SHARE
DEFCON 2017

DEFCON  is one of the world’s largest hacker conventions, where Many of the attendees at DEFCON 2017 include computer security professionals, journalists, lawyers, federal government employees, security researchers, students, and hackers with a general interest in software, computer architecture, phone phreaking, hardware modification, and anything else that can be “hacked.” The event consists of several tracks of speakers about the computer- and hacking-related subjects.

 Also read : Interesting Hacking tools and techniques

Also Read Mastering the Linux Networking – Free eBook Download

DEFCON-25-0ctane-Untrustworthy-Hardware-UPDATED.pdf

DEFCON-25-0ctane-Untrustworthy-Hardware.pdf

DEFCON-25-Alvaro-Munoz-JSON-attacks.pdf

DEFCON-25-Andrew-Robbins-and-Will-Schroeder-An-Ace-Up-The-Sleeve.pdf

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation-UPDATED.pdf

DEFCON-25-Artem-Kondratenko-Cisco-Catalyst-Exploitation.pdf

DEFCON-25-Ayoul3-Dealing-the-Perfect-Hand-Shuffling-memory-blocks-on-zOS.pdf

DEFCON-25-Brown-and-Latimer-Game-of-Drones-Drone-Defense-Market-UPDATED.pdf

DEFCON-25-Caleb-Madrigal-IOT-Hacking-With-SDR.pdf

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes-UPDATED.pdf

DEFCON-25-Chris-Thompson-MS-Just-Gave-The-Blue-Teams-Tactical-Nukes.pdf

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA-UPDATED.pdf

DEFCON-25-Christopher-Domas-Breaking-The-x86-ISA.pdf

DEFCON-25-Cincvolflt-Inside-The-Meet-Desai-Attack.pdf

DEFCON-25-Closing-Slides.pdf

DEFCON-25-DEFCON-101-The-Panel-UPDATED.pdf

DEFCON-25-Cory-Doctorow-Steps-Forward-Steps-Back-How-Can-We-Tell-If-We-Are-Winning-UPDATED.pdf

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit-UPDATED.pdf

DEFCON-25-Damien-Cauquil-Weaponizing-the-BBC-MicroBit.pdf

DEFCON-25-Daniel-Bohannon-and-Lee-Holmes-Revoke-Obfuscation.pdf

DEFCON-25-Datko-and-Quartier-Breaking-Bitcoin-Hardware-Wallets.pdf

DEFCON-25-Denton-Gentry-I-Know-What-You-Are-By-The-Smell-Of-Your-Wifi-UPDATED.pdf

DEFCON-25-Dhia-Mahjoub-and-Thomas-Mathew-Malicious-CDNs-Identifying-Zbot-Domains-en-Masse.pdf

DEFCON-25-Dimitry-Snezhkov-Abusing-Web-Hooks-UPDATED.pdf

DEFCON-25-Eckert-and-Dewes-Dark-Data-UPDATED.pdf

DEFCON-25-FuzzyNop-and-Ceyx-MEATPISTOL-A-Modular-Malware-Implant-Framework-UPDATED.pdf

DEFCON-25-Foofus-Secret-Tools-Learning-About-Gov-Surveillance-Software.pdf

DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks-Lab-Setup-Guide.pdf

DEFCON-25-Gabriel-Ryan-Advanced-Wireless-Attacks-Against-Enterprise-Networks.pdf

DEFCON-25-Gabriel-Ryan-The-Black-Art-of-Wireless-Post-Exploitation-UPDATED.pdf

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud-UPDATED.pdf

DEFCON-25-Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe-UPDATED.pdf

DEFCON-25-Gil-Cohen-Call-The-Plumber-You-Have-A-Leak-In-Your-(named)-Pipe.pdf

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery-UPDATED.pdf

DEFCON-25-Gus-Frischie-and-Evan-Teitelman-Backdooring-the-Lottery.pdf

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs-UPDATED.pdf

DEFCON-25-Haoqi-Shan-and-Jian-Yuan-Man-in-the-NFC.pdf

DEFCON-25-Hanno-Boeck-Abusing-Certificate-Transparency-Logs.pdf

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies-UPDATED.pdf

DEFCON-25-Hernandez-Richards-MacDonald-Evoy-Tracking-Spies-in-the-Skies.pdf

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI-UPDATED.pdf

DEFCON-25-Hyrum-Anderson-Evading-Next-Gen-AV-Using-AI.pdf

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns-UPDATED.pdf

DEFCON-25-Ilja-van-Sprundel-BSD-Kern-Vulns.pdf

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community-UPDATED.pdf

DEFCON-25-Inbar-and-Eden-Story-of-Early-Israeli-Hacking-Community.pdf

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks-UPDATED.pdf

DEFCON-25-Jason-Staggs-Breaking-Wind-Hacking-Wind-Farm-Control-Networks.pdf

DEFCON-25-Jesse-Michael-and-Mickey-Shkatov-Driving-Down-the-Rabbit-Hole.pdf

DEFCON-25-Jhaddix-HUNT-Data-Driven-Web-Hacking-and-Manual-Testing.pdf

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent-UPDATED.pdf

DEFCON-25-Jim-Nitterauer-DNS-Devious-Name-Services-Destroying-Privacy-Anonymity-Without-Your-Consent.pdf

DEFCON-25-Joe-Rozner-Wiping-Out-CSRF-UPDATED.pdf

DEFCON-25-Jon-Medina-Where-are-all-the-SDN-Talks-UPDATED.pdf

DEFCON-25-Josh-Pitts-Teaching-Old-Shellcode-New-Tricks-UPDATED.pdf

DEFCON-25-K2-Un-Fucking-Forensics-UPDATED.pdf

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time-UPDATED.pdf

DEFCON-25-Karit-ZX-Security-Using-GPS-Spoofing-To-Control-Time.pdf

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts-UPDATED.pdf

DEFCON-25-Konstantinos-Karagiannis-Hacking-Smart-Contracts.pdf

DEFCON-25-Lee-Holmes-Attacking-Battle-Hardened-Windows-Server.pdf

DEFCON-25-Macpherson-and-Temmingh-Finding-Useful-info-with-Maltego-UPDATED.pdf

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms-UPDATED.pdf

DEFCON-25-Marina-Simakov-and-Igal-Gofman-Here-to-stay-Gaining-persistence-by-abusing-auth-mechanisms.pdf

DEFCON-25-Matt-Joyce-Amateur-Digital-Archeology-UPDATED.pdf

DEFCON-25-Matt-Suiche-Porosity-Decompiling-Ethereum-Smart-Contracts-UPDATED.pdf

EFCON-25-Max-Bazaliy-Jailbreaking-Apple-Watch.pdf

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999-UPDATED.pdf

DEFCON-25-Mikhail-Sosonkin-Hacking-Travel-Routers-Like-1999.pdf

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

DEFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging-UPDATED.pdf

EFCON-25-Min-Spark-Zheng-macOS-iOS-Kernel-Debugging.pdf

DEFCON-25-Morten-Schenk-Taking-Windows-10-Kernel-Exploitation-to-the-next-level-UPDATED.pdf

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots-UPDATED.pdf

DEFCON-25-Nathan-Seidle-Open-Source-Safe-Cracking-Robots.pdf

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks-UPDATED.pdf

DEFCON-25-Omar-Eissa-Attacking-Autonomic-Networks.pdf

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser in-Trending-Programming-Languages-UPDATED.pdf

DEFCON-25-Orange-Tsai-A-New-Era-of-SSRF-Exploiting-URL-Parser-in-Trending-Programming-Languages.pdf

DEFCON-25-Owen-Snide-Phone-System-Testing-and-other-fun-tricks.pdf

DEFCON-25-Patrick-DeSantis-From-Box-to-Backdoor-Using-Old-School-Tools-UPDATED.pdf

DEFCON-25-Patrick-Wardle-Death-by-1000-Installers-on-MacOS-UPDATED.pdf

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly-UPDATED..pdf

DEFCON-25-Patrick-Wardle-Offensive-Malware-Analysis-Fruit-Fly.pdf

DEFCON-25-Plore-Popping-a-Smart-Gun-UPDATED.pdf

DEFCON-25-Plore-Popping-a-Smart-Gun.pdf

DEFCON-25-Professor-Plum-Digital Vengeance-Exploiting-Notorious-Toolkits.pdf

DEFCON-25-Professor-Plum-Digital-Vengeance-Exploiting-Notorious-Toolkits-UPDATED.pdf

DEFCON-25-Redezem-PEIMA-Using-Power-Laws-to-Address-DOS-Attacks-UPDATED.pdf

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services-UPDATED.pdf

DEFCON-25-Roger-Dingledine-Next-Generation-Tor-Onion-Services.pdf

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security.pdf

DEFCON-25-Ryan-Baxendale-Microservices-and-FaaS-for-Offensive-Security-UPDATED.pdf

DEFCON-25-Sean-Kanuck-Hacking-Democracy-UPDATED.pdf

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android-UPDATED.pdf

DEFCON-25-Slava-Makkaveev-and-Avi-Bashan-Unboxing-Android.pdf

DEFCON-25-Steinthor-Bjarnason-and-Jason-Jones-The-Call-Is-Coming-From-Inside-The-House-UPDATED.pdf

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation-UPDATED.pdf

DEFCON-25-Stephan-Huber-and-Seigfried-Rasthofer-Password-Manager-Investigation.pdf

DEFCON-25-Suggy-Sumner-Rage-Against-The-Weaponized-AI-Propaganda-Machine.pdf

DEFCON-25-Tess-Schrodinger-Total-Recall.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-UPDATED.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-WP.pdf

DEFCON-25-Tomer-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions.pdf

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware-UPDATED.pdf

DEFCON-25-Vasillios-Mavroudis-Trojan-Tolerant-Hardware.pdf

DEFCON-25-Weston-Hecker-Opt-Out-or-Deauth-Trying.pdf

DEFCON-25-Whitney-Merrill-and-Terrell-McSweeny-Tick-Tick-Boom-Tech-and-the-FTC.pdf

DEFCON-25-William-Knowles-Persisting-With-Microsoft-Office.pdf

DEFCON-25-Woodbury-and-Haltmeyer-Linux-Stack-Based-V2X-Framework-Hack-Connected-Vehicles-UPDATED.pdf

DEFCON-25-XlogicX-Assembly-Language-Is-Too-High-Level.pdf

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist-UPDATED.pdf

DEFCON-25-Yuwei-Zheng-UnicornTeam-Ghost-Telephonist.pdf

DEFCON-25-Zardus-25-Years-of-Program-Analysis-UPDATED.pdf

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre-UPDATED.pdf

DEFCON-25-chaosdata-Ghost-in-the-Droid-ParaSpectre.pdf

DEFCON-25-r00killah-and-securelyfitz-Secure-Tokin-and-Doobiekeys.pdf

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip-UPDATED.pdf

DEFCON-25-skud-and-Sky-If-You-Give-A-Mouse-A-Microchip.pdf

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration-UPDATED.pdf

DEFCON-25-spaceB0x-Exploiting-Continuous-Integration.pdf

DEFCON-25-trixr4skids-DOOMed-Point-of-Sale-Systems-UPDATED.pdf

DEFCON-25-zerosum0x0-alephnaught-Koadic-C3.pdf

The term DEF CON comes from the movie WarGames, referencing the U.S. Armed Forces defense readiness condition (DEFCON).

In the movie, Las Vegas was selected as a nuclear target, and since the event was being hosted in Las Vegas, it occurred to Jeff Moss to name the convention DEFCON 2017.

The Black Badge is the highest award DEFCON 2017 gives to contest winners of certain events. Capture the flag (CTF) winners sometimes earn these, as well as Hacker Jeopardy winners.

The contests that are awarded Black Badges vary from year to year, and a Black Badge allows free entrance to DEFCON for life, potentially a value of thousands of dollars.