BlackHatWindows 2004 Jan. 29, 2004 to Jan. 30, 2004, Las Vegas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Day 1 Keynote Dan Geer Jr. Dr. Geer is an entrepreneur, author, scientist, consultant, teacher, and architect. Most recently, he served ...
Day 2 Keynote:Broken Windows: What Security Looks Like When Gollum Gets the Ring Richard Thieme We all know the story, the issues, the lay of the land. Depending on how ...
MOSDEF Tool Release David Aitel Dave Aitel is the founder of Immunity, Inc. and the primary developer of CANVAS and ...
Trusted Computing 101 David Blight Trusted Computing is a controversial security initiative led by Microsoft which takes security improvements beyond ...
Without a Trace: Forensic Secrets for Windows Servers James C. Foster , Mark Burnett Every day administrators around the world discover their server has been hacked but in their ...
DKOM (Direct Kernel Object Manipulation) Jamie Butler This talk will address insecurities in the current implementation of today's operating systems. Because of ...
Data Hiding On A Live (NTFS) System Harlan Carvey The presentation walks through various data hiding techniques, demonstrating those that have been used (and ...
Auditing ActiveX Controls Cesar Cerrudo In the last year many vulnerabilities have been found on ActiveX controls massively deployed, right ...
Information Security in Mergers & Acquisitions Chris Conacher This talk will look at the unique problems that the Mergers & Acquisition (M&A) process ...
They'll never see it coming! Stephen Dugan This talk will focus on the dangers of unprotected routing protocols. By injecting a route ...
Automated Binary Reverse Engineering Halvar Flake The presentation will focus on some advanced topics of automated reverse engineering. Algorithms (and plug-ins ...
Lessons Learned When the Cisco Guys Went to Windows land Fx The speech covers stack based buffer overflows in Win32 applications and services where the buffer ...
WinCE PDA Insecurity Bryan Glancey Palmtops are going in power and popularity. How is the security on these devices and ...
Legal Risks of Vulnerability Disclosure Jennifer Stisa Granick A patchwork of laws arguably applies to vulnerability disclosure. Vendors and system administrators have struggled ...
The Challenges of Automated Web Application Scanning: "Why automated scanning only solves half the problem." Jeremiah Grossman Web application scanning presents many unique challenges. The biggest challenge is that the increasing complexity ...
Integrating Security Into Agile Development/Testing Matt Hargett Integrating security into a development and testing process is hard, and there is not a ...
ISA Server: Best Practices from the Field Jim Harrison , Jim Edwards The main focus of this presentation is ISA Server 2000 planning, deployment and configuration with ...
Preventing Intrusions and Tolerating False Positives Steve Hofmeyr Intrusion prevention systems are becoming increasingly essential to combat today's automated threats. However, people are ...
Digital Security: Policies & The Law Curtis E.a. Karnow Curt Karnow moves through a fast-paced assessment of legal problems stemming from security breaches, followed ...
Nobody's Anonymous Tracking Spam Curtis Kret Viagra! Work from home! Who sends this stuff? And what if not all Spam is ...
Windows Heap Overflows David Litchfield This presentation will be entirely new and never seen before. Code included. David Litchfield leads ...
Application Intrusion Detection Drew Miller As corporations begin to embrace secure mitigation techniques, we hope to see a visible decline ...
Hardening Windows Servers Derek Milroy The approach presented focuses on both efficiency and effectiveness, while minimizing the breaking of application ...
Security in the Development Lifecycle Gunnar Peterson Let's face it: life in Layer Seven is hard. Your application is forced to trust ...
Capturing Windows Passwords Using The Network Provider API Sergey Polak There are a variety of methods for capturing user passwords, from keystroke loggers to hardware ...
Windows XP: Improving Resiliency Steve Riley In Microsoft Windows XP Service Pack 2, Microsoft is introducing a set of security technologies ...
Win2K3 Terminal Server Laura Robinson Can a Windows Server 2003 Terminal Server be Bulletproofed? Microsoft has significantly extended Terminal Services ...
Addressing Complete Security to Save Money Russ Rogers One of the biggest issues in information security is the dependence on technical solutions, by ...
Fingerprinting through Windows RPC Hidenobu Seki Many Windows 2000/XP/2003 functions depend on RPC service. By enumerating Windows RPC endpoint-map elements, you ...
HTTP Fingerprinting and Advanced Assessment Techniques Saumil Udayan Shah This talk discusses some advanced techniques in automated HTTP server assessment which overcome efficiency problems ...