Black Hat USA 2020 part 1

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2020 part 1

Now in its 23rd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest security research, development, and trends. BlackHat USA 2020 will be entirely virtual this year, held over the same dates, August 1-6 in Pacific Daylight Time (UTC−07:00).

Join now 

Course Content

Black Hat USA 2020

  • Lateral Movement & Privilege Escalation in GCP; Compromise Organizations without Dropping an Implant
    00:00
  • All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate…
    00:00
  • IMP4GT: IMPersonation Attacks in 4G NeTworks
    00:00
  • Building a Vulnerability Disclosure Program that Works for Election Vendors and Hackers
    00:00
  • A Hacker’s Guide to Reducing Side-Channel Attack Surfaces Using Deep-Learning
    00:00
  • Demystifying Modern Windows Rootkits
    00:00
  • Demystifying Modern Windows Rootkits
    00:00
  • Hunting Invisible Salamanders: Cryptographic (in)Security with Attacker-Controlled Keys
    00:00
  • Office Drama on macOS
    00:00
  • Remote Timing Attacks on TPMs, AKA TPM-Fail
    00:00
  • Decade of the RATs – Custom Chinese Linux Rootkits for Everyone
    00:00
  • About Directed Fuzzing and Use-After-Free: How to Find Complex & Silent Bugs?
    00:00
  • CloudLeak: DNN Model Extractions from Commercial MLaaS Platforms
    00:00
  • Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation
    00:00
  • Uncommon Sense: Detecting Exploits with Novel Hardware Performance Counters and ML Magic
    00:00
  • Security Research on Mercedes-Benz: From Hardware to Car Control
    00:00
  • Virtually Private Networks
    00:00
  • Plundervolt: Flipping Bits from Software without Rowhammer
    00:00
  • Operation Chimera – APT Operation Targets Semiconductor Vendors
    00:00
  • A Framework for Evaluating and Patching the Human Factor in Cybersecurity
    00:00
  • NoJITsu: Locking Down JavaScript Engines
    00:00
  • Hiding Process Memory via Anti-Forensic Techniques
    00:00
  • EtherOops: Exploring Practical Methods to Exploit Ethernet Packet-in-Packet Attacks
    00:00
  • Building Cyber Security Strategies for Emerging Industries in Sub Saharan Africa
    00:00
  • Industrial Protocol Gateways Under Analysis
    00:00
  • When Lightning Strikes Thrice: Breaking Thunderbolt 3 Security
    00:00
  • Beyond Root: Custom Firmware for Embedded Mobile Chipsets
    00:00
  • Superman Powered by Kryptonite: Turn the Adversarial Attack into Your Defense Weapon
    00:00
  • Lamphone: Real-Time Passive Reconstruction of Speech Using Light Emitted from Lamps
    00:00
  • Emulating Samsung’s Baseband for Security Testing
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet