
About Course
Black Hat USA 2018 part 04
Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2018 opens with four days of technical pieces of training (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.
Course Content
Black Hat USA 2018 part 04
-
Why so Spurious? Achieving Local Privilege Escalation on Operating Systems
00:00 -
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!n
00:00 -
A Brief History of Mitigation: The Path to EL1 in iOS 11
00:00 -
Squeezing a Key through a Carry Bit
00:00 -
Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre
00:00 -
LTE Network Automation Under Threat
00:00 -
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering
00:00 -
From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it
00:00 -
Don’t @ Me: Hunting Twitter Bots at Scale
00:00 -
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
00:00 -
WireGuard: Next Generation Secure Network Tunnel
00:00 -
The Unbearable Lightness of BMC’s
00:00 -
Meltdown: Basics, Details, Consequences
00:00 -
Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community
00:00 -
Threat Modeling in 2018: Attacks, Impacts and Other Updates
00:00 -
Deep Dive into an ICS Firewall, Looking for the Fire Hole
00:00 -
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
00:00 -
No Royal Road … Notes on Dangerous Game
00:00 -
Reversing a Japanese Wireless SD Card – From Zero to Code Execution
00:00 -
Compression Oracle Attacks on VPN Networks
00:00 -
Remotely Attacking System Firmware
00:00 -
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security
00:00 -
Blockchain Autopsies – Analyzing Ethereum Smart Contract Deaths
00:00 -
Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools
00:00 -
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems
00:00 -
A Dive in to Hyper-V Architecture & Vulnerabilities
00:00 -
KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous
00:00 -
From Bot to Robot: How Abilities and Law Change with Physicality
00:00
Student Ratings & Reviews
No Review Yet