Black Hat Digital Self Defense

Black Hat Federal 2003 Overview

Black Hat Federal 2003 Call for Papers Black Hat Federal 2003 Speakers Black Hat Federal 2003 Briefings Schedule Black Hat Federal 2003 Sponsors Black Hat Federal 2003 Training Black Hat Federal 2003 Hotel & Venue Black Hat Federal 2003 Registration
details
September 30 • Informal gathering at 18:00. Gather at the Registration Desk.
This is a great time to meet and network with friends, colleagues and the speakers.
Day 1 • October 1, 2003
07:30 - 08:20 Registration and Continental Breakfast. Registration Desk is located in then Junior Ballroom Foyer.
sponsored by
sponsor: Microsoft
08:20 - 08:30 Introduction, Jeff Moss
08:30 - 09:20

Keynote: Lessons From the Hanssen Spy Case: Not What You Expect
David G. Major, co-founder, the Centre for Counterintelligence and Security Studies (www.cicentre.com)

09:20 - 09:30 Break
Attack! Policy, Procedure & Law IDS, IPS and Honeynets
Location & Times

Grand Ballroom A, Lobby Level

Junior Ballroom, Lobby Level Pavillon 23, Lobby Level
09:30 - 10:45

Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

David Litchfield

Government IP Tapping - EU

Jaya Baloo

Adversary Characterization and Scoring Systems

Panel-Marcus Sachs, Tom Parker, Eric Shaw, Toby Miller

10:45 - 11:00 Coffee Service
sponsored by
sponsor: Federal Computing Week
11:00 - 12:30

MOSDEF Tool Release

David Aitel

Practical Vulnerability Assessments in a Distributed Federal Environment

Chris Hurley

The Future of Honeypots

Lance Spitzner

12:30 - 13:45
Lunch in Grand Ballroom B
sponsored by
sponsor: Symantec
13:45 - 15:00

Stack Black Ops

Dan Kaminsky

The Challenge of Mulitlevel Security

Rick Smith

Intrusion Prevention: an Introduction and Comparison

Jay Beale

15:00 - 15:15 Break
15:15 - 16:30

Putting The Tea Back Into CyberTerrorism

SensePost

Hackers Court 2003
Part 1

Latest Advances in Honeynet Technologies

The Honeynet Project

16:30 - 16:45 Coffee Service
sponsored by
sponsor: Internet Security Systems
16:45 - 18:00

Using Xprobe2 in a Corporate Environment

Ofir Arkin

Hackers Court 2003
Part 2

Panel

Contextually Intelligent IDS

Marty Roesch

18:00 - 20:00 Hosted Gala Reception: Eat, Drink, Network and be Merry!
Capitol Club, located on the Third Floor, Mezzanine Level of the Sheraton Premiere

Booksigning with “Honeypots: Tracking Hackers” by Lance Spitzner.
A Limited number of books will be available for purchase from our official onsite bookseller, Breakpoint Books, during the Federal 2003 Briefings.

Day 2 • October 2, 2003
07:30 - 08:30 Continental Breakfast
Defend! Application Security Routing & Infrastructure
Location & Times

Grand Ballroom A, Lobby Level

Junior Ballroom, Lobby Level Pavillon 23, Lobby Level
08:30 - 09:20 Keynote: The Ghost in the Machine - Security as the Real Human Computer Interface
Keith Rhodes, Chief Technologist, GAO
09:20 - 09:30 Break
09:30 - 10:45

HTTP Fingerprinting and Advanced Assessment Techniques

Saumil Shah

More Fun With Graphs

Halvar Flake

Intrusion Vulnerabilities of Fiber Optic Infrastructures

Mark Gross

10:45 - 11:00 Coffee Service
sponsored by
sponsor: Secure Computing
11:00 - 12:30

Strike/Counter-Strike: Reverse Engineering Shiva

Chris Eagle

Runtime Decompilation

Greg Hoglund

Cisco Vulnerabilities

FX

12:30 - 13:45

Lunch in Grand Ballroom B

sponsored by
sponsor: Federal Computer Week
13:45 - 15:00

Rogue AP 101

Beetle

Application Intrusion Detection

Drew Miller

Security Implications of IPv6

Michael H. Warfield

15:00 - 15:15 Break
15:15 - 16:30

Enhancing Network Security Through Competitive Cyber Exercises

Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch

The Challenges of Automated Web Application Scanning

Jeremiah Grossman

Security in Distributed and Remote Network Management Protocols

Jeremy Rauch

16:30 - 16:45 Coffee Service
sponsored by
sponsor: Lancope
16:45 - 18:00

Digital Information, User Tokens, Privacy and Forensics Investigations

Larry Leibrock

Security Design Patterns

Gunnar Peterson

Securing Data in Storage

Dan Avida

Note that this schedule is subject to change.

Wireless internet access is available during the show. Bring your 802.11b cards!

Attendees must wear badges at all times in the conference areas.
Badges and/or conference proceedings that are lost or reported stolen will incur a $500 replacement fee.

All attendees must be 18 years of age or older to be on the conference floor.

Black Hat Logo
(c) 1996-2007 Black Hat