Black Hat USA 2009 //Media Archives

Caesars Palace Las Vegas, NV • July 25-30

( MEDIA LEGEND )

white paper document audio recording video recording presentation source material

Event AUDIO & VIDEO: The Source of Knowledge will be onsite to sell audio and video recordings of the Briefings sessions. Their booth will be located outside of the Fourth Floor (Promenade Level), Emperor's Ballroom. You can download the order form here or purchase the media onsite: [ PDF ]

Alessandro Acquisti I Just Found 10 Million SSN's









Dmitri Alperovitch, Keith Mularski Fighting Russian Cybercrime Mobsters: Report from the Trenches









Andrea Barisani, Daniele Bianco Sniff Keystrokes With Lasers/Voltmeters

Side Channel Attacks Using Optical Sampling of Mechanical Energy and Power Line Leakage









Marc Bevand MD5 Chosen-Prefix Collisions on GPUs









Bill Blunden Anti-Forensics: The Rootkit Connection









Hristo Bojinov, Dan Boneh, Elie Bursztein Embedded Management Interfaces: Emerging Massive Insecurity









Michael Brooks, David Aslanian BitTorrent Hacks









Jesse Burns Exploratory Android Surgery









K. Chen Reversing and Exploiting an Apple® Firmware Update









Matt Conover SADE: Injecting Agents into VM Guest OS









Dino Dai Zovi Advanced Mac OS X Rootkits









Datagram Lockpicking Forensics









Mike Davis Recoverable Advanced Metering Infrastructure









Nitesh Dhanjani Psychotronica: Exposure, Control, and Deceit









Mark Dowd, Ryan Smith, David Dewey The Language of Trust: Exploiting Trust Relationships in Active Content









Muhaimin Dzulfakar Advanced MySQL Exploitation









Michael Eddington Demystifying Fuzzers









Egypt Using Guided Missiles in Drive-by's: Automatic browser fingerprinting and exploitation with Metasploit









Rachel Engel Gizmo: A Lightweight Open Source Web Proxy









Stefan Esser State of the Art Post Exploitation in Hardened PHP Environments









Tony Flick Hacking the Smart Grid









Andrew Fried, Paul Vixie, Dr. Chris Lee Internet Special Ops: Stalking Badness Through Data Mining









Chris Gates Breaking the "Unbreakable" Oracle with Metasploit









Travis Goodspeed A 16 bit Rootkit and Second Generation Zigbee Chips









Joe Grand, Jacob Appelbaum, Chris Tarnovsky "Smart" Parking Meter Implementations, Globalism, and You









Jennifer Granick Computer Crime Year In Review: MySpace, MBTA, Boston College and More









Jeremiah Grossman, Trey Ford Mo' Money Mo' Problems: Making A LOT More Money on the Web the Black Hat Way









Peter Guerra How Economics and Information Security Affects Cyber Crime and What It Means in the Context of a Global Recession









Nathan Hamiel, Shawn Moyer Weaponizing the Web: More Attacks on User-Generated Content









Nick Harbour Win at Reversing: Tracing and Sandboxing through Inline Hooking









Riley Hassell Exploiting Rich Content









Billy Hoffman, Matt Wood Veiled: A Browser-based Darknet









Mikko Hypponen The Conficker Mystery









Vincenzo Iozzo, Charlie Miller Post Exploitation Bliss: Loading Meterpreter on a Factory iPhone









Dan Kaminsky Something about Network Security









Peter Kleissner Stoned Bootkit









Kostya Kortchinsky Cloudburst: Hacking 3D (and Breaking Out of VMware)









Zane Lackey, Luis Miras Attacking SMS









Aaron LeMasters, Michael Murphy Rapid Enterprise Triaging (RETRI): How to Run a Compromised Network and Keep Your Data Safe









Robert Lentz Keynote: Cyberspace, A Fragile Ecosystem









Felix "FX" Lindner Router Exploitation









Kevin Mahaffey, Anthony Lineberry, John Hering Is Your Phone Pwned? Auditing, Attacking and Defending Mobile Devices









Moxie Marlinspike More Tricks For Defeating SSL









John McDonald, Chris Valasek Practical Windows XP/2003 Heap Exploitation









Haroon Meer, Nick Arvanitis, Marco Slaviero Clobbering the Cloud! Download file contains 11 videos









Erez Metula Managed Code Rootkits: Hooking into the Runtime Environments









Charlie Miller, Collin Mulliner Fuzzing the Phone in your Phone









David Mortman A Black Hat Vulnerability Risk Assessment









Graeme Neilson Netscreen of the Dead: Developing a Trojaned ScreenOS for Juniper Netscreen Appliances









Steve Ocepek Long-Term Sessions: This Is Why We Can't Have Nice Things









Jeongwook Oh Fight Against 1-day Exploits: Diffing Binaries vs Anti-diffing Binaries









Alfredo Ortega, Anibal Sacco Deactivate the Rootkit









Danny Quist, Lorie Liebrock Reverse Engineering By Crayon: Game Changing Hypervisor Based Malware Analysis and Visualization









Tiffany Strauchs Rad, James Arlen Your Mind: Legal Status, Rights and Securing Yourself









Daniel Raygoza Automated Malware Similarity Analysis









Bruce Schneier Re-conceptualizing Security









Peter Silberman, Steve Davis Metasploit Autopsy: Reconstructing the Crime Scene









Val Smith, Colin Ames, David Kerb MetaPhish









Mike Zusman, Alexander Sotirov Breaking the security myths of Extended Validation SSL Certificates









Kevin Stadmeyer, Garrett Held Worst of the Best of the Best









Alex Stamos, Andrew Becherer, Nathan Wilcox Cloud Computing Models and Vulnerabilities: Raining on the Trendy New Parade









Bryan Sullivan Defensive Rewriting: A New Take on XSS/XSRF/Redirect-Phishing Defense









Chris Tarnovsky What the hell is inside there?









Alexander Tereshkin, Rafal Wojtczuk Introducing Ring -3 Rootkits









Steve Topletz, Jonathan Logan and Kyle Williams Global Spying: Realistic Probabilities in Modern Signals Intelligence









Michael Tracy, Chris Rohlf, Eric Monti Ruby for Pentesters









Dustin "I)ruid" Trammell Metasploit Telephony









Eduardo Vela Nava, David Lindsay Our Favorite XSS Filters and How to Attack Them









Mario Vuksan, Tomislav Pericin Fast & Furious Reverse Engineering with TitanEngine









Chris Weber Unraveling Unicode: A Bag of Tricks for Bug Hunting









Jeff Williams Enterprise Java Rootkits







