BlackHatWindows 2001 Feb. 14, 2001 to Feb. 15, 2001, Las Vegas,USA
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Researching secrets. | James Bamford | BOOKS: The Puzzle Palace: A Report On NSA, America's Most Secret Intelligence Agency. (Houghton Mifflin ... | |
Why Government Systems Fail at Security | Chey Cobb | The Cold War is over and government agencies and offices are told that everyone is ... | |
Remote Web Application Disassembly with ODBC Error Messages | David Litchfield | The talk will discuss how to use ODBC error messages caused by specially crafted queries ... | |
IPSec in a Windows 2000 World | Rooster , Dan Kurc , William Dixon | Windows 2000 has brought many new tools and techniques to the realm of security , ... | |
Host Based Intrusion Detection Using W2K Auditing Features. | Macy Bergoon | Effective auditing is a key component of any security strategy. This session will take auditing ... | |
Lead Incident Response Consultant, Jawz Technology Incs CyberCrime division. | Mushin | Incident Response in a Microsoft world. Since so many articles and texts seem to focus ... | |
Null Sessions, MSRPC, and Windows 2000. | Todd Sabin | Null sessions have been a favorite tool for information gathering on Windows NT. How does ... | |
Healthcare and New Federal Security Protections | Kate Borten | Kate Borten, president and founder of The Marblehead Group, Inc., a health information security consultancy, ... | |
Safeguarding your Business Assets through Understanding of the Win32API | David Goldman , Todd Feinman | As Windows 2000 becomes integrated with indispensable corporate operations, the operating system acts a portal ... | |
Web Hacking | Jd Glaser , Saumil Udayan Shah | Web hacking is the next generation of hacking "kung fu." The previous generation of hackers ... | |
Virtual Private Problems: A Broken Dream | Loki | With continued advancements in current cryptography technology such as Diffie Helman key exchange, Triple (3) ... | |
Defense in Depth: Winning in Spite of Yourself (aka "Foiling JD") | David Leblanc , Eric Schultz | David LeBlanc is a Senior Technologist for Microsoft Corporate Security. He works on Microsoft's internal ... | |
Terminal Server: The Day of Reckoning | Erik Pace Birkholz , Clinton Mugge | Windows administrators have long struggled with the problem of native graphical remote access to their ... | |
Active & Passive Fingerprinting of Microsoft Based Operating Systems using the ICMP protocol | Ofir Arkin | The ICMP Protocol may seem harmless at first glance. Its goals and features were outlined ... | |
Kernel Mode Rootkits: Stealth and Subversion of Trust | Greg Hoglund | This talk will draw upon the work of www.rootkit.com, a group of individuals that have ... | |
MS SQL Server Security Overview | Chip Andrews | As organizations get better at configuring firewalls and intrusion detection systems, what may be left ... | |
Computer Forensics with an emphasis on the NT operating system. | Paul Sr. | Many Forensic classes and papers discuss utilizing speciality Unix tools and operating system commands to ... | |
Analysis of Microsoft Office password protection system, and survey of encryption holes in other MS Windows applications. | Andrey Malyshev | While successfully creating password recovery software for most of the major applications on the market ... | |
Auditing binaries for security vulnerabilities | Havlar Flake | Even with the advent of the open-source movement, many critical systems such as most firewalls ... | |
International Organized Crime and Terrorism | Howell Mcconnell | N/A |