Black Hat Media Archives

Black Hat Multimedia Archives Quick-link

Conference CDs containing speaker presentations and materials are available for purchase from our store.

Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently online.

Black Hat USA 1999

Black Hat USA 1999

Track/Speaker/Topic Presentation
Keynote Presentation - Black Hat USA 1999
William R. Cheswick
Security Ideas From All Over

William R. Cheswick
The Internet Mapping Project

Dr. Jeffrey A. Hunker
Introduction by John Davis
Protecting America’s Cyberspace: Version 1.0 of the National Plan
Dr. Mudge
Bruce Schneier
Mistakes and Blunders: A Hacker Looks At Cryptography
Technical Track - Black Hat USA 1999
Security Issues Affecting Internet Transit Points and Backbone Providers
David Bovee
VPN Architectures: Looking at the Complete Picture

Dominique Brezinski
Building a Forensic Tool kit That Will Protect You From Evil Influences
Ed Gerck
Overview of Certification Systems: x.509, CA, PGP and SKIP
JD Glaser
Auditing NT - Catching Greg Hoglund
Brent Huston
Appliance Firewalls: A Detailed Review
DNS Security Issues
Eric Schultze & George Kurtz
Over the Router, Through the Firewall, to Grandma’s House We Go
Peter Shipley & Tom Jackiewicz
Security Issues with Implementing and Deploying the LDAP Directory System
Simple Nomad
Modern NetWare Hacking
General Track - Black Hat USA 1999
Sarah Gordon
Viruses in the Information Age
Greg Hoglund
1000 Hackers in a Box: Failings of "Security Scanners."
Larry Korba
Hope, Hype, Horrors... E-Commerce Explored
Marcus Ranum
Burglar Alarms and Booby Traps
Jeremy Rauch
How Responsive are Vendors to Security Problems When They Aren't Being Pressured by Someone Threatening To Go Public?
Mike Schiffman
The Firewalk Tool
Eugene Schultz
Security Issues with Configuring and Maintaining an IIS 4 Server
Adam Shostack
Towards A Taxonomy of Network Security Testing Techniques
Peter Stephenson
Introduction to Cyber Forensic Analysis
Panel: Competitive Intelligence
Moderated by Sangfroid.
Pannelists include: Dr. Mudge, Mike Schiffman, Batz, Jeremy Rauch, Dean Turner, Space Rogue, Sir Distic

White Hat Track - Black Hat USA 1999
Scott Culp
Building a Security Response Process

Jon David
Putting Intrusion Detection into Intrusion Detection Systems
Jennifer Grannick
Forensic Issues in Hacker Prosecutions

Rob Karas
Open Source Monitoring
Jim Litchko
Total BS Security: Business-based Systems Security
Teresa Lunt
Taxonomy of Intrusion Detection Systems
Padgett Peterson
Overlooked Local Attack Techniques
G. Alec Tatum, III & Rich Alu
Managing the External Environment

Ira Winkler
The issues Surrounding The Hiring of "Hackers."

Rebecca Base
Security (or the lack thereof) and "Our Friends In Redmond"

Panel - John Davis, William Ozier
Overview of risk of your corporate infrastructure.  They will then discuss what are the concerns from external & internal viewpoints with management and technical points of concern

Black Hat USA 1998

Black Hat USA 1998

Track/Speaker/Topic Presentation
Keynote Presentation - Black Hat USA 1998
Marcus Ranum
How to REALLY Secure the Internet

John Bailey
SOCKS, PPTP & IPSec: Implementation & Futures

Ian Goldberg
Cell Phone Security: A History and The State of the Art

Dr. Mudge
Problems with VPN Technologies

Tom Ptacek
Problems with Intrusion Detection Systems

General Track - Black Hat USA 1998
Jennifer Granick
What's Different About Evidence in Computer Crime litigation

Patrick Richard
Open Network PKI Design Issues or Business as Usual

Bruce K. Marshall
Statistical Analysis of Reusable Password Systems and Their Alternatives

Ira Winkler
Information Security: Beyond the Hype

Black Hat USA 1997

Black Hat USA 1997

Speaker/Topic Presentation
Keynote Presentation - Black Hat USA 1997
Richard Thieme

Speaker/Presentation - Black Hat USA 1997
Dominique Brezinski
Security Posture Assessment (SPA) of Windows NT Networks

Miles Connley
Firewalls: Not Enough of a Good Thing

Chris Goggans
Internet Attack Methodologies

Microsoft LM athentication, CIFS, and All Kinds of Password Problems

Ray Kaplan
Meet The Enemy

Secure Coding Practices and Source Code Analysis

Secure Implementations of  ActiveX in a Corporate Environment

Building the Business Case for Management for Increased Security

Jeremy Rauch
Security Implications of Distributed Network Management

TCP/IP Insecurities


Download DOS.tgz
Download sniff.tgz
Download misc.tgz
Download Phrack 48, 49, and 50

Bruce Schneier
Why Cryptograpy is Harder Than it Looks
Adam Shostack
Code Reviews: Making them Worthwhile
Denial of Service Attacks, and Defensive Strategies

Media Server Hosted By:

Complex Drive

Complex Drive - Reliable, Secure, and Responsive Business Internet

Black Hat Logo
(c) 1996-2007 Black Hat