Black Hat USA 2016 part 03

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2016 part 03

Black Hat – built by and for the global InfoSec community – returns to Las Vegas for its 19th year. This six-day event begins with four days of intense Training for security practitioners of all levels (July 30 – August 2) followed by the two-day main event including over 100 independently selected Briefings, Business Hall, Arsenal, Pwnie Awards, and more (August 3-4).

 

Join now

Course Content

Black Hat USA 2016 part 03

  • GreatFET: Making GoodFET Great Again
    00:00
  • Using EMET to Disable EMET
    00:00
  • Viral Video – Exploiting SSRF in Video Converters
    00:00
  • AVLeak: Fingerprinting Antivirus Emulators for Advanced Malware Evasionon
    00:00
  • Brute-Forcing Lockdown Harddrive Pin Codes
    00:00
  • Building a Product Security Incident Response Team: Learnings From the Hivemind
    00:00
  • Cyber War in Perspective: Analysis From the Crisis in Ukraine
    00:00
  • Security Through Design – Making Security Better By Designing for People
    00:00
  • Side-Channel Attacks on Everyday Applications
    00:00
  • The Risk From Power Lines: How to Sniff the G3 and Prime Data and Detect the Interfere Attack
    00:00
  • Unleash the Infection Monkey: A Modern Alternative to Pen-Tests
    00:00
  • Watching Commodity Malware Get Sold to a Targeted Actor
    00:00
  • BadTunnel: How Do I Get Big Brother Power?
    00:00
  • Blunting the Phisher’s Spear: A Risk-Based Approach…
    00:00
  • Dungeons Dragons and Security
    00:00
  • Dark Side of the DNS Force
    00:00
  • Keystone Engine: Next Generation Assembler Framework
    00:00
  • Pindemonium: A DBI-Based Generic Unpacker for Windows Executable
    00:00
  • Samsung Pay: Tokenized Numbers Flaws and Issues
    00:00
  • What’s the DFIRence for ICS?
    00:00
  • Defense At Hyperscale: Technologies and Policies for a Defensible Cyberspace
    00:00
  • Ouroboros: Tearing Xen Hypervisor With the Snake
    00:00
  • Advanced CAN Injection Techniques for Vehicle Networks
    00:00
  • TCP Injection Attacks in the Wild – a Large Scale Study
    00:00
  • The Remote Malicious Butler Did It!
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet