{"id":6786,"date":"2011-03-16T19:49:02","date_gmt":"2011-03-16T18:49:02","guid":{"rendered":"https:\/\/www.corelan.be\/?p=6786"},"modified":"2011-03-16T19:49:02","modified_gmt":"2011-03-16T18:49:02","slug":"blackhat-europe-2011-preview","status":"publish","type":"post","link":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/","title":{"rendered":"BlackHat Europe 2011 \/ Preview"},"content":{"rendered":"<p>&#160;<\/p>\n<h3>Things change.<\/h3>\n<p>11 months have passed since a lot of people found themselves trapped all over Europe (including Barcelona) because of a little volcano ash cloud thingy. <\/p>\n<p>This is 2011. <\/p>\n<p>This time BlackHat anticipated and outsmarted nature by rescheduling the Europe briefings to march (instead of april). Hah, even if someone in Japan decided to inject a radio-active cloud into the atmosphere, it still wouldn\u2019t get here in time.&#160; We should be safe, right ?<\/p>\n<p>Timing\/Schedule isn\u2019t the only thing that has changed.&#160;&#160; Apparently somebody at BlackHat HQ decided to get a bit creative\u2026&#160; Check out the image of a \u201cbull\u201d on a banner next to the con entry door : <\/p>\n<p><a class=\"thickbox\" href=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/160320117252.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-bottom: 0px; border-left: 0px; margin: 7px; padding-left: 0px; padding-right: 0px; display: inline; border-top: 0px; border-right: 0px; padding-top: 0px\" title=\"16032011725\" border=\"0\" alt=\"16032011725\" src=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg\" width=\"356\" height=\"267\" \/><\/a><\/p>\n<p>Wow- fine piece of art. You can check out the other images too on the BlackHat website :<\/p>\n<p><a class=\"thickbox\" href=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/image.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-bottom: 0px; border-left: 0px; margin: 7px; padding-left: 0px; padding-right: 0px; display: inline; border-top: 0px; border-right: 0px; padding-top: 0px\" title=\"image\" border=\"0\" alt=\"image\" src=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/image_thumb.png\" width=\"157\" height=\"179\" \/><\/a><\/p>\n<p>What else has changed ? <\/p>\n<p>Last year, the BlackHat bags were blue. This year, they are black.&#160; Color is not that important, and after all, this is BlackHat, not BlackBag or BlueBag\u2026<\/p>\n<p>Unfortunately, after looking at the contents of the bag, I got the impression Europe has got the leftovers from BH DC 2011 (which was held earlier this year)\u2026. The program guide in the bag is the one from BH DC, not the one from BH Europe.&#160; Anyways, that\u2019s not really a problem, and I\u2019m not trying to be negative or anything. I\u2019m just saying.<\/p>\n<p>So far, the changes makes sense\u2026&#160; that is, until I received my badge at the registration desk a few hours ago (wednesday evening).<\/p>\n<p>It\u2019s pink.&#160; I didn\u2019t see that one coming. Okay, apparently I broke the registration system (they had to print my badge a couple of times until it looked the way we wanted \u2013 looks like it didn\u2019t like \u2018corelanc0d3r\u2019 in one of their records), but pink\u2026 seriously guys \ud83d\ude42<\/p>\n<p>As _sinn3r said : \u201cPink is the new black\u201d ! <\/p>\n<p>Or..\u2026 Oh\u2026 Now I know\u2026 Maybe it\u2019s pink because they knew my wife &amp; little girl are joining me on this trip\u2026&#160; \ud83d\ude42<\/p>\n<p><a class=\"thickbox\" href=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011728.jpg\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; border-bottom: 0px; border-left: 0px; margin: 7px; padding-left: 0px; padding-right: 0px; display: inline; border-top: 0px; border-right: 0px; padding-top: 0px\" title=\"16032011728\" border=\"0\" alt=\"16032011728\" src=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011728_thumb.jpg\" width=\"180\" height=\"240\" \/><\/a>&#160;<\/p>\n<p>&#160;<\/p>\n<h3>Tracks<\/h3>\n<p>The conference has 3 tracks, and one of those 3 tracks are workshops (track \u201cApplied Knowledge\u201d), which is a good evolution I think.&#160; The other 2 tracks are grouped into 4 topics :<\/p>\n<p>Day 1 : Core Attacks and Application Dissection<\/p>\n<p>Day 2 : Infrastructure Rationale and Chip &amp; Code<\/p>\n<p>&#160;<\/p>\n<p>Before leaving for Barcelona this morning, I went through the <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-schedule.html\">schedules<\/a>, and picked a couple of talks I would like to attend. I\u2019ll use 2 posts (tomorrow and on saturday) to share my impressions\/conclusions, so stay tuned.<\/p>\n<p>My schedule looks like this :<\/p>\n<h3>Thursday (Day 1) :<\/h3>\n<p>[Core Attacks] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Dhanjani\">New Age Attacks Against Apple\u2019s iOS (and Countermeasures)<\/a> \/ Nitesh Dhanjani<\/p>\n<p>[Core Attacks] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Keetch\">Escaping from Microsoft Windows Sandboxes<\/a> \/ Tom Keetch<\/p>\n<p>[Application Dissection] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Riancho\">Web Application Payloads<\/a> \/ Andr\u00e9s Riancho<\/p>\n<p>[Application Dissection] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Siles\">SAP : Session (Fixation) Attacks and Protections (in Wep Applications)<\/a> \/ Raul Siles<\/p>\n<p>[Core Attacks] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Valasek\">Exploitation in the Modern Era<\/a> \/ Chris Valasek &amp; Ryan Smith<\/p>\n<p>[Keynote] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Schneier\">CyberWar<\/a> (Bruce Schneier)<\/p>\n<p>&#160;<\/p>\n<h3>Friday (Day 2) :<\/h3>\n<p>[Infrastructure Rationale] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Ortega\">Fuzzing and Debugging Cisco IOS<\/a> \/ Sebastian Muniz &amp; Alfredo Ortega<\/p>\n<p>[Chip and Code] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Parker\">Stuxnet Redux: Malware Attribution &amp; Lessons Learned<\/a> \/ Tom Parker<\/p>\n<p>[Chip and Code] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Lindner\">Building Custom Disassemblers<\/a> \/ Felix \u2018FX\u2019 Lindner<\/p>\n<p>[Infrastructure Rationale] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Gushin\">Building Floodgates: Cutting-Edge Denial of Service Mitigation<\/a> \/ Yuri Gushin &amp; Alex Behar<\/p>\n<p>[Infrastructure Rationale] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Criscione\">You are Doing it Wrong: Failures in Virtualization Systems<\/a> \/&#160; Claudio Criscione<\/p>\n<p>[Chip and Code] - <a href=\"http:\/\/blackhat.com\/html\/bh-eu-11\/bh-eu-11-briefings.html#Geffner\">Exporting Non-Exportable RSA Keys<\/a> \/ Jason Geffner<\/p>\n<p>&#160;<\/p>\n<p>So, if you want to hang out, you\u2019ll know where to find me\u2026 Just look out for the dude in the <a href=\"http:\/\/www.cafepress.com\/CorelanTeam.457348953\">Corelan T-Shirt<\/a> \ud83d\ude42<\/p>\n<p>&#160;<\/p>\n<h3>C y\u2019all tomorrow\u2026<\/h3>\n<p>\u2026 and I really hope at least the front row seats will have power cord this time. That would make a lot of people\/bloggers like me very happy !<\/p>\n<p>Finally, quick \u201ctip of the day\u201d : If you talk with someone who is not a native english speaker, and if that person tells you to \u201cfuck us\u201d\u2026 then note that he probably mean you have to \u201cfocus\u201d. Could be a nuclear radiation issue or so\u2026 dunno<\/p>\n<p>Cheers<\/p>\n<hr \/>\n","protected":false},"excerpt":{"rendered":"<p>Things change.<br \/>\n11 months have passed since a lot of people found themselves trapped all over Europe (including Barcelona) because of a little volcano ash cloud thingy. <\/p>\n<p>This is 2011. <\/p>\n<p>This time BlackHat anticipated and outsmarted nature by rescheduling the Europe briefings to march (instead of april).<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[2250,127],"tags":[2681],"class_list":["post-6786","post","type-post","status-publish","format-standard","hentry","category-cons-seminars","category-security","tag-blackhat"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>BlackHat Europe 2011 \/ Preview - Corelan | Exploit Development &amp; Vulnerability Research<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"BlackHat Europe 2011 \/ Preview - Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"og:description\" content=\"Things change. 11 months have passed since a lot of people found themselves trapped all over Europe (including Barcelona) because of a little volcano ash cloud thingy.  This is 2011.  This time BlackHat anticipated and outsmarted nature by rescheduling the Europe briefings to march (instead of april).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/\" \/>\n<meta property=\"og:site_name\" content=\"Corelan | Exploit Development &amp; Vulnerability Research\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/corelanconsulting\" \/>\n<meta property=\"article:published_time\" content=\"2011-03-16T18:49:02+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg\" \/>\n<meta name=\"author\" content=\"corelanc0d3r\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@corelanc0d3r\" \/>\n<meta name=\"twitter:site\" content=\"@corelanc0d3r\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"TechArticle\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/\"},\"author\":{\"name\":\"corelanc0d3r\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\"},\"headline\":\"BlackHat Europe 2011 \\\/ Preview\",\"datePublished\":\"2011-03-16T18:49:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/03\\\/16032011725_thumb2.jpg\",\"keywords\":[\"blackhat\"],\"articleSection\":[\"Cons and Seminars\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/\",\"name\":\"BlackHat Europe 2011 \\\/ Preview - Corelan | Exploit Development &amp; Vulnerability Research\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/03\\\/16032011725_thumb2.jpg\",\"datePublished\":\"2011-03-16T18:49:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#primaryimage\",\"url\":\"http:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/03\\\/16032011725_thumb2.jpg\",\"contentUrl\":\"http:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2011\\\/03\\\/16032011725_thumb2.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/2011\\\/03\\\/16\\\/blackhat-europe-2011-preview\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.corelan.be\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"BlackHat Europe 2011 \\\/ Preview\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#website\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"name\":\"Corelan CyberSecurity Research\",\"description\":\"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.corelan.be\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#organization\",\"name\":\"Corelan CyberSecurity Research\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"contentUrl\":\"https:\\\/\\\/www.corelan.be\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/corelanlogo2_small-20.png\",\"width\":200,\"height\":200,\"caption\":\"Corelan CyberSecurity Research\"},\"image\":{\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/corelanconsulting\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\",\"https:\\\/\\\/x.com\\\/corelanconsulting\",\"https:\\\/\\\/instagram.com\\\/corelanconsult\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.corelan.be\\\/#\\\/schema\\\/person\\\/3be5542b9b0a0787893db83a5ad68e8f\",\"name\":\"corelanc0d3r\",\"pronouns\":\"he\\\/him\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x\",\"caption\":\"corelanc0d3r\"},\"description\":\"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.\",\"sameAs\":[\"https:\\\/\\\/www.corelan-training.com\",\"https:\\\/\\\/instagram.com\\\/corelanc0d3r\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/petervaneeckhoutte\\\/\",\"https:\\\/\\\/x.com\\\/corelanc0d3r\"],\"url\":\"https:\\\/\\\/www.corelan.be\\\/index.php\\\/author\\\/admin0\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"BlackHat Europe 2011 \/ Preview - Corelan | Exploit Development &amp; Vulnerability Research","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/","og_locale":"en_US","og_type":"article","og_title":"BlackHat Europe 2011 \/ Preview - Corelan | Exploit Development &amp; Vulnerability Research","og_description":"Things change. 11 months have passed since a lot of people found themselves trapped all over Europe (including Barcelona) because of a little volcano ash cloud thingy.  This is 2011.  This time BlackHat anticipated and outsmarted nature by rescheduling the Europe briefings to march (instead of april).","og_url":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/","og_site_name":"Corelan | Exploit Development &amp; Vulnerability Research","article_publisher":"https:\/\/www.facebook.com\/corelanconsulting","article_published_time":"2011-03-16T18:49:02+00:00","og_image":[{"url":"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg","type":"","width":"","height":""}],"author":"corelanc0d3r","twitter_card":"summary_large_image","twitter_creator":"@corelanc0d3r","twitter_site":"@corelanc0d3r","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"TechArticle","@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#article","isPartOf":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/"},"author":{"name":"corelanc0d3r","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f"},"headline":"BlackHat Europe 2011 \/ Preview","datePublished":"2011-03-16T18:49:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#primaryimage"},"thumbnailUrl":"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg","keywords":["blackhat"],"articleSection":["Cons and Seminars","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/","url":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/","name":"BlackHat Europe 2011 \/ Preview - Corelan | Exploit Development &amp; Vulnerability Research","isPartOf":{"@id":"https:\/\/www.corelan.be\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#primaryimage"},"image":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#primaryimage"},"thumbnailUrl":"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg","datePublished":"2011-03-16T18:49:02+00:00","breadcrumb":{"@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#primaryimage","url":"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg","contentUrl":"http:\/\/www.corelan.be\/wp-content\/uploads\/2011\/03\/16032011725_thumb2.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.corelan.be\/index.php\/2011\/03\/16\/blackhat-europe-2011-preview\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.corelan.be\/"},{"@type":"ListItem","position":2,"name":"BlackHat Europe 2011 \/ Preview"}]},{"@type":"WebSite","@id":"https:\/\/www.corelan.be\/#website","url":"https:\/\/www.corelan.be\/","name":"Corelan CyberSecurity Research","description":"Corelan publishes in-depth tutorials on exploit development, Windows exploitation, vulnerability research, heap internals, reverse engineering and security tooling used by professionals worldwide.","publisher":{"@id":"https:\/\/www.corelan.be\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.corelan.be\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.corelan.be\/#organization","name":"Corelan CyberSecurity Research","url":"https:\/\/www.corelan.be\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/","url":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","contentUrl":"https:\/\/www.corelan.be\/wp-content\/uploads\/2026\/03\/corelanlogo2_small-20.png","width":200,"height":200,"caption":"Corelan CyberSecurity Research"},"image":{"@id":"https:\/\/www.corelan.be\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/corelanconsulting","https:\/\/x.com\/corelanc0d3r","https:\/\/x.com\/corelanconsulting","https:\/\/instagram.com\/corelanconsult"]},{"@type":"Person","@id":"https:\/\/www.corelan.be\/#\/schema\/person\/3be5542b9b0a0787893db83a5ad68e8f","name":"corelanc0d3r","pronouns":"he\/him","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","url":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3783bed6acd72d7fa5bb2387d88acbb9a3403e7cada60b2037e1cbb74ad451f9?s=96&d=mm&r=x","caption":"corelanc0d3r"},"description":"Peter Van Eeckhoutte is the founder of Corelan and a globally recognized expert in exploit development and vulnerability research. With over two decades in IT security, he built Corelan into a respected platform for deep technical research, hands-on training, and knowledge sharing. Known for his influential exploit development tutorials, tools, and real-world training, Peter combines a strong research mindset with a passion for education\u2014helping security professionals understand not just how exploits work, but why.","sameAs":["https:\/\/www.corelan-training.com","https:\/\/instagram.com\/corelanc0d3r","https:\/\/www.linkedin.com\/in\/petervaneeckhoutte\/","https:\/\/x.com\/corelanc0d3r"],"url":"https:\/\/www.corelan.be\/index.php\/author\/admin0\/"}]}},"views":1989,"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/6786","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/comments?post=6786"}],"version-history":[{"count":0,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/posts\/6786\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/media?parent=6786"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/categories?post=6786"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.corelan.be\/index.php\/wp-json\/wp\/v2\/tags?post=6786"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}