BlackHatAsia 2001 Feb. 26, 2001 to Feb. 27, 2001, Marina Bay,Singapore

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
The Three Truths of Computer Security. Bruce Schneier Internationally renowned security technologist and author Bruce Schneier is both a Founder and the Chief ...
Post Mortem of a Rootkit Attack Martin Khoo Computer forensic analysis and investigation is becoming an important skill that security practitioners increasingly find ...
Web Hacking Saumil Udayan Shah , Jd Glaser Web hacking is the next generation of hacking "kung fu." The previous generation of hackers ...
Overall security review of GSM infrastructure. Emmanuel Gadaix There are an estimated 100 million of users of the Internet after more than 20 ...
IDS benchmarking. Marcus J. Ranum N/A
IPSec in a Windows 2000 World Rooster Windows 2000 has brought many new tools and techniques to the realm of security, one ...
Stealth Network Techniques: Offensive and Defensive. Simple Nomad In this talk various stealth network communication techniques for passing information between nodes will be ...
Remote Web Application Disassembly with ODBC Error Messages David Litchfield Known as the UK's NT Guru by ZDNet, David is a world-renowned security expert specializing ...
Web Assessment Tools. Rain Forest Puppy As the web becomes more and more feature full (or bloated, depending on your stance), ...
Falling Domino's Kevin Mcpeake , Wouter Aukema Lotus Notes / Domino is considered one of the more secure mail/groupware platforms in the ...
Breaking In Through The Front Door or The impact of Application Service Provision and Browser Based Applications on traditional security models Shaun Clowes With the rise of ASP and B2B e-commerce, the IT world has moved into a ...
Non-common architectures buffer overflows. Fyodor Yarochkin , Yu-min Chang Non-common buffer overflows talk features 3 case studies of buffer overflow exploitation techniques for 3 ...
Restrict Anonymous and the Null User Tim Mullen What many people fail to realize is that with the combination of a few different ...
ICMP Usage In Scanning (The Advanced Methods) Ofir Arkin The ICMP Protocol may seem harmless at first glance. Its goals and features were outlined ...