Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

61 episodes

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 cbr 64k audio format. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2005 and download them. Put up the .pdfs in one window while listening the talks in the other. Almost as good as being there!

Podcasts

Philip R. Zimmermann: The Unveiling of My Next Big Project

Published: June 4, 2006, 11:11 p.m.
Duration: 50 minutes 49 seconds

Listed in: Technology

Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

Published: June 4, 2006, 11:11 p.m.
Duration: 1 hour 5 minutes 10 seconds

Listed in: Technology

Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers

Published: June 4, 2006, 11:11 p.m.
Duration: 48 minutes 55 seconds

Listed in: Technology

Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation

Published: June 4, 2006, 11:11 p.m.
Duration: 1 hour 15 minutes 1 second

Listed in: Technology

Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows

Published: June 4, 2006, 11:11 p.m.
Duration: 1 hour 16 minutes 57 seconds

Listed in: Technology

Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0

Published: June 4, 2006, 11:11 p.m.
Duration: 53 minutes 49 seconds

Listed in: Technology

spoonm and skape: Beyond EIP

Published: June 4, 2006, 11:11 p.m.
Duration: 30 minutes 38 seconds

Listed in: Technology

Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps

Published: June 4, 2006, 11:11 p.m.
Duration: 1 hour 12 minutes 18 seconds

Listed in: Technology

Michael Sutton and Adam Greene: The Art of File Format Fuzzing

Published: June 4, 2006, 11:11 p.m.
Duration: 43 minutes 18 seconds

Listed in: Technology

Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 14 minutes 10 seconds

Listed in: Technology

Derek Soeder and Ryan Permeh: eEye BootRoot

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 13 minutes 44 seconds

Listed in: Technology

Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards

Published: June 4, 2006, 11:10 p.m.
Duration: 41 minutes 11 seconds

Listed in: Technology

SensePost: Automation - Deus ex Machina or Rube Goldberg Machine?

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 6 minutes 46 seconds

Listed in: Technology

Mike Pomraning: Injection Flaws: Stop Validating Your Input

Published: June 4, 2006, 11:10 p.m.
Duration: 29 minutes 21 seconds

Listed in: Technology

Ejovi Nuwere and Mikko Varpiola: The Art of SIP fuzzing and Vulnerabilities Found in VoIP

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 4 minutes 21 seconds

Listed in: Technology

Panel: CISO QA with Jeff Moss

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 seconds

Listed in: Technology

Shawn Moyer: Owning the C-suite: Corporate Warfare as a Social Engineering Problem

Published: June 4, 2006, 11:10 p.m.
Duration: 18 minutes 36 seconds

Listed in: Technology

Robert Morris: The Non-Cryptographic Ways of Losing Information

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 2 minutes 59 seconds

Listed in: Technology

Panel: The National ID Debate

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 12 minutes 8 seconds

Listed in: Technology

Kevin Mandia: Performing Effective Incident Response

Published: June 4, 2006, 11:10 p.m.
Duration: 59 minutes 18 seconds

Listed in: Technology

David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?

Published: June 4, 2006, 11:10 p.m.
Duration: 36 minutes 40 seconds

Listed in: Technology

Simple Nomad and MadHat Unspecific: SPA: Single Packet Authorization

Published: June 4, 2006, 11:10 p.m.
Duration: 19 minutes 27 seconds

Listed in: Technology

Johnny Long: Google Hacking for Penetration Testers

Published: June 4, 2006, 11:10 p.m.
Duration: 8 minutes 49 seconds

Listed in: Technology

Ben Laurie: CaPerl: Running Hostile Code Safely

Published: June 4, 2006, 11:10 p.m.
Duration: 46 minutes 46 seconds

Listed in: Technology

David Litchfield: All New 0-Day

Published: June 4, 2006, 11:10 p.m.
Duration: 40 minutes 11 seconds

Listed in: Technology

Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process

Published: June 4, 2006, 11:10 p.m.
Duration: 40 minutes 54 seconds

Listed in: Technology

Barnaby Jack: Remote Windows Kernel Exploitation - Step In To the Ring 0

Published: June 4, 2006, 11:10 p.m.
Duration: 36 minutes 8 seconds

Listed in: Technology

Robert J. Hansen and Meredith L. Patterson: Stopping Injection Attacks with Computational Theory

Published: June 4, 2006, 11:10 p.m.
Duration: 49 minutes 29 seconds

Listed in: Technology

Allen Harper and Edward Balas: GEN III Honeynets: The birth of roo

Published: June 4, 2006, 11:10 p.m.
Duration: 51 minutes 27 seconds

Listed in: Technology

Jeremiah Grossman: Phishing with Super Bait

Published: June 4, 2006, 11:10 p.m.
Duration: 57 minutes 14 seconds

Listed in: Technology

The Grugq: The Art of Defiling: Defeating Forensic Analysis

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 9 minutes 18 seconds

Listed in: Technology

Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 12 minutes 47 seconds

Listed in: Technology

Jennifer Stisa Granick: Top Ten Legal Issues in Computer Security

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 12 minutes 57 seconds

Listed in: Technology

Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 1 minute 42 seconds

Listed in: Technology

Esteban Martinez Fayo: Advanced SQL Injection in Oracle Databases

Published: June 4, 2006, 11:10 p.m.
Duration: 52 minutes 3 seconds

Listed in: Technology

James C. Foster: BlackHat Standup: "Yea I'm a Hacker"

Published: June 4, 2006, 11:10 p.m.
Duration: 15 minutes 54 seconds

Listed in: Technology

Yuan Fan: Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection

Published: June 4, 2006, 11:10 p.m.
Duration: 20 minutes 1 second

Listed in: Technology

Himanshu Dwivedi: iSCSI Security (Insecure SCSI)

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 11 minutes 48 seconds

Listed in: Technology

Tyler Close: Shatter-proofing Windows

Published: June 4, 2006, 11:10 p.m.
Duration: 26 minutes 16 seconds

Listed in: Technology

Greg Conti: Beyond Ethereal: Crafting A Tivo for Security Datastreams

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 10 minutes 19 seconds

Listed in: Technology

Ian Clarke and Oskar Sandberg: Routing in the Dark: Scalable Searches in Dark P2P Networks.

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 44 seconds

Listed in: Technology

Tzi-cker Chiueh: Checking Array Bound Violation Using Segmentation Hardware

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 2 minutes 8 seconds

Listed in: Technology

Jim Christy: The Defense Cyber Crime Center

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 4 minutes 2 seconds

Listed in: Technology

Cesar Cerrudo:Demystifying MS SQL Server and Oracle Database Server Security

Published: June 4, 2006, 11:10 p.m.
Duration: 21 minutes 9 seconds

Listed in: Technology

Kevin Cardwell:Toolkits: All-in-One Approach to Security

Published: June 4, 2006, 11:10 p.m.
Duration: 23 minutes 40 seconds

Listed in: Technology

Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking

Published: June 4, 2006, 11:10 p.m.
Duration: 59 minutes 32 seconds

Listed in: Technology

Renaud Bidou: A Dirty BlackMail DoS Story

Published: June 4, 2006, 11:10 p.m.
Duration: 16 minutes 16 seconds

Listed in: Technology

Darrin Barrall and David Dewey: Plug and Root, the USB Key to the Kingdom

Published: June 4, 2006, 11:10 p.m.
Duration: 31 minutes 51 seconds

Listed in: Technology

Darrin Barrall:Shakespearean Shellcode

Published: June 4, 2006, 11:10 p.m.
Duration: 16 minutes 10 seconds

Listed in: Technology

Ofir Arkin: A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 12 minutes 4 seconds

Listed in: Technology

Panel: The Future of Personal Information

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 13 minutes 46 seconds

Listed in: Technology

Akshay Aggarwal: Rapid Threat Modeling

Published: June 4, 2006, 11:10 p.m.
Duration: 25 minutes 35 seconds

Listed in: Technology

Gilman Louie: Investing in Our Nation's Security

Published: June 4, 2006, 11:10 p.m.
Duration: 55 minutes 6 seconds

Listed in: Technology