
About Course
Black Hat Europe 2015 part 2
The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in November 2015. Professionals from all over the world gather for two days of intense Training and two thought-provoking days of Briefings brought to you by some of the brightest minds in the industry.
Course Content
Black Hat Europe 2015 part 2
-
Continuous Intrusion: Why CI Tools Are An Attacker’s Best Friends
00:00 -
Going Auth The Rails On A Crazy Train
00:00 -
Hiding In Plain Sight – Advances In Malware Covert Communication Channels
00:00 -
LTE & IMSI Catcher Myths
00:00 -
How To Break XML Encryption – Automatically
00:00 -
Implementing Practical Electrical Glitching Attacks
00:00 -
(In-)Security of Backend-As-A-Service
00:00 -
Defending Against Malicious Application Compatibility Shims
00:00 -
Exploiting Adobe Flash Player In The Era Of Control Flow Guard
00:00 -
Fuzzing Android: A Recipe For Uncovering Vulnerabilities Inside System Components In Android
00:00 -
VOIP Wars: Destroying Jar Jar Lync
00:00 -
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices
00:00 -
New (And Newly – Changed) Fully Qualified Doman Names: A View of Worldwide Changes to DNS
00:00 -
Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers
00:00 -
Vulnerability Exploitation In Docker Container Environments
00:00 -
All your Root Checks Belong To Us: The Sad State of Root Detection
00:00 -
Bypassing Local Windows Authentication To Defeat Full Disk Encryption
00:00 -
New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels
00:00 -
Triaging Crashed With Backward Taint Analysis For Arm Architecture
00:00 -
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2015
00:00
Student Ratings & Reviews
No Review Yet