Latest Blackhat tokyo Podcast Episodes

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of "Web 2.0" technologies giving us faster, more exciting, and more useful web applications. One of the fundamental "Web 2.0" is known as Asynchronous JavaScript and...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Dan Moniz: Six Degrees of XSSploitation (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 51 minutes
Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the "samy is my hero" incident in late 2005. XSS affects a wide variety of sites and back end web technologies, but there are perhaps no more interesting targets than massively popular sites with vi...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Darren Bilby: Defeating Windows Forensic Analysis in the Kernel (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 55 minutes
"It is 4pm on a Friday, beer o'clock. You're just eyeing up your first beer and thinking about where the fish will be biting tomorrow. The phone rings, something "funny" is happening on a client's web server. A lot of money passes through the server and it looks like it could be serious. IDS on t...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Heikki Kortti: Input Attack Trees (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"By modeling all of the possible inputs of a protocol or file format as an input tree, the potential weak points of an implementation can be assessed easily and efficiently. Existing attacks can be reused for similar structures and datatypes, and any complex or susceptible areas can be focused on...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Jeff Moss: Welcome Speech (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 7 minutes
Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker.

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Jeff Moss: Welcome Speech (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 6 minutes
Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker.

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"Imagine you?re visiting a popular website and invisible JavaScript Malware steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowledge or consent, your web browser is silently hijacked to transfer out bank funds, hack other websites, or...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Joanna Rutkowska: Subverting Vista Kernel For Fun And Profit (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassing the (in)famous Vista policy for allowing only digitally singed code to be loaded into kernel. T...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Kenneth Geers & Alexander Eisen: IPv6 World Update:Strategy & Tactics (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"The U.S. Government has mandated that its organizations be IPv6-compliant by June 30, 2008. The Japanese government has already missed more than one IPv6 deadline. But while we can argue about specific dates for compliance and deployment, there is no question but that your organization must b...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Mitsugu Okatani: Keynote: Change in the Meaning of Threat and Technology...What are the Current Trends in Japan? (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"As the Internet becomes a social framework, attacks and incidents with various intents have been actualized. As a result, previously unrelated organizations and groups have become actively engaged in discussions regarding threats and technology. In addition, they have begun to approach and activ...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Paul Bohm: Taming Bugs: The art and science of writing secure code (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Programming is as much about People as it is about Code and Techniques. This talk will look deeper, be...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Scott Stender: Attacking Internationalized Software (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the system. Internationalization support, which stretches from character representation to units of measureme...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Takayuki Sugiura: Winny P2P Security (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"There have been a series of information leak incidents being happening in Japan regarding to the use of P2P file sharing softwares. But those incidents are just a tip of iceberg. There were expected to be tens of thousands of incidents that even not reported in the news. P2P file sharing sof...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Thorsten Holz: Catching Malware to Detect, Track and Mitigate Botnets (Japanese)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"Botnets pose a severe threat to the today?s Internet community. We show a solution to automatically, find, observe and shut down botnets with existing opensource tools, partially developed by us. We start with a discussion of a technique to automatically collect bots with the help of the tool ne...

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference artwork

Yuji Hoshizawa: Increasingly-sophisticated Online Swindler (English)

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - June 04, 2006 23:10 - 1 hour
"To know various fraud schemes is important when implementing counter measures against it. During this session, the presenter will show the latest online fraud schemes. Vulnerable Internet users could easily be captured in the traps of which set up by criminals who take increasingly sophisticated...

Related Blackhat tokyo Topics