際際滷shows by User: inaz2 / http://www.slideshare.net/images/logo.gif 際際滷shows by User: inaz2 / Sun, 04 Jun 2017 13:59:16 GMT 際際滷Share feed for 際際滷shows by User: inaz2 Can We Prevent Use-after-free Attacks? /slideshow/can-we-prevent-useafterfree-attacks/76631388 20170604ssmjp-170604135916
2017/06/04 ssmjp Special]]>

2017/06/04 ssmjp Special]]>
Sun, 04 Jun 2017 13:59:16 GMT /slideshow/can-we-prevent-useafterfree-attacks/76631388 inaz2@slideshare.net(inaz2) Can We Prevent Use-after-free Attacks? inaz2 2017/06/04 ssmjp Special <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20170604ssmjp-170604135916-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2017/06/04 ssmjp Special
Can We Prevent Use-after-free Attacks? from inaz2
]]>
37364 9 https://cdn.slidesharecdn.com/ss_thumbnails/20170604ssmjp-170604135916-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Why is Security Management So Hard? /slideshow/why-is-security-management-so-hard/69992925 20161209whyissecuritymanagementsohard-161209160608
2016/12/09 及1指 セキュリティ慌嗤茶氏]]>

2016/12/09 及1指 セキュリティ慌嗤茶氏]]>
Fri, 09 Dec 2016 16:06:08 GMT /slideshow/why-is-security-management-so-hard/69992925 inaz2@slideshare.net(inaz2) Why is Security Management So Hard? inaz2 2016/12/09 及1指 セキュリティ慌嗤茶氏 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20161209whyissecuritymanagementsohard-161209160608-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2016/12/09 及1指 セキュリティ慌嗤茶氏
Why is Security Management So Hard? from inaz2
]]>
3701 2 https://cdn.slidesharecdn.com/ss_thumbnails/20161209whyissecuritymanagementsohard-161209160608-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
堰意意永プロクシライブラリ沿姻看恰霞2の譜柴とg廾 /slideshow/httpproxy2/66286027 20160922pyconjp2016public-160922052134
2016/09/22 PyCon JP 2016]]>

2016/09/22 PyCon JP 2016]]>
Thu, 22 Sep 2016 05:21:34 GMT /slideshow/httpproxy2/66286027 inaz2@slideshare.net(inaz2) 堰意意永プロクシライブラリ沿姻看恰霞2の譜柴とg廾 inaz2 2016/09/22 PyCon JP 2016 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20160922pyconjp2016public-160922052134-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2016/09/22 PyCon JP 2016
堰意意永プロクシライブラリ沿姻看恰霞2の譜柴とg廾 from inaz2
]]>
4314 7 https://cdn.slidesharecdn.com/ss_thumbnails/20160922pyconjp2016public-160922052134-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Protecting Passwords /slideshow/protecting-passwords/63606077 20160630protectingpasswords-160630121145
2016/06/30 #ssmjp 2016/06]]>

2016/06/30 #ssmjp 2016/06]]>
Thu, 30 Jun 2016 12:11:45 GMT /slideshow/protecting-passwords/63606077 inaz2@slideshare.net(inaz2) Protecting Passwords inaz2 2016/06/30 #ssmjp 2016/06 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20160630protectingpasswords-160630121145-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2016/06/30 #ssmjp 2016/06
Protecting Passwords from inaz2
]]>
3686 9 https://cdn.slidesharecdn.com/ss_thumbnails/20160630protectingpasswords-160630121145-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux /slideshow/self-introduction-the-story-that-i-tried-to-make-sayonara-rop-chain-in-linux/61424123 20160427lightningtalks-160427155735
2016/04/27 Lightning Talks]]>

2016/04/27 Lightning Talks]]>
Wed, 27 Apr 2016 15:57:35 GMT /slideshow/self-introduction-the-story-that-i-tried-to-make-sayonara-rop-chain-in-linux/61424123 inaz2@slideshare.net(inaz2) Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux inaz2 2016/04/27 Lightning Talks <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20160427lightningtalks-160427155735-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2016/04/27 Lightning Talks
Self Introduction & The Story that I Tried to Make Sayonara ROP Chain in Linux from inaz2
]]>
3126 7 https://cdn.slidesharecdn.com/ss_thumbnails/20160427lightningtalks-160427155735-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Abusing Interrupts for Reliable Windows Kernel Exploitation (en) /slideshow/abusing-interrupts-for-reliable-windows-kernel-exploitation-en/55106465 20151114avtokyo2015en-151114110032-lva1-app6891
2015/11/14 AVTOKYO2015 Japanese version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja]]>

2015/11/14 AVTOKYO2015 Japanese version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja]]>
Sat, 14 Nov 2015 11:00:32 GMT /slideshow/abusing-interrupts-for-reliable-windows-kernel-exploitation-en/55106465 inaz2@slideshare.net(inaz2) Abusing Interrupts for Reliable Windows Kernel Exploitation (en) inaz2 2015/11/14 AVTOKYO2015 Japanese version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20151114avtokyo2015en-151114110032-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2015/11/14 AVTOKYO2015 Japanese version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja
Abusing Interrupts for Reliable Windows Kernel Exploitation (en) from inaz2
]]>
3168 5 https://cdn.slidesharecdn.com/ss_thumbnails/20151114avtokyo2015en-151114110032-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Abusing Interrupts for Reliable Windows Kernel Exploitation (ja) /slideshow/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja/55106408 20151114avtokyo2015ja-151114105654-lva1-app6891
2015/11/14 AVTOKYO2015 English version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-en]]>

2015/11/14 AVTOKYO2015 English version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-en]]>
Sat, 14 Nov 2015 10:56:54 GMT /slideshow/abusing-interrupts-for-reliable-windows-kernel-exploitation-ja/55106408 inaz2@slideshare.net(inaz2) Abusing Interrupts for Reliable Windows Kernel Exploitation (ja) inaz2 2015/11/14 AVTOKYO2015 English version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-en <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20151114avtokyo2015ja-151114105654-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2015/11/14 AVTOKYO2015 English version is available at http://www.slideshare.net/inaz2/abusing-interrupts-for-reliable-windows-kernel-exploitation-en
Abusing Interrupts for Reliable Windows Kernel Exploitation (ja) from inaz2
]]>
6444 6 https://cdn.slidesharecdn.com/ss_thumbnails/20151114avtokyo2015ja-151114105654-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
WinDbg Primer /slideshow/windbg-primer/52191656 20150829windbgprimer-150829020459-lva1-app6891
2015/08/29 すみだセキュリティ茶氏 2015#2]]>

2015/08/29 すみだセキュリティ茶氏 2015#2]]>
Sat, 29 Aug 2015 02:04:58 GMT /slideshow/windbg-primer/52191656 inaz2@slideshare.net(inaz2) WinDbg Primer inaz2 2015/08/29 すみだセキュリティ茶氏 2015#2 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20150829windbgprimer-150829020459-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2015/08/29 すみだセキュリティ茶氏 2015#2
WinDbg Primer from inaz2
]]>
4899 9 https://cdn.slidesharecdn.com/ss_thumbnails/20150829windbgprimer-150829020459-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
proxy2: HTTPS pins and needles /slideshow/20150509-sumidasec-47934674/47934674 20150509sumidasec-150509051911-lva1-app6892
2015/05/09 すみだセキュリティ茶氏 2015#1]]>

2015/05/09 すみだセキュリティ茶氏 2015#1]]>
Sat, 09 May 2015 05:19:10 GMT /slideshow/20150509-sumidasec-47934674/47934674 inaz2@slideshare.net(inaz2) proxy2: HTTPS pins and needles inaz2 2015/05/09 すみだセキュリティ茶氏 2015#1 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20150509sumidasec-150509051911-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2015/05/09 すみだセキュリティ茶氏 2015#1
proxy2: HTTPS pins and needles from inaz2
]]>
59801 4 https://cdn.slidesharecdn.com/ss_thumbnails/20150509sumidasec-150509051911-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja) /slideshow/rop-illmatic-exploring-universal-rop-on-glibc-x8664-ja/41595341 20141115ropillmatic-141115101250-conversion-gate02
2014/11/15 AVTOKYO2014 (Japanese Version) English Version: http://www.slideshare.net/inaz2/rop-illmatic-exploring-universal-rop-on-glibc-x8664-en-41595384]]>

2014/11/15 AVTOKYO2014 (Japanese Version) English Version: http://www.slideshare.net/inaz2/rop-illmatic-exploring-universal-rop-on-glibc-x8664-en-41595384]]>
Sat, 15 Nov 2014 10:12:50 GMT /slideshow/rop-illmatic-exploring-universal-rop-on-glibc-x8664-ja/41595341 inaz2@slideshare.net(inaz2) ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja) inaz2 2014/11/15 AVTOKYO2014 (Japanese Version) English Version: http://www.slideshare.net/inaz2/rop-illmatic-exploring-universal-rop-on-glibc-x8664-en-41595384 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20141115ropillmatic-141115101250-conversion-gate02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2014/11/15 AVTOKYO2014 (Japanese Version) English Version: http://www.slideshare.net/inaz2/rop-illmatic-exploring-universal-rop-on-glibc-x8664-en-41595384
ROP Illmatic: Exploring Universal ROP on glibc x86-64 (ja) from inaz2
]]>
6863 6 https://cdn.slidesharecdn.com/ss_thumbnails/20141115ropillmatic-141115101250-conversion-gate02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
How to apt-get from the internal network: remote sshd with kneesocks /inaz2/20140914-how-toaptgetfromtheinternalnetwork 20140914howtoapt-getfromtheinternalnetwork-140914000419-phpapp01
2014/09/14 すみだセキュリティ茶氏2014#3]]>

2014/09/14 すみだセキュリティ茶氏2014#3]]>
Sun, 14 Sep 2014 00:04:19 GMT /inaz2/20140914-how-toaptgetfromtheinternalnetwork inaz2@slideshare.net(inaz2) How to apt-get from the internal network: remote sshd with kneesocks inaz2 2014/09/14 すみだセキュリティ茶氏2014#3 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20140914howtoapt-getfromtheinternalnetwork-140914000419-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2014/09/14 すみだセキュリティ茶氏2014#3
How to apt-get from the internal network: remote sshd with kneesocks from inaz2
]]>
3632 4 https://cdn.slidesharecdn.com/ss_thumbnails/20140914howtoapt-getfromtheinternalnetwork-140914000419-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
CRYPT+YOU, UNDERSTAND TODAY! /slideshow/cryptyou-understand-today/35591446 20140607cryptandyou-140607011612-phpapp01
2014/06/07 Security Casual Talks 2014#2]]>

2014/06/07 Security Casual Talks 2014#2]]>
Sat, 07 Jun 2014 01:16:12 GMT /slideshow/cryptyou-understand-today/35591446 inaz2@slideshare.net(inaz2) CRYPT+YOU, UNDERSTAND TODAY! inaz2 2014/06/07 Security Casual Talks 2014#2 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20140607cryptandyou-140607011612-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2014/06/07 Security Casual Talks 2014#2
CRYPT+YOU, UNDERSTAND TODAY! from inaz2
]]>
3606 10 https://cdn.slidesharecdn.com/ss_thumbnails/20140607cryptandyou-140607011612-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Making a Proxy for Fun and Profit /slideshow/making-a-proxy-for-profit-and-fun/28991786 20131207securitycasualtalks-131207074717-phpapp01
2013/12/07 Security Casual Talks (すみだセキュリティ茶氏その2)]]>

2013/12/07 Security Casual Talks (すみだセキュリティ茶氏その2)]]>
Sat, 07 Dec 2013 07:47:17 GMT /slideshow/making-a-proxy-for-profit-and-fun/28991786 inaz2@slideshare.net(inaz2) Making a Proxy for Fun and Profit inaz2 2013/12/07 Security Casual Talks (すみだセキュリティ茶氏その2) <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20131207securitycasualtalks-131207074717-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2013/12/07 Security Casual Talks (すみだセキュリティ茶氏その2)
Making a Proxy for Fun and Profit from inaz2
]]>
2589 3 https://cdn.slidesharecdn.com/ss_thumbnails/20131207securitycasualtalks-131207074717-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Sniffing BitTorrent DHT ?゛繁はBTで採を鯛とすのか゛ /slideshow/20131006r02-sniffing-bittorrentdht/26906538 20131006r02sniffingbittorrentdht-131006050342-phpapp01
2013-10-06 すみだITセキュリティ茶氏 その1.5]]>

2013-10-06 すみだITセキュリティ茶氏 その1.5]]>
Sun, 06 Oct 2013 05:03:41 GMT /slideshow/20131006r02-sniffing-bittorrentdht/26906538 inaz2@slideshare.net(inaz2) Sniffing BitTorrent DHT ?゛繁はBTで採を鯛とすのか゛ inaz2 2013-10-06 すみだITセキュリティ茶氏 その1.5 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/20131006r02sniffingbittorrentdht-131006050342-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> 2013-10-06 すみだITセキュリティ茶氏 その1.5
Sniffing BitTorrent DHT ゛繁はBTで採を鯛とすのか゛ from inaz2
]]>
5259 5 https://cdn.slidesharecdn.com/ss_thumbnails/20131006r02sniffingbittorrentdht-131006050342-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png https://cdn.slidesharecdn.com/ss_thumbnails/20170604ssmjp-170604135916-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/can-we-prevent-useafterfree-attacks/76631388 Can We Prevent Use-aft... https://cdn.slidesharecdn.com/ss_thumbnails/20161209whyissecuritymanagementsohard-161209160608-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/why-is-security-management-so-hard/69992925 Why is Security Manage... https://cdn.slidesharecdn.com/ss_thumbnails/20160922pyconjp2016public-160922052134-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/httpproxy2/66286027 堰意意永プロクシライブラリ沿姻看恰霞2の譜柴とg廾