1. EachPod

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Audio Tech News Technology
Update frequency
every day
Average duration
52 minutes
Episodes
85
Years Active
2006
Share to:
Chuck Willis  : Web application Incident Response and forensics- A Whole new ball game.

Chuck Willis : Web application Incident Response and forensics- A Whole new ball game.

"Web applications are normally the most exposed and the most easily compromised part of an organization's network presence. This combination requires that organizations be prepared for web applicatio…
01:05:33  |   Sun 04 Jun 2006
Scott Stender: Attacking Internationialized software

Scott Stender: Attacking Internationialized software

"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the system.…
00:50:36  |   Sun 04 Jun 2006
Jeremy Rauch: PDB: The Protocol DeBugger

Jeremy Rauch: PDB: The Protocol DeBugger

"It's late. You've been assigned the unenviable task of evaluating the security of this obtuse application suite. 2006! Why doesn't everything just use SSL as its transport? No time for excuses. Dead…
01:05:36  |   Sun 04 Jun 2006
Nicolas Fischbach: Carrier VoIP Security

Nicolas Fischbach: Carrier VoIP Security

"VoIP, IMS, FMC, NGN, PacketCore, MPLS. Put those together and you are looking at the next security nightmare when it comes to Service Provider infrastructure security. Carriers are already moving aw…
01:05:36  |   Sun 04 Jun 2006
Melanie Rieback: RFID Malware Demystified

Melanie Rieback: RFID Malware Demystified

"Radio Frequency Identification (RFID) malware, first introduced in my paper 'Is Your Cat Infected with a Computer Virus?', has raised a great deal of controversy since it was first presented at the …
00:51:38  |   Sun 04 Jun 2006
Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach

Andrew Cushman: Microsoft Security Fundamentals - Engineering, Response and Outreach

"You’ve heard about Trustworthy Computing and you’ve seen some security improvements from Microsoft. You may have wondered-"is this change real or is it just lip service?" You may also have asked you…
00:57:13  |   Sun 04 Jun 2006
Panel: Meet the Feds:  OODA Loop and the Science of Security

Panel: Meet the Feds: OODA Loop and the Science of Security

"The OODA Loop theory was conceived by Col John Boyd, AF fighter pilot. He believed that a pilot in a lethal engagement that could Observe, Orient, Decide, and Act (OODA) before his adversary had a b…
00:48:34  |   Sun 04 Jun 2006
Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy

Yuan Fan and Xiao Rong: MatriXay-When Web App & Database Security Pen-Test/Audit Is a Joy

This topic will present a new web-app/DB pen-test tool. This tool supports both proxy (passive) mode as well as direct URL targeting. It is a mixed Web App SQL Injection systematic pen-test and WebAp…
00:21:40  |   Sun 04 Jun 2006
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous

Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous

"Imagine you’re visiting a popular website and invisible JavaScript exploit code steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowledg…
00:54:51  |   Sun 04 Jun 2006
Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches

Alexander Sotirov: Hotpatching and the Rise of Third-Party Patches

"Hotpatching is a common technique for modifying the behavior of a closed source applications and operating systems. It is not new, and has been used by old-school DOS viruses, spyware, and many secu…
00:56:25  |   Sun 04 Jun 2006
Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger

Tod Beardsley: Investigating Evil Websites with Monkeyspaw: The Greasemonkey Security Professional's Automated Webthinger

"Monkeyspaw is a unified, single-interface set of security-related website evaluation tools. Implemented in Greasemonkey, its purpose is to automate several common tasks employed during the early ste…
00:21:29  |   Sun 04 Jun 2006
Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion

Brian Caswell and HD Moore: Thermoptic Camoflauge: Total IDS Evasion

Intrusion detection systems have come a long way since Ptacek and Newsham released their paper on eluding IDS, but the gap between the attackers and the defenders has never been wider. This presentat…
01:21:50  |   Sun 04 Jun 2006
Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono

Noel Anderson and Taroon Mandhana: WiFi in Windows Vista: A Peek Inside the Kimono

"Windows Vista comes with redesigned support for WiFi (802.11 wireless). For those of us who live with a laptop in easy reach, it’s going to have an effect on our workday. For users there’s a new UI …
00:58:29  |   Sun 04 Jun 2006
Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth

Franck Veysset and Laurent Butti: Wi-Fi Advanced Stealth

"Wireless stealth was somewhat expensive some years ago as we were required to use proprietary radios and so on… Thanks to increasingly flexible low-cost 802.11 chipsets we are now able to encode any…
00:17:21  |   Sun 04 Jun 2006
Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems

Brendan O'Connor: Vulnerabilities in Not-So Embedded Systems

"Printers, scanners, and copiers still have a reputation of being embedded systems or appliances; dumb machines that perform a specific, repetitive function. Today's devices are far different than th…
01:00:50  |   Sun 04 Jun 2006
Alexander Tereshkin: Rootkits: Attacking Personal Firewalls

Alexander Tereshkin: Rootkits: Attacking Personal Firewalls

"Usually, a personal firewall and an antivirus monitor are the only tools run by a user to protect the system from any malware threat with any level of sophistication. This level significantly increa…
00:51:41  |   Sun 04 Jun 2006
Marco M. Morana: Building Security into the Software Life Cycle, a Business Case

Marco M. Morana: Building Security into the Software Life Cycle, a Business Case

The times of designing security software as a matter of functional design are over. Positive security functional requirements do not make secure software. Think risk driven design, think like an atta…
00:24:33  |   Sun 04 Jun 2006
Ofir Arkin: Bypassing Network Access Control (NAC) Systems

Ofir Arkin: Bypassing Network Access Control (NAC) Systems

"The threat of viruses, worms, information theft and lack of control of the IT infrastructure lead companies to implement security solutions to control the access to their internal IT networks. A …
00:51:17  |   Sun 04 Jun 2006
Johnny cache and  David Maynor: Device Drivers

Johnny cache and David Maynor: Device Drivers

Application level security is getting better. Basic stack based string overflows have become rare, and even simple heap overflows are getting hard to find. Despite this fact there is still a huge ave…
00:57:16  |   Sun 04 Jun 2006
Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees

Kimber Spradin and Dale Brocklehurst: Auditing Data Access Without Bringing Your Database To Its Knees

Today’s privacy requirements place significant additional auditing burdens on databases. First you have to know which databases in your environment contain regulated Personally Identifiable Informati…
01:03:50  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.