Black Hat Media Archives


Black Hat Multimedia Archives Quick-link
USA


Conference CDs containing speaker presentations and materials are available for purchase from our store.


Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently online.

Black Hat USA 1999


Black Hat USA 1999

Track/Speaker/Topic Presentation
Keynote Presentation - Black Hat USA 1999
William R. Cheswick
Security Ideas From All Over

William R. Cheswick
The Internet Mapping Project

Dr. Jeffrey A. Hunker
Introduction by John Davis
Protecting America’s Cyberspace: Version 1.0 of the National Plan
Dr. Mudge
Bruce Schneier
Mistakes and Blunders: A Hacker Looks At Cryptography
Technical Track - Black Hat USA 1999
Batz
Security Issues Affecting Internet Transit Points and Backbone Providers
David Bovee
VPN Architectures: Looking at the Complete Picture

Dominique Brezinski
Building a Forensic Tool kit That Will Protect You From Evil Influences
Ed Gerck
Overview of Certification Systems: x.509, CA, PGP and SKIP
JD Glaser
Auditing NT - Catching Greg Hoglund
Brent Huston
Appliance Firewalls: A Detailed Review
Rooster
DNS Security Issues
Eric Schultze & George Kurtz
Over the Router, Through the Firewall, to Grandma’s House We Go
Peter Shipley & Tom Jackiewicz
Security Issues with Implementing and Deploying the LDAP Directory System
Simple Nomad
Modern NetWare Hacking
General Track - Black Hat USA 1999
Sarah Gordon
Viruses in the Information Age
Greg Hoglund
1000 Hackers in a Box: Failings of "Security Scanners."
Larry Korba
Hope, Hype, Horrors... E-Commerce Explored
Marcus Ranum
Burglar Alarms and Booby Traps
Jeremy Rauch
How Responsive are Vendors to Security Problems When They Aren't Being Pressured by Someone Threatening To Go Public?
Mike Schiffman
The Firewalk Tool
Eugene Schultz
Security Issues with Configuring and Maintaining an IIS 4 Server
Adam Shostack
Towards A Taxonomy of Network Security Testing Techniques
Peter Stephenson
Introduction to Cyber Forensic Analysis
Panel: Competitive Intelligence
Moderated by Sangfroid.
Pannelists include: Dr. Mudge, Mike Schiffman, Batz, Jeremy Rauch, Dean Turner, Space Rogue, Sir Distic

White Hat Track - Black Hat USA 1999
Scott Culp
Building a Security Response Process

Jon David
Putting Intrusion Detection into Intrusion Detection Systems
Jennifer Grannick
Forensic Issues in Hacker Prosecutions

Rob Karas
Open Source Monitoring
Jim Litchko
Total BS Security: Business-based Systems Security
Teresa Lunt
Taxonomy of Intrusion Detection Systems
Padgett Peterson
Overlooked Local Attack Techniques
G. Alec Tatum, III & Rich Alu
Managing the External Environment

Ira Winkler
The issues Surrounding The Hiring of "Hackers."

Rebecca Base
Security (or the lack thereof) and "Our Friends In Redmond"

Panel - John Davis, William Ozier
Overview of risk of your corporate infrastructure.  They will then discuss what are the concerns from external & internal viewpoints with management and technical points of concern


Black Hat USA 1998


Black Hat USA 1998

Track/Speaker/Topic Presentation
Notes/Tools
Keynote Presentation - Black Hat USA 1998
Marcus Ranum
How to REALLY Secure the Internet

John Bailey
SOCKS, PPTP & IPSec: Implementation & Futures


Ian Goldberg
Cell Phone Security: A History and The State of the Art


Dr. Mudge
Problems with VPN Technologies

Tom Ptacek
Problems with Intrusion Detection Systems


General Track - Black Hat USA 1998
Jennifer Granick
What's Different About Evidence in Computer Crime litigation


Patrick Richard
Open Network PKI Design Issues or Business as Usual


Bruce K. Marshall
Statistical Analysis of Reusable Password Systems and Their Alternatives


Ira Winkler
Information Security: Beyond the Hype


Black Hat USA 1997


Black Hat USA 1997

Speaker/Topic Presentation
Ancillary
Keynote Presentation - Black Hat USA 1997
Richard Thieme

Speaker/Presentation - Black Hat USA 1997
Dominique Brezinski
Security Posture Assessment (SPA) of Windows NT Networks

Miles Connley
Firewalls: Not Enough of a Good Thing

Chris Goggans
Internet Attack Methodologies

Hobbit
Microsoft LM athentication, CIFS, and All Kinds of Password Problems


Ray Kaplan
Meet The Enemy


Mudge
Secure Coding Practices and Source Code Analysis


QMaster
Secure Implementations of  ActiveX in a Corporate Environment


Priest
Building the Business Case for Management for Increased Security


Jeremy Rauch
Security Implications of Distributed Network Management

Route
TCP/IP Insecurities

Tools

Download DOS.tgz
Download sniff.tgz
Download misc.tgz
Download Phrack 48, 49, and 50

Bruce Schneier
Why Cryptograpy is Harder Than it Looks
website
Adam Shostack
Code Reviews: Making them Worthwhile
Sluggo
Denial of Service Attacks, and Defensive Strategies


Media Server Hosted By:

Complex Drive

Complex Drive - Reliable, Secure, and Responsive Business Internet


Black Hat Logo
(c) 1996-2007 Black Hat