Black Hat USA 2016 part 03

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2016 part 03

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. This six-day event begins with four days of intense Training for security practitioners of all levels (July 30 – August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 3-4).

 

Join now

Course Content

Black Hat USA 2016 part 03

  • GreatFET: Making GoodFET Great Again
    00:00
  • Using EMET to Disable EMET
    00:00
  • Viral Video – Exploiting SSRF in Video Converters
    00:00
  • AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasionon
    00:00
  • Brute-Forcing Lockdown Harddrive Pin Codes
    00:00
  • Building a Product Security Incident Response Team: Learnings From the Hivemind
    00:00
  • Cyber War in Perspective: Analysis From the Crisis in Ukraine
    00:00
  • Security Through Design – Making Security Better By Designing for People
    00:00
  • Side-Channel Attacks on Everyday Applications
    00:00
  • The Risk From Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
    00:00
  • Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
    00:00
  • Watching Commodity Malware Get Sold to a Targeted Actor
    00:00
  • BadTunnel: How Do I Get Big Brother Power?
    00:00
  • Blunting the Phisher’s Spear: A Risk-Based Approach…
    00:00
  • Dungeons Dragons and Security
    00:00
  • Dark Side of the DNS Force
    00:00
  • Keystone Engine: Next Generation Assembler Framework
    00:00
  • Pindemonium: A DBI-Based Generic Unpacker for Windows Executable
    00:00
  • Samsung Pay: Tokenized Numbers Flaws and Issues
    00:00
  • What’s the DFIRence for ICS?
    00:00
  • Defense At Hyperscale: Technologies and Policies for a Defensible Cyberspace
    00:00
  • Ouroboros: Tearing Xen Hypervisor With the Snake
    00:00
  • Advanced CAN Injection Techniques for Vehicle Networks
    00:00
  • TCP Injection Attacks in the Wild – a Large Scale Study
    00:00
  • The Remote Malicious Butler Did It!
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
Each day we give 100 Discount Coupons to the first 100 new visitors to our website. To benefit from this offer, use this code 1DF835024E during your orders to get 20% OFF
This is default text for notification bar