Black Hat Briefings, Las Vegas 2006 [Video] Presentations from the security conference

By Jeff Moss

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Jeff Moss

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2
Reviews: 0
Episodes: 86

Description

Past speeches and talks from the Black Hat Briefings computer security conferences.
The Black Hat Briefings USA 2006 was held August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.
A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html


Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo


If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!;br>
Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Episode Date
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?
Jun 04, 2006
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case
Jun 04, 2006
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7
Jun 04, 2006
Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.
Jun 04, 2006
Joanna Rutkowska: Rootkits vs Stealth by design Malware
Jun 04, 2006
David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's
Jun 04, 2006
Billy Hoffman: Analysis od Web application worms and Viruses
Jun 04, 2006
Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway
Jun 04, 2006
Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics
Jun 04, 2006
Corey Benninger: Finding Gold in the Browser Cache
Jun 04, 2006
Panel: The Jericho Forum and Challenge
Jun 04, 2006
Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance
Jun 04, 2006
Renaud BIDOU: IPS Short comings
Jun 04, 2006
Alexander Tereshkin: Rootkits: Attacking Personal Firewalls
Jun 04, 2006
Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems
Jun 04, 2006
Dan Moniz & HD Moore: Six Degrees of XSSploitation
Jun 04, 2006
Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity
Jun 04, 2006
William B Kimball: Code Integration-Based Vulnerability Auditing
Jun 04, 2006
Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth
Jun 04, 2006
Panel: Disclosure Discussion
Jun 04, 2006
Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono
Jun 04, 2006
Stephano Zanero: Host Based Anomaly Detection on System calls arguments
Jun 04, 2006
Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design
Jun 04, 2006
Bruce Potter: Bluetooth Defense kit
Jun 04, 2006
Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0
Jun 04, 2006
Jonathan Squire: $30, 30 Minutes, 30 Networks
Jun 04, 2006
Jeff Waldron: VOIP Security Essentials
Jun 04, 2006
Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs
Jun 04, 2006
Johnny Long: Secrets of the Hollywood Hacker
Jun 04, 2006
Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista
Jun 04, 2006
Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion
Jun 04, 2006
Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0
Jun 04, 2006
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device
Jun 04, 2006
Billy Hoffman: Ajax (in)security
Jun 04, 2006
Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger
Jun 04, 2006
Tom Gallagher: Finding and Preventing Cross-Site Request Forgery
Jun 04, 2006
Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications
Jun 04, 2006
John Lambert: Security Engineering in Windows Vista
Jun 04, 2006
Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches
Jun 04, 2006
Dino Dai Zovi: Hardware Virtualization Based Rootkits
Jun 04, 2006
Lukas Grunwald: "New Attack to RFID-Systems and their Middle ware and Backends"
Jun 04, 2006
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous
Jun 04, 2006
Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy
Jun 04, 2006
Charles Edge: Attacking Apple’s Xsan
Jun 04, 2006
Panel: Meet the Feds: OODA Loop and the Science of Security
Jun 04, 2006
Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach
Jun 04, 2006
Emmanuele Zambon: "NIDS, false positive reduction through anomaly detection"
Jun 04, 2006
Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques
Jun 04, 2006
Melanie Rieback: RFID Malware Demystified
Jun 04, 2006
Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems
Jun 04, 2006
Hacker Court Part 2: Hacker Court 2006: Sex, Lies and Sniffers
Jun 04, 2006
Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers
Jun 04, 2006
HD Moore: Metasploit Reloaded
Jun 04, 2006
Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator
Jun 04, 2006
Michael Sutton & Greg MacManus: Punk Ode - Hiding shellcode in plain sight
Jun 04, 2006
Johnny Long: Death By 1000 cuts
Jun 04, 2006
Nicolas Fischbach: Carrier VoIP Security
Jun 04, 2006
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees
Jun 04, 2006
Jeremy Rauch: PDB: The Protocol DeBugger
Jun 04, 2006
FX: Analysing Complex Systems: The BlackBerry Case
Jun 04, 2006
Scott Stender: Attacking Internationialized software
Jun 04, 2006
Chuck Willis : Web application Incident Response and forensics- A Whole new ball game.
Jun 04, 2006
Doug Mohney: Defending Against Social Engineering with Voice Analytics
Jun 04, 2006
Alexander Kornbrust: Oracle Rootkits 2.0
Jun 04, 2006
Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats
Jun 04, 2006
Paul Böhm: Taming Bugs: The Art and Science of Writing Secure Code
Jun 04, 2006
Johnny cache and David Maynor: Device Drivers
Jun 04, 2006
Shawn Embleton, Sherri Sparks & Ryan Cunningham: "Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting
Jun 04, 2006
Kevin Mandia: The State of Incidence Response
Jun 04, 2006
Jay Schulman: Phishing with Asterisk PBX
Jun 04, 2006
Bala Neerumalla: SQL Injections by truncation
Jun 04, 2006
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit
Jun 04, 2006
Tom Ptacek and Dave Goldsmith: Do Enterprise Management Applications Dream of Electric Sheep?
Jun 04, 2006
SensePost: A Tale of Two Proxies
Jun 04, 2006
Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms
Jun 04, 2006
Mariusz Burdach: Physical Memory Forensics
Jun 04, 2006
Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks
Jun 04, 2006
Pete Finnigan: How to Unwrap Oracle PL/SQL
Jun 04, 2006
Halvar Flake: RE 2006: New Challenges Need Changing Tools
Jun 04, 2006
Dan Kaminsky: Black Ops 2006
Jun 04, 2006
Bruce Potter: The Trusted Computing Revolution
Jun 04, 2006
Ofir Arkin: Bypassing Network Access Control (NAC) Systems
Jun 04, 2006
Neal Krawetz (Dr): You are what you type: No classical computer forensics
Jun 04, 2006
David Endler: Hacking VOIP Exposed
Jun 04, 2006
David Litchfield : All New Zero Day
Jun 04, 2006
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends
Jun 04, 2006