1. EachPod

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference - Podcast

Black Hat Briefings, Japan 2006 [Audio] Presentations from the security conference

Past speeches and talks from the Black Hat Briefings computer security conferences.
The Black Hat Briefings in Japan 2006 was held October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency was the keynote speaker. Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages.

A post convention wrap up can be found at http://www.blackhat.com/html/bh-japan-06/bh-jp-06-en-index.html

If you want to get a better idea of the presentation materials go to http://www.blackhat.com/html/bh-media-archives/bh-archives-2006.html#AS_2006 and download them. Put up the .pdfs in one window while listening the talks in the other. Almost as good as being there!

Video, audio and supporting materials from past conferences will be posted here, starting with the newest and working our way back to the oldest with new content added as available! Past speeches and talks from Black Hat in an iPod friendly .mp3 audio and.mp4 h.264 192k video format.

Technology Audio Tech News
Update frequency
every day
Average duration
70 minutes
Episodes
15
Years Active
2006
Share to:
Joanna Rutkowska: Subverting Vista Kernel For Fun And Profit (English)

Joanna Rutkowska: Subverting Vista Kernel For Fun And Profit (English)

"The presentation will first present how to generically (i.e. not relaying on any implementation bug) insert arbitrary code into the latest Vista Beta 2 kernel (x64 edition), thus effectively bypassi…
01:24:12  |   Sun 04 Jun 2006
Kenneth Geers & Alexander Eisen: IPv6 World Update:Strategy & Tactics (Japanese)

Kenneth Geers & Alexander Eisen: IPv6 World Update:Strategy & Tactics (Japanese)

"The U.S. Government has mandated that its organizations be IPv6-compliant by June 30, 2008. The Japanese government has already missed more than one IPv6 deadline. But while we can argue about sp…
01:26:00  |   Sun 04 Jun 2006
Thorsten Holz: Catching Malware to Detect, Track and Mitigate Botnets (Japanese)

Thorsten Holz: Catching Malware to Detect, Track and Mitigate Botnets (Japanese)

"Botnets pose a severe threat to the today?s Internet community. We show a solution to automatically, find, observe and shut down botnets with existing opensource tools, partially developed by us. We…
01:29:27  |   Sun 04 Jun 2006
Jeff Moss: Welcome Speech (Japanese)

Jeff Moss: Welcome Speech (Japanese)

Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency …
00:06:17  |   Sun 04 Jun 2006
Darren Bilby: Defeating Windows Forensic Analysis in the Kernel (Japanese)

Darren Bilby: Defeating Windows Forensic Analysis in the Kernel (Japanese)

"It is 4pm on a Friday, beer o'clock. You're just eyeing up your first beer and thinking about where the fish will be biting tomorrow. The phone rings, something "funny" is happening on a client's we…
00:55:26  |   Sun 04 Jun 2006
Mitsugu Okatani: Keynote: Change in the Meaning of Threat and Technology...What are the Current Trends in Japan? (Japanese)

Mitsugu Okatani: Keynote: Change in the Meaning of Threat and Technology...What are the Current Trends in Japan? (Japanese)

"As the Internet becomes a social framework, attacks and incidents with various intents have been actualized. As a result, previously unrelated organizations and groups have become actively engaged i…
01:04:21  |   Sun 04 Jun 2006
Paul Bohm: Taming Bugs: The art and science of writing secure code  (English)

Paul Bohm: Taming Bugs: The art and science of writing secure code (English)

If you give a thousand programmers the same task and the same tools, chances are a lot of the resulting programs will break on the same input. Writing secure code isn't just about avoiding bugs. Prog…
01:14:14  |   Sun 04 Jun 2006
Yuji Hoshizawa: Increasingly-sophisticated Online Swindler  (English)

Yuji Hoshizawa: Increasingly-sophisticated Online Swindler (English)

"To know various fraud schemes is important when implementing counter measures against it. During this session, the presenter will show the latest online fraud schemes. Vulnerable Internet users coul…
01:22:35  |   Sun 04 Jun 2006
Dan Moniz: Six Degrees of XSSploitation (Japanese)

Dan Moniz: Six Degrees of XSSploitation (Japanese)

Social networking sites such as MySpace have recently been the target of XSS attacks, most notably the "samy is my hero" incident in late 2005. XSS affects a wide variety of sites and back end web te…
00:51:49  |   Sun 04 Jun 2006
Jeff Moss: Welcome Speech (English)

Jeff Moss: Welcome Speech (English)

Jeff Moss Welcomes Attendess of the Black Hat Conference, October 5-6 in Tokyo at the Keio Plaza Hotel. Two days, four different tracks. Mitsugu Okatani, Joint Staff Office, J6, Japan Defense Agency …
00:07:17  |   Sun 04 Jun 2006
Scott Stender: Attacking Internationalized Software  (English)

Scott Stender: Attacking Internationalized Software (English)

"Every application, from a small blog written in PHP to an enterprise-class database, receives raw bytes, interprets these bytes as data, and uses the information to drive the behavior of the system.…
01:32:53  |   Sun 04 Jun 2006
Takayuki Sugiura: Winny P2P Security (Japanese)

Takayuki Sugiura: Winny P2P Security (Japanese)

"There have been a series of information leak incidents being happening in Japan regarding to the use of P2P file sharing softwares. But those incidents are just a tip of iceberg. There were expec…
01:42:02  |   Sun 04 Jun 2006
Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 (English)

Alex Stamos & Zane Lackey: Breaking AJAX Web Applications: Vulns 2.0 in Web 2.0 (English)

"The Internet industry is currently riding a new wave of investor and consumer excitement, much of which is built upon the promise of "Web 2.0" technologies giving us faster, more exciting, and more …
01:32:36  |   Sun 04 Jun 2006
Heikki Kortti: Input  Attack Trees (Japanese)

Heikki Kortti: Input Attack Trees (Japanese)

"By modeling all of the possible inputs of a protocol or file format as an input tree, the potential weak points of an implementation can be assessed easily and efficiently. Existing attacks can be r…
01:21:52  |   Sun 04 Jun 2006
Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous  (English)

Jeremiah Grossman: Hacking Intranet websites from the outside: Malware just got a lot more dangerous (English)

"Imagine you?re visiting a popular website and invisible JavaScript Malware steals your cookies, captures your keystrokes, and monitors every web page that you visit. Then, without your knowledge or …
01:24:26  |   Sun 04 Jun 2006
Disclaimer: The podcast and artwork embedded on this page are the property of Black Hat. This content is not affiliated with or endorsed by eachpod.com.