Black Hat USA 2018 part 04

  • Course level: Beginner


Black Hat USA 2018 part 04

Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2018 opens with four days of technical pieces of training (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.

Topics for this course

28 Lessons

Black Hat USA 2018 part 04

Why so Spurious? Achieving Local Privilege Escalation on Operating Systems00:00:00
Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!n00:00:00
A Brief History of Mitigation: The Path to EL1 in iOS 1100:00:00
Squeezing a Key through a Carry Bit00:00:00
Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre00:00:00
LTE Network Automation Under Threat00:00:00
Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering00:00:00
From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it00:00:00
Don’t @ Me: Hunting Twitter Bots at Scale00:00:00
Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology00:00:00
WireGuard: Next Generation Secure Network Tunnel00:00:00
The Unbearable Lightness of BMC’s00:00:00
Meltdown: Basics, Details, Consequences00:00:00
Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community00:00:00
Threat Modeling in 2018: Attacks, Impacts and Other Updates00:00:00
Deep Dive into an ICS Firewall, Looking for the Fire Hole00:00:00
Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers00:00:00
No Royal Road … Notes on Dangerous Game00:00:00
Reversing a Japanese Wireless SD Card – From Zero to Code Execution00:00:00
Compression Oracle Attacks on VPN Networks00:00:00
Remotely Attacking System Firmware00:00:00
Legal Landmines: How Law and Policy are Rapidly Shaping Information Security00:00:00
Blockchain Autopsies – Analyzing Ethereum Smart Contract Deaths00:00:00
Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools00:00:00
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems00:00:00
A Dive in to Hyper-V Architecture & Vulnerabilities00:00:00
KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous00:00:00
From Bot to Robot: How Abilities and Law Change with Physicality00:00:00
Black Hat USA 2018

Enrolment validity: Lifetime