![]() ![]() In 2009, web sites belonging to a handful of security researchers and groups were hacked and passwords, private e-mails, IM chats, and sensitive documents were exposed on the vandalized site of Dan Kaminsky, days before the conference. Conference attendees have been known to hijack wireless connections of the hotels, hack hotel television billing systems, and in one instance, deploy a fake automated teller machine in a hotel lobby. ![]() Antics and disclosures īlack Hat is known for the antics of its hacker contingent, and the disclosures brought in its talks. ToolsWatch maintains an archive of all Black Hat Briefings Arsenals. ![]() Arsenal primarily consists of live tool demonstrations in a setting where attendees can ask questions about the tools and sometimes use them. Īrsenal is a portion of the conference dedicated to giving researchers and the open source community a place to showcase their latest open-source information security tools. The conference has hosted the National Security Agency's information assurance manager course, and various courses by Cisco Systems, Offensive Security, and others. Training is offered by various computer security vendors and individual security professionals. Alexander, former Director of the National Security Agency and former commander of the United States Cyber Command. The briefings also contain keynote speeches from leading voices in the information security field, including Robert Lentz, Chief Security Officer, United States Department of Defense Michael Lynn Amit Yoran, former Director of the National Cyber Security Division of the Department of Homeland Security and General Keith B. The Briefings are composed of tracks, covering various topics including reverse engineering, identity and privacy, and hacking. The conference is composed of three major sections: the Black Hat Briefings, Black Hat Trainings, and Black Hat Arsenal. It has been perceived by the security industry as a more corporate security conference whereas DEF CON is more informal. Culture īlack Hat is typically scheduled prior to DEF CON with many attendees going to both conferences. Black Hat was acquired by CMP Media, a subsidiary of U.K.-based United Business Media (UBM) in 2005. Black Hat started as a single annual conference in Las Vegas, Nevada and is now held in multiple locations around the world. These are considered the premier information security conferences in the world. It was founded by Jeff Moss, who also founded DEF CON, and is currently the Conference Chair of the Black Hat Review Board. Its organizers stated: "While many conferences focus on information and network security, only the Black Hat Briefings will put your engineers and software programmers face-to-face with today's cutting edge computer security experts and 'hackers.'" It was presented by DEF CON Communications and Cambridge Technology Partners. The conference was aimed at the computer industry, promising to give them privileged insight into the minds and motivations of their hacker adversaries. The first Black Hat was held July 7-10, 1997 in Las Vegas, immediately prior to DEF CON 5. The conference has also been hosted in Amsterdam, Tokyo, and Washington, D.C. The conference takes place regularly in Las Vegas, Barcelona, London and Riyadh. Black Hat brings together a variety of people interested in information security ranging from non-technical individuals, executives, hackers, and security professionals. And they’re connecting to the net through ethernet cables or VPNs,” Meyer said.Black Hat Briefings (commonly referred to as Black Hat) is a computer security conference that provides security consulting, training, and briefings to hackers, corporations, and government agencies around the world. My iPhone is turned off, sleeping near the pillow of my hotel bed. But Meyer said that may not be safe enough. In fact, I’m chimping out this post from the safety of Starbucks. Those at the conference have grown accustomed to seeing well-dressed technology executives and suspected intelligence agents, spies really, huddling in corners with their ears pressed against $20 Kyocera DuraXT flippers. Many attendees are turning to burner flip-phones (cheap, disposable cell phones). Those with encryption likely fair better. Behind the scenes, holed up in rooms on the twentieth floor, black hatters are looking for holes and flaws in your security. Hacker veterans will tell you not to bring mobile devices into the conference for obvious reasons. “But we prefer to be out and away from all that,” he said. They do it for demo purposes, bringing it to light for the sake of safety purposes,” Kahl said. “The rule of the game is that any exploits there are for the sake of exploiting. “My team said there’s hackers there who, all day long, are tying to embarrass you,” he said.Īndy Kahl, Ghostery’s director of transparency, is more than in agreement with his boss. ![]()
0 Comments
Leave a Reply. |