Black Hat USA 2015 part 03

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2015 part 03

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 18th year. This six-day event begins with four days of intense Training for security practitioners of all levels (August 1-4) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 5-6).

Course Content

Black Hat USA 2015 part 03

  • Most Ransomware Isn’t As Complex As You Might Think
    00:00
  • From False Positives To Actionable Analysis
    00:00
  • Android Security State Of The Union
    00:00
  • Winning The Online Banking War
    00:00
  • GameOver Zeus: Badguys And Backends
    00:00
  • Attacking Hypervisors Using Firmware And Hardware
    00:00
  • Commercial Mobile Spyware – Detecting The Undetectable
    00:00
  • The Memory Sinkhole – Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation
    00:00
  • Ah! Universal Android Rooting Is Back
    00:00
  • Fingerprints On Mobile Devices: Abusing And Leaking
    00:00
  • Pen Testing A City
    00:00
  • Social Engineering The Windows Kernel: Finding And Exploiting Token Handling Vulnerabilities
    00:00
  • Take A Hacker To Work Day – How Federal Prosecutors Use The CFAA
    00:00
  • SMBv2: Sharing More Than Just Your Files
    00:00
  • Back Doors And Front Doors Breaking The Unbreakable System
    00:00
  • Crash & Pay: How To Own And Clone Contactless Payment Devices
    00:00
  • How Vulnerable Are We To Scams?
    00:00
  • ROPInjector: Using Return Oriented Programming For Polymorphism And Antivirus Evasion
    00:00
  • Bringing A Cannon To A Knife Fight
    00:00
  • How To Implement IT Security After A Cyber Meltdown
    00:00
  • ZigBee Exploited The Good, The Bad, And The Ugly
    00:00
  • Broadcasting Your Attack: Security Testing DAB Radio In Cars
    00:00
  • Deep Learning On Disassembly
    00:00
  • Exploiting Out-of-Order Execution For Covert Cross-VM Communication
    00:00
  • Why Security Data Science Matters And How It’s Different
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
Each day we give 100 Discount Coupons to the first 100 new visitors to our website. To benefit from this offer, use this code 1DF835024E during your orders to get 20% OFF
This is default text for notification bar