1. EachPod

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Audio Tech News Technology
Update frequency
every day
Average duration
52 minutes
Episodes
85
Years Active
2006
Share to:
Mariusz Burdach: Physical Memory Forensics

Mariusz Burdach: Physical Memory Forensics

"Historically, only file systems were considered as locations where evidence could be found. But what about the volatile memory which contains a huge amount of useful information such as the content …
00:44:48  |   Sun 04 Jun 2006
Bala Neerumalla: SQL Injections by truncation

Bala Neerumalla: SQL Injections by truncation

"In this talk, I will discuss some ways to circumvent common mitigations of SQL Injection vulnerabilities in dynamic SQL. I will then suggest ways to protect against them. Bala Neerumalla speciali…
00:28:17  |   Sun 04 Jun 2006
Paul Böhm: Taming Bugs: The Art and Science of Writing Secure Code

Paul Böhm: Taming Bugs: The Art and Science of Writing Secure Code

If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Prog…
01:06:39  |   Sun 04 Jun 2006
Alexander Kornbrust: Oracle Rootkits 2.0

Alexander Kornbrust: Oracle Rootkits 2.0

"This presentation shows the next (2.) generation of Oracle Rootkits. In the first generation, presented at the Blackhat 2005 in Amsterdam, Oracle Rootkits were implemented by modifying database view…
00:43:03  |   Sun 04 Jun 2006
Doug Mohney: Defending Against Social Engineering with Voice Analytics

Doug Mohney: Defending Against Social Engineering with Voice Analytics

"Voice analytics-once the stuff of science fiction and Echelon speculation-is now commercially available and is being used by call centers processing hundreds of thousands of calls per day to authent…
00:45:56  |   Sun 04 Jun 2006
HD Moore: Metasploit Reloaded

HD Moore: Metasploit Reloaded

"Over the last three years, the Metasploit Framework has evolved from a klunky exploit toolkit to a sleek EIP-popping machine. The latest version of the Framework is the result of nearly two years of…
01:14:07  |   Sun 04 Jun 2006
Tom Gallagher: Finding and Preventing Cross-Site Request Forgery

Tom Gallagher: Finding and Preventing Cross-Site Request Forgery

"There is an often overlooked security design flaw in many web applications today. Web applications often take user input through HTML forms. When privileged operations are performed, the server veri…
00:20:05  |   Sun 04 Jun 2006
Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0

Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0

"The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of "Web 2.0" technologies giving us faster, more exciting, and more …
01:11:39  |   Sun 04 Jun 2006
Panel: Disclosure Discussion

Panel: Disclosure Discussion

Technology vendors, security researchers, and customers - all sides of the vulnerability disclosure debate agree that working together rather than apart is the best way to secure our information. But…
01:10:09  |   Sun 04 Jun 2006
Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity

Stefan Frei and Dr. Martin May: The Speed of (In)security: Analysis of the Speed of Security vs. Insecurity

"To be able to defend against IT security attacks, one has to understand the attack patterns and henceforth the vulnerabilities of the attached devices. But, for an in-depth risk analysis, pure techn…
00:21:52  |   Sun 04 Jun 2006
Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics

Daniel Bilar: Automated Malware Classification/Analysis Through Network Theory and Statistics

"Automated identification of malicious code and subsequent classification into known malware families can help cut down laborious manual malware analysis time. Call sequence, assembly instruction sta…
00:26:06  |   Sun 04 Jun 2006
Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.

Philip Trainor: The statue of liberty: Utilizing Active Honeypots for hosting potentially malicious Events.

"The premise of the demonstration is there are no secure systems. Traffic that may have malicious intent, but has not yet caused problems in any published occurrences, may reach protected services an…
00:21:11  |   Sun 04 Jun 2006
Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?

Tom Brosch and Maik Morgenstern: Runtime Packers: The Hidden Problem?

"Runtime packers are a widely-used technique in malware today. Virtually every Win32 malware added to the WildList as well as ad- and spyware is packed with one or another runtime packer. Not only ca…
00:20:09  |   Sun 04 Jun 2006
SensePost: A Tale of Two Proxies

SensePost: A Tale of Two Proxies

"During this presentation SensePost will discuss and demonstrate two pieces of new technology - the Suru WebProxy and the SP_LR Generic network proxy. The Suru web proxy is an inline web proxy (th…
00:40:52  |   Sun 04 Jun 2006
FX: Analysing Complex Systems: The BlackBerry Case

FX: Analysing Complex Systems: The BlackBerry Case

"When trying to analyze a complex system for its security properties, very little information is available in the beginning. If the complex system in question contains parts that the analyst cannot s…
00:57:34  |   Sun 04 Jun 2006
Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator

Zvi Gutterman: Open to Attack; Vulnerabilities of the Linux Random Number Generator

"Linux® is the most popular open source project. The Linux random number generator is part of the kernel of all Linux distributions and is based on generating randomness from entropy of operating sys…
00:58:50  |   Sun 04 Jun 2006
Charles Edge: Attacking Apple’s Xsan

Charles Edge: Attacking Apple’s Xsan

"A fundamental of many SAN solutions is to use metadata to provide shared access to a SAN. This is true in iSCSI or FibreChannel and across a wide variety of products. Metadata can offer a way around…
00:16:19  |   Sun 04 Jun 2006
Billy Hoffman: Ajax (in)security

Billy Hoffman: Ajax (in)security

"Ajax can mean different things to different people. To a user, Ajax means smooth web applications like Google Maps or Outlook Web Access. To a developer, Ajax provides methods to enrich a user's exp…
01:12:34  |   Sun 04 Jun 2006
Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0

Peter Silberman: RAIDE: Rootkit Analysis Identification Elimination v 1.0

"In the past couple years there have been major advances in the field of rootkit technology, from Jamie Butler and Sherri Sparks' Shadow Walker, to FU. Rootkit technology is growing at an exponential…
00:55:57  |   Sun 04 Jun 2006
Abolade Gbadegesin :  The NetIO Stack - Reinventing TCP/IP in Windows Vista

Abolade Gbadegesin : The NetIO Stack - Reinventing TCP/IP in Windows Vista

"TCP/IP is on the front lines in defending against network attacks, from intrusion attempts to denial-of-service. Achieving resilience depends on factors from NIC driver quality up through network ap…
00:58:40  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.