
About Course
Black Hat USA 2020 part 2
Now in its 23rd year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest security research, development, and trends. BlackHat USA 2020 will be entirely virtual this year, held over the same dates, August 1-6 in Pacific Daylight Time (UTC−07:00).
Course Content
Black Hat USA 2020 part 2
-
Hacking the Voter: Lessons from a Decade of Russian Military Operations
00:00 -
Detecting Access Token Manipulation
00:00 -
Escaping Virtualized Containers
00:00 -
Ruling StarCraft Game Spitefully — Exploiting the Blind Spot of AI-Powered Game Bots
00:00 -
Practical Defenses Against Adversarial Machine Learning
00:00 -
Reverse Engineering the Tesla Battery Management System to increase Power Available
00:00 -
Needing the DoH: The Ongoing Encryption and Centralization of DNS
00:00 -
Policy Implications of Faulty Cyber Risk Models and How to Fix Them
00:00 -
A Little Less Speculation, a Little More Action: Deep Dive into Fuchsia’s Mitigations for CPU Side..
00:00 -
Kr00k: Serious Vulnerability Affected Encryption of Billion+ Wi-Fi Devices
00:00 -
Experimenting with Real-Time Event Feeds
00:00 -
Black-Box Laser Fault Injection on a Secure Memory
00:00 -
Portable Document Flaws 101
00:00 -
Breaking VSM by Attacking SecureKernel
00:00 -
TiYunZong Exploit Chain to Remotely Root Modern Android Devices – Pwn Android Phones from 2015-2020
00:00 -
I calc’d Calc – Exploiting Excel Online
00:00 -
Reversing the Root: Identifying the Exploited Vulnerability in 0-days Used In-The-Wild
00:00 -
Breaking Brains, Solving Problems: Lessons Learned from 2 Years of Setting puzzles for InfoSec Pros
00:00 -
Room for Escape: Scribbling Outside the Lines of Template Security
00:00 -
Breaking Samsung’s Root of Trust: Exploiting Samsung S10 Secure Boot
00:00 -
IoT Skimmer: Energy Market Manipulation through High-Wattage IoT Botnets
00:00 -
Improving Mental Models of End-to-End Encrypted Communication
00:00 -
Exploiting Kernel Races through Taming Thread Interleaving
00:00 -
Fooling Windows through Superfetch
00:00 -
Compromising the macOS Kernel through Safari by Chaining Six Vulnerabilities
00:00 -
Dive into Apple IO80211FamilyV2
00:00 -
HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges
00:00 -
Demigod: The Art of Emulating Kernel Rootkits
00:00 -
Spectra: Breaking Separation Between Wireless Chips
00:00 -
Stealthily Access Your Android Phones: Bypass the Bluetooth Authentication
00:00 -
An Unauthenticated Journey to Root: Pwning Your Company’s Enterprise Software Servers
00:00
Student Ratings & Reviews
No Review Yet