Black Hat USA 2017 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2017 part 2

Now in its 20th year, Black Hat is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2017 kicks off with four days of technical Training (July 22-25) followed by the two-day main conference (July 26-27) featuring Briefings, Arsenal, Business Hall, and more.

 

Join now

Course Content

Black Hat USA 2017 part 2

  • Honey, I Shrunk the Attack Surface – Adventures in Android Security Hardening
    00:00
  • Escalating Insider Threats Using VMware’s API
    00:00
  • Tracking Ransomware End to End
    00:00
  • The Industrial Revolution of Lateral Movement
    00:00
  • Redesigning PKI to Solve Revocation Expiration and Rotation Problems
    00:00
  • Practical Tips for Defending Web Applications in the Age of DevOps
    00:00
  • Betraying the BIOS: Where the Guardians of the BIOS are Failing
    00:00
  • Fad or Future? Getting Past the Bug Bounty Hype
    00:00
  • Web Cache Deception Attack
    00:00
  • ShieldFS: The Last Word in Ransomware Resilient File Systems
    00:00
  • OpenCrypto: Unchaining the JavaCard Ecosystem
    00:00
  • Exploit Kit Cornucopia
    00:00
  • Hacking Serverless Runtimes: Profiling AWS Lambda Azure Functions & More
    00:00
  • Hacking Hardware with a $10 SD Card Reader
    00:00
  • Datacenter Orchestration Security and Insecurity: Assessing Kubernetes, Mesos, and Docker at Scale
    00:00
  • Evading Microsoft ATA for Active Directory Domination
    00:00
  • Breaking XSS Mitigations Via Script Gadgets
    00:00
  • WiFuzz: Detecting and Exploiting Logical Flaws in the Wi-Fi Cryptographic Handshake
    00:00
  • Friday the 13th: JSON Attacks
    00:00
  • All Your SMS & Contacts Belong to ADUPS & Others
    00:00
  • They’re Coming for Your Tools: Exploiting Design Flaws for Active Intrusion Prevention
    00:00
  • Exploiting a Single SQLite Vulnerability Across Multiple Software
    00:00
  • The Active Directory Botnet
    00:00
  • Automated Testing of Crypto Software Using Differential Fuzzing
    00:00
  • Big Game Theory Hunting: The Peculiarities of Human Behavior in the InfoSec Game
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet