Black Hat USA 2013 part 3

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2013 part 3

Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 16th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill-building. Join us for four intense days of Training and two jam-packed filled days of Briefings.

Course Content

Black Hat USA 2013 part 3

  • Black Hat USA 2013 – Fully Arbitrary 802.3 Packet Injection: Maximizing the Ethernet Attack Surface
    00:00
  • Black Hat USA 2013 – Beyond the Application: Cellular Privacy Regulation Space
    00:00
  • Black Hat USA 2013 – TOR… ALL-THE-THINGS!
    00:00
  • Black Hat USA 2013 – Out of Control: Demonstrating SCADA device exploitation
    00:00
  • Black Hat USA 2013 – The Outer Limits: Hacking the Samsung Smart TV
    00:00
  • Black Hat USA 2013 – KickaaS Security with Automation and Cloud
    00:00
  • Black Hat USA 2013 – Compromising Industrial Facilities From 40 Miles Away
    00:00
  • Black Hat USA 2013 – BIOS Security
    00:00
  • Black Hat USA 2013 – Just-In-Time Code Reuse: The more things change, the more they stay the same
    00:00
  • Black Hat USA 2013 – Combating the Insider Threat at the FBI: Real World Lessons Learned
    00:00
  • Black Hat USA 2013 – Predicting Susceptibility to Social Bots on Twitter
    00:00
  • Black Hat USA 2013 – How to Grow a TREE from CBASS
    00:00
  • Black Hat USA 2013 – Hot Knives Through Butter: Bypassing Automated Analysis Systems
    00:00
  • Black Hat USA 2013 – Pass the Hash 2: The Admin’s Revenge
    00:00
  • Black Hat USA 2013 – Defending Networks with Incomplete Information: A Machine Learning Approach
    00:00
  • Black Hat USA 2013 – Post Exploitation Operations with Cloud Synchronization Services
    00:00
  • Black Hat USA 2013 – Energy Fraud & Blackouts: Issues with Wireless Metering Protocols (wM-Bus)
    00:00
  • Black Hat USA 2013 – Pass the Hash & Other Credential Theft/Reuse: Mitigating Risk
    00:00
  • Black Hat USA 2013 – CreepyDOL: Cheap, Distributed Stalking
    00:00
  • Black Hat USA 2013 – Password Hashing: the Future is Now
    00:00
  • Black Hat USA 2013 – Bochspwn: Identifying 0-days via System-wide Memory Access Pattern Analysis
    00:00
  • Black Hat USA 2013 – OptiROP: hunting for ROP gadgets in style
    00:00
  • Black Hat USA 2013 – Shattering Illusions in Lock-Free Worlds: Compiler/Hardware Behaviors OSes/ VMs
    00:00
  • Black Hat USA 2013 – BlackBerryOS 10 from a security perspective
    00:00
  • Black Hat USA 2013 – Using Online Activity as Digital Fingerprints to Create a Better Spear Phisher
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet