
About Course
Black Hat USA 2016 part 02
Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. This six-day event begins with four days of intense Training for security practitioners of all levels (July 30 – August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 3-4).
Course Content
Black Hat USA 2016 part 02
-
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
00:00 -
Nonce-Disrespecting Adversaries: Practical Forgery Attacks on GCM in TLS
00:00 -
Subverting Apple Graphics: Practical Approaches to Remotely Gaining Root
00:00 -
Adaptive Kernel Live Patching: An Open Collaborative Effort…
00:00 -
Canspy: A Platform for Auditing Can Devices
00:00 -
Drone Attacks on Industrial Wireless: A New Front in Cyber Security
00:00 -
Gattacking Bluetooth Smart Devices – Introducing a New BLE Proxy Tool
00:00 -
Secure Penetration Testing Operations: Demonstrated Weaknesses in Learning Material and Tools
00:00 -
Towards a Holistic Approach in Building Intelligence to Fight Crimewareson
00:00 -
1000 Ways to Die in Mobile Oauth
00:00 -
Xenpwn: Breaking Paravirtualized Devices
00:00 -
AMSI: How Windows 10 Plans to Stop Script-Based Attacks and How Well It Does It
00:00 -
An Insider’s Guide to Cyber-Insurance and Security Guarantees
00:00 -
I Came to Drop Bombs: Auditing the Compression Algorithm Weapon Cache
00:00 -
Does Dropping USB Drives in Parking Lots and Other Places Really Work?
00:00 -
Into the Core: In-Depth Exploration of Windows 10 IoT Core
00:00 -
Intra-Process Memory Protection for Applications on ARM and X86: Leveraging the ELF ABI
00:00 -
Pwning Your Java Messaging With Deserialization Vulnerabilities
00:00 -
Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy
00:00 -
Access Keys Will Kill You Before You Kill the Password
00:00 -
Account Jumping Post Infection Persistency & Lateral Movement in AWS
00:00 -
Breaking Kernel Address Space Layout Randomization (KASLR) With Intel TSX
00:00 -
Crippling HTTPs With Unholy PAC
00:00 -
Design Approaches for Security Automation
00:00
Student Ratings & Reviews
No Review Yet