1. EachPod

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-archives-2004.html#Asia-2004 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly.mp3 audio and.mp4 h.264 192k video format.

Technology Audio Tech News
Update frequency
every day
Average duration
65 minutes
Episodes
22
Years Active
2006
Share to:
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (Japanese)

Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (Japanese)

"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distribut…
00:51:46  |   Tue 31 Oct 2006
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English)

Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English)

"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distribut…
00:52:21  |   Tue 31 Oct 2006
Raisuke Miyawaki: Keynote Speech (English)

Raisuke Miyawaki: Keynote Speech (English)

" * Chairman, Ochanomizu Associates, Tokyo, Japan * Senior Advisor, Commission on Japanese Critical Infrastructure Protection * Research Counselor and Trustee, Institute for International …
00:48:17  |   Tue 31 Oct 2006
Riley

Riley "Caezar" Eller: Capture the Flag Games: Measuring Skill with Hacking Contests (English)

"With the cost of security experts increasing each year, it is expensive to audit critical systems as often as is needed. Worse yet, it is difficult to know how much to trust the reports since the wo…
01:24:38  |   Tue 31 Oct 2006
Joe Grand: Understanding the Hardware Security (Japanese)

Joe Grand: Understanding the Hardware Security (Japanese)

"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized net…
01:28:17  |   Tue 31 Oct 2006
Hisamichi Okamura: Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws(Japanese)

Hisamichi Okamura: Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws(Japanese)

Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws
00:47:48  |   Tue 31 Oct 2006
Jeff Moss: Closing Speech (Japanese)

Jeff Moss: Closing Speech (Japanese)

Closing ceremonies and speech given by Jeff Moss.
00:06:08  |   Tue 31 Oct 2006
Jeff Moss: Closing Speech ( English)

Jeff Moss: Closing Speech ( English)

Closing ceremonies and speech given by Jeff Moss.
00:06:15  |   Tue 31 Oct 2006
Chris Eagle: Attacking Obfuscated Code with IDA Pro-(Partial Japanese)

Chris Eagle: Attacking Obfuscated Code with IDA Pro-(Partial Japanese)

"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use o…
00:32:28  |   Tue 31 Oct 2006
David Litchfield: Oracle PLSQL Injection ( English )

David Litchfield: Oracle PLSQL Injection ( English )

"David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognised by Information Security Magazine who voted him as 'Th…
00:54:21  |   Tue 31 Oct 2006
Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English)

Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English)

"Security professionals see the compromise of networked systems on a day to day basis. It's something they've come to expect. The blatant exploitation of operating systems, applications, and configur…
02:24:57  |   Tue 31 Oct 2006
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (Japanese)

Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (Japanese)

"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is co…
00:53:03  |   Tue 31 Oct 2006
Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese)

Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese)

"In the case of vulnerabilities which allow the execution of arbitrary machine code, the reliability of exploitation is swayed by the type of vulnerability, the conditions surrounding the vulnerable …
00:41:58  |   Tue 31 Oct 2006
Charl van der Walt: When the Tables Turn (Japanese)

Charl van der Walt: When the Tables Turn (Japanese)

"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk …
01:31:56  |   Tue 31 Oct 2006
Charl van der Walt: When the Tables Turn (English)

Charl van der Walt: When the Tables Turn (English)

"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk …
01:32:09  |   Tue 31 Oct 2006
Jeff Moss and Panel: Welcome Speech and Security Panel (English )

Jeff Moss and Panel: Welcome Speech and Security Panel (English )

Jeff Moss welcomes delegates of the 2004 BlackHat Japan conference and introduces a panel of security experts for a Q & A.
01:13:49  |   Tue 31 Oct 2006
Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English)

Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English)

"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use o…
01:30:23  |   Tue 31 Oct 2006
Gerhard Eschelbeck: The Laws of Vulnerabilities (English)

Gerhard Eschelbeck: The Laws of Vulnerabilities (English)

"New vulnerabilities to networks are discovered and published on a daily base. With each such announcement, the same questions arise. How significant is this vulnerability? How prevalent is this vul…
01:22:25  |   Tue 31 Oct 2006
Johnny Long: You Got that With Google? (Japanese)

Johnny Long: You Got that With Google? (Japanese)

"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer ove…
01:28:17  |   Tue 31 Oct 2006
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)

Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)

"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is co…
00:51:51  |   Tue 31 Oct 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.