Black Hat Media Archives


Black Hat 2002 Multimedia Archives Quick-link
USA Europe Asia Windows Security


Black Hat Asia 2002

Black Hat Asia 2002
there are no audio or video files available for this conference

Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentations - Black Hat Asia 2002

Thomas C. Waszak
Perspectives


Martin Khoo
Computer Forensics - Tracking the Cyber Vandals


Track 1 - Black Hat Asia 2002

Stephen Dugan
Cisco Security


Halvar Flake
Graph-Based Binary Analysis


FX
Attacking Networked Embedded Systems


Greg Hoglund
Exploiting Parsing Vulnerabilities


The Pit- Full Release

Last Stage of Delirium
Java and Java Virtual Machine Security Vulnerabilities and Their Exploitation Techniques

Larry Leibrock, Ph.D
Forensics Tools and Processes for Windows XP Platforms®


Tim Mullen
Neutralizing Nimda: Automated Strikeback


Saumil Shah
Top Ten Web Hacks


Track 2 - Black Hat Asia 2002

Jay Beale
Attacking and Securing UNIX FTP Servers


Jay Beale
Phase II - 2nd Generation Honeynet Technologies


Shaun Clowes
Fixing/Making Holes in Binaries


Elfutils Tool

Riley "Caezar" Eller
Aggressive Security Revisited


Jeremiah Grossman
Identifying Web Servers


Dan Kaminsky
Black Ops of TCP/IP


Paketto Keiretsu 1.0 tool

David Litchfield
Database Security


Haroon Meer & Jaco van Graan
Setiri


Black Hat USA 2002

Black Hat USA 2002

Miss out on the Black Hat USA 2002 show?
Read what others had to say.

Track/Speaker/Topic Presentation Notes/Tools See It Hear It
Keynote Presentations - Black Hat USA 2002

Richard Clarke, Office of Cyberspace Security
National Strategy for Securing Cyberspace



Richard Clarke-Keynote National Strategy for Securing CyberspaceRichard Clarke-Keynote National Strategy for Securing Cyberspace
Luncheon Speakers - Black Hat USA 2002
Richard George, NSA
Views On the Future Direction of Information Assurance

Richard George-Views On The Future Direction of Information AssuranceRichard George-Views On The Future Direction of Information Assurance

Jeff Jonas
Non-Obvious Relationship Awareness (NORA) Technology



Jeff Jonas-Non Obvious Relationship AwarenessJeff Jonas-Non Obvious Relationship Awareness
Application Security - Black Hat USA 2002

Dave Aitel
An Introduction to SPIKE


Dave Aitel-An Introduction to SpikeDave Aitel-An Introduction to Spike

Shaun Clowes
Fixing/Making Holes in Binaries


Elfutils Tool


Injectso Tool

Shaun Clowes-Fixing and Making Holes in BinariesShaun Clowes-Fixing and Making Holes in Binaries

JD Glaser
JD's Toolbox: Fire & Water


JD Glaser-JDs Toolbox Fire and IceJD Glaser-JDs Toolbox Fire and Ice

Greg Hoglund
Application Testing Through Fault Injection Techniques


RealVideo: Greg Hoglund Black Hat USA 2002

Rain Forest Puppy
Novell: The Forgotten OS



Rain Forest Puppy-Novell The Forgotten OSRain Forest Puppy-Novell The Forgotten OS

Marc Schönefeld
Security Aspects in Java Bytecode Engineering


RealVideo: Marc Schonefeld Black Hat USA 2002
Intrusion Detection / Incident Response / Forensics - Black Hat USA 2002

Thomas Akin
Cisco Router Forensics

RealVideo: Thomas Akin Black Hat USA 2002

Matthew Caldwell
Security Event Correlation


no media available


Oliver Friedrichs & Elias Levy
Building a Global Early Warning Sytems for Internet Attacks



no media available


The Honeynet Project
Phase II - 2nd Generation Honeynet Technologies


The Honeynet Project-2nd Generation Honeynet TechnologiesThe Honeynet Project-2nd Generation Honeynet Technologies

Tim Mullen
Neutralizing Nimda: Automated Strikeback


Tim Mullen-Neutralizing Nimda Automated StrikebackTim Mullen-Neutralizing Nimda Automated Strikeback

Debra Littlejohn Shinder
Scene of the Cybercrime


RealVideo: Debra Littlejohn Shinder Black Hat USA 2002
Deep Knowledge - Black Hat USA 2002

Maximiliano Caceres
Syscall Proxying

Maximiliano Caceres-Syscall ProxyingMaximiliano Caceres-Syscall Proxying

Mark Dowd, Nishad Herath, Neel Mehta, Chris Spencer & Halvar Flake
Professional Source Code Auditing


Dow Herath Mehta Spencer and Flake-Professional Source Code AuditingDow Herath Mehta Spencer and Flake-Professional Source Code Auditing

Halvar Flake
Graph-Based Binary Analysis


Halvar Flake-Graph Based Binary AnalysisHalvar Flake-Graph Based Binary Analysis

Aaron Higbee & Chris Davis
DC Phone Home

Aaron Higbee and Chris Davis-DC Phone HomeAaron Higbee and Chris Davis-DC Phone Home

Dan Kaminsky
Black Ops of TCP/IP


Dan Kaminsky-Black Ops of TCPIPDan Kaminsky-Black Ops of TCPIP
Firewall / Access - Black Hat USA 2002

Jed Haile
Hogwash


Jed Haile-HogwashJed Haile-Hogwash

Diana Kelley & Ian Poynter
Single Sign-On 101


Diana Kelly and Ian Poynter-Single Sign On 101Diana Kelly and Ian Poynter-Single Sign On 101

Rich Murphey
Locking Down Your FreeBSD Install

Rich Murphy-Locking Down Your FreeBSD InstallRich Murphy-Locking Down Your FreeBSD Install

Rick Smith
The Biometrics Dilemma


Rick Smith-The Biometrics DilemmaRick Smith-The Biometrics Dilemma

Roelof Temmingh & Haroon Meer
Setiri

RealVideo: Roelof Temmingh & Haroon Meer Black Hat USA 2002
Privacy & Anonymity - Black Hat USA 2002

Roger Dingledine
Why is Anonymity So Hard?


Roger Dingledine-Why is Anonymity So HardRoger Dingledine-Why is Anonymity So Hard

Mark Eckenwiler
The USA Patriot Act and Criminal Investigations


Mark Eckenwiler-USA Patriot Act and Criminal InvestigationsMark Eckenwiler-USA Patriot Act and Criminal Investigations

Ian Goldberg
Off the Record Messaging


Ian Goldberg-Off the Record MessagingIan Goldberg-Off the Record Messaging

David Goldman & Robert Marotta
Securing Your Computing Environment to Conform to Privacy Regulations


Goldman and Marotta-Securing Your Computing Environment to Conform to Privacy RegulationsGoldman and Marotta-Securing Your Computing Environment to Conform to Privacy Regulations

Len Sassaman
Forensic Dead-Ends


Mixmaster Tool


Nilsimsa Tool

Len Sassaman-Forensic Dead-EndsLen Sassaman-Forensic Dead-Ends
Routing & Infrastructure - Black Hat USA 2002

Ofir Arkin
Cracking VoIP Architecture


Ofir Arkin-Cracking VoIP ArchitectureOfir Arkin-Cracking VoIP Architecture

Sean Convery
Hacking Layer 2


RealVideo: Sean convery Black Hat USA 2002

Stephen Dugan
Putting 2 and 2 Together


RealVideo: Steve Dugan Black Hat USA 2002

Nicolas Fischbach & Sébastien Lacoste-Séris
IP Backbone Security


Fischbach and Lacoste-Seris-IP Backbone SecurityFischbach and Lacoste-Seris-IP Backbone Security

FX & kim0
Attacking Networked Embedded Systems


RealVideo: FX & Kim0 Black Hat USA 2002

Paul Knight
Dynamic Routing Inside IPsec VPNs

Paul Knight-Dynamic Routing Inside IPsec VPNsPaul Knight-Dynamic Routing Inside IPsec VPNs
Web, Mail, DNS & Others - Black Hat USA 2002

Jay Beale
Attacking and Securing UNIX FTP Servers


Jay Beale-Attacking and Securing UNIX FTP ServersJay Beale-Attacking and Securing UNIX FTP Servers

Scott Blake
The Politics of Vulnerabilities


Scott Blake-Politics of VulnerabilitiesScott Blake-Politics of Vulnerabilities

David Endler & Michael Sutton
Web Application Brute Forcing 101


RealVideo: David Endler & Michael Sutton Black Hat USA 2002

Dennis Groves & Bill Pennington
Web Application Security


Dennis Groves and Bill Pennington-Web Application SecurityDennis Groves and Bill Pennington-Web Application Security

Paul Holman
Enterprise Email Security Made Practical


RealVideo: Paul Holman Black Hat USA 2002

David Litchfield
Database Security



RealVideo: David Litchfield Black Hat USA 2002
Wireless - Black Hat USA 2002

Robert Baird & Mike Lynn
Advanced 802.11b Attack

Robert Baird and Mike Lynn-Advanced 80211b AttackRobert Baird and Mike Lynn-Advanced 80211b Attack

Bruce Potter
802.1x


Bruce Potter-802.11XBruce Potter-802.11X

Mike Schiffman
The Need for an 802.11b Toolkit


Mike Schiffman-The Need for an 802.11b ToolkitMike Schiffman-The Need for an 802.11b Toolkit

Dan Veeneman
Wireless Overview: Protocols & Threat Models


Dan Veeneman-Wireless Overview-Protocols and Threat ModelsDan Veeneman-Wireless Overview-Protocols and Threat Models

Dan Veeneman
Vulnerabilities of Cellular and Satellite-based Voice and Data Networks


Dan Veeneman-Vulnerabilities of Cellular and Satellite-based Voice and Data NetworksDan Veeneman-Vulnerabilities of Cellular and Satellite-based Voice and Data Networks
Panels - Black Hat USA 2002

Hacker Court
Carole Fennelly, Rebecca Bace, Richard Thieme, Jennifer Granick, Jonathan Klein, Brian Martin, Don Cavender, Jesse Kornblum, Kevin Manson, Simple Nomad, Jack Holleran & Richard P. Salgado



Panel-Hacker CourtPanel-Hacker Court

Vulnerability Disclosure: What the Feds Think
Michael I. Morgenstern, Richard George, Marcus H. Sachs, O. Sami Saydjari, Steve Lipner, Tom Parker



Panel-Vulnerability Disclosure What the Feds ThinkPanel-Vulnerability Disclosure What the Feds Think


Black Hat Windows 2002

Black Hat Windows Security 2002

Track/Speaker/Topic Presentation Tools See It Hear It
Keynote Presentation - Black Hat Windows Security 2002

Jennifer S. Granick, Attorney At Law
Digital Rights Management Legal Briefing

PowerPoint: Jennifer S Granick Black Hat Windows 2002


RealVideo: Jennifer S. Granick Black Hat Windows 2002

Tony Sager, National Security Agency
Windows Security Configuration Guide

Powerpoint: Tony Sager Black Hat Windows 2003


RealVideo: Tony Sager Black Hat Windows 2002
General - Black Hat Windows Security 2002

David Goldman & Todd Feinman & Joe Nocera
The Deep Technical Audit: How to Mitigate the Risks Presented in Other Sessions

PowerPoint: David Goldman & Todd Feinman & Joe Nocera Black Hat Windows 2002


RealVideo: David Goldman & Todd Feinman & Joe Nocera Black Hat Windows 2002

Jesper Johansson
Mobile Computing Security

Powerpoint: Jesper Johansson Black Hat Windows 2002 presentation


RealVideo: Jesper Johansson Black Hat Windows 2002

Eric Schultze
How to Stay Up-To-Date On Security Patches

PowerPoint: Eric Schultze Black Hat Windows 2002


RealVideo: Eric Schultze Black Hat Windows 2002

Roelof Temmingh & Haroon Meer
Bi-directional Communications in a Heavily Protected Environment

PowerPoint: Roelof Temmingh & Haroon Meer Black Hat Windows 2002


Roelof Temmingh and Haroon Meer-SetiriRoelof Temmingh and Haroon Meer-Setiri
Network - Black Hat Windows Security 2002

Ofir Arkin
VoIP: The Next Generation of Phreaking

PowerPoint: Ofir Arkin Black Hat Windows 2002


RealVideo: Ofir Arkin Black Hat Windows 2002

Stephen Dugan
Protecting Your Cisco Infrastructure Against the Latest "Attacktecs"

PowerPoint: Stephen Dugan Black Hat Windows 2002


RealVideo: Stephen Dugan Black Hat Windows 2002

FX
Routing and Tunneling Protocol Attacks

PowerPoint: FX Black Hat Windows 2002


RealVideo: FX Black Hat Windows 2002

Jonathan Wilkins
Taranis

PowerPoint: Jonathan Wilkins Black Hat Windows 2002


RealVideo: Jonathan Wilkins Black Hat Windows 2002
MS Apps - Black Hat Windows Security 2002

Jay Beale & Andrew Hintz
Attacking and Defending DNS

PowerPoint: Jay Beale & Andrew Hintz Black Hat Windows 2002


RealVideo: Jay Beale & Andrew Hintz Black Hat Windows 2002

Tony Harris & Murugiah Souppaya
NIST Recommendations for System Administrators for Securing Windows 2000 Professional

PowerPoint: Tony Harris & Murugiah Souppaya Black Hat Windows 2002


RealVideo: Tony Harris & Murugiah Souppaya Black Hat Windows 2002

Laura A. Robinson
The Devil Inside: Planning Security in Active Directory Design

PowerPoint: Laura A. Robinson Black Hat Windows 2002


RealVideo: Laura A. Robinson Black Hat Windows 2002

Thomas Shinder & Jim Harrison
Deploying and Securing Microsoft Internet Security and Acceleration Server

Powerpoint: Thomas Shinder & Jim Harrison Black Hat Windows 2002


RealVideo: Thomas Shinder & Jim Harrison Black Hat Windows 2002
Tools of the Trade - Black Hat Windows Security 2002

Erik Pace Birkholz
How to Fix a Broken Window

PowerPoint: Erik Pace Birkholz Black Hat Windows 2002


RealVideo: Erik Pace Birkholz Black Hat Windows 2002

Jeremiah Grossman
Web Application Security and Release of "WhiteHat Arsenal"

Powerpoint: Jeremiah Grossman Black Hat Windows 2002 Tools: Jeremiah Grossman Black Hat Windows 2002 RealVideo: Jeremiah Grossman Black Hat Windows 2002

Urity
Cracking NTLMv2 Authentication

PowerPoint: Urity Black Hat Windows 2002


RealVideo: Urity Black Hat Windows 2002
Database - Black Hat Windows Security 2002

Chip Andrews
MS SQL Server Security Mysteries Explained

Powerpoint: Chip Andrews Black Hat Windows 2002


RealVideo: Chip Andrews Black Hat Windows 2002

JD Glaser
One-Way SQL Hacking: Futility of Firewalls in Web Hacking

JD Glaser Black Hat Windows 2002


RealVideo: JD Glaser Black Hat Windows 2002

David Litchfield & Sherief Hammad
Oracle Vulnerabilities

Powerpoint: David Litchfield & Sherief Hammad Black Hat Windows 2002


RealVideo: David Litchfield & Sherief Hammad Black Hat Windows 2002

Timothy Mullen
Web Vulnerability and SQL Injection Countermeasures: Securing Your Servers From the Most Insidious of Attacks

PowerPoint: Timothy Mullen Black Hat Windows 2002


RealVideo: Timothy Mullen Black Hat Windows 2002
Deep Knowledge - Black Hat Windows Security 2002

Harlan Carvey
NT/2K Incident Response and Mining for Hidden Data: Post Mortem of a Windows Box

Powerpoint: Harlan Carvey Black Hat Windows 2002


RealVideo: Harlan Carvey Black Hat Windows 2002

Halvar Flake
Third Generation Exploits on NT/Win2k Platforms

Powerpoint: Halvar Flake Black Hat Windows 2002


RealVideo: Halvar Flake Black Hat Windows 2002


Black Hat Logo
(c) 2004 Black Hat, Inc