0(0)

Black Hat USA 2013 part 2

  • Course level: Beginner

Description

Black Hat USA 2013 part 2

Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 16th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill-building. Join us for four intense days of Training and two jam-packed filled days of Briefings.

Join now

Topics for this course

26 Lessons

Black Hat USA 2013 part 2

Black Hat USA 2013 – Hiding @ Depth – Exploring, Subverting and Breaking NAND Flash memory00:00:00
Black Hat USA 2013 – OPSEC failures of spiesson00:00:00
Black Hat USA 2013 – Android: one root to own them all00:00:00
Black Hat USA 2013 – Million Browser Botnet00:00:00
Black Hat USA 2013 – How to Build a SpyPhoneesson00:00:00
Black Hat USA 2013 – What’s on the Wire? Physical Layer Tapping with Project Daisho00:00:00
Black Hat USA 2013 – Bugalyze.com – Detecting Bugs Using Decompilation and Data Flow Analysis00:00:00
Black Hat USA 2013 – What Security Researchers Need to Know About Anti-Hacking Lawesson00:00:00
Black Hat USA 2013 – Lessons from Surviving a 300Gbps Denial of Service Attack00:00:00
Black Hat USA 2013 – Legal Aspects of Full Spectrum Computer Network (Active) Defense00:00:00
Black Hat USA 2013 – Pixel Perfect Timing Attacks with HTML500:00:00
Black Hat USA 2013 – Hacking like in the Movies: Visualizing Page Tables for Local Exploitation00:00:00
Black Hat USA 2013 – A Practical Attack against MDM Solutions00:00:00
Black Hat USA 2013 – Is that a government in your network or are you just happy to see me?00:00:00
Black Hat USA 2013 – Smashing The Font Scaler Engine in Windows Kernel00:00:00
Black Hat USA 2013 – Untwining Twine00:00:00
Black Hat USA 2013 – Denial of Service as a Service – asymmetrical warfare at its finest00:00:00
Black Hat USA 2013 – The SCADA That Didn’t Cry Wolf- Who’s Really Attacking Your ICS Devices00:00:00
Black Hat USA 2013 – UNION SELECT `This_Talk` AS (‘New Optimization and Obfuscation Techniques’)00:00:00
Black Hat USA 2013 – Hunting the Shadows: In Depth Analysis of Escalated APT Attacks00:00:00
Black Hat USA 2013 – Detecting Vulnerabilities in Virtual Devices with Conformance Testing00:00:00
Black Hat USA 2013 – RFID Hacking: Live Free or RFID Hard00:00:00
Black Hat USA 2013 – Rooting SIM cards00:00:00
Black Hat USA 2013 – Truncating TLS Connections to Violate Beliefs in Web Applications00:00:00
Black Hat USA 2013 – Home Invasion v2.0 – Attacking Network-Controlled Hardware00:00:00
Black Hat USA 2013 – Revealing Embedded Fingerprints: Deriving intelligence – USB stack interactions00:00:00
Black Hat USA 2013
Free

Enrolment validity: Lifetime