BlackHat USA 2006
 
WiFi in Windows Vista: A Peek Inside the Kimono Noel Anderson, Taroon Mandhana - -
Bypassing Network Access Control (NAC) Systems Ofir Arkin Presentation -
Investigating Evil Websites with Monkeyspaw Tod Beardsley Presentation -
Finding Gold in the Browser Cache Corey Benninger Presentation -
IPS Shortcomings Renaud Bidou Presentation -
Automated Malware Classification-Analysis Though Network Theory and Statistics Daniel Bilar Presentation -
Taming Bugs - The Art and Science of Writing Secure Code Paul Bohm Presentation -
Physical Memory Forensics Presentation -
Fuzzing Selected Win32 Interprocess Communication Mechanisms Jesse Burns Presentation -
R^2 - The Exponential Growth of Rootkit Techniques Jamie Butler, Nick Petroni, William Arbaugh Presentation -
Device Drivers johnny cache & David Maynor Presentation -
Thermoptic Camoflauge - Total IDS Evasion Brian Caswell, HD Moore Presentation -
Microsoft Security Fundamentals - Engineering, Response and Outreach Andrew Cushman Presentation -
I’m going to shoot the next person who says VLANs Himanshu Dwivedi Presentation -
Attacking Apple’s Xsan Charles Edge Presentation -
Hardware Virtualization Based Rootkits Dino Dai Zovi Presentation -
Sidewinder - An Evolutionary Guidance System for Malicious Input Crafting Shawn Embleton, Sherri Sparks, Ryan Cunningham Presentation -
Hacking VoIP Exposed David Endler, Mark Collier Presentation -
Breaking Crypto Without Keys - Analyzing Data in Web Applications Chris Eng Presentation -
Analysing Complex Systems - the BlackBerry Case FX Presentation -
MatriXay - When WebApp&Database Security Pen-Test/Audit Is a Joy Yuan Fan, Xiao Rong Presentation -
How to Unwrap Oracle PL/SQL.pdf Pete Finnigan Presentation -
Carrier VoIP Security Nicolas Fischbach Presentation -
RE 2006: New Challenges Need Changing Tools Halvar Flake - -
Case Study: The Secure Development Lifecycle and Internet Explorer 7 Rob Franco - -
The Speed of (In)security Stefan Frei, Dr. Martin May Presentation -
Finding and Preventing Cross-site request Forgery Tom Gallagher Presentation -
The NetIO Stack - Reinventing TCP-IP in Windows Vista Abolade Gbadegesin Presentation -
Hacking Intranet Websites from the Outside Jeremiah Grossman, TC Niedzialkowski Presentation -
New Attack RFID-systems and Their Middleware and Backends Lukas Grunwald Presentation -
Open to Attack - Vulnerabilities of the Linux Random Number Generator Zvi Gutterman Presentation -
AJAX (in)security Billy Hoffman Presentation -
Analysis of Web Application Worms and Viruses Billy Hoffman Presentation -
Hacking World of Warcraft®: An Exercise in Advanced Rootkit Design Greg Hoglund - -
Faster Pwning Assured - Hardware Hacks and Cracks with FPGAs David Hulton, Dan Moniz Presentation -
Black Ops 2006 Dan Kaminsky - -
Code Integration-Based Vulnerability Auditing William Kimball Presentation -
Oracle Rootkits 2.0 - The Next Generation Alexander Kornbrust Presentation -
You Are What You Type - Non-Classical Computer Forensics Dr. Neal Krawetz Presentation -
Security Engineering in Windows Vista John Lambert Presentation -
Death by 1000 Cuts Johnny Long - -
Hacking, Hollywood Style Johnny Long - -
The State of Incidence Response Kevin Mandia Presentation -
Windows Vista Heap Management Enhancements– Security, Reliability and Performance Adrian Marinescu Presentation -
The BlueBag - A Mobile, Covert Bluetooth Attack and Infection Device Claudio Merloni, Luca Carettoni Presentation -
Defending Against Social Engineering with Voice Analytics Doug Mohney Presentation -
Six Degrees of XSSploitation Dan Moniz, HD Moore - -
Metasploit Reloaded HD Moore Presentation -
Building Security into the Software LifeCycle, A Business Case Marco Morana Presentation -
Runtime Packers - The Hidden Problem Maik Morgenstern, Tom Brosch Presentation -
Defending Black Box Web Applications - Building an Open Source Web Security Gateway Shawn Moyer Presentation -
SQL Injections by Truncation Bala Neerumalla Presentation -
Vulnerabilities in Not-So Embedded Systems Brendan O'Connor Presentation -
Bluetooth Defense Kit Bruce Potter Presentation -
The Trusted Computing Revolution Bruce Potter Presentation -
Do Enterprise Management Applications Dream of Electric Sheep Tom Ptacek, Dave Goldsmith Presentation -
PDB - The Protocol DeBugger Jeremy Rauch Presentation -
RFID Malware Demystified Melanie Rieback Presentation -
Subverting Vista Kernel For Fun And Profit Joanna Rutkowska Presentation -
SIP Stack Fingerprinting and Stack Difference Attacks Hendrik Scholz Presentation -
A Tale of Two Proxies SensePost - -
Writing Metasploit Plugins - From Vulnerability to Exploit Saumil Shah - -
Phishing with Asterisk PBX Jay Schulman Presentation -
RAIDE - Rootkit Analysis Identification Elimination v1.0 Peter Silberman, Jamie Butler Presentation -
Hotpatching and the Rise of Third-Party Patches Alexander Sotirov Presentation -
Auditing Data Access Without Bringing Your Database To Its Knees Kimber Spradlin, Dale Brocklehurst Presentation -
$30, 30 minutes, 30 networks (Project Cowbird) Jonathan Squire Presentation -
Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 Alex Stamos, Zane Lackey - -
Attacking Internationalized Software Scott Stender Presentation -
Punk Ode - Hiding Shellcode In Plain Sight Michael Sutton, Greg MacManus Presentation -
Rootkits - Attacking Personal Firewalls Alexander Tereshkin Presentation -
The Statue of Liberty - Utilizing Active Honeypots for Hosting Potentially Malicious Events Philip Trainor Presentation -
Wi-Fi Advanced Stealth Franck Veysset, Laurent Butti Presentation -
VOIP Security Essentials Jeff Waldron Presentation -
Web Application Incident Response & Forensics - A Whole New Ball Game! Chuck Willis, Rohyt Belani Presentation -
NIDS - False Positive Reduction Through Anomaly Detection Emmanuelle Zambon, Damiano Bolzoni Presentation -
Host Based Anomaly Detection on System Call Arguments Stefano Zanero Presentation -