![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
Jeff Moss
Black Hat Briefings Europe was held March 27-30 at the Moevenpick Amsterdam Centre Hotel. Twdays, four different tracks. Roger Cumming, Head of Device Delivery and Knowledge at CPNI (Center for the Protection of National Infrastructure), spoke on "How can the Security Researcher Community Work Better for the Common Good."
A post convention wrap up can be found at http://www.blackhat.com/html/bh-europe-07/bh-eu-07-index.html
Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.
Video, audiand supporting materials from past conferences will be posted here, starting with the newest and working our way back tthe oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 and mp4 h.264 192k videformat. If you want tget a better idea of the presentation materials gtohttp://www.blackhat.com/html/bh-media-archives/bh-archives-2007.html#eu_07 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!
All episodes
Best episodes
Top 10 Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. Episodes
Goodpods has curated a list of the 10 best Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. episode by adding your comments to the episode page.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Toshinari Kureha: Make My Day - Just Run a Web Scanner: Countering The Faults of Typical Web Scanners Through Byte-code Injection
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 36 min
But is it? How dyou know that the scanner exercised all the vital areas of your application? How accurate and complete are the results? Is relying on HTTP response the best way tfind all vulnerabilities in an application? What if there was a way tlook at what's happening inside the application while these web scanners were hitting the application?
In this talk, we'll explore that "looking inside the application as the security test runs" possibility - through byte-code instrumentation. We will see how we can use aspect oriented technologies such as AspectJ tinject security monitors directly inside a pre-compiled Java / .NET web application. We will alsgthrough a proof of concept and dem- turning a typical blackbox test inta "whitebox" test using the techniques discussed in this talk, gaining a more complete picture: gaining coverage insight, finding more vulnerabilities, weeding out false positives reported by the scanners, and gaining root cause source information.
"Toshinari Kureha is the technical lead and principal member of technical staff at Fortify Software. He oversees the development of the Red Team Workbench project. Prior tjoining Fortify, Toshinari was a technical lead at Oracle's Application Server Division, where he provided leadership in the architecture, implementation and delivery of several high-profile projects including Oracle Grid Control, Oracle Exchange, and BPEL Orchestration Designer. Prior tworking with Oracle, Toshinari worked as Lead Developer at Formal Systems a web-based computer testing and assessment system for use in the Internet/Intranet. Toshinari holds a B.S. in computer science from Princeton University.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Philippe Langlois: SCTPscan - Finding entry points tSS7 Networks & Telecommunication Backbones
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 69 min
SCTP is the protocol used tcarry all telecom signalling information on IP according tthe SIGTRAN protocol suite. It's the foundation, as TCP is the foundation for the web and email. SCTP is alsused for high-performance clusters, resources pooling and very high-speed file transfer.
When you discover open SCTP ports, you discover a secret door tthis walled garden. As a walled garden, the internal security of the SS7 network is not as good as one might expect. SCTPscan is a tool tdexactly just that, and is released as open source.
This presentation will explain how SCTPscan manages tscan without being detected by remote application, how discrepancies between RFC and implementation enable us tscan more efficiently and how we manage tscan without even being detect by systems like SANS - Dshield.org. Here we will have a look at INIT packet construction, stealth scanning and a beginning of SCTP fingerprinting.
Then, we gon tdetail upper layer protocols that use SCTP and the potentials of the SIGTRAN protcol suite in term of security. We'll see the M2UA, M3UA, M2PA, IUA which are SIGTRAN-specific protocols, and alsthe more generic SS7 protocols such as ISUP, BICC, BSSAP, TCAP, SCCP and MTP. "
"Philippe Langlois is a founder and Senior Security Consultant for Telecom Security Task Force, a research and consultancy outfit.
He founded and led technical teams in several security companies (Qualys, WaveSecurity, INTRINsec) as well as security research teams (Solsoft, TSTF).
He founded Qualys in 1999 and led the R&D for this world-leading vulnerability assessment service.
He founded Intrinsec, a pioneering network security company in 1995, as well as Worldnet, France's first public Internet service provider, in 1993.
He has proven expertise in network security, from Internet tless well known networks - X25 and other legacy systems mostly used in banking, travel and finance.
Philippe was alslead designer for Payline, one of the first e-commerce payment gateways on Internet. He has written and translated security books, including some of the earliest references in the field of computer security, and has been giving speeches on network security since 1995 (RSA, COMDEX, Interop).
Philippe Langlois is a regular contributor of french-speaking security portal vulnerabilite.com. and a writer for ITaudit, the magazine of the International Association of Internal Auditors.
Samples of the missions he has been involved with are Penetration Testing contract on multi-million live users infrastructures such as Telecom operators GSM backbone, due diligence for M&A, security architecture audits, product security analysis and advisory."
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Adam Laurie: RFIDIOts!!! - Practical RFID hacking (without soldering irons)](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Adam Laurie: RFIDIOts!!! - Practical RFID hacking (without soldering irons)
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 53 min
"Adam Laurie is Chief Security Officer and a Director of The Bunker Secure Hosting Ltd. He started in the computer industry in the late Seventies, working as a computer programmer on PDP-8 and other mini computers, and then on various Unix, Dos and CP/M based micrcomputers as they emerged in the Eighties. He quickly became interested in the underlying network and data protocols, and moved his attention tthose areas and away from programming, starting a data conversion company which rapidly grew tbecome Europe's largest specialist in that field (A.L. downloading Services).
During this period, he successfully disproved the industry lie that music CDs could not be read by computers, and, with help from his brother Ben, wrote the world's first CD ripper, 'CDGRAB'. At this point, he and Ben became interested in the newly emerging concept of 'The Internet', and were involved in various early open source projects, the most well known of which is probably their own-'Apache-SSL'-which went on tbecome the de-factstandard secure web server.
Since the late Nineties they have focused their attention on security, and have been the authors of various papers exposing flaws in Internet services and/or software, as well as pioneering the concept of re-using military data centres (housed in underground nuclear bunkers - http://www.thebunker.net) as secure hosting facilities.
Adam has been a senior member of staff at DEFCON since 1997, and alsacted as a member of staff during the early years of the Black Hat Briefings. More recently he has become interested in mobile device security, and was responsible for discovering many major Bluetooth security issues, and has alsspoken on other wireless topics such as InfraRed and Magnetic Stripes. His current interest, RFID, has spawned another Open Source project, RFIDIOt, which is alsbringing several security issues tthe fore. More detail can be found here: http://rfidiot.org"
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
DamianBolzoni and Emmanuele Zambon: NIDS: False Positive Reduction Through Anomaly Detection
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 49 min
Benchmarks performed on POSEIDON and APHRODITE with DARPA 1999 dataset and with traffic dumped from a real-world public network show the effectiveness of the twsystems. APHRODITE is able treduce the rate of false alarms from 50% t100% (improving accuracy) without reducing the NIDS ability tdetect attacks (completeness)."
DamianBolzoni received a MSc degree from the University of Venice, Italy, in Computer Science with a thesis about anomaly-based Network Intrusion Detection Systems. He has been working for a year at the Information Risk Management division in KPMG Italy. He is author of the POSEIDON and APHRODITE papers and gave talks at IWIA workshop, WebbIT and many security conferences in Netherlands. At the moment, he is a PhD student at the University of Twente, The Netherlands. His research topics are IDS and risk management.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Sun Bing: Software Virtualization Based Rootkits](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Sun Bing: Software Virtualization Based Rootkits
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 70 min
While this technique can be applied tany software in this case I will take a look at the latest version of Oracle Database Server: 10gR2 for Windows, which is a extremely secure product sit will be a very difficult challenge tfind vulnerabilities since Oracle is using advanced next generation tools tidentify and fix vulnerabilities."
Sun Bing is the Research Scientist at McAfee (China) currently, and has held security related positions at several famous companies heretofore, such as Rising and Siemens. SUN BING has more than 6 years of experience in Windows Kernel and Security Techniques (Anti-Virus, Firewall, IPS etc) research development, especially with deeply delving intBuffer Overflow Prevention, Rootkit Detection and x86 Virtualization. His main works previously involve participating in Rising Anti-Virus Softwares development, publishing the paper (The Design Of Anti-Virus Engine) at xfocus, taking charge of the design and development of a desktop security product-LinkTrust IntraSec, and speaking at security conferences such as XCON2006 and POC2006...
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - AugustPaes de Barros: New Botnets Trends and Threats](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
AugustPaes de Barros: New Botnets Trends and Threats
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 50 min
"Augustworks with Information Security since 2000. He worked for security consulting companies, Moduland Proteus, as security analyst and project manager. Augustalsworked in BankBoston, a Bank of America branch, as security manager, and now works as CSin a Credit Card processing company.
In 2003, coined the term honeytoken during a discussion with other researchers on the focus-ids mailing list. In his last research, Augustbuilt a Proof of Concept Trojan horse that works against the most recent security measures from Brazilian online banks, presented at the CNASI Conference in 2005. He is an active blogger (http://www.paesdebarros.com.br/indexpb.html).
Current president of the Brazilian ISSA Chapter, he alsgives Criptography and Ethical Hacking classes tthe post-graduation courses from IBTA University. He is finishing his Master in Computer Engineering at the Technology Research Institute (Institutde Pesquisas Tecnologicas de SoPaulo), working on a methodology for internal threats detection."
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Jonathan Wilkins: ScarabMon - Automating Web Application Penetration Tests
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 47 min
ScarabMon is written in Python and all code and modules will be released at the conference.
ScarabMon is alseasily extensible, with useful checks often only requiring 5-10 lines of Python code.
I wrote ScarabMon because I couldn't find anything like it.
Historically the standard web proxies have been @Stake's WebProxy (which is totally unavailable anymore as Symantec killed it after the acquisition), SpikeProxy and WebScarab. Those have have recently been joined by twother apps, WebScarab-NG and Pantera.
The latter are not ready for serious usage yet. Pantera development seems thave stalled and WebScarab-NG is missing major features, though it shows the most promise. The latest date on any of the SPIKEProxy files is from 2003.
Sbasically everyone uses WebScarab for web application pen tests.
WebScarab is obnoxious tprogram for, as you have twrite dozens of lines of Java code (BeanShell) for the simplest tasks. BeanShell is alsoften unstable.
ScarabMon is currently designed twork with WebScarab, but could be ported twork with any of the above should the need arise. Instead of acting as a proxy, it just monitors the output of the proxy and opportunistically performs tests. Some tests are things people have seen before in other tools (like finding directories that support PUT) and others aren't anything I've seen in any other tool such as finding values that were set as cookies over SSL that later wind up as a query string parameter.
The best thing is that you get all of this for free. You don't have tchange *anything* about your current testing methodology. You just run ScarabMon in the background and it sees the servers and files you're accessing and generates findings.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Kostya Kortchinsky: Making Windows Exploits more reliable](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Kostya Kortchinsky: Making Windows Exploits more reliable
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 77 min
While multiplying the number of targets in an exploit is often the solution found in the wild, it seems that nobody has yet disclosed a solution tfingerprint a Windows language, or discuss about cross languages and service packs return addresses (though cross SP only is now fairly well mastered).
Immunity, Inc. had twork on this issue for CANVAS, in order tbuild more reliable exploits, and this paper intend texplain some of the solutions that were found tthese issues.
" Kostya is well known in the security industry for various vulnerability research projects. He is the discoverer of many software vulnerabilities which have resulted in several Microsoft patches, latest one being MS06-074, the SNMP service remote code execution. His most recent conference presentations were at Microsoft's BlueHat Fall 2006 Sessions, speaking on Skype security and at RECON'06. Kostya has joined Immunity, Inc. from the European Aeronautic Defence and Space Company (EADS), where he was a research engineer. He manages Immunity, Inc. Partners Program and does exploit development for CANVAS. Prior tthat, Kostya was manager of the French Academic CERT.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Alexander Sotirov: Heap Feng Shui in JavaScript](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Alexander Sotirov: Heap Feng Shui in JavaScript
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
01/09/06 • 73 min
This presentation introduces a new technique for precise manipulation of the browser heap layout using specific sequences of JavaScript allocations. This allows an attacker tset up the heap in any desired state and exploit difficult heap corruption vulnerabilities with great reliability and precision.
This talk will begin with an overview of the current state of browser heap exploitation and the unreliability of many heap exploits. It will continue with a discussion of Internet Explorer heap internals and the techniques for JavaScript heap manipulation. I will present a JavaScript heap exploitation library that exposes an abstract heap manipulation API. Its use will be demonstrated by exploit code for twcomplex heap corruption vulnerabilities.
The talk will focus on Internet Explorer exploitation, but the general technique presented is applicable tother browsers as well. "
Alexander Sotirov has been involved in computer security since 1998, when he started contributing tPhreedom Magazine, a Bulgarian underground technical publication. For the past nine years he has been working on reverse engineering, exploit code development and research of automated source code auditing. His most well-known work is the development of highly reliable exploits for Apache modssl, ProFTPd and Windows ASN.1. He graduated with a Masters degree in computer science in 2005. His current job is as a vulnerability researcher at Determina Inc.
![Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. - Jeff Moss and Roger Cumming: Welcome and Keynote.](http://media.blackhat.com/bh-eu-07/bh-eu-07-itunes.avif)
Jeff Moss and Roger Cumming: Welcome and Keynote.
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.
05/04/07 • 57 min
Jeff Moss introduces the Keynote and welcomes everyone tthe Amsterdam 2007 conference!
Roger will provide an overview of the work of CPNI in reducing vulnerability in information systems that form part of the UK. He will then challenge the community on a number of issues, including the development of the malicious market place, and the role security researchers in addressing vulnerabilities as used by a range of threat actors.
Until 31 January 2007 Roger Cumming was Director of the National Infrastructure Security Co-ordination Centre (NISCC), the UK centre responsible for minimising the impact of electronic attack on the UK critical national infrastructure. Since 1 February Roger has been Head of Advice Delivery and Knowledge Development at the UK Centre for the Protection of National Infrastructure (CPNI). CPNI provides protective security advice on information security as well as physical and personnel security treduce the vulnerability of the UK's national infrastructure tterrorism and other threats.
Show more best episodes

Show more best episodes
FAQ
How many episodes does Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. have?
Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. currently has 19 episodes available.
What topics does Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. cover?
The podcast is about News, Video, Audio, Tech News, Hacking, Podcasts and Technology.
What is the most popular episode on Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.?
The episode title 'Jeff Moss and Roger Cumming: Welcome and Keynote.' is the most popular.
What is the average episode length on Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.?
The average episode length on Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. is 61 minutes.
When was the first episode of Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference.?
The first episode of Black Hat Briefings, Europe 2007 [Audio] Presentations from the security conference. was released on Jan 9, 2006.
Show more FAQ

Show more FAQ