Past speeches and talks from the Black Hat Briefings computer security conferences. Black Hat Briefings Japan 2004 was held October 14-15 in Tokyo at the at the Tokyo International Exchange Center. Two days, two tracks. Raisuke Miyawaki was the keynote speaker.Some speeches are translated in English and Japanese. Unfortunately at this time speeches are not available in Both languages. A post convention wrap up can be found at http://www.blackhat.com/html/bh-asia-04/bh-jp-04-index.html Black ...
…
continue reading
Closing ceremonies and speech given by Jeff Moss.By Jeff Moss
…
continue reading
Closing ceremonies and speech given by Jeff Moss.By Jeff Moss
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Charl van der Walt: When the Tables Turn (English)
1:32:09
1:32:09
Play later
Play later
Lists
Like
Liked
1:32:09
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk we will highlight techniques (and tools) that can be used to turn the tables on prospective attackers with passive-Strike-Back. We will explore the pos…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Charl van der Walt: When the Tables Turn (Japanese)
1:31:56
1:31:56
Play later
Play later
Lists
Like
Liked
1:31:56
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk we will highlight techniques (and tools) that can be used to turn the tables on prospective attackers with passive-Strike-Back. We will explore the pos…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese)
41:58
41:58
Play later
Play later
Lists
Like
Liked
41:58
"In the case of vulnerabilities which allow the execution of arbitrary machine code, the reliability of exploitation is swayed by the type of vulnerability, the conditions surrounding the vulnerable code, and the attack vector, among other considerations. The reliability of exploitation an important factor for those attempting to exploit a vulnerab…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)
51:51
51:51
Play later
Play later
Lists
Like
Liked
51:51
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is considered to reduce the vulnerability found in network LM and NTLM v1 authentication. In this session, we will describe and demonstrate our audit approa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (Japanese)
53:03
53:03
Play later
Play later
Lists
Like
Liked
53:03
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is considered to reduce the vulnerability found in network LM and NTLM v1 authentication. In this session, we will describe and demonstrate our audit approa…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English)
2:24:57
2:24:57
Play later
Play later
Lists
Like
Liked
2:24:57
"Security professionals see the compromise of networked systems on a day to day basis. It's something they've come to expect. The blatant exploitation of operating systems, applications, and configurations is a common event and is taken into account by most security engineers. But a different type of security compromise threatens to crumble the und…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Hisamichi Okamura: Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws(Japanese)
47:48
47:48
Play later
Play later
Lists
Like
Liked
47:48
Cybercrime Treaty and Legal Environment of Japanese Computer Crime and LawsBy Hisamichi Okamura
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Raisuke Miyawaki: Keynote Speech (English)
48:17
48:17
Play later
Play later
Lists
Like
Liked
48:17
" * Chairman, Ochanomizu Associates, Tokyo, Japan * Senior Advisor, Commission on Japanese Critical Infrastructure Protection * Research Counselor and Trustee, Institute for International Policy Studies, Tokyo * Vice President, Japan Forum for Strategic Studies Mr. Miyawaki is Japan's leading expert on the role of organized crime in Japan's economy…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Johnny Long: You Got that with Google?(English)
1:20:35
1:20:35
Play later
Play later
Lists
Like
Liked
1:20:35
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Johnny Long: You Got that With Google? (Japanese)
1:28:17
1:28:17
Play later
Play later
Lists
Like
Liked
1:28:17
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer overflows"", it's refreshing to see such a deceptively simple tool bent to achieve such amazing results; this is hacking in the purest sense of the word. …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
David Litchfield: Oracle PLSQL Injection ( English )
54:21
54:21
Play later
Play later
Lists
Like
Liked
54:21
"David Litchfield leads the world in the discovery and publication of computer security vulnerabilities. This outstanding research was recognised by Information Security Magazine who voted him as 'The World's Best Bug Hunter' for 2003. To date, David has found over 150 vulnerabilities in many of today's popular products from the major software comp…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Joe Grand: Understanding the Hardware Security (English)
1:20:35
1:20:35
Play later
Play later
Lists
Like
Liked
1:20:35
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of vulnerabilities in your embedded hardware designs and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Joe Grand: Understanding the Hardware Security (Japanese)
1:28:17
1:28:17
Play later
Play later
Lists
Like
Liked
1:28:17
"Hardware security is often overlooked during a product's development, which can leave it vulnerable to hacker attacks resulting in theft of service, loss of revenue, identity theft, unauthorized network access, or a damaged reputation. This presentation will show you how to reduce the number of vulnerabilities in your embedded hardware designs and…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Gerhard Eschelbeck: The Laws of Vulnerabilities (English)
1:22:25
1:22:25
Play later
Play later
Lists
Like
Liked
1:22:25
"New vulnerabilities to networks are discovered and published on a daily base. With each such announcement, the same questions arise. How significant is this vulnerability? How prevalent is this vulnerability? How easy is this vulnerability to exploit? Are any of my systems affected by this vulnerability? Due to lack of global vulnerability data, a…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Riley "Caezar" Eller: Capture the Flag Games: Measuring Skill with Hacking Contests (English)
1:24:38
1:24:38
Play later
Play later
Lists
Like
Liked
1:24:38
"With the cost of security experts increasing each year, it is expensive to audit critical systems as often as is needed. Worse yet, it is difficult to know how much to trust the reports since the worst consultants give the most positive answers. In order to address this problem, Caezar proposes a system for ranking the merit of security experts al…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chris Eagle: Attacking Obfuscated Code with IDA Pro ( English)
1:30:23
1:30:23
Play later
Play later
Lists
Like
Liked
1:30:23
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not the only goal of binary obfuscators however which can …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Chris Eagle: Attacking Obfuscated Code with IDA Pro-(Partial Japanese)
32:28
32:28
Play later
Play later
Lists
Like
Liked
32:28
"Virtually every virus and worm that circulates the Internet today is ""protected"" by some form of obfuscation that hides the code's true intent. In the Window's world where worms prevail, the use of tools such as UPX, ASPack, and teLock has become standard. Protection of malicious code is not the only goal of binary obfuscators however which can …
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (English)
52:21
52:21
Play later
Play later
Lists
Like
Liked
52:21
"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distributed systems as Ph.D. student at Waseda university. He is also a founder and CEO of Mellowtone inc. Arai started programming at age of 3, and now he is c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Shunichi Arai: Thinking Techie's Social Responsibility - Lessons From Winny Case (Japanese)
51:46
51:46
Play later
Play later
Lists
Like
Liked
51:46
"ARAI Shunichi is the chair of freekaneko.com which supports Winny's author Isamu Kaneko. He raised 16 million yen defense fund in a month. He is now researching on anonymity technology and distributed systems as Ph.D. student at Waseda university. He is also a founder and CEO of Mellowtone inc. Arai started programming at age of 3, and now he is c…
…
continue reading
![Artwork](/static/images/128pixel.png)
1
Jeff Moss and Panel: Welcome Speech and Security Panel (English )
1:13:49
1:13:49
Play later
Play later
Lists
Like
Liked
1:13:49
Jeff Moss welcomes delegates of the 2004 BlackHat Japan conference and introduces a panel of security experts for a Q&A.By Jeff Moss and Panel
…
continue reading