1. EachPod

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Audio Tech News Technology
Update frequency
every day
Average duration
52 minutes
Episodes
85
Years Active
2006
Share to:
Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers

Hacker Court Panel: Hacker Court 2006: Sex, Lies and Sniffers

"Expertise in computer forensic technology means nothing if that expertise can’t be conveyed convincingly to a jury. Presenting technical evidence in a courtroom is a far cry from presenting a techni…
01:08:55  |   Sun 04 Jun 2006
Lukas Grunwald:

Lukas Grunwald: "New Attack to RFID-Systems and their Middle ware and Backends"

"This talk provides an overview of new RFID technologies used for dual-interface cards (credit cards, ticketing and passports), and RFID tags with encryption and security features. Problems and atta…
00:40:09  |   Sun 04 Jun 2006
Dino Dai Zovi: Hardware Virtualization Based Rootkits

Dino Dai Zovi: Hardware Virtualization Based Rootkits

"Hardware-supported CPU virtualization extensions such as Intel's VT-x allow multiple operating systems to be run at full speed and without modification simultaneously on the same processor. These ex…
00:50:10  |   Sun 04 Jun 2006
John Lambert: Security Engineering in Windows Vista

John Lambert: Security Engineering in Windows Vista

This presenation will offer a technical overview of the security engineering process behind Windows Vista. Windows Vista is the first end-to-end major OS release in the Trustworthy Computing era from…
00:48:19  |   Sun 04 Jun 2006
Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway

Shawn Moyer: Defending Black Box Web Applications: Building an Open Source Web Security Gateway

"Web apps continue to be the soft, white underbelly of most corporate IT environments. While the optimal path is to fix your code, it's not always an option, especially for closed-source, black-box w…
00:24:47  |   Sun 04 Jun 2006
Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7

Rob Franco: Case Study: The Secure Development Lifecycle and Internet Explorer 7

Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authenti…
00:45:18  |   Sun 04 Jun 2006
David Litchfield : All New Zero Day

David Litchfield : All New Zero Day

David Litchfield specializes in searching for new threats to database systems and web applications. He has lectured to both British and U.S. government security agencies on database security and is a…
00:45:14  |   Sun 04 Jun 2006
David Endler: Hacking VOIP Exposed

David Endler: Hacking VOIP Exposed

"Lately there seems to be an explosion of press hype around the possibility of hackers exploiting Voice-over-IP networks and services (Skype, Vonage, etc.). VoIP Spam, Caller ID Spoofing, Toll Fraud,…
01:02:39  |   Sun 04 Jun 2006
Shawn Embleton, Sherri Sparks & Ryan Cunningham:

Shawn Embleton, Sherri Sparks & Ryan Cunningham: "Sidewinder": An Evolutionary Guidance System for Malicious Input Crafting

Black box testing techniques like fuzzing and fault injection are responsible for discovering a large percentage of reported software vulnerabilities. These techniques typically operate by injecting …
01:14:21  |   Sun 04 Jun 2006
Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats

Panel: Center for Democracy and Technology Anti-Spyware Coalition Public Forum on Corporate Spyware Threats

This session will examine the threat of spyware to corporations. What does the threat currently look like and how is it evolving? What market forces are at play? How big of a threat is spyware for co…
02:16:08  |   Sun 04 Jun 2006
Michael Sutton & Greg MacManus: Punk Ode - Hiding shellcode in plain sight

Michael Sutton & Greg MacManus: Punk Ode - Hiding shellcode in plain sight

"Injecting shellcode into a vulnerable program so you can find it reliably can be tricky. With image format vulnerabilities, sometimes the only place you can put your code is in the image itself. If …
00:58:50  |   Sun 04 Jun 2006
Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems

Robert Auger and Caleb Sima: Zero Day Subscriptions: Using RSS and Atom feeds As Attack Delivery Systems

"This presentation will discuss the use of RSS and Atom feeds as method of delivering exploits to client systems. In our research we have found a number of RSS clients, both local and web-based, that…
00:43:05  |   Sun 04 Jun 2006
Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

Claudio Merloni: The BlueBag: a mobile, covert Bluetooth attack and infection device

"How could an attacker steal the phone numbers stored on your mobile, eavesdrop your conversations, see what you're typing on the keyboard, take pictures of the room you're in, and monitor everything…
00:49:20  |   Sun 04 Jun 2006
Jeff Waldron: VOIP Security Essentials

Jeff Waldron: VOIP Security Essentials

"The VoIP Security Essentials presentation will introduce the audience to voice over IP (VoIP) technology. The practical uses of VoIP will be discussed along with the advantages and disadvantages of …
00:17:23  |   Sun 04 Jun 2006
Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design

Greg Hoglund: Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design

"Online games are very popular and represent some of the most complex multi-user applications in the world. World of Warcraft® takes center stage with over 5 million players worldwide. In these persi…
00:49:37  |   Sun 04 Jun 2006
Renaud BIDOU: IPS Short comings

Renaud BIDOU: IPS Short comings

"Technologies emerge on a regular basis with new promises of better security. This is more or less true. However we know there are still weaknesses and that 100% security is not realistic. Therefore …
01:05:25  |   Sun 04 Jun 2006
David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's

David Hulton & Dan Moniz: Faster Pwning Assured: Hardware Hacks and Cracks with FPGA's

"This talk will go in-depth into methods for breaking crypto faster using FPGAs. FPGA's are chips that have millions of gates that can be programmed and connected arbitrarily to perform any sort of t…
01:06:14  |   Sun 04 Jun 2006
Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends

Dan Larkin: Keynote: Fighting Organized Cyber Crime - War Stories and Trends

David Litchfield specializes in searching for new threats to database systems and web applications. He has lectured to both British and U.S. government security agencies on database security and is a…
00:54:41  |   Sun 04 Jun 2006
Pete Finnigan: How to Unwrap Oracle PL/SQL

Pete Finnigan: How to Unwrap Oracle PL/SQL

"PL/SQL is the flagship language used inside the Oracle database for many years and through many versions to allow customers to implement their business rules and logic. Oracle has recognized that it…
00:53:53  |   Sun 04 Jun 2006
Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks

Hendrik Scholz: SIP Stack Fingerprinting and stack difference attacks

"VoIP applications went mainstream, although the underlying protocols are still undergoing constant development. The SIP protocol being the main driver behind this has been analyzed, fuzzed and put t…
00:51:21  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.