BlackHatAsia 2002 Oct. 3, 2002 to Oct. 4, 2002, Marina Bay,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Attacking and Securing UNIX FTP Servers Jay Beale The Unix FTP servers have been called 'the IIS of the Unix world' for their ...
Phase II - 2nd Generation Honeynet Technologies Jay Beale Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The ...
Fixing/Making Holes in Binaries: the Easy, the Hard, the Time Consuming Shaun Clowes The ability to modify a binary while on disk or as a running process provides ...
Cisco Security Stephen Dugan This talk will focus on tying together your security within a well designed campus network. ...
Aggressive Security Revisited Riley "Caezar" Eller Defensive security models were adopted in the past in many cases because they were cheap. ...
Graph-Based Binary Analysis Halvar Flake Though many Servers run Open-Source solutions these days, a lot of the critical infrastructure consists ...
Attacking Networked Embedded Systems Fx Every device on a network that has a processor, some memory and a network interface ...
Identifying Web Servers: A First-look Into the Future of Web Server Fingerprinting Jeremiah Grossman Many diligent security professionals take active steps to limit the amount of system specific information ...
Exploiting Parsing Vulnerabilities Greg Hoglund This talk will focus on reverse engineering parsing code using a combination of IDA-Pro and ...
Black Ops Of TCP/IP: Advanced Network Disconstruction Dan Kaminsky There's more to your network then you might have assumed. Intelligent, active devices litter the ...
Computer Forensics - Tracking the Cyber Vandals Martin Khoo Computer forensic capabilities have become a critical skill of security practitioners as part of their ...
Java and Java Virtual Machine Security Vulnerabilities and Their Exploitation Techniquess LSD The presentation would be divided into two parts. Part 1: Fundamental information about Java and ...
Forensics Tools and Processes for Windows XP Platforms® Larry Leibrock This overview will involve case investigation procedures and a set of advanced tools for the ...
Database Security - The Pot and the Kettle. David Litchfield This talk will examine the database server offerings from both Microsoft and Oracle and show ...
Neutralizing Nimda: Technical, Moral, and Legal discussions of an Automated Strike-back Timothy ( Thor ) Mullen This session is more about questions than it is about answers. Though almost a year ...
Top Ten Web Attacks Saumil Udayan Shah Saumil Shah holds a designation as a Certified Information Systems Security Professional (CISSP). Saumil has ...
Setiri: Advances in Trojan Technology Haroon Meer The presentation will describe the inner workings of the Trojan "Setiri". Setiri leads a new ...