
About Course
Black Hat Asia 2017 part 02
Black Hat is returning to Asia again in 2017, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.
Course Content
Black Hat Asia 2017 part 02
-
All Your Emails Belong to Us: Exploiting Vulnerable Email Clients via Domain Name Collision
00:00 -
Cache Side Channel Attack: Exploitability and Countermeasures
00:00 -
Go Get My/Vulnerabilities
00:00 -
Mobile-Telephony Threats in Asia
00:00 -
The Power of Data-Oriented Attacks
00:00 -
Myth and Truth About Hypervisor-Based Kernel Protector: The Reason Why You Need Shadow-Box
00:00 -
3G/4G Intranet Scanning and its Application on the WormHole Vulnerability
00:00 -
24 Techniques to Gather Threat Intel and Track Actors
00:00 -
Never Let Your Guard Down: Finding Unguarded Gates to Bypass Control Flow Guard with Big Data
00:00 -
Hack Microsoft Using Microsoft Signed Binaries
00:00 -
The UEFI Firmware Rootkits: Myths and Reality
00:00 -
Beyond the Blacklists: Detecting Malicious URL Through Machine Learning
00:00 -
Breaking Korea Transit Card with Side-Channel Attack – Unauthorized Recharging
00:00 -
Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year
00:00 -
Hacking HTTP/2 – New Attacks on the Internet’s Next Generation Foundation
00:00 -
The Irrelevance of K-Bytes Detection – Building a Robust Pipeline for Malicious Documents
00:00 -
Drop the ROP: Fine-Grained Control-Flow Integrity for the Linux Kernel
00:00 -
Cross the Wall – Bypass All Modern Mitigations of Microsoft Edge
00:00 -
Locknote: Conclusions & Key Takeaways from Black Hat Asia 2017
00:00
Student Ratings & Reviews
No Review Yet