Black Hat USA 2019 part 03

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2019 part 03


Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.

 

Join now 

Course Content

Black Hat USA 2019 part 03

  • Dragonblood: Attacking the Dragonfly Handshake of WPA3
    00:00
  • Moving from Hacking IoT Gadgets to Breaking into One of Europe’s Highest Hotel Suites
    00:00
  • PicoDMA: DMA Attacks at Your Fingertips
    00:00
  • HTTP Desync Attacks: Smashing into the Cell Next Door
    00:00
  • Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
    00:00
  • Controlled Chaos: The Inevitable Marriage of DevOps & Security
    00:00
  • Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
    00:00
  • Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
    00:00
  • All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
    00:00
  • Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
    00:00
  • Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
    00:00
  • Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
    00:00
  • HostSplit: Exploitable Antipatterns in Unicode Normalization
    00:00
  • API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
    00:00
  • Exploring the New World : Remote Exploitation of SQLite and Curl
    00:00
  • Selling 0-Days to Governments and Offensive Security Companies
    00:00
  • Defense Against Rapidly Morphing DDOS
    00:00
  • Arm IDA and Cross Check: Reversing the Boeing 787’s Core Network
    00:00
  • Lessons From Two Years of Crypto Audits
    00:00
  • He Said, She Said – Poisoned RDP Offense and Defense
    00:00
  • Chip.Fail – Glitching the Silicon of the Connected World
    00:00
  • Testing Your Organization’s Social Media Awareness
    00:00
  • Making Big Things Better The Dead Cow Way
    00:00
  • Debug for Bug: Crack and Hack Apple Core by Itself
    00:00
  • MINimum Failure – Stealing Bitcoins with Electromagnetic Fault Injection
    00:00
  • Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
    00:00
  • Internet-Scale Analysis of AWS Cognito Security
    00:00
  • Breaking Encrypted Databases: Generic Attacks on Range Queries
    00:00
  • Firmware Cartography: Charting the Course for Modern Server Compromise
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet