Black Hat USA 2020 part 2

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Black Hat USA 2020 part 2

Now in its 23rd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest security research, development, and trends. BlackHat USA 2020 will be entirely virtual this year, held over the same dates, August 1-6 in Pacific Daylight Time (UTC−07:00).

Join now 

Course Content

Black Hat USA 2020 part 2

  • Hacking the Voter: Lessons from a Decade of Russian Military Operations
    00:00
  • Detecting Access Token Manipulation
    00:00
  • Escaping Virtualized Containers
    00:00
  • Ruling StarCraft Game Spitefully — Exploiting the Blind Spot of AI-Powered Game Bots
    00:00
  • Practical Defenses Against Adversarial Machine Learning
    00:00
  • Reverse Engineering the Tesla Battery Management System to increase Power Available
    00:00
  • Needing the DoH: The Ongoing Encryption and Centralization of DNS
    00:00
  • Policy Implications of Faulty Cyber Risk Models and How to Fix Them
    00:00
  • A Little Less Speculation, a Little More Action: Deep Dive into Fuchsia’s Mitigations for CPU Side..
    00:00
  • Kr00k: Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
    00:00
  • Experimenting with Real-Time Event Feeds
    00:00
  • Black-Box Laser Fault Injection on a Secure Memory
    00:00
  • Portable Document Flaws 101
    00:00
  • Breaking VSM by Attacking SecureKernel
    00:00
  • TiYunZong Exploit Chain to Remotely Root Modern Android Devices – Pwn Android Phones from 2015-2020
    00:00
  • I calc’d Calc – Exploiting Excel Online
    00:00
  • Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
    00:00
  • Breaking Brains, Solving Problems: Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
    00:00
  • Room for Escape: Scribbling Outside the Lines of Template Security
    00:00
  • Breaking Samsung’s Root of Trust: Exploiting Samsung S10 Secure Boot
    00:00
  • IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets
    00:00
  • Improving Mental Models of End-to-End Encrypted Communication
    00:00
  • Exploiting Kernel Races through Taming Thread Interleaving
    00:00
  • Fooling Windows through Superfetch
    00:00
  • Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
    00:00
  • Dive into Apple IO80211FamilyV2
    00:00
  • HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
    00:00
  • Demigod: The Art of Emulating Kernel Rootkits
    00:00
  • Spectra: Breaking Separation Between Wireless Chips
    00:00
  • Stealthily Access Your Android Phones: Bypass the Bluetooth Authentication
    00:00
  • An Unauthenticated Journey to Root: Pwning Your Company’s Enterprise Software Servers
    00:00

Student Ratings & Reviews

No Review Yet
No Review Yet
ResearcherStore

Want to receive push notifications for all major on-site activities?