Black Hat Media Archives


Black Hat 2003 Multimedia Archives Quick-link
USA Europe Asia Windows Security Federal
Europe 2003


Conference CDs containing speaker presentations and materials are available for purchase from our store.

Many Black Hat talks are available in audio and video formats. While we reorganize the site to include
direct links, please peruse our RSS feed for links to those talks currently online.

Black Hat Asia 2003 Briefings & Training
Black Hat Asia 2003
there are no audio or video files available for this conference
Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentations - Black Hat Asia 2003

Lim Khee Ming, Deputy General Manager (Technology & Operations), Network for Electronic Transfers (S) Pte Ltd (NETS)
The Total Security System Approach - A Perspective From The Financial Industry

PDF:


Harry SK Tan, Director, Centre for Asia Pacific Technology Law & Policy (CAPTEL)
Cyber-crime


Speakers & Topics - Black Hat Asia 2003
David Aitel
MOSDEF Tool Release
PDF: David Aitel, MOSDEF Tool Release
S.K. Chong
Win32 One-Way Shellcode
PDF: S.K. Chong, Win32 One-Way Shellcode
Shaun Clowes
A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor
PDF: Shaun Clowes A Security Microcosm - Attacking/Defending Shiva, A Linux Executable Encryptor
Stephen Dugan
Cisco Security


Halvar Flake
Automated Reverse Engineering

PDF: Halvar Flake, Automated Reverse Engineering

Jennifer Stisa Granick
International DMCA Laws

PDF: Jennifer Granick, International DMCA Laws


the grugq
The Art of Defiling: Defeating Forensic Analysis on Unix File Systems
PDF: the grugq, The Art of Defiling: Defeating Forensic Analysis on Unix File Systems Tools & Code: the Grugq

David Litchfield
Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

PDF: David Litchfield, Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server
Tim Mullen
Brute Forcing Terminal Server Logons with TSGrinder
PDF: Tim Mullen, Brute Forcing Terminal Server Logons
Laurent Oudot
Honeypots Against Worms 101
PDF: Laruent Outdot, Honeypots Against Worms 101 Tool, Code & Papers: Laurent Oudot, Honeypots Against Worms 101
Jeremy Rauch
(In)Security in Network Management
PDF: Jeremy Rauch, (In)Security in Network Management
Russ Rogers
Addressing Complete Security to Save Money
PDF: Russ Rogers, Addressing Complete Security to Save Money

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques
Updated tools may also be found at the Net-Square site.

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques PDF: Saumil Shah, Paper, HTTP Fingerprinting and Advanced Assessment Techniques


Black Hat Federal Briefings & Training 2003
Black Hat Federal 2003
there are no audio or video files available for this conference
Track/Speaker/Topic

Presentation

Notes/Tools

Keynote Presentations - Black Hat Federal 2003

David G. Major,
co-founder, the Centre for Counterintelligence and Security Studies



Keith Rhodes,
Chief Technologist, GAO


Application Security - Black Hat Federal 2003

Halvar Flake
More Fun With Graphs

PDF: Halvar Flake, More Fun With Graphs

updated materials

Jeremiah Grossman
The Challenges of Automated Web Application Scanning

PDF: Jeremiah Grossman, The Challenges of Automated Web Application Scanning

Greg Hoglund
Runtime Decompilation

PDF: Greg Hoglund, Runtime Decompilation

Drew Miller
Application Intrusion Detection

PDF: Drew Miller, Application Intrusion Detection

updated materials

Gunnar Peterson
Security Design Patterns

PDF: Gunnar Peterson, Security Design Patterns
Attack! - Black Hat Federal 2003

David Aitel
MOSDEF Tool Release

PDF: David Aitel, MOSDEF Tool Release


Ofir Arkin
Using Xprobe2 in a Corporate Environment

PDF: Ofir Arkin, Using Xprobe2 in a Corporate Environment

Dan Kaminsky
Stack Black Ops

PDF: Dan Kaminsky, Stack Black Ops

David Litchfield
Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

PDF: David Litchfield, Defeating the Stack Based Buffer Overflow Exploitation Prevention Mechanism of Microsoft Windows 2003 Server

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism
Defend! - Black Hat Federal 2003

updated materials

Beetle & Bruce Potter
Rogue AP 101

PDF: Beetle, Rogue AP 101 ZIP Tools: Beetle, Rogue AP 101

Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch
Enhancing Network Security Through Competitive Cyber Exercises

PDF: Major Ronald Dodge, Wayne Schepens, Lt. Colonel Daniel Ragsdale and Colonel Don Welch, Enhancing Network Security Through Competitive Cyber Exercises

Chris Eagle
Strike/Counter-Strike: Reverse Engineering Shiva

PDF: Chris Eagle, Strike/Counter-Strike: Reverse Engineering Shiva Tool: Chris Eagle, Strike/Counter-Strike: Reverse Engineering Shiva

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations

PDF: Larry Leibrock, Digital Information, User Tokens, Privacy and Forensics Investigations

updated materials

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques
Updated tools may also be found at the Net-Square site.

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques

Wind32
Linux
MacOS

IDS, IPS and Honeynets - Black Hat Federal 2003

Jay Beale
Intrusion Prevention: an Introduction and Comparison



The Honeynet Project
Latest Advances in Honeynet Technologies

PDF: The Honeynet Project, Latest Advances in Honeynet Technologies

updated materials

Panel-Tom Parker
Adversary Characterization and Scoring Systems

PPT: Panel, Adversary Characterization and Scoring Systems

Marty Roesch
Contextually Intelligent IDS



Lance Spitzner
The Future of Honeypots

PDF: Lance Spitzner, The Future of Honeypots
Policy, Procedure & Law - Black Hat Federal 2003

Jaya Baloo
Government IP Tapping - EU

PDF: Jaya Baloo, Government IP Tapping - EU

updated materials

Chris Hurley
Practical Vulnerability Assessments in a Distributed Federal Environment

PDF: Chris Hurley, Practical Vulnerability Assessments in a Distributed Federal Environment

Rick Smith
The Challenge of Mulitlevel Security

PDF: Rick Smith, The Challenge of Mulitlevel Security

Panel
Hackers Court 2003



Routing & Infrastructure - Black Hat Federal 2003

Dan Avida
Securing Data in Storage

PDF: Dan Avida, Securing Data in Storage

FX
Cisco Vulnerabilities - Yesterday, Today and Tomorrow

PDF: FX, Cisco Vulnerabilities - Yesterday, Today and Tomorrow

updated materials

Mark Gross
Intrusion Vulnerabilities of Fiber Optic Infrastructures

PDF: Mark Gross, Intrusion Vulnerabilities of Fiber Optic Infrastructures

updated materials

Jeremy Rauch
Security in Distributed and Remote Network Management Protocols

PDF: Jeremy Rauch, Security in Distributed and Remote Network Management Protocols

Michael H. Warfield
Security Implications of IPv6

PDF: Paul Wouters, IPsec: Opportunistic Encryption using DNSSEC


Black Hat USA 2003

Black Hat USA 2003

Track/Speaker/Topic Presentation Notes/Tools

Keynote Presentations - Black Hat USA 2003

Philip R. Zimmermann, Creator, Pretty Good Privacy



updated materials

Bruce Schneier, Founder & Chief Technical Officer, Counterpane Internet Security
Following the Money: Security
Proxies and Agenda

PDF: Bruce Schneier, Following the Money: Security Proxies and Agenda

Luncheon Presentations - Black Hat USA 2003

Dario Forte, CFE, CISM, Security Advisor, European Electronic Crimes Task Force (EECTF)
International Hacking: When The Cooperation is The Only Cure

Marcus Sachs, P.E., Cyber Program Director, Information Analysis and Infrastructure Protection, US Department of Homeland Security
Building a Global Culture of Security
PDF: Marcus Sachs, Building a Global Culture of Security

Application Security - Black Hat USA 2003

Jay Beale
Locking Down Mac OS X

PDF: Jay Beale, Locking Down Mac OS X

Frederic Bret-Mounet
Automated Detection of COM Vulnerabilities

PDF: Frederic Bret-Mounet, Automated Detection of COM Vulnerabilities

Greg Hoglund
Runtime Decompilation

PDF: Greg Hoglund, Runtime Decompilation

David Litchfield
Variations in Exploit Methods Between Linux and Windows


PDF: David Litchfield, Variations in Exploit Methods Between Linux & Windows White Paper

Aldora Louw
Notes on Domino

PDF: Aldora Louw, Notes on Domino

Neel Mehta
Advanced in ELF Runtime Binary Encryption - Shiva

PDF: Neel Mehta, Advanced in ELF Runtime Binary Encryption - Shiva Tool: Neel Mehta, Shiva

Drew Miller
.NET from the Hacker's Perspective: Part 2

PDF: Drew Miller, .NET from the Hacker's Perspective: Part 2

Timothy Mullen & Ryan Russell
Brute Forcing Terminal Server Logons with TSGrinder

PDF: Timothy Mullen & Ryan Russell,Brute Forcing Terminal Server Logons with TSGrinder

Chris Paget
Click to Continue

PDF: Chris Paget, Click to Continue Code: Chris Paget

Kevin Spett
Java Decompilation & Application Security

PDF: Kevin Spett, Java Decompilation & Application Security

Core Services - Black Hat USA 2003

Silvio Cesare
Opensource Kernel Auditing/Exploitation

PDF: Silvio Cesare, Opensource Kernel Auditing/Exploitation


Josh Daymont
Hardening Windows CE

PDF: Josh Daymont, Hardening Windows CE

Himanshu Dwivedi
Security Issues with Fibre Channel Storage Networks (SANs)

PDF: Himanshu Dwivedi, Security Issues with Fibre Channel Storage Networks (SANs)

FX
More (Vulnerable) Embedded Systems

PDF: FX, More (Vulnerable) Embedded Systems

SensePost
Putting The Tea Back Into CyberTerrorism

PDF: SensePost, Putting The Tea Back Into CyberTerrorism PDF: SensePost, Putting The Tea Back Into CyberTerrorism, paper

Firewalls, Access Control, Physical Security - Black Hat USA 2003

Michael D. Glasser
OSI Layer 1 Security

PDF: Michael D. Glasser, OSI Layer 1 Security

updated materials

Bruce Potter
Java Card 101

PPT: Bruce Potter, Java Card 101

Jeffrey Prusan
Technical Security Countermeasures

PDF: Jeffrey Prusan, Technical Security Countermeasures

Rick Smith
Masquerades: Tricking Modern Authentication Systems

PDF: Rick Smith, Masquerades: Tricking Modern Authentication Systems

Lee Sutterfield
Enterprise Security for Converging Technologies

PDF: Lee Sutterfield, Enterprise Security for Converging Technologies

Incident Response & Computer Forensics - Black Hat USA 2003

Thomas Akin
Web Based Email Forensics

PDF: Thomas Akin, Web Based Email Forensics

The Honeynet Project
Latest Advances in Honeynet Technologies

PDF: The Honeynet Project, Latest Advances in Honeynet Technologies

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations

PDF: Larry Leibrock, Digital Information, User Tokens, Privacy and Forensics Investigations

Lance Spitzner
Honeypots

PDF: Lance Spitzner, Honeypots

Chuck Willis
Forensics With Linux 101

PDF: Chuck Willis, Forensics With Linux 101 PDF: Chuck Willis, Forensics With Linux 101 Tools + Xtras

Intrusion Detection, Log Analysis - Black Hat USA 2003

Ofir Arkin
Revolutionizing Operating System Fingerprinting

PDF: Ofir Arkin, Revolutionizing Operating System Fingerprinting

David Maynor
Leave the Theory Behind and Embrace the Code

PDF: David Maynor, Leave the Theory Behind and Embrace the Code
Patrick Miller
SPIDeR
PDF: Patrick Miller, SPIDeR ZIP: Patrick Miller, SPIDeR papers

updated materials

Jan K. Rutkowski
Advanced Windows 2000 Rootkits Detection

PDF: Jan K. Rutkowski, Advanced Windows 2000 Rootkits Detection

Saumil Shah
HTTP Fingerprinting and Advanced Assessment Techniques

PDF: Saumil Shah, HTTP Fingerprinting and Advanced Assessment Techniques

Panels - Black Hat USA 2003

Panel
Adversary Characterization and Scoring Systems
PDF: Panel on Adversary Characterization and Scoring Systems
Panel
Hacker Court
PDF: Drew Miller Windows Security 2003
Panel
Hiring Trends In Information Security


Gerhard Eschelbeck
The Law of Vulnerabilities


Panel
A Proposed Process for Handling Vulnerability Information


Policy, Law & Society - Black Hat USA 2003

Jaya Baloo
Lawful Interception of IP: the European Context

PDF: Jaya Baloo, Lawful Interception of IP: the European Context

Eric Goldman
Criminal Copyright Infringement and Warez Trading

PDF: Eric Goldman, Criminal Copyright Infringement and Warez Trading

Curtis E.A. Karnow
Running the Matrix

PDF: Curtis E.A. Karnow, Running the Matrix

Andrea M. Matwyshyn
Introduction to Corporate Information Security Law

PDF: Andrea M. Matwyshyn, Introduction to Corporate Information Security Law PDF: Andrea M. Matwyshyn, Introduction to Corporate Information Security Law paper

Gerardo Richarte
Modern Intrusion Practices

PDF: Gerardo Richarte, Modern Intrusion Practices

Privacy & Anonymity - Black Hat USA 2003

Jennifer Stisa Granick
The Law of 'Sploits

PDF: Jennifer Stisa Granick, The Law of 'Sploits

Len Sassaman & Roger Dingledine
Attacks on Anonymity Systems (Theory)

PDF: Len Sassaman & Roger Dingledine, Attacks on Anonymity Systems (Theory)

Len Sassaman & Roger Dingledine
Attacks on Anonymity Systems (Practice)

PDF: Len Sassaman & Roger Dingledine Attacks on Anonymity Systems (Practice)

updated materials

Adam Shostack
Identity: Economics, Security, and Terrorism

PDF: Adam Shostack, Identity: Economics, Security, and Terrorism

Simple Nomad
Covering Your Tracks

PDF: Simple Nomad, Covering Your Tracks

Routing & Infrastructure - Black Hat USA 2003

updated materials
Matthew Franz & Sean Convery
BGP Vulnerability Testing

2003

PDF: Matthew Franz & Sean Convery, BGP Vulnerability Testing

updated 2004

PDF: Matthew Franz & Sean Convery, BGP Vulnerability Testing

Dan Kaminsky
Stack Black Ops

PDF: Dan Kaminsky, Stack Black Ops

Marco Valleri & Alberto Ornaghi
Man In The Middle Attacks

PDF: Marco Valleri & Alberto Ornaghi, Man In The Middle Attacks

Brandon Wiley
The Superworm Manifesto

PDF: Brandon Wiley, The Superworm Manifesto

Paul Wouters
IPsec: Opportunistic Encryption using DNSSEC

PDF: Paul Wouters, IPsec: Opportunistic Encryption using DNSSEC


Black Hat Europe 2003
Black Hat Europe 2003
Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentation - Black Hat Europe 2003

Richard Thieme
Masters of the Unseen: The Art of Information Warfare



Speakers & Topics - Black Hat Europe 2003

David Aitel
Vivisection of an Exploit Development Process

Black Hat Europe 2003 PDF: David Aitel

Jaya Baloo
Lawful Interception of IP: The European Context

Black Hat Europe 2003 PDF: Jaya Baloo

BBP
BSD Heap Smashing

Black Hat Europe 2003 PDF: BBP

tool: BBP Black Hat Europe 2003
tools & code

Shaun Clowes
Generic Technical Defences

Black Hat Europe 2003 PDF: Shaun Clowes

tool: Shaun Clowes Black Hat Europe 2003
tools & code

Bram Cohen
Security Issues in P2P File Distribution

Black Hat Europe 2003 PDF: Bram Cohen

Job de Haas
Pocket PC Phone Security

Black Hat Europe 2003 PDF: Job de Haas

Stephen Dugan
$tea£ing with BGP

Black Hat Europe 2003 PDF: Stephen Dugan

Nicolas Fischbach
DDoS Mitigation and Analysis at the Infrastructure Level

Black Hat Europe 2003 PDF: Nicolas Fischbach

Halvar Flake
Data Flow Analysis

Black Hat Europe 2003 PDF: Halvar Flake

FX
Design and Software Vulnerabilities In Embedded Systems

Black Hat Europe 2003 PDF: FX

Greg Hoglund
Runtime Decompilation

Black Hat Europe 2003 PDF: Greg Hoglund

The Honeynet Project
Honeynet Technologies: Sebek

Black Hat Europe 2003 PDF: the Honeynet Project

Larry Leibrock
Digital Information, User Tokens, Privacy and Forensics Investigations: The Case of Windows XP Platform

Black Hat Europe 2003 PDF: Larry Leibrock

David Litchfield
All New Oracle Ø-Day: Attacking and Defending Oracle

Black Hat Europe 2003 PDF: David Litchfield

Andrey Malyshev & Serg Vasilenkov
Security Analysis of Microsoft Encrypted File System (EFS)

Black Hat Europe 2003 PDF: Andrey Malyshev & Serg Vasilenkov

Len Sassaman
Designing Useful Privacy Applications

Black Hat Europe 2003 PDF: Len Sassaman

Marc Schoenfeld
Hunting Flaws in JDK

Black Hat Europe 2003 PDF: Marc Schoenfeld

Sensepost
The Role of Non Obvious Relationships in the Foot Printing Process

Black Hat Europe 2003 PDF: Sensepost

Black Hat Europe 2003 PDF: Senspost
notes

Adam Shostack
Will People Ever Pay for Privacy?

Black Hat Europe 2003 PDF: Adam Shostack

Lance Spitzner
Honeypots: Tracking Hackers

Black Hat Europe 2003 PDF: Lance Spitzner

Marco Valleri & Alberto Ornaghi
Man In The Middle Attacks

Black Hat Europe 2003 PDF: Marco Valleri & Alberto Ornaghi

Paul Wouters
Deploying DNSSEC

Black Hat Europe 2003 PDF: Paul Wouters


Black Hat Windows 2003

Black Hat Windows Security 2003

Miss out on the Black Hat Windows 2003 show?
Read what others had to say: CNET | King County Journal

Track/Speaker/Topic Presentation Notes/Tools
Keynote Presentations - Black Hat Windows Security 2003

Scott Culp
Trustworthy Computing Update



Application Development - Black Hat Windows Security 2003

Michael Howard & David LeBlanc
Writing Secure and Hack Resistant Code

PDF: Michael Howard & David LeBlanc Windows Security 2003

Yoshiaki Komoriya & Hidenobu Seki
Exploiting DCOM

Poewrpoint: Yoshiaki Komoriya & Hidenobu Seki Windows Security 2003 Zip: Windows Security 2003

Marc Schöenefeld
Java Library Hole Allowing Multiplatform Denial-Of-Service

PDF: Marc Schöenefeld Windows Security 2003
Audit / Response / Policy - Black Hat Windows Security 2003

Jeremiah Grossman & Bill Pennington
Web Application Security

PDF: Jeremiah Grossman & Bill Pennington Windows Security 2003 HTML: Jeremiah Grossman & Bill Pennington Windows Security 2003

Riley Hassell
Payload Anatomy & Future Mutations

PDF: Riley Hassell Windows Security 2003

Dan Kaminsky
Applied Black Op Networking on Windows XP

Powerpoint: Dan Kaminsky Windows Security 2003

Larry Leibrock, Ph.D
Forensics Tools and Processes for Windows® XP Platforms

PDF: Larry Leibrock Windows Security 2003
Deep Knowledge - Black Hat Windows Security 2003

David Aitel
Vivisection of an Exploit Development Process

PDF: David Aitel Windows Security 2003 Zip: David Aitel tool Windows Security 2003
Halvar Flake
Graph-Based Binary Analysis
PDF: Halvar Flake Windows Security 2003

Eric Schultze & Erik Birkholz
Securing Your Network

PDF: Eric Schultze & Erik Birkholz Windows Security 2003
IIS, SQL, ISA, etc. - Black Hat Windows Security 2003

Cesar Cerrudo & Aaron Newman
Hunting Flaws in MS SQL Server

PDF: Cesar Cerrudo & Aaron Newman Windows Security 2003

PDF: Cesar Cerrudo & Aaron Newman notes Windows Security 2003
notes

Zip: Cesar Cerrudo & Aaron Newman tools Windows Security 2003

tool

David Litchfield
Oracle Security II



Timothy Mullen
Enforcer™

PDF: Timothy Mullen Windows Security 2003
Saumil Udayan Shah
HTTP: Advanced Assessment Techniques
PDF: Windows Security 2003
Networking & Integration - Black Hat Windows Security 2003

Stephen Dugan
$tea£ing with BGP

PDF: Stephen Dugan Windows Security 2003
FX
Design Issues and Software Vulnerabilities in Embedded Systems
PDF: FX Windows Security 2003

Haroon Meer & Charl van der Walt
The Role of Non Obvious Relationships in the Foot Printing Process

Powerpoint: Haroon Meer & Charl van der Walt Windows Security 2003 PDF: Haroon Meer & Charl van der Walt notes Windows Security 2003

Steve Riley
Securing Wireless Networks with 802.1x, EAP-TLS and PEAP

PDF: Steve Riley Windows Security 2003 PDF: Steve Riley notes Windows Security 2003
Windows 2003 Server / .NET - Black Hat Windows Security 2003

Mark Burnett
FrontPage Server Extensions on Windows Server 2003

Powerpoint: Mark Brunett Windows Security 2003 Tool: Mark Burnett Powerpoint: Mark Brunett Windows Security 2003
Drew Miller
.NET from the Hacker's Perspective
PDF: Drew Miller Windows Security 2003 PDF: Drew Miller notes Windows Security 2003

Michael Muckin
IIS 6.0's Security Architecture - It's a Whole New World

Powerpoint: Michael Muckin Windows Security 2003

Steve Riley & Timothy Bollefer
Surviving OpenHack IV

Powerpoint: Steve Riley & Timothy Bollefer Windows Security 2003


Media Server Hosted By:

Complex Drive

Complex Drive - Reliable, Secure, and Responsive Business Internet


Black Hat Logo
(c) 1996-2007 Black Hat