Black Hat USA 2016 part 02

  • Course level: Beginner


Black Hat USA 2016 part 02

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. This six-day event begins with four days of intense Training for security practitioners of all levels (July 30 – August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 3-4).

Topics for this course

24 Lessons

Black Hat USA 2016 part 02

Memory Forensics Using Virtual Machine Introspection for Cloud Computing00:00:00
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS00:00:00
Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root00:00:00
Adaptive Kernel Live Patching: An Open Collaborative Effort…00:00:00
Canspy: A Platform for Auditing Can Devices00:00:00
Drone Attacks on Industrial Wireless: A New Front in Cyber Security00:00:00
Gattacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool00:00:00
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools00:00:00
Towards a Holistic Approach in Building Intelligence to Fight Crimewareson00:00:00
1000 Ways to Die in Mobile Oauth00:00:00
Xenpwn: Breaking Paravirtualized Devices00:00:00
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It00:00:00
An Insider’s Guide to Cyber-Insurance and Security Guarantees00:00:00
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache00:00:00
Does Dropping USB Drives in Parking Lots and Other Places Really Work?00:00:00
Into the Core: In-Depth Exploration of Windows 10 IoT Core00:00:00
Intra-Process Memory Protection for Applications on ARM and X86: Leveraging the ELF ABI00:00:00
Pwning Your Java Messaging With Deserialization Vulnerabilities00:00:00
Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy00:00:00
Access Keys Will Kill You Before You Kill the Password00:00:00
Account Jumping Post Infection Persistency & Lateral Movement in AWS00:00:00
Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX00:00:00
Crippling HTTPs With Unholy PAC00:00:00
Design Approaches for Security Automation00:00:00
Black Hat USA 2016

Enrolment validity: Lifetime