Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. Podcast
1) Jeff Moss and Roger Cumming: Welcome and Keynote.
Jeff Moss introduces the Keynote and welcomes everyone tthe Amsterdam 2007 conference! Roger will provide an overview of the work of CPNI in reducing vulnerability in information systems that form ...Show More
2) Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection
"Today, other than doing a full static analysis of the code, the most common practice tfind vulnerabilities in your web application is tget off-the-shelf automated web scanner, point ta URL, and hope ...Show More
3) StefanZanero: 360 Anomaly Based Unsupervised Intrusion Detection
"In this talk, after briefly reviewing why we should build a good anomaly-based intrusion detection system, we will briefly present twIDS prototypes developed at the Politecnicdi Milanfor network an...Show More
4) Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones
"SS7 has been a walled garden for a long time: only big telcwould be interconnected tthe network. Due tderegulation and a push toward all-IP architecture, SS7 is opening up, notably with SIGTRAN (SS7 ...Show More
5) Ollie Whitehouse: GS and ASLR in Windows Vista
"Introduction:The following presentation is twparts, the first covers aspects of Microsoft's GS implementation and usage. The second is a complementary section dealing with ASLR in Windows Vista, its ...Show More
6) Lluis Mora: SMTP Information gathering
"The SMTP protocol, used in the transport and delivery of e-mail messages, includes control headers along with the body of messages which, as opposed tother protocols, are not stripped after the messa...Show More
7) Laurent Butti: Wi-Fi Advanced Fuzzing
"Fuzzing is a software testing technique that consists in finding implementation bugs. Fuzzing Wi-Fi drivers is becoming more and more attractive as any exploitable security bug will enable the attack...Show More
8) Kostya Kortchinsky: Making Windows Exploits more reliable
"When dealing with Windows exploits, an issue that often emerge is their cross-platform reliability, meaning they often work against either some given service packs of the OS, or some localization of ...Show More
9) ERESI Team: Next generation debuggers for reverse engineering
"Classical debuggers make use of an interface provided by the operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the communi...Show More
10) Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests
"ScarabMon is a new tool and framework for simplifying web application pentests. It makes the process of finding many common webapp flaws much easier. The user simply navigates the target site while u...Show More