Black Hat Europe 2014 part 02

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Europe 2014 part 02

The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in October 2014. Professionals from all over the world gather for two days of intense Training and two thought-provoking days of Briefings brought to you by some of the brightest minds in the industry.

Join now 

Course Content

Black Hat Europe 2014 part 02

  • Blended Web and Database Attacks on Real-Time, In-Memory Platforms
    00:00
  • Firmware.RE: Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service
    00:00
  • DTM Components: Shadow Keys to the ICS Kingdom
    00:00
  • Hack Your ATM with Friend’s Raspberry.Py
    00:00
  • PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 1/2)
    00:00
  • PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 2/2)
    00:00
  • A Practical Attack Against VDI Solutions
    00:00
  • Charge Your Device with the Latest Malware
    00:00
  • Hacking the Wireless World with Software Defined Radio – 2.0
    00:00
  • Quantified Self – A Path to Self-Enlightenment or Just a Security Nightmare?
    00:00
  • The Power of Pair: One Template that Reveals 100+ UAF IE Vulnerabilities
    00:00
  • Hide Android Applications in Images
    00:00
  • Quantum Key Distribution and the Future of Encryption
    00:00
  • Don’t Trust Your USB! How to Find Bugs in USB Device Drivers
    00:00
  • Endrun – Secure Digital Communications for Our Modern Dystopia
    00:00
  • Man in the Binder: He Who Controls IPC, Controls the Droid
    00:00
  • Same Origin Method Execution (SOME) – Exploiting a Callback for Same Origin Policy Bypass
    00:00
  • Lights Off! The Darkness of the Smart Meters
    00:00
  • Bypassing HTTP Strict Transport Security
    00:00
  • Network Attached Shell: N.A.S.ty Systems that Store Network Accessible Shells
    00:00
  • APTs Way: Evading Your EBNIDS
    00:00
  • Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol
    00:00
  • Welcome & Introduction to Black Hat Europe 2014
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet