Black Hat USA 2015 part 02

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2015 part 02

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense Training for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

Course Content

Black Hat USA 2015 part 02

  • CrackLord: Maximizing Password Cracking Boxes
    00:00
  • Web Timing Attacks Made Practical
    00:00
  • Breaking Access Controls With BLEKey
    00:00
  • Forging The USB Armory, An Open Source Secure Flash-Drive-Sized Computer
    00:00
  • When IoT Attacks: Hacking A Linux-Powered Rifle
    00:00
  • Abusing XSLT For Practical Attacks
    00:00
  • Internet Plumbing for Security Professionals: The State Of BGP Security
    00:00
  • Adventures In Femtoland: 350 Yuan For Invaluable Fun
    00:00
  • Optimized Fuzzing IOKit In iOS
    00:00
  • Graphic Content Ahead: Towards Automated Scalable Analysis Of Graphical Images Embedded In Malware
    00:00
  • Remote Physical Damage 101 – Bread And Butter Attacks
    00:00
  • Panel: How The Wassenaar Arrangement’s Export Control Of “Intrusion Software” Affects Industry
    00:00
  • Is The NSA Still Listening To Your Phone Calls? A Surveillance Debate
    00:00
  • Rocking The Pocket Book: Hacking Chemical Plant For Competition And Extortion
    00:00
  • Harnessing Intelligence From Malware Repositories
    00:00
  • Writing Bad @$$ Malware For OS X
    00:00
  • Red Vs. Blue: Modern Active Directory Attacks, Detection, And Protection
    00:00
  • Remote Exploitation Of An Unaltered Passenger Vehicle
    00:00
  • Abusing Windows Management Instrumentation (WMI)
    00:00
  • Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security
    00:00
  • Defeating Pass-the-Hash: Separation Of Powers
    00:00
  • The NSA Playset: A Year Of Toys And Tools
    00:00
  • Defeating Machine Learning: What Your Security Vendor Is Not Telling You
    00:00
  • Automated Human Vulnerability Scanning With AVA
    00:00
  • Advanced IC Reverse Engineering Techniques: In Depth Analysis Of A Modern Smart Card
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet