Blackhat Europe 2001 Nov. 21, 2001 to Nov. 22, 2001, Amsterdam, The Netherlands

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Other Side Of Information Security Wilco Van Ginkel Until now, the focus of Information Security within organisations was mainly technical. Organisations are becoming ... Security Keynote Business
Politics Of Vulnerability Reporting Scott Blake The vulnerability reporting process is rife with competing interests. Research is conducted by software vendors ... Security
Protecting Your Ip Network Infrastructure Nicolas Fischbach This speech will focus on layer 2 and 3 protocols with the associated risks, routers ... Security Infrastructure
Routing And Tunneling Protocol Attacks Felix ( FX ) Lindner The functionality and security of TCP/IP networks depends on the layer 2 and 3 traffic ... Security Routing
Mobile Security: Sms And Wap Job de Haas With all developments leading to more and more sophisticated features in mobile devices, the threats ... Mobile Security Security Others Access
Smart Card Security Marc Witteman Electronic communication is under constant threat of eavesdropping, impersonation, and falsification. Cryptography can provide a ... Security Access Cryptography
One-Way Sql Hacking: Futility Of Firewalls In Web Hacking Jd Glaser , Saumil Udayan Shah Topics covered will be: Overview of Web attacks One-way attacks SQL Entry points Privilege escalation ... Security Web SQL
Web Application Security: The Land That Information Security Forgot Jeremiah Grossman Today, the vast majority of those within information security have heard about web application security ... Security Web
Xprobe - Remote Icmp Based Os Fingerprinting Techniques Ofir Arkin Written and maintained by Fyodor Yarochkin and Ofir Arkin, Xprobe is an Active OS fingerprinting ... Security Web
Hackproofing Lotus Domino David Litchfield This talk will discuss and demonstrate how an attacker would attempt to break into a ... Web Security
Kernel Level Vulnerabilities Exploitation: Behind The Scenes Of The 5Th Argus Hacking Contest LSD During a presentation a general discussion of the kernel level security vulnerabilities and their exploitation ... Security Exploitation Analysis
Third Generation Exploits On Nt/Win2K Platforms Thomas ( Halvar Flake ) Dullien Due to the fact that standard stack-smashing overflows are getting a bit rare in well-audited ... Security Exploitation Development Testing
Decoding And Understanding Internet Worms Ryan Permeh , Dale Coddington In the past months Internet worms have grown in popularity with the advent of Code ... Security Exploitation Reverse Engineering Analysis Malware
Injectso: Modifying And Spying On Running Processes Under Linux And Solaris Shaun Clowes In a 1994 Windows Systems Journal article Jeffrey Richter described a method for injecting Dynamic ... Security Testing
Ids Evasion Design Tricks For Buffer Overflow Exploits Anders Ingeborn The concept of double injection for stack overflow exploits can be used to reduce the ... Security