Black Hat Europe: Interesting InfoSec Research Ahead (Be Afraid)Black Hat Europe: Interesting InfoSec Research Ahead (Be Afraid)
I always enjoy the Black Hat sessions. The conference leans much more on the technical side of things, more so than the humungous brochure-fest known as RSA. Black Hat Europe is next week April 14th through 17th. And while I won't be able to (unfortunately) attend, there's a number of sessions I wouldn't miss if I was able to hope a flight to Amsterdam.
April 11, 2009
I always enjoy the Black Hat sessions. The conference leans much more on the technical side of things, more so than the humungous brochure-fest known as RSA. Black Hat Europe is next week April 14th through 17th. And while I won't be able to (unfortunately) attend, there's a number of sessions I wouldn't miss if I was able to hope a flight to Amsterdam.Taming the Beast : Assess Kerberos-Protected Networks In this presentation, Emmanuel Bouillon, will take a look at vulnerabilities in Kerberos in both Unix and Windows environments, and review both known and new attacks at Kerberos protected systems. Considering how many businesses rely on the Kerberos protocol, this is an important topic -- to say the least.
Advanced SQL Injection Exploitation to Operating System Full Control Like buffer overflows, SQL injection attacks won't be a problem solved any time soon. This session will look at new ways SQL injection vulnerabilities can be used to highjack databases throughout the Net.
Stack Smashing as of Today: A State-of-the-Art Overview on Buffer Overflow Protections on linux_x86_64 Speaking of buffer-overflows, Hagen Fritsch, will look at how some of the attempts to mitigate these vulnerabilities work, as well as how they -- NX, ASLR or stack-cookies -- can be bypassed.
Stripping SSL To Defeat HTTPS In Practice As if comprised Kerberos authentications, exploiting software through what seems to be an unlimited number of buffer overflows, and ditto for databases vulnerable to SQL injection attacks -- why not toss SSL into the mix. This session will detail research that shows how to side-step SSL as it's often used for secure Web site logons as well as for online banking applications.
All Your Packets Are Belong to Us - Attacking Backbone Technologies Saved one of the most interesting, and potentially most important (they're all important topics, really). This talk will examine existing and theoretical vulnerabilities in network backbone (carrier) technologies such as MPLS and QinQ.
More info on the briefings are available here.
If you'd like to follow my security tweets, you can do so on Twitter.
If you have a security tip or something you'd like to share, please drop a note.
About the Author(s)
Tricks to Boost Your Threat Hunting GameNov 06, 2023
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
Protecting Critical Infrastructure: The 2021 Energy, Utilities, and Industrials Cyber Threat Landscape Report