|
This archive of computer security presentations is provided free of charge as a service to the world wide computer security community. Speaker presentations and materials are put on-line generally two weeks after the event. Audio and video are generally available 6-9 months after the conference. If a speaker is listed on the conference page, but their speech is not present here it generally means there is no available audio, video or materials. If you have questions or have found a broken link, please send a message to |
|
[Updated August 2005] All content is streamed using a Real Networks Real Server in TCP RTSP mode (port 554) as well as in HTTP mode (port 80 and 8080). All older content is being re-encoded slowly to Real 10 format, so you will need at least a Real Player version 9 or later to view it. The updated content is done in a higher resolution, and generally is superior to the older formats. If you have problems viewing the media files, please contact us so we can look into it. |
|
Some presentations require Acrobat Reader. Please use at least Acrobat 5.0 in order to view these files. |
|
If you want to purchase complete video or audio of a conference, or just a specific speaker please visit The Sound of Knowledge website. They have professionally recorded video and audio available for purchase. |
|
Black Hat Media Server hosted by: Complex Drive - Reliable, Secure, and Responsive Business Internet |
Conference CDs containing speaker presentations and materials are available for purchase from our store.
Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently
online.
USA | Europe | Asia | Windows Security | DC/Federal |
USA 2007 | Europe 2007 | Asia 2007 | DC 2007 | |
USA 2006 | Europe 2006 | Asia 2006 | Federal 2006 | |
USA 2005 | Europe 2005 | Asia 2005 | ||
Europe 2004 |
|
|||
Europe 2003 | ||||
|
||||
Have a look at some of our past advertising and promotional campaigns: |
||
Ads: Europe 2007 DC 2007 Europe 2006 Federal 2006 |
Ads: USA 2003 Europe 2003 Windows Security 2003 USA 2002 Windows Security 2002 Europe 2003 |
Preview Programs: Europe 2007 DC 2007 Windows Security 2002 USA 2004 |
Track/Speaker/Topic | Presentation (PDFs) | White Paper/ Notes/Tools |
||||
Keynote Presentation - Black Hat Europe 2007 | ||||||
Welcome by Jeff Moss, Founder & CEO, Black Hat Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure) |
|
|||||
Speakers - Black Hat Europe 2007 | ||||||
Nish Bhalla |
||||||
Sun Bing |
||||||
Damiano Bolzoni |
|
|||||
|
||||||
Augusto Paes de Barros, André Fucs & Victor Pereira |
||||||
|
|
|||||
Joel Eriksson |
||||||
|
|
|||||
Kostya Kortchinsky |
||||||
Nitin Kumar & Vipin Kumar |
||||||
|
||||||
Adam Laurie |
||||||
|
||||||
David Litchfield |
||||||
Bruno Luiz |
|
|||||
Lluis Mora |
||||||
Mariano Nuñez Di Croce Attacking the Giants: Exploiting SAP Internals |
|
|||||
Billy K Rios & Raghav Dube |
||||||
Dror-John Roecher & Michael Thumann NACATTACK |
|
|||||
|
|
|||||
Ollie Whitehouse |
||||||
Jonathan Wilkins |
|
|||||
Stefano Zanero |
||||||
Track/Speaker/Topic | Presentation (PDFs) | White Paper/ Notes/Tools |
|||||||||
Keynote Presentation - Black Hat DC 2007 | |||||||||||
Welcome by Jeff Moss, Founder & CEO, Black Hat Special Agent (Ret) Jim Christy, Director, Futures Exploration, Department of Defense Cyber Crime Center |
|
||||||||||
Speakers - Black Hat DC 2007 | |||||||||||
|
|||||||||||
Sean Barnum |
|||||||||||
James D. Broesch |
|||||||||||
Cesar Cerrudo |
|
||||||||||
John Heasman |
|||||||||||
Kris Kendall & Chad McMillan |
|||||||||||
|
|
||||||||||
Kevin Mandia |
|||||||||||
Robert A. Martin, Steve Christey & Sean Barnum |
|||||||||||
David Maynor |
|||||||||||
|
|
||||||||||
Jose Nazario |
|||||||||||
|
|||||||||||
Paul Vincent Sabanal & Mark Vincent Yason |
|||||||||||
Amichai Shulman |
|||||||||||
|
|||||||||||
Andrew Walenstein |
|||||||||||
|
|||||||||||
Ollie Whitehouse |
|||||||||||
Chuck Willis & Rohyt Belani |
|||||||||||
Stefano Zanero |
|||||||||||
Audio & video files are not available for this conference. |
|
Track/Speaker/Topic | Presentation (PDFs) |
Keynote Presentation - Black Hat Japan 2006 | |
Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency |
|
Speakers - Black Hat Japan 2006 | |
|
|
Paul Böhm |
|
Kenneth Geers & Alexander Eisen |
|
Jeremiah Grossman |
|
Yuji Hoshizawa |
|
|
|
Dan Moniz |
|
Joanna Rutkowska |
|
Alex Stamos & Zane Lackey |
|
Scott Stender |
|
Takayuki Sugiura |
|
Georg Wicherski & Thorsten Holz |
|
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | ||
Keynote Presentation: Black Hat USA 2006 | ||||
Dan Larkin, Unit Chief, Internet Crime Complaint Center, Federal Bureau of Investigation |
||||
Speakers: Black Hat USA 2006 | ||||
Noel Anderson & Taroon Mandhana |
||||
Ofir Arkin |
||||
Robert Auger & Caleb Sima |
||||
Tod Beardsley |
||||
Corey Benninger |
> | |||
Renaud Bidou |
||||
Daniel Bilar |
||||
Paul Böhm |
||||
Mariusz Burdach |
||||
Jesse Burns |
||||
Jamie Butler, Nick Petroni & William Arbaugh |
||||
johnny cache & David Maynor |
||||
Brian Caswell & HD Moore |
||||
Andrew Cushman |
< | |||
Himanshu Dwivedi |
||||
Charles Edge |
||||
Dino Dai Zovi |
||||
Shawn Embleton, Sherri Sparks & Ryan Cunningham |
||||
David Endler & Mark Collier |
||||
Chris Eng |
||||
FX |
||||
Yuan Fan & Xiao Rong |
||||
Pete Finnigan |
||||
Nicolas Fischbach |
||||
Halvar Flake |
||||
Rob Franco |
||||
Stefan Frei & Dr. Martin May |
||||
Tom Gallagher |
||||
Abolade Gbadegesin |
||||
Jeremiah Grossman & TC Niedzialkowski |
||||
Lukas Grunwald |
||||
Zvi Gutterman |
||||
Billy Hoffman |
||||
Billy Hoffman |
||||
Greg Hoglund |
||||
David Hulton & Dan Moniz |
||||
Dan Kaminsky |
||||
William Kimball |
||||
Alexander Kornbrust |
||||
Dr. Neal Krawetz |
||||
John Lambert |
||||
Johnny Long |
||||
Johnny Long |
||||
Kevin Mandia |
||||
Adrian Marinescu |
||||
Claudio Merloni & Luca Carettoni |
||||
Doug Mohney |
||||
Dan Moniz & HD Moore |
||||
HD Moore |
||||
Marco Morana |
||||
Maik Morgenstern & Tom Brosch |
||||
Shawn Moyer |
||||
Bala Neerumalla |
||||
Brendan O'Connor |
||||
Bruce Potter |
||||
Bruce Potter |
||||
Tom Ptacek & Dave Goldsmith |
||||
Jeremy Rauch |
||||
Melanie Rieback |
||||
Joanna Rutkowska |
||||
Hendrik Scholz |
||||
SensePost |
||||
Saumil Shah |
||||
Jay Schulman |
||||
Peter Silberman & Jamie Butler |
||||
Paul Simmonds, Henry Teng, Bob West & Justin Somaini |
||||
Alexander Sotirov |
||||
Kimber Spradlin & Dale Brocklehurst |
||||
Jonathan Squire |
||||
Alex Stamos & Zane Lackey |
||||
Scott Stender |
||||
Michael Sutton & Greg MacManus |
||||
Alexander Tereshkin |
||||
Philip Trainor |
||||
Franck Veysset & Laurent Butti |
||||
Jeff Waldron |
||||
Chuck Willis & Rohyt Belani |
||||
Emmanuelle Zambon & Damiano Bolzoni |
||||
Stefano Zanero |
||||
Panels - Black Hat USA 2006 |
||||
Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats |
||||
Disclosure (Public) |
||||
Hacker Court |
||||
Meet the Feds: OODA Loop and the Science of Security |
||||
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | ||
Keynote Presentation - Black Hat Europe 2006 | ||||
Welcome by Jeff Moss, Founder & CEO, Black Hat and Eric Litt, Chief Information Security Officer, General Motors |
|
|||
Speakers - Black Hat Europe 2006 | ||||
|
||||
Shalom Carmel |
||||
|
||||
Tzi-cker Chiueh |
||||
Gregory Conti |
||||
Bryan Cunningham & Amanda Hubbard Separated By A Common GoalEmerging EU and US Information Security and Privacy Law: Allies or Adversaries? |
||||
Arian J. Evans, Daniel Thompson & Mark Belles Project Paraegis Round 2: Using Razorwire HTTP proxy to strengthen webapp session handling and reduce attack surface |
||||
FX Analysing Complex Systems: The BlackBerry Case |
||||
Halvar Flake |
||||
John Heasman |
||||
Barnaby Jack |
|
|||
|
||||
Adam Laurie, Martin Herfurt, & Marcel Holtmann |
||||
Johnny Long |
||||
Johnny Long |
||||
Steve Manzuik and Andre Protas |
||||
|
||||
Gunter Ollmann |
||||
Enno Rey MPLS and VPLS Security |
||||
Joanna Rutkowska |
|
|||
Peter Silberman & Jamie Butler RAIDE: Rootkit Analysis Identification Elimination |
||||
spoonm & skape |
||||
|
||||
Stefano Zanero |
||||
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | ||
Keynote Presentation - Black Hat Federal 2006 | ||||
Welcome by Jeff Moss, Founder & CEO, Black Hat and Dr. Linton Wells II, Principal Deputy Assistant Secretary of Defense (Networks and Information Integration) |
|
|||
Speakers - Black Hat Federal 2006 | ||||
David Aitel |
||||
|
||||
|
||||
Tzi-cker Chiueh |
||||
Drew Copley |
||||
Halvar Flake |
||||
Simson L. Garfinkel |
||||
John Heasman |
||||
|
||||
Dan Kaminsky |
||||
Arun Lakhotia |
||||
David Litchfield |
||||
Kevin Mandia |
||||
|
||||
Jarno Niemelä |
||||
|
||||
|
|
|||
|
||||
spoonm & skape |
||||
Paul Syverson & Lasse Øverlier |
||||
|
||||
Stefano Zanero |
||||
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | |
Keynote Presentation - Black Hat Japan 2005 | |||
Welcome by Jeff Moss, Founder & CEO, Black Hat and Katsuya Uchida, Associate Professor, Institute Information Security, and Associate Professor, Research and Development Initiative, Chuo University |
|||
Speakers - Black Hat Japan 2005 | |||
Dominique Brezinski |
|||
Kenneth Geers |
|||
Jeremiah Grossman |
|||
Chris Hurley (Roamer) |
code |
||
|
|||
|
code |
||
Satoru Koyama |
|||
David Maynor |
|||
Ejovi Nuwere |
|||
Saumil Shah & Dave Cole |
|||
Sherri Sparks & Jamie Butler |
|||
Michael Sutton & Adam Greene The Art of File Format Fuzzing |
|
||
Closing Remarks |
|||
Jeff Moss |
|||
Track/Speaker/Topic | Presentation | Notes/Tools | |
Keynote Presentation - Black Hat USA 2005 | |||
Gilman Louie, President & Chief Executive Officer, In-Q-Tel |
|
||
Application Security - Black Hat USA 2005 | |||
Esteban Martínez Fayó |
|
||
Jeremiah Grossman |
|
||
Alexander Kornbrust |
|
||
Ben Laurie CaPerl: Running Hostile Code Safely |
|||
David Maynor NX: How Well Does It Say NO to Attacker’s eXecution Attempts? |
|
||
Ejovi Nuwere & Mikko Varpiola The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
|||
Sherri Sparks & Jamie Butler “Shadow Walker”: Raising The Bar For Rootkit Detection |
|||
Alex Stamos & Scott Stender Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps |
|||
Michael Sutton & Adam Greene The Art of File Format Fuzzing |
|
||
Alex Wheeler & Neel Mehta Owning Anti-Virus: Weaknesses in a Critical Security Component |
|||
Andrew van der Stock World Exclusive Announcing the OWASP Guide To Securing Web Applications and Services 2.0 |
|||
Computer Forensics & Log Analysis |
|||
Jim Christy The Defense Cyber Crime Center |
|
||
Greg Conti Beyond Ethereal: Crafting A Tivo for Security Datastreams |
|||
James C. Foster & Vincent T. Liu Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch… |
|||
Grugq The Art of Defiling: Defeating Forensic Analysis |
|||
Allen Harper and Edward Balas GEN III Honeynets: The birth of roo |
|
||
Kevin Mandia Performing Effective Incident Response |
|
||
Deep Knowledge |
|||
Himanshu Dwivedi iSCSI Security (Insecure SCSI) |
|
||
Dan Kaminsky Black Ops 2005 |
|||
David Litchfield All new Ø Day |
|||
Mudge Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security |
|||
Sensepost |
|||
Layer 0 | |||
Darrin Barrall & David Dewey |
|
||
Joe Grand |
|
||
Joseph Klein |
|
||
|
|||
Robert Morris |
|
||
Policy, Management, and the Law |
|||
Scott Blake, Pamela Fusco, Andre Gold, Ken Pfeil, Justin Somaini |
|||
Robert W. Clark Legal Aspects of Computer Network Defense |
|||
Bryan Cunningham & C. Forrest Morgan |
|||
|
|||
Jennifer Stisa Granick |
|||
Privacy & Anonymity |
|||
PANEL: Joseph Ansanelli, Richard Baich, Adam Shostack, Paul Proctor |
|||
Ian Clarke & Oskar Sandberg |
|||
Johnny Long Google Hacking for Penetration Testers |
|||
PANEL: David Mortman, Dennis Bailey, Jim Harper, Rhonda MacLean |
|
||
|
|
||
Philip R. Zimmermann |
|||
Turbo Talks | |||
|
|||
Darrin Barrall |
|||
Renaud Bidou A Dirty BlackMail DoS Story |
|||
James C. Foster BlackHat Standup: “Yea I’m a Hacker…” |
|||
Kevin Cardwell |
|||
Cesar Cerrudo |
|||
Tyler Close |
|||
Yuan Fan |
|||
Ken Hines |
|||
MadHat Unspecific & Simple Nomad |
|||
Shawn Moyer |
|||
|
|||
Paul Simmonds |
|||
Zero Day Attack |
|||
Adam Boileau |
|
||
|
|||
Michael Lynn |
|||
Derek Soeder & Ryan Permeh |
|||
spoonm & skape |
|||
Zero Day Defense |
|||
Ofir Arkin A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control |
|||
|
|||
Tzi-cker Chiueh |
|
||
Robert J. Hansen & Meredith L. Patterson |
|||
Eugene Tsyrklevich |
|||
Paul Vixie |
|||
Track/Speaker/Topic | Presentation (PDFs) | Notes/Tools | |
Keynote Presentation - Black Hat Europe 2005 | |||
|
|||
Speakers - Black Hat Europe 2005 | |||
David Barroso Berrueta & Alfredo Andres Yersinia, A Framework For Layer 2 Attacks |
|||
Jon Callas Hacking PGP |
|||
Cesar Cerrudo Hacking Windows Internals |
|||
Job de Haas Symbian Security |
|||
Steve Dugan A New Password Capture on Cisco System Devices |
|||
Arian Evans Building Zero-Day Self-Defending Web Applications: Enforcing Authoritative Action to Stop Session Attacks |
|||
Chris Farrow Injecting Trojans via Patch Management Software & Other Evil Deeds |
|||
Nicolas Fischbach Network Flows and Security |
|||
Halvar Flake & Rolf Rolles Compare, Port, Navigate |
|||
Kenneth Geers Hacking in a Foreign Language: A Network Security Guide to Russia |
|||
Joe Grand |
|||
the Grugq |
|||
Dan Kaminsky Attacking Distributed Systems: The DNS Case Study |
|||
Christian Klein & Ilja van Sprundel Mac OS X Kernel Insecurity |
|||
Alexander Kornbrust Database Rootkits |
|||
Adam Laurie, Martin Herfurt & Marcel Holtmann Bluetooth Hacking - Full Disclosure |
|||
David Litchfield |
|||
Johnny Long |
|
||
Laurent Oudot |
|||
Sensepost Revolutions in Web Server/Application Assessments |
|||
Saumil Shah |
|||
|
|
||
Alex Wheeler & Neel Mehta Owning Anti-Virus: Weaknesses in a Critical Security Component |
|
||
|
|||
Track/Speaker/Topic | Presentation (PPTs) | Presentation (PDFs) | Notes/Tools | ||
Keynote Presentation - Black Hat Japan 2004 | |||||
|
|||||
Speakers - Black Hat Japan 2004 | |||||
Shunichi Arai |
|
||||
Chris Eagle |
|||||
Riley "Caezar"
Eller |
|||||
Gerhard
Eschelbeck |
|||||
Joe Grand |
|||||
David
Litchfield |
|
||||
Johnny Long |
|||||
Hisamichi Okamura |
|
||||
Russ Rogers |
|||||
|
|||||
Yuji Ukai |
|
||||
Charl van
der Walt-Sensepost |
|||||
Black Hat USA 2004
Audio & video files are available from the Sound of Knowledge this conference |
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentation - Black Hat USA 2004 | ||||
Paul Simmonds, Global Information Security Director (CISO), Jericho Forum/ICI Plc. |
||||
Application Security - Black Hat USA 2004 | ||||
Nitesh Dhanjani & Justin Clarke |
|
|||
Rakan El-Khalil |
|
|||
Sarah Gordon |
||||
Cameron Hotchkies |
||||
Dan Kaminsky |
||||
Brett Moore |
|
|||
Michael Shema |
||||
Ralf Spenneberg |
||||
Panel |
||||
Panel |
||||
Computer Forensics & Log Analysis |
||||
Peter Feaver & Kenneth Geers |
||||
Curtis Kret |
||||
Kevin Mandia |
||||
Rebecca Mercuri, Ph.D & Bev Harris |
|
|||
K.K. Mookhey |
||||
Michael Raggo |
||||
Deep Knowledge |
||||
Tzi-cker Chiueh |
||||
Chris Eagle |
||||
FX |
||||
Halvar Flake |
||||
David Maynor |
||||
Layer 0 | ||||
Joe Grand Introduction to Embedded Security |
||||
Joe Grand A Historical Look at Hardware Token Compromises |
||||
Lukas Grunwald RF-ID and Smart-Labes: Myth, Technology and Attacks |
||||
spoonm & HD Moore Metasploit |
||||
Paul Wouters Windows WaveSEC Deployment |
||||
Policy, Management, and the Law |
||||
Brad Bolin |
||||
Gerhard Eschelbeck |
||||
Jennifer Granick |
||||
Panel |
||||
Panel |
||||
Privacy & Anonymity |
||||
Dr. Alessandro Acquisti |
||||
Roger Dingledine |
||||
Adam Laurie & Martin Herfurt |
||||
Johnny Long |
||||
Bruce Potter & Brian Wotring |
||||
Len Sassaman |
||||
Turbo Talks | ||||
Patrick Chambet |
||||
Patrick Chambet |
||||
Himanshu Dwivedi |
||||
James C. Foster |
||||
Sarah Gordon |
||||
Chris Hurley |
||||
Gregory S. Miles & Travis Schack |
||||
Robert Morris |
||||
Laurent Oudot |
||||
Andrew Stevens |
||||
Richard Thieme | ||||
Jeff Waldron |
||||
David Worth |
||||
Zero Day Attack |
||||
Thorsten Holz & Maximillian Dornseif |
|
|||
David Litchfield |
||||
Saumil Udayan Shah |
||||
Derek Soeder, Ryan Parmeh, Yuji Ukai |
||||
Eugene Tsyrklevich |
||||
Zero Day Defense |
||||
Phillip Hallam-Baker |
||||
Dominique Brezinski |
||||
Jamie Butler & Greg Hoglund |
||||
Sensepost |
||||
Peter Silberman & Richard Johnson |
|
|||
Stefano Zanero |
||||
Black Hat Europe 2004
Audio and video files are not available for this conference. |
||||||||||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||||||||||
Keynote Presentations - Black Hat Europe 2004 | ||||||||||||
Paul Simmonds, Global Information Security Director (CISO), Jericho Forum/ICI Plc. |
||||||||||||
Speakers - Black Hat Europe 2004 | ||||||||||||
Jamie Butler |
||||||||||||
Patrick Chambet & Eric Larcher |
||||||||||||
Job de Haas |
||||||||||||
Luc Delpha & Maliha Rashid |
||||||||||||
Eric Detoisien & Eyai Dotan |
||||||||||||
Eli O |
||||||||||||
Gergely Erdelyi |
||||||||||||
FX |
|
|||||||||||
Nicolas Fischbach |
||||||||||||
Joe Grand |
||||||||||||
Joe Grand |
||||||||||||
the grugq |
||||||||||||
Seth Hardy |
|
|||||||||||
Larry Korba |
||||||||||||
David Litchfield |
|
|||||||||||
Russ Rogers |
||||||||||||
SensePost |
||||||||||||
Saumil Udayan Shah |
|
|||||||||||
Eugene Tsyrklevich |
||||||||||||
Paul Wouters |
|
|||||||||||
Stefano Zanero |
||||||||||||
Black Hat Windows Security 2004
Audio and video files are not available for this conference. |
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentations - Black Hat Windows 2004 | ||||
Dan Geer Jr., Sc.D, Principal, Geer Risk Services, LLC & VP/Chief Scientist, Verdasys, Inc. |
|
|||
Richard Thieme, Thiemeworks.com Broken Windows: What Security Looks Like When Gollum Gets the Ring |
||||
Application Security - Black Hat Windows 2004 | ||||
Jamie Butler |
||||
Jeremiah Grossman |
||||
Matt Hargett |
||||
Drew Miller |
||||
Gunnar Peterson |
||||
Deep Knowledge - Black Hat Windows 2004 | ||||
Cesar Cerrudo |
||||
Halvar Flake |
||||
Curtis Kret |
||||
Saumil Shah |
||||
MS Specific Attack - Black Hat Windows 2004 | ||||
David Aitel |
||||
Harlan Carvey |
||||
David Litchfield |
||||
Sergey Polak |
||||
Hidenobu Seki |
||||
MS Specific Defend - Black Hat Windows 2004 | ||||
David Blight |
||||
Mark Burnett & James Foster |
||||
Bryan Glancey |
||||
Derek Milroy |
||||
Steve Riley |
||||
Policy & Law - Black Hat Windows 2004 | ||||
Chris Conacher |
||||
Jennifer Stisa Granick |
||||
Curtis Karnow |
||||
Russ Rogers |
||||
Adam Shostack |
||||
Routing & Infrastructure - Black Hat Windows 2004 | ||||
Stephen Dugan |
||||
FX |
||||
Jim Harrison & Jim Edwards |
||||
Steve Hofmeyr |
||||
Laura Robinson |
||||
Black Hat Asia 2003
Audio and video files are not available for this conference. |
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentations - Black Hat Asia 2003 | ||||
Lim Khee Ming, Deputy General Manager (Technology & Operations), Network for Electronic Transfers (S) Pte Ltd (NETS) |
||||
Harry SK Tan, Director, Centre for Asia Pacific Technology Law & Policy (CAPTEL) Cyber-crime |
||||
Speakers & Topics - Black Hat Asia 2003 | ||||
David Aitel MOSDEF Tool Release |
||||
S.K. Chong Win32 One-Way Shellcode |
||||
Shaun Clowes A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor |
||||
Stephen Dugan Cisco Security |
||||
Halvar Flake |
||||
Jennifer Stisa Granick |
||||
the grugq The Art of Defiling: Defeating Forensic Analysis on Unix File Systems |
||||
David Litchfield |
||||
Tim Mullen Brute Forcing Terminal Server Logons with TSGrinder |
||||
Laurent Oudot Honeypots Against Worms 101 |
||||
Jeremy Rauch (In)Security in Network Management |
||||
Russ Rogers Addressing Complete Security to Save Money |
||||
SensePost |
||||
Saumil Shah |
||||
Black Hat Federal 2003
Audio and video files are not available for this conference. |
||||
Track/Speaker/Topic |
Presentation |
Notes/Tools |
||
Keynote Presentations - Black Hat Federal 2003 | ||||
David G. Major, |
|
|||
Keith Rhodes, Chief Technologist, GAO |
||||
Application Security - Black Hat Federal 2003 | ||||
Halvar Flake |
||||
Jeremiah Grossman |
||||
Greg Hoglund |
||||
Drew Miller |
||||
Gunnar Peterson |
||||
Attack! - Black Hat Federal 2003 | ||||
David Aitel |
||||
Ofir Arkin |
||||
Dan Kaminsky |
||||
David Litchfield |
||||
SensePost |
||||
Defend! - Black Hat Federal 2003 | ||||
Beetle & Bruce Potter |
||||
Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch |
||||
Chris Eagle |
||||
Larry Leibrock |
||||
Saumil Shah |
||||
IDS, IPS and Honeynets - Black Hat Federal 2003 | ||||
Jay Beale |
||||
The Honeynet Project |
||||
Panel-Tom Parker |
||||
Marty Roesch |
||||
Lance Spitzner |
||||
Policy, Procedure & Law - Black Hat Federal 2003 | ||||
Jaya Baloo |
||||
Chris Hurley |
||||
Rick Smith |
||||
Panel |
||||
Routing & Infrastructure - Black Hat Federal 2003 | ||||
Dan Avida |
||||
FX |
||||
Mark Gross |
||||
Jeremy Rauch |
||||
Michael H. Warfield |
||||
Black Hat USA 2003 |
||||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||||
Keynote Presentations - Black Hat USA 2003 |
||||||
Philip R. Zimmermann, Creator, Pretty Good Privacy |
|
|||||
Bruce Schneier, Founder & Chief Technical Officer, Counterpane Internet Security |
||||||
Luncheon Presentations - Black Hat USA 2003 |
||||||
Dario Forte, CFE, CISM, Security Advisor, European Electronic Crimes Task Force (EECTF) International Hacking: When The Cooperation is The Only Cure |
|
|||||
Marcus Sachs, P.E., Cyber Program Director, Information Analysis and Infrastructure Protection, US Department of Homeland Security Building a Global Culture of Security |
|
|||||
Application Security - Black Hat USA 2003 |
||||||
Jay Beale |
||||||
Frederic Bret-Mounet |
||||||
Greg Hoglund |
||||||
David Litchfield |
||||||
Aldora Louw |
||||||
Neel Mehta |
||||||
Drew Miller |
||||||
Timothy Mullen & Ryan Russell |
||||||
Chris Paget |
||||||
Kevin Spett |
||||||
Core Services - Black Hat USA 2003 |
||||||
Silvio Cesare |
||||||
Josh Daymont |
||||||
Himanshu Dwivedi |
||||||
FX |
||||||
SensePost |
||||||
Firewalls, Access Control, Physical Security - Black Hat USA 2003 |
||||||
Michael D. Glasser |
||||||
Bruce Potter |
||||||
Jeffrey Prusan |
||||||
Rick Smith |
||||||
Lee Sutterfield |
||||||
Incident Response & Computer Forensics - Black Hat USA 2003 |
||||||
Thomas Akin |
||||||
The Honeynet Project |
||||||
Larry Leibrock |
||||||
Lance Spitzner |
||||||
Chuck Willis |
||||||
Intrusion Detection, Log Analysis - Black Hat USA 2003 |
||||||
Ofir Arkin |
||||||
David Maynor |
||||||
Patrick Miller SPIDeR |
||||||
Jan K. Rutkowski |
|
|||||
Saumil Shah |
|
|||||
Panels - Black Hat USA 2003 |
||||||
Panel Adversary Characterization and Scoring Systems |
||||||
Panel Hacker Court |
||||||
Gerhard Eschelbeck The Law of Vulnerabilities |
||||||
Panel A Proposed Process for Handling Vulnerability Information |
||||||
Policy, Law & Society - Black Hat USA 2003 |
||||||
Jaya Baloo |
||||||
Eric Goldman |
||||||
Curtis E.A. Karnow |
||||||
Andrea M. Matwyshyn |
||||||
Gerardo Richarte |
||||||
Privacy & Anonymity - Black Hat USA 2003 |
||||||
Jennifer Stisa Granick |
||||||
Len Sassaman & Roger Dingledine |
||||||
Len Sassaman & Roger Dingledine |
||||||
Adam Shostack |
||||||
Simple Nomad |
||||||
Routing & Infrastructure - Black Hat USA 2003 |
||||||
|
|
|||||
Dan Kaminsky |
||||||
Marco Valleri & Alberto Ornaghi |
||||||
Brandon Wiley |
||||||
Paul Wouters |
||||||
Black Hat Europe 2003
|
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentation - Black Hat Europe 2003 | ||||
Richard Thieme |
||||
Speakers & Topics - Black Hat Europe 2003 | ||||
David Aitel |
||||
Jaya Baloo |
||||
BBP |
||||
Shaun Clowes |
||||
Bram Cohen |
||||
Job de Haas |
||||
Stephen Dugan |
||||
Nicolas Fischbach |
||||
Halvar Flake |
||||
FX |
||||
Greg Hoglund |
||||
The Honeynet Project |
||||
Larry Leibrock |
||||
David Litchfield |
||||
Andrey Malyshev & Serg Vasilenkov |
||||
Len Sassaman |
||||
Marc Schoenfeld |
||||
Sensepost |
||||
Adam Shostack |
||||
Lance Spitzner |
||||
Marco Valleri & Alberto Ornaghi |
||||
Paul Wouters |
||||
Black Hat Windows Security 2003 |
||||
Miss out on the Black Hat Windows 2003 show? |
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentations - Black Hat Windows Security 2003 | ||||
Scott Culp |
|
|||
Curtis E. A. Karnow Strike and Counterstrike: The Law on Automated Intrusions and Striking Back |
||||
Application Development - Black Hat Windows Security 2003 | ||||
Michael Howard & David LeBlanc |
||||
Yoshiaki Komoriya & Hidenobu Seki |
||||
Marc Schöenefeld |
||||
Audit / Response / Policy - Black Hat Windows Security 2003 | ||||
Jeremiah Grossman & Bill Pennington |
||||
Riley Hassell |
||||
Dan Kaminsky |
||||
Larry Leibrock, Ph.D |
||||
Deep Knowledge - Black Hat Windows Security 2003 | ||||
David Aitel |
||||
Halvar Flake Graph-Based Binary Analysis |
||||
Eric Schultze & Erik Birkholz |
||||
IIS, SQL, ISA, etc. - Black Hat Windows Security 2003 | ||||
Cesar Cerrudo & Aaron Newman |
||||
David Litchfield |
||||
Timothy Mullen |
||||
Saumil Udayan Shah HTTP: Advanced Assessment Techniques |
||||
Networking & Integration - Black Hat Windows Security 2003 | ||||
Stephen Dugan |
||||
FX Design Issues and Software Vulnerabilities in Embedded Systems |
||||
Haroon Meer & Charl van der Walt |
||||
Steve Riley |
||||
Windows 2003 Server / .NET - Black Hat Windows Security 2003 | ||||
Mark Burnett |
||||
Drew Miller .NET from the Hacker's Perspective |
||||
Michael Muckin |
||||
Steve Riley & Timothy Bollefer |
||||
Black Hat Asia 2002 |
||||
Track/Speaker/Topic | Presentation | Notes/Tools | ||
Keynote Presentations - Black Hat Asia 2002 | ||||
Thomas C. Waszak |
||||
Martin Khoo |
||||
Track 1 - Black Hat Asia 2002 | ||||
Stephen Dugan |
||||
Halvar Flake |
||||
FX |
||||
Greg Hoglund |
||||
Last Stage of Delirium |
||||
Larry Leibrock, Ph.D |
||||
Tim Mullen |
||||
Saumil Shah |
||||
Track 2 - Black Hat Asia 2002 | ||||
Jay Beale |
||||
Jay Beale |
||||
Shaun Clowes |
||||
Riley "Caezar" Eller |
||||
Jeremiah Grossman |
||||
Dan Kaminsky |
||||
David Litchfield |
||||
Haroon Meer & Jaco van Graan |
--> | |||
Miss out on the Black Hat USA 2002 show? |
||
Track/Speaker/Topic | Presentation | Notes/Tools |
Keynote Presentations - Black Hat USA 2002 | ||
Richard Clarke, Office of Cyberspace Security |
|
|
Luncheon Speakers - Black Hat USA 2002 | ||
Richard George, NSA Views On the Future Direction of Information Assurance |
||
Jeff Jonas |
|
|
Application Security - Black Hat USA 2002 | ||
Dave Aitel |
||
Shaun Clowes |
||
JD Glaser |
||
Greg Hoglund |
||
Marc Schönefeld |
||
Tim Mullen |
||
Debra Littlejohn Shinder |
||
Mark Dowd, Nishad Herath, Neel Mehta, Chris Spencer & Halvar Flake |
||
Halvar Flake |
||
Aaron Higbee & Chris Davis |
||
Dan Kaminsky |
||
Firewall / Access - Black Hat USA 2002 | ||
Jed Haile |
||
Diana Kelley & Ian Poynter |
||
Rich Murphey |
||
Rick Smith |
||
Mark Eckenwiler |
||
Ian Goldberg |
||
David Goldman & Robert Marotta |
||
Len Sassaman |
Mixmaster Tool |
|
Routing & Infrastructure - Black Hat USA 2002 | ||
Ofir Arkin |
||
Sean Convery |
||
FX & kim0 |
||
Web, Mail, DNS & Others - Black Hat USA 2002 | ||
Jay Beale |
||
Scott Blake |
||
David Endler & Michael Sutton |
||
Paul Holman |
||
Bruce Potter |
||
Mike Schiffman |
||
Dan Veeneman |
||
Dan Veeneman |
||
Panels - Black Hat USA 2002 | ||
Vulnerability Disclosure: What the Feds Think |
||
Track/Speaker/Topic | Presentation | Tools |
Keynote Presentation - Black Hat Windows Security 2002 | ||
Jennifer S. Granick, Attorney At Law |
||
Tony Sager, National Security Agency |
||
General - Black Hat Windows Security 2002 | ||
David Goldman & Todd Feinman & Joe Nocera |
||
Jesper Johansson |
||
Eric Schultze |
||
Roelof Temmingh & Haroon Meer |
||
Network - Black Hat Windows Security 2002 | ||
Ofir Arkin |
||
Stephen Dugan |
||
FX |
||
Jonathan Wilkins |
||
MS Apps - Black Hat Windows Security 2002 | ||
Jay Beale & Andrew Hintz |
||
Tony Harris & Murugiah Souppaya |
||
Laura A. Robinson |
||
Thomas Shinder & Jim Harrison |
||
Tools of the Trade - Black Hat Windows Security 2002 | ||
Erik Pace Birkholz |
||
Jeremiah Grossman |
||
Urity |
||
Database - Black Hat Windows Security 2002 | ||
Chip Andrews |
||
JD Glaser |
||
David Litchfield & Sherief Hammad |
||
Timothy Mullen |
||
Deep Knowledge - Black Hat Windows Security 2002 | ||
Harlan Carvey |
||
Halvar Flake |
||
Track/Speaker/Topic | Presentation | Tools |
Keynote Presentation - Black Hat Europe 2001 | ||
Scott Blake Politics of Vulnerability Reporting |
||
Wilco van Ginkel The Other Side of Information Security |
||
Deep Knowledge - Black Hat Europe 2001 | ||
Shaun Clowes - injectso: Modifying and Spying on Running Processes Under Linux |
||
Dale Coddington & Ryan Permeh Decoding & Understanding Internet Worms |
||
Halvar Flake Third Generation Exploits on NT/Win2k Platforms |
||
Raymond Forbes Active Directory and Group Policy |
||
Anders Ingeborn IDS Evasion Design Tricks for Buffer Overflow Exploits |
||
Tim Mullen Web Vulnerability & SQL Injection Countermeasures |
||
General Track - Black Hat Europe 2001 | ||
Ofir Arkin X-Remote ICMP Based OS Fingerprinting Techniqu es |
||
Nicolas Fischbach & Sebastian Lacoste-Seris Protecting your IP Network Infrastructure |
||
FX Routing Protocol Attacks |
||
JD Glaser & Saumil Udayan Shah One-Way SQL Hacking |
||
Jeremiah Grossman Web Application Security |
||
Job de Haas Mobile Security: SMS and WAP |
||
LSD How We Beat the 5th Argus Hacking Contest |
||
David Litchfield Hackproofing Lotus Domino |
||
Marc Witteman Smart Card Security |
||
Panel Discussion Security Issues in the Infrastructure |
||
Track/Speaker/Topic | Presentation | Notes/Tools |
Keynote Presentation - Black Hat USA 2001 | ||
James Bamford Researching Secrets, Part II |
||
William Tafoya & Kevin Manson Career Routing for the Ethical Coder |
||
Luncheon Speakers - Black Hat USA 2001 | ||
Bruce Schneier Paradigms Lost: Engineering vs. Risk Management. |
||
Richard Thieme Defending the Information Web |
||
Deep Knowledge - Black Hat USA 2001 | ||
Ofir Arkin Introducing X: Playing Tricks with ICMP |
||
Halvar Flake Hit Them Where It hurts: Finding Holes in COTS Software |
||
George Jelatis Countering the Insider Threat with the Autonomic Distributed Firewall (ADF) |
||
Dan Kaminsky Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks with OpenSSH and the GNU Privacy Guard |
||
Last Stage of Delirium Research Group (LSD) UNIX Assembly Codes Development for Vulnerabilities Illustration Purposes |
||
Kevin McPeake Falling Dominos Part III |
||
Walter Gary Sharp Key Legal Implications of Computer Network Defense |
||
Lance Spitzner The HoneyNet Project |
||
More Technical - Black Hat USA 2001 | ||
Iván Arce & Max Caceres Automated Penetration Testing |
||
Jay Beale Attacking and Defending BIND / DJBDNS DNS Servers |
||
Marshall Beddoe & Chris Abad The Siphon Project. |
||
Mike Beekey ARP Vulnerabilities: Indefensible Local Network Attacks? |
||
Eric Brandwine & Todd MacDermid: Fnord: A Loadable Kernel Module for Defense and Honeypots |
||
Jeff Nathan & Kevin Depeugh Layer 2 Attacks |
||
Jose Nazario The Future of Internet Worms |
White Paper |
|
Tim Newsham Cracking WEP Keys |
||
Daiji Sanai Promiscuous Node Detection Using ARP Packets |
||
Technical - Black Hat USA 2001 | ||
Chip Andrews SQL Security Revisited |
||
Scott Blake DOG of WAR: Attack Box Design |
||
Steven M. Christey CVE Behind the Scenes: The Complexity of Being Simple |
||
Job de Haas GSM / WAP / SMS Security |
||
Robert Hansen Hardening .htaccess Scripts in Apache Environments |
||
Tim Mullen Grabbing User Credentials via W2k ODBC Libraries |
||
Palante Top 25 Overlooked Security Configurations on Your Switches and rRouters |
||
Chad R. Skipper Polymorphism and Intrusion Detection Systems |
||
Andrew van der Stock Alternatives to Honeypots or The dtk |
||
Tools of the Trade - Black Hat USA 2001 | ||
Renaud Deraison The Nessus Project |
||
Thomas Olofsson Building A Blind IP Spoofed Portscanning Tool |
||
Rain Forest Puppy New Tools at rfp.labs |
||
Martin Roesch Snort |
||
Simple Nomad & Todd Sabin The RAZOR Warez |
||
White Hat Track - Black Hat USA 2001 | ||
Mandy Andress Wireless LAN Security |
||
Brian Martin & B.K. DeLong Lessons Learned From attrition.org |
||
Gregory S. Miles Computer Forensics: A Critical Process in Your Incident Response Plan |
||
Daniel VanBelleghem Solving Network Mysteries |
||
Panel: Meet the Press | ||
Track/Speaker/Topic | Presentation | Notes/Tools | |||
Keynote Presentation - Black Hat Asia 2001 | |||||
Martin Khoo Post Mortem of a Rootkit Attack |
|||||
Bruce Schneier The Three Truths of Computer Security |
|||||
Deep Knowledge Track - Black Hat Asia 2001 | |||||
Ofir Arkin ICMP Usage In Scanning (The Advanced Methods) |
|||||
Halvar Flake Finding Holes iIn Closed-source Software (With IDA) |
|||||
Rain Forest Puppy Web Assessment Tools |
|||||
Trust Factory Falling Dominos |
|||||
Fyodor Yarochkin & ISS R&D Non-common Architectures Buffer Overflows |
|||||
General Track - Black Hat Asia 2001 | |||||
Shaun Clowes Breaking In Through The Front Door |
|||||
Emmanuel Gadaix Overall Security Review of the GSM Infrastructure |
|||||
JD Glaser & Saumil Udayan Shah Web Hacking |
|||||
David Litchfield Remote Web Application Disassembly with ODBC Error Messages |
|||||
Tim Mullen Restrict Anonymous & the Null User |
|
||||
Marcus Ranum IDS Benchmarking |
|||||
Rooster IPSec in a Windows 2000 World |
|
||||
Simple Nomad Stealth Network Techniques |
|||||
Panel Discussion: Security vs. Privacy | |||||
Track/Speaker/Topic | Presentation | Tools |
Keynote Presentation - Black Hat Windows 2001 | ||
James Bamford, Author of The Puzzle Palace Researching Secrets, Part 1 |
||
Chey Cobb Why Government Systems Fail at Security |
||
Jeff Jonas Cops and Robbers - Cheating Las Vegas |
||
Howell McConnell International Organized Crime and Terrorism |
||
Deep Knowledge - Black Hat Windows 2001 | ||
Halvar Flake Auditing Binaries For Security Vulnerabilities |
||
Kevin McPeake & Wouter Aukema Falling Domino's |
||
More Technical Track - Black Hat Windows 2001 | ||
Chip Andrews MS SQL Server Security Overview |
||
Ofir Arkin Active & Passive Fingerprinting of Microsoft Based Operating Systems Using the ICMP Protocol |
||
Erik Birkholz & Clinton Mugge Terminal Server |
||
Greg Hoglund Kernel Mode Rootkits |
||
Andrey Malyshev Analysis of Microsoft Office Password Protection System, and Survey of Encryption Holes In Other MS Windows Applications |
||
Paul T. Mobley Sr. Computer Forensics With An Emphasis On The NT Operating System |
||
Panel Discussion The Black Hat Time Machine: What Happens Next Year? |
||
Technical Track - Black Hat Windows 2001 | ||
Macy Bergoon Host Based Intrusion Detection Using W2K Auditing Features |
||
Kate Borten Healthcare and New Federal Security Protections |
||
Todd Feinman & David Goldman Safeguarding your Business Assets Through Understanding of the Win32API |
||
JD Glaser & Saumil Shah Web Hacking Par t 1 Hacking Exposed: E-commerce |
||
JD Glaser & Saumil Shah Web Hacking Part 1 & 2 |
||
Loki Virtual Private Problems |
||
Mushin Incident Response in a Microsoft World |
||
Rooster, Dan Kurc & William Dixon IPSec in a Windows 2000 World |
||
Todd Sabin Null Sessions, MSRPC, and Windows 2000 |
||
Eric Schultz & David LeBlanc Defense in Depth: Winning in Spite of Yourself (aka "Foiling JD") |
||
Track/Speaker/Topic | Presentation |
Ancillary
|
Keynote Presentation - Black Hat Europe 2000 | ||
Jennifer Granick Issues Surrounding International Computer Crime Laws |
||
Stuart Hyde "Plenty of Coppers in Change" |
||
Speaker/Presentation - Black Hat Europe 2000 | ||
Ofir Arkin ICMP Usage In Scanning |
||
HalVar Flake Finding Holes in Closed-source Software |
||
Jobb De Haas Getting Rooted and Never Knowing It |
||
David Litchfield Auditing The Security of Applications |
||
Kevin McPeake & Wouter Aukema Falling Domino Servers |
||
Rooster & J.D. Glaser Defending Your Network with Kerberos |
||
Simple Nomad Strategies for Defeating Distributed Attacks |
||
John Tan What Is Involved In a Forensic Effort |
||
Ask the Experts Panel: Rooster, JD Glasser, Job de Haas, Ofir Arkin, Jennifer Granick, Halvar Flake The panel starts off with the question "What do you see now and in the future as the security trends in your area of expertise?" and expands from there. |
||
Track/Speaker/Topic | Presentation | ||
Keynote Presentation - Black Hat USA 2000 | |||
Dominique Brezinski | |||
Hal McConnell Threats from Organized Crime & Terrorists |
|||
Arthur Money | |||
Marcus Ranum Full Disclosure and Open Source |
|||
Bruce Schneier The Internet and the Death of Security |
|||
Brian Snow We Need Assurance |
|||
Richard Thieme The Strategies of Sun Tzu and Multiple Levels of Deception |
|||
Deep Knowledge - Black Hat USA 2000 | |||
Greg Hoglund Advanced Buffer Overflow Techniques |
|||
Kingpin & Brian Oblivion Secure Hardware Design |
|||
John McDonald & Thomas Lopatic & Dug Song A Stateful Inspection of FireWall-1 |
|||
Mudge An Analysis of Tactics Used in Discovering "Passive" Monitoring Devices |
|||
Rooster & J.D. Glaser Defending Your Network with Active Directory Services |
|||
More Technical Track - Black Hat USA 2000 | |||
Job de Haas Getting Rooted and Never Knowing It |
|||
Joey Advanced Windows NT/2K Security (II) |
|||
David LeBlanc Real-world Techniques in Network Security Management |
|||
Simple Nomad Strategies for Defeating Distributed Attacks |
|||
Technical Track - Black Hat USA 2000 | |||
Jason Garms Defending Windows 2000 on the Internet |
|||
Ron Gula Bypassing Intrusion Detection Systems |
|||
Jericho & Munge Hard-core Web Defacement Statistics Trends and Analysis |
|||
Mark Kadrich Intrusion Detection in High Speed Networks |
|||
David Litchfield Compromising Web Servers, and Defensive Techniques |
|||
Ron Moritz Proactive Defense Against Malicious Code |
|||
Padgett Peterson Securing E-Mail Gateways From Attack |
|||
Jeremy Rauch Routers, Switches & More: Part 2 |
|||
Jeff Thompson Making Unix Secure for the Internet |
|||
White Hat Track - Black Hat USA 2000 | |||
Scott Blake The Pros and Cons of Hiring Hackers |
|||
Jennifer Granick & Mark Eckenwiler What Internet Service Providers Need to Know About the Law |
|||
Terry Losonsky National Information Assurance Partnership |
|||
Diana Kelly with Edward Schwartz From Policy to Technology, Translating U.S. Privacy Regulations for Implementation. with Edward Schwartz. Part 2-2 |
|||
Lee Kushner Hiring Trends, Desired Skill Sets, and The State of Employment in the Information Security Industry |
|||
Ian Poynter & Diana Kelley The truth about ASPs |
|||
Edward G. Schwartz with Diana Kelley Data Privacy: What should the CIO and CISO be doing? Part 1-2 |
|||
Track/Speaker/Topic | Presentation |
Notes/Tools
|
Keynote Presentation - Black Hat Asia 2000 | ||
Wilfred A. Nathan Computer Crime: The Law Enforcement Perspective |
||
Pierre Noel Why Security Architectures Fail |
||
Speaker/Presentation - Black Hat Asia 2000 | ||
Batz Casing the Joint. What We Already Know About Your Network The beginning of the audio is messed up for a few minutes |
||
Caezar Malicious Information Gathering |
||
J.D. Glaser Auditing and Forensics on NT |
||
Jennifer Granick International Legal Issues Surrounding Computer Hacking |
||
Greg Hoglund Advanced Buffer Overflow Techniques |
||
Joey Advanced Windows NT Security |
||
Martin Khoo Responding to Cyber Threats |
||
Marcus Ranum Intrusion Detection and Network Forensics |
||
Jeremy Rauch Routers, Switches & More: Part 1 |
||
Panel: Q&A: Ask the Experts Panel moderated by Jeff Moss. Check out the full disclosure debate! |
||
Track/Speaker/Topic | Presentation |
Notes/Tools
|
Keynote Presentation - Black Hat USA 1998 | ||
Marcus Ranum How to REALLY Secure the Internet |
||
Bruce Schneier Mistakes and Blunders: A Hacker Looks at Cryptography |
||
Richard Thieme Convergence Every Man (and Woman) a Spy |
||
Technical Track - Black Hat USA 1998 | ||
Dominique Brezinski Penetrating NT Networks Through Information Leaks and Policy Weaknesses |
Presentation Notes!
|
|
John Bailey SOCKS, PPTP & IPSec: Implementation & Futures |
||
Ian Goldberg Cell Phone Security: A History and The State of the Art |
||
Dr. Mudge Problems with VPN Technologies |
||
Tom Ptacek Problems with Intrusion Detection Systems |
||
General Track - Black Hat USA 1998 | ||
Jennifer Granick What's Different About Evidence in Computer Crime litigation |
||
Patrick Richard Open Network PKI Design Issues or Business as Usual |
||
Bruce K. Marshall Statistical Analysis of Reusable Password Systems and Their Alternatives |
||
Ira Winkler Information Security: Beyond the Hype |
||
Speaker/Topic | Presentation |
Ancillary
|
Keynote Presentation - Black Hat USA 1997 | ||
Richard Thieme | ||
Speaker/Presentation - Black Hat USA 1997 | ||
Dominique Brezinski Security Posture Assessment (SPA) of Windows NT Networks |
--> | |
Miles Connley Firewalls: Not Enough of a Good Thing |
||
Chris Goggans Internet Attack Methodologies |
||
Hobbit Microsoft LM athentication, CIFS, and All Kinds of Password Problems |
||
Ray Kaplan Meet The Enemy |
||
Mudge Secure Coding Practices and Source Code Analysis |
||
QMaster Secure Implementations of ActiveX in a Corporate Environment |
||
Priest Building the Business Case for Management for Increased Security |
||
Jeremy Rauch Security Implications of Distributed Network Management |
||
Route TCP/IP Insecurities |
||
Bruce Schneier Why Cryptograpy is Harder Than it Looks |
website |
|
Peter Shipley Securing your Network with Free Utilities |
||
Adam Shostack Code Reviews: Making them Worthwhile |
||
Sluggo Denial of Service Attacks, and Defensive Strategies |
||
Ira Winkler Who are the Real Black Hats? |
||
|