Black Hat Asia 2014 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Asia 2014 part 2

Black Hat is returning to Asia for the first time since 2008, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Course Content

Black Hat Asia 2014 part 2

  • Say It Ain’t So – An Implementation of Deniable Encryption by Ari Trachtenberg
    00:00
  • Black Hat Asia 2014 – Z:\MAKE TROY\NOT WAR: Case Study of the Wiper APT in Korea, and Beyond
    00:00
  • Diving Into IE 10’s Enhanced Protected Mode Sandbox by Mark Vincent Yason
    00:00
  • Beyond ‘Check The Box’: Powering Intrusion Investigations by Jim Aldridge
    00:00
  • Black Hat Asia 2014 – Persist It: Using and Abusing Microsoft’s Fix It Patches
    00:00
  • Black Hat Asia 2014 – Keynote by Dr. Steve Crocker
    00:00
  • Black Hat Asia 2014 – Dude, WTF in My CAN!
    00:00
  • Black Hat Asia 2014 – The Machines That Betrayed Their Masters
    00:00
  • OFFENSIVE: Exploiting DNS Servers Changes by Leonardo Nve
    00:00
  • Building Trojan Hardware at Home by JP Dunning
    00:00
  • SAP, Credit Cards, and the Bird That Knows Too Much by Ertunga Arsal
    00:00
  • Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel
    00:00
  • JS Suicide: Using JavaScript Security Features to Kill JS Security by Ahamed Nafeez
    00:00
  • Solutum Cumulus Mediocris by Eldar Marcussen
    00:00
  • Privacy-by-Design for the Security Practitioner by Richard Chow
    00:00
  • The Inner Workings of Mobile Cross-Platform Technologies by Simon Roses Femerling
    00:00
  • Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjanin
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet