Black Hat Europe 2019 part 1

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat Europe 2019 part 1

Black Hat provides attendees with the latest in research, development, and trends in Information Security. Here the brightest professionals and researchers in the industry come together for a total of four days—two or four days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures in the Briefings.

Join now

Course Content

Black Hat Europe 2019

  • Unveiling the Underground World of Anti-Cheats
    00:00
  • Black Hat Europe 2019 Highlights
    00:00
  • Mobile Network Hacking, IP Edition
    00:00
  • HTTP Desync Attacks: Request Smuggling Reborn
    00:00
  • Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them
    00:00
  • Simple Spyware: Androids Invisible Foreground Services and How to (Ab)use Them
    00:00
  • How to Break PDF Encryption
    00:00
  • Conducting a Successful False Flag Cyber Operation (Blame it on China)
    00:00
  • Black Hat Europe 2019 Keynote: Blue to Red: Traversing the Spectrum by Amanda Rousseau
    00:00
  • Implementing the Lessons Learned From a Major Cyber Attack
    00:00
  • Exploiting Windows Hello for Business
    00:00
  • Chain of Fools: An Exploration of Certificate Chain Validation Mishaps
    00:00
  • Alexa, Hack My Server(less) Please
    00:00
  • New Exploit Technique In Java Deserialization Attack
    00:00
  • Breaking Bootloaders on the Cheap
    00:00
  • Advanced VBA Macros Attack & Defence
    00:00
  • Locknote: Conclusions and Key Takeaways from Black Hat Europe 2019
    00:00
  • Booting the iOS Kernel to an Interactive Bash Shell on QEMU
    00:00
  • OEM Finder: Hunting Vulnerable OEM IoT Devices at Scale
    00:00
  • What the Fuzz
    00:00
  • ClusterFuzz: Fuzzing at Google Scale
    00:00
  • Fatal Fury on ESP32: Time to Release Hardware Exploits
    00:00
  • Side Channel Attacks in 4G and 5G Cellular Networks
    00:00
  • Practical Side-Channel Attacks Against WPA-TKIP
    00:00
  • Fuzzing and Exploiting Virtual Channels in Microsoft Remote Desktop Protocol for Fun and Profit
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?