Black Hat Europe 2015 part 2

  • Course level: Beginner


Black Hat Europe 2015 part 2

The premier conference on information security returns to the beautiful city of Amsterdam, Netherlands in November 2015. Professionals from all over the world gather for two days of intense Training and two thought-provoking days of Briefings brought to you by some of the brightest minds in the industry.

Topics for this course

20 Lessons

Black Hat Europe 2015 part 2

Continuous Intrusion: Why CI Tools Are An Attacker’s Best Friends00:00:00
Going Auth The Rails On A Crazy Train00:00:00
Hiding In Plain Sight – Advances In Malware Covert Communication Channels00:00:00
LTE & IMSI Catcher Myths00:00:00
How To Break XML Encryption – Automatically00:00:00
Implementing Practical Electrical Glitching Attacks00:00:00
(In-)Security of Backend-As-A-Service00:00:00
Defending Against Malicious Application Compatibility Shims00:00:00
Exploiting Adobe Flash Player In The Era Of Control Flow Guard00:00:00
Fuzzing Android: A Recipe For Uncovering Vulnerabilities Inside System Components In Android00:00:00
VOIP Wars: Destroying Jar Jar Lync00:00:00
Faux Disk Encryption: Realities of Secure Storage On Mobile Devices00:00:00
New (And Newly – Changed) Fully Qualified Doman Names: A View of Worldwide Changes to DNS00:00:00
Self-Driving and Connected Cars: Fooling Sensors and Tracking Drivers00:00:00
Vulnerability Exploitation In Docker Container Environments00:00:00
All your Root Checks Belong To Us: The Sad State of Root Detection00:00:00
Bypassing Local Windows Authentication To Defeat Full Disk Encryption00:00:00
New Tool For Discovering Flash player 0-Day Attacks in the Wild from Various Channels00:00:00
Triaging Crashed With Backward Taint Analysis For Arm Architecture00:00:00
Locknote: Conclusions and Key Takeaways from Black Hat Europe 201500:00:00
Black Hat Europe 2015

Enrolment validity: Lifetime