BlackHatDC 2006 Jan. 25, 2006 to Jan. 26, 2006, Washington,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: Security Research and Vulnerability Disclosure Linton Wells Ii N/A
Nematodes Dave Aitel This presentation presents concepts for taking exploitation frameworks into the next evolution: solving complex security ...
Finding Digital Evidence in Physical Memory Mariusz Burdach Historically, only file systems were considered as a storage where evidence could be found. But ...
Client Side Penetration Testing Max Caceres The notion of a network perimeter that we can fully protect and monitor is no ...
How to Automatically Sandbox IIS With Zero False Positive and Negative Tzi-cker Chiueh Comparing the system call sequence of a network application against a sandboxing policy is a ...
Angel Recon System (ARS) Prototype: Heuristic Vulnerability Analysis and Attack Drew Copley ARS is a heuristic vulnerability analysis system which is meant to run on a system ...
Attacks on Uninitialized Local Variables Halvar Flake Buffer overflows have been abused in order to compromise software systems for the better part ...
New Directions in Disk Forensics Simson L. Garfinkel As the number of hard drives sized during the course of investigations increases into the ...
Implementing and Detecting An ACPI BIOS Rootkit John Heasman As rootkit detection tools become more sophisticated, the rootkit writer must strive to leave less ...
Analysis of Web Application Worms and Viruses Billy Hoffman Worms traditionally propagate by exploiting a vulnerability in an OS or an underlying service. 2005 ...
Network Black Ops: Extracting Unexpected Functionality from Existing Networks Dan Kaminsky Our networks are growing. Is our understanding of them? This talk will focus on the ...
Analysis of Adversarial Code: Problem, Challenges, Results Arun Lakhotia , Michael Venable Disassemblers and debuggers, tools that were in vogue two decades ago, have resurged. In the ...
Breakable David Litchfield Four years ago at Blackhat, David presented a talk on critical weaknesses in the Oracle ...
Foreign Attacks on Corporate America (How the Federal Government can apply lessons learned from the private sector) Kevin Mandia Throughout his career, Kevin Mandia has worked directly with both the public and private sector ...
SCADA Security and Terrorism: We're Not Crying Wolf! David Maynor , Robert Graham Many are beginning to believe the FUD about SCADA is merely the cyber-security industry employing ...
Combatting Symbian Malware Jarno Niemel Viruses worms and trojans that operate on Symbian devices are becoming from a technical curioisity ...
The Era of a Zero-Day Nation-State: Characterising the real threats to our nations critical information systems Tom Parker , Matthew G. Devost Since Tuesday, September 11th 2001, the concept of cyber terrorism has been extensively referenced, speculated ...
Rootkit Hunting vs. Compromise Detection Joanna Rutkowska Recently we can observe increased interest in rootkit technology all over the world. Eventually many ...
Pentesting J2EE Marc Schöenefeld J2EE is known as a framework that provides java business application with a secure underpinning. ...
Beyond EIP Skape , Spoonm When we built Metasploit, our focus was on the exploit development process. We tried to ...
Playing Server Hide and Seek on the Tor Anonymity Network Paul Syverson , Lasse Verlier Can you set up a server that anyone can access but no one can find? ...
FragFS: An Advanced NTFS Data Hiding Technique Irby Thompson , Mathew Monroe The ability to both conceal and detect hidden data on the hard drive of a ...