0(0)

Black Hat Europe 2016 part 2

  • Course level: Beginner

Description

Black Hat Europe 2016 part 2

Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.

Topics for this course

20 Lessons

Black Hat Europe 2016 part 2

Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit00:00:00
Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game00:00:00
WiFi-Based IMSI Catcher00:00:00
Flip Feng Shui: Rowhammering the VM’s Isolation00:00:00
When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL00:00:00
GPU Security Exposed00:00:00
AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed?00:00:00
Inside Web Attacks: The Real Payloads00:00:00
Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project00:00:00
(Pen)Testing Vehicles with CANToolz00:00:00
Bypassing Clang’s SafeStack for Fun and Profit00:00:00
CTX: Eliminating BREACH with Context Hiding00:00:00
Randomization Can’t Stop BPF JIT Spray00:00:00
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.000:00:00
Bypassing Secure Boot Using Fault Injection00:00:00
Detach Me Not – DoS Attacks Against 4G Cellular Users Worldwide from your Desk00:00:00
Use-After-Use-After-Free: Exploit UAF by Generating Your Own00:00:00
Breaking Big Data: Evading Analysis of the Metadata of Your Life00:00:00
Backslash Powered Scanning: Hunting Unknown Vulnerability Classes00:00:00
Locknote: Conclusions and Key Takeaways from Black Hat Europe 201600:00:00
Black Hat Europe 2016
Free

Enrolment validity: Lifetime