Black Hat USA 2015 part 03

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2015 part 03

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense Training for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

Course Content

Black Hat USA 2015 part 03

  • Most Ransomware Isn’t As Complex As You Might Think
    00:00
  • From False Positives To Actionable Analysis
    00:00
  • Android Security State Of The Union
    00:00
  • Winning The Online Banking War
    00:00
  • GameOver Zeus: Badguys And Backends
    00:00
  • Attacking Hypervisors Using Firmware And Hardware
    00:00
  • Commercial Mobile Spyware – Detecting The Undetectable
    00:00
  • The Memory Sinkhole – Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation
    00:00
  • Ah! Universal Android Rooting Is Back
    00:00
  • Fingerprints On Mobile Devices: Abusing And Leaking
    00:00
  • Pen Testing A City
    00:00
  • Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities
    00:00
  • Take A Hacker To Work Day – How Federal Prosecutors Use The CFAA
    00:00
  • SMBv2: Sharing More Than Just Your Files
    00:00
  • Back Doors And Front Doors Breaking The Unbreakable System
    00:00
  • Crash & Pay: How To Own And Clone Contactless Payment Devices
    00:00
  • How Vulnerable Are We To Scams?
    00:00
  • ROPInjector: Using Return Oriented Programming For Polymorphism And Antivirus Evasion
    00:00
  • Bringing A Cannon To A Knife Fight
    00:00
  • How To Implement IT Security After A Cyber Meltdown
    00:00
  • ZigBee Exploited The Good, The Bad, And The Ugly
    00:00
  • Broadcasting Your Attack: Security Testing DAB Radio In Cars
    00:00
  • Deep Learning On Disassembly
    00:00
  • Exploiting Out-of-Order Execution For Covert Cross-VM Communication
    00:00
  • Why Security Data Science Matters And How It’s Different
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet