Overview
Explore the intersection of economics, physics, psychology, and technical aspects of counter intelligence in this Black Hat USA 2005 conference talk. Delve into topics such as Kerberos, authentication protocols, SSH, TFTP, and learned helplessness. Examine the perspectives of notable figures like Robert Hansen and Bruce Schneier on internet security, client-server relationships, and security perimeters. Gain insights into interactive risk assessment and the role of various programming languages in cybersecurity. Discover how these diverse fields contribute to a comprehensive understanding of modern counter intelligence techniques and challenges.
Syllabus
Intro
Welcome
Mud
Simple Nomad
Kerberos
Authentication protocols
SSH
TFTP
Learned helplessness
advisories
initial spin
Psych
Robert Hansen
Bruce Schneier
The Internet
Clients Servers
Vern Paxson
Security Perimeter
Interactive Risk
Languages
Taught by
Black Hat