Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

By Jeff Moss

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Jeff Moss

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 2
Reviews: 0
Episodes: 61

Description

Past speeches and talks from the Black Hat Briefings computer security conferences.

The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace.
A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 cbr 64k audio format. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2005 and download them. Put up the .pdfs in one window while listening the talks in the other. Almost as good as being there!

Episode Date
Philip R. Zimmermann: The Unveiling of My Next Big Project
Jun 04, 2006
Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers
Jun 04, 2006
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component
Jun 04, 2006
Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation
Jun 04, 2006
Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0
Jun 04, 2006
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows
Jun 04, 2006
Michael Sutton and Adam Greene: The Art of File Format Fuzzing
Jun 04, 2006
Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Jun 04, 2006
spoonm and skape: Beyond EIP
Jun 04, 2006
Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection
Jun 04, 2006
Derek Soeder and Ryan Permeh: eEye BootRoot
Jun 04, 2006
Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards
Jun 04, 2006
SensePost: Automation - Deus ex Machina or Rube Goldberg Machine?
Jun 04, 2006
Mike Pomraning: Injection Flaws: Stop Validating Your Input
Jun 04, 2006
Ejovi Nuwere and Mikko Varpiola: The Art of SIP fuzzing and Vulnerabilities Found in VoIP
Jun 04, 2006
Mudge aka Peiter Mudge Zatko: Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information Security
Jun 04, 2006
Shawn Moyer: Owning the C-suite: Corporate Warfare as a Social Engineering Problem
Jun 04, 2006
Panel: CISO QA with Jeff Moss
Jun 04, 2006
Panel: The National ID Debate
Jun 04, 2006
Robert Morris: The Non-Cryptographic Ways of Losing Information
Jun 04, 2006
David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?
Jun 04, 2006
Kevin Mandia: Performing Effective Incident Response
Jun 04, 2006
Simple Nomad and MadHat Unspecific: SPA: Single Packet Authorization
Jun 04, 2006
Johnny Long: Google Hacking for Penetration Testers
Jun 04, 2006
David Litchfield: All New 0-Day
Jun 04, 2006
Ben Laurie: CaPerl: Running Hostile Code Safely
Jun 04, 2006
Alexander Kornbrust: Circumvent Oracle's Database Encryption and Reverse Engineering of Oracle Key Management Algorithms
Jun 04, 2006
Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process
Jun 04, 2006
Barnaby Jack: Remote Windows Kernel Exploitation - Step In To the Ring 0
Jun 04, 2006
Ken Hines: Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment
Jun 04, 2006
Allen Harper and Edward Balas: GEN III Honeynets: The birth of roo
Jun 04, 2006
Robert J. Hansen and Meredith L. Patterson: Stopping Injection Attacks with Computational Theory
Jun 04, 2006
The Grugq: The Art of Defiling: Defeating Forensic Analysis
Jun 04, 2006
Jeremiah Grossman: Phishing with Super Bait
Jun 04, 2006
Jennifer Stisa Granick: Top Ten Legal Issues in Computer Security
Jun 04, 2006
Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices
Jun 04, 2006
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)
Jun 04, 2006
James C. Foster and Vincent T. Liu: Catch Me If You Can:Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch.
Jun 04, 2006
James C. Foster: BlackHat Standup: "Yea I'm a Hacker"
Jun 04, 2006
Esteban Martinez Fayo: Advanced SQL Injection in Oracle Databases
Jun 04, 2006
Yuan Fan: Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection
Jun 04, 2006
Arian J. Evans and Daniel Thompson: Building Self-Defending Web Applications: Secrets of Session Hacking and Protecting Software Sessions
Jun 04, 2006
Himanshu Dwivedi: iSCSI Security (Insecure SCSI)
Jun 04, 2006
Bryan Cunningham and C. Forrest Morgan: U.S National Security, Individual and Corporate Information Security, and Information Security Providers
Jun 04, 2006
Greg Conti: Beyond Ethereal: Crafting A Tivo for Security Datastreams
Jun 04, 2006
Tyler Close: Shatter-proofing Windows
Jun 04, 2006
Ian Clarke and Oskar Sandberg: Routing in the Dark: Scalable Searches in Dark P2P Networks.
Jun 04, 2006
Robert W. Clark: Legal Aspects of Computer Network Defense-A Government Perspective and A Year in Review Important Precedents in Computer and Internet Security Law 2004 - 2005
Jun 04, 2006
Jim Christy: The Defense Cyber Crime Center
Jun 04, 2006
Tzi-cker Chiueh: Checking Array Bound Violation Using Segmentation Hardware
Jun 04, 2006
Cesar Cerrudo:Demystifying MS SQL Server and Oracle Database Server Security
Jun 04, 2006
Kevin Cardwell:Toolkits: All-in-One Approach to Security
Jun 04, 2006
Adam Boileau: Trust Transience: Post Intrusion SSH Hijacking
Jun 04, 2006
Renaud Bidou: A Dirty BlackMail DoS Story
Jun 04, 2006
Bruce Potter and Beetle: Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows
Jun 04, 2006
Darrin Barrall:Shakespearean Shellcode
Jun 04, 2006
Darrin Barrall and David Dewey: Plug and Root, the USB Key to the Kingdom
Jun 04, 2006
Ofir Arkin: A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
Jun 04, 2006
Panel: The Future of Personal Information
Jun 04, 2006
Akshay Aggarwal: Rapid Threat Modeling
Jun 04, 2006
Gilman Louie: Investing in Our Nation's Security
Jun 04, 2006