Index of /cons/blackhat/blackhat-rm-2-mp3
Parent Directory
1999_Black_Hat_Vegas_V04-Davis_Ozier_Nebel_and_Migues-Panel_Discussion-audio.mp3
1999_Black_Hat_Vegas_V05-Simple_Nomad-Modern_NetWare_Hacking-audio.mp3
1999_Black_Hat_Vegas_V06-Sarah_Gordon-Viruses_in_the_Information_Age-audio.mp3
1999_Black_Hat_Vegas_V07-Rob_Karas-Open_Source_Monitoring-audio.mp3
1999_Black_Hat_Vegas_V08-Rooster-DNS_Security_Issues-audio.mp3
1999_Black_Hat_Vegas_V09-Marcus_Ranum-Burglar_Alarms_and_Booby_Traps-audio.mp3
1999_Black_Hat_Vegas_V10-Jon_David-Putting_Intrusion_Detection_into_Intrusion_Detection_Systems-audio.mp3
1999_Black_Hat_Vegas_V11-Brent_Huston-Appliance_Firewalls_a_detailed_review-audio.mp3
1999_Black_Hat_Vegas_V14-Eric_Schultze_and_George_Kurtz-Over_the_Router_Through_the_Firewall_to_Grandma's_House_We_Go-audio.mp3
1999_Black_Hat_Vegas_V16-Jennifer_Grannick-Forensic_Issues_in_Hacker_Prosecutions-audio.mp3
1999_Black_Hat_Vegas_V17-Dr_Mudge-Keynote-audio.mp3
1999_Black_Hat_Vegas_V18-Dominique_Brezinski-Building_a_Forensics_Toolkit_That_Will_Protect_You_from_Evil_Influences-audio.mp3
1999_Black_Hat_Vegas_V19-Panel-Competitive_Intelligence-audio.mp3
1999_Black_Hat_Vegas_V20-Padgett_Peterson-Overlooked_Local_Attack_Techniques-audio.mp3
1999_Black_Hat_Vegas_V22-Mike_Schiffmman-The_Firewalk_Tool-audio.mp3
1999_Black_Hat_Vegas_V23-Teresa_Lunt-Taxonomy_of_Intrusion_Detection_Systems-audio.mp3
1999_Black_Hat_Vegas_V24-Batz-Security_Issues_Affecting_Internet_Transit_Points_and_Backbone_Providers-audio.mp3
1999_Black_Hat_Vegas_V25-Adam_Shostack-Towards_a_Taxonomy_of_Network_Testing_Techniques-audio.mp3
1999_Black_Hat_Vegas_V27-Peter_Shipley_and_Tom_Jackiewicz-Security_Issues_with_Implementing_and_Deploying_the_LDAP_Directory_System-audio.mp3
1999_Black_Hat_Vegas_V29-Scott_Culp-Building_a_Security_Response_Process-audio.mp3
1999_Black_Hat_Vegas_V31-Peter_Stephenson-Introduction_to_Cyber_Forensic_Analysis-audio.mp3
1999_Black_Hat_Vegas_V34-Jeremy_Rauch-How_Responsive_are_Vendors_to_Security_Problems_When_They_Aren't_Being_Pressured-audio.mp3
1999_Black_Hat_Vegas_V36-William_Cheswick-Closing_Session-audio.mp3
1999_Black_Hat_Vegas_V37-Ira_Winkler-The_Road_to_Riches-audio.mp3
2000_Black_Hat_Vegas_V01-Jeremy_Rauch-The_Security_of_Network_Devices-audio.mp3
2000_Black_Hat_Vegas_V02-Kingpin_and_Brian_Oblivian-Secure_Hardware_Design-audio.mp3
2000_Black_Hat_Vegas_V03-Ian_Poynter_and_Diana_Kelly-The_Truth_About_ASPs-audio.mp3
2000_Black_Hat_Vegas_V05-Jericho_and_Munge-Hard_Core_Web_Defacement_Statistics_Trends_and_Analysis-audio.mp3
2000_Black_Hat_Vegas_V06-John_McDonald-Stateful_Inspection_of_FireWall-1-audio.mp3
2000_Black_Hat_Vegas_V07-Lee_Kushner-The_State_of_Employment_in_the_Information_Security_Industry-audio.mp3
2000_Black_Hat_Vegas_V09-Jeff_Thompson-Making_Unix_Secure_for_the_Internet_with_Trusted_Operating_Systems-audio.mp3
2000_Black_Hat_Vegas_V10-Simple_Nomad-Strategies_for_Defeating_Distributed_Attacks-audio.mp3
2000_Black_Hat_Vegas_V11-Edward_G_Schwartz_and_Diana_Kelly-Data_Privacy_What_should_the_CIO_and_CISO_be_doing-audio.mp3
2000_Black_Hat_Vegas_V13-Padgett_Peterson-Securing_EMail_Gateways_from_Attacks-What_to_do_While_Waiting_for_Vendors_to_Respond_to_the_latest_virus_and_worms-audio.mp3
2000_Black_Hat_Vegas_V14-Job_De_Haas-Getting_Rooted_and_Never_Knowing_It-audio.mp3
2000_Black_Hat_Vegas_V15-Diana_Kelly_and_Edward_G_Schwartz-From_Policy_to_Technology_Translating_US_Privacy_Regulations_for_Implementation-audio.mp3
2000_Black_Hat_Vegas_V16-Greg_Hoglund-Advanced_Buffer_Overflow_Techniques-audio.mp3
2000_Black_Hat_Vegas_V17-David_Litchfield-Compromising_web_Servers_and_Defensive_Techniques-audio.mp3
2000_Black_Hat_Vegas_V18-David_LeBlanc-Real_World_Techniques_in_Network_Security_Management-audio.mp3
2000_Black_Hat_Vegas_V19-Jennifer_Granick_and_Mark_Eckenwiler-What_Internet_Service_Providers_Need_to_Know_About_the_Law-audio.mp3
2000_Black_Hat_Vegas_V20-Rooster_and_JD_Glaser-Defending_Your_Network_With_Active_Directory_Services-audio.mp3
2000_Black_Hat_Vegas_V21-Ron_Gula-Bypassing_Intrusion_Detection_Systems-audio.mp3
2000_Black_Hat_Vegas_V22-Joey-Advanced_Windows_NT_and_2000_Security-audio.mp3
2000_Black_Hat_Vegas_V22-Joey-Advanced_Windows_NT_and_2000_Security-audio.wav
2000_Black_Hat_Vegas_V23-Terry_Losonky-National_Information_Assurance_Partnership-audio.mp3
2000_Black_Hat_Vegas_V24-Ron_Moritz-Proactive_Defense_Against_Malicious_Code-audio.mp3
2000_Black_Hat_Vegas_V25-Mudge-An_Analysis_of_Tactics_Used_in_Discovering_Passive_Monitoring_Devices-audio.mp3
2000_Black_Hat_Vegas_V26-Scott_Blake-The_Pros_and_Cons_of_Hiring_Hackers-audio.mp3
2000_Black_Hat_Vegas_V27-Mark_Kadrich-Intrusion_Detection_in_High_Speed_Networks-audio.mp3
2000_Black_Hat_Vegas_V28-Jason_Garms-Defending_Windows_2000_on_the_Internet-audio.mp3
2000_Black_Hat_Vegas_V29-Gordon_Reichard_Jr-Trust,_Security,_Partnership_Strategies_in_Selecting_a_Managed_Service_Provider-audio.mp3
2000_Black_Hat_Vegas_V31-Arthur_Money-Closing_Keynote-audio.mp3
2000_Black_Hat_Vegas_VK1-Marcus_Ranum-Full_Disclosure_and_Open_Source-audio.mp3
2000_Black_Hat_Vegas_VK2-Bruce_Schneier-The_Instrument_and_Death_of_Security-audio.mp3
2000_Black_Hat_Vegas_VK3-Brian_Snow-We_Need_Assurance-audio.mp3
2000_Black_Hat_Vegas_VK4-Dominque_Brezinski-Anatomy_of_Common_Programming_Security_Issues-audio.mp3
2000_Black_Hat_Vegas_VL1-Richard_Theime-Strategies_of_Sun_Tzu_and_Multiple_Levels_of_Deception_How_to_Play_Chess_While_the_Board_is_Disappearing-audio.mp3
2001_Black_Hat_Vegas_V01-Scott_Blake-Dog_of_War_Attack_Box_Design-audio.mp3
2001_Black_Hat_Vegas_V02-Jose_Nazario-The_Future_of_Network_Worms-audio.mp3
2001_Black_Hat_Vegas_V03-Thomas_Olofsson-Building_a_Blind_IP_Spoofed_Portscanning_Tool-audio.mp3
2001_Black_Hat_Vegas_V05-Robert_Hansen-htaccess_Scripts_in_Apache_Environments-audio.mp3
2001_Black_Hat_Vegas_V07-Renaud_Deraison-The_Nessus_Project_Reducing_the_Costs_of_Vulnerability_Assessment-audio.mp3
2001_Black_Hat_Vegas_V09-Steven_Christey-CVE_Behind_the_Scenes_The_Complexity_of_Being_Simple-audio.mp3
2001_Black_Hat_Vegas_V10-Jay_Beale-Attacking_and_Defending_BIND_DJBDNS_DNS_Servers-audio.mp3
2001_Black_Hat_Vegas_V11-Simple_Nomad_and_Todd_Sabin-The_RAZOR_Warez-audio.mp3
2001_Black_Hat_Vegas_V12A-Halvar_Flake-Hit_Them_Where_It_Hurts_Finding_Holes_in_COTS_Software_Part_1-audio.mp3
2001_Black_Hat_Vegas_V12B-Halvar_Flake-Hit_Them_Where_It_Hurts_Finding_Holes_in_COTS_Software_Part_2-audio.mp3
2001_Black_Hat_Vegas_V13-Andrew_van_der_Stock-Alternatives_to_Honeypots-audio.mp3
2001_Black_Hat_Vegas_V14-Ian_Goldberg-Breaking_80211_WEP-audio.mp3
2001_Black_Hat_Vegas_V15-Martin_Roesch-Snort-audio.mp3
2001_Black_Hat_Vegas_V16-Job_de_Haas-GSM_WAP_and_SMS_Security-audio.mp3
2001_Black_Hat_Vegas_V17-Marshall_Beddoe_and_Chris_Abad-The_Siphon_Project-audio.mp3
2001_Black_Hat_Vegas_V18-Rain_Forest_Puppy-TBD-audio.mp3
2001_Black_Hat_Vegas_V19-Kevin_McPeake_and_Chris_Goggins-Falling_Dominos-audio.mp3
2001_Black_Hat_Vegas_V20-Cory_Scott-Systems_Management_in_an_Untrusted_Network-audio.mp3
2001_Black_Hat_Vegas_V21-Tim_Newsham-Cracking_WEP_Keys-audio.mp3
2001_Black_Hat_Vegas_V22-Mandy_Andress-Wireless_LAN_Security-audio.mp3
2001_Black_Hat_Vegas_V23-Walter_Gary_Sharp-Key_Legal_Implications_of_Computer_Network_Defense-audio.mp3
2001_Black_Hat_Vegas_V24-Chip_Andrews-SQL_Security_Revisited-audio.mp3
2001_Black_Hat_Vegas_V26-Gregory_S_Miles-Computer_Forensics_a_Critical_Process_in_Your_Incident_Response_Plan-audio.mp3
2001_Black_Hat_Vegas_V27-Last_Stage_Of_Delirium_Research_Group-UNIX_Assembly_Codes_Development_for_Vulnerabilities-audio.mp3
2001_Black_Hat_Vegas_V28-Timothy_Mullen-Grabbing_User_Credentials_via_W2k_ODBC_Libraries-audio.mp3
2001_Black_Hat_Vegas_V29-Daji_Sanai-Promiscuous_Node_Detection_Using_ARP_Packets-audio.mp3
2001_Black_Hat_Vegas_V30-Brian_Martin_and_B_K_DeLong-Lessons_Learned_From_attrition.org-audio.mp3
2001_Black_Hat_Vegas_V31-Ofir_Arkin-Introducing_X_Playing_Tricks_with_ICMP-audio.mp3
2001_Black_Hat_Vegas_V32-Chad_R_Skipper-Polymorphism_and_Intrusion_Detection_Systems-audio.mp3
2001_Black_Hat_Vegas_V33-Mike_Beekey-ARP_Vulnerabilities_Indefensible_Local_Network_Attacks-audio.mp3
2001_Black_Hat_Vegas_V34-Daniel_VanBelleghem-Solving_Network_Mystries-audio.mp3
2001_Black_Hat_Vegas_V35A-Lance_Spitzner-The_Honey_Net_Project-audio.mp3
2001_Black_Hat_Vegas_V36-Palante-Top_25_Overlooked_Security_Configuration_on_Your_Switches_and_Routers-audio.mp3
2001_Black_Hat_Vegas_V37-Jeff_Nathan_and_Kevin_Depeugh-Layer_2_Attacks-audio.mp3
2001_Black_Hat_Vegas_VK1-James_Bamford-Researching_Secrets_Part_II-audio.mp3
2001_Black_Hat_Vegas_VL1-Richard_Thieme-Defending_the_Information_Web_New_Ways_of_Thinking_About_Security-audio.mp3
2001_Black_Hat_Vegas_VL2-Bruce_Schneier-Paradigms_Lost_Engineering_vs_Risk_Management-audio.mp3
2002_Black_Hat_Vegas_V01-Bruce_Potter-802.11X-audio.mp3
2002_Black_Hat_Vegas_V02-Roelof_Temmingh_and_Haroon_Meer-Setiri-audio.mp3
2002_Black_Hat_Vegas_V03-Len_Sassaman-Forensic_Dead-Ends-audio.mp3
2002_Black_Hat_Vegas_V04-Halvar_Flake-Graph_Based_Binary_Analysis-audio.mp3
2002_Black_Hat_Vegas_V05-Mike_Schiffman-The_Need_for_an_802.11b_Toolkit-audio.mp3
2002_Black_Hat_Vegas_V06-Diana_Kelly_and_Ian_Poynter-Single_Sign_On_101-audio.mp3
2002_Black_Hat_Vegas_V07-Roger_Dingledine-Why_is_Anonymity_So_Hard-audio.mp3
2002_Black_Hat_Vegas_V08-Aaron_Higbee_and_Chris_Davis-DC_Phone_Home-audio.mp3
2002_Black_Hat_Vegas_V09-Dan_Veeneman-Wireless_Overview-Protocols_and_Threat_Models-audio.mp3
2002_Black_Hat_Vegas_V10-Rick_Smith-The_Biometrics_Dilemma-audio.mp3
2002_Black_Hat_Vegas_V11-Mark_Eckenwiler-USA_Patriot_Act_and_Criminal_Investigations-audio.mp3
2002_Black_Hat_Vegas_V12-Maximiliano_Caceres-Syscall_Proxying-audio.mp3
2002_Black_Hat_Vegas_V13-Robert_Baird_and_Mike_Lynn-Advanced_80211b_Attack-audio.mp3
2002_Black_Hat_Vegas_V14-Rich_Murphy-Locking_Down_Your_FreeBSD_Install-audio.mp3
2002_Black_Hat_Vegas_V16-Dow_Herath_Mehta_Spencer_and_Flake-Professional_Source_Code_Auditing-audio.mp3
2002_Black_Hat_Vegas_V17-Dan_Veeneman-Vulnerabilities_of_Cellular_and_Satellite-based_Voice_and_Data_Networks-audio.mp3
2002_Black_Hat_Vegas_V18-Jed_Haile-Hogwash-audio.mp3
2002_Black_Hat_Vegas_V19-Goldman_and_Marotta-Securing_Your_Computing_Environment_to_Conform_to_Privacy_Regulations-audio.mp3
2002_Black_Hat_Vegas_V20-Dan_Kaminsky-Black_Ops_of_TCPIP-audio.mp3
2002_Black_Hat_Vegas_V21-JD_Glaser-JDs_Toolbox_Fire_and_Ice-audio.mp3
2002_Black_Hat_Vegas_V23-Paul_Knight-Dynamic_Routing_Inside_IPsec_VPNs-audio.mp3
2002_Black_Hat_Vegas_V24-Scott_Blake-Politics_of_Vulnerabilities-audio.mp3
2002_Black_Hat_Vegas_V25-Dave_Aitel-An_Introduction_to_Spike-audio.mp3
2002_Black_Hat_Vegas_V27-Fischbach_and_Lacoste-Seris-IP_Backbone_Security-audio.mp3
2002_Black_Hat_Vegas_V28-Jay_Beale-Attacking_and_Securing_UNIX_FTP_Servers-audio.mp3
2002_Black_Hat_Vegas_V29-Shaun_Clowes-Fixing_and_Making_Holes_in_Binaries-audio.mp3
2002_Black_Hat_Vegas_V30-The_Honeynet_Project-2nd_Generation_Honeynet_Technologies-audio.mp3
2002_Black_Hat_Vegas_V32-Dennis_Groves_and_Bill_Pennington-Web_Application_Security-audio.mp3
2002_Black_Hat_Vegas_V33-Rain_Forest_Puppy-Novell_The_Forgotten_OS-audio.mp3
2002_Black_Hat_Vegas_V35-Ofir_Arkin-Cracking_VoIP_Architecture-audio.mp3
2002_Black_Hat_Vegas_V42-Tim_Mullen-Neutralizing_Nimda_Automated_Strikeback-audio.mp3
2002_Black_Hat_Vegas_VK1-Richard_Clarke-Keynote_National_Strategy_for_Securing_Cyberspace-audio.mp3
2002_Black_Hat_Vegas_VK2-Panel-Hacker_Court-audio.mp3
2002_Black_Hat_Vegas_VK3-Panel-Vulnerability_Disclosure_What_the_Feds_Think-audio.mp3
2002_Black_Hat_Vegas_VL1-Richard_George-Views_On_The_Future_Direction_of_Information_Assurance-audio.mp3
2002_Black_Hat_Vegas_VL2-Jeff_Jonas-Non_Obvious_Relationship_Awareness-audio.mp3
2003_Black_Hat_Amsterdam-Adam_Shostack-Will_People_Ever_Pay_for_Privacy-audio.mp3
2003_Black_Hat_Amsterdam-Andrey_Malyshev_and_Serg_Vasilenkov-Security_Analysis_of_Microsoft_Encrypted_File_System-audio.mp3
2003_Black_Hat_Amsterdam-BBP-BSD_Heap_Smashing-audio.mp3
2003_Black_Hat_Amsterdam-Charl_van_der_Walt_and_Christoff_Breytenbach-The_Role_of_Non_Obvious_Relationships_in_the_Foot_Printing_Process-audio.mp3
2003_Black_Hat_Amsterdam-David_Aitel-Vivisection_of_an_Exploit_Development_Process-audio.mp3
2003_Black_Hat_Amsterdam-David_Aitel-Vivisection_of_an_Exploit_Development_Process-part2-audio.mp3
2003_Black_Hat_Amsterdam-FX-Design_and_Software_Vulnerabilities_In_Embedded_Systems-audio.mp3
2003_Black_Hat_Amsterdam-Jaya_Baloo-Lawful_Interception_of_IP_The_European_Context-audio.mp3
2003_Black_Hat_Amsterdam-Larry_Leibrock-Digital_Information,_User_Tokens,_Privacy_and_Forensics_Investigations_The_Case_of_Windows_XP_Platform-audio.mp3
2003_Black_Hat_Amsterdam-Marco_Valleri_and_Alberto_Ornaghi-Man_In_The_Middle_Attacks-audio.mp3
2003_Black_Hat_Amsterdam-Nicolas_Fischbach-DDoS_Mitigation_and_Analysis_at_the_Infrastructure_Level-audio.mp3
2003_Black_Hat_Amsterdam-Paul_Wouters-Deploying_DNSSEC-audio.mp3
2003_Black_Hat_Amsterdam-Richard_Thieme-Masters_of_the_Unseen_The_Art_of_Information_Warfare-audio.mp3
2003_Black_Hat_Amsterdam-Shaun_Clowes-Generic_Technical_Defences-audio.mp3
2003_Black_Hat_Vegas_K2-Bruce_Schneier-Keynote_Following_the_Money_Security_Proxies_and_Agenda-audio.mp3
2003_Black_Hat_Vegas_L1-Dario_Forte_Luncheon-International_Hacking_When_the_cooperation_is_the_only_cure-audio.mp3
2003_Black_Hat_Vegas_V01-David_Litchfield-Variations_in_Exploit_Methods_between_Linux_and_Windows-audio.mp3
2003_Black_Hat_Vegas_V02-Paul_Wouters-IPSEC_Opportunistic_Encryption_using_DNSSEC-audio.mp3
2003_Black_Hat_Vegas_V03-Curtis_E_Karnow-Running_the_Matrix-audio.mp3
2003_Black_Hat_Vegas_V04-Panel-Proposed_Vulnerability_Handling-audio.mp3
2003_Black_Hat_Vegas_V05-Rick_Smith-Masquerades_Tricking_Modern_Auth_Systems-audio.mp3
2003_Black_Hat_Vegas_V06-Neel_Mehta-Advanced_in_ELF_runtime_binary_encryption-Shiva-audio.mp3
2003_Black_Hat_Vegas_V07-Dan_Kaminsky-Stack_Black_Ops-audio.mp3
2003_Black_Hat_Vegas_V08-Gerardo_Richarte-Modern_Intrusion_Practices-audio.mp3
2003_Black_Hat_Vegas_V09-Panel-Hiring_Trends_in_InfoSec-audio.mp3
2003_Black_Hat_Vegas_V10-Jeffrey_Prusan-Technical_Security_Countermeasures-audio.mp3
2003_Black_Hat_Vegas_V11-Aldora_Louw-Notes_on_Domino-audio.mp3
2003_Black_Hat_Vegas_V12-Marco_Valleri_and_Alberto_Ornaghi-Man_in_the_Middle_Attacks-audio.mp3
2003_Black_Hat_Vegas_V13-Eric_Goldman-Criminal_Copyright_infringement_and_warez_trading-audio.mp3
2003_Black_Hat_Vegas_V14-Gerhard_Eschelbeck-Law_Vulnerabilities-audio.mp3
2003_Black_Hat_Vegas_V15-Sutterfield-Enterprise_security_for_converging_technologies-audio.mp3
2003_Black_Hat_Vegas_V16-Tim_Mulllen_and_Ryan_Russell-Brute_Forcing_Terminal_Server_Logons_with_TSGrinder-audio.mp3
2003_Black_Hat_Vegas_V17-Matthew_Franz_and_Sean_Convery-BGP_Vulnerability_Testing-audio.mp3
2003_Black_Hat_Vegas_V18-Andrea_Matwyshyn-Introduction_to_Corporate_Information_Security_Law-audio.mp3
2003_Black_Hat_Vegas_V19-Panel-Adversary_Characterization_and_Scoring_System-audio.mp3
2003_Black_Hat_Vegas_V21-Fredric_Bret-Mounet-Automated_Detection_of_COM_Vulnerabilities-audio.mp3
2003_Black_Hat_Vegas_V22-Brandon_Wiley-The_Superworm_Manifesto-audio.mp3
2003_Black_Hat_Vegas_V23-Jaya_Baloo-Lawful_Interception_of_IP_the_European_Context-audio.mp3
2003_Black_Hat_Vegas_V24-Panel-Hacker_Court-audio.mp3
2003_Black_Hat_Vegas_V25-Bruce_Potter-Java_Card_101-audio.mp3
2003_Black_Hat_Vegas_V26-Chris_Paget-Click_to_Continue_Shatter_Attacks_on_Win32-audio.mp3
2003_Black_Hat_Vegas_V27-Honey_Project-Latest_Advances_in_Honeynet_Technologies-audio.mp3
2003_Black_Hat_Vegas_V28-Himanshu_Dwivedi-Security_Issues_with_Fibre_Channel_Storage_Networks-audio.mp3
2003_Black_Hat_Vegas_V29-Simple_Nomad-Covering_Your_Tracks-audio.mp3
2003_Black_Hat_Vegas_V30-Ofir_Arkin-Revolutionizing_Operating_System_Fingerprinting-audio.mp3
2003_Black_Hat_Vegas_V31-Jay_Beale-Locking_Down_Mac_OS_X-audio.mp3
2003_Black_Hat_Vegas_V32-Chuck_Willis-Forensics_with_Linux_101-audio.mp3
2003_Black_Hat_Vegas_V33-FX-More_Embedded_Systems-audio.mp3
2003_Black_Hat_Vegas_V34-Len_Sassaman_and_Roger_Dingledine-Attacks_on_Anonymity_Systems_Theory-audio.mp3
2003_Black_Hat_Vegas_V35-David_Maynor-Leave_the_Theory_Behind_and_Embrace_the_Code-audio.mp3
2003_Black_Hat_Vegas_V36-Kevin_Spett-Java_Decompilation_and_Application_Security-audio.mp3
2003_Black_Hat_Vegas_V37-Larry_Leibrock-Digital_Information,_User_Tokens,_Privacy_and_Forensics_Investigation-audio.mp3
2003_Black_Hat_Vegas_V38-SensePost-Putting_Tea_back_into_CyberTerrorism-audio.mp3
2003_Black_Hat_Vegas_V39-Len_Sassaman_and_Roger_Dingledine-Attacks_on_Anonymity_Systems-audio.mp3
2003_Black_Hat_Vegas_V40-Patrick_Miller-Spider_(tool)-audio.mp3
2003_Black_Hat_Vegas_V41-Drew_Miller-.Net_from_the_hackers_perspective_Part_2_-audio.mp3
2003_Black_Hat_Vegas_V42-Thomas_Akin-WebMail_Forensics-audio.mp3
2003_Black_Hat_Vegas_V43-Josh_Daymont-Hardening_Windows_CE-audio.mp3
2003_Black_Hat_Vegas_V44-Adam_Shostack-Identity_Economics_Security_and_Terrorism-audio.mp3
2003_Black_Hat_Vegas_V45-Jan_K_Rutkowski-Advance_Windows_2000_Rootkits_Detection-audio.mp3
2003_Black_Hat_Vegas_V46-Greg_Hoglund-Runtime_Decompilation-audio.mp3
2003_Black_Hat_Vegas_V47-Lance_Spitzner-Honeypots-audio.mp3
2003_Black_Hat_Vegas_V48-Silvio_Cesare-Opensource_Kernel_Auditing_and_Exploitation-audio.mp3
2003_Black_Hat_Vegas_V49-Jennifer_Granick-The_Law_of_Sploits-audio.mp3
2003_Black_Hat_Vegas_V50-Saumil_Shah-HTTP_Fingerprinting_and_Advanced_Assessment_Techniques-audio.mp3
2003_Black_Hat_Vegas_VK1-Philip_Zimmermann-Keynote_with_Introduction_by_Jeff_Moss-audio.mp3
2003_Black_Hat_Vegas_VL2-Marcus_Sachs-Building_a__Global_Culture_of_Security_(Luncheon_Speaker)-audio.mp3
2004-BlackHat_Vegas-k1-Paul_Simmons-Welcom_to_BlackHat-audio.mp3
2004-BlackHat_Vegas-v1-Sarah_Gordon-Antivirus_Security_Softwear_Tests-audio.mp3
2004-BlackHat_Vegas-v10-Halvar_Flake-Diff_Navigate_Audit-audio.mp3
2004-BlackHat_Vegas-v11-Seth_Fogie-Pocket_PC_Abuse-audio.mp3
2004-BlackHat_Vegas-v12-Joe_Grand-Introduction_to_Embedded_Security-audio.mp3
2004-BlackHat_Vegas-v13-Gerard_Eschelbeck-The_laws_of_Vulnerabilities_for_Internal_Networks-audio.mp3
2004-BlackHat_Vegas-v14-Saumil_Shah-Defeating_Automated_Web_Assessment_Tools-audio.mp3
2004-BlackHat_Vegas-v15-David_Maynor-Trust_NoOne_Not_Even_Yourself_or_the_Weak_Link_may_be_Your_Build_Tools-audio.mp3
2004-BlackHat_Vegas-v16-Michael_Sherma-Web_Application_Session_Strength-audio.mp3
2004-BlackHat_Vegas-v17-Spoonm-Metasploit_Hacking_Like_in_the_Movies-audio.mp3
2004-BlackHat_Vegas-v18-Brad_Bolin-Information_Security_Law_Update-audio.mp3
2004-BlackHat_Vegas-v19-Thorsen_Holz-Maximilliam_Dornseif-NoSEBrEaK_Defeating_Honeypots-audio.mp3
2004-BlackHat_Vegas-v21-Nitesh_Dhanjani-Justin_Clark-audio.mp3
2004-BlackHat_Vegas-v22-Joe_Grand-A_Historical_Look_at_Hardware_Token_Compromises-audio.mp3
2004-BlackHat_Vegas-v23-Hacker_Court_04_Pirates_of_the_Potomac-audio.mp3
2004-BlackHat_Vegas-v24-Eugene_Tsyrklevich-Attacking_Host_Intrusion_Prevention_Systems-audio.mp3
2004-BlackHat_Vegas-v25-FX-Vulnerability_Finding_in_Win32A_Comparison-audio.mp3
2004-BlackHat_Vegas-v26-Panel-The_BlackHat_Testimonies-audio.mp3
2004-BlackHat_Vegas-v27-Rebecca_Mercuri-Bev_Harris-Managing_Election_Data_The_California_Recall-audio.mp3
2004-BlackHat_Vegas-v28-Adam_Laurie-Martin_Hurfurt-BlueSnarfing_the_Risk_from_Digital_Pickpockets-audio.mp3
2004-BlackHat_Vegas-v29-Richard_Thieme-Saying_Whatever_he_Wants-audio.mp3
2004-BlackHat_Vegas-v3-JD_Glaser-Hacking_With_Executives-audio.mp3
2004-BlackHat_Vegas-v30-Robert_Morris-The_Future_of_the_History-audio.mp3
2004-BlackHat_Vegas-v31-Dan_Kaminsky-the_Black_Ops_of_DNS-audio.mp3
2004-BlackHat_Vegas-v32-Michael_Raggo-Steganography_Steganalysis_Cryptanalysis-audio.mp3
2004-BlackHat_Vegas-v33-Roger_Dingledine-Putting_the_P_back_in_VPN-audio.mp3
2004-BlackHat_Vegas-v34-Sensepost-When_The_Tables_Turn-audio.mp3
2004-BlackHat_Vegas-v35-Phillip_Hallam-Baker-Phishing-commiting_Fraud_in_Public-audio.mp3
2004-BlackHat_Vegas-v36-Panel-Application_Security_Crossfire-audio.mp3
2004-BlackHat_Vegas-v37-K_K_Mookhey-Evasion_and_Detection_of_Web_Application_Tactics-audio.mp3
2004-BlackHat_Vegas-v38-Alessandro_Acquisti-Privacy_Economics_and_Immediate_Gratification-audio.mp3
2004-BlackHat_Vegas-v39-Jamie_Butler-Greg_Hoglund-VICE_Catch_the_Hookers-audio.mp3
2004-BlackHat_Vegas-v4-David_Litchfield-All_New_0_Day-audio.mp3
2004-BlackHat_Vegas-v40-Patrick-Chambet-Google_Attacks-audio.mp3
2004-BlackHat_Vegas-v41-Andrew_Stevens-How_Next_Generation_Application_Proxies_Protect_Against_the_Latest_Attacks_and_Intrusions-audio.mp3
2004-BlackHat_Vegas-v42-Chris_Hurley-WorldWide_War_Drive-audio.mp3
2004-BlackHat_Vegas-v43-Brett_Moore-Shoot_the_Messenger-audio.mp3
2004-BlackHat_Vegas-v44-Peter_Feaver-Kenneth_Greers-Cyber_Jihad_and_the_Globalization_of_Warfare-audio.mp3
2004-BlackHat_Vegas-v46-Stefano_Zanero-Detecting_0_Day_Attacks_with_Learning_IDS-audio.mp3
2004-BlackHat_Vegas-v47-James_Foster-Managing_Hackers-audio.mp3
2004-BlackHat_Vegas-v48-Himanshu_Dwivedi-Insecure_IP_Storage_Networks-audio.mp3
2004-BlackHat_Vegas-v5-Tzi-cker_Chiueh-Program_Semantics_Aware_Intrusion_Detection-audio.mp3
2004-BlackHat_Vegas-v50-Ralf_Spenneberg-IKE_Testing_IKE_Implementations-audio.mp3
2004-BlackHat_Vegas-v51-Chris_Kret-Nobodys_Anonymous-Tracking_Spam_and_Covert_Channels-audio.mp3
2004-BlackHat_Vegas-v52-Len_Sassman-The_Anonymity_Toolkit-audio.mp3
2004-BlackHat_Vegas-v53-Peter_Siberman_Richard_Johnson-Comparison_Buffer_Overflow_Prevention_Implementations_and_Weaknesses-audio.mp3
2004-BlackHat_Vegas-v54-David_Worth-Cryptographic_Port_Knocking-audio.mp3
2004-BlackHat_Vegas-v55-Sarah_Gordon-Privacy_Do_as_I_Say_Not_as_I_Do-audio.mp3
2004-BlackHat_Vegas-v56-Lauren_Oudot-Digital_Active_Self_Defence-audio.mp3
2004-BlackHat_Vegas-v57-Cameron_Hotchkies-Blind_Injection_Automation_Techniques-audio.mp3
2004-BlackHat_Vegas-v58-Kevin_Madi-Evolution_of_Incident_Response.av-audio.mp3
2004-BlackHat_Vegas-v59-Bruce_Potter-and-Brian_Wotring-audio.mp3
2004-BlackHat_Vegas-v60-Dominique_Brezinski-Acting_in_Milliseconds-Why_Defense_Processes_Need_to_Change-audio.mp3
2004-BlackHat_Vegas-v61-Gregory_S_Miles-Travis_Schack-Introduction_to_Global_Security_Syndicate-audio.mp3
2004-BlackHat_Vegas-v62-Patrick_Chambert-Managing_MSIE_Security_in_Corporate_Networks_by_Creating_Custom_Internet_Zones-audio.mp3
2004-BlackHat_Vegas-v8-Jennifer_Granick-Legal_Liability_and_Security_Incident_Investigation-audio.mp3
BH-EUROPE-01-DALE-CODDINGTON-RYAN-PERMEH-audio.mp3
BH-EUROPE-01-DAVID-LITCHFIELD-audio.mp3
BH-EUROPE-01-FX-audio.mp3
directory.html