We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 61

Philip R. Zimmermann is the creator of Pretty Good Privacy. For that, he was the target of a three-y

AV software is becoming extremely popular because of the its percieved protection. Even the average

This talk will present recent advances in the design of robust cryptographic backdoors in secret sym

Paul Vixie has been contributing to Internet protocols and UNIX systems as a protocol designer and s

Windows is the number one target on the Internet today. It takes less than 5 minutes for an unpatche

After three years of community development, the Open Web Application Security Project (OWASP) is pro

When we built Metasploit, our focus was on the exploit development process. We tried to design a sys

Web Services represent a new and unexplored set of security-sensitive technologies that have been wi

In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microso

Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not

This presentation will cover the eEye BootRoot project, an exploration of technology that boot secto

The days of the corporate network, completely isolated with a well-secured outer shell are long gone

How far can automation be taken? How much intelligence can be embodied in code? How generic can auto

Years after the debut of XSS and SQL Injection, each passing week sees newly disclosed vulnerabiliti

The computer and network security fields have made little progress in the past decade. The rhetoric

This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vul

Jeff Moss, founder of Black Hat, invites Chief Information Security Officers from global corporation

Let's face it, you ROCK at building InfoSec tech, but you SUCK at corporate warfare. Sooner or later

To fully understand how to protect crucial information in the modern world, one needs to fully under

As a result of the Real-ID Act, all American citizens will have an electronically readable ID card t