Podcasts by Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.

Further podcasts by Jeff Moss

Podcast on the topic Technologie

All episodes

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2023-12-12T18:58:05.375803

"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7 from 2023-12-12T18:58:05.363170

"Tony Chor will discuss Microsoft’s security engineering methodology and how it is being applied to the development of Internet Explorer 7. He will detail key vulnerabilities and attacks this metho...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events. from 2023-12-12T18:58:05.359217

"The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any published occurrences, may reach protected services ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Joanna Rutkowska: Rootkits vs Stealth by design Malware from 2023-12-12T18:58:05.353260

"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypas...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
David Hulton&Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's from 2023-12-12T18:58:05.347423

"This talk will go in-depth into methods for breaking crypto faster using FPGAs. FPGA's are chips that have millions of gates that can be programmed and connected arbitrarily to perform any sort of...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Billy Hoffman: Analysis od Web application worms and Viruses from 2023-12-12T18:58:05.341268

"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in w...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance from 2023-12-12T18:58:05.308639

"All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more security vulnerabilities are exploiting defects r...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Renaud BIDOU: IPS Short comings from 2023-12-12T18:58:05.303454

"Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefor...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Alexander Tereshkin: Rootkits: Attacking Personal Firewalls from 2023-12-12T18:58:05.298481

"Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect the system from any malware threat with any level of sophistication. This level significantly incr...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Dan Moniz&HD Moore: Six Degrees of XSSploitation from 2023-12-12T18:58:05.288143

"Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the"samy is my hero"incident in late 2005. XSS affects a wide variety of sites and back end web t...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Stephano Zanero: Host Based Anomaly Detection on System calls arguments from 2023-12-12T18:58:05.254477

"Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Bruce Potter: Bluetooth Defense kit from 2023-12-12T18:58:05.244616

"In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life. From cars to phones to laptops to printers, Bluetooth is everywhere. And while the state of the ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Alex Stamos&Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 from 2023-12-12T18:58:05.239920

"The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of"Web 2.0"technologies giving us faster, more exciting, and more ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Johnny Long: Secrets of the Hollywood Hacker from 2023-12-12T18:58:05.219532

"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the"normal"people around you thought something k-rad just ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista from 2023-12-12T18:58:05.213627

"TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial-of-service. Achieving resilience depends on factors from NIC driver quality up through network ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0 from 2023-12-12T18:58:05.202081

"In the past couple years there have been major advances in the field of rootkit technology, from Jamie Butler and Sherri Sparks'Shadow Walker, to FU. Rootkit technology is growing at an exponentia...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device from 2023-12-12T18:58:05.196957

"How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictures of the room you're in, and monitor everythi...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Dino Dai Zovi: Hardware Virtualization Based Rootkits from 2023-12-12T18:58:05.162247

"Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating systems to be run at full speed and without modification simultaneously on the same processor. These ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Lukas Grunwald:"New Attack to RFID-Systems and their Middle ware and Backends" from 2023-12-12T18:58:05.155637

"This talk provides an overview of new RFID technologies used for dual-interface cards (credit cards, ticketing and passports), and RFID tags with encryption and security features. Problems and at...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous from 2023-12-12T18:58:05.148907

"Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowle...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach from 2023-12-12T18:58:05.122530

"You’ve heard about Trustworthy Computing and you’ve seen some security improvements from Microsoft. You may have wondered-"is this change real or is it just lip service?"You may also have asked yo...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Emmanuele Zambon:"NIDS, false positive reduction through anomaly detection" from 2023-12-12T18:58:05.114754

"The Achilles'heel of network IDSs lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS to raise t...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques from 2023-12-12T18:58:05.107187

"Rootkit technology has exploded recently, especially in the realm of remote command and control vectors. This talk will cover the evolution of rootkit techniques over the years. It will explore th...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Melanie Rieback: RFID Malware Demystified from 2023-12-12T18:58:05.099479

"Radio Frequency Identification (RFID) malware, first introduced in my paper'Is Your Cat Infected with a Computer Virus?', has raised a great deal of controversy since it was first presented at the...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers from 2023-12-12T18:58:05.083948

"Expertise in computer forensic technology means nothing if that expertise can’t be conveyed convincingly to a jury. Presenting technical evidence in a courtroom is a far cry from presenting a tech...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
HD Moore: Metasploit Reloaded from 2023-12-12T18:58:05.077825

"Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a sleek EIP-popping machine. The latest version of the Framework is the result of nearly two years ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator from 2023-12-12T18:58:05.070968

"Linux® is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entropy of operating s...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Michael Sutton&Greg MacManus: Punk Ode - Hiding shellcode in plain sight from 2023-12-12T18:58:05.063669

"Injecting shellcode into a vulnerable program so you can find it reliably can be tricky. With image format vulnerabilities, sometimes the only place you can put your code is in the image itself. I...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
FX: Analysing Complex Systems: The BlackBerry Case from 2023-12-12T18:58:05.035354

"When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Scott Stender: Attacking Internationialized software from 2023-12-12T18:58:05.030502

"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the syste...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Chuck Willis : Web application Incident Response and forensics- A Whole new ball game. from 2023-12-12T18:58:05.025316

"Web applications are normally the most exposed and the most easily compromised part of an organization's network presence. This combination requires that organizations be prepared for web applicat...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Doug Mohney: Defending Against Social Engineering with Voice Analytics from 2023-12-12T18:58:05.019224

"Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authe...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Alexander Kornbrust: Oracle Rootkits 2.0 from 2023-12-12T18:58:05.012077

"This presentation shows the next (2.) generation of Oracle Rootkits. In the first generation, presented at the Blackhat 2005 in Amsterdam, Oracle Rootkits were implemented by modifying database vi...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Shawn Embleton, Sherri Sparks&Ryan Cunningham:"Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting from 2023-12-12T18:58:04.982086

Black box testing techniques like fuzzing and fault injection are responsible for discovering a large percentage of reported software vulnerabilities. These techniques typically operate by injectin...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jay Schulman: Phishing with Asterisk PBX from 2023-12-12T18:58:04.965526

"As many people are becoming more accustom to phishing attacks, standard website and e-mail phishing schemes are becoming harder to accomplish. This presentation breaks all of the phishing norms to...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Bala Neerumalla: SQL Injections by truncation from 2023-12-12T18:58:04.958746

"In this talk, I will discuss some ways to circumvent common mitigations of SQL Injection vulnerabilities in dynamic SQL. I will then suggest ways to protect against them.Bala Neerumalla specialize...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit from 2023-12-12T18:58:04.952910

"This talk shall focus on exploit development from vulnerabilities. We have seen many postings on security forums which vaguely describe a vulnerability, or sometimes provide a"proof-of-concept"exp...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
SensePost: A Tale of Two Proxies from 2023-12-12T18:58:04.941718

"During this presentation SensePost will discuss and demonstrate two pieces of new technology - the Suru WebProxy and the SP_LR Generic network proxy.The Suru web proxy is an inline web proxy (the ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms from 2023-12-12T18:58:04.934785

"This presentation prepares attackers and defenders to perform automated testing of some popular Windows® interprocess communication mechanisms. The testing will focus on binary win32 applications,...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Mariusz Burdach: Physical Memory Forensics from 2023-12-12T18:58:04.928122

"Historically, only file systems were considered as locations where evidence could be found. But what about the volatile memory which contains a huge amount of useful information such as the conten...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks from 2023-12-12T18:58:04.921407

"VoIP applications went mainstream, although the underlying protocols are still undergoing constant development. The SIP protocol being the main driver behind this has been analyzed, fuzzed and put...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Pete Finnigan: How to Unwrap Oracle PL/SQL from 2023-12-12T18:58:04.916002

"PL/SQL is the flagship language used inside the Oracle database for many years and through many versions to allow customers to implement their business rules and logic. Oracle has recognized that ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Halvar Flake: RE 2006: New Challenges Need Changing Tools from 2023-12-12T18:58:04.908614

"Reverse Engineering has come a long way-what used to be practiced behind closed doors is now a mainstream occupation practiced throughout the security industry. Compilers and languages are changin...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Dan Kaminsky: Black Ops 2006 from 2023-12-12T18:58:04.902732

"The known topics for this year include:1. The Worldwide SSL Analysis-There's a major flaw in the way many, many SSL devices operate. I'll discuss how widespread this flaw is, as well as announce r...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Bruce Potter: The Trusted Computing Revolution from 2023-12-12T18:58:04.896375

"Trusted computing is considered a dirty word by many due to its use for Digital Rights Management (DRM). There is a different side of trusted computing, however, that can solve problems informatio...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Ofir Arkin: Bypassing Network Access Control (NAC) Systems from 2023-12-12T18:58:04.889521

"The threat of viruses, worms, information theft and lack of control of the IT infrastructure lead companies to implement security solutions to control the access to their internal IT networks.A ne...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Neal Krawetz (Dr): You are what you type: No classical computer forensics from 2023-12-12T18:58:04.882198

"In an online world, anonymity seems easy. Network addresses can be cloaked and files can be manipulated. People rapidly change virtual names, genders, and skills. But even with these precautions, ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
David Endler: Hacking VOIP Exposed from 2023-12-12T18:58:04.874269

"Lately there seems to be an explosion of press hype around the possibility of hackers exploiting Voice-over-IP networks and services (Skype, Vonage, etc.). VoIP Spam, Caller ID Spoofing, Toll Frau...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
David Litchfield : All New Zero Day from 2023-12-12T18:58:04.866455

David Litchfield specializes in searching for new threats to database systems and web applications. He has lectured to both British and U.S. government security agencies on database security and is...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends from 2023-12-12T18:58:04.860239

"As one of the pioneers of partnerships for the FBI, Dan Larkin of the FBI’s Cyber Division will outline how the FBI has taken this concept from rhetoric to reality over the past 5 years. This pres...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2022-03-07T00:16:17.060548

"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem? from 2022-02-22T11:05:41.778750

"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case from 2022-02-22T11:05:41.777916

The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure software. Think risk driven design, think like an at...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Billy Hoffman: Analysis od Web application worms and Viruses from 2022-02-22T11:05:41.757941

"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in w...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway from 2022-02-22T11:05:41.757132

"Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an option, especially for closed-source, black-box...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics from 2022-02-22T11:05:41.756358

"Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analysis time. Call sequence, assembly instruction s...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Corey Benninger: Finding Gold in the Browser Cache from 2022-02-22T11:05:41.755510

"Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular web browser caches. This discussion will focu...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Panel: The Jericho Forum and Challenge from 2022-02-22T11:05:41.754493

"In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking participants through the initial problem statement and what people need to go away and start imp...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems from 2022-02-22T11:05:41.751275

"Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dumb machines that perform a specific, repetitive function. Today's devices are far different than ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity from 2022-02-22T11:05:41.749358

"To be able to defend against IT security attacks, one has to understand the attack patterns and henceforth the vulnerabilities of the attached devices. But, for an in-depth risk analysis, pure tec...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
William B Kimball: Code Integration-Based Vulnerability Auditing from 2022-02-22T11:05:41.748602

There is a growing need to develop improved methods for discovering vulnerabilities in closed-source software. The tools and techniques used to automate searching for these vulnerabilities are eith...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth from 2022-02-22T11:05:41.747870

"Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios and so on… Thanks to increasingly flexible low-cost 802.11 chipsets we are now able to encode a...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Panel: Disclosure Discussion from 2022-02-22T11:05:41.747091

Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure debate agree that working together rather than apart is the best way to secure our information. B...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono from 2022-02-22T11:05:41.746071

"Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live with a laptop in easy reach, it’s going to have an effect on our workday. For users there’s a new U...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design from 2022-02-22T11:05:41.744297

"Online games are very popular and represent some of the most complex multi-user applications in the world. World of Warcraft® takes center stage with over 5 million players worldwide. In these per...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jonathan Squire: $30, 30 Minutes, 30 Networks from 2022-02-22T11:05:41.741199

"Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could build a device that could play your digital music, display pictures, and listen to your neighbo...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jeff Waldron: VOIP Security Essentials from 2022-02-22T11:05:41.740326

"The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) technology. The practical uses of VoIP will be discussed along with the advantages and disadvantages o...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs from 2022-02-22T11:05:41.739545

"Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the tools and procedures to protect such resources are absent. The presentation will attempt to brid...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Johnny Long: Secrets of the Hollywood Hacker from 2022-02-22T11:05:41.738477

"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad jus...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion from 2022-02-22T11:05:41.736894

Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on eluding IDS, but the gap between the attackers and the defenders has never been wider. This present...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger from 2022-02-22T11:05:41.677304

"Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemented in Greasemonkey, its purpose is to automate several common tasks employed during the early s...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Tom Gallagher: Finding and Preventing Cross-Site Request Forgery from 2022-02-22T11:05:41.676384

"There is an often overlooked security design flaw in many web applications today. Web applications often take user input through HTML forms. When privileged operations are performed, the server ve...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications from 2022-02-22T11:05:41.675404

"How often have you encountered random-looking cookies or other data in a web application that didn‚t easily decode to human readable text? What did you do next-ignore it and move on, assuming that...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
John Lambert: Security Engineering in Windows Vista from 2022-02-22T11:05:41.674170

This presenation will offer a technical overview of the security engineering process behind Windows Vista. Windows Vista is the first end-to-end major OS release in the Trustworthy Computing era fr...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy from 2022-02-22T11:05:41.669904

This topic will present a new web-app/DB pen-test tool. This tool supports both proxy (passive) mode as well as direct URL targeting. It is a mixed Web App SQL Injection systematic pen-test and Web...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Charles Edge: Attacking Apple’s Xsan from 2022-02-22T11:05:41.668813

"A fundamental of many SAN solutions is to use metadata to provide shared access to a SAN. This is true in iSCSI or FibreChannel and across a wide variety of products. Metadata can offer a way arou...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems from 2022-02-22T11:05:41.663543

"This presentation will discuss the use of RSS and Atom feeds as method of delivering exploits to client systems. In our research we have found a number of RSS clients, both local and web-based, th...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Nicolas Fischbach: Carrier VoIP Security from 2022-02-22T11:05:41.658079

"VoIP, IMS, FMC, NGN, PacketCore, MPLS. Put those together and you are looking at the next security nightmare when it comes to Service Provider infrastructure security. Carriers are already moving ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees from 2022-02-22T11:05:41.657281

Today’s privacy requirements place significant additional auditing burdens on databases. First you have to know which databases in your environment contain regulated Personally Identifiable Informa...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Jeremy Rauch: PDB: The Protocol DeBugger from 2022-02-22T11:05:41.656452

"It's late. You've been assigned the unenviable task of evaluating the security of this obtuse application suite. 2006! Why doesn't everything just use SSL as its transport? No time for excuses. De...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats from 2022-02-22T11:05:41.651370

This session will examine the threat of spyware to corporations. What does the threat currently look like and how is it evolving? What market forces are at play? How big of a threat is spyware for ...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Paul Böhm: Taming Bugs: The Art and Science of Writing Secure Code from 2022-02-22T11:05:41.650363

If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Pr...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Kevin Mandia: The State of Incidence Response from 2022-02-22T11:05:41.647834

"During the course of 2005 and 2006, we have responded to dozens of computer security incidents at some of America’s largest organizations. Mr. Mandia was on the front lines assisting these organiz...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Johnny cache and David Maynor: Device Drivers from 2021-01-31T22:10:42.023393

Application level security is getting better. Basic stack based string overflows have become rare, and even simple heap overflows are getting hard to find. Despite this fact there is still a huge a...

Listen
Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference
Panel: Meet the Feds: OODA Loop and the Science of Security from 2021-01-31T22:10:42.023393

"The OODA Loop theory was conceived by Col John Boyd, AF fighter pilot. He believed that a pilot in a lethal engagement that could Observe, Orient, Decide, and Act (OODA) before his adversary had a...

Listen