Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Kanal-Details

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Ersteller: Jeff Moss

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year annive...

EN Vereinigte Staaten Technologie

Neueste Episoden

86 Episoden
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?

Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?

Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed...

2006-06-04 16:10:19 20:09
Herunterladen
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case

Marco M. Morana: Building Security into the Software Life Cycle, a Business Case

The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure softw...

2006-06-04 16:10:19 24:33
Herunterladen
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7

Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7

Tony Chor will discuss Microsoft’s security engineering methodology and how it is being applied to the development of Internet Explorer 7. He will det...

2006-06-04 16:10:19 45:18
Herunterladen
Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.

Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.

The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any publis...

2006-06-04 16:10:19 21:11
Herunterladen
Joanna Rutkowska: Rootkits vs Stealth by design Malware

Joanna Rutkowska: Rootkits vs Stealth by design Malware

The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta...

2006-06-04 16:10:19 1:19:50
Herunterladen
David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's

David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's

This talk will go in-depth into methods for breaking crypto faster using FPGAs. FPGA's are chips that have millions of gates that can be programmed an...

2006-06-04 16:10:19 1:06:14
Herunterladen
Billy Hoffman: Analysis od Web application worms and Viruses

Billy Hoffman: Analysis od Web application worms and Viruses

Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms tha...

2006-06-04 16:10:19 1:22:57
Herunterladen
Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway

Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway

Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an o...

2006-06-04 16:10:19 24:47
Herunterladen
Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics

Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics

Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analys...

2006-06-04 16:10:19 26:06
Herunterladen
Corey Benninger: Finding Gold in the Browser Cache

Corey Benninger: Finding Gold in the Browser Cache

Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular...

2006-06-04 16:10:19 17:58
Herunterladen
Panel: The Jericho Forum and Challenge

Panel: The Jericho Forum and Challenge

In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking participants through the initial problem statement...

2006-06-04 16:10:19 2:16:46
Herunterladen
Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance

Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance

All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more sec...

2006-06-04 16:10:19 1:07:10
Herunterladen
Renaud BIDOU: IPS Short comings

Renaud BIDOU: IPS Short comings

Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and...

2006-06-04 16:10:19 1:05:25
Herunterladen
Alexander Tereshkin: Rootkits: Attacking Personal Firewalls

Alexander Tereshkin: Rootkits: Attacking Personal Firewalls

Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect the system from any malware threat with any level of...

2006-06-04 16:10:19 51:41
Herunterladen
Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems

Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems

Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dumb machines that perform a specific, repetitive fun...

2006-06-04 16:10:19 1:00:50
Herunterladen
Dan Moniz & HD Moore: Six Degrees of XSSploitation

Dan Moniz & HD Moore: Six Degrees of XSSploitation

Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the "samy is my hero" incident in late 2005. XSS af...

2006-06-04 16:10:19 43:55
Herunterladen
Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity

Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity

To be able to defend against IT security attacks, one has to understand the attack patterns and henceforth the vulnerabilities of the attached devices...

2006-06-04 16:10:19 21:52
Herunterladen
William B Kimball: Code Integration-Based Vulnerability Auditing

William B Kimball: Code Integration-Based Vulnerability Auditing

There is a growing need to develop improved methods for discovering vulnerabilities in closed-source software. The tools and techniques used to automa...

2006-06-04 16:10:19 15:43
Herunterladen
Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth

Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth

Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios and so on… Thanks to increasingly flexible low-co...

2006-06-04 16:10:19 17:21
Herunterladen
Panel: Disclosure Discussion

Panel: Disclosure Discussion

Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure debate agree that working together rather than apa...

2006-06-04 16:10:19 1:10:09
Herunterladen
Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono

Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono

Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live with a laptop in easy reach, it’s going to have an ef...

2006-06-04 16:10:19 58:29
Herunterladen
Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is...

2006-06-04 16:10:19 1:14:57
Herunterladen
Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design

Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design

Online games are very popular and represent some of the most complex multi-user applications in the world. World of Warcraft® takes center stage with...

2006-06-04 16:10:19 49:37
Herunterladen
Bruce Potter: Bluetooth Defense kit

Bruce Potter: Bluetooth Defense kit

In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life. From cars to phones to laptops to printers, Blueto...

2006-06-04 16:10:19 1:03:11
Herunterladen
Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0

Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0

The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of "Web 2.0" technol...

2006-06-04 16:10:19 1:11:39
Herunterladen
Jonathan Squire: $30, 30 Minutes, 30 Networks

Jonathan Squire: $30, 30 Minutes, 30 Networks

Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could build a device that could play your digital music...

2006-06-04 16:10:19 17:22
Herunterladen
Jeff Waldron: VOIP Security Essentials

Jeff Waldron: VOIP Security Essentials

The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) technology. The practical uses of VoIP will be discussed...

2006-06-04 16:10:19 17:23
Herunterladen
Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs

Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs

Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the tools and procedures to protect such resources are...

2006-06-04 16:10:19 24:08
Herunterladen
Johnny Long: Secrets of the Hollywood Hacker

Johnny Long: Secrets of the Hollywood Hacker

If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal"...

2006-06-04 16:10:19 1:04:30
Herunterladen
Abolade Gbadegesin :  The NetIO Stack - Reinventing TCP/IP in Windows Vista

Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista

TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial-of-service. Achieving resilience depends on facto...

2006-06-04 16:10:19 58:40
Herunterladen
Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion

Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion

Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on eluding IDS, but the gap between the attackers and t...

2006-06-04 16:10:19 1:21:50
Herunterladen
Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0

Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0

In the past couple years there have been major advances in the field of rootkit technology, from Jamie Butler and Sherri Sparks' Shadow Walker, to FU....

2006-06-04 16:10:19 55:57
Herunterladen
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictur...

2006-06-04 16:10:19 49:20
Herunterladen
Billy Hoffman: Ajax (in)security

Billy Hoffman: Ajax (in)security

Ajax can mean different things to different people. To a user, Ajax means smooth web applications like Google Maps or Outlook Web Access. To a develop...

2006-06-04 16:10:19 1:12:34
Herunterladen
Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger

Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger

Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemented in Greasemonkey, its purpose is to automate se...

2006-06-04 16:10:19 21:29
Herunterladen
Tom Gallagher: Finding and Preventing Cross-Site Request Forgery

Tom Gallagher: Finding and Preventing Cross-Site Request Forgery

There is an often overlooked security design flaw in many web applications today. Web applications often take user input through HTML forms. When priv...

2006-06-04 16:10:19 20:05
Herunterladen
Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications

Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications

How often have you encountered random-looking cookies or other data in a web application that didn‚t easily decode to human readable text? What did yo...

2006-06-04 16:10:19 1:00:01
Herunterladen
John Lambert: Security Engineering in Windows Vista

John Lambert: Security Engineering in Windows Vista

This presenation will offer a technical overview of the security engineering process behind Windows Vista. Windows Vista is the first end-to-end major...

2006-06-04 16:10:19 48:19
Herunterladen
Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches

Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches

Hotpatching is a common technique for modifying the behavior of a closed source applications and operating systems. It is not new, and has been used b...

2006-06-04 16:10:19 56:25
Herunterladen
Dino Dai Zovi: Hardware Virtualization Based Rootkits

Dino Dai Zovi: Hardware Virtualization Based Rootkits

Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating systems to be run at full speed and without modificatio...

2006-06-04 16:10:19 50:10
Herunterladen
0:00
0:00
Episode
Kein Titel verfügbar
Keine Kanalinfo