Black Hat

Displaying 1-8 of 8 results

  • White Papers // Jul 2009

    Global Spying: Realistic Probabilities in Modern Signals Intelligence

    This paper present insight to the realistic possibilities of Internet mass surveillance. When talking about the threat of Internet surveillance, the common argument is that there is so much traffic that any one conversation or email won't be picked up unless there is reason to suspect those concerned; it is...

    Provided By Black Hat

  • White Papers // Jul 2009

    Null Prefix Attacks Against SSL/TLS Certificates

    The SSL and TLS protocols aim to provide secrecy, authenticity, and integrity safeguarding communication from both passive and active adversaries. SSL and TLS rely heavily on the x500 certificate structure in order to deliver authenticity, and both parties in an SSL/TLS connection have the opportunity to identify themselves with an...

    Provided By Black Hat

  • White Papers // Jul 2009

    Advanced MAC OS X Rootkits

    The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known, Mach-based rootkit techniques have not been as thoroughly publicly explored. This paper covers a variety of rootkit techniques for both user-space and kernel-space rootkits using unique and poorly under-stood...

    Provided By Black Hat

  • White Papers // Jul 2009

    Automated Malware Similarity Analysis

    Malware analysis has evolved in both the sophistication of the samples analyzed and the tools of the trade. Unfortunately human analysis of samples is still very expensive and time consuming. As teams of malware analysts have grown larger, the duplication of effort in analyzing similar pieces of code has also...

    Provided By Black Hat

  • White Papers // Jul 2009

    Your Mind: Legal Status, Rights and Securing Yourself

    One shed digital footprints every day. Using similar technologies to the ones that trackone, it is becoming easier to trace those footprints back tone. If one live in a city in which usage of video surveillance has become widespread, image and travel patterns are often recorded and stored. In London,...

    Provided By Black Hat

  • White Papers // Jul 2009

    BitTorrent Protocol Abuses

    The BitTorrent protocol is now 7 years old. The protocol has become wildly successful in a very short period of time, but with this success comes growing pains. The protocol originally envisioned by Bram Cohen is fairly secure. Vulnerabilities have been introduced by people trying to do things with the...

    Provided By Black Hat

  • White Papers // Jul 2009

    Sub-Prime PKI: Attacking Extended Validation SSL

    One of the attributes that the paper discusses is the type of SSL certificate presented by a web server when negotiating a secure connection. Modern web browsers support both Domain Validated (DV) and Extended Validation (EV) SSL certificates. EV SSL certificates were created to combat phishing and other web based...

    Provided By Black Hat

  • White Papers // Feb 2009

    Windows Vista Security Internals

    Windows Vista introduces some significant changes in its security architecture; there are also some major changes between Vista RTM (release-to-manufacturing; a Microsoft term for "Gold" code or SP0) and Vista SP1. This paper first provides a brief overview of some of those architectural changes, and will then focus on the...

    Provided By Black Hat

  • White Papers // Feb 2009

    Windows Vista Security Internals

    Windows Vista introduces some significant changes in its security architecture; there are also some major changes between Vista RTM (release-to-manufacturing; a Microsoft term for "Gold" code or SP0) and Vista SP1. This paper first provides a brief overview of some of those architectural changes, and will then focus on the...

    Provided By Black Hat

  • White Papers // Jul 2009

    Automated Malware Similarity Analysis

    Malware analysis has evolved in both the sophistication of the samples analyzed and the tools of the trade. Unfortunately human analysis of samples is still very expensive and time consuming. As teams of malware analysts have grown larger, the duplication of effort in analyzing similar pieces of code has also...

    Provided By Black Hat

  • White Papers // Jul 2009

    Global Spying: Realistic Probabilities in Modern Signals Intelligence

    This paper present insight to the realistic possibilities of Internet mass surveillance. When talking about the threat of Internet surveillance, the common argument is that there is so much traffic that any one conversation or email won't be picked up unless there is reason to suspect those concerned; it is...

    Provided By Black Hat

  • White Papers // Jul 2009

    BitTorrent Protocol Abuses

    The BitTorrent protocol is now 7 years old. The protocol has become wildly successful in a very short period of time, but with this success comes growing pains. The protocol originally envisioned by Bram Cohen is fairly secure. Vulnerabilities have been introduced by people trying to do things with the...

    Provided By Black Hat

  • White Papers // Jul 2009

    Null Prefix Attacks Against SSL/TLS Certificates

    The SSL and TLS protocols aim to provide secrecy, authenticity, and integrity safeguarding communication from both passive and active adversaries. SSL and TLS rely heavily on the x500 certificate structure in order to deliver authenticity, and both parties in an SSL/TLS connection have the opportunity to identify themselves with an...

    Provided By Black Hat

  • White Papers // Jul 2009

    Your Mind: Legal Status, Rights and Securing Yourself

    One shed digital footprints every day. Using similar technologies to the ones that trackone, it is becoming easier to trace those footprints back tone. If one live in a city in which usage of video surveillance has become widespread, image and travel patterns are often recorded and stored. In London,...

    Provided By Black Hat

  • White Papers // Jul 2009

    Sub-Prime PKI: Attacking Extended Validation SSL

    One of the attributes that the paper discusses is the type of SSL certificate presented by a web server when negotiating a secure connection. Modern web browsers support both Domain Validated (DV) and Extended Validation (EV) SSL certificates. EV SSL certificates were created to combat phishing and other web based...

    Provided By Black Hat

  • White Papers // Jul 2009

    Advanced MAC OS X Rootkits

    The Mac OS X kernel (xnu) is a hybrid BSD and Mach kernel. While Unix-oriented rootkit techniques are pretty well known, Mach-based rootkit techniques have not been as thoroughly publicly explored. This paper covers a variety of rootkit techniques for both user-space and kernel-space rootkits using unique and poorly under-stood...

    Provided By Black Hat