We're sunsetting PodQuest on 2025-07-28. Thank you for your support!
Export Podcast Subscriptions

Black Hat Briefings, Las Vegas 2005 [Video] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. The Black Hat B

Episodes

Total: 61

Web applications are constantly under attack, and must defend themselves. Sadly, today, most cannot.

This topic will present the proposal/idea/work from the author's master graduate project about effec

This presentation, by a former Deputy Legal Adviser to the White House National Security Council, an

Himanshu Dwivedi's presentation will discuss the severe security issues that exist in the default im

The Shatter attack uses the Windows API to subvert processes running with greater privilege than the

Ethereal is a thing of beauty, but ultimately you are constrained to a tiny window of 30-40 packets

This presentation looks at computer network defense and the legal cases of the last year that affect

It has become apparent that the greatest threat toward the survival of peer to peer, and especially

The ability to check memory references against their associated array/buffer bounds helps programmer

This talk will cover the Defense Cyber Crime Center (DC3), our mission and capabilities. The DC3 is

Databases are where your most valuable data rest, when you use a database server you implicitly trus

This talk will be on using toolkits for your pen-testing, vulnerability assessment etc. Configuring

Trust Transience: Post Intrusion SSH Hijacking explores the issues of transient trust relationships

At DefCon 11, a rogue access point setup utility named "Airsnarf" was presented by the Shmoo Group.

This is a real story of modern extortion in a cyberworld. Bots have replaced dynamite and you don't

USB peripheral devices are made by reputable manufacturers and will not misbehave by attacking the h

This discussion will cover the theoretical background of using ordinary, readable text to conceal an

An enterprise IT infrastructure is a complex and a dynamic environment that is generally described a

In the last year, there have been 45 security incidents compromising the personal information of 9.3

One of the most important weapons in our arsenal for securing applications is threat modeling. Appli