BlackHatWindows 2001 Feb. 14, 2001 to Feb. 15, 2001, Las Vegas,USA

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
Researching secrets. James Bamford BOOKS: The Puzzle Palace: A Report On NSA, America's Most Secret Intelligence Agency. (Houghton Mifflin ...
Why Government Systems Fail at Security Chey Cobb The Cold War is over and government agencies and offices are told that everyone is ...
Remote Web Application Disassembly with ODBC Error Messages David Litchfield The talk will discuss how to use ODBC error messages caused by specially crafted queries ...
IPSec in a Windows 2000 World Rooster , Dan Kurc , William Dixon Windows 2000 has brought many new tools and techniques to the realm of security , ...
Host Based Intrusion Detection Using W2K Auditing Features. Macy Bergoon Effective auditing is a key component of any security strategy. This session will take auditing ...
Lead Incident Response Consultant, Jawz Technology Incs CyberCrime division. Mushin Incident Response in a Microsoft world. Since so many articles and texts seem to focus ...
Null Sessions, MSRPC, and Windows 2000. Todd Sabin Null sessions have been a favorite tool for information gathering on Windows NT. How does ...
Healthcare and New Federal Security Protections Kate Borten Kate Borten, president and founder of The Marblehead Group, Inc., a health information security consultancy, ...
Safeguarding your Business Assets through Understanding of the Win32API David Goldman , Todd Feinman As Windows 2000 becomes integrated with indispensable corporate operations, the operating system acts a portal ...
Web Hacking Saumil Udayan Shah , Jd Glaser Web hacking is the next generation of hacking "kung fu." The previous generation of hackers ...
Virtual Private Problems: A Broken Dream Loki With continued advancements in current cryptography technology such as Diffie Helman key exchange, Triple (3) ...
Defense in Depth: Winning in Spite of Yourself (aka "Foiling JD") David Leblanc , Eric Schultz David LeBlanc is a Senior Technologist for Microsoft Corporate Security. He works on Microsoft's internal ...
Terminal Server: The Day of Reckoning Erik Pace Birkholz , Clinton Mugge Windows administrators have long struggled with the problem of native graphical remote access to their ...
Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol Ofir Arkin The ICMP Protocol may seem harmless at first glance. Its goals and features were outlined ...
Kernel Mode Rootkits: Stealth and Subversion of Trust Greg Hoglund This talk will draw upon the work of www.rootkit.com, a group of individuals that have ...
MS SQL Server Security Overview Chip Andrews As organizations get better at configuring firewalls and intrusion detection systems, what may be left ...
Computer Forensics with an emphasis on the NT operating system. Paul Sr. Many Forensic classes and papers discuss utilizing speciality Unix tools and operating system commands to ...
Analysis of Microsoft Office password protection system, and survey of encryption holes in other MS Windows applications. Andrey Malyshev While successfully creating password recovery software for most of the major applications on the market ...
Auditing binaries for security vulnerabilities Havlar Flake Even with the advent of the open-source movement, many critical systems such as most firewalls ...
International Organized Crime and Terrorism Howell Mcconnell N/A