
About Course
Black Hat Europe 2019 part 2
Black Hat provides attendees with the latest in research, development, and trends in Information Security. Here the brightest professionals and researchers in the industry come together for a total of four days—two or four days of deeply technical hands-on Training, followed by two days of the latest research and vulnerability disclosures in the Briefings.
Course Content
Black Hat Europe 2019 part 2
-
Trust in Apple’s Secret Garden: Exploring & Reversing Apple’s Continuity Protocol
00:00 -
Money Doesn’t Stink – Cybercriminal Business Insight of A New Android Botnet
00:00 -
Reverse Engineering and Exploiting Builds in the Cloud
00:00 -
Inside Out – The Cloud has Never been so Close
00:00 -
Unleashing the Power of My 20+ Years Old Car
00:00 -
Thinking Outside the JIT Compiler
00:00 -
BluePill: Neutralizing Anti-Analysis Behavior in Malware Dissection
00:00 -
Is Your Mental Health for Sale?
00:00 -
Understanding the IoT Threat Landscape
00:00 -
Bring Your Own Token to Replace the Traditional Smartcards for Strong Authentication and Signing
00:00 -
Doors of Durin: The Veiled Gate to Siemens S7 Silicon
00:00 -
Decisions and Revisions – The Ever Evolving Face of the Black Hat NOC
00:00 -
BlueMaster: Bypassing and Fixing Bluetooth-based Proximity Authentication
00:00 -
Far Sides of Java Remote Protocols
00:00 -
Detecting (un)Intentionally Hidden Injected Code by Examining Page Table Entries
00:00 -
Tackling Privilege Escalation with Offense and Defense
00:00 -
Bypassing KPTI Using the Speculative Behavior of the SWAPGS Instruction
00:00 -
Hackers, Journalists and the Ethical Swamp
00:00 -
Hands Off and Putting SLAB/SLUB Feng Shui in a Blackbox
00:00 -
Security Holes in the Integration and Management of Messaging Protocols on Commercial IoT Clouds
00:00
Student Ratings & Reviews
No Review Yet