08:50 |
Moss
|
Welcome & Introduction to Black Hat USA 2010 |
09:00 | Keynote |
|
10:00 |
Le
|
Payload Already Inside: Data Re-Use for ROP exploits |
Engel,
Hill,
Stender
|
Attacking Kerberos Deployments |
|
Feinstein,
Jarmoc,
King
|
The Emperor Has No Clothes: Insecurities in Security Infrastructure |
|
Oh
|
ExploitSpotting: Locating Vulnerabilities Out Of Vendor Patches Automatically |
|
Grugq
|
Base Jumping: Attacking GSM Base Station Systems and Mobile Phone Base Bands |
|
Boni,
Cushman,
Litchfield,
Stamos,
Stewart
|
Optimizing the Security Researcher and CSO Relationship |
|
Huang,
Sima
|
Drivesploit: Circumventing both automated AND manual drive-by-download detection |
|
Ilyas,
Percoco
|
Malware Freak Show 2010: The Client-Side Boogaloo |
|
Meiners,
Sor
|
WPA Migration Mode: WEP is back to haunt you… |
|
Nagy
|
Industrial Bug Mining - Extracting, Grading and Enriching the Ore of Exploits |
|
Panel
|
Cloud Security Alliance Summit |
|
11:15 |
Waisman
|
Aleatory Persistent Threat |
Azubel,
Ochoa
|
Understanding the Windows SMB NTLM Weak Nonce Vulnerability |
|
Cummins,
Pollet
|
Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters |
|
Johnson,
Miller
|
Crash Analysis using BitBlaze |
|
Kane-Parry
|
More Bugs In More Places: Secure Development On Moble Platforms |
|
Beckstrom,
Kaminsky,
Mockapetris,
Silva,
Weatherford
|
Systemic DNS Vulnerabilities and Risk Management: A Discussion With the Experts |
|
Ames,
Lai,
Smith
|
Balancing the Pwn Trade Deficit |
|
Hoglund
|
Malware Attribution: Tracking Cyber Spies and Digital Criminals |
|
Paget
|
Extreme-range RFID tracking |
|
Beek
|
Virtual Forensics |
|
13:45 |
Vries
|
Hacking Java Clients |
Elrod,
Keltner
|
Adventures in Limited User Post Exploitation |
|
Arlen
|
SCADA and ICS for Security Experts: How to avoid Cyberdouchery |
|
Jack
|
Jackpotting Automated Teller Machines Redux |
|
Lineberry,
Richardson,
Wyatt
|
These Aren't the Permissions You're Looking For |
|
Hayden
|
Cyber war...Are we at war? And if we are, how should we fight it? |
|
Hayden,
Rodriguez
|
One on One Interview with General (Ret.) Michael V. Hayden |
|
Sumner
|
Social Networking Special Ops: Extending Data Visualization Tools for faster Pwnage |
|
Daswani
|
mod_antimalware: A Novel Apache Module for Containing web-based Malware Infections |
|
Mende,
Rey
|
Burning Asgard - What happens when Loki breaks free |
|
Allen,
Umadas
|
Network Stream Debugging with Mallory |
|
15:15 |
Grenier,
Johnson
|
Harder, Better, Faster, Stronger: Semi-Auto Vulnerability Research |
b
|
Standing on the Shoulders of the Blue Monster: Hardening Windows Applications |
|
Kaminsky
|
Black Ops Of Fundamental Defense: Web Edition |
|
Suiche
|
Blue Screen Of the Death is Dead. |
|
Iozzo,
Kornau,
Weinmann
|
Everybody be cool this is a roppery! |
|
Elefant,
Hathaway,
Hayden,
Maughan,
Mitchell,
Rodriguez
|
Security Innovation Network: Connecting Buyers, Builders, and the Research Community |
|
Parker
|
Finger Pointing for Fun, Profit and War? |
|
Thomas
|
BlindElephant: WebApp Fingerprinting and Vulnerability Inferencing |
|
Lawson,
Nelson
|
Exploiting Timing Attacks in Widespread Systems |
|
Dabirsiaghi
|
JavaSnoop: How to Hack Anything Written in Java |
|
Bankston,
Fennelly,
Klein,
Manson,
Ohm,
Opsahl,
Panel,
Salgado,
Thieme
|
Hacker Court |
|
16:45 |
Croce
|
SAP Backdoors: A Ghost at the Heart of Your Business |
Hutton,
Miller
|
Ushering in the Post-GRC World: Applied Threat Modeling |
|
Keltner,
Moyer
|
Wardriving the Smart Grid: Practical Approaches to Attacking Utility Packet Radios |
|
Hering,
Mahaffey
|
App Attack: Surviving the Mobile Application Explosion |
|
Reception: Security Innovation Network |
||
Ryan
|
Getting In Bed With Robin Sage |
|
Fifield,
Vaskovitch
|
Mastering the Nmap Scripting Engine |
|
Born
|
PSUDP: A Passive Approach to Network-Wide Covert Communication |
|
Patterson,
Sassaman
|
Exploiting the Forest with Trees |
10:00 |
Wielgoszewski
|
Constricting the Web: Offensive Python for Web Hackers |
Marlinspike
|
New Threats to Privacy: From TIA to Google |
|
Yerazunis
|
Keeping the Good Stuff In: Confidential Information Firewalling with the CRM114 Spam Filter & Text Classifier |
|
Meer
|
Memory Corruption Attacks: The (almost) Complete History... |
|
Hoff
|
CLOUDINOMICON: Idempotent Infrastructure, Survivable Systems & Bringing Sexy Back to Info Centricity |
|
CSI: TCP/IP |
||
Kelley,
Kennedy
|
Microsoft Powershell - It's time to own |
|
Grossman
|
Breaking Browsers: Hacking Auto-Complete |
|
Heffner
|
How to Hack Millions of Routers |
|
Ristic
|
State of SSL on the Internet: 2010 Survey, Results and Conclusions Routers |
|
Smith
|
pyREtic – Reversing obfuscated Python bytecode & live Python objects |
|
Session
|
Regional Collegiate Cyberdefense Competition |
|
11:15 |
Esser
|
Utilizing Code Reuse/Return Oriented Programming in PHP Web Application Exploits |
Cross
|
Unauthorized Internet Wiretapping: Exploiting Lawful Intercept |
|
Siddharth
|
Hacking Oracle From Web Apps |
|
Ormandy,
Tinnes
|
There's a party at Ring0 (and you're invited) |
|
Bugher
|
Secure Use of Cloud Storage |
|
Policy, Privacy, Deterrence and Cyber War |
||
Shostack
|
Elevation of Privilege: The Easy way to Threat Model |
|
Hypponen
|
You Will be Billed $90,000 for This Call |
|
Hansen,
Sokol
|
HTTPS Can Byte Me |
|
Ollmann
|
Becoming the six-million-dollar man |
|
Bratus,
Conti
|
Voyage of the Reverser: A Visual Study of Binary Species |
|
Kushner,
Murray
|
Your Career = Your Business |
|
13:45 |
Byrne,
Henderson
|
GWT Security: Don’t Get Distracted by Bright Shiny Objects |
Rad
|
The DMCA & ACTA vs. Academic & Professional Research: How Misuse of this Intellectual Property Legislation Chills Research, Disclosure and Innovation |
|
Cerrudo
|
Token Kidnapping's Revenge |
|
Zovi
|
Return-Oriented Exploitation |
|
Criscione
|
Virtually Pwned: Pentesting Virtualization |
|
Human Intel |
||
Vixie
|
ISC SIE Passive DNS vs. Apache Cassandra |
|
Cheatham,
Raber
|
Reverse Engineering with Hardware Debuggers |
|
FX
|
Blitzableiter - the Release |
|
Smith
|
Defenseless in Depth |
|
Pericin,
Vuksan
|
TitanMist: Your First Step to Reversing Nirvana |
|
Kushner,
Murray
|
Things You Wanted To Know But Were Afraid To Ask About Managing Your Information Security Career |
|
15:15 |
Kamkar
|
How I Met Your Girlfriend |
Nohl
|
Attacking Phone Privacy |
|
Fayó
|
Hacking and protecting Oracle Database Vault |
|
Valasek
|
Understanding the Low- Fragmentation Heap: From Allocation to Exploitation |
|
Anh
|
Virt-ICE: Next Generation Debugger for Malware Analysis |
|
Ex-Fed Confessions |
||
Cronin,
Engebretson,
Pauli
|
SpewPAL: How capturing and replaying attack traffic can save your IDS |
|
Becherer
|
Hadoop Security Design? Just Add Kerberos? Really? |
|
Harbour
|
The Black Art of Binary Hijacking |
|
Shah
|
Hacking Browser's DOM - Exploiting Ajax and RIA |
|
Henderson,
Ocepek
|
Need a hug? I'm secure. |
|
Kawach
|
NEPTUNE: Dissecting Web-based Malware via Browser and OS Instrumentation |
|
Panel
|
ISSA |
|
16:45 |
Creighton,
Eng
|
Deconstructing ColdFusion |
Bailey,
DePetrillo
|
Carmen Sandiego is On the Run! |
|
Sullivan
|
Cryptographic Agility: Defending Against the Sneakers Scenario |
|
Shelton
|
Advanced AIX Heap Exploitation Methods |
|
Wicherski
|
dirtbox: a Highly Scalable x86/Windows Emulator |
|
Meet the Feds Reception |
||
Slaviero
|
Lifting the Fog |
|
Rushing
|
USB - HID, The Hacking Interface Design |
|
Davis
|
Security is Not a Four Letter Word |
|
Bursztein,
Gourdin,
Rydstedt
|
Bad Memories |
|
Brown,
Ragan
|
Lord of the Bing: Taking back search engine hacking from Google and Bing |
|
Bolzoni,
Schade
|
Goodware drugs for malware: on-the-fly malware analysis and containment |
This "Old School" schedule is an automatically-generated evolution of a manually-generated hack Darth Null has been using at ShmooCon since 2007. It won't work too well for a large conference, like DEFCON, but for smaller events like ShmooCon or BlackHat DC, it might be useful.
Simply print this out at whatever scale is most helpful to you. For example, for ShmooCon: print at 65%, fold Friday and Sunday back behind Saturday, and laminate, for a two-sided 3" x 4" card that you can keep in your shirt pocket.