Black Hat Europe 2016 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Europe 2016 part 2

Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Course Content

Black Hat Europe 2016 part 2

  • Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit
    00:00
  • Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
    00:00
  • WiFi-Based IMSI Catcher
    00:00
  • Flip Feng Shui: Rowhammering the VM’s Isolation
    00:00
  • When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL
    00:00
  • GPU Security Exposed
    00:00
  • AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed?
    00:00
  • Inside Web Attacks: The Real Payloads
    00:00
  • Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project
    00:00
  • (Pen)Testing Vehicles with CANToolz
    00:00
  • Bypassing Clang’s SafeStack for Fun and Profit
    00:00
  • CTX: Eliminating BREACH with Context Hiding
    00:00
  • Randomization Can’t Stop BPF JIT Spray
    00:00
  • Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
    00:00
  • Bypassing Secure Boot Using Fault Injection
    00:00
  • Detach Me Not – DoS Attacks Against 4G Cellular Users Worldwide from your Desk
    00:00
  • Use-After-Use-After-Free: Exploit UAF by Generating Your Own
    00:00
  • Breaking Big Data: Evading Analysis of the Metadata of Your Life
    00:00
  • Backslash Powered Scanning: Hunting Unknown Vulnerability Classes
    00:00
  • Locknote: Conclusions and Key Takeaways from Black Hat Europe 2016
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet