Podcasts by Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.

Further podcasts by Jeff Moss

Podcast on the topic Technologie

All episodes

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Katsuya Uchida: Keynote: The Day After... (Japanese) from 2006-10-31T16:10:19

"ARPANET was established in 1968. In 1971,"creeper"programmed by Bob Thomas moved from computer to computer on ARPANET and displayed on each user's screen"I'm the creeper. Catch me if you can!". Xe...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Dominique Brezinski: A Paranoid Perspective of an Interpreted Language (English) from 2006-10-31T16:10:19

"Interpreted, dynamically-typed, and object-oriented languages like Ruby and Python are very good for many programming task in my opinion. Such languages have many benefits from rapid, easy develop...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) (English) from 2006-10-31T16:10:19

"Has your network ever been hacked, and all you have to show for your investigative efforts is an IP address belonging to an ISP in Irkutsk? Are you tired of receiving e-mails from Citibank that re...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Jeremiah Grossman: Phishing with Super Bait (English) from 2006-10-31T16:10:19

"The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It?s imperative that security professionals familiarize themselves with these new threats to protect ...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Chris Hurley: Identifying and Responding to Wireless Attacks (English) from 2006-10-31T16:10:19

"This presentation details the methods attackers utilize to gain access to wireless networks and their attached resources. Examples of the traffic that typifies each attack are shown and discussed,...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Hideaki Ihara: Forensics in Japan (Japanese) from 2006-10-31T16:10:19

"In forensic research it is imperative to search for Japanese language strings. However many of the tools used in forensic research are being developed outside of Japan, and therefore not tuned for...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Dan Kaminsky: Black Ops Of TCP/IP 2005 (English) from 2006-10-31T16:10:19

"Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Satoru Koyama: Botnet survey result."Our security depends on your security."(Japanese) from 2006-10-31T16:10:19

"Many of the various attacking mechanism such as spam email, DDoS that are attacking the internet as whole in recent years can be attributed to Botnets. However there is not much information on th...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
David Maynor: Architecture Flaws in Common Security Tools (English) from 2006-10-31T16:10:19

"Look at your new device! It has a great case, plenty of buttons, and those blue LEDs - wow! But when you strip away the trappings of modern artistic design, what does it really do and how does it ...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Jeff Moss: Closing Speech (English ) from 2006-10-31T16:10:19

Closing ceremonies and speech given by Jeff Moss.

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Ejovi Nuwere: The Art of SIP fuzzing and Vulnerabilities Found in VoIP (English) from 2006-10-31T16:10:19

"This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities and audit engagements we will give a technical understanding of this emerging techn...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Saumil Shah and Dave Cole: Adware/Spyware (English) from 2006-10-31T16:10:19

"The Business * Timeline?how did we get into this mess?* The players * How their business works* Legislative environment The Technology* Technical overview of different types of programs...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Sherri Sparks and Jamie Butler:"Shadow Walker"Raising The Bar For Rootkit Detection (English) from 2006-10-31T16:10:19

"Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than patching code or modifying function poi...

Listen
Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference
Michael Sutton and Adam Greene: The Art of File Format Fuzzing (English) from 2006-10-31T16:10:19

"In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was no...

Listen