1. EachPod

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Japan 2005 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences. October 17-18 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Katsuya Uchida was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-05/bh-jp-05-main.html

Black Hat Briefings bring together a unique mix in security: the best minds from government agencies and global corporations with the underground's most respected hackers. These forums take place regularly in Las Vegas, Washington D.C., Amsterdam, and Tokyo.

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-media-archives/bh-archives-2005.html#asia-05 and download them. Put up the pdfs in one window while watching the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and.mp4 h.264 192k video format

Tech News Audio Technology
Update frequency
every day
Average duration
65 minutes
Episodes
14
Years Active
2006
Share to:
Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) (English)

Kenneth Geers: Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) (English)

"Has your network ever been hacked, and all you have to show for your investigative efforts is an IP address belonging to an ISP in Irkutsk? Are you tired of receiving e-mails from Citibank that reso…
01:27:12  |   Tue 31 Oct 2006
Jeremiah Grossman: Phishing with Super Bait (English)

Jeremiah Grossman: Phishing with Super Bait (English)

"The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. It?s imperative that security professionals familiarize themselves with these new threats to protect th…
01:05:44  |   Tue 31 Oct 2006
Hideaki Ihara: Forensics in Japan (Japanese)

Hideaki Ihara: Forensics in Japan (Japanese)

"In forensic research it is imperative to search for Japanese language strings. However many of the tools used in forensic research are being developed outside of Japan, and therefore not tuned for t…
01:20:44  |   Tue 31 Oct 2006
Jeff Moss: Closing Speech (English )

Jeff Moss: Closing Speech (English )

Closing ceremonies and speech given by Jeff Moss.
00:08:32  |   Tue 31 Oct 2006
Satoru Koyama: Botnet survey result.

Satoru Koyama: Botnet survey result. "Our security depends on your security." (Japanese)

"Many of the various attacking mechanism such as spam email, DDoS that are attacking the internet as whole in recent years can be attributed to Botnets. However there is not much information on thes…
01:18:14  |   Tue 31 Oct 2006
David Maynor: Architecture Flaws in Common Security Tools (English)

David Maynor: Architecture Flaws in Common Security Tools (English)

"Look at your new device! It has a great case, plenty of buttons, and those blue LEDs - wow! But when you strip away the trappings of modern artistic design, what does it really do and how does it he…
01:09:42  |   Tue 31 Oct 2006
Ejovi Nuwere: The Art of SIP fuzzing and Vulnerabilities Found in VoIP (English)

Ejovi Nuwere: The Art of SIP fuzzing and Vulnerabilities Found in VoIP (English)

"This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities and audit engagements we will give a technical understanding of this emerging technol…
00:50:13  |   Tue 31 Oct 2006
Michael Sutton and Adam Greene: The Art of File Format Fuzzing (English)

Michael Sutton and Adam Greene: The Art of File Format Fuzzing (English)

"In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself was noth…
00:49:04  |   Tue 31 Oct 2006
Katsuya Uchida: Keynote: The Day After... (Japanese)

Katsuya Uchida: Keynote: The Day After... (Japanese)

"ARPANET was established in 1968. In 1971, "creeper"programmed by Bob Thomas moved from computer to computer on ARPANET and displayed on each user's screen "I'm the creeper. Catch me if you can!". Xe…
01:09:15  |   Tue 31 Oct 2006
Dominique Brezinski: A Paranoid Perspective of an Interpreted Language (English)

Dominique Brezinski: A Paranoid Perspective of an Interpreted Language (English)

"Interpreted, dynamically-typed, and object-oriented languages like Ruby and Python are very good for many programming task in my opinion. Such languages have many benefits from rapid, easy developme…
01:16:22  |   Tue 31 Oct 2006
Dan Kaminsky: Black Ops Of TCP/IP 2005 (English)

Dan Kaminsky: Black Ops Of TCP/IP 2005 (English)

"Our networks are growing. Is our understanding of them? This talk will focus on the monitoring and defense of very large scale networks, describing mechanisms for actively probing them and systems t…
01:21:18  |   Tue 31 Oct 2006
Sherri Sparks and Jamie Butler:

Sherri Sparks and Jamie Butler: "Shadow Walker" Raising The Bar For Rootkit Detection (English)

"Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach to hiding not previously seen before in a Windows rootkit. Rather than patching code or modifying function point…
00:53:33  |   Tue 31 Oct 2006
Chris Hurley: Identifying and Responding to Wireless Attacks (English)

Chris Hurley: Identifying and Responding to Wireless Attacks (English)

"This presentation details the methods attackers utilize to gain access to wireless networks and their attached resources. Examples of the traffic that typifies each attack are shown and discussed, p…
01:04:09  |   Tue 31 Oct 2006
Saumil Shah and Dave Cole: Adware/Spyware (English)

Saumil Shah and Dave Cole: Adware/Spyware (English)

"The Business * Timeline?how did we get into this mess? * The players * How their business works * Legislative environment The Technology * Technical overview of different typ…
01:19:31  |   Tue 31 Oct 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.