1. EachPod

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Podcast

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.

Past speeches and talks from the Black Hat Briefings computer security conferences.
Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good."

A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-eu-07-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

Video, audiand supporting materials from past conferences will be posted here, starting with the newest and working our way back tthe oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 and mp4 h.264 192k videformat. If you want tget a better idea of the presentation materials gtohttp://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html#eu_07

and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Technology Video Audio Tech News
Update frequency
every day
Average duration
60 minutes
Episodes
19
Years Active
2006 - 2007
Share to:
Jeff Moss and Roger Cumming: Welcome and Keynote.

Jeff Moss and Roger Cumming: Welcome and Keynote.

Jeff Moss introduces the Keynote and welcomes everyone tthe Amsterdam 2007 conference! Roger will provide an overview of the work of CPNI in reducing vulnerability in information systems that form p…
00:57:43  |   Fri 04 May 2007
Adam  Laurie: RFIDIOts!!! - Practical RFID hacking (without soldering irons)

Adam Laurie: RFIDIOts!!! - Practical RFID hacking (without soldering irons)

RFID is being embedded in everything... From Passports tPants. Door Keys tCredit Cards. Mobile Phones tTrash Cans. Pets tPeople even! For some reason these devices have become the solution tevery new…
00:53:25  |   Mon 09 Jan 2006
Cesar  Cerrudo: Data Theft - Hacking databases for owning your data

Cesar Cerrudo: Data Theft - Hacking databases for owning your data

"Data theft is becoming a major threat, criminals have identified where the money is, In the last years many databases from fortune 500 companies were compromised causing lots of money losses. This …
01:26:58  |   Mon 09 Jan 2006
Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests

Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests

"ScarabMon is a new tool and framework for simplifying web application pentests. It makes the process of finding many common webapp flaws much easier. The user simply navigates the target site while …
00:47:11  |   Mon 09 Jan 2006
Toshinari  Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection

Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection

"Today, other than doing a full static analysis of the code, the most common practice tfind vulnerabilities in your web application is tget off-the-shelf automated web scanner, point ta URL, and hope…
00:36:10  |   Mon 09 Jan 2006
Vipin Kumar and Nitin Kumar: Vboot Kit: Compromising Windows Vista Security

Vipin Kumar and Nitin Kumar: Vboot Kit: Compromising Windows Vista Security

"Vboot kit is first of its kind technology tdemonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used tcircumvent the whole protect…
01:07:08  |   Mon 09 Jan 2006
Kostya  Kortchinsky: Making Windows Exploits more reliable

Kostya Kortchinsky: Making Windows Exploits more reliable

"When dealing with Windows exploits, an issue that often emerge is their cross-platform reliability, meaning they often work against either some given service packs of the OS, or some localization of…
01:17:36  |   Mon 09 Jan 2006
StefanZanero: 360 Anomaly Based Unsupervised Intrusion Detection

StefanZanero: 360 Anomaly Based Unsupervised Intrusion Detection

"In this talk, after briefly reviewing why we should build a good anomaly-based intrusion detection system, we will briefly present twIDS prototypes developed at the Politecnicdi Milanfor network an…
01:17:08  |   Mon 09 Jan 2006
Sun  Bing: Software Virtualization Based Rootkits

Sun Bing: Software Virtualization Based Rootkits

"This paper will show a extremely simple technique tquickly audit a software product in order tinfer how trustable and secure it is. I will show you step by step how tidentify half dozen of local 0da…
01:10:08  |   Mon 09 Jan 2006
Joel  Eriksson: Kernel Wars

Joel Eriksson: Kernel Wars

"Kernel vulnerabilities are often deemed unexploitable or at least unlikely tbe exploited reliably. Although it's true that kernel-mode exploitation often presents some new challenges for exploit dev…
00:53:40  |   Mon 09 Jan 2006
ERESI Team: Next generation debuggers for reverse engineering

ERESI Team: Next generation debuggers for reverse engineering

"Classical debuggers make use of an interface provided by the operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the communi…
01:00:08  |   Mon 09 Jan 2006
Laurent Butti: Wi-Fi Advanced Fuzzing

Laurent Butti: Wi-Fi Advanced Fuzzing

"Fuzzing is a software testing technique that consists in finding implementation bugs. Fuzzing Wi-Fi drivers is becoming more and more attractive as any exploitable security bug will enable the attac…
00:55:27  |   Mon 09 Jan 2006
Alexander  Sotirov: Heap Feng Shui in JavaScript

Alexander Sotirov: Heap Feng Shui in JavaScript

"Heap exploitation is getting harder. The heap protection features in the latest versions of Windows have been effective at stopping the basic exploitation techniques. In most cases bypassing the pro…
01:13:39  |   Mon 09 Jan 2006
DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection

DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection

"The Achilles' heel of network IDSes lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS traise tho…
00:49:01  |   Mon 09 Jan 2006
David Maynor and Robert Graham: Data Seepage: How tgive attackers a roadmap tyour network

David Maynor and Robert Graham: Data Seepage: How tgive attackers a roadmap tyour network

"Long gone are the days of widespread internet attacks. What's more popular now are more directed or targeted attacks using a variety of different methods. Since most of these attacks will be a singl…
01:00:41  |   Mon 09 Jan 2006
Lluis Mora: SMTP Information gathering

Lluis Mora: SMTP Information gathering

"The SMTP protocol, used in the transport and delivery of e-mail messages, includes control headers along with the body of messages which, as opposed tother protocols, are not stripped after the mess…
00:55:27  |   Mon 09 Jan 2006
Ollie  Whitehouse: GS and ASLR in Windows Vista

Ollie Whitehouse: GS and ASLR in Windows Vista

"Introduction:The following presentation is twparts, the first covers aspects of Microsoft's GS implementation and usage. The second is a complementary section dealing with ASLR in Windows Vista, its…
00:49:00  |   Mon 09 Jan 2006
AugustPaes de Barros: New Botnets Trends and Threats

AugustPaes de Barros: New Botnets Trends and Threats

"The last years have seen the growth of botnets and its transformation inta highly profitable business. Most of the botnets seen until now have used the same basic concepts. This presentation intends…
00:50:41  |   Mon 09 Jan 2006
Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones

Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones

"SS7 has been a walled garden for a long time: only big telcwould be interconnected tthe network. Due tderegulation and a push toward all-IP architecture, SS7 is opening up, notably with SIGTRAN (SS7…
01:09:08  |   Mon 09 Jan 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.