Black Hat USA 2015 part 02

  • Course level: Beginner


Black Hat USA 2015 part 02

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense Training for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

Topics for this course

25 Lessons

Black Hat USA 2015 part 02

CrackLord: Maximizing Password Cracking Boxes00:00:00
Web Timing Attacks Made Practical00:00:00
Breaking Access Controls With BLEKey00:00:00
Forging The USB Armory, An Open Source Secure Flash-Drive-Sized Computer00:00:00
When IoT Attacks: Hacking A Linux-Powered Rifle00:00:00
Abusing XSLT For Practical Attacks00:00:00
Internet Plumbing for Security Professionals: The State Of BGP Security00:00:00
Adventures In Femtoland: 350 Yuan For Invaluable Fun00:00:00
Optimized Fuzzing IOKit In iOS00:00:00
Graphic Content Ahead: Towards Automated Scalable Analysis Of Graphical Images Embedded In Malware00:00:00
Remote Physical Damage 101 – Bread And Butter Attacks00:00:00
Panel: How The Wassenaar Arrangement’s Export Control Of “Intrusion Software” Affects Industry00:00:00
Is The NSA Still Listening To Your Phone Calls? A Surveillance Debate00:00:00
Rocking The Pocket Book: Hacking Chemical Plant For Competition And Extortion00:00:00
Harnessing Intelligence From Malware Repositories00:00:00
Writing Bad @$$ Malware For OS X00:00:00
Red Vs. Blue: Modern Active Directory Attacks, Detection, And Protection00:00:00
Remote Exploitation Of An Unaltered Passenger Vehicle00:00:00
Abusing Windows Management Instrumentation (WMI)00:00:00
Cloning 3G/4G SIM Cards With A PC And An Oscilloscope: Lessons Learned In Physical Security00:00:00
Defeating Pass-the-Hash: Separation Of Powers00:00:00
The NSA Playset: A Year Of Toys And Tools00:00:00
Defeating Machine Learning: What Your Security Vendor Is Not Telling You00:00:00
Automated Human Vulnerability Scanning With AVA00:00:00
Advanced IC Reverse Engineering Techniques: In Depth Analysis Of A Modern Smart Card00:00:00
Black Hat USA 2015

Enrolment validity: Lifetime