About Course
Black Hat Europe 2014 part 02
The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in October 2014. Professionals from all over the world gather for two days of intense Training and two thought-provoking days of Briefings brought to you by some of the brightest minds in the industry.
Course Content
Black Hat Europe 2014 part 02
-
Blended Web and Database Attacks on Real-Time, In-Memory Platforms
00:00 -
Firmware.RE: Firmware Unpacking, Analysis and Vulnerability-Discovery as a Service
00:00 -
DTM Components: Shadow Keys to the ICS Kingdom
00:00 -
Hack Your ATM with Friend’s Raspberry.Py
00:00 -
PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 1/2)
00:00 -
PDF Attack: A Journey from the Exploit Kit to the Shellcode (Part 2/2)
00:00 -
A Practical Attack Against VDI Solutions
00:00 -
Charge Your Device with the Latest Malware
00:00 -
Hacking the Wireless World with Software Defined Radio – 2.0
00:00 -
Quantified Self – A Path to Self-Enlightenment or Just a Security Nightmare?
00:00 -
The Power of Pair: One Template that Reveals 100+ UAF IE Vulnerabilities
00:00 -
Hide Android Applications in Images
00:00 -
Quantum Key Distribution and the Future of Encryption
00:00 -
Don’t Trust Your USB! How to Find Bugs in USB Device Drivers
00:00 -
Endrun – Secure Digital Communications for Our Modern Dystopia
00:00 -
Man in the Binder: He Who Controls IPC, Controls the Droid
00:00 -
Same Origin Method Execution (SOME) – Exploiting a Callback for Same Origin Policy Bypass
00:00 -
Lights Off! The Darkness of the Smart Meters
00:00 -
Bypassing HTTP Strict Transport Security
00:00 -
Network Attached Shell: N.A.S.ty Systems that Store Network Accessible Shells
00:00 -
APTs Way: Evading Your EBNIDS
00:00 -
Cellular Exploitation on a Global Scale: The Rise and Fall of the Control Protocol
00:00 -
Welcome & Introduction to Black Hat Europe 2014
00:00
Student Ratings & Reviews
No Review Yet