Black Hat Briefings

Results: 47



#Item
1Insecure.Org  Mastering the Nmap Scripting Engine by Fyodor and David Fifield http://insecure.org/presentations/BHDC10/ Black Hat Briefings Las Vegas

Insecure.Org Mastering the Nmap Scripting Engine by Fyodor and David Fifield http://insecure.org/presentations/BHDC10/ Black Hat Briefings Las Vegas

Add to Reading List

Source URL: media.blackhat.com

- Date: 2012-04-07 14:53:03
    2Metasploit Framework Telephony Black Hat Briefings USA 2009 July, 2009

    Metasploit Framework Telephony Black Hat Briefings USA 2009 July, 2009

    Add to Reading List

    Source URL: www.dustintrammell.com

    Language: English
      3Hacking PGP Jon Callas Black Hat Briefings Amsterdam

      Hacking PGP Jon Callas Black Hat Briefings Amsterdam

      Add to Reading List

      Source URL: www.blackhat.com

      - Date: 2015-05-28 15:51:29
        4The Honeynet Project  Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The Honeynet Project has made extensive advances in Honeynet technologies, what we call GenII systems. These t

        The Honeynet Project Honeynets are a sophisticated type of honeypot used to gather information on the enemy. The Honeynet Project has made extensive advances in Honeynet technologies, what we call GenII systems. These t

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2014-12-16 19:06:21
        5SensePost  How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l

        SensePost How far can automation be taken? How much intelligence can be embodied in code? How generic can automated IT security assessment tools really be? This presentation will attempt to show which areas of attacks l

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2014-12-16 19:06:36
        6WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

        WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2014-12-16 19:06:16
        7Black Hat Brings Leading Security Experts to Japan Seattle, Wash. — June 8, 2005 — Black Hat Inc., a security think tank focused on digital self-defense, today announced the Black Hat Briefings JapanWith suppo

        Black Hat Brings Leading Security Experts to Japan Seattle, Wash. — June 8, 2005 — Black Hat Inc., a security think tank focused on digital self-defense, today announced the Black Hat Briefings JapanWith suppo

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2014-12-16 19:06:12
        8Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

        Joseph Klein The Social Engineering Engagement Methodology—A Formal Testing Process of the People and Process The security of an organization is composed of technology, people and processes. In the last few years, many

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2015-05-28 15:51:41
        9BLACK HAT ASIA Marina Mandarin Hotel, Singapore TrainingDec 2003 Conference/ExhibitionDec 2003 The World’s Leading Technical Forum For IT & Network Security Experts Windows Security

        BLACK HAT ASIA Marina Mandarin Hotel, Singapore TrainingDec 2003 Conference/ExhibitionDec 2003 The World’s Leading Technical Forum For IT & Network Security Experts Windows Security

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2015-05-28 15:51:14
        10U.S National Security, Individual and Corporate Information Security, and Information Security Providers This presentation, by a former Deputy Legal Adviser to the White House National Security Council, and author of a c

        U.S National Security, Individual and Corporate Information Security, and Information Security Providers This presentation, by a former Deputy Legal Adviser to the White House National Security Council, and author of a c

        Add to Reading List

        Source URL: www.blackhat.com

        Language: English - Date: 2015-05-28 15:51:41