| Time | Track 1 | Track 2 | Track 3 | Track 4 | Warstories Track | 
|---|---|---|---|---|---|
| 10:00 | Welcome to DEF CON (10:00-10:20)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Securing CCTV Cameras Against Blind Spots (10:00-10:20)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:05 | Welcome to DEF CON (10:00-10:20)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Securing CCTV Cameras Against Blind Spots (10:00-10:20)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:10 | Welcome to DEF CON (10:00-10:20)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Securing CCTV Cameras Against Blind Spots (10:00-10:20)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:15 | Welcome to DEF CON (10:00-10:20)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Securing CCTV Cameras Against Blind Spots (10:00-10:20)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:20 | Welcome to DEF CON (10:00-10:20)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Securing CCTV Cameras Against Blind Spots (10:00-10:20)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:25 | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | ||
| 10:30 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:35 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:40 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:45 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Mobile Mesh RF Network Exploitation: Getting the Tea from goTenna (10:00-10:45)  | Where’s the Money: Defeating ATM Disk Encryption (10:00-10:45)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | Behind Enemy Lines: Going undercover to breach the LockBit Ransomware Operation (10:00-10:45)  | 
| 10:50 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | |||
| 10:55 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | |||
| 11:00 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | No Symbols When Reversing? No Problem: Bring Your Own (11:00-11:20)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:05 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | No Symbols When Reversing? No Problem: Bring Your Own (11:00-11:20)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:10 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | No Symbols When Reversing? No Problem: Bring Your Own (11:00-11:20)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:15 | Spies and Bytes: Victory in the Digital Age (10:30-11:15)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | No Symbols When Reversing? No Problem: Bring Your Own (11:00-11:20)  | Defeating magic by magic:Using ALPC security features to compromise RPC services (10:30-11:15)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:20 | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | No Symbols When Reversing? No Problem: Bring Your Own (11:00-11:20)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | ||
| 11:25 | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | |||
| 11:30 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:35 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:40 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:45 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Open sesame - or how vulnerable is your stuff in electronic lockers (11:00-11:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | The XZ Backdoor Story: The Undercover Operation That Set the Internet on Fire (11:00-11:45)  | 
| 11:50 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | ||
| 11:55 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | ||
| 12:00 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:05 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:10 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:15 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Listen to the whispers: web timing attacks that actually work (11:30-12:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:20 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | |
| 12:25 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | |
| 12:30 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:35 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:40 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:45 | Fireside Chat with DNSA Anne Neuberger (12:00-12:45)  | On Your Ocean's 11 Team, I'm the AI Guy (technically Girl) (12:00-12:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | High Intensity Deconstruction: Chronicles of a Cryptographic Heist (11:30-12:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 12:50 | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Veilid Dev and Community Meetup (12:00-13:15)  | |||
| 12:55 | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Veilid Dev and Community Meetup (12:00-13:15)  | |||
| 13:00 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 13:05 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 13:10 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 13:15 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access (12:30-13:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Veilid Dev and Community Meetup (12:00-13:15)  | 
| 13:20 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | ||
| 13:25 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | ||
| 13:30 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 13:35 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 13:40 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 13:45 | If Existing Cyber Vulnerabilities Magically Disappeared Overnight, What Would Be Next? (13:00-13:45)  | Sshamble: Unexpected Exposures in the Secure Shell (13:00-13:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Defeating EDR Evading Malware with Memory Forensics (13:00-13:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 13:50 | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | |||
| 13:55 | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | |||
| 14:00 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 14:05 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 14:10 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 14:15 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Digital Emblems: When markings are required under international law, but you don’t have a rattle-can handy (13:30-14:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Xiaomi The Money - Our Toronto Pwn2Own Exploit and Behind The Scenes Story (13:30-14:15)  | 
| 14:20 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | ||
| 14:25 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | ||
| 14:30 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | 
| 14:35 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | 
| 14:40 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | 
| 14:45 | DEF CON Unplugged: Cocktails & Cyber with Jeff & Jen (14:00-14:45)  | Optical Espionage: Using Lasers to Hear Keystrokes Through Glass Windows (14:00-14:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | The Way To Android Root: Exploiting Your GPU On Smartphone (14:00-14:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | 
| 14:50 | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |||
| 14:55 | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |||
| 15:00 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |
| 15:05 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |
| 15:10 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |
| 15:15 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Breaching AWS Accounts Through Shadow Resources (14:30-15:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Joe and Bruno's Guide to Hacking Time: Regenerating Passwords from RoboForm's Password Generator (14:30-15:15)  | |
| 15:20 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | |||
| 15:25 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | |||
| 15:30 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | |
| 15:35 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | |
| 15:40 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | |
| 15:45 | Abusing Windows Hello Without a Severed Hand (15:00-15:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Android App Usage and Cell Tower Location: Private. Sensitive. Available to Anyone? (15:00-15:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | |
| 15:50 | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Social Engineering Like you’re Picard (15:30-16:15)  | |||
| 15:55 | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Social Engineering Like you’re Picard (15:30-16:15)  | |||
| 16:00 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | 
| 16:05 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | 
| 16:10 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | 
| 16:15 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Taming the Beast: Inside the Llama 3 Red Team Process (15:30-16:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Social Engineering Like you’re Picard (15:30-16:15)  | 
| 16:20 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | ||
| 16:25 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | ||
| 16:30 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 16:35 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 16:40 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 16:45 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Eradicating Hepatitis C With BioTerrorism (16:00-16:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Outlook Unleashing RCE Chaos: CVE-2024-30103 & CVE-2024-38021 (16:00-16:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 16:50 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Why are you still, using my server for your internet access. (16:30-17:15)  | ||
| 16:55 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Why are you still, using my server for your internet access. (16:30-17:15)  | ||
| 17:00 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 17:05 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 17:10 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 17:15 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Leveraging private APNs for mobile network traffic analysis (16:30-17:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Why are you still, using my server for your internet access. (16:30-17:15)  | 
| 17:20 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | ||
| 17:25 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | ||
| 17:30 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Stranger in a Changed Land (17:30-17:50)  | 
| 17:35 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Stranger in a Changed Land (17:30-17:50)  | 
| 17:40 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Stranger in a Changed Land (17:30-17:50)  | 
| 17:45 | Bricked & Abandoned: How To Keep The IoT From Becoming An Internet of Trash (17:00-17:45)  | One for all and all for WHAD: wireless shenanigans made easy ! (17:00-17:45)  | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | Breaking Secure Web Gateways (SWG) for Fun and Profit (17:00-17:45)  | Stranger in a Changed Land (17:30-17:50)  | 
| 17:50 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | Stranger in a Changed Land (17:30-17:50)  | |||
| 17:55 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | ||||
| 18:00 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | ||||
| 18:05 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | ||||
| 18:10 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | ||||
| 18:15 | Exploiting Bluetooth - from your car to the bank account$$ (17:30-18:15)  | 
| Time | Track 1 | Track 2 | Track 3 | Track 4 | Warstories Track | 
|---|---|---|---|---|---|
| 10:00 | Laundering Money (10:00-10:20)  | Mutual authentication is optional (10:00-10:20)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:05 | Laundering Money (10:00-10:20)  | Mutual authentication is optional (10:00-10:20)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:10 | Laundering Money (10:00-10:20)  | Mutual authentication is optional (10:00-10:20)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:15 | Laundering Money (10:00-10:20)  | Mutual authentication is optional (10:00-10:20)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:20 | Laundering Money (10:00-10:20)  | Mutual authentication is optional (10:00-10:20)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:25 | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |||
| 10:30 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:35 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:40 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:45 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | Reverse Engineering MicroPython Frozen Modules: Data Structures, Reconstruction, and Reading Bytecode (10:00-10:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | |
| 10:50 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | ||
| 10:55 | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | ||
| 11:00 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:05 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:10 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:15 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | Gotta Cache ‘em all: bending the rules of web cache exploitation (10:30-11:15)  | Smishing Smackdown: Unraveling the Threads of USPS Smishing and Fighting Back (10:30-11:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:20 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | ||
| 11:25 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | ||
| 11:30 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:35 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:40 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:45 | The Rise and Fall of Binary Exploitation (11:00-11:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | SHIM me what you got - Manipulating Shim and Office for Code Injection (11:00-11:45)  | CULT OF THE DEAD COW & Friends Present: Prime Cuts from Hacker History - 40 Years of 31337 (10:00-11:45)  | 
| 11:50 | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | |||
| 11:55 | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | |||
| 12:00 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:05 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:10 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:15 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | QuickShell: Sharing is caring about an RCE attack chain on Quick Share (11:30-12:15)  | Sudos and Sudon’ts - Peering inside Sudo for Windows (11:30-12:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:20 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | ||
| 12:25 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | ||
| 12:30 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:35 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:40 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:45 | Disenshittify or die! How hackers can seize the 
means of computation and build a new, good internet that is hardened 
against our asshole bosses' insatiable horniness for enshittification. (12:00-12:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | Grand Theft Actions: Abusing Self-Hosted GitHub Runners at Scale (12:00-12:45)  | automobiles, alcohol, blood, sweat, and creative reversing of an obfuscated Car-Modding tool (12:00-12:45)  | 
| 12:50 | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | |||
| 12:55 | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | |||
| 13:00 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:05 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:10 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:15 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | The Secret Life of a Rogue Device - Lost IT Assets on the Public Marketplace (12:30-13:15)  | AMD Sinkclose: Universal Ring -2 Privilege Escalation (12:30-13:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:20 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | ||
| 13:25 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | ||
| 13:30 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:35 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:40 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:45 | Fireside Chat with Jay Healey and National Cyber Director Harry Coker, Jr. (13:00-13:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | OH-MY-DC: Abusing OIDC all the way to your cloud (13:00-13:45)  | Inside the FBI’s Secret Encrypted Phone Company ‘Anom’ (13:00-13:45)  | 
| 13:50 | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | |||
| 13:55 | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | |||
| 14:00 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:05 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:10 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:15 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | NTLM - The Last Ride (13:30-14:15)  | Behind Enemy Lines: Engaging and Disrupting Ransomware Web Panels (13:30-14:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:20 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | ||
| 14:25 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | ||
| 14:30 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:35 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:40 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:45 | SQL Injection Isn't Dead: Smuggling Queries at the Protocol Level (14:00-14:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Discovering and exploiting local attacks against the 1Password MacOS desktop application (14:00-14:45)  | Hacking Millions of Modems (and Investigating Who Hacked My Modem) (14:00-14:45)  | 
| 14:50 | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | |||
| 14:55 | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | |||
| 15:00 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:05 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:10 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:15 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Troll Trapping Through TAS Tools - Exposing Speedrunning Cheaters (14:30-15:15)  | ACE up the Sleeve: From getting JTAG on the iPhone 15 to hacking into Apple's new USB-C Controller (14:30-15:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:20 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | ||
| 15:25 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | ||
| 15:30 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:35 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:40 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:45 | Exploiting the Unexploitable: Insights from the Kibana Bug Bounty (15:00-15:45)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Measuring the Tor Network (15:00-15:45)  | A Shadow Librarian in Broad Daylight: Fighting back against ever encroaching capitalism (15:00-15:45)  | 
| 15:50 | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | |||
| 15:55 | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | |||
| 16:00 | Compromising an Electronic Logging Device and Creating a Truck2Truck Worm (16:00-16:20)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:05 | Compromising an Electronic Logging Device and Creating a Truck2Truck Worm (16:00-16:20)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:10 | Compromising an Electronic Logging Device and Creating a Truck2Truck Worm (16:00-16:20)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:15 | Compromising an Electronic Logging Device and Creating a Truck2Truck Worm (16:00-16:20)  | HookChain: A new perspective for Bypassing EDR Solutions (15:30-16:15)  | Unsaflok: Hacking millions of hotel locks (15:30-16:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:20 | Compromising an Electronic Logging Device and Creating a Truck2Truck Worm (16:00-16:20)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | ||
| 16:25 | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | |||
| 16:30 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:35 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:40 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:45 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Secrets and Shadows: Leveraging Big Data for Vulnerability Discovery at Scale (16:00-16:45)  | Encrypted newspaper ads in the 19th century - The world's first worldwide secure communication system (16:00-16:45)  | 
| 16:50 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | ||
| 16:55 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | ||
| 17:00 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming (17:00-17:20)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | 
| 17:05 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming (17:00-17:20)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | 
| 17:10 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming (17:00-17:20)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | 
| 17:15 | Watchers being watched: Exploiting the Surveillance System and its supply chain (16:30-17:15)  | DEF CON Academy: Cultivating M4D SK1LLZ In the DEF CON Community (16:30-17:15)  | Breaking the Beam: Exploiting VSAT Satellite Modems from the Earth's Surface (16:30-17:15)  | Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming (17:00-17:20)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | 
| 17:20 | Techniques for Creating Process Injection Attacks with Advanced Return-Oriented Programming (17:00-17:20)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | |||
| 17:25 | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | ||||
| 17:30 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | ||
| 17:35 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | ||
| 17:40 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | ||
| 17:45 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | A Treasure Trove of Failures: What History’s Greatest Heist Can Teach Us About Defense In Depth (17:00-17:45)  | ||
| 17:50 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | |||
| 17:55 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | |||
| 18:00 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | |||
| 18:05 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | |||
| 18:10 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | |||
| 18:15 | Iconv, set the charset to RCE: exploiting the glibc to hack the PHP engine (17:30-18:15)  | Nano-Enigma: Uncovering the Secrets Within eFuse Memories (17:30-18:15)  | 
| Time | Track 1 | Track 2 | Track 3 | Track 4 | Warstories Track | 
|---|---|---|---|---|---|
| 10:00 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Unlocking the Gates: Hacking a secure Industrial Remote Access Solution (10:00-10:20)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:05 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Unlocking the Gates: Hacking a secure Industrial Remote Access Solution (10:00-10:20)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:10 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Unlocking the Gates: Hacking a secure Industrial Remote Access Solution (10:00-10:20)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:15 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Unlocking the Gates: Hacking a secure Industrial Remote Access Solution (10:00-10:20)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:20 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Unlocking the Gates: Hacking a secure Industrial Remote Access Solution (10:00-10:20)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:25 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | |
| 10:30 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:35 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:40 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:45 | Splitting the email atom: exploiting parsers to bypass access controls (10:00-10:45)  | AWS CloudQuarry: Digging for secrets in public AMIs (10:00-10:45)  | Windows Downdate: Downgrade Attacks Using Windows Updates (10:00-10:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | The not-so-silent type: Breaking network crypto in almost every popular Chinese keyboard app (10:00-10:45)  | 
| 10:50 | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | ||||
| 10:55 | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | ||||
| 11:00 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:05 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:10 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:15 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Changing Global Threat Landscape with Rob Joyce and Dark Tangent (10:30-11:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:20 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | |
| 11:25 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | |
| 11:30 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:35 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:40 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:45 | (|(MaLDAPtive:¯\_(LDAP)_/¯=ObFUsc8t10n) (De-Obfuscation &:=De*te)(!c=tion)) (11:00-11:45)  | The hack, the crash and two smoking barrels. (And all the times I (almost) killed an engineer.) (11:00-11:45)  | Dragon SlayingGuide: Bug Hunting In VMware Device Virtualization (11:00-11:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Deception & Counter Deception – Defending Yourself in a World Full of Lies (11:00-11:45)  | 
| 11:50 | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | ||||
| 11:55 | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | ||||
| 12:00 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl (12:00-12:20)  | ||
| 12:05 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl (12:00-12:20)  | ||
| 12:10 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl (12:00-12:20)  | ||
| 12:15 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Modem Operandi, or: How I Owned Hundreds of Millions of Broadband Basebands (11:30-12:15)  | Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl (12:00-12:20)  | ||
| 12:20 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Solving the "Lover, Stalker, Killer" Murder with strings, grep, and Perl (12:00-12:20)  | |||
| 12:25 | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | ||||
| 12:30 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 12:35 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 12:40 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 12:45 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | DriverJack: Turning NTFS and Emulated Read-only Filesystems in an Infection and Persistence Vector (12:00-12:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 12:50 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | ||
| 12:55 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | ||
| 13:00 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 13:05 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 13:10 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 13:15 | AIxCC Closing Ceremonies (12:30-13:15) (Tracks 1-2)  | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Redefining V2G - How to use your vehicle as a game controller (12:30-13:15)  | Clash, Burn, and Exploit: Manipulate Filters to Pwn kernelCTF (12:30-13:15)  | |
| 13:20 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | ||||
| 13:25 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | ||||
| 13:30 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 13:35 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 13:40 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 13:45 | Your AI Assistant has a Big Mouth: A New Side-Channel Attack (13:00-13:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 13:50 | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | |||
| 13:55 | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | |||
| 14:00 | Abusing legacy railroad signaling systems (14:00-14:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 14:05 | Abusing legacy railroad signaling systems (14:00-14:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 14:10 | Abusing legacy railroad signaling systems (14:00-14:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 14:15 | Abusing legacy railroad signaling systems (14:00-14:45)  | Incubated Machine Learning Exploits: Backdooring ML Pipelines Using Input-Handling Bugs (13:30-14:15)  | Bringing Down North Korea (13:30-14:15)  | ||
| 14:20 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 14:25 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 14:30 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 14:35 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 14:40 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 14:45 | Abusing legacy railroad signaling systems (14:00-14:45)  | ||||
| 15:00 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:05 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:10 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:15 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:20 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:25 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:30 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:35 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:40 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:45 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:50 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 15:55 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:00 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:05 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:10 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:15 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:20 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:25 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:30 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:35 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:40 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:45 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:50 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 16:55 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:00 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:05 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:10 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:15 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:20 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:25 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:30 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:35 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:40 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  | ||||
| 17:45 | DEF CON Closing Ceremonies & Awards (15:00-17:45) (Tracks 1-2)  |