BlackHatAsia 2005 Oct. 17, 2005 to Oct. 18, 2005, Tokyo,Japan

Event Page


Tell us about missing data
Title Speakers Summary Topic Types
[ Keynote ] The Day After... Katsuya Uchida ARPANET was established in 1968. In 1971, "creeper" programmed by Bob Thomas moved from computer ...
A Paranoid Perspective of an Interpreted Language Dominique Brezinski Interpreted, dynamically-typed, and object-oriented languages like Ruby and Python are very good for many programming ...
Hacking in a Foreign Language: A Network Security Guide to Russia (and Beyond) Kenneth Geers Has your network ever been hacked, and all you have to show for your investigative ...
Phishing with Super Bait Jeremiah Grossman The use of phishing/cross-site scripting (XSS) hybrid attacks for financial gain is spreading. ItÕs imperative ...
VoIP Phreaking: How to Make Free Phone Calls and Influence People The Grugq The recent explosion in internet telephony has led to the exposure of the (previously) closed ...
Identifying and Responding to Wireless Attacks Chris Hurley This presentation details the methods attackers utilize to gain access to wireless networks and their ...
Forensics in Japan Hideaki Ihara In forensic research it is imperative to search for Japanese language strings. However many of ...
Black Ops Of TCP/IP 2005 Dan Kaminsky Our networks are growing. Is our understanding of them? This talk will focus on the ...
Botnet survey result. "Our security depends on your security." Satoru Koyama Many of the various attacking mechanism such as spam email, DDoS that are attacking the ...
Architecture Flaws in Common Security Tools David Maynor Look at your new device! It has a great case, plenty of buttons, and those ...
The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere This presentation will cover SIP and VoIP related automated fuzzing techniques. Using real world vulnerabilities ...
Adware/Spyware Saumil Udayan Shah , Dave Cole The Business Timeline—how did we get into this mess? The players How their business works ...
“Shadow Walker” — Raising The Bar For Rootkit Detection Jamie Butler , Sherri Sparks Last year at Black Hat, we introduced the rootkit FU. FU took an unprecented approach ...