Black Hat Asia 2015 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Asia 2015 part 2

Black Hat is returning to Asia again in 2015, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Course Content

Black Hat Asia 2015 part 2

  • API Deobfuscator: Identifying Runtime – Obfuscated API Calls Via Memory Access Analysis
    00:00
  • We Can Still Crack You! General Unpacking Method For Android Packer (no Root)
    00:00
  • DABiD: The Powerful Interactive Android Debugger for Android Malware Analysis
    00:00
  • Exploiting Social Navigation
    00:00
  • Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring…
    00:00
  • Browsers Gone Wild
    00:00
  • Hiding Behind Android Runtime (ART)
    00:00
  • Bypassing Malware Detection Mechanisms in Online Banking
    00:00
  • Relaying EMV Contactless Transactions Using Off-The-Self Android Devices
    00:00
  • I Know Where You’ve Been: Geo-Inference Attacks Via The Browser Cache
    00:00
  • The Nightmare Behind The Cross Platform Mobile Apps Dream
    00:00
  • MLD Considered Harmful – Breaking Another IPv6 Subprotocol
    00:00
  • Slime: Automated Anti-Sandboxing Disarmament System
    00:00
  • Locknote: Conclusions and Key Takeaways from Black Hat 2015
    00:00
  • Hacking the Wireless World with Software Defined Radio – 2.0
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
Each day we give 100 discount coupons to the first 100 new visitors to our website. To benefit from this offer, use this coupon code 1DF835024E to get 20% discount on your first order.
This is default text for notification bar