1. EachPod

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Las Vegas 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2006 was held August August 2-3 in Las Vegas at Caesars Palace. Two days, fourteen tracks, over 85 presentations. Dan Larkin of the FBI was the keynote speaker. Celebrating our tenth year anniversary.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-06/bh-usa-06-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-multi-media-archives.html#USA-2006 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and .mp4 h.264 192k video format

Audio Tech News Technology
Update frequency
every day
Average duration
52 minutes
Episodes
85
Years Active
2006
Share to:
Jonathan Squire: $30, 30 Minutes, 30 Networks

Jonathan Squire: $30, 30 Minutes, 30 Networks

"Have you ever walked into your local Global Mega Super Tech Store and wondered how cheaply you could build a device that could play your digital music, display pictures, and listen to your neighbor'…
00:17:22  |   Sun 04 Jun 2006
William B Kimball: Code Integration-Based Vulnerability Auditing

William B Kimball: Code Integration-Based Vulnerability Auditing

There is a growing need to develop improved methods for discovering vulnerabilities in closed-source software. The tools and techniques used to automate searching for these vulnerabilities are either…
00:15:43  |   Sun 04 Jun 2006
Dan Moniz & HD Moore: Six Degrees of XSSploitation

Dan Moniz & HD Moore: Six Degrees of XSSploitation

"Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the "samy is my hero" incident in late 2005. XSS affects a wide variety of sites and back end web t…
00:43:55  |   Sun 04 Jun 2006
Panel: The Jericho Forum and Challenge

Panel: The Jericho Forum and Challenge

"In the first half of this session, Paul Simmonds will present on behalf of the Jericho Forum taking participants through the initial problem statement and what people need to go away and start imple…
02:16:46  |   Sun 04 Jun 2006
Joanna Rutkowska: Rootkits vs Stealth by design Malware

Joanna Rutkowska: Rootkits vs Stealth by design Malware

"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassi…
01:19:50  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.