BlackHatAsia 2003 Dec. 18, 2003 to Dec. 19, 2003, Marina Bay,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Keynote: The Total Security System Approach - A Perspective From The Financial Industry Lim Khee Ming In view of today's increasing security breaches, companies need to take a total system approach ...
Keynote: Cyber-crime Harry Sk Tan Electronic crime is the fastest growing field of criminal activity. The use of the new ...
MOSDEF Tool Release David Aitel Immunity, Inc. is a New York City based consulting and security software products firm. CANVAS, ...
Win32 One-Way Shellcode S.k. Chong The presentation will describe the inner workings of reusable Win32 shellcodes. It will starts with ...
A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor Shaun Clowes Shiva is an ELF encryption tool written by Neel Mehta and Shaun Clowes. Its purpose ...
Cisco Security Stephen Dugan Stephen Dugan is currently an independent contract instructor and network engineer. He has been teaching ...
Automated Reverse Engineering Halvar Flake The presentation will focus on some advanced topics of automated reverse engineering. Algorithms (and plug-ins ...
International DMCA Laws Jennifer Stisa Granick A patchwork of laws arguably applies to vulnerability disclosure. Vendors and system administrators have struggled ...
The Art of Defiling: Defeating Forensic Analysis on Unix File Systems The Grugq The rise in prominence of incident response and digital forensic analysis has prompted a reaction ...
Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server David Litchfield This talk presents several methods of bypassing the protection mechanism built into Microsoft's Windows 2003 ...
Brute Forcing Terminal Server Logons with TSGrinder Tim Mullen The "new and improved" version of "TSGrinder," the original terminal server brute force tool from ...
Honeypots Against Worms 101 Laurent Oudot This talk will explain how to fight Internet worms by using technologies related to honeypots. ...
(In)Security in Network Management Jeremy Rauch SNMP is the most popular protocol for network management. From high end routers, to low ...
Addressing Complete Security to Save Money Russ Rogers One of the biggest issues in information security is the dependence on technical solutions, by ...
Putting The Tea Back Into CyberTerrorism Roelof ( RT ) Temmingh , Haroon Meer , Charl van der Walt Many talks these days revolve around cyber terrorism and cyber warfare. Some experts suggest such ...