecuritylabs.com/wp-content/uploads/2013/08/FINAL-DEFCON-21-Offensive-Forenscs-CSI-For-Badguys-Benjamin-Caudill.pptx
Tool Released (Forensic Scraper): http://www.rhinosecuritylabs.com/wp-content/uploads/2013/08/forensic_scraper
Thanks very much!
ReplyDeleteThank you for sharing. Hope to be there next time.
ReplyDeleteCheers
ReplyDeleteMuchas gracias
ReplyDeletethanx for sharing
ReplyDelete