Black Hat Windows Security 2003

Interested in obtaining a set of the Windows Security 2003 Briefings printed conference proceedings or CD? Limited numbers are now available for purchase. Bonus gift will be included with any printed conference proceedings order.

details
Feb 25 • Informal gathering at 18:00. Gather at the Registration Desk.
This is a great time to meet and network with friends, colleagues and the speakers.
Day 1 • February 26, 2003
08:00 - 09:00 Registration and Continental Breakfast
09:00 - 09:15 Introduction, Jeff Moss
09:15 - 10:15

Keynote: Trustworthy Computing Update
Scott Culp, Senior Strategist, Microsoft's Trustworthy Computing Team

Sheraton Hotel, Grand Balllroom A

10:15 - 10:30 Coffee Service
Audit / Response / Policy .NET nka Windows Server 2003 Deep Knowledge
Location & Times Sheraton Hotel, Grand Balllroom A Sheraton Hotel, Grand Balllroom B Sheraton Hotel, West Balllroom
10:30 - 12:00

Payload Anatomy and Future Mutations

Riley Hassell

.NET from the Hacker's Perspective

Drew Miller

Graph-Based Binary Analysis

Halvar Flake

12:00 - 13:30 Lunch: sit and talk with the speakers
sponsored by Windows & .Net Magazine and Security Administrator Magazine

Lunch will be in the Metropolitan Ballroom, 3rd Floor

13:30 - 14:45

Forensics Tools and Processes for Windows XP® Platforms

Larry Leibrock

FrontPage Server Extensions on Windows Server 2003

Mark Burnett

Vivisection of an Exploit Development Process

David Aitel

14:45 -15:00 Break
15:00 - 16:15

Applied Black Op Networking on Windows XP

Dan Kaminsky

IIS 6.0's Security Architecture - It's a Whole New World

Michael Muckin

Securing Your Network
Part 1

16:15 - 16:30 Coffee Service
16:30 - 18:00

Web Application Security

Jeremiah Grossman & Bill Pennington

Surviving OpenHack IV

Steve Riley and Timothy Bollefer

Securing Your Network
Part 2

Eric Schultze & Erik Birkholz

18:00 - 20:00 Hosted Reception: The reception will be held on the 35th floor in the Cirrus Ballroom. Plenty of food and drink will be available while you relax, network and enjoy the sweeping city views.

Booksignings with Erik Birkholz and his newly published book, Special Ops and with David LeBlanc and Michael Howard on their book, Writing Secure Code, Second Edition. Books will be available for purchase from BreakPoint Books, our official conference bookseller.

Black Hat wants to hear from you! We will have a feedback server that is accessible online during the show (of course we will also have thre traditional paper feedback forms available). We will select three people from the submitted feedback forms (both electronic and paper). Grand prize is a full paid admission to any future Black Hat Briefings, Second Prize will be a Black Hat branded polar fleece and Third Prize is a Black Hat branded vacuum bottle. Winners will be selected after the show and will be announced on the website and contacted directly.
Day 2 • February 27, 2003
08:00 - 09:15 Continental Breakfast
09:15 - 10:15

Keynote: Strike and Counterstrike: The Law on Automated Intrusions and Striking Back
Curtis E. A. Karnow

Sheraton Hotel, Grand Balllroom A

10:15 - 10:30 Coffee Service
IIS, SQL, ISA, etc. Networking & Integration Application Development
Location & Times Sheraton Hotel, Grand Balllroom A Sheraton Hotel, Grand Balllroom B Sheraton Hotel, West Balllroom
10:30 - 12:00

HTTP: Advanced Assessment Techniques

Saumil Udayan Shah

Design Issues and Software Vulnerabilities in Embedded Systems

FX

Java Library Hole Allowing Multiplatform Denial-Of-Service

Marc Schöenefeld

12:00 - 13:30 Lunch: sit and talk with the speakers

Booksigning with Saumil Shah and his book, Web Hacking Attacks and Defense.
Books will be available for purchase from BreakPoint Books, our official conference bookseller.

Lunch will be in the Metropolitan Ballroom, 3rd Floor

13:30 - 14:45

Oracle Security II

David Litchfield

The Role of Non Obvious Relationships in the Foot Printing Process

Haroon Meer & Charl van der Walt

Exploiting DCOM

Yoshiaki Komoriya & Hidenobu Seki

14:45 -15:00 Break
15:00 - 16:15

Hunting Flaws in MS SQL Server

Cesar Cerrudo & Aaron Newman

$tea£ing with BGP

Stephen Dugan

Writing Secure and Hack Resistant Code
Part 1

16:15 - 16:30 Coffee Service
16:30 - 18:00

Enforcer™

Timothy Mullen

Securing Wireless Networks with 802.1x, EAP-TLS and PEAP

Steve Riley

Writing Secure and Hack Resistant Code
Part 2

Michael Howard & David LeBlanc

Note that this schedule is subject to change.

Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.

Black Hat Logo
(c) 1996-2007 Black Hat