About Course
Black Hat USA 2019 part 03
Now in its 22nd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development, and trends. BlackHat USA 2019 opens with four days of technical Training (August 3-6) followed by the two-day main conference (August 7-8) featuring Briefings, Arsenal, Business Hall, and more.
Course Content
Black Hat USA 2019 part 03
-
Dragonblood: Attacking the Dragonfly Handshake of WPA3
00:00 -
Moving from Hacking IoT Gadgets to Breaking into One of Europe’s Highest Hotel Suites
00:00 -
PicoDMA: DMA Attacks at Your Fingertips
00:00 -
HTTP Desync Attacks: Smashing into the Cell Next Door
00:00 -
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
00:00 -
Controlled Chaos: The Inevitable Marriage of DevOps & Security
00:00 -
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
00:00 -
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
00:00 -
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
00:00 -
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
00:00 -
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
00:00 -
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
00:00 -
HostSplit: Exploitable Antipatterns in Unicode Normalization
00:00 -
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
00:00 -
Exploring the New World : Remote Exploitation of SQLite and Curl
00:00 -
Selling 0-Days to Governments and Offensive Security Companies
00:00 -
Defense Against Rapidly Morphing DDOS
00:00 -
Arm IDA and Cross Check: Reversing the Boeing 787’s Core Network
00:00 -
Lessons From Two Years of Crypto Audits
00:00 -
He Said, She Said – Poisoned RDP Offense and Defense
00:00 -
Chip.Fail – Glitching the Silicon of the Connected World
00:00 -
Testing Your Organization’s Social Media Awareness
00:00 -
Making Big Things Better The Dead Cow Way
00:00 -
Debug for Bug: Crack and Hack Apple Core by Itself
00:00 -
MINimum Failure – Stealing Bitcoins with Electromagnetic Fault Injection
00:00 -
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
00:00 -
Internet-Scale Analysis of AWS Cognito Security
00:00 -
Breaking Encrypted Databases: Generic Attacks on Range Queries
00:00 -
Firmware Cartography: Charting the Course for Modern Server Compromise
00:00
Student Ratings & Reviews
No Review Yet