|
USA | Europe | Asia |
Europe 2005 |
Conference CDs containing speaker presentations and materials are available for purchase from our store.
Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently
online.
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | |
Keynote Presentation - Black Hat Japan 2005 | |||
Welcome by Jeff Moss, Founder & CEO, Black Hat and Katsuya Uchida, Associate Professor, Institute Information Security, and Associate Professor, Research and Development Initiative, Chuo University |
|||
Speakers - Black Hat Japan 2005 | |||
Dominique Brezinski |
|||
Kenneth Geers |
|||
Jeremiah Grossman |
|||
Chris Hurley (Roamer) |
code |
||
|
|||
|
code |
||
Satoru Koyama |
|||
David Maynor |
|||
Ejovi Nuwere |
|||
Saumil Shah & Dave Cole |
|||
Sherri Sparks & Jamie Butler |
|||
Michael Sutton & Adam Greene The Art of File Format Fuzzing |
|
||
Closing Remarks |
|||
Jeff Moss |
Track/Speaker/Topic | Presentation | Notes/Tools | |
Keynote Presentation - Black Hat USA 2005 | |||
Gilman Louie, President & Chief Executive Officer, In-Q-Tel |
|
||
Application Security - Black Hat USA 2005 | |||
Esteban Martínez Fayó |
|
||
Jeremiah Grossman |
|
||
Alexander Kornbrust |
|
||
Ben Laurie CaPerl: Running Hostile Code Safely |
|||
David Maynor NX: How Well Does It Say NO to Attacker’s eXecution Attempts? |
|
||
Ejovi Nuwere & Mikko Varpiola The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
|||
Sherri Sparks & Jamie Butler “Shadow Walker”: Raising The Bar For Rootkit Detection |
|||
Alex Stamos & Scott Stender Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps |
|||
Michael Sutton & Adam Greene The Art of File Format Fuzzing |
|
||
Alex Wheeler & Neel Mehta Owning Anti-Virus: Weaknesses in a Critical Security Component |
|||
Andrew van der Stock World Exclusive Announcing the OWASP Guide To Securing Web Applications and Services 2.0 |
|||
Computer Forensics & Log Analysis |
|||
Jim Christy The Defense Cyber Crime Center |
|
||
Greg Conti Beyond Ethereal: Crafting A Tivo for Security Datastreams |
|||
James C. Foster & Vincent T. Liu Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch… |
|||
Grugq The Art of Defiling: Defeating Forensic Analysis |
|||
Allen Harper and Edward Balas GEN III Honeynets: The birth of roo |
|
||
Kevin Mandia Performing Effective Incident Response |
|
||
Deep Knowledge |
|||
Himanshu Dwivedi iSCSI Security (Insecure SCSI) |
|
||
Dan Kaminsky Black Ops 2005 |
|||
David Litchfield All new Ø Day |
|||
Mudge Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security |
|||
Sensepost |
|||
Layer 0 | |||
Darrin Barrall & David Dewey |
|
||
Joe Grand |
|
||
Joseph Klein |
|
||
|
|||
Robert Morris |
|
||
Policy, Management, and the Law |
|||
Scott Blake, Pamela Fusco, Andre Gold, Ken Pfeil, Justin Somaini |
|||
Robert W. Clark Legal Aspects of Computer Network Defense |
|||
Bryan Cunningham & C. Forrest Morgan |
|||
|
|||
Jennifer Stisa Granick |
|||
Privacy & Anonymity |
|||
PANEL: Joseph Ansanelli, Richard Baich, Adam Shostack, Paul Proctor |
|||
Ian Clarke & Oskar Sandberg |
|||
Johnny Long Google Hacking for Penetration Testers |
|||
PANEL: David Mortman, Dennis Bailey, Jim Harper, Rhonda MacLean |
|
||
|
|
||
Philip R. Zimmermann |
|||
Turbo Talks | |||
|
|||
Darrin Barrall |
|||
Renaud Bidou A Dirty BlackMail DoS Story |
|||
James C. Foster BlackHat Standup: “Yea I’m a Hacker…” |
|||
Kevin Cardwell |
|||
Cesar Cerrudo |
|||
Tyler Close |
|||
Yuan Fan |
|||
Ken Hines |
|||
MadHat Unspecific & Simple Nomad |
|||
Shawn Moyer |
|||
|
|||
Paul Simmonds |
|||
Zero Day Attack |
|||
Adam Boileau |
|
||
|
|||
Michael Lynn |
|||
Derek Soeder & Ryan Permeh |
|||
spoonm & skape |
|||
Zero Day Defense |
|||
Ofir Arkin A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control |
|||
|
|||
Tzi-cker Chiueh |
|
||
Robert J. Hansen & Meredith L. Patterson |
|||
Eugene Tsyrklevich |
|||
Paul Vixie |
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools |
Keynote Presentation - Black Hat Europe 2005 | ||
|
||
Speakers - Black Hat Europe 2005 | ||
David Barroso Berrueta & Alfredo Andres Yersinia, A Framework For Layer 2 Attacks |
||
Jon Callas Hacking PGP |
||
Cesar Cerrudo Hacking Windows Internals |
||
Job de Haas Symbian Security |
||
Steve Dugan A New Password Capture on Cisco System Devices |
||
Arian Evans Building Zero-Day Self-Defending Web Applications: Enforcing Authoritative Action to Stop Session Attacks |
||
Chris Farrow Injecting Trojans via Patch Management Software & Other Evil Deeds |
||
Nicolas Fischbach Network Flows and Security |
||
Halvar Flake & Rolf Rolles Compare, Port, Navigate |
||
Kenneth Geers Hacking in a Foreign Language: A Network Security Guide to Russia |
||
Joe Grand |
||
the Grugq |
||
Dan Kaminsky Attacking Distributed Systems: The DNS Case Study |
||
Christian Klein & Ilja van Sprundel Mac OS X Kernel Insecurity |
||
Alexander Kornbrust Database Rootkits |
||
Adam Laurie, Martin Herfurt & Marcel Holtmann Bluetooth Hacking - Full Disclosure |
||
David Litchfield |
||
Johnny Long |
|
|
Laurent Oudot |
||
Sensepost Revolutions in Web Server/Application Assessments |
||
Saumil Shah |
||
|
|
|
Alex Wheeler & Neel Mehta Owning Anti-Virus: Weaknesses in a Critical Security Component |
|
|
|
|