![](https://researcherstore.com/wp-content/plugins/phastpress/phast.php/c2VydmljZT1pbWFnZXMmc3JjPWh0dHBzJTN/BJTJGJTJGcmVzZWFyY2hlcnN0b3JlLmNvbSUyRndwLWNvbnRlbnQlMkZ1cGxvYWRzJTJGMjAyMSUyRjA3JTJGZXZlbnQtbG9nby11cy0xOS0lMjVEOCUyNUFBJTI1RDglMjVBRSUyNUQ4JTI1QjUlMjVEOSUyNThBJTI1RDglMjVCNS5wbmcmY2FjaGVNYXJrZXI9MTcwOTcwNjE1NC0yNzU0NiZ0b2tlbj0xNmVhNjM5ZDJmZGYyYjEw.q.png)
About Course
Black Hat USA 2019 part 01
Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.
Course Content
Black Hat USA 2019 part 01
-
Ghidra – Journey from Classified NSA Tool to Open Source
00:00 -
Black Hat USA 2019 Keynote: Every Security Team is a Software Team Now by Dino Dai Zovi
00:00 -
DevSecOps : What, Why and How
00:00 -
Behind the scenes of iOS and Mac Security
00:00 -
Selling 0-Days to Governments and Offensive Security Companies
00:00 -
GDPArrrrr: Using Privacy Laws to Steal Identities
00:00 -
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
00:00 -
Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
00:00 -
The Path Less Traveled: Abusing Kubernetes Defaults
00:00 -
Inside the Apple T2
00:00 -
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
00:00 -
MITRE ATT&CK: The Play at Home Edition
00:00 -
Infiltrating Corporate Intranet Like NSA – Pre-auth RCE on Leading SSL VPNs
00:00 -
Detecting Malicious Files with YARA Rules as They Traverse the Network
00:00 -
Process Injection Techniques – Gotta Catch Them All
00:00 -
Breaking Samsung’s ARM TrustZone
00:00 -
WebAuthn 101 – Demystifying WebAuthn
00:00 -
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
00:00 -
Death to the IOC: What’s Next in Threat Intelligence
00:00 -
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities
00:00 -
Woke Hiring Won’t Save Us: An Actionable Approach to Diversity Hiring and Retention
00:00 -
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
00:00 -
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
00:00 -
Command Injection in F5 iRules
00:00 -
Attacking iPhone XS Max
00:00 -
Breaking Encrypted Databases: Generic Attacks on Range Queries
00:00 -
New Vulnerabilities in 5G Networks
00:00 -
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
00:00 -
Infighting Among Russian Security Services in the Cyber Sphere
00:00
Student Ratings & Reviews
No Review Yet