Black Hat USA 2020 part 1

  • Course level: Beginner


Black Hat USA 2020 part 1

Now in its 23rd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest security research, development, and trends. BlackHat USA 2020 will be entirely virtual this year, held over the same dates, August 1-6 in Pacific Daylight Time (UTC−07:00).

Join now 

Topics for this course

30 Lessons

Black Hat USA 2020

Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant00:00:00
All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate…00:00:00
IMP4GT: IMPersonation Attacks in 4G NeTworks00:00:00
Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers00:00:00
A Hacker’s Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning00:00:00
Demystifying Modern Windows Rootkits00:00:00
Demystifying Modern Windows Rootkits00:00:00
Hunting Invisible Salamanders: Cryptographic (in)Security with Attacker-Controlled Keys00:00:00
Office Drama on macOS00:00:00
Remote Timing Attacks on TPMs, AKA TPM-Fail00:00:00
Decade of the RATs – Custom Chinese Linux Rootkits for Everyone00:00:00
About Directed Fuzzing and Use-After-Free: How to Find Complex & Silent Bugs?00:00:00
CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms00:00:00
Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation00:00:00
Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic00:00:00
Security Research on Mercedes-Benz: From Hardware to Car Control00:00:00
Virtually Private Networks00:00:00
Plundervolt: Flipping Bits from Software without Rowhammer00:00:00
Operation Chimera – APT Operation Targets Semiconductor Vendors00:00:00
A Framework for Evaluating and Patching the Human Factor in Cybersecurity00:00:00
NoJITsu: Locking Down JavaScript Engines00:00:00
Hiding Process Memory via Anti-Forensic Techniques00:00:00
EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks00:00:00
Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa00:00:00
Industrial Protocol Gateways Under Analysis00:00:00
When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security00:00:00
Beyond Root: Custom Firmware for Embedded Mobile Chipsets00:00:00
Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon00:00:00
Lamphone: Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps00:00:00
Emulating Samsung’s Baseband for Security Testing00:00:00
Black Hat USA 2020

Enrolment validity: Lifetime