
About Course
Black Hat Europe 2016 part 2
Black Hat is returning to Europe again in 2016, and we have quite an event in store. Here the brightest professionals and researchers in the industry will come together for a total of four days–two days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures at our Briefings.
Course Content
Black Hat Europe 2016 part 2
-
Ghost in the PLC: Designing an Undetectable Programmable Logic Controller Rootkit
00:00 -
Pocket-Sized Badness: Why Ransomware Comes as a Plot Twist in the Cat-Mouse Game
00:00 -
WiFi-Based IMSI Catcher
00:00 -
Flip Feng Shui: Rowhammering the VM’s Isolation
00:00 -
When Virtualization Encounter AFL: A Portable Virtual Device Fuzzing Framework with AFL
00:00 -
GPU Security Exposed
00:00 -
AI based Antivirus: Can AlphaAV Win the Battle in which Man Has Failed?
00:00 -
Inside Web Attacks: The Real Payloads
00:00 -
Real-World Post-Quantum Cryptography: Introducing the OpenQuantumSafe Software Project
00:00 -
(Pen)Testing Vehicles with CANToolz
00:00 -
Bypassing Clang’s SafeStack for Fun and Profit
00:00 -
CTX: Eliminating BREACH with Context Hiding
00:00 -
Randomization Can’t Stop BPF JIT Spray
00:00 -
Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2.0
00:00 -
Bypassing Secure Boot Using Fault Injection
00:00 -
Detach Me Not – DoS Attacks Against 4G Cellular Users Worldwide from your Desk
00:00 -
Use-After-Use-After-Free: Exploit UAF by Generating Your Own
00:00 -
Breaking Big Data: Evading Analysis of the Metadata of Your Life
00:00 -
Backslash Powered Scanning: Hunting Unknown Vulnerability Classes
00:00 -
Locknote: Conclusions and Key Takeaways from Black Hat Europe 2016
00:00
Student Ratings & Reviews
No Review Yet