|
The Black Hat Briefings '01, July 11-12th Las Vegas |
|
||||
|
Convention Reception - Informal get together in the lounge and early registration. This is a good time to meet some of the speakers and other attendees in an informal setting. |
|
||||
|
|
|
|
|
|
|
|||
|
|
|||
|
Introduction: Jeff Moss - Welcome to the Fifth Black Hat Briefings. | |||
|
Keynote Speech: James Bamford: Researching Secrets, Part II | |||
|
Blake: DOG of WAR: Attack Box Design | Jose Nazario: The future of internet worms | Thomas
Olofsson:
Building a blind ip spoofed portscanning tool |
George Jelatis: Countering the Insider Threat with the Autonomic Distributed Firewall (ADF) |
|
|
|||
|
Robert Hansen: Hardening .htaccess scripts in Apache environments | Eric
Brandwine &
Todd MacDermid: Fnord: A Loadable kernel module for defense and honeypots |
Renaud
Deraison:
The Nessus Project. Reducing the costs of vulnerability assessment using Nessus 1.2 |
Dan Kaminsky: Gateway Cryptography: Hacking Impossible Tunnels through Improbable Networks with OpenSSH and the GNU Privacy Guard |
|
Richard Thieme : Defending the Information Web: New Ways of Thinking About Security |
|||
|
Steven M. Christey: CVE Behind the Scenes: The Complexity of Being Simple | Jay Beale: Attacking and Defending BIND / DJBDNS DNS Servers | Simple
Nomad &
Todd Sabin: The RAZOR Warez |
Halvar Flake: Hit them where it hurts: Finding holes in COTS software |
|
Andrew van der Stock: Alternatives to honeypots or the dtk | Ian Goldberg: Breaking 802.11 WEP | Martin Roesch: Snort | |
|
|
|||
|
Job de Haas: GSM / WAP / SMS Security | Marshall Beddoe & Chris Abad: The Siphon Project. | Rain Forest Puppy: New tools at rfp.labs | Kevin McPeake & Chris Goggans: Falling Dominos Part III |
|
James Bamford Book Signing Winn Schwartau: "CyberEthical Surfivor - The Game" |
|
||||
|
|
|
|
|
|
|
|||
|
Keynote Speech: William Tafoya & Kevin Manson: Career Routing for the Ethical Coder | |||
|
Cory Scott: Systems Management in an Untrusted Network. | Tim Newsham: Cracking WEP Keys | Mandy Andress:
Wireless LAN Security |
Walter Gary Sharp: Key Legal Implications of Computer Network Defense |
|
|
|||
|
Chip Andrews: SQL Security revisited. | Iván Arce & Max Caceres: Automated Penetration Testing | Gregory
S. Miles:
Computer Forensics: A Critical Process in Your Incident Response Plan |
Last Stage of Delirium Research Group: UNIX assembly codes development for vulnerabilities illustration purposes |
|
Bruce Schneier: Paradigms Lost: Engineering vs. Risk Management. |
|||
|
Timmothy Mullen: Grabbing User Credentials via W2k ODBC Libraries | Daiji Sanai: Promiscuous node detection using ARP packets | Brian Martin & B.K. DeLong: Lessons Learned From attrition.org | Ofir Arkin: Introducing X: Playing Tricks with ICMP |
|
Chad R. Skipper: Polymorphism and Intrusion Detection Systems. | Mike Beekey: ARP Vulnerabilities: Indefensible Local Network Attacks? | Daniel VanBelleghem: Solving Network Mysteries | Lance Spitzner: The Honey Net Project |
|
|
|||
|
Palante:Top 25 overlooked security configurations on your switches and routers | Jeff Nathan & Kevin Depeugh: Layer 2 Attacks | Meet the Press Panel | Lance Spitzner: The Honey Net Project |