Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

86 episodes

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there! Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Podcasts

Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends

Published: June 4, 2006, 11:10 p.m.
Duration: 54 minutes 41 seconds

Listed in: Technology

David Litchfield : All New Zero Day

Published: June 4, 2006, 11:10 p.m.
Duration: 45 minutes 14 seconds

Listed in: Technology

David Endler: Hacking VOIP Exposed

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 2 minutes 39 seconds

Listed in: Technology

Neal Krawetz (Dr): You are what you type: No classical computer forensics

Published: June 4, 2006, 11:10 p.m.
Duration: 47 minutes 47 seconds

Listed in: Technology

Ofir Arkin: Bypassing Network Access Control (NAC) Systems

Published: June 4, 2006, 11:10 p.m.
Duration: 51 minutes 17 seconds

Listed in: Technology

Bruce Potter: The Trusted Computing Revolution

Published: June 4, 2006, 11:10 p.m.
Duration: 44 minutes 41 seconds

Listed in: Technology

Dan Kaminsky: Black Ops 2006

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 27 seconds

Listed in: Technology

Halvar Flake: RE 2006: New Challenges Need Changing Tools

Published: June 4, 2006, 11:10 p.m.
Duration: 45 minutes 20 seconds

Listed in: Technology

Pete Finnigan: How to Unwrap Oracle PL/SQL

Published: June 4, 2006, 11:10 p.m.
Duration: 53 minutes 53 seconds

Listed in: Technology

Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks

Published: June 4, 2006, 11:10 p.m.
Duration: 51 minutes 21 seconds

Listed in: Technology

Mariusz Burdach: Physical Memory Forensics

Published: June 4, 2006, 11:10 p.m.
Duration: 44 minutes 48 seconds

Listed in: Technology

Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 minutes 33 seconds

Listed in: Technology

SensePost: A Tale of Two Proxies

Published: June 4, 2006, 11:10 p.m.
Duration: 40 minutes 52 seconds

Listed in: Technology

Tom Ptacek and Dave Goldsmith: Do Enterprise Management Applications Dream of Electric Sheep?

Published: June 4, 2006, 11:10 p.m.
Duration: 59 minutes 50 seconds

Listed in: Technology

Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 15 minutes 11 seconds

Listed in: Technology

Bala Neerumalla: SQL Injections by truncation

Published: June 4, 2006, 11:10 p.m.
Duration: 28 minutes 17 seconds

Listed in: Technology

Jay Schulman: Phishing with Asterisk PBX

Published: June 4, 2006, 11:10 p.m.
Duration: 48 minutes 51 seconds

Listed in: Technology

Kevin Mandia: The State of Incidence Response

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 8 minutes 14 seconds

Listed in: Technology

Shawn Embleton, Sherri Sparks & Ryan Cunningham: "Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 14 minutes 21 seconds

Listed in: Technology

Johnny cache and David Maynor: Device Drivers

Published: June 4, 2006, 11:10 p.m.
Duration: 57 minutes 16 seconds

Listed in: Technology

Paul Bohm: Taming Bugs: The Art and Science of Writing Secure Code

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 6 minutes 39 seconds

Listed in: Technology

Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats

Published: June 4, 2006, 11:10 p.m.
Duration: 2 hours 16 minutes 8 seconds

Listed in: Technology

Alexander Kornbrust: Oracle Rootkits 2.0

Published: June 4, 2006, 11:10 p.m.
Duration: 43 minutes 3 seconds

Listed in: Technology

Doug Mohney: Defending Against Social Engineering with Voice Analytics

Published: June 4, 2006, 11:10 p.m.
Duration: 45 minutes 56 seconds

Listed in: Technology

Chuck Willis : Web application Incident Response and forensics- A Whole new ball game.

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 minutes 33 seconds

Listed in: Technology

Scott Stender: Attacking Internationialized software

Published: June 4, 2006, 11:10 p.m.
Duration: 50 minutes 36 seconds

Listed in: Technology

FX: Analysing Complex Systems: The BlackBerry Case

Published: June 4, 2006, 11:10 p.m.
Duration: 57 minutes 34 seconds

Listed in: Technology

Jeremy Rauch: PDB: The Protocol DeBugger

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 minutes 36 seconds

Listed in: Technology

Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 3 minutes 50 seconds

Listed in: Technology

Nicolas Fischbach: Carrier VoIP Security

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 minutes 36 seconds

Listed in: Technology

Johnny Long: Death By 1000 cuts

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 1 minute 15 seconds

Listed in: Technology

Michael Sutton & Greg MacManus: Punk Ode - Hiding shellcode in plain sight

Published: June 4, 2006, 11:10 p.m.
Duration: 58 minutes 50 seconds

Listed in: Technology

Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator

Published: June 4, 2006, 11:10 p.m.
Duration: 58 minutes 50 seconds

Listed in: Technology

HD Moore: Metasploit Reloaded

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 14 minutes 7 seconds

Listed in: Technology

Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 8 minutes 55 seconds

Listed in: Technology

Hacker Court Part 2: Hacker Court 2006: Sex, Lies and Sniffers

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 34 minutes 17 seconds

Listed in: Technology

Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems

Published: June 4, 2006, 11:10 p.m.
Duration: 43 minutes 5 seconds

Listed in: Technology

Melanie Rieback: RFID Malware Demystified

Published: June 4, 2006, 11:10 p.m.
Duration: 51 minutes 38 seconds

Listed in: Technology

Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques

Published: June 4, 2006, 11:10 p.m.
Duration: 42 minutes 20 seconds

Listed in: Technology

Emmanuele Zambon: "NIDS, false positive reduction through anomaly detection"

Published: June 4, 2006, 11:10 p.m.
Duration: 48 minutes 40 seconds

Listed in: Technology

Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach

Published: June 4, 2006, 11:10 p.m.
Duration: 57 minutes 13 seconds

Listed in: Technology

Panel: Meet the Feds: OODA Loop and the Science of Security

Published: June 4, 2006, 11:10 p.m.
Duration: 48 minutes 34 seconds

Listed in: Technology

Charles Edge: Attacking Apples Xsan

Published: June 4, 2006, 11:10 p.m.
Duration: 16 minutes 19 seconds

Listed in: Technology

Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy

Published: June 4, 2006, 11:10 p.m.
Duration: 21 minutes 40 seconds

Listed in: Technology

Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous

Published: June 4, 2006, 11:10 p.m.
Duration: 54 minutes 51 seconds

Listed in: Technology

Lukas Grunwald: "New Attack to RFID-Systems and their Middle ware and Backends"

Published: June 4, 2006, 11:10 p.m.
Duration: 40 minutes 9 seconds

Listed in: Technology

Dino Dai Zovi: Hardware Virtualization Based Rootkits

Published: June 4, 2006, 11:10 p.m.
Duration: 50 minutes 10 seconds

Listed in: Technology

Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches

Published: June 4, 2006, 11:10 p.m.
Duration: 56 minutes 25 seconds

Listed in: Technology

John Lambert: Security Engineering in Windows Vista

Published: June 4, 2006, 11:10 p.m.
Duration: 48 minutes 19 seconds

Listed in: Technology

Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 1 second

Listed in: Technology

Tom Gallagher: Finding and Preventing Cross-Site Request Forgery

Published: June 4, 2006, 11:10 p.m.
Duration: 20 minutes 5 seconds

Listed in: Technology

Billy Hoffman: Ajax (in)security

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 12 minutes 34 seconds

Listed in: Technology

Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

Published: June 4, 2006, 11:10 p.m.
Duration: 49 minutes 20 seconds

Listed in: Technology

Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0

Published: June 4, 2006, 11:10 p.m.
Duration: 55 minutes 57 seconds

Listed in: Technology

Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 21 minutes 50 seconds

Listed in: Technology

Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista

Published: June 4, 2006, 11:10 p.m.
Duration: 58 minutes 40 seconds

Listed in: Technology

Johnny Long: Secrets of the Hollywood Hacker

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 4 minutes 30 seconds

Listed in: Technology

Himanshu Dwivedi: Im Going To Shoot The Next Person Who Says VLANs

Published: June 4, 2006, 11:10 p.m.
Duration: 24 minutes 8 seconds

Listed in: Technology

Jeff Waldron: VOIP Security Essentials

Published: June 4, 2006, 11:10 p.m.
Duration: 17 minutes 23 seconds

Listed in: Technology

Jonathan Squire: $30, 30 Minutes, 30 Networks

Published: June 4, 2006, 11:10 p.m.
Duration: 17 minutes 22 seconds

Listed in: Technology

Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 11 minutes 39 seconds

Listed in: Technology

Bruce Potter: Bluetooth Defense kit

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 3 minutes 11 seconds

Listed in: Technology

Greg Hoglund: Hacking World of Warcraft: An Exercise in Advanced Rootkit Design

Published: June 4, 2006, 11:10 p.m.
Duration: 49 minutes 37 seconds

Listed in: Technology

Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 14 minutes 57 seconds

Listed in: Technology

Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono

Published: June 4, 2006, 11:10 p.m.
Duration: 58 minutes 29 seconds

Listed in: Technology

Panel: Disclosure Discussion

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 10 minutes 9 seconds

Listed in: Technology

Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth

Published: June 4, 2006, 11:10 p.m.
Duration: 17 minutes 21 seconds

Listed in: Technology

William B Kimball: Code Integration-Based Vulnerability Auditing

Published: June 4, 2006, 11:10 p.m.
Duration: 15 minutes 43 seconds

Listed in: Technology

Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity

Published: June 4, 2006, 11:10 p.m.
Duration: 21 minutes 52 seconds

Listed in: Technology

Dan Moniz & HD Moore: Six Degrees of XSSploitation

Published: June 4, 2006, 11:10 p.m.
Duration: 43 minutes 55 seconds

Listed in: Technology

Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 50 seconds

Listed in: Technology

Alexander Tereshkin: Rootkits: Attacking Personal Firewalls

Published: June 4, 2006, 11:10 p.m.
Duration: 51 minutes 41 seconds

Listed in: Technology

Renaud BIDOU: IPS Short comings

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 5 minutes 25 seconds

Listed in: Technology

Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 7 minutes 10 seconds

Listed in: Technology

Panel: The Jericho Forum and Challenge

Published: June 4, 2006, 11:10 p.m.
Duration: 2 hours 16 minutes 46 seconds

Listed in: Technology

Corey Benninger: Finding Gold in the Browser Cache

Published: June 4, 2006, 11:10 p.m.
Duration: 17 minutes 58 seconds

Listed in: Technology

Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics

Published: June 4, 2006, 11:10 p.m.
Duration: 26 minutes 6 seconds

Listed in: Technology

Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway

Published: June 4, 2006, 11:10 p.m.
Duration: 24 minutes 47 seconds

Listed in: Technology

Billy Hoffman: Analysis od Web application worms and Viruses

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 22 minutes 57 seconds

Listed in: Technology

David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 6 minutes 14 seconds

Listed in: Technology

Joanna Rutkowska: Rootkits vs Stealth by design Malware

Published: June 4, 2006, 11:10 p.m.
Duration: 1 hour 19 minutes 50 seconds

Listed in: Technology

Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.

Published: June 4, 2006, 11:10 p.m.
Duration: 21 minutes 11 seconds

Listed in: Technology

Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7

Published: June 4, 2006, 11:10 p.m.
Duration: 45 minutes 18 seconds

Listed in: Technology

Marco M. Morana: Building Security into the Software Life Cycle, a Business Case

Published: June 4, 2006, 11:10 p.m.
Duration: 24 minutes 33 seconds

Listed in: Technology

Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?

Published: June 4, 2006, 11:10 p.m.
Duration: 20 minutes 9 seconds

Listed in: Technology