Latest Blackhat japan 2004 Podcast Episodes

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Charl van der Walt: When the Tables Turn (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk we will highlight techniques (and tools) that can be used to turn the tables on prospective attack...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Charl van der Walt: When the Tables Turn (Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk we will highlight techniques (and tools) that can be used to turn the tables on prospective attack...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not t...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Chris Eagle: Attacking Obfuscated Code with IDA Pro-(Partial Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 32 minutes
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not t...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 51 minutes
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is considered to reduce the vulnerability found in network LM and NTLM v1 authentication. In this sessi...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 53 minutes
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is considered to reduce the vulnerability found in network LM and NTLM v1 authentication. In this sessi...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

David Litchfield: Oracle PLSQL Injection ( English )

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 54 minutes
"David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognised by Information Security Magazine who voted him as 'The World's Best Bug Hunter' for 2003. To date, David has found over 150 vulnerabilities in many of ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Gerhard Eschelbeck: The Laws of Vulnerabilities (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"New vulnerabilities to networks are discovered and published on a daily base. With each such announcement, the same questions arise. How significant is this vulnerability? How prevalent is this vulnerability? How easy is this vulnerability to exploit? Are any of my systems affected by this vul...


Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Jeff Moss and Panel: Welcome Speech and Security Panel (English )

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
Jeff Moss welcomes delegates of the 2004 BlackHat Japan conference and introduces a panel of security experts for a Q&A.



Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Joe Grand: Understanding the Hardware Security (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Joe Grand: Understanding the Hardware Security (Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Johnny Long: You Got that with Google?(English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing resul...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Johnny Long: You Got that With Google? (Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing resul...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Raisuke Miyawaki: Keynote Speech (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 48 minutes
" * Chairman, Ochanomizu Associates, Tokyo, Japan * Senior Advisor, Commission on Japanese Critical Infrastructure Protection * Research Counselor and Trustee, Institute for International Policy Studies, Tokyo * Vice President, Japan Forum for Strategic Studies Mr. Miyawaki is Ja...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Riley "Caezar" Eller: Capture the Flag Games: Measuring Skill with Hacking Contests (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 1 hour
"With the cost of security experts increasing each year, it is expensive to audit critical systems as often as is needed. Worse yet, it is difficult to know how much to trust the reports since the worst consultants give the most positive answers. In order to address this problem, Caezar proposes ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 2 hours
"Security professionals see the compromise of networked systems on a day to day basis. It's something they've come to expect. The blatant exploitation of operating systems, applications, and configurations is a common event and is taken into account by most security engineers. But a different typ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 52 minutes
"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distributed systems as Ph.D. student at Waseda university. He is also a founder and CEO of Mellowtone inc. ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 51 minutes
"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distributed systems as Ph.D. student at Waseda university. He is also a founder and CEO of Mellowtone inc. ...

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference artwork

Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese)

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - October 31, 2006 23:10 - 41 minutes
"In the case of vulnerabilities which allow the execution of arbitrary machine code, the reliability of exploitation is swayed by the type of vulnerability, the conditions surrounding the vulnerable code, and the attack vector, among other considerations. The reliability of exploitation an import...

Related Blackhat japan 2004 Topics