![Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference podcast](https://is2-ssl.mzstatic.com/image/thumb/Podcasts/v4/f9/e7/b8/f9e7b857-b148-bae4-51a5-f025ee708552/mza_1292675182163881589.jpg/200x200bb.png)
Black Hat Briefings, Japan 2004 [Audio] Presentations from the security conference Podcast
1) Charl van der Walt: When the Tables Turn (English)
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk w...Show More
2) Charl van der Walt: When the Tables Turn (Japanese)
"Until now network security defences have largely been about building walls and fences around the network. This talk revolves around spiking those walls & electrifying those fences! During this talk w...Show More
3) Yuji Ukai: Environment Dependencies in Windows Exploitation(Japanese)
"In the case of vulnerabilities which allow the execution of arbitrary machine code, the reliability of exploitation is swayed by the type of vulnerability, the conditions surrounding the vulnerable c...Show More
4) Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is con...Show More
Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (English)
51:51 | Oct 31st, 2006
5) Daiji Sanai and Hidenobu Seki: Optimized Attack for NTLM2 Session Response (Japanese)
"Windows 2000 SP3 or later and Windows XP now use a new network logon authentication method by default, the NTLM2 Session Response. Employed by Windows 2000, this unproven authentication method is con...Show More
6) Russ Rogers: The Keys to the Kingdom: Understanding Covert Channels of Communication(English)
"Security professionals see the compromise of networked systems on a day to day basis. It's something they've come to expect. The blatant exploitation of operating systems, applications, and configura...Show More
7) Hisamichi Okamura: Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws(Japanese)
Cybercrime Treaty and Legal Environment of Japanese Computer Crime and Laws
8) Raisuke Miyawaki: Keynote Speech (English)
" * Chairman, Ochanomizu Associates, Tokyo, Japan * Senior Advisor, Commission on Japanese Critical Infrastructure Protection * Research Counselor and Trustee, Institute for International...Show More
9) Johnny Long: You Got that With Google? (Japanese)
"This presentation explores the explosive growth of a technique known as ""Google Hacking"". When the modern security landscape includes such heady topics as ""blind SQL injection"" and ""integer over...Show More
10) Jeff Moss: Closing Speech (Japanese)
Closing ceremonies and speech given by Jeff Moss.