Misplaced Pages

Black Hat Briefings: Difference between revisions

Article snapshot taken from[REDACTED] with creative commons attribution-sharealike license. Give it a read and then ask your questions in the chat. We can research this topic together.
Browse history interactively← Previous editNext edit →Content deleted Content addedVisualWikitext
Revision as of 01:42, 23 July 2013 editArthur Rubin (talk | contribs)Extended confirmed users, Rollbackers130,168 edits Reverted 2 edits by Hackerwithin (talk): Inappropriate comments for an article. (TW)← Previous edit Revision as of 12:44, 23 July 2013 edit undoRandomname3234234 (talk | contribs)2 edits Seems like every open engineering job these day is a fake job setup by some type of foreign-run "CIA" organization designed to knock down the local engineers and transfer jobs to places like india or chinaNext edit →
Line 1: Line 1:


I can't even tell what's a real job anymore. Seems like every
open engineering job these day is a fake job setup by some type of foreign-run "CIA"
organization designed to knock down the local engineers and transfer jobs to
places like india or china.

One fake job verses another fake job. What's the difference?

As much as I would like to believe that there's a small faction
of them that are secretly trying to be my "friends" by opening
a real job for me in a company that they control, I don't
entirely believe it because they have already played this exact trick on my at
least 10 times over the last 3 years. In at least one case that was a
direct hire position...which lasted exactly 3 weeks, they even had the balls
to have an indian guy repel in front my office window on my last day and
pretend to be spying on me in order to make fun of me saying the above
that the Indians and Chinese are running some type of CIA organization in the
united states.

All I really know is that ever since I worked for a US semiconductor company
in china, the Indian CIA decided im somebody
they need to follow around and harass with fake jobs
that they cancel every 3 weeks.

Even this microchip job seems to have their hand
on it somehow because I've never heard of a
interview getting blotched by buying the plane tickets.
And also they keep feeding information about the microchip job
to my wife's sister in China attempting to influence me
to take the job, even when she's not even suppose to know about it.
It just smacks of something corrupt
that I don't really believe is honest or real.

I actually hate the Chinese side of the organization
just as much as the indian side. they are both dishonest assholes
that illegal steal jobs from Americans.

I actually kind of believe they have agents at Microsoft knocking
holes in the kernel of every new version of windows so they
can mail viruses using Microsoft word documents.
Then they patch it with windows update... except
that doesn't work either because they also can steal
Microsoft's software signature to sign a virus with
their name and then post it over windows update by hacking
the routers...because they are again working at those
companies and knock back door holes in the routers...that
they also create patches for.

==Black Hat Briefing==

] presenting a briefing in 2005]] ] presenting a briefing in 2005]]
'''Black Hat Briefings''' is a ] that brings together a variety of people interested in ]. Representatives of government agencies and corporations attend, along with ]s. The Briefings take place regularly in ], ], ], ] and, occasionally, ].<ref>https://www.blackhat.com/html/archives.html</ref> An event dedicated to the Federal Agencies is organized in ]<ref name="foxnews.com">{{cite news|url=http://www.foxnews.com/story/0,2933,206989,00.html|title=Computer Security Conferences Attract Both Hackers, Anti-Hackers | work=Fox News | date=4 August 2006}}</ref> '''Black Hat Briefings''' is a ] that brings together a variety of people interested in ]. Representatives of government agencies and corporations attend, along with ]s. The Briefings take place regularly in ], ], ], ] and, occasionally, ].<ref>https://www.blackhat.com/html/archives.html</ref> An event dedicated to the Federal Agencies is organized in ]<ref name="foxnews.com">{{cite news|url=http://www.foxnews.com/story/0,2933,206989,00.html|title=Computer Security Conferences Attract Both Hackers, Anti-Hackers | work=Fox News | date=4 August 2006}}</ref>

Revision as of 12:44, 23 July 2013


I can't even tell what's a real job anymore. Seems like every open engineering job these day is a fake job setup by some type of foreign-run "CIA" organization designed to knock down the local engineers and transfer jobs to places like india or china.

One fake job verses another fake job. What's the difference?

As much as I would like to believe that there's a small faction of them that are secretly trying to be my "friends" by opening a real job for me in a company that they control, I don't entirely believe it because they have already played this exact trick on my at least 10 times over the last 3 years. In at least one case that was a direct hire position...which lasted exactly 3 weeks, they even had the balls to have an indian guy repel in front my office window on my last day and pretend to be spying on me in order to make fun of me saying the above that the Indians and Chinese are running some type of CIA organization in the united states.

All I really know is that ever since I worked for a US semiconductor company in china, the Indian CIA decided im somebody they need to follow around and harass with fake jobs that they cancel every 3 weeks.

Even this microchip job seems to have their hand on it somehow because I've never heard of a interview getting blotched by buying the plane tickets. And also they keep feeding information about the microchip job to my wife's sister in China attempting to influence me to take the job, even when she's not even suppose to know about it. It just smacks of something corrupt that I don't really believe is honest or real.

I actually hate the Chinese side of the organization just as much as the indian side. they are both dishonest assholes that illegal steal jobs from Americans.

I actually kind of believe they have agents at Microsoft knocking holes in the kernel of every new version of windows so they can mail viruses using Microsoft word documents. Then they patch it with windows update... except that doesn't work either because they also can steal Microsoft's software signature to sign a virus with their name and then post it over windows update by hacking the routers...because they are again working at those companies and knock back door holes in the routers...that they also create patches for.

Black Hat Briefing

Michael Lynn presenting a briefing in 2005

Black Hat Briefings is a computer security conference that brings together a variety of people interested in information security. Representatives of government agencies and corporations attend, along with hackers. The Briefings take place regularly in Las Vegas, Barcelona, Amsterdam, Abu Dhabi and, occasionally, Tokyo. An event dedicated to the Federal Agencies is organized in Washington, D.C.

History

Black Hat was founded in 1997 by Jeff Moss, who also founded DEF CON. These are considered the premier information security conferences in the world: Black Hat 2009 was attended by 4,000 people. Black Hat started as a single annual conference in Las Vegas and is now held in multiple locations around the world.

The conference

Black Hat is composed of two major sections, the Black Hat Briefings, and Black Hat Trainings. Training is offered by various computer security vendors, in effort to keep the conference vendor-neutral. The conference has hosted the National Security Agency's information assurance manager course, and various courses by Cisco Systems, Offensive Security, and others.

The Briefings are composed of tracks, covering various topics including reverse engineering, identity and privacy, and hacking. The briefings also contain keynote speeches from leading voices in the information security field, including Kevin Mitnick, Robert Lentz Chief Security Officer, United States Department of Defense; Michael Lynn; Amit Yoran, former Director of the National Cyber Security Division of the Department of Homeland Security; and General Keith B. Alexander, Director of the National Security Agency and commander of the United States Cyber Command.


Conference's Topics

. . .

USA :

July - August 2009 : MCS-ATL vulnerabilities // attack against MD2 - Breaking SSL ... validation certificate ...

July - August 2010 : Cloudcracker ... such as (wpacracker.com service)

July 27 - August 1st 2013 : Android hacking : application and root

New Conference Goals

In our time, is now to be focus more on each tools which can be used or protected, so the opening of a new type of conferences called Black Hat Arsenal Briefings

Antics and disclosures

Black Hat is known for the antics of its hacker contingent, and the disclosures brought in its talks. Conference attendees have been known to hijack wireless connections of the hotels, hack hotel TV billing systems, and even hack the automated teller machine in a hotel lobby. In 2009, web sites belonging to a handful of security researchers and groups were hacked and passwords, private e-mails, IM chats, and sensitive documents were exposed on the vandalized site of Dan Kaminsky, days before the conference. During Black Hat 2009, a USB thumb drive that was passed around among attendees was found to be infected with the Conficker virus, and in 2008, three men were expelled for packet sniffing the press room local area network.

In the past, companies have attempted to ban researchers from disclosing vital information about their products. At Black Hat 2005, Cisco Systems tried to stop Michael Lynn from speaking about a vulnerability that he said could let hackers virtually shut down the Internet. However in recent years, researchers have worked with vendors to resolve issues, and some vendors have challenged hackers to attack their products.

See also

References

  1. https://www.blackhat.com/html/archives.html
  2. ^ "Computer Security Conferences Attract Both Hackers, Anti-Hackers". Fox News. 4 August 2006.
  3. http://www.blackhat.com/html/bh-about/about.html
  4. http://www.blackhat.com/html/bh-dc-09/train-bh-dc-09-index.html
  5. http://www.blackhat.com/html/bh-europe-09/train-bh-eu-09-index.html
  6. http://news.prnewswire.com/ViewContent.aspx?ACCT=109&STORY=/www/story/07-10-2009/0005057983&EDATE=
  7. "Commander of U.S. Cyber Command and National Security Agency Director, General Keith Alexander, To Keynote Day One of Black Hat USA 2013" (Press release). WWBT-TV NBC 12, WorldNow (Gannaway). May 14, 2013. Retrieved June 13, 2013.
  8. http://blogs.cisco.com/security/black_hat_usa_2009_summary/
  9. http://blogs.cisco.com/security/black_hat_usa_2010_summary1/
  10. https://www.blackhat.com/us-13/arsenal.html
  11. "Hanging with hackers can make you paranoid". CNN. 4 August 2009.
  12. "Security Expert: PC Media Players Full of Holes". Fox News. 3 August 2007.
  13. "Microsoft Dares Security Experts to Find Holes in Windows Vista". Fox News. 4 August 2006.
  14. "Microsoft Challenges Hackers On Vista". CBS News. 3 August 2006.
  15. http://www.msnbc.msn.com/id/32258426/ns/technology_and_science-security/

External links


Stub icon

This computer security article is a stub. You can help Misplaced Pages by expanding it.

Categories:
Black Hat Briefings: Difference between revisions Add topic