Podcasts by Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Past speeches and talks from the Black Hat Briefings computer security conferences.
Further podcasts by Jeff Moss
Podcast on the topic Technologie
All episodes
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2023-12-12T18:58:05.375803
"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...
ListenRob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7 from 2023-12-12T18:58:05.363170
"Tony Chor will discuss Microsoft’s security engineering methodology and how it is being applied to the development of Internet Explorer 7. He will detail key vulnerabilities and attacks this metho...
ListenPhilip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events. from 2023-12-12T18:58:05.359217
"The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any published occurrences, may reach protected services ...
ListenJoanna Rutkowska: Rootkits vs Stealth by design Malware from 2023-12-12T18:58:05.353260
"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypas...
ListenDavid Hulton&Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's from 2023-12-12T18:58:05.347423
"This talk will go in-depth into methods for breaking crypto faster using FPGAs. FPGA's are chips that have millions of gates that can be programmed and connected arbitrarily to perform any sort of...
ListenBilly Hoffman: Analysis od Web application worms and Viruses from 2023-12-12T18:58:05.341268
"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in w...
ListenAdrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance from 2023-12-12T18:58:05.308639
"All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more security vulnerabilities are exploiting defects r...
ListenRenaud BIDOU: IPS Short comings from 2023-12-12T18:58:05.303454
"Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefor...
ListenAlexander Tereshkin: Rootkits: Attacking Personal Firewalls from 2023-12-12T18:58:05.298481
"Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect the system from any malware threat with any level of sophistication. This level significantly incr...
ListenDan Moniz&HD Moore: Six Degrees of XSSploitation from 2023-12-12T18:58:05.288143
"Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the"samy is my hero"incident in late 2005. XSS affects a wide variety of sites and back end web t...
ListenStephano Zanero: Host Based Anomaly Detection on System calls arguments from 2023-12-12T18:58:05.254477
"Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in...
ListenBruce Potter: Bluetooth Defense kit from 2023-12-12T18:58:05.244616
"In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life. From cars to phones to laptops to printers, Bluetooth is everywhere. And while the state of the ...
ListenAlex Stamos&Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 from 2023-12-12T18:58:05.239920
"The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of"Web 2.0"technologies giving us faster, more exciting, and more ...
ListenJohnny Long: Secrets of the Hollywood Hacker from 2023-12-12T18:58:05.219532
"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the"normal"people around you thought something k-rad just ...
ListenAbolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista from 2023-12-12T18:58:05.213627
"TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial-of-service. Achieving resilience depends on factors from NIC driver quality up through network ...
ListenPeter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0 from 2023-12-12T18:58:05.202081
"In the past couple years there have been major advances in the field of rootkit technology, from Jamie Butler and Sherri Sparks'Shadow Walker, to FU. Rootkit technology is growing at an exponentia...
ListenClaudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device from 2023-12-12T18:58:05.196957
"How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictures of the room you're in, and monitor everythi...
ListenDino Dai Zovi: Hardware Virtualization Based Rootkits from 2023-12-12T18:58:05.162247
"Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating systems to be run at full speed and without modification simultaneously on the same processor. These ...
ListenLukas Grunwald:"New Attack to RFID-Systems and their Middle ware and Backends" from 2023-12-12T18:58:05.155637
"This talk provides an overview of new RFID technologies used for dual-interface cards (credit cards, ticketing and passports), and RFID tags with encryption and security features. Problems and at...
ListenJeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous from 2023-12-12T18:58:05.148907
"Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowle...
ListenAndrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach from 2023-12-12T18:58:05.122530
"You’ve heard about Trustworthy Computing and you’ve seen some security improvements from Microsoft. You may have wondered-"is this change real or is it just lip service?"You may also have asked yo...
ListenEmmanuele Zambon:"NIDS, false positive reduction through anomaly detection" from 2023-12-12T18:58:05.114754
"The Achilles'heel of network IDSs lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS to raise t...
ListenJamie Butler: R^2: The Exponential Growth in Rootkit Techniques from 2023-12-12T18:58:05.107187
"Rootkit technology has exploded recently, especially in the realm of remote command and control vectors. This talk will cover the evolution of rootkit techniques over the years. It will explore th...
ListenMelanie Rieback: RFID Malware Demystified from 2023-12-12T18:58:05.099479
"Radio Frequency Identification (RFID) malware, first introduced in my paper'Is Your Cat Infected with a Computer Virus?', has raised a great deal of controversy since it was first presented at the...
ListenHacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers from 2023-12-12T18:58:05.083948
"Expertise in computer forensic technology means nothing if that expertise can’t be conveyed convincingly to a jury. Presenting technical evidence in a courtroom is a far cry from presenting a tech...
ListenHD Moore: Metasploit Reloaded from 2023-12-12T18:58:05.077825
"Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a sleek EIP-popping machine. The latest version of the Framework is the result of nearly two years ...
ListenZvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator from 2023-12-12T18:58:05.070968
"Linux® is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entropy of operating s...
ListenMichael Sutton&Greg MacManus: Punk Ode - Hiding shellcode in plain sight from 2023-12-12T18:58:05.063669
"Injecting shellcode into a vulnerable program so you can find it reliably can be tricky. With image format vulnerabilities, sometimes the only place you can put your code is in the image itself. I...
ListenFX: Analysing Complex Systems: The BlackBerry Case from 2023-12-12T18:58:05.035354
"When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot...
ListenScott Stender: Attacking Internationialized software from 2023-12-12T18:58:05.030502
"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the syste...
ListenChuck Willis : Web application Incident Response and forensics- A Whole new ball game. from 2023-12-12T18:58:05.025316
"Web applications are normally the most exposed and the most easily compromised part of an organization's network presence. This combination requires that organizations be prepared for web applicat...
ListenDoug Mohney: Defending Against Social Engineering with Voice Analytics from 2023-12-12T18:58:05.019224
"Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authe...
ListenAlexander Kornbrust: Oracle Rootkits 2.0 from 2023-12-12T18:58:05.012077
"This presentation shows the next (2.) generation of Oracle Rootkits. In the first generation, presented at the Blackhat 2005 in Amsterdam, Oracle Rootkits were implemented by modifying database vi...
ListenShawn Embleton, Sherri Sparks&Ryan Cunningham:"Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting from 2023-12-12T18:58:04.982086
Black box testing techniques like fuzzing and fault injection are responsible for discovering a large percentage of reported software vulnerabilities. These techniques typically operate by injectin...
ListenJay Schulman: Phishing with Asterisk PBX from 2023-12-12T18:58:04.965526
"As many people are becoming more accustom to phishing attacks, standard website and e-mail phishing schemes are becoming harder to accomplish. This presentation breaks all of the phishing norms to...
ListenBala Neerumalla: SQL Injections by truncation from 2023-12-12T18:58:04.958746
"In this talk, I will discuss some ways to circumvent common mitigations of SQL Injection vulnerabilities in dynamic SQL. I will then suggest ways to protect against them.Bala Neerumalla specialize...
ListenSaumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit from 2023-12-12T18:58:04.952910
"This talk shall focus on exploit development from vulnerabilities. We have seen many postings on security forums which vaguely describe a vulnerability, or sometimes provide a"proof-of-concept"exp...
ListenSensePost: A Tale of Two Proxies from 2023-12-12T18:58:04.941718
"During this presentation SensePost will discuss and demonstrate two pieces of new technology - the Suru WebProxy and the SP_LR Generic network proxy.The Suru web proxy is an inline web proxy (the ...
ListenJesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms from 2023-12-12T18:58:04.934785
"This presentation prepares attackers and defenders to perform automated testing of some popular Windows® interprocess communication mechanisms. The testing will focus on binary win32 applications,...
ListenMariusz Burdach: Physical Memory Forensics from 2023-12-12T18:58:04.928122
"Historically, only file systems were considered as locations where evidence could be found. But what about the volatile memory which contains a huge amount of useful information such as the conten...
ListenHendrik Scholz: SIP Stack Fingerprinting and stack difference attacks from 2023-12-12T18:58:04.921407
"VoIP applications went mainstream, although the underlying protocols are still undergoing constant development. The SIP protocol being the main driver behind this has been analyzed, fuzzed and put...
ListenPete Finnigan: How to Unwrap Oracle PL/SQL from 2023-12-12T18:58:04.916002
"PL/SQL is the flagship language used inside the Oracle database for many years and through many versions to allow customers to implement their business rules and logic. Oracle has recognized that ...
ListenHalvar Flake: RE 2006: New Challenges Need Changing Tools from 2023-12-12T18:58:04.908614
"Reverse Engineering has come a long way-what used to be practiced behind closed doors is now a mainstream occupation practiced throughout the security industry. Compilers and languages are changin...
ListenDan Kaminsky: Black Ops 2006 from 2023-12-12T18:58:04.902732
"The known topics for this year include:1. The Worldwide SSL Analysis-There's a major flaw in the way many, many SSL devices operate. I'll discuss how widespread this flaw is, as well as announce r...
ListenBruce Potter: The Trusted Computing Revolution from 2023-12-12T18:58:04.896375
"Trusted computing is considered a dirty word by many due to its use for Digital Rights Management (DRM). There is a different side of trusted computing, however, that can solve problems informatio...
ListenOfir Arkin: Bypassing Network Access Control (NAC) Systems from 2023-12-12T18:58:04.889521
"The threat of viruses, worms, information theft and lack of control of the IT infrastructure lead companies to implement security solutions to control the access to their internal IT networks.A ne...
ListenNeal Krawetz (Dr): You are what you type: No classical computer forensics from 2023-12-12T18:58:04.882198
"In an online world, anonymity seems easy. Network addresses can be cloaked and files can be manipulated. People rapidly change virtual names, genders, and skills. But even with these precautions, ...
ListenDavid Endler: Hacking VOIP Exposed from 2023-12-12T18:58:04.874269
"Lately there seems to be an explosion of press hype around the possibility of hackers exploiting Voice-over-IP networks and services (Skype, Vonage, etc.). VoIP Spam, Caller ID Spoofing, Toll Frau...
ListenDavid Litchfield : All New Zero Day from 2023-12-12T18:58:04.866455
David Litchfield specializes in searching for new threats to database systems and web applications. He has lectured to both British and U.S. government security agencies on database security and is...
ListenDan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends from 2023-12-12T18:58:04.860239
"As one of the pioneers of partnerships for the FBI, Dan Larkin of the FBI’s Cyber Division will outline how the FBI has taken this concept from rhetoric to reality over the past 5 years. This pres...
ListenTom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2022-03-07T00:16:17.060548
"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...
ListenTom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2022-02-22T11:05:41.778750
"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...
ListenMarco M. Morana: Building Security into the Software Life Cycle, a Business Case from 2022-02-22T11:05:41.777916
The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure software. Think risk driven design, think like an at...
ListenBilly Hoffman: Analysis od Web application worms and Viruses from 2022-02-22T11:05:41.757941
"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in w...
ListenShawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway from 2022-02-22T11:05:41.757132
"Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an option, especially for closed-source, black-box...
ListenDaniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics from 2022-02-22T11:05:41.756358
"Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analysis time. Call sequence, assembly instruction s...
ListenCorey Benninger: Finding Gold in the Browser Cache from 2022-02-22T11:05:41.755510
"Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular web browser caches. This discussion will focu...
ListenPanel: The Jericho Forum and Challenge from 2022-02-22T11:05:41.754493
"In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking participants through the initial problem statement and what people need to go away and start imp...
ListenBrendan O'Connor: Vulnerabilities in Not-So Embedded Systems from 2022-02-22T11:05:41.751275
"Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dumb machines that perform a specific, repetitive function. Today's devices are far different than ...
ListenStefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity from 2022-02-22T11:05:41.749358
"To be able to defend against IT security attacks, one has to understand the attack patterns and henceforth the vulnerabilities of the attached devices. But, for an in-depth risk analysis, pure tec...
ListenWilliam B Kimball: Code Integration-Based Vulnerability Auditing from 2022-02-22T11:05:41.748602
There is a growing need to develop improved methods for discovering vulnerabilities in closed-source software. The tools and techniques used to automate searching for these vulnerabilities are eith...
ListenFranck Veysset and Laurent Butti: Wi-Fi Advanced Stealth from 2022-02-22T11:05:41.747870
"Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios and so on… Thanks to increasingly flexible low-cost 802.11 chipsets we are now able to encode a...
ListenPanel: Disclosure Discussion from 2022-02-22T11:05:41.747091
Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure debate agree that working together rather than apart is the best way to secure our information. B...
ListenNoel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono from 2022-02-22T11:05:41.746071
"Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live with a laptop in easy reach, it’s going to have an effect on our workday. For users there’s a new U...
ListenGreg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design from 2022-02-22T11:05:41.744297
"Online games are very popular and represent some of the most complex multi-user applications in the world. World of Warcraft® takes center stage with over 5 million players worldwide. In these per...
ListenJonathan Squire: $30, 30 Minutes, 30 Networks from 2022-02-22T11:05:41.741199
"Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could build a device that could play your digital music, display pictures, and listen to your neighbo...
ListenJeff Waldron: VOIP Security Essentials from 2022-02-22T11:05:41.740326
"The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) technology. The practical uses of VoIP will be discussed along with the advantages and disadvantages o...
ListenHimanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs from 2022-02-22T11:05:41.739545
"Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the tools and procedures to protect such resources are absent. The presentation will attempt to brid...
ListenJohnny Long: Secrets of the Hollywood Hacker from 2022-02-22T11:05:41.738477
"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad jus...
ListenBrian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion from 2022-02-22T11:05:41.736894
Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on eluding IDS, but the gap between the attackers and the defenders has never been wider. This present...
ListenTod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger from 2022-02-22T11:05:41.677304
"Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemented in Greasemonkey, its purpose is to automate several common tasks employed during the early s...
ListenTom Gallagher: Finding and Preventing Cross-Site Request Forgery from 2022-02-22T11:05:41.676384
"There is an often overlooked security design flaw in many web applications today. Web applications often take user input through HTML forms. When privileged operations are performed, the server ve...
ListenChris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications from 2022-02-22T11:05:41.675404
"How often have you encountered random-looking cookies or other data in a web application that didn‚t easily decode to human readable text? What did you do next-ignore it and move on, assuming that...
ListenJohn Lambert: Security Engineering in Windows Vista from 2022-02-22T11:05:41.674170
This presenation will offer a technical overview of the security engineering process behind Windows Vista. Windows Vista is the first end-to-end major OS release in the Trustworthy Computing era fr...
ListenYuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy from 2022-02-22T11:05:41.669904
This topic will present a new web-app/DB pen-test tool. This tool supports both proxy (passive) mode as well as direct URL targeting. It is a mixed Web App SQL Injection systematic pen-test and Web...
ListenCharles Edge: Attacking Apple’s Xsan from 2022-02-22T11:05:41.668813
"A fundamental of many SAN solutions is to use metadata to provide shared access to a SAN. This is true in iSCSI or FibreChannel and across a wide variety of products. Metadata can offer a way arou...
ListenRobert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems from 2022-02-22T11:05:41.663543
"This presentation will discuss the use of RSS and Atom feeds as method of delivering exploits to client systems. In our research we have found a number of RSS clients, both local and web-based, th...
ListenNicolas Fischbach: Carrier VoIP Security from 2022-02-22T11:05:41.658079
"VoIP, IMS, FMC, NGN, PacketCore, MPLS. Put those together and you are looking at the next security nightmare when it comes to Service Provider infrastructure security. Carriers are already moving ...
ListenKimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees from 2022-02-22T11:05:41.657281
Today’s privacy requirements place significant additional auditing burdens on databases. First you have to know which databases in your environment contain regulated Personally Identifiable Informa...
ListenJeremy Rauch: PDB: The Protocol DeBugger from 2022-02-22T11:05:41.656452
"It's late. You've been assigned the unenviable task of evaluating the security of this obtuse application suite. 2006! Why doesn't everything just use SSL as its transport? No time for excuses. De...
ListenPanel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats from 2022-02-22T11:05:41.651370
This session will examine the threat of spyware to corporations. What does the threat currently look like and how is it evolving? What market forces are at play? How big of a threat is spyware for ...
ListenPaul Böhm: Taming Bugs: The Art and Science of Writing Secure Code from 2022-02-22T11:05:41.650363
If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Pr...
ListenKevin Mandia: The State of Incidence Response from 2022-02-22T11:05:41.647834
"During the course of 2005 and 2006, we have responded to dozens of computer security incidents at some of America’s largest organizations. Mr. Mandia was on the front lines assisting these organiz...
ListenJohnny cache and David Maynor: Device Drivers from 2021-01-31T22:10:42.023393
Application level security is getting better. Basic stack based string overflows have become rare, and even simple heap overflows are getting hard to find. Despite this fact there is still a huge a...
ListenPanel: Meet the Feds: OODA Loop and the Science of Security from 2021-01-31T22:10:42.023393
"The OODA Loop theory was conceived by Col John Boyd, AF fighter pilot. He believed that a pilot in a lethal engagement that could Observe, Orient, Decide, and Act (OODA) before his adversary had a...
Listen