1. EachPod

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.

The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace.
A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 cbr 64k audio format.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2005 and download them. Put up the .pdfs in one window while listening the talks in the other. Almost as good as being there!

Tech News Technology Video Audio
Update frequency
every day
Average duration
50 minutes
Episodes
61
Years Active
2006
Share to:
Philip R. Zimmermann:  The Unveiling of My Next Big Project

Philip R. Zimmermann: The Unveiling of My Next Big Project

Philip R. Zimmermann is the creator of Pretty Good Privacy. For that, he was the target of a three-year criminal investigation, because the government held that US export restrictions for cryptograph…
00:50:49  |   Sun 04 Jun 2006
Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

Alex Wheeler and Neel Mehta: Owning Anti-Virus: Weaknesses in a Critical Security Component

AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL, Netscape, Netzero, Earthlink, and other IS…
01:05:10  |   Sun 04 Jun 2006
Adam L. Young:  Building Robust Backdoors In Secret Symmetric Ciphers

Adam L. Young: Building Robust Backdoors In Secret Symmetric Ciphers

This talk will present recent advances in the design of robust cryptographic backdoors in secret symmetric ciphers (i.e., classified or proprietary ciphers). The problem directly affects end-users si…
00:48:55  |   Sun 04 Jun 2006
Paul Vixie:  Preventing Child Neglect in DNSSEC-bis using Lookaside Validation

Paul Vixie: Preventing Child Neglect in DNSSEC-bis using Lookaside Validation

Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and software architect since 1980. Early in his career, he developed and introduced sends, proxynet, rtt…
01:15:01  |   Sun 04 Jun 2006
Andrew van der Stock:  World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0

Andrew van der Stock: World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0

After three years of community development, the Open Web Application Security Project (OWASP) is proud to introduce the next generation of web application security standards at BlackHat USA 2005. The…
00:53:49  |   Sun 04 Jun 2006
Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows

Eugene Tsyrklevich: Ozone HIPS: Unbreakable Windows

Windows is the number one target on the Internet today. It takes less than 5 minutes for an unpatched Windows machine, connected to the Internet, to get owned. Yet the most prevalent security practic…
01:16:57  |   Sun 04 Jun 2006
Alex Stamos and Scott Stender:  Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps

Alex Stamos and Scott Stender: Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps

Web Services represent a new and unexplored set of security-sensitive technologies that have been widely deployed by large companies, governments, financial institutions, and in consumer applications…
01:12:18  |   Sun 04 Jun 2006
Michael Sutton and Adam Greene: The Art of File Format Fuzzing

Michael Sutton and Adam Greene: The Art of File Format Fuzzing

In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was nothi…
00:43:18  |   Sun 04 Jun 2006
spoonm and skape: Beyond EIP

spoonm and skape: Beyond EIP

When we built Metasploit, our focus was on the exploit development process. We tried to design a system that helped create reliable and robust exploits. While this is obviously very important, it's o…
00:30:38  |   Sun 04 Jun 2006
Sherri Sparks and Jamie Butler:

Sherri Sparks and Jamie Butler: "Shadow Walker" - Raising The Bar For Rootkit Detection

Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than patching code or modifying function pointe…
01:14:10  |   Sun 04 Jun 2006
Derek Soeder and Ryan Permeh: eEye BootRoot

Derek Soeder and Ryan Permeh: eEye BootRoot

This presentation will cover the eEye BootRoot project, an exploration of technology that boot sector code can use to subvert the Windows NT-family kernel and retain the potential for execution, even…
01:13:44  |   Sun 04 Jun 2006
Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards

Paul Simmonds: The Jericho Challenge - Finalist Architecture Presentations and Awards

The days of the corporate network, completely isolated with a well-secured outer shell are long gone; yet we continue to cling to this model. Global networks with no borders, offer the potential of s…
00:41:11  |   Sun 04 Jun 2006
SensePost:  Automation - Deus ex Machina or Rube Goldberg Machine?

SensePost: Automation - Deus ex Machina or Rube Goldberg Machine?

How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of…
01:06:46  |   Sun 04 Jun 2006
Mike Pomraning:  Injection Flaws: Stop Validating Your Input

Mike Pomraning: Injection Flaws: Stop Validating Your Input

Years after the debut of XSS and SQL Injection, each passing week sees newly disclosed vulnerabilities ready to be exploited by these same techniques. Labelling all of these as "input validation flaw…
00:29:21  |   Sun 04 Jun 2006
Ejovi Nuwere and  Mikko Varpiola:  The Art of SIP fuzzing and Vulnerabilities Found in VoIP

Ejovi Nuwere and Mikko Varpiola: The Art of SIP fuzzing and Vulnerabilities Found in VoIP

This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities and audit engagements we will give a technical understanding of this emerging technolo…
01:04:21  |   Sun 04 Jun 2006
Mudge aka Peiter Mudge Zatko:  Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information Security

Mudge aka Peiter Mudge Zatko: Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence/Counter Espionage Within Information Security

The computer and network security fields have made little progress in the past decade. The rhetoric that the field is in an arms race; attacks are becoming more complicated and thus defenses are alwa…
01:11:11  |   Sun 04 Jun 2006
Shawn Moyer:  Owning the C-suite: Corporate Warfare as a Social Engineering Problem

Shawn Moyer: Owning the C-suite: Corporate Warfare as a Social Engineering Problem

Let's face it, you ROCK at building InfoSec tech, but you SUCK at corporate warfare. Sooner or later, you WILL have to sit in a boardroom with the suits and justify your existence. If you approach yo…
00:18:36  |   Sun 04 Jun 2006
Panel:  CISO QA with Jeff Moss

Panel: CISO QA with Jeff Moss

Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporations to join him on stage for a unique set of questions and answers. What do CISOs think of Black Hat,…
01:00:05  |   Sun 04 Jun 2006
Robert Morris:  The Non-Cryptographic Ways of Losing Information

Robert Morris: The Non-Cryptographic Ways of Losing Information

To fully understand how to protect crucial information in the modern world, one needs to fully understand how the modern spy steals it. Since the glorious days of cryptanalysis during World War II, t…
01:02:59  |   Sun 04 Jun 2006
Panel:  The National ID Debate

Panel: The National ID Debate

As a result of the Real-ID Act, all American citizens will have an electronically readable ID card that is linked to the federal database by May 2008. This means that in three years we will have a Na…
01:12:08  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat / CMP. This content is not affiliated with or endorsed by eachpod.com.