Black Hat Media Archives


Black Hat 2003 Multimedia Archives Quick-link
USA Europe Asia Windows Security Federal
Europe 2003


Black Hat Asia Briefings & Training2003
Black Hat Asia 2003
there are no audio or video files available for this conference
Interested in obtaining a conference CD with all the presentations and tools?
contact store<a>blackhat.com
Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentations - Black Hat Asia 2003

Lim Khee Ming, Deputy General Manager (Technology & Operations), Network for Electronic Transfers (S) Pte Ltd (NETS)
The Total Security System Approach - A Perspective From The Financial Industry

PDF:


Harry SK Tan, Director, Centre for Asia Pacific Technology Law & Policy (CAPTEL)
Cyber-crime


Speakers & Topics - Black Hat Asia 2003
David Aitel
MOSDEF Tool Release
PDF: David Aitel, MOSDEF Tool Release
S.K. Chong
Win32 One-Way Shellcode
PDF: S.K. Chong, Win32 One-Way Shellcode
Shaun Clowes
A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor
PDF: Shaun Clowes A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor
Stephen Dugan
Cisco Security


Halvar Flake
Automated Reverse Engineering

PDF: Halvar Flake, Automated Reverse Engineering

Jennifer Stisa Granick
International DMCA Laws

PDF: Jennifer Granick, International DMCA Laws


the grugq
The Art of Defiling: Defeating Forensic Analysis on Unix File Systems
PDF: the grugq, The Art of Defiling: Defeating Forensic Analysis on Unix File Systems Tools & Code: the Grugq

David Litchfield
Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

PDF: David Litchfield, Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server
Tim Mullen
Brute Forcing Terminal Server Logons with TSGrinder
PDF: Tim Mullen, Brute Forcing Terminal Server Logons
Laurent Oudot
Honeypots Against Worms 101
PDF: Laruent Outdot, Honeypots Against Worms 101 Tool, Code & Papers: Laurent Oudot, Honeypots Against Worms 101
Jeremy Rauch
(In)Security in Network Management
PDF: Jeremy Rauch, (In)Security in Network Management
Russ Rogers
Addressing Complete Security to Save Money
PDF: Russ Rogers, Addressing Complete Security to Save Money

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques
Updated tools may also be found at the Net-Square site.

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques PDF: Saumil Shah, Paper, HTTP Fingerprinting and Advanced Assessment Techniques


Black Hat Federal Briefings & Training 2003
Black Hat Federal 2003
there are no audio or video files available for this conference
Interested in obtaining a conference CD with all the presentations and tools?
contact store<a>blackhat.com
Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentations - Black Hat Federal 2003

David G. Major,
co-founder, the Centre for Counterintelligence and Security Studies



Keith Rhodes,
Chief Technologist, GAO


Application Security - Black Hat Federal 2003

Halvar Flake
More Fun With Graphs

PDF: Halvar Flake, More Fun With Graphs

updated materials

Jeremiah Grossman
The Challenges of Automated Web Application Scanning

PDF: Jeremiah Grossman, The Challenges of Automated Web Application Scanning

Greg Hoglund
Runtime Decompilation

PDF: Greg Hoglund, Runtime Decompilation

Drew Miller
Application Intrusion Detection

PDF: Drew Miller, Application Intrusion Detection

updated materials

Gunnar Peterson
Security Design Patterns

PDF: Gunnar Peterson, Security Design Patterns
Attack! - Black Hat Federal 2003

David Aitel
MOSDEF Tool Release

PDF: David Aitel, MOSDEF Tool Release


Ofir Arkin
Using Xprobe2 in a Corporate Environment

PDF: Ofir Arkin, Using Xprobe2 in a Corporate Environment

Dan Kaminsky
Stack Black Ops

PDF: Dan Kaminsky, Stack Black Ops

David Litchfield
Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

PDF: David Litchfield, Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism
Defend! - Black Hat Federal 2003

updated materials

Beetle & Bruce Potter
Rogue AP 101

PDF: Beetle, Rogue AP 101 ZIP Tools: Beetle, Rogue AP 101

Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch
Enhancing Network Security Through Competitive Cyber Exercises

PDF: Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch, Enhancing Network Security Through Competitive Cyber Exercises

Chris Eagle
Strike/Counter-Strike: Reverse Engineering Shiva

PDF: Chris Eagle, Strike/Counter-Strike: Reverse Engineering Shiva Tool: Chris Eagle, Strike/Counter-Strike: Reverse Engineering Shiva

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations

PDF: Larry Leibrock, Digital Information, User Tokens, Privacy and Forensics Investigations

updated materials

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques
Updated tools may also be found at the Net-Square site.

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques Wind32
Linux
MacOS
IDS, IPS and Honeynets - Black Hat Federal 2003

Jay Beale
Intrusion Prevention: an Introduction and Comparison



The Honeynet Project
Latest Advances in Honeynet Technologies

PDF: The Honeynet Project, Latest Advances in Honeynet Technologies

updated materials

Panel-Tom Parker
Adversary Characterization and Scoring Systems

PPT: Panel, Adversary Characterization and Scoring Systems

Marty Roesch
Contextually Intelligent IDS



Lance Spitzner
The Future of Honeypots

PDF: Lance Spitzner, The Future of Honeypots
Policy, Procedure & Law - Black Hat Federal 2003

Jaya Baloo
Government IP Tapping - EU

PDF: Jaya Baloo, Government IP Tapping - EU

updated materials

Chris Hurley
Practical Vulnerability Assessments in a Distributed Federal Environment

PDF: Chris Hurley, Practical Vulnerability Assessments in a Distributed Federal Environment

Rick Smith
The Challenge of Mulitlevel Security

PDF: Rick Smith, The Challenge of Mulitlevel Security

Panel
Hackers Court 2003



Routing & Infrastructure - Black Hat Federal 2003

Dan Avida
Securing Data in Storage

PDF: Dan Avida, Securing Data in Storage

FX
Cisco Vulnerabilities - Yesterday, Today and Tomorrow

PDF: FX, Cisco Vulnerabilities - Yesterday, Today and Tomorrow

updated materials

Mark Gross
Intrusion Vulnerabilities of Fiber Optic Infrastructures

PDF: Mark Gross, Intrusion Vulnerabilities of Fiber Optic Infrastructures

updated materials

Jeremy Rauch
Security in Distributed and Remote Network Management Protocols

PDF: Jeremy Rauch, Security in Distributed and Remote Network Management Protocols

Michael H. Warfield
Security Implications of IPv6

PDF: Paul Wouters, IPsec: Opportunistic Encryption using DNSSEC

Black Hat USA 2003

Black Hat USA 2003

Interested in obtaining a conference CD with all the presentations and tools?
contact store<a>blackhat.com
Track/Speaker/Topic Presentation Notes/Tools See It Hear It
Keynote Presentations - Black Hat USA 2003

Philip R. Zimmermann, Creator, Pretty Good Privacy



RealVideo:Philip Zimmermann - Keynote with Introduction by Jeff Moss RealAudio:Philip Zimmermann - Keynote with Introduction by Jeff Moss
updated materials

Bruce Schneier, Founder & Chief Technical Officer, Counterpane Internet Security
Following the Money: Security
Proxies and Agenda

PDF: Bruce Schneier, Following the Money: Security Proxies and Agenda
RealVideo:Bruce Schneier - Keynote; Following the Money; Security Proxies and Agenda RealAudio:Bruce Schneier - Keynote; Following the Money; Security Proxies and Agenda

Luncheon Presentations - Black Hat USA 2003

Dario Forte, CFE, CISM, Security Advisor, European Electronic Crimes Task Force (EECTF)
International Hacking: When The Cooperation is The Only Cure

RealVideo:Dario Forte (Luncheon) - International Hacking; When the cooperation is the only cure RealAudio:Dario Forte (Luncheon) - International Hacking; When the cooperation is the only cure
Marcus Sachs, P.E., Cyber Program Director, Information Analysis and0 Infrastructure Protection, US Department of Homeland Security
Building a Global Culture of Security
PDF: Marcus Sachs, Building a Global Culture of Security

RealVideo:Marcus Sachs - Building a  Global Culture of Security (Luncheon Speaker)RealAudio:Marcus Sachs - Building a  Global Culture of Security (Luncheon Speaker)
Application Security - Black Hat USA 2003

Jay Beale
Locking Down Mac OS X

PDF: Jay Beale, Locking Down Mac OS X
RealVideo:Jay Beale - Locking Down Mac OS X RealAudio:Jay Beale - Locking Down Mac OS X

Frederic Bret-Mounet
Automated Detection of COM Vulnerabilities

PDF: Frederic Bret-Mounet, Automated Detection of COM Vulnerabilities RealVideo:Fredric Bret-Mounet - Automated Detection of COM Vulnerabilities RealAudio:Fredric Bret-Mounet - Automated Detection of COM Vulnerabilities

Greg Hoglund
Runtime Decompilation

PDF: Greg Hoglund, Runtime Decompilation
RealVideo:Greg Hoglund - Runtime Decompilation RealAudio:Greg Hoglund - Runtime Decompilation

David Litchfield
Variations in Exploit Methods Between Linux and Windows


PDF: David Litchfield, Variations in Exploit Methods Between Linux & Windows White Paper RealVideo:David Litchfield - Variations in Exploit Methods between Linux and Windows RealAudio:David Litchfield - Variations in Exploit Methods between Linux and Windows

Aldora Louw
Notes on Domino

PDF: Aldora Louw, Notes on Domino
RealVideo:Aldora Louw - Notes on Domino RealAudio:Aldora Louw - Notes on Domino

Neel Mehta
Advanced in ELF Runtime Binary Encryption - Shiva

PDF: Neel Mehta, Advanced in ELF Runtime Binary Encryption - Shiva Tool: Neel Mehta, Shiva RealVideo:Neel Mehta - Advanced in ELF runtime binary encryption - Shiva RealAudio:Neel Mehta - Advanced in ELF runtime binary encryption - Shiva

Drew Miller
.NET from the Hacker's Perspective: Part 2

PDF: Drew Miller, .NET from the Hacker's Perspective: Part 2
RealVideo:Drew Miller - .Net from the hackers perspective Part 2  RealAudio:Drew Miller - .Net from the hackers perspective Part 2

Timothy Mullen & Ryan Russell
Brute Forcing Terminal Server Logons with TSGrinder

PDF: Timothy Mullen & Ryan Russell,Brute Forcing Terminal Server Logons with TSGrinder
RealVideo:Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder RealAudio:Tim Mulllen and Ryan Russell - Brute Forcing Terminal Server Logons with TSGrinder

Chris Paget
Click to Continue

PDF: Chris Paget, Click to Continue Code: Chris Paget RealVideo:Chris Paget - Click to Continue; Shatter Attacks on Win32 RealAudio:Chris Paget - Click to Continue; Shatter Attacks on Win32

Kevin Spett
Java Decompilation & Application Security

PDF: Kevin Spett, Java Decompilation & Application Security
RealVideo:Kevin Spett - Java Decompilation and Application Security RealAudio:Kevin Spett - Java Decompilation and Application Security
Core Services - Black Hat USA 2003

Silvio Cesare
Opensource Kernel Auditing/Exploitation

PDF: Silvio Cesare, Opensource Kernel Auditing/Exploitation


RealVideo:Silvio Cesare - Opensource Kernel Auditing and Exploitation RealAudio:Silvio Cesare - Opensource Kernel Auditing and Exploitation

Josh Daymont
Hardening Windows CE

PDF: Josh Daymont, Hardening Windows CE
RealVideo:Josh Daymont - Hardening Windows CE RealAudio:Josh Daymont - Hardening Windows CE

Himanshu Dwivedi
Security Issues with Fibre Channel Storage Networks (SANs)

PDF: Himanshu Dwivedi, Security Issues with Fibre Channel Storage Networks (SANs)
RealVideo:Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks RealAudio:Himanshu Dwivedi - Security Issues with Fibre Channel Storage Networks

FX
More (Vulnerable) Embedded Systems

PDF: FX, More (Vulnerable) Embedded Systems
RealVideo:FX - More Embedded Systems RealAudio:FX - More Embedded Systems

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism, paper RealVideo:SensePost - Putting Tea back into CyberTerrorism RealAudio:SensePost - Putting Tea back into CyberTerrorism
Firewalls, Access Control, Physical Security - Black Hat USA 2003

Michael D. Glasser
OSI Layer 1 Security

PDF: Michael D. Glasser, OSI Layer 1 Security


updated materials

Bruce Potter
Java Card 101

PPT: Bruce Potter, Java Card 101
RealVideo:Bruce Potter - Java Card 101 RealAudio:Bruce Potter - Java Card 101

Jeffrey Prusan
Technical Security Countermeasures

PDF: Jeffrey Prusan, Technical Security Countermeasures
RealVideo:Jeffrey Prusan - Technical Security Countermeasures RealAudio:Jeffrey Prusan - Technical Security Countermeasures

Rick Smith
Masquerades: Tricking Modern Authentication Systems

PDF: Rick Smith, Masquerades: Tricking Modern Authentication Systems
RealVideo:Rick Smith - Masquerades; Tricking Modern Auth Systems RealAudio:Rick Smith - Masquerades; Tricking Modern Auth Systems

Lee Sutterfield
Enterprise Security for Converging Technologies

PDF: Lee Sutterfield, Enterprise Security for Converging Technologies
RealVideo:Sutterfield - Enterprise security for converging technologies RealAudio:Sutterfield - Enterprise security for converging technologies
Incident Response & Computer Forensics - Black Hat USA 2003

Thomas Akin
Web Based Email Forensics

PDF: Thomas Akin, Web Based Email Forensics
RealVideo:Thomas Akin - WebMail Forensics RealAudio:Thomas Akin - WebMail Forensics

The Honeynet Project
Latest Advances in Honeynet Technologies

PDF: The Honeynet Project, Latest Advances in Honeynet Technologies RealVideo:Honey Project - Latest Advances in Honeynet Technologies RealAudio:Honey Project - Latest Advances in Honeynet Technologies

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations

PDF: Larry Leibrock, Digital Information, User Tokens, Privacy and Forensics Investigations
RealVideo:Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigation RealAudio:Larry Leibrock - Digital Information, User Tokens, Privacy and Forensics Investigation

Lance Spitzner
Honeypots

PDF: Lance Spitzner, Honeypots
RealVideo:Lance Spitzner - Honeypots RealAudio:Lance Spitzner - Honeypots

Chuck Willis
Forensics With Linux 101

PDF: Chuck Willis, Forensics With Linux 101 PDF: Chuck Willis, Forensics With Linux 101 Tools + Xtras RealVideo:Chuck Willis - Forensics with Linux 101 RealAudio:Chuck Willis - Forensics with Linux 101
Intrusion Detection, Log Analysis - Black Hat USA 2003

Ofir Arkin
Revolutionizing Operating System Fingerprinting

PDF: Ofir Arkin, Revolutionizing Operating System Fingerprinting
RealVideo:Ofir Arkin - Revolutionizing Operating System Fingerprinting RealAudio:Ofir Arkin - Revolutionizing Operating System Fingerprinting

David Maynor
Leave the Theory Behind and Embrace the Code

PDF: David Maynor, Leave the Theory Behind and Embrace the Code
RealVideo:David Maynor - Leave the Theory Behind and Embrace the Code RealAudio:David Maynor - Leave the Theory Behind and Embrace the Code
Patrick Miller
SPIDeR
PDF: Patrick Miller, SPIDeR ZIP: Patrick Miller, SPIDeR papers RealVideo:Patrick Miller - Spider (tool) RealAudio:Patrick Miller - Spider (tool)

updated materials

Jan K. Rutkowski
Advanced Windows 2000 Rootkits Detection

PDF: Jan K. Rutkowski, Advanced Windows 2000 Rootkits Detection
RealVideo:Jan K Rutkowski - Advance Windows 2000 Rootkits Detection RealAudio:Jan K Rutkowski - Advance Windows 2000 Rootkits Detection

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques
RealVideo:Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques RealAudio:Saumil Shah - HTTP Fingerprinting and Advanced Assessment Techniques

Panels - Black Hat USA 2003

Panel
Adversary Characterization and Scoring Systems
PDF: Panel on Adversary Characterization and Scoring Systems
RealVideo:Panel - Adversary Characterization and Scoring System RealAudio:Panel - Adversary Characterization and Scoring System
Panel
Hacker Court
PDF: Drew Miller Windows Security 2003
RealVideo:Panel - Hacker Court RealAudio:Panel - Hacker Court
Panel
Hiring Trends In Information Security


RealVideo:Panel - Hiring Trends in InfoSec RealAudio:Panel - Hiring Trends in InfoSec
Gerhard Eschelbeck
The Law of Vulnerabilities


RealVideo:Gerhard Eschelbeck - Law Vulnerabilities RealAudio:Gerhard Eschelbeck - Law Vulnerabilities
Panel
A Proposed Process for Handling Vulnerability Information


RealVideo:Panel - Proposed Vulnerability Handling RealAudio:Panel - Proposed Vulnerability Handling
Policy, Law & Society

Jaya Baloo
Lawful Interception of IP: the European Context

PDF: Jaya Baloo, Lawful Interception of IP: the European Context
RealVideo:Jaya Baloo - Lawful Interception of IP the European Context RealAudio:Jaya Baloo - Lawful Interception of IP the European Context

Eric Goldman
Criminal Copyright Infringement and Warez Trading

PDF: Eric Goldman, Criminal Copyright Infringement and Warez Trading
RealVideo:Eric Goldman - Criminal Copyright infringement and warez trading RealAudio:Eric Goldman - Criminal Copyright infringement and warez trading

Curtis E.A. Karnow
Running the Matrix

PDF: Curtis E.A. Karnow, Running the Matrix
RealVideo:Curtis E Karnow - Running the Matrix RealAudio:Curtis E Karnow - Running the Matrix

Andrea M. Matwyshyn
Introduction to Corporate Information Security Law

PDF: Andrea M. Matwyshyn, Introduction to Corporate Information Security Law PDF: Andrea M. Matwyshyn, Introduction to Corporate Information Security Law paper RealVideo:Andrea Matwyshyn - Introduction to Corporate Information Security Law RealAudio:Andrea Matwyshyn - Introduction to Corporate Information Security Law

Gerardo Richarte
Modern Intrusion Practices

PDF: Gerardo Richarte, Modern Intrusion Practices
RealVideo:Gerardo Richarte - Modern Intrusion Practices RealAudio:Gerardo Richarte - Modern Intrusion Practices
Privacy & Anonymity - Black Hat USA 2003

Jennifer Stisa Granick
The Law of 'Sploits

PDF: Jennifer Stisa Granick, The Law of 'Sploits
RealVideo:Jennifer Granick - The Law of 'Sploits RealAudio:Jennifer Granick - The Law of 'Sploits

Len Sassaman & Roger Dingledine
Attacks on Anonymity Systems (Theory)

PDF: Len Sassaman & Roger Dingledine, Attacks on Anonymity Systems (Theory)
RealVideo:Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory) RealAudio:Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems (Theory)

Len Sassaman & Roger Dingledine
Attacks on Anonymity Systems (Practice)

PDF: Len Sassaman & Roger Dingledine Attacks on Anonymity Systems (Practice)
RealVideo:Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems RealAudio:Len Sassaman and Roger Dingledine - Attacks on Anonymity Systems

updated materials

Adam Shostack
Identity: Economics, Security, and Terrorism

PDF: Adam Shostack, Identity: Economics, Security, and Terrorism
RealVideo:Adam Shostack - Identity; Economics, Security, and Terrorism RealAudio:Adam Shostack - Identity; Economics, Security, and Terrorism

Simple Nomad
Covering Your Tracks

PDF: Simple Nomad, Covering Your Tracks RealVideo:Simple Nomad - Covering Your Tracks RealAudio:Simple Nomad - Covering Your Tracks
Routing & Infrastructure - Black Hat USA 2003

updated materials
Matthew Franz & Sean Convery
BGP Vulnerability Testing

PDF: Matthew Franz & Sean Convery, BGP Vulnerability Testing
RealVideo:Matthew Franz and Sean Convery - BGP Vulnerability Testing RealAudio:Matthew Franz and Sean Convery - BGP Vulnerability Testing

Dan Kaminsky
Stack Black Ops

PDF: Dan Kaminsky, Stack Black Ops
RealVideo:Dan Kaminsky - Stack Black Ops RealAudio:Dan Kaminsky - Stack Black Ops

Marco Valleri & Alberto Ornaghi
Man In The Middle Attacks

PDF: Marco Valleri & Alberto Ornaghi, Man In The Middle Attacks
RealVideo:Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks RealAudio:Marco Valleri and Alberto Ornaghi - Man in the Middle Attacks

Brandon Wiley
The Superworm Manifesto

PDF: Brandon Wiley, The Superworm Manifesto
RealVideo:Brandon Wiley - The Superworm Manifesto RealAudio:Brandon Wiley - The Superworm Manifesto

Paul Wouters
IPsec: Opportunistic Encryption using DNSSEC

PDF: Paul Wouters, IPsec: Opportunistic Encryption using DNSSEC
RealVideo:Paul Wouters - IPSEC; Opportunistic Encryption using DNSSEC RealAudio:Paul Wouters - IPSEC; Opportunistic Encryption using DNSSEC


Black Hat Europe 2003
Black Hat Europe 2003
there are no audio or video files available for this conference
Speaker/Topic Presentation Notes/Tools
Keynote Presentation - Black Hat Europe 2003

Richard Thieme
Masters of the Unseen: The Art of Information Warfare



Speakers & Topics - Black Hat Europe 2003

David Aitel
Vivisection of an Exploit Development Process

Black Hat Europe 2003 PDF: David Aitel

Jaya Baloo
Lawful Interception of IP: The European Context

Black Hat Europe 2003 PDF: Jaya Baloo

BBP
BSD Heap Smashing

Black Hat Europe 2003 PDF: BBP tool: BBP Black Hat Europe 2003
tools & code

Shaun Clowes
Generic Technical Defences

Black Hat Europe 2003 PDF: Shaun Clowes tool: Shaun Clowes Black Hat Europe 2003
tools & code

Bram Cohen
Security Issues in P2P File Distribution

Black Hat Europe 2003 PDF: Bram Cohen

Job de Haas
Pocket PC Phone Security

Black Hat Europe 2003 PDF: Job de Haas

Stephen Dugan
$tea£ing with BGP

Black Hat Europe 2003 PDF: Stephen Dugan

Nicolas Fischbach
DDoS Mitigation and Analysis at the Infrastructure Level

Black Hat Europe 2003 PDF: Nicolas Fischbach

Halvar Flake
Data Flow Analysis

Black Hat Europe 2003 PDF: Halvar Flake

FX
Design and Software Vulnerabilities In Embedded Systems

Black Hat Europe 2003 PDF: FX

Greg Hoglund
Runtime Decompilation

Black Hat Europe 2003 PDF: Greg Hoglund

The Honeynet Project
Honeynet Technologies: Sebek

Black Hat Europe 2003 PDF: the Honeynet Project

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations: The Case of Windows XP Platform

Black Hat Europe 2003 PDF: Larry Leibrock

David Litchfield
All New Oracle Ø-Day: Attacking and Defending Oracle

Black Hat Europe 2003 PDF: David Litchfield

Andrey Malyshev & Serg Vasilenkov
Security Analysis of Microsoft Encrypted File System (EFS)

Black Hat Europe 2003 PDF: Andrey Malyshev & Serg Vasilenkov

Len Sassaman
Designing Useful Privacy Applications

Black Hat Europe 2003 PDF: Len Sassaman

Marc Schoenfeld
Hunting Flaws in JDK

Black Hat Europe 2003 PDF: Marc Schoenfeld

Sensepost
The Role of Non Obvious Relationships in the Foot Printing Process

Black Hat Europe 2003 PDF: Sensepost Black Hat Europe 2003 PDF: Senspost
notes

Adam Shostack
Will People Ever Pay for Privacy?

Black Hat Europe 2003 PDF: Adam Shostack

Lance Spitzner
Honeypots: Tracking Hackers

Black Hat Europe 2003 PDF: Lance Spitzner

Marco Valleri & Alberto Ornaghi
Man In The Middle Attacks

Black Hat Europe 2003 PDF: Marco Valleri & Alberto Ornaghi

Paul Wouters
Deploying DNSSEC

Black Hat Europe 2003 PDF: Paul Wouters


Black Hat Windows 2003

Black Hat Windows Security 2003

Miss out on the Black Hat Windows 2003 show?
Read what others had to say: CNET | King County Journal

Track/Speaker/Topic Presentation Notes/Tools See It Hear It
Keynote Presentations - Black Hat Windows Security 2003

Scott Culp
Trustworthy Computing Update



RealVideo: Scott Culp
Curtis E. A. Karnow
Strike and Counterstrike: The Law on Automated Intrusions and Striking Back
Word: Curtis E. A. Karnow Windows Security 2003 PDF: Curtis E. A. Karnow Notes Windows Security 2003 RealVideo: Curtis EA Karnow
Application Development - Black Hat Windows Security 2003

Michael Howard & David LeBlanc
Writing Secure and Hack Resistant Code

PDF: Michael Howard & David LeBlanc Windows Security 2003
RealVideo: Michael Howard & David LeBlanc

Yoshiaki Komoriya & Hidenobu Seki
Exploiting DCOM

Poewrpoint: Yoshiaki Komoriya & Hidenobu Seki Windows Security 2003 Zip: Windows Security 2003 RealVideo: Yoshiaki Komoriya & Hidenobu Seki

Marc Schöenefeld
Java Library Hole Allowing Multiplatform Denial-Of-Service

PDF: Marc Schöenefeld Windows Security 2003
RealVideo: Marc Schöenefeld
Audit / Response / Policy - Black Hat Windows Security 2003

Jeremiah Grossman & Bill Pennington
Web Application Security

PDF: Jeremiah Grossman & Bill Pennington Windows Security 2003 HTML: Jeremiah Grossman & Bill Pennington Windows Security 2003 RealVideo: Jeremiah Grossman & Bill Pennington

Riley Hassell
Payload Anatomy & Future Mutations

PDF: Riley Hassell Windows Security 2003
RealVideo: Riley Hassell

Dan Kaminsky
Applied Black Op Networking on Windows XP

Powerpoint: Dan Kaminsky Windows Security 2003
RealVideo: Dan Kaminsky

Larry Leibrock, Ph.D
Forensics Tools and Processes for Windows® XP Platforms

PDF: Larry Leibrock Windows Security 2003
RealVideo: Larry Leibrock
Deep Knowledge - Black Hat Windows Security 2003

David Aitel
Vivisection of an Exploit Development Process

PDF: David Aitel Windows Security 2003 Zip: David Aitel tool Windows Security 2003 RealVideo: David Aitel
Halvar Flake
Graph-Based Binary Analysis
PDF: Halvar Flake Windows Security 2003
RealVideo: Halvar Flake

Eric Schultze & Erik Birkholz
Securing Your Network

PDF: Eric Schultze & Erik Birkholz Windows Security 2003
RealVideo: Eric Schultze & Erik Birkholz
IIS, SQL, ISA, etc. - Black Hat Windows Security 2003

Cesar Cerrudo & Aaron Newman
Hunting Flaws in MS SQL Server

PDF: Cesar Cerrudo & Aaron Newman Windows Security 2003 PDF: Cesar Cerrudo & Aaron Newman notes Windows Security 2003
notes

Zip: Cesar Cerrudo & Aaron Newman tools Windows Security 2003
tool

RealVideo: Cesar Cerrudo & Aaron Newman

David Litchfield
Oracle Security II



RealVideo: David Litchfield

Timothy Mullen
Enforcer™

PDF: Timothy Mullen Windows Security 2003
RealVideo: Timothy Mullen
Saumil Udayan Shah
HTTP: Advanced Assessment Techniques
PDF: Windows Security 2003
RealVideo: Saumil Udayan Shah
Networking & Integration - Black Hat Windows Security 2003

Stephen Dugan
$tea£ing with BGP

PDF: Stephen Dugan Windows Security 2003
RealVideo: Stephen Dugan
FX
Design Issues and Software Vulnerabilities in Embedded Systems
PDF: FX Windows Security 2003
RealVideo: FX

Haroon Meer & Charl van der Walt
The Role of Non Obvious Relationships in the Foot Printing Process

Powerpoint: Haroon Meer & Charl van der Walt Windows Security 2003 PDF: Haroon Meer & Charl van der Walt notes Windows Security 2003 RealVideo: Haroon Meer & Charl van der Walt

Steve Riley
Securing Wireless Networks with 802.1x, EAP-TLS and PEAP

PDF: Steve Riley Windows Security 2003 PDF: Steve Riley notes Windows Security 2003 RealVideo: Steve Riley
Windows 2003 Server / .NET - Black Hat Windows Security 2003

Mark Burnett
FrontPage Server Extensions on Windows Server 2003

Powerpoint: Mark Brunett Windows Security 2003 Tool: Mark Burnett Powerpoint: Mark Brunett Windows Security 2003 RealVideo: Mark Burnett
Drew Miller
.NET from the Hacker's Perspective
PDF: Drew Miller Windows Security 2003 PDF: Drew Miller notes Windows Security 2003 RealVideo: Drew Miller

Michael Muckin
IIS 6.0's Security Architecture - It's a Whole New World

Powerpoint: Michael Muckin Windows Security 2003
RealVideo: Michael Muckin

Steve Riley & Timothy Bollefer
Surviving OpenHack IV

Powerpoint: Steve Riley & Timothy Bollefer Windows Security 2003
RealVideo: Steve Riley & Timothy Bollefer


Black Hat Logo
(c) 2004 Black Hat, Inc