Black Hat Media Archives


Black Hat 2005 Multimedia Archives Quick-link
USA Europe Asia
Europe 2005


Conference CDs containing speaker presentations and materials are available for purchase from our store.

Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently online.

Black Hat Japan 2005
Track/Speaker/Topic Presentation (PDFs) Notes/Tools
Keynote Presentation - Black Hat Japan 2005

Welcome by Jeff Moss, Founder & CEO, Black Hat and

Katsuya Uchida, Associate Professor, Institute Information Security, and Associate Professor, Research and Development Initiative, Chuo University
"The Day After..."

PDF: Katsuya Uchida, Associate Professor, Institute Information Security, and Associate Professor, Research and Development Initiative, Chuo University, "The Day After..."


Speakers - Black Hat Japan 2005

Dominique Brezinski
A Paranoid Perspective of an Interpreted Language

PDF: Dominique Brezinski, A Paranoid Perspective of an Interpreted Language

Kenneth Geers
Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

PDF: Kenneth Geers, Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond)

Jeremiah Grossman
Phishing with Super Bait

PDF: Jeremiah Grossman, Phishing with Super Bait

Chris Hurley (Roamer)
Identifying and Responding to Wireless Attacks

PDF: Chris Hurley (Roamer), Identifying and Responding to Wireless Attacks
code

updated materials
Hideaki Ihara
Forensics in Japan

PDF: Hideaki Ihara, Forensics in Japan

updated materials
Dan Kaminsky
Black Ops Of TCP/IP 2005

PDF: Dan Kaminsky, Black Ops Of TCP/IP 2005
code

Satoru Koyama
Botnet survey result. "Our security depends on your security."  

PDF: Satoru Koyama, Botnet survey result. "Our security depends on your security."

David Maynor
Architecture Flaws in Common Security Tools  

PDF: David Maynor, Architecture Flaws in Common Security Tools  

Ejovi Nuwere
The Art of SIP fuzzing and Vulnerabilities Found in VoIP

PDF: Ejovi Nuwere, The Art of SIP fuzzing and Vulnerabilities Found in VoIP

Saumil Shah & Dave Cole
Adware/Spyware

PDF: Saumil Shah & Dave Cole, Adware/Spyware

Sherri Sparks & Jamie Butler
“Shadow Walker” — Raising The Bar For Rootkit Detection

PDF: Sherri Sparks & Jamie Butler, “Shadow Walker” — Raising The Bar For Rootkit Detection
Michael Sutton & Adam Greene
The Art of File Format Fuzzing
PDF: Michael Sutton & Adam Greene, The Art of File Format Fuzzing


Closing Remarks

Jeff Moss
Founder & CEO, Black Hat




Black Hat US 2005
Black Hat USA 2005
Audio & video files are available from the Sound of Knowledge this conference.
Some files may require Acrobat 6.0 or greater to open.
Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentation - Black Hat USA 2005

Gilman Louie, President & Chief Executive Officer, In-Q-Tel
Investing in Our Nation's Security,



Application Security - Black Hat USA 2005

Esteban Martínez Fayó
Advanced SQL Injection in Oracle Databases

PDF: Esteban Martínez Fayó-Advanced SQL Injection in Oracle Databases


Jeremiah Grossman
Phishing with Super Bait

PDF: Jeremiah Grossman-Phishing with Super Bait


Alexander Kornbrust
Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms

PDF: Alexander Kornbrust-Circumvent Oracle’s Database Encryption and Reverse Engineering of Oracle Key Management Algorithms


Ben Laurie
CaPerl: Running Hostile Code Safely


David Maynor
NX: How Well Does It Say NO to Attacker’s eXecution Attempts? 
PDF: David Maynor- NX: How Well Does It Say NO to Attacker’s eXecution Attempts? 


Ejovi Nuwere & Mikko Varpiola
The Art of SIP fuzzing and Vulnerabilities Found in VoIP
PDF: Ejovi Nuwere & Mikko Varpiola-The Art of SIP fuzzing and Vulnerabilities Found in VoIP
Sherri Sparks & Jamie Butler
“Shadow Walker”: Raising The Bar For Rootkit Detection
PDF: Sherri Sparks & Jamie Butler-“Shadow Walker”: Raising The Bar For Rootkit Detection
Alex Stamos & Scott Stender
Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
PDF: Alex Stamos & Scott Stender-Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps
Michael Sutton & Adam Greene
The Art of File Format Fuzzing
PDF: Michael Sutton & Adam Greene-The Art of File Format Fuzzing


Alex Wheeler & Neel Mehta
Owning Anti-Virus: Weaknesses in a Critical Security Component
PDF: Alex Wheeler & Neel Mehta
Owning Anti-Virus: Weaknesses in a Critical Security Component
Andrew van der Stock
World Exclusive – Announcing the OWASP Guide To Securing Web Applications and Services 2.0
PDF: Andrew van der Stock-World Exclusive – Announcing the OWASP Guide To Securing Web Applications and Services 2.0

Computer Forensics & Log Analysis

Jim Christy
The Defense Cyber Crime Center


Greg Conti
Beyond Ethereal: Crafting A Tivo for Security Datastreams
PDF: Greg Conti-Beyond Ethereal: Crafting A Tivo for Security Datastreams

James C. Foster & Vincent T. Liu
Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch…
PDF: James C. Foster & Vincent T. Liu
Catch Me If You Can: Exploiting Encase, Microsoft, Computer Associates, and the rest of the bunch…

Grugq
The Art of Defiling: Defeating Forensic Analysis
PDF: Grugq-The Art of Defiling: Defeating Forensic Analysis

Allen Harper and Edward Balas
GEN III Honeynets: The birth of roo
PDF: Allen Harper and  Edward Balas-GEN III Honeynets: The birth of roo


Kevin Mandia
Performing Effective Incident Response
PDF: Kevin Mandia-Performing Effective Incident Response


Deep Knowledge

updated materials
Himanshu Dwivedi
iSCSI Security (Insecure SCSI)
PDF: Himanshu Dwivedi-iSCSI Security (Insecure SCSI)


Dan Kaminsky
Black Ops 2005


David Litchfield
All new Ø Day


Mudge
Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security
PDF: Mudge-Economics, Physics, Psychology and How They Relate to Technical Aspects of Counter Intelligence / Counter Espionage Within Information Security

Sensepost
Automation - Deus ex Machina or Rube Goldberg Machine?

PDF: Sensepost-Automation - Deus ex Machina or Rube Goldberg Machine?
Layer 0

Darrin Barrall & David Dewey
Plug and Root, the USB Key to the Kingdom

PDF: Darrin Barrall & David Dewey-Plug and Root, the USB Key to the Kingdom


Joe Grand
Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

PDF: Joe Grand-Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices


Joseph Klein
The Social Engineering Engagement Methodology

PDF: Joseph Klein-The Social Engineering Engagement Methodology


updated materials
Kevin Mahaffey, Mark McGovern, Paul Simmonds, Jon Callas
Long Range RFID and its Security Implications

PDF: Kevin Mahaffey, Mark McGovern, Paul Simmonds, Jon Callas, Long Range RFID and its Security Implications

Robert Morris
The Non-Cryptographic Ways of Losing Information



Policy, Management, and the Law

Scott Blake, Pamela Fusco, Andre Gold, Ken Pfeil, Justin Somaini
CISO Q&A with Jeff Moss



updated materials
Robert W. Clark
Legal Aspects of Computer Network Defense
PDF: Paul Wouters, Windows WaveSEC Deployment

papers

Bryan Cunningham & C. Forrest Morgan
U.S National Security, Individual and Corporate Information Security, and Information Security Providers

PDF: Bryan Cunningham & C. Forrest Morgan-U.S National Security, Individual and Corporate Information Security, and Information Security Providers

bibliography

updated materials
Kenneth Geers
Hacking in a Foreign Language

PDF: Kenneth Geers-Hacking in a Foreign Language

Jennifer Stisa Granick
Top Ten Issues in Computer Security

PDF: Jennifer Stisa Granick-Top Ten Issues in Computer Security

Privacy & Anonymity

PANEL: Joseph Ansanelli, Richard Baich, Adam Shostack, Paul Proctor
The Future of Personal Information



Ian Clarke & Oskar Sandberg
Routing in the Dark: Scalable Searches in Dark P2P Networks

PDF: Ian Clarke & Oskar Sandberg-Routing in the Dark: Scalable Searches in Dark P2P Networks
Johnny Long
Google Hacking for Penetration Testers

PDF: Johnny Long-Google Hacking for Penetration Testers


PANEL: David Mortman, Dennis Bailey, Jim Harper, Rhonda MacLean
The National ID Debate



updated materials
Adam L. Young
Building Robust Backdoors In Secret Symmetric Ciphers

PDF: Adam L. Young-Building Robust Backdoors In Secret Symmetric Ciphers


Philip R. Zimmermann
The Unveiling of My Next Big Project



Turbo Talks

updated materials
Akshay Aggarwal
Rapid Threat Modeling

PDF: Akshay Aggarwal-Rapid Threat Modeling

Darrin Barrall
Shakespearean Shellcode

Darrin Barrall-Shakespearean Shellcode
Renaud Bidou
A Dirty BlackMail DoS Story
PDF: Renaud Bidou-A Dirty BlackMail DoS Story
James C. Foster
BlackHat Standup: “Yea I’m a Hacker…”


Kevin Cardwell
Toolkits: All-in-One Approach to Security

PDF: Kevin Cardwell-Toolkits: All-in-One Approach to Security

Cesar Cerrudo
Demystifying MS SQL Server & Oracle Database Server Security

PDF: Cesar Cerrudo-Demystifying MS SQL Server & Oracle Database Server Security

Tyler Close
Shatter-proofing Windows

PDF: Tyler Close-Shatter-proofing Windows

white paper

Yuan Fan
Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection

PDF: Yuan Fan-Advance SQL Injection Detection by Join Force of Database Auditing and Anomaly Intrusion Detection

Ken Hines
Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment

PDF: Ken Hines-Using Causal Analysis to Establish Meaningful Connections between Anomalous Behaviors in a Networking Environment

MadHat Unspecific & Simple Nomad
SPA: Single Packet Authorization

PDF: MadHat Unspecific & Simple Nomad-SPA: Single Packet Authorization

Shawn Moyer
Owning the C-suite: Corporate Warfare as a Social Engineering Problem

PDF: Shawn Moyer-Owning the C-suite: Corporate Warfare as a Social Engineering Problem

updated materials
Mike Pomraning
Injection Flaws: Stop Validating Your Input

PDF: Mike Pomraning-Injection Flaws: Stop Validating Your Input

Paul Simmonds
The Jericho Challenge - Finalist Architecture Presentations and Awards



Zero Day Attack

Adam Boileau
Trust Transience: Post Intrusion SSH Hijacking

PDF: Adam Boileau-Trust Transience: Post Intrusion SSH Hijacking

updated materials
Barnaby Jack
Remote Windows Kernel Exploitation - Step In To the Ring 0

PDF: Barnaby Jack
Remote Windows Kernel Exploitation - Step In To the Ring 0

white paper

Michael Lynn
Cisco IOS Security Architecture



Derek Soeder & Ryan Permeh
eEye BootRoot

PDF: Derek Soeder & Ryan Permeh-eEye BootRoot

spoonm & skape
Beyond EIP

PDF: spoonm & skape-Beyond EIP

Zero Day Defense

Ofir Arkin
A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control
PDF: Ofir Arkin-A New Hybrid Approach For Infrastructure Discovery, Monitoring and Control

updated materials
Beetle and Bruce Potter
Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows

PDF: Beetle and Bruce Potter-Rogue Squadron: Evil Twins, 802.11intel, Radical RADIUS, and Wireless Weaponry for Windows


Tzi-cker Chiueh
Checking Array Bound Violation Using Segmentation Hardware

PDF: Jamie Butler & Greg Hoglund, VICE - Catch the Hookers!


Robert J. Hansen & Meredith L. Patterson
Stopping Injection Attacks with Computational Theory

PDF: Robert J. Hansen & Meredith L. Patterson
Stopping Injection Attacks with Computational Theory

white paper

Eugene Tsyrklevich
Ozone HIPS: Unbreakable Windows

PDF: Eugene Tsyrklevich-Ozone HIPS: Unbreakable Windows

Paul Vixie
Preventing Child Neglect in DNSSEC-bis using Lookaside Validation




Black Hat Europe 2005
Track/Speaker/Topic Presentation (PDFs) Notes/Tools
Keynote Presentation - Black Hat Europe 2005

Simon Davies, Privacy International



Speakers - Black Hat Europe 2005
David Barroso Berrueta & Alfredo Andres
Yersinia, A Framework For Layer 2 Attacks
PDF: David Barroso Berrueta & Alfredo Andres-Yersinia, A Framework For Layer 2 Attacks


tool

updated materials
Jon Callas
Hacking PGP
PDF: Jon Callas - Hacking PGP
Cesar Cerrudo
Hacking Windows Internals
PDF: Cesar Cerrudo-Hacking Windows Internals


tool

Job de Haas
Symbian Security
PDF: Job de Haas-Symbian Security
Steve Dugan
A New Password Capture on Cisco System Devices


updated materials
Arian Evans
Building Zero-Day Self-Defending Web Applications: Enforcing Authoritative Action to Stop Session Attacks
PDF: Arian Evans-Building Zero-Day Self-Defending Web Applications: Enforcing Authoritative Action to Stop Session Attacks
updated materials
Chris Farrow
Injecting Trojans via Patch Management Software & Other Evil Deeds
PDF: Chris Farrow
updated materials
Nicolas Fischbach
Network Flows and Security
PDF: Nicolas Fischbach-Network Flows and Security
Halvar Flake & Rolf Rolles
Compare, Port, Navigate
PDF: Halvar Flake & Rolf Rolles-Compare, Port, Navigate
updated materials
Kenneth Geers
Hacking in a Foreign Language: A Network Security Guide to Russia
PDF: Kenneth Geers - Hacking in a Foreign Language: A Network Security Guide to Russia

Joe Grand
Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices

PDF: Joe Grand - Can You Really Trust Hardware? Exploring Security Problems in Hardware Devices


the Grugq
The Art of Defiling: Defeating Forensic Analysis

updated materials
PDF: the Grugq - The Art of Defiling: Defeating Forensic Analysis
Dan Kaminsky
Attacking Distributed Systems: The DNS Case Study
PDF: Dan Kaminsky - Attacking Distributed Systems: The DNS Case Study
Christian Klein & Ilja van Sprundel
Mac OS X Kernel Insecurity
PDF: Christian Klein & Ilja van Sprundel - Mac OS X Kernel Insecurity
Alexander Kornbrust
Database Rootkits
PDF: Alexander Kornbrust - Database Rootkits


tool

updated materials
Adam Laurie, Martin Herfurt & Marcel Holtmann
Bluetooth Hacking - Full Disclosure
PDF: Adam Laurie, Martin Herfurt & Marcel Holtmann - Bluetooth Hacking - Full Disclosure PDF:

David Litchfield
SQL Injection and Data Mining Through Inference

PDF: David Litchfield

Johnny Long
Google Hacking for Penetration Testers

PDF: Johnny Long - Google Hacking for Penetration Testers


Laurent Oudot
WLAN and Stealth Issues

PDF: Laurent Oudot - WLAN and Stealth Issues


tool

updated materials
Sensepost
Revolutions in Web Server/Application Assessments
PDF: Sensepost - Revolutions in Web Server/Application Assessments

Saumil Shah
Defeating Automated Web Assessment Tools

PDF: Saumil Shah - Defeating Automated Web Assessment Tools

updated materials
Paul Simmonds
Architectural Challenges in a Jericho World

PDF: Paul Simmonds - Architectural Challenges in a Jericho World


updated materials
Alex Wheeler & Neel Mehta
Owning Anti-Virus: Weaknesses in a Critical Security Component
PDF: Alex Wheeler & Neel Mehta - Owning Anti-Virus: Weaknesses in a Critical Security Component


updated materials
Stefano Zanero
Automatically Detecting Web Application Vulnerabilities by Variable Flow Reconstruction

PDF: Stefano Zanero - Automatically Detecting Web Application Vulnerabilities by Variable Flow Reconstruction


Media Server Hosted By:

Complex Drive

Complex Drive - Reliable, Secure, and Responsive Business Internet


Black Hat Logo
(c) 1996-2007 Black Hat