Vídeos de Black Hat USA 2015
Y después del material, ya podemos acceder también a los vídeos de las presentaciones de Black Hat USA 2015:
- ZigBee Exploited The Good, The Bad, And The Ugly
- WSUSpect Compromising The Windows Enterprise Via Windows Update
- Writing Bad @$$ Malware For OS X
- Winning The Online Banking War
- Why Security Data Science Matters & How It's Different Pitfalls And Promises Of
- Why Security Data Science Matters & How It's Different Pitfalls And Promises Of
- When IoT Attacks Hacking A Linux Powered Rifle
- Web Timing Attacks Made Practical
- Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware
- Unicorn Next Generation CPU Emulator Framework
- Understanding The Attack Surface & Attack Resilience Of Project Spartan's New E
- Understanding And Managing Entropy Usage
- TrustKit Code Injection On IOS 8 For The Greater Good
- ThunderStrike 2 Sith Strike
- THIS IS DeepERENT Tracking App Behaviors With Nothing Changed Phone
- These're Not Your Grand Daddy's CPU Performance Counters CPU Hardware Performa
- The Tactical Application Security Program Getting Stuff Done
- The NSA Playset A Year Of Toys And Tools
- The Node js Highway Attacks Are At Full Throttle
- The Memory Sinkhole Unleashing An X86 Design Flaw Allowing Universal Privilege
- The Little Pump Gauge That Could Attacks Against Gas Pump Monitoring Systems
- The Lifecycle Of A Revolution
- The Kali Linux Dojo Workshop #2 Kali USB Setups With Persistent Stores & LUKS N
- The Kali Linux Dojo Workshop #1 Rolling Your Own Generating Custom Kali Linux 2
- The Battle For Free Speech On The Internet
- The Applications Of Deep Learning On Traffic Identification
- Taxonomic Modeling Of Security Threats In Software Defined Networking
- Targeted Takedowns Minimizing Collateral Damage Using Passive DNS
- Taking Event Correlation With You
- Take A Hacker To Work Day How Federal Prosecutors Use The CFAA
- Switches Get Stitches
- Subverting Satellite Receivers For Botnet And Profit
- Stranger Danger! What Is The Risk From 3rd Party Libraries
- Staying Persistent In Software Defined Networks
- Stagefright Scary Code In The Heart Of Android
- Spread Spectrum Satcom Hacking Attacking The Globalstar Simplex Data Service
- Social Engineering The Windows Kernel Finding & Exploiting Token Handling Vulne
- SMBv2 Sharing More Than Just Your Files
- Server Side Template Injection RCE For The Modern Web App
- Securing Your Big Data Environment
- ROPInjector Using Return Oriented Programming For Polymorphism & Antivirus Evas
- Rocking The Pocket Book Hacking Chemical Plant For Competition And Extortion
- Review And Exploit Neglected Attack Surfaces In IOS 8
- Return To Where You Can't Exploit What You Can't Find
- Repurposing OnionDuke A Single Case Study Around Reusing Nation State Malware
- Remote Physical Damage 101 Bread And Butter Attacks
- Remote Exploitation Of An Unaltered Passenger Vehicle
- Red Vs Blue Modern Active Directory Attacks, Detection, And Protection
- PWNIE AWARDS
- Pen Testing A City
- Panel How The Wassenaar Arrangement's Export Control Of Intrusion Soft Affect
- Optimized Fuzzing IOKit In IOS
- My Bro The ELK Obtaining Context From Security Events
- Most Ransomware Isn't As Complex As You Might Think
- Mobile Point Of Scam Attacking The Square Reader
- Is The NSA Still Listening To Your Calls A Surveillance Debate Congressiona
- Internet Scale File Analysis
- Internet Facing PLCs A New Back Orifice
- Internet Plumbing Gor Security Professionals The State Of BGP Security
- Information Access And Information Sharing Where We Are And Where We Are Going
- How Vulnerable Are We To Scams
- How To Implement IT Security After A Cyber Meltdown
- How To Hack Government Technologists As Policy Makers
- Hidden Risks Of Biometric Identifiers And How To Avoid Them
- HI THIS IS URGENT PLZ FIX ASAP Critical Vulnerabilities And Bug Bounty Programs
- Harnessing Intelligence From Malware Repositories
- Graphic Content Ahead Towards Auto Scalable Analysis Of Graphical Images Emb
- GameOver Zeus Badguys And Backends
- From False Positives To Actionable Analysis Behavioral Intrusion Detection
- Forging The USB Armory, An Open Source Secure Flash Drive Sized Computer
- Fingerprints On Mobile Devices Abusing And Leaking
- FileCry The New Age Of XXE
- Faux Disk Encryption Realities Of Secure Storage On Mobile Devices
- Exploiting XXE Vulnerabilities In File Parsing Functionality
- Exploiting The DRAM Rowhammer Bug To Gain Kernel Privileges
- Exploiting Out of Order Execution For Covert Cross VM Communication
- Emanate Like A Boss Generalized Covert Data Exfiltration With Funtenna
- Dom Flow Untangling The DOM For More Easy Juicy Bugs
- Distributing The Reconstruction Of High Level Intermediate Representation
- Defeating Pass the Hash Separation Of Powers
- Defeating Machine Learning What Your Security Vendor Is Not Telling You
- Deep Learning On Disassembly
- Data Driven Threat Intelligence Metrics On Indicator Dissemination And Sharing
- Dance Like Nobodys Watching Encrypt Like Everyone Is A Peek Inside The BlackHat
- Crash & Pay How To Own And Clone Contactless Payment Devices
- CrackLord Maximizing Password Cracking Boxes
- Commercial Mobile Spyware Detecting The Undetectable
- Cloning 3G4G SIM Cards With A PC And An Oscilloscope Lessons Learned
- Certifi gate Front Door Access To Pwning Millions Of Androids
- Bypass Surgery Abusing Content Delivery Networks With Ser-Side Request Forgery
- Bypass Control Flow Guard Comprehensively
- Broadcasting Your Attack Security Testing DAB Radio In Cars
- Bringing A Cannon To A Knife Fight
- Bring Back The Honeypots
- Breaking Payloads With Runtime Code Stripping And Image Freezing
- Breaking HTTPS With BGP Hijacking
- Breaking Honeypots For Fun And Profit
- Breaking Access Controls With BLEKey
- Big Game Hunting The Peculiarities Of Nation State Malware Research
- BGP Stream
- Behind The Mask The Agenda, Tricks, & Tactics Of The Federal Trade Commission A
- Battle Of The SKM And IUM How Windows 10 Rewrites OS Architecture
- Back Doors And Front Doors Breaking The Unbreakable System
- Automated Human Vulnerability Scanning With AVA
- Attacking Interoperability An OLE Edition
- Attacking Hypervisors Using Firmware And Hardware
- Attacking ECMAScript Engines With Redefinition
- Assessing And Exploiting BigNum Vulnerabilities
- API Deobfuscator Resolving Obfuscated API Functions In Modern Packers
- Android Security State Of The Union
- Ah! Universal Android Rooting Is Back
- Adventures In Femtoland 350 Yuan For Invaluable Fun
- Advanced IC Reverse Engineering Tech In Depth Analysis Of A Modern Smart Ca
- Abusing XSLT For Practical Attacks
- Abusing Windows Management Instrumentation WMI To Build A Persistent, Asyn
- Abusing Silent Mitigations Understanding Weaknesses Within Internet Explorer's
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec