Blackhat USA 2001 July 11, 2001 to July 12, 2001, Las Vegas, USA

Event Page

Tell us about missing data
Title Speakers Summary Topic Types
Unix Assembly Codes Development For Vulnerabilities Illustration Purposes Laststage of Delirium None Security Unix Development
Falling Dominos Kevin Mcpeake None Security
Countering The Insider Threat With The Autonomic Distributed Firewall (Adf) David Pappas , George Jelatis None Security Firewall
Defending The Information Web: New Ways Of Thinking About Security Richard Thieme None Security
Gateway Cryptography: Hacking Impossible Tunnels Through Improbable Networks With Openssh And The Gnu Privacy Guard. Dan Kaminsky Security Privacy
Hit Them Where It Hurts: Finding Holes In Cots Software Thomas ( Halvar Flake ) Dullien None Security
Introducing X: Playing Tricks With Icmp Ofir Arkin Security
The Honey Net Project Lance Spitzner None Security
Mirror::Image Brian Martin , B.k. Delong None Security
Wireless Lan Security Mandy Andress None Security Wireless
Solving Network Mysteries Daniel Vanbelleghem None Security
Computer Forensics: A Critical Process In Your Incident Response Plan Gregory S. Miles None Security Forensics
Key Legal Implications Of Computer Network Defense Walter Gary Sharp None Security Legal
Building A Blind Ip Spoofed Port Scanning Tool Thomas Olofsson None Security Network
Snort Martin Roesch , None Security
Reducing The Costs Of Vulnerability Assessment Using Nessus 1.2 Renaud Deraison , The Nessus Project None Security
Rfp.Labs: New Toys In The Works Rain Forest Puppy None Security
The Razor Warez Simple Nomad None Security
Top 25 Overlooked Security Configurations On Your Switches And Routers Palante None Security
The Future Of Internet Worms Jose Nazario , Crimelabs None Security
Layer 2 Attacks Jeff Nathan , Kevin Depeugh None Security
Attacking And Defending Bind / Djbdns Dns Servers Jay Beale None Security DNS
Automated Penetration Testing Iván Arce , Maximiliano Caceres , Corelabs , Core-sdi None Security Testing
The Siphon Project: An Implementation Of Stealth Target Acquisition And Information Gathering Methodologies Marshall Beddoe None Security
Promiscuous Node Detection Using Arp Packets Daiji Sanai None Security
Arp Vulnerabilities: Indefensible Local Network Attacks? Mike Beekey None Network Security
Dog Of War: Attack Box Design Blake Hartstein None Security
Systems Management In An Untrusted Network: Dealing With Backups, Monitoring, Administration, And Logging In The Dmz Cory Scott None Security
Alternatives To Honeypots Or The Dtk Andrewvander Stock None Security
Hardening .Htaccess Scripts In Apache Environments. Robert ( Rsnake ) Hansen None Security
Polymorphism And Intrusion Detection Systems Chad R. Skipper None Security
Gsm / Wap / Sms Security. Job de Haas None Security
Grabbing User Credentials Via W2K Odbc Libraries Timothy ( Thor ) Mullen None Security
Cracking Wep Keys Tim Newsham None Security Wireless
Sql Security Revisited. Chip Andrews None Security SQL
Researching Secrets, Part Ii James Bamford None Security
Cve Behind The Scenes: The Complexity Of Being Simple Steven M. Christey None Security
Career Routing For The Ethical Code Kevin Manson , William Tafoya None Security Routing