Podcasts by Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.

Further podcasts by Jeff Moss

Podcast on the topic Technologie

All episodes

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Jeff Moss: Closing Speech ( English) from 2006-10-31T16:10:19

Closing ceremonies and speech given by Jeff Moss.

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English) from 2006-10-31T16:10:19

"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distrib...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English) from 2006-10-31T16:10:19

"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distrib...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English) from 2006-10-31T16:10:19

"Virtually every virus and worm that circulates the Internet today is""protected""by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use o...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English) from 2006-10-31T16:10:19

"Virtually every virus and worm that circulates the Internet today is""protected""by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use o...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Riley"Caezar"Eller: Capture the Flag Games: Measuring Skill with Hacking Contests (English) from 2006-10-31T16:10:19

"With the cost of security experts increasing each year, it is expensive to audit critical systems as often as is needed. Worse yet, it is difficult to know how much to trust the reports since the ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Gerhard Eschelbeck: The Laws of Vulnerabilities (English) from 2006-10-31T16:10:19

"New vulnerabilities to networks are discovered and published on a daily base. With each such announcement, the same questions arise. How significant is this vulnerability? How prevalent is this v...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Joe Grand: Understanding the Hardware Security (English) from 2006-10-31T16:10:19

"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized n...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Joe Grand: Understanding the Hardware Security (English) from 2006-10-31T16:10:19

"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized n...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
David Litchfield: Oracle PLSQL Injection ( English ) from 2006-10-31T16:10:19

"David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognised by Information Security Magazine who voted him as'T...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Johnny Long: You Got that with Google?(English) from 2006-10-31T16:10:19

"This presentation explores the explosive growth of a technique known as""Google Hacking"". When the modern security landscape includes such heady topics as""blind SQL injection""and""integer overf...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Johnny Long: You Got that with Google?(English) from 2006-10-31T16:10:19

"This presentation explores the explosive growth of a technique known as""Google Hacking"". When the modern security landscape includes such heady topics as""blind SQL injection""and""integer overf...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Raisuke Miyawaki: Keynote Speech (English) from 2006-10-31T16:10:19

"* Chairman, Ochanomizu Associates, Tokyo, Japan * Senior Advisor, Commission on Japanese Critical Infrastructure Protection* Research Counselor and Trustee, Institute for International Policy ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Hisamichi Okamura: Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws(Japanese) from 2006-10-31T16:10:19

Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English) from 2006-10-31T16:10:19

"Security professionals see the compromise of networked systems on a day to day basis. It's something they've come to expect. The blatant exploitation of operating systems, applications, and config...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English) from 2006-10-31T16:10:19

"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English) from 2006-10-31T16:10:19

"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese) from 2006-10-31T16:10:19

"In the case of vulnerabilities which allow the execution of arbitrary machine code, the reliability of exploitation is swayed by the type of vulnerability, the conditions surrounding the vulnerabl...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Charl van der Walt: When the Tables Turn (English) from 2006-10-31T16:10:19

"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls&electrifying those fences! During this talk ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Charl van der Walt: When the Tables Turn (English) from 2006-10-31T16:10:19

"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls&electrifying those fences! During this talk ...

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Jeff Moss: Closing Speech (Japanese) from 2006-10-31T16:10:19

Closing ceremonies and speech given by Jeff Moss.

Listen
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference
Jeff Moss: Closing Speech ( English) from 2006-10-31T16:10:19

Closing ceremonies and speech given by Jeff Moss.

Listen