Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.-logo

Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.

Technology Podcasts

Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-eu-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo. Video, audiand supporting materials from past conferences will be posted here, starting with the newest and working our way back tthe oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 and mp4 h.264 192k videformat. If you want tget a better idea of the presentation materials gtohttp://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html#eu_07 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Location:

United States

Description:

Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good." A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-eu-07-index.html Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo. Video, audiand supporting materials from past conferences will be posted here, starting with the newest and working our way back tthe oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 and mp4 h.264 192k videformat. If you want tget a better idea of the presentation materials gtohttp://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html#eu_07 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Language:

English


Episodes
Ask host to enable sharing for playback control

Kostya Kortchinsky: Making Windows Exploits more reliable

1/9/2006
"When dealing with Windows exploits, an issue that often emerge is their cross-platform reliability, meaning they often work against either some given service packs of the OS, or some localization of the OS. It is quite rare tfind exploits that will work on a very wide range of Windows installs. While multiplying the number of targets in an exploit is often the solution found in the wild, it seems that nobody has yet disclosed a solution tfingerprint a Windows language, or discuss about...

Duration:01:17:36

Ask host to enable sharing for playback control

Vipin Kumar and Nitin Kumar: Vboot Kit: Compromising Windows Vista Security

1/9/2006
"Vboot kit is first of its kind technology tdemonstrate Windows vista kernel subversion using custom boot sector. Vboot Kit shows how custom boot sector code can be used tcircumvent the whole protection and security mechanisms of Windows Vista. The booting process of windows Vista is substantially different from the earlier versions of Windows.The talk will give you details and know abouts for the Vista booting process.Then, we will be explaining the vboot kit functionality and how it...

Duration:01:07:08

Ask host to enable sharing for playback control

Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection

1/9/2006
"Today, other than doing a full static analysis of the code, the most common practice tfind vulnerabilities in your web application is tget off-the-shelf automated web scanner, point ta URL, and hope that it's doing the right thing. But is it? How dyou know that the scanner exercised all the vital areas of your application? How accurate and complete are the results? Is relying on HTTP response the best way tfind all vulnerabilities in an application? What if there was a way tlook at what's...

Duration:00:36:09

Ask host to enable sharing for playback control

Sun Bing: Software Virtualization Based Rootkits

1/9/2006
"This paper will show a extremely simple technique tquickly audit a software product in order tinfer how trustable and secure it is. I will show you step by step how tidentify half dozen of local 0day vulnerabilities in few minutes just making a couple of clicks on very easy tuse free tools, then for the technical guys enjoyment the vulnerabilities will be easily pointed out on disassembled code and detailed, finally a 0day exploit for one of the vulnerabilities will be demonstrated and...

Duration:01:10:08

Ask host to enable sharing for playback control

StefanZanero: 360 Anomaly Based Unsupervised Intrusion Detection

1/9/2006
"n this talk, after briefly reviewing why we should build a good anomaly-based intrusion detection system, we will briefly present twIDS prototypes developed at the Politecnicdi Milanfor network and host based intrusion detection through unsupervised algorithms. We will then use them as a case study for presenting the difficulties in integrating anomaly based IDS systems (as if integrating usual misuse based IDS system was not complex enough...). We will then present our ideas, based on...

Duration:01:17:07

Ask host to enable sharing for playback control

Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones

1/9/2006
"SS7 has been a walled garden for a long time: only big telcwould be interconnected tthe network. Due tderegulation and a push toward all-IP architecture, SS7 is opening up, notably with SIGTRAN (SS7 over IP) and NGN (Next Gen Networks) initiatives. SCTP is the protocol used tcarry all telecom signalling information on IP according tthe SIGTRAN protocol suite. It's the foundation, as TCP is the foundation for the web and email. SCTP is alsused for high-performance clusters, resources...

Duration:01:09:36

Ask host to enable sharing for playback control

Ollie Whitehouse: GS and ASLR in Windows Vista

1/9/2006
"Introduction:The following presentation is twparts, the first covers aspects of Microsoft's GS implementation and usage. The second is a complementary section dealing with ASLR in Windows Vista, its implementation and some surprising results... Part I Synopsis: GS is a Visual Studicompiler option that was introduced in Visual Studi2002 tmitigate the local stack variable overflows that resulted in arbitrary code execution. The following paper details the methods Symantec used tassess which...

Duration:00:49:00

Ask host to enable sharing for playback control

Lluis Mora: SMTP Information gathering

1/9/2006
"The SMTP protocol, used in the transport and delivery of e-mail messages, includes control headers along with the body of messages which, as opposed tother protocols, are not stripped after the message is delivered, leaving a detailed record of e-mail transactions in the recipient mailbox. Detailed analysis of SMTP headers can be used tmap the networks traversed by messages, including information on the messaging software of clients and gateways. Furthermore, analysis of messages over time...

Duration:00:55:26

Ask host to enable sharing for playback control

Laurent Butti: Wi-Fi Advanced Fuzzing

1/9/2006
"Fuzzing is a software testing technique that consists in finding implementation bugs. Fuzzing Wi-Fi drivers is becoming more and more attractive as any exploitable security bug will enable the attacker trun arbitrary code with ring0 privileges (within victim's radicoverage). This presentation will describe all the processes involved in the design from scratch of a fully-featured Wi-Fi fuzzer. It will pinpoint all issues and constraints when fuzzing 802.11 stacks (scanning, bugs...

Duration:01:21:06

Ask host to enable sharing for playback control

ERESI Team: Next generation debuggers for reverse engineering

1/9/2006
"Classical debuggers make use of an interface provided by the operating system in order taccess the memory of programs while they execute. As this model is dominating in the industry and the community, we show that our novel embedded architecture is more adapted when debuggee systems are hostile and protected at the operating system level. This alternative modelization is alsmore performant as the debugger executes from inside the debuggee program and can read the memory of the host process...

Duration:01:00:08

Ask host to enable sharing for playback control

Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests

1/9/2006
"ScarabMon is a new tool and framework for simplifying web application pentests. It makes the process of finding many common webapp flaws much easier. The user simply navigates the target site while using the WebScarab proxy and ScarabMon constantly updates the user with information on discovered flaws. ScarabMon is written in Python and all code and modules will be released at the conference. ScarabMon is alseasily extensible, with useful checks often only requiring 5-10 lines of Python...

Duration:00:47:11

Ask host to enable sharing for playback control

Joel Eriksson: Kernel Wars

1/9/2006
"Kernel vulnerabilities are often deemed unexploitable or at least unlikely tbe exploited reliably. Although it's true that kernel-mode exploitation often presents some new challenges for exploit developers, it still all boils down t""creative debugging"" and knowledge about the target in question. This talk intends tdemystify kernel-mode exploitation by demonstrating the analysis and reliable exploitation of three different kernel vulnerabilities without public exploits. From a defenders...

Duration:00:53:39

Ask host to enable sharing for playback control

David Maynor and Robert Graham: Data Seepage: How tgive attackers a roadmap tyour network

1/9/2006
"Long gone are the days of widespread internet attacks. What's more popular now are more directed or targeted attacks using a variety of different methods. Since most of these attacks will be a single shot styled attack attackers will often look for anyway tincrease the likelihood of success. This is where data seepage comes in. Unbeknownst ta lot of mobile professional's laptops, pdas, even cell phones can be literally bleeding information about a company's internal network. This can be...

Duration:01:00:41

Ask host to enable sharing for playback control

DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection

1/9/2006
"The Achilles' heel of network IDSes lies in the large number of false positives (i.e., false attacks) that occur: practitioners as well as researchers observe that it is common for a NIDS traise thousands of mostly false alerts per day. False positives are a universal problem as they affect both signature-based and anomaly-based IDSs. Finally, attackers can overload IT personnel by forging ad-hoc packets tproduce false alerts, thereby lowering the defences of the IT infrastructure. Our...

Duration:00:49:01

Ask host to enable sharing for playback control

Cesar Cerrudo: Data Theft - Hacking databases for owning your data

1/9/2006
"Data theft is becoming a major threat, criminals have identified where the money is, In the lafrom fortune 500 companies were compromised causing lots of money losses. This talk will discuss the Data Theft problem st years many databases focusing on database attacks, we will show actual information about how serious the data theft problem is, we will explain why you should care about database security and common attacks will be described, the main part of the talk will be the demostration...

Duration:01:26:58

Ask host to enable sharing for playback control

AugustPaes de Barros: New Botnets Trends and Threats

1/9/2006
"The last years have seen the growth of botnets and its transformation inta highly profitable business. Most of the botnets seen until now have used the same basic concepts. This presentation intends tshow what are the major challenges faced by botnet authors and what they might try in the future tsolve them. The presentation will pass through some interesting solutions for botnet design challenges. A layered and extensible approach for Bots will be presented, showing that solutions from...

Duration:00:50:41

Ask host to enable sharing for playback control

Alexander Sotirov: Heap Feng Shui in JavaScript

1/9/2006
"Heap exploitation is getting harder. The heap protection features in the latest versions of Windows have been effective at stopping the basic exploitation techniques. In most cases bypassing the protection requires a great degree of control over the allocation patterns of the vulnerable application. This presentation introduces a new technique for precise manipulation of the browser heap layout using specific sequences of JavaScript allocations. This allows an attacker tset up the heap in...

Duration:01:13:39

Ask host to enable sharing for playback control

Adam Laurie: RFIDIOts!!! - Practical RFID hacking (without soldering irons)

1/9/2006
RFID is being embedded in everything... From Passports tPants. Door Keys tCredit Cards. Mobile Phones tTrash Cans. Pets tPeople even! For some reason these devices have become the solution tevery new problem, and we can't seem tget enough of them.... "Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos...

Duration:00:53:25