Black Hat Briefings, USA 2007 [Video] Presentations from the security conference.

By Jeff Moss

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Jeff Moss

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2
Reviews: 0
Episodes: 89

Description

Past speeches and talks from the Black Hat Briefings computer security conferences.

The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier.
A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp4 h.264 192k video format. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Episode Date
Gadi Evron: Estonia: Information Warfare and Strategic Lessons
Dec 11, 2007
HD Moore & Valsmith: Tactical Exploitation-Part 2
Dec 11, 2007
Joe Stewart: Just Another Windows Kernel Perl Hacker
Jan 09, 2006
Jerry Schneider: Reflection DNS Poisoning
Jan 09, 2006
Stephan Patton: Social Network Site Data Mining
Jan 09, 2006
Jeff Morin: Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage
Jan 09, 2006
Charlie Miller: Hacking Leopard: Tools and Techniques for Attacking the Newest Mac OS X
Jan 09, 2006
Iain Mcdonald: Longhorn Server Foundation & Server Roles
Jan 09, 2006
David Leblanc: Practical Sandboxing: Techniques for Isolating Processes
Jan 09, 2006
Zane Lackey: Point, Click, RTPInject
Jan 09, 2006
Greg Wroblewski: Reversing MSRC Updates: Case Studies of MSRC Bulletins 2004-2007
Jan 09, 2006
Dave G & Jeremy Rauch: Hacking Capitalism
Jan 09, 2006
Ero Carerra: Reverse Engineering Automation with Python
Jan 09, 2006
Mark Ryan Del Moral Talabis: The Security Analytics Project: Alternatives in Analysis
Jan 09, 2006
Phil Zimmermann: Z-Phone
Jan 09, 2006
Mark Vincent Yason: The Art of Unpacking
Jan 09, 2006
Chris Wysopal & Chris Eng: Static Detection of Application Backdoors
Jan 09, 2006
Ariel Waissbein: Timing attacks for recovering private entries from database engines
Jan 09, 2006
Eugene Tsyrklevich: OpenID: Single Sign-On for the Internet
Jan 09, 2006
Peter Thermos: Transparent Weaknesses in VoIP
Jan 09, 2006
Bryan Sullivan: Premature Ajax-ulation
Jan 09, 2006
Scott Stender: Blind Security Testing - An Evolutionary Approach
Jan 09, 2006
Alexander Sotirov: Heap Feng Shui in JavaScript
Jan 09, 2006
Window Snyder & Mike Shaver : Building and Breaking the Browser
Jan 09, 2006
Eric Schmeidl & Mike Spindel: Strengths and Weaknesses of Access Control Systems
Jan 09, 2006
Len Sassaman: Anonymity and its Discontents
Jan 09, 2006
Paul Vincent Sabanal: Reversing C++
Jan 09, 2006
Joanna Rutkowska & Alexander Tereshkin: IsGameOver(), anyone?
Jan 09, 2006
Dror-John Roecher: NACATTACK
Jan 09, 2006
Danny Quist & Valsmith: Covert Debugging: Circumventing Software Armoring Techniques
Jan 09, 2006
Thomas H. Ptacek, Peter Ferrie & Nate Lawson: Don't Tell Joanna, The Virtualized Rootkit Is Dead
Jan 09, 2006
Cody Pierce: PyEmu: A multi-purpose scriptable x86 emulator
Jan 09, 2006
Mike Perry: Securing the tor network
Jan 09, 2006
Chris Palmer: Breaking Forensics Software: Weaknesses in Critical Evidence Collectio
Jan 09, 2006
Chris Paget: RFID for Beginners++
Jan 09, 2006
Alfredo Ortega: OpenBSD Remote Exploit
Jan 09, 2006
Shawn Moyer: (un)Smashing the Stack: Overflows, Countermeasures, and the Real World
Jan 09, 2006
HD Moore & Valsmith: Tactical Exploitation-Part 1
Jan 09, 2006
Eric Monti & Dan Moniz: Defeating Extrusion Detection
Jan 09, 2006
Luis Miras: Other Wireless: New ways of being Pwned
Jan 09, 2006
Haroon Meer & Marco Slaviero: It's all about the timing
Jan 09, 2006
David Maynor & Robert Graham: Simple Solutions to Complex Problems from the Lazy Hacker?s Handbook: What Your Security Vendor Doesn?t Want You to Know .
Jan 09, 2006
David Litchfield: Database Forensics
Jan 09, 2006
Jonathan Lindsay: Attacking the Windows Kernel
Jan 09, 2006
Dr. Andrew Lindell: Anonymous Authentication-Preserving Your Privacy Online
Jan 09, 2006
Adam Laurie: RFIDIOts!!!- Practical RFID Hacking (Without Soldering Irons or Patent Attorneys)
Jan 09, 2006
Dr. Neal Krawetz: A Picture's Worth...
Jan 09, 2006
Dan Kaminsky: Black Ops 2007: Design Reviewing The Web
Jan 09, 2006
Jon Callas: Traffic Analysis -- The Most Powerful and Least Understood Attack Methods
Jan 09, 2006
Krishna Kurapati: Vulnerabilities in Wi-Fi/Dual-Mode VoIP Phones
Jan 09, 2006
Mikko Hypponen: Status of Cell Phone Malware in 2007
Jan 09, 2006
Greg Hoglund: Active Reversing: The Next Generation of Reverse Engineering
Jan 09, 2006
Billy Hoffman & John Terrill: The little Hybrid web worm that could
Jan 09, 2006
Jim Hoagland: Vista Network Attack Surface Analysis and Teredo Security Implications
Jan 09, 2006
Brad Hill: Attacking Web Service Securty: Message....
Jan 09, 2006
John Heasman: Hacking the extensible Firmware Interface
Jan 09, 2006
Nick Harbour: Stealth Secrets of the Malware Ninjas
Jan 09, 2006
Ezequiel D. Gutesman & Ariel Waissbein: A dynamic technique for enhancing the security and privacy of web applications
Jan 09, 2006
Jeremiah Grossman & Robert Hansen: Hacking Intranet Websites from the Outside (Take 2) - "Fun with and without JavaScript malware
Jan 09, 2006
Jennifer Granick: Disclosure and Intellectual Property Law: Case Studies
Jan 09, 2006
Kenneth Geers: Greetz from Room 101
Jan 09, 2006
Kevvie Fowler: SQL Server Database Forensics
Jan 09, 2006
Justin N. Ferguson: Understanding the Heap by Breaking It: A Case Study of the Heap as a Persistent Data Structure Through Non-traditional Exploitation Techniques
Jan 09, 2006
Ben Feinstein & Daniel Peck: CaffeineMonkey: Automated Collection, Detection and Analysis of Malicious JavaScript
Jan 09, 2006
Joel Eriksson & Panel: Kernel Wars
Jan 09, 2006
Mark Dowd, John Mcdonald & Neel Mehta: Breaking C++ Applications
Jan 09, 2006
Roger Dingledine: TOR
Jan 09, 2006
Rohit Dhamankar & Rob King: PISA: Protocol Identification via Statistical Analysis
Jan 09, 2006
Barrie Dempster: VOIP Security
Jan 09, 2006
Jared DeMott, Dr. Richard Enbody & Dr. Bill Punch: Revolutionizing the Field of Grey-box Attack Surface Testing with Evolutionary Fuzzing
Jan 09, 2006
Job De Haas: Side Channel Attacks (DPA) and Countermeasures for Embedded Systems
Jan 09, 2006
David Coffey & John Viega: Building an Effective Application Security Practice on a Shoestring Budget
Jan 09, 2006
Robert W Clark: Computer and Internet Security Law - A Year in Review 2006 - 2007
Jan 09, 2006
Maria Cirino: Meet the VC's
Jan 09, 2006
Jim Christy: Meet the Feds
Jan 09, 2006
Brian Chess, Jacob West, Sean Fay & Toshinari Kureha: Iron Chef Blackhat
Jan 09, 2006
Stephan Chenette & Moti Joseph: Defeating Web Browser Heap Spray Attacks
Jan 09, 2006
David Byrne: Intranet Invasion With Anti-DNS Pinning
Jan 09, 2006
Jamie Butler & Kris Kendall: Blackout: What Really Happened...
Jan 09, 2006
Damiano Bolzoni & Emmanuel Zambon: Sphinx: an anomaly-based Web Intrusion Detection System
Jan 09, 2006
Yoriy Bolygin: Remote and Local Exploitation of Network Drivers
Jan 09, 2006
Rohyt Belani & Keith Jones: Smoke 'em Out!
Jan 09, 2006
Andrea Barisani & Daniele Bianco: Injecting RDS-TMC Traffic Information Signals a.k.a. How to freak out your Satellite Navigation.
Jan 09, 2006
Brandon Baker: Kick Ass Hypervisoring: Windows Server Virtualization
Jan 09, 2006
Pedram Amini & Aaron Portnoy: Fuzzing Sucks! (or Fuzz it Like you Mean it!)
Jan 09, 2006
Jonathan Afek: Dangling Pointer
Jan 09, 2006
Bruce Schneier: KEYNOTE: The Psychology of Security
Jan 09, 2006
Tony Sager: KEYNOTE: The NSA Information Assurance Directorate and the National Security Community
Jan 09, 2006
Richard A. Clarke: KEYNOTE: A Story About Digital Security in 2017
Jan 09, 2006