Black Hat USA 2015 part 01

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2015 part 01

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense Training for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

Course Content

Black Hat USA 2015 part 01

  • The Lifecycle of a Revolution (Keynote)
    00:00
  • Dance Like Nobodys Watching Encrypt Like Everyone Is: A Peek Inside the Black Hat Network
    00:00
  • Stagefright: Scary Code in the Heart of Android
    00:00
  • Big Game Hunting: The Peculiarities of Nation-State Malware Research
    00:00
  • TrustKit: Code Injection on iOS 8 for the Greater Good
    00:00
  • Repurposing OnionDuke: A Single Case Study Around Reusing Nation State Malware
    00:00
  • Bring Back the Honeypots
    00:00
  • Exploiting the DRAM Rowhammer Bug to Gain Kernel Privileges
    00:00
  • Emanate Like A Boss: Generalized Covert Data Exfiltration With Funtenna
    00:00
  • Server-Side Template Injection: RCE For The Modern Web App
    00:00
  • Targeted Takedowns: Minimizing Collateral Damage Using Passive DNS
    00:00
  • The Little Pump Gauge That Could: Attacks Against Gas Pump Monitoring Systems
    00:00
  • The Applications Of Deep Learning On Traffic Identification
    00:00
  • The Node.js Highway: Attacks Are At Full Throttle
    00:00
  • Battle Of The SKM And IUM: How Windows 10 Rewrites OS Architecture
    00:00
  • Taking Event Correlation With You
    00:00
  • Internet-Scale File Analysis
    00:00
  • ThunderStrike 2: Sith Strike
    00:00
  • Hidden Risks Of Biometric Identifiers And How To Avoid Them
    00:00
  • How To Hack Government: Technologists As Policy Makers
    00:00
  • Breaking HTTPS With BGP Hijacking
    00:00
  • Data-Driven Threat Intelligence: Metrics On Indicator Dissemination And Sharing
    00:00
  • WSUSpect – Compromising The Windows Enterprise Via Windows Update
    00:00
  • Faux Disk Encryption: Realities Of Secure Storage On Mobile Deviceson
    00:00
  • Subverting Satellite Receivers For Botnet And Profit
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet