1. EachPod

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference. - Podcast

Black Hat Briefings, USA 2007 [Audio] Presentations from the security conference.

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat Briefings USA 2007 was held August 1-3 in Las Vegas at Caesars Palace. Two days, sixteen tracks, over 95 presentations. Three keynote speakers: Richard Clarke, Tony Sager and Bruce Schneier. A post convention wrap up can be found at http://www.blackhat.com/html/bh-usa-07/bh-usa-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp4 h.264 192k video format. If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Technology Video Audio Tech News
Update frequency
every day
Average duration
56 minutes
Episodes
89
Years Active
2006 - 2007
Share to:
Chris Paget: RFID for Beginners++

Chris Paget: RFID for Beginners++

Black Hat DC 2007 was supposed to be the venue for "RFID For Beginners", a talk on the basic mechanisms of operation used by RFID tags. Legal pressure forced the talk to be curtailed, with only 25% o…
00:26:44  |   Mon 09 Jan 2006
Paul Vincent Sabanal: Reversing C++

Paul Vincent Sabanal: Reversing C++

As recent as a couple of years ago, reverse engineers can get by with just knowledge of C and assembly to reverse most applications. Now, due to the increasing use of C++ in malware as well as most m…
00:52:59  |   Mon 09 Jan 2006
Eric Schmeidl & Mike Spindel: Strengths and Weaknesses of Access Control Systems

Eric Schmeidl & Mike Spindel: Strengths and Weaknesses of Access Control Systems

Access control systems are widely used in security, from restricting entry to a single room to locking down an entire enterprise. The many different systems available?card readers, biometrics, or eve…
00:55:37  |   Mon 09 Jan 2006
Scott Stender: Blind Security Testing - An Evolutionary Approach

Scott Stender: Blind Security Testing - An Evolutionary Approach

The vast majority of security testing relies on two approaches: the use of randomly generated or mutated data and the use of type-specific boundary test cases. Unfortunately, the current state of …
00:58:56  |   Mon 09 Jan 2006
Peter Thermos: Transparent Weaknesses in VoIP

Peter Thermos: Transparent Weaknesses in VoIP

The presentation will disclose new attacks and weaknesses associated with protocols that are used to establish and protect VoIP communications. In addition, a newer "unpublished" version of the SIVuS…
01:09:57  |   Mon 09 Jan 2006
Eugene Tsyrklevich: OpenID: Single Sign-On for the Internet

Eugene Tsyrklevich: OpenID: Single Sign-On for the Internet

Tired of tracking your username and password across 169 Web 2.0 websites that you have registered with? Thinking of adding SSO to your webapp? Pen-testing a Web 2.0 app? Then come and learn about Ope…
00:58:05  |   Mon 09 Jan 2006
Mark Vincent Yason: The Art of Unpacking

Mark Vincent Yason: The Art of Unpacking

Unpacking is an art - it is a mental challenge and is one of the most exciting mind games in the reverse engineering field. In some cases, the reverser needs to know the internals of the operating sy…
01:00:52  |   Mon 09 Jan 2006
Greg Wroblewski: Reversing MSRC Updates: Case Studies of MSRC Bulletins 2004-2007

Greg Wroblewski: Reversing MSRC Updates: Case Studies of MSRC Bulletins 2004-2007

Greg Wroblewski has a Ph.D. in Computer Science and over 15 years of software industry experience. At Microsoft he is a member of a team of security researchers that investigate vulnerabilities and s…
00:18:06  |   Mon 09 Jan 2006
Jeff Morin: Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage

Jeff Morin: Type Conversion Errors: How a Little Data Type Can Do a Whole Lot of Damage

In the realm of application testing, one of the major, but most often overlooked vulnerabilities, is that of type conversion errors. These errors result from input variable values being used througho…
00:10:25  |   Mon 09 Jan 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat/ CMP Media, Inc.. This content is not affiliated with or endorsed by eachpod.com.