Podcasts by Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.

Past speeches and talks from the Black Hat Briefings computer security conferences.

Further podcasts by Jeff Moss

Podcast on the topic Technologie

All episodes

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Vipin Kumar and Nitin Kumar: Vboot Kit: Compromising Windows Vista Security from 2023-12-12T18:58:01.663145

"Vboot kit is first of its kind technology tdemonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used tcircumvent the whole prote...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Jeff Moss and Roger Cumming: Welcome and Keynote. from 2023-12-12T18:58:01.526783


Jeff Moss introduces the Keynote and welcomes everyone tthe Amsterdam 2007 conference!
Roger will provide an overview of the work of CPNI in reducing vulnerability in information systems...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Vipin Kumar and Nitin Kumar: Vboot Kit: Compromising Windows Vista Security from 2022-02-22T11:05:38.339553

"Vboot kit is first of its kind technology tdemonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used tcircumvent the whole prote...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
StefanZanero: 360 Anomaly Based Unsupervised Intrusion Detection from 2022-02-22T11:05:38.336421

"In this talk, after briefly reviewing why we should build a good
anomaly-based intrusion detection system, we will briefly present twIDS prototypes developed at the Politecnicdi Milanfor netw...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones from 2022-02-22T11:05:38.335638

"SS7 has been a walled garden for a long time: only big telcwould be interconnected tthe network. Due tderegulation and a push toward all-IP architecture, SS7 is opening up, notably with SIGTRAN (S...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Lluis Mora: SMTP Information gathering from 2022-02-22T11:05:38.333811

"The SMTP protocol, used in the transport and delivery of e-mail messages, includes control headers along with the body of messages which, as opposed tother protocols, are not stripped after the me...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Laurent Butti: Wi-Fi Advanced Fuzzing from 2022-02-22T11:05:38.333072

"Fuzzing is a software testing technique that consists in finding implementation bugs. Fuzzing Wi-Fi drivers is becoming more and more attractive as any exploitable security bug will enable the att...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
ERESI Team: Next generation debuggers for reverse engineering from 2022-02-22T11:05:38.331417

"Classical debuggers make use of an interface provided by the
operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the c...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests from 2022-02-22T11:05:38.330365

"ScarabMon is a new tool and framework for simplifying web application pentests. It makes the process of finding many common webapp flaws much easier. The user simply navigates the target site whil...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
David Maynor and Robert Graham: Data Seepage: How tgive attackers a roadmap tyour network from 2022-02-22T11:05:38.328718

"Long gone are the days of widespread internet attacks. What's more popular now are more directed or targeted attacks using a variety of different methods. Since most of these attacks will be a sin...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection from 2022-02-22T11:05:38.327915

"The Achilles' heel of network IDSes lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS traise t...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
AugustPaes de Barros: New Botnets Trends and Threats from 2022-02-22T11:05:38.325995

"The last years have seen the growth of botnets and its transformation inta highly profitable business. Most of the botnets seen until now have used the same basic concepts. This presentation inten...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Alexander Sotirov: Heap Feng Shui in JavaScript from 2021-01-31T22:10:42.023393

"Heap exploitation is getting harder. The heap protection features in the latest versions of Windows have been effective at stopping the basic exploitation techniques. In most cases bypassing the p...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Cesar Cerrudo: Data Theft - Hacking databases for owning your data from 2021-01-31T22:10:42.023393

"Data theft is becoming a major threat, criminals have identified where the money is, In the last years many databases from fortune 500 companies were compromised causing lots of money losses. Thi...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Joel Eriksson: Kernel Wars from 2021-01-31T22:10:42.023393

"Kernel vulnerabilities are often deemed unexploitable or at least unlikely tbe exploited reliably. Although it's true that kernel-mode exploitation often presents some new challenges for exploit d...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Kostya Kortchinsky: Making Windows Exploits more reliable from 2021-01-31T22:10:42.023393

"When dealing with Windows exploits, an issue that often emerge is their cross-platform reliability, meaning they often work against either some given service packs of the OS, or some localization ...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Ollie Whitehouse: GS and ASLR in Windows Vista from 2021-01-31T22:10:42.023393

"Introduction:The following presentation is twparts, the first covers aspects of Microsoft's GS implementation and usage. The second is a complementary section dealing with ASLR in Windows Vista, i...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Sun Bing: Software Virtualization Based Rootkits from 2021-01-31T22:10:42.023393

"This paper will show a extremely simple technique tquickly audit a software product in order tinfer how trustable and secure it is. I will show you step by step how tidentify half dozen of local 0...

Listen
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection from 2021-01-31T22:10:42.023393

"Today, other than doing a full static analysis of the code, the most common practice tfind vulnerabilities in your web application is tget off-the-shelf automated web scanner, point ta URL, and ho...

Listen