1. EachPod

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Audio Tech News Technology
Update frequency
every day
Average duration
52 minutes
Episodes
85
Years Active
2006
Share to:
Bruce Potter: The Trusted Computing Revolution

Bruce Potter: The Trusted Computing Revolution

"Trusted computing is considered a dirty word by many due to its use for Digital Rights Management (DRM). There is a different side of trusted computing, however, that can solve problems information …
00:44:41  |   Sun 04 Jun 2006
Tom Ptacek and Dave Goldsmith: Do Enterprise Management Applications Dream of Electric Sheep?

Tom Ptacek and Dave Goldsmith: Do Enterprise Management Applications Dream of Electric Sheep?

"Thomas Ptacek and Dave Goldsmith present the results of Matasano Security's research into the resilience of Enterprise Agents: the most dangerous programs you've never heard of, responsible for over…
00:59:50  |   Sun 04 Jun 2006
Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit

Saumil Udayan Shah: Writing Metasploit Plugins - from Vulnerability to Exploit

"This talk shall focus on exploit development from vulnerabilities. We have seen many postings on security forums which vaguely describe a vulnerability, or sometimes provide a "proof-of-concept" exp…
01:15:11  |   Sun 04 Jun 2006
Kevin Mandia: The State of Incidence Response

Kevin Mandia: The State of Incidence Response

"During the course of 2005 and 2006, we have responded to dozens of computer security incidents at some of America’s largest organizations. Mr. Mandia was on the front lines assisting these organizat…
01:08:14  |   Sun 04 Jun 2006
Johnny Long: Death By 1000 cuts

Johnny Long: Death By 1000 cuts

"In this day and age, forensics evidence lurks everywhere. This talk takes attendees on a brisk walk through the modern technological landscape in search of hidden digital data. Some hiding places ar…
01:01:15  |   Sun 04 Jun 2006
Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques

Jamie Butler: R^2: The Exponential Growth in Rootkit Techniques

"Rootkit technology has exploded recently, especially in the realm of remote command and control vectors. This talk will cover the evolution of rootkit techniques over the years. It will explore the …
00:42:20  |   Sun 04 Jun 2006
Emmanuele Zambon:

Emmanuele Zambon: "NIDS, false positive reduction through anomaly detection"

"The Achilles' heel of network IDSs lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS to raise th…
00:48:40  |   Sun 04 Jun 2006
Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications

Chris Eng: Breaking Crypto Without Keys: Analyzing Data in Web Applications

"How often have you encountered random-looking cookies or other data in a web application that didn‚t easily decode to human readable text? What did you do next-ignore it and move on, assuming that i…
01:00:01  |   Sun 04 Jun 2006
Johnny Long: Secrets of the Hollywood Hacker

Johnny Long: Secrets of the Hollywood Hacker

"If you know good tech, you can smell bad tech from a mile away. Bad tech is the stuff that makes you laugh out loud in a theater when all the "normal" people around you thought something k-rad just …
01:04:30  |   Sun 04 Jun 2006
Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs

Himanshu Dwivedi: I’m Going To Shoot The Next Person Who Says VLANs

"Assessing and analyzing storage networks are key to protecting sensitive data at rest; however, the tools and procedures to protect such resources are absent. The presentation will attempt to bridge…
00:24:08  |   Sun 04 Jun 2006
Bruce Potter: Bluetooth Defense kit

Bruce Potter: Bluetooth Defense kit

"In the last 3 years, Bluetooth has gone from geeky protocol to an integral part of our daily life. From cars to phones to laptops to printers, Bluetooth is everywhere. And while the state of the ar…
01:03:11  |   Sun 04 Jun 2006
Stephano Zanero: Host Based Anomaly Detection on System calls arguments

Stephano Zanero: Host Based Anomaly Detection on System calls arguments

"Traditionally, host-based anomaly detection has dealt with system call sequences, but not with system call arguments. We propose a prototype which is capable of detecting anomalous system calls in a…
01:14:57  |   Sun 04 Jun 2006
Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance

Adrian Marinescu: Windows Vista Heap Management Enhancements - Security, Reliability and Performance

"All applications and operating systems have coding errors and we have seen technical advances both in attack and mitigation sophistication as more security vulnerabilities are exploiting defects rel…
01:07:10  |   Sun 04 Jun 2006
Corey Benninger: Finding Gold in the Browser Cache

Corey Benninger: Finding Gold in the Browser Cache

"Looking for instant gratification from the latest client side attack? Your search may be over when you see the data that can be harvested from popular web browser caches. This discussion will focus …
00:17:58  |   Sun 04 Jun 2006
Billy Hoffman: Analysis od Web application worms and Viruses

Billy Hoffman: Analysis od Web application worms and Viruses

"Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 saw the release in the wild of the first worms that propagate by exploiting vulnerabilities in web…
01:22:57  |   Sun 04 Jun 2006
Neal Krawetz (Dr): You are what you type: No classical computer forensics

Neal Krawetz (Dr): You are what you type: No classical computer forensics

"In an online world, anonymity seems easy. Network addresses can be cloaked and files can be manipulated. People rapidly change virtual names, genders, and skills. But even with these precautions, an…
00:47:47  |   Sun 04 Jun 2006
Dan Kaminsky: Black Ops 2006

Dan Kaminsky: Black Ops 2006

"The known topics for this year include: 1. The Worldwide SSL Analysis-There's a major flaw in the way many, many SSL devices operate. I'll discuss how widespread this flaw is, as well as annou…
01:00:27  |   Sun 04 Jun 2006
Halvar Flake: RE 2006: New Challenges Need Changing Tools

Halvar Flake: RE 2006: New Challenges Need Changing Tools

"Reverse Engineering has come a long way-what used to be practiced behind closed doors is now a mainstream occupation practiced throughout the security industry. Compilers and languages are changing,…
00:45:20  |   Sun 04 Jun 2006
Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms

Jesse Burns: Fuzzing Selected Win32 Interprocess Communication Mechanisms

"This presentation prepares attackers and defenders to perform automated testing of some popular Windows® interprocess communication mechanisms. The testing will focus on binary win32 applications, a…
01:05:33  |   Sun 04 Jun 2006
Jay Schulman: Phishing with Asterisk PBX

Jay Schulman: Phishing with Asterisk PBX

"As many people are becoming more accustom to phishing attacks, standard website and e-mail phishing schemes are becoming harder to accomplish. This presentation breaks all of the phishing norms to p…
00:48:51  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.