Black Hat USA 2018 part 04

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2018 part 04

Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2018 opens with four days of technical pieces of training (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.

Course Content

Black Hat USA 2018 part 04

  • Why so Spurious? Achieving Local Privilege Escalation on Operating Systems
    00:00
  • Breaking Parser Logic: Take Your Path Normalization off and Pop 0days Out!n
    00:00
  • A Brief History of Mitigation: The Path to EL1 in iOS 11
    00:00
  • Squeezing a Key through a Carry Bit
    00:00
  • Behind the Speculative Curtain: The True Story of Fighting Meltdown and Spectre
    00:00
  • LTE Network Automation Under Threat
    00:00
  • Every ROSE has its Thorn: The Dark Art of Remote Online Social Engineering
    00:00
  • From Workstation to Domain Admin: Why Secure Administration isn’t Secure and How to Fix it
    00:00
  • Don’t @ Me: Hunting Twitter Bots at Scale
    00:00
  • Subverting Sysmon: Application of a Formalized Security Product Evasion Methodology
    00:00
  • WireGuard: Next Generation Secure Network Tunnel
    00:00
  • The Unbearable Lightness of BMC’s
    00:00
  • Meltdown: Basics, Details, Consequences
    00:00
  • Mental Health Hacks: Fighting Burnout, Depression and Suicide in the Hacker Community
    00:00
  • Threat Modeling in 2018: Attacks, Impacts and Other Updates
    00:00
  • Deep Dive into an ICS Firewall, Looking for the Fire Hole
    00:00
  • Screaming Channels: When Electromagnetic Side Channels Meet Radio Transceivers
    00:00
  • No Royal Road … Notes on Dangerous Game
    00:00
  • Reversing a Japanese Wireless SD Card – From Zero to Code Execution
    00:00
  • Compression Oracle Attacks on VPN Networks
    00:00
  • Remotely Attacking System Firmware
    00:00
  • Legal Landmines: How Law and Policy are Rapidly Shaping Information Security
    00:00
  • Blockchain Autopsies – Analyzing Ethereum Smart Contract Deaths
    00:00
  • Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools
    00:00
  • How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems
    00:00
  • A Dive in to Hyper-V Architecture & Vulnerabilities
    00:00
  • KeenLab iOS Jailbreak Internals: Userland Read-Only Memory can be Dangerous
    00:00
  • From Bot to Robot: How Abilities and Law Change with Physicality
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet