BlackHatWindows 2003 Feb. 26, 2003 to Feb. 27, 2003, Las Vegas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Vivisection of an Exploit Development Process: What To Do When It's Not Easy David Aitel Dave will take you from beginning to end in the development of the Microsoft Content ...
Surviving OpenHack IV: Yes, You Can Do It With Microsoft Technology Steve Riley , Timothy Bollefer In October 2002 Microsoft participated in eWeek's OpenHack IV competition, an online contest designed to ...
FrontPage Server Extensions on Windows Server 2003 Mark Burnett The FrontPage Server Extensions (FPSE) have always had a bad reputation when it comes to ...
Hunting Flaws in MS SQL Server Cesar Cerrudo , Aaron Newman This talk will show many new SQL Server vulnerabilities and how they were found. Also ...
Trustworthy Computing Update Scott Culp Microsoft announced its Trustworthy Computing Initiative just over a year ago. What's happened since then? ...
$teaing with BGP Stephen Dugan This talk will illustrate the vast amount of harm that could be done IF the ...
Graph-Based Binary Analysis Halvar Flake Though many Servers run Open-Source solutions these days, a lot of the critical infrastructure consists ...
Attacking Network Embedded Systems Fx The speech covers design issues and software vulnerabilities in embedded systems. The exploitation of design ...
Reconnaissance, Exploitation, and Investigation Bill Pennington , Jeremiah Grossman The presenters will discuss a number of issues revolving around web application security. Topics include; ...
Payload Anatomy and Future Mutations Riley Hassell Payload Anatomy and Future Mutations will introduce a new breed of payloads that can be ...
Writing Secure & Hack Resistant Code David Leblanc , Michael Howard Michael Howard is a security program manager on the Microsoft Windows XP team, focusing on ...
Applied Black Op Networking on Windows XP Dan Kaminsky Following up the explorations of 2002's "Black Ops of TCP/IP", 2003 will see the implementation ...
Strike and Counterstrike: The Law on Automated Intrusions and Striking Back Curtis Karnow There is a growing interest in self help mechanisms to counter internet mediated threats. Content ...
Exploiting DCOM Hidenobu Seki , Yoshiaki Komoriya Do you know DCOM? The DCOM ( Distributed COM ) is an application-level protocol for ...
Forensics Tools and Processes for Windows XP Platforms Larry Leibrock This overview will involve case investigation procedures and a set of advanced tools for the ...
Oracle Security II David Litchfield One year on after David's last talk on Oracle security David will cover the latest ...
.NET from the Hacker's Perspective Drew Miller What are the things about .NET that make hackers smile? Problems it does solve Buffer ...
IIS 6.0's Security Architecture - It's a Whole New World Michael Muckin As the Web Server included with Windows Server 2003 (was .NET), IIS 6.0 will be ...
Enforcer Timothy ( Thor ) Mullen BlackHat gave birth to the strikeback technology developed to combat the propagation of global worms ...
Securing Wireless Networks with 802.1x, EAP-TLS, and PEAP Steve Riley Everyone knows that WEP is useless. And until something better comes along to replace it, ...
Java Library Hole Allowing Multiplatform Denial-Of-Service Marc Schenefeld Java DK 1.4.1 JRE from Sun has been found to contain a locally exploitable Denial ...
Securing Your Network: The Art of Attack and Penetration Erik Pace Birkholz , Eric Schultze Hackers! They're out there everywhere just waiting to catch you off-guard. But how do you ...
HTTP: Advanced Assessment Techniques Saumil Udayan Shah The Fire and Water toolkit contains tools for both assessment and defense of web servers. ...