Black Hat USA 2016 part 02

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2016 part 02

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. This six-day event begins with four days of intense Training for security practitioners of all levels (July 30 – August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 3-4).

Course Content

Black Hat USA 2016 part 02

  • Memory Forensics Using Virtual Machine Introspection for Cloud Computing
    00:00
  • Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
    00:00
  • Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
    00:00
  • Adaptive Kernel Live Patching: An Open Collaborative Effort…
    00:00
  • Canspy: A Platform for Auditing Can Devices
    00:00
  • Drone Attacks on Industrial Wireless: A New Front in Cyber Security
    00:00
  • Gattacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool
    00:00
  • Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
    00:00
  • Towards a Holistic Approach in Building Intelligence to Fight Crimewareson
    00:00
  • 1000 Ways to Die in Mobile Oauth
    00:00
  • Xenpwn: Breaking Paravirtualized Devices
    00:00
  • AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
    00:00
  • An Insider’s Guide to Cyber-Insurance and Security Guarantees
    00:00
  • I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
    00:00
  • Does Dropping USB Drives in Parking Lots and Other Places Really Work?
    00:00
  • Into the Core: In-Depth Exploration of Windows 10 IoT Core
    00:00
  • Intra-Process Memory Protection for Applications on ARM and X86: Leveraging the ELF ABI
    00:00
  • Pwning Your Java Messaging With Deserialization Vulnerabilities
    00:00
  • Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy
    00:00
  • Access Keys Will Kill You Before You Kill the Password
    00:00
  • Account Jumping Post Infection Persistency & Lateral Movement in AWS
    00:00
  • Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX
    00:00
  • Crippling HTTPs With Unholy PAC
    00:00
  • Design Approaches for Security Automation
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet