1. EachPod

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2005 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.

The Black Hat Briefings USA 2005 was held July 27-28 in Las Vegas at Caesars Palace.
A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-05/bh-usa-05-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 cbr 64k audio format.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2005 and download them. Put up the .pdfs in one window while listening the talks in the other. Almost as good as being there!

Tech News Technology Video Audio
Update frequency
every day
Average duration
50 minutes
Episodes
61
Years Active
2006
Share to:
Kevin Mandia:  Performing Effective Incident Response

Kevin Mandia: Performing Effective Incident Response

During the course of 2004 and 2005, we have responded to dozens of computer security incidents at some of America's largest organizations. Mr. Mandia was on the front lines assisting these organizati…
00:59:18  |   Sun 04 Jun 2006
David Maynor:  NX: How Well Does It Say NO to Attacker's eXecution Attempts?

David Maynor: NX: How Well Does It Say NO to Attacker's eXecution Attempts?

NX. It's known by different names to different people. AMD calls it Enhanced Virus Protection, or EVP. Microsoft calls its support Data Execution Prevention, or DEP. After the press about how this ne…
00:36:40  |   Sun 04 Jun 2006
Simple Nomad and MadHat Unspecific:  SPA: Single Packet Authorization

Simple Nomad and MadHat Unspecific: SPA: Single Packet Authorization

We needed a protocol that allowed us to tell a server that we are who we say we are, have it work across NAT, use TCP, UDP, or ICMP as the transport mechanism, act as an extra layer of security, and …
00:19:27  |   Sun 04 Jun 2006
Johnny Long:  Google Hacking for Penetration Testers

Johnny Long: Google Hacking for Penetration Testers

Google Hacking returns for more guaranteed fun this year at Blackhat USA! If you haven't caught one of Johnny's Google talks, you definitely should. Come and witness all the new and amazing things th…
00:08:49  |   Sun 04 Jun 2006
Ben Laurie:  CaPerl: Running Hostile Code Safely

Ben Laurie: CaPerl: Running Hostile Code Safely

There are many circumstances under which we would like to run code we don't trust. This talk presents a method for making that possible with various popular scripting languages-the test case is Perl,…
00:46:46  |   Sun 04 Jun 2006
David Litchfield:  All New 0-Day

David Litchfield: All New 0-Day

David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognised by Information Security Magazine who voted him as 'The…
00:40:11  |   Sun 04 Jun 2006
Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process

Joseph Klein: The Social Engineering Engagement Methodology - A Formal Testing process of the People and Process

The security of an organization is composed of technology, people and processes. In the last few years, many organizations have done a good job addressing technology but have focused very little on t…
00:40:54  |   Sun 04 Jun 2006
Alexander Kornbrust:  Circumvent Oracle's Database Encryption and Reverse Engineering of Oracle Key Management Algorithms

Alexander Kornbrust: Circumvent Oracle's Database Encryption and Reverse Engineering of Oracle Key Management Algorithms

This talk describes architecture flaws of the Oracle's database encryption packages dbms_crypto and dbms_obfuscation_toolkit. These encryption packages are used to encrypt sensitive information in th…
00:59:58  |   Sun 04 Jun 2006
Barnaby Jack:  Remote Windows Kernel Exploitation - Step In To the Ring 0

Barnaby Jack: Remote Windows Kernel Exploitation - Step In To the Ring 0

Almost every possible method and technique regarding Windows exploitation has been discussed in depth. Surprisingly, a topic that has rarely been touched on publicly is the remote exploitation of Win…
00:36:08  |   Sun 04 Jun 2006
Ken Hines: Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment

Ken Hines: Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment

Fueled by business needs such as supply chain integration and outsourcing, modern enterprises must open up portions of their networks to potentially untrusted outsiders. Combined with the troubling a…
00:24:48  |   Sun 04 Jun 2006
Robert J. Hansen and Meredith L. Patterson:  Stopping Injection Attacks with Computational Theory

Robert J. Hansen and Meredith L. Patterson: Stopping Injection Attacks with Computational Theory

Input validation is an important part of security, but it's also one of the most annoying parts. False positives and false negatives force us to choose between convenience and security-but do we have…
00:49:29  |   Sun 04 Jun 2006
Allen Harper and Edward Balas:  GEN III Honeynets: The birth of roo

Allen Harper and Edward Balas: GEN III Honeynets: The birth of roo

A Honeypot is a information gathering system, designed for attackers to interact with. A honeynet, simply put, is a network of honeypots. The key component of a honeynet is the honeywall. The honeywa…
00:51:27  |   Sun 04 Jun 2006
The Grugq: The Art of Defiling: Defeating Forensic Analysis

The Grugq: The Art of Defiling: Defeating Forensic Analysis

The Grugq has been at the forefront of forensic research for the last six years, during which he has been pioneering in the realm of anti-forensic research and development. During this time, he has a…
01:09:18  |   Sun 04 Jun 2006
Jeremiah Grossman: Phishing with Super Bait

Jeremiah Grossman: Phishing with Super Bait

The use of phishing/cross-site scripting hybrid attacks for financial gain is spreading. It's imperative that security professionals familiarize themselves with these new threats to protect their web…
00:57:14  |   Sun 04 Jun 2006
Jennifer Stisa Granick:  Top Ten Legal Issues in Computer Security

Jennifer Stisa Granick: Top Ten Legal Issues in Computer Security

This will be a practical and theoretical tutorial on legal issues related to computer security practices. In advance of the talk, I will unscientifically determine the "Top Ten LegalQuestions About C…
01:12:57  |   Sun 04 Jun 2006
Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Joe Grand: Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

Most users treat a hardware solution as an inherently trusted black box. "If it's hardware, it must be secure," they say. This presentation explores a number of classic security problems with hardwar…
01:12:47  |   Sun 04 Jun 2006
James C. Foster and Vincent T. Liu:  Catch Me If You Can:Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch.

James C. Foster and Vincent T. Liu: Catch Me If You Can:Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch.

Don't get caught. Building off of Foster's log manipulation and bypassing forensics session at BlackHat Windows 2004, James C. Foster and Vincent T. Liu will share over eighteen months of continued …
00:57:41  |   Sun 04 Jun 2006
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Has your network ever been hacked, and all you have to show for your investigative efforts is an IP address belonging to an ISP in Irkutsk? Are you tired of receiving e-mails from Citibank that resol…
01:01:42  |   Sun 04 Jun 2006
Esteban Martinez Fayo:  Advanced SQL Injection in Oracle Databases

Esteban Martinez Fayo: Advanced SQL Injection in Oracle Databases

This presentation shows new ways to attack Oracle Databases. It is focused on SQL injection vulnerabilities and how can be exploited using new techniques. It also explains how to see the internal PL/…
00:52:03  |   Sun 04 Jun 2006
James C. Foster:  BlackHat Standup:

James C. Foster: BlackHat Standup: "Yea I'm a Hacker"

In a refreshing different format, Foster cracks the audience with a twenty minute comedic dissertation of the past year in the information security industry. Performing standup, Foster will roast the…
00:15:54  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat / CMP. This content is not affiliated with or endorsed by eachpod.com.