Black Hat USA 2014 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2014 part 2

Black Hat USA is the show that sets the benchmark for all other security conferences. As Black Hat returns for its 17th year to Las Vegas, we bring together the brightest in the world for six days of learning, networking, and skill-building. Join us for four intense days of Training and two jam-packed days of Briefings.

Join now 

Course Content

Black Hat USA 2014 part 2

  • VoIP Wars: Attack of the Cisco Phones
    00:00
  • Multipath TCP: Breaking Today’s Networks with Tomorrow’s Protocols
    00:00
  • Evasion of High-End IPS Devices in the Age of IPv6
    00:00
  • Mobile Device Mismanagement
    00:00
  • Unwrapping the Truth: Analysis of Mobile Application Wrapping Solutions
    00:00
  • Researching Android Device Security with the Help of a Droid Army
    00:00
  • Understanding IMSI Privacy
    00:00
  • A Practical Attack Against VDI Solutions
    00:00
  • It Just (Net)works: The Truth About iOS 7’s Multipeer Connectivity Framework
    00:00
  • Android FakeID Vulnerability Walkthrough
    00:00
  • Reflections on Trusting TrustZone
    00:00
  • Catching Malware En Masse: DNS and IP Style
    00:00
  • Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android
    00:00
  • Secure Because Math: A Deep-Dive on Machine Learning-Based Monitoring
    00:00
  • Sidewinder Targeted Attack Against Android in the Golden Age of Ad Libs
    00:00
  • Threat Intelligence Library – A New Revolutionary Technology to Enhance the SOC Battle Rhythm!
    00:00
  • PWNIE Awards at Black Hat USA 2014
    00:00
  • What Goes Around Comes Back Around – Exploiting Fundamental Weaknesses in Botnet C&C Panels!
    00:00
  • Prevalent Characteristics in Modern Malware
    00:00
  • Creating a Spider Goat: Security with Intel CPU Transactional Memory Supporton
    00:00
  • Reverse-Engineering the Supra iBox: Exploitation of a Hardened MSP430-Based Device
    00:00
  • Full System Emulation: Achieving Successful Automated Dynamic Analysis of Evasive Malware
    00:00
  • Exposing Bootkits with BIOS Emulation
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?