Advanced SQL Injection in Oracle Databases |
Esteban Martinez Fayo |
Presentation |
- |
Phishing with Super Bait |
Jeremiah Grossman |
Presentation |
- |
Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms |
Alexander Kornbrust |
Presentation |
- |
CaPerl: Running Hostile Code Safely |
Ben Laurie |
- |
- |
NX: How Well Does It Say NO to Attacker’s eXecution Attempts? |
David Maynor |
Presentation |
- |
The Art of SIP fuzzing and Vulnerabilities Found in VoIP |
Ejovi Nuwere, Mikko Varpiola |
Presentation |
- |
"Shadow Walker": Raising The Bar For Rootkit Detection |
Sherri Sparks, Jamie Butler |
Presentation |
- |
Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps |
Alex Stamos, Scott Stender |
Presentation |
- |
The Art of File Format Fuzzing |
Michael Sutton, Adam Greene |
Presentation |
- |
Owning Anti-Virus: Weaknesses in a Critical Security Component |
Alex Wheeler, Neel Mehta |
Presentation |
- |
World Exclusive - Announcing the OWASP Guide To Securing Web Applications and Services 2.0 |
Andrew van der Stock |
Presentation |
- |
The Defense Cyber Crime Center |
Jim Christy |
- |
- |
Beyond Ethereal: Crafting A Tivo for Security Datastreams |
Greg Conti |
Presentation |
- |
Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch… |
James C. Foster, Vincent T. Liu |
Presentation |
- |
The Art of Defiling: Defeating Forensic Analysis |
Grugq |
Presentation |
- |
GEN III Honeynets: The birth of roo |
Allen Harper, Edward Balas |
Presentation |
- |
Performing Effective Incident Response |
Kevin Mandia |
Presentation |
- |
iSCSI Security (Insecure SCSI) |
Himanshu Dwivedi |
Presentation |
- |
Black Ops 2005 |
Dan Kaminsky |
- |
- |
All new Ø Day |
David Litchfield |
- |
- |
Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security |
Mudge |
Presentation |
- |
Automation - Deus ex Machina or Rube Goldberg Machine? |
Sensepost |
Presentation |
- |
Plug and Root, the USB Key to the Kingdom |
Darrin Barrall, David Dewey |
Presentation |
- |
Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices |
Joe Grand |
Presentation |
- |
The Social Engineering Engagement Methodology |
Joseph Klein |
Presentation |
- |
Long Range RFID and its Security Implications |
Kevin Mahaffey, Mark McGovern, Paul Simmonds, Jon Callas |
Presentation |
- |
The Non-Cryptographic Ways of Losing Information |
Robert Morris |
- |
- |
Legal Aspects of Computer Network Defense |
Robert W. Clark |
Presentation |
Paper |
U.S National Security, Individual and Corporate Information Security, and Information Security Providers |
Bryan Cunningham, C. Forrest Morgan |
Presentation |
- |
Hacking in a Foreign Language |
Kenneth Geers |
Presentation |
- |
Top Ten Issues in Computer Security |
Jennifer Stisa Granick |
Presentation |
- |
Routing in the Dark: Scalable Searches in Dark P2P Networks |
Ian Clarke, Oskar Sandberg |
Presentation |
- |
Google Hacking for Penetration Testers |
Johnny Long |
Presentation |
- |
Building Robust Backdoors In Secret Symmetric Ciphers |
Adam L. Young |
Presentation |
- |
The Unveiling of My Next Big Project |
Philip R. Zimmermann |
- |
- |
Akshay Aggarwal |
Rapid Threat Modeling |
Presentation |
- |
Shakespearean Shellcode |
Darrin Barrall |
Presentation |
- |
A Dirty BlackMail DoS Story |
Renaud Bidou |
Presentation |
- |
BlackHat Standup: “Yea I’m a Hacker…” |
James C. Foster |
- |
- |
Toolkits: All-in-One Approach to Security |
Kevin Cardwell |
Presentation |
- |
Demystifying MS SQL Server & Oracle Database Server Security |
Cesar Cerrudo |
Presentation |
- |
Shatter-proofing Windows |
Tyler Close |
Presentation |
Paper |
Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection |
Yuan Fan |
Presentation |
- |
Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment |
Ken Hines |
Presentation |
- |
SPA: Single Packet Authorization |
MadHat Unspecific & Simple Nomad |
Presentation |
- |
Owning the C-suite: Corporate Warfare as a Social Engineering Problem |
Shawn Moyer |
Presentation |
- |
Injection Flaws: Stop Validating Your Input |
Mike Pomraning |
Presentation |
- |
Trust Transience: Post Intrusion SSH Hijacking |
Adam Boileau |
Presentation |
- |
Remote Windows Kernel Exploitation - Step In To the Ring 0 |
Barnaby Jack |
Presentation |
Paper |
Cisco IOS Security Architecture |
Michael Lynn |
- |
- |
eEye BootRoot |
Derek Soeder, Ryan Permeh |
Presentation |
- |
Beyond EIP |
spoonm, skape |
Presentation |
- |
A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control |
Ofir Arkin |
Presentation |
- |
Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows |
Beetle and Bruce Potter |
Presentation |
- |
Checking Array Bound Violation Using Segmentation Hardware |
Tzi-cker Chiueh |
Presentation |
- |
Stopping Injection Attacks with Computational Theory |
Robert J. Hansen, Meredith L. Patterson |
Presentation |
Paper |
Ozone HIPS: Unbreakable Windows |
Eugene Tsyrklevich |
Presentation |
- |
Preventing Child Neglect in DNSSEC-bis using Lookaside Validation |
Paul Vixie |
- |
- |