FileMood

Download blackhat2018videos

Blackhat2018videos

Name

blackhat2018videos

 DOWNLOAD Copy Link

Total Size

188.5 GB

Total Files

176

Hash

EE3AFE692138F8A58CD210C23D921F335546EC30

/Applied Security/

A Tangled Curl.mp4

547.0 MB

AFLs Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.mp4

720.6 MB

Applied Self-Driving Car Security.mp4

1.3 GB

Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.mp4

1.5 GB

ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4

461.7 MB

Black Box is Dead - Long Live Black Box.mp4

1.0 GB

Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4

960.0 MB

Detecting Credential Compromise in AWS.mp4

502.8 MB

Don't (at) Me - Hunting Twitter Bots at Scale.mp4

1.1 GB

Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.mp4

1.3 GB

Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.mp4

1.2 GB

Meltdown - Basics Details Consequences.mp4

319.2 MB

Real Eyes Realize Real Lies - Beating Deception Technologies.mp4

475.6 MB

So I became a Domain Controller.mp4

1.3 GB

The Air-Gap Jumpers.mp4

648.1 MB

/Community/

Demystifying PTSD in the Cybersecurity Environment.mp4

414.5 MB

Holding on for Tonight - Addiction in InfoSec.mp4

671.5 MB

How can Communities Move Forward After Incidents of Sexual Harassment or Assault.mp4

573.3 MB

How can Someone with Autism Specifically Enhance the Cyber Security Workforce.mp4

465.9 MB

Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.mp4

1.7 GB

Mental Health Hacks - Fighting Burnout Depression and Suicide in the Hacker Community.mp4

1.7 GB

Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4

1.3 GB

The Science of Hiring and Retaining Female Cybersecurity Engineers.mp4

1.7 GB

/Cryptography/

Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4

960.0 MB

Compression Oracle Attacks on VPN Networks.mp4

769.1 MB

Efail - Breaking SMIME and OpenPGP Email Encryption using Exfiltration Channels.mp4

1.3 GB

Lowering the Bar - Deep Learning for Side Channel Analysis.mp4

1.2 GB

Playback - A TLS 1.3 Story.mp4

736.7 MB

Return of Bleichenbachers Oracle Threat - ROBOT.mp4

497.5 MB

Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4

1.3 GB

Squeezing a Key through a Carry Bit.mp4

779.0 MB

WireGuard - Next Generation Secure Network Tunnel.mp4

1.6 GB

/Data Forensics and Incident Response/

Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4

661.4 MB

Detecting Credential Compromise in AWS.mp4

502.8 MB

Dissecting Non-Malicious Artifacts - One IP at a Time.mp4

532.3 MB

Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.mp4

851.2 MB

Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4

539.9 MB

None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.mp4

698.5 MB

Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4

1.1 GB

/Day Zero/

Day Zero.mp4

3.0 GB

/Enterprise/

A Deep Dive into macOS MDM and How it can be Compromised.mp4

1.3 GB

An Attacker Looks at Docker - Approaching Multi-Container Applications.mp4

1.0 GB

Compression Oracle Attacks on VPN Networks.mp4

769.1 MB

Deep Neural Networks for Hackers - Methods Applications and Open Source Tools.mp4

1.3 GB

From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.mp4

1.5 GB

Identity Theft - Attacks on SSO Systems.mp4

1.0 GB

InfoSec Philosophies for the Corrupt Economy.mp4

233.8 MB

Mainframe zOS Reverse Engineering and Exploit Development.mp4

1.0 GB

Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4

539.9 MB

Open Sesame - Picking Locks with Cortana.mp4

1.3 GB

Real Eyes Realize Real Lies - Beating Deception Technologies.mp4

475.6 MB

Remotely Attacking System Firmware.mp4

1.5 GB

So I became a Domain Controller.mp4

1.3 GB

Stop that Release There's a Vulnerability.mp4

742.2 MB

/Exploit Development/

A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4

939.2 MB

Another Flip in the Row.mp4

949.1 MB

Attacking Client-Side JIT Compilers.mp4

1.4 GB

Automated Discovery of Deserialization Gadget Chains.mp4

1.0 GB

Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.mp4

871.8 MB

DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4

1.5 GB

Exploitation of a Modern Smartphone Baseband.mp4

1.3 GB

Fire and Ice - Making and Breaking macOS Firewalls.mp4

813.3 MB

From Thousands of Hours to a Couple of Minutes - Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.mp4

1.5 GB

Hardening Hyper-V through Offensive Security Research.mp4

1.2 GB

Its a PHP Unserialization Vulnerability Jim but Not as We Know It.mp4

1.3 GB

KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4

1.4 GB

Over-the-Air - How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars.mp4

1.2 GB

SirenJack - Cracking a Secure Emergency Warning Siren System.mp4

934.7 MB

The Problems and Promise of WebAssembly.mp4

353.5 MB

The Unbearable Lightness of BMCs.mp4

1.0 GB

TLBleed - When Protecting Your CPU Caches is Not Enough.mp4

1.2 GB

/Hardware Embedded/

For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4

914.9 MB

GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.mp4

918.6 MB

I for One Welcome Our New Power Analysis Overlords.mp4

787.6 MB

Last Call for SATCOM Security.mp4

1.4 GB

Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4

1.3 GB

Software Attacks on Hardware Wallets.mp4

227.2 MB

The Unbearable Lightness of BMCs.mp4

1.0 GB

There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4

990.4 MB

TLBleed - When Protecting Your CPU Caches is Not Enough.mp4

1.2 GB

TRITON - How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever.mp4

1.1 GB

Understanding and Exploiting Implanted Medical Devices.mp4

1.4 GB

Wrangling with the Ghost - An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4

1.0 GB

/Human Factors/

AI and ML in Cyber Security - Why Algorithms are Dangerous.mp4

1.5 GB

Catch me Yes we can - Pwning Social Engineers using Natural Language Processing Techniques in Real-Time.mp4

1.3 GB

Dont (at) Me - Hunting Twitter Bots at Scale.mp4

1.1 GB

Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.mp4

1.0 GB

Exposing the Bait - A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection.mp4

679.8 MB

InfoSec Philosophies for the Corrupt Economy.mp4

233.8 MB

Is the Mafia Taking Over Cybercrime.mp4

244.0 MB

Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4

1.3 GB

Two-Factor Authentication Usable or Not - A Two-Phase Usability Study of the FIDO U2F Security Key.mp4

709.3 MB

Your Voice is My Passport.mp4

1.2 GB

/Internet of Things/

Back to the Future - A Radical Insecure Design of KVM on ARM.mp4

731.7 MB

Breaking the IIoT - Hacking industrial Control Gateways.mp4

884.1 MB

How I Learned to Stop Worrying and Love the SBOM.mp4

533.0 MB

I for One Welcome Our New Power Analysis Overlords.mp4

787.6 MB

IoT Malware - Comprehensive Survey Analysis Framework and Case Studies.mp4

1.2 GB

Legal Liability for IOT Cybersecurity Vulnerabilities.mp4

1.4 GB

Outsmarting the Smart City.mp4

1.3 GB

Over-the-Air - How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars.mp4

1.2 GB

Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.mp4

1.2 GB

Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4

1.1 GB

Snooping on Cellular Gateways and Their Critical Role in ICS.mp4

1.4 GB

Understanding and Exploiting Implanted Medical Devices.mp4

1.4 GB

Your Voice is My Passport.mp4

1.2 GB

/Key Note/

Optimistic Dissatisfaction with the Status Quo - Steps We Must Take to Improve Security in Complex Landscapes.mp4

589.9 MB

/Malware/

Decompiler Internals - Microcode.mp4

1.7 GB

Deep Neural Networks for Hackers - Methods Applications and Open Source Tools.mp4

1.3 GB

DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4

1.5 GB

Dissecting Non-Malicious Artifacts - One IP at a Time.mp4

532.3 MB

IoT Malware - Comprehensive Survey Analysis Framework and Case Studies.mp4

1.2 GB

Kernel Mode Threats and Practical Defenses.mp4

1.2 GB

Measuring the Speed of the Red Queens Race - Adaption and Evasion in Malware.mp4

744.3 MB

Miasm2 - Reverse Engineering Framework.mp4

946.8 MB

No Royal Road - Notes on Dangerous Game.mp4

1.3 GB

Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks.mp4

1.2 GB

Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4

1.1 GB

Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4

1.4 GB

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4

1.2 GB

The Air-Gap Jumpers.mp4

648.1 MB

Windows Offender - Reverse Engineering Windows Defenders Antivirus Emulator.mp4

1.6 GB

/Mobile/

ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4

461.7 MB

Back to the Future - A Radical Insecure Design of KVM on ARM.mp4

731.7 MB

Exploitation of a Modern Smartphone Baseband.mp4

1.3 GB

For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4

914.9 MB

KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4

1.4 GB

LTE Network Automation Under Threat.mp4

1.4 GB

Malware Analysts vs Malware Authors.mp4

1.0 GB

Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4

1.4 GB

/Network Defense/

Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4

661.4 MB

Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4

1.4 GB

Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4

569.5 MB

Fire & Ice - Making and Breaking macOS Firewalls.mp4

813.3 MB

From Workstation to Domain Admin - Why Secure Administration isnt Secure and How to Fix it.mp4

1.5 GB

LTE Network Automation Under Threat.mp4

1.4 GB

Open Sesame - Picking Locks with Cortana.mp4

1.3 GB

Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4

1.2 GB

The Finest Penetration Testing Framework for Software-Defined Networks.mp4

1.4 GB

WireGuard - Next Generation Secure Network Tunnel.mp4

1.6 GB

ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4

1.4 GB

/Platform Security/

A Deep Dive into macOS MDM and How it can be Compromised.mp4

1.3 GB

A Dive in to Hyper-V Architecture snd Vulnerabilities.mp4

1.3 GB

Another Flip in the Row.mp4

949.1 MB

Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.mp4

455.1 MB

Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4

1.4 GB

Hardening Hyper-V through Offensive Security Research.mp4

1.2 GB

Mainframe zOS Reverse Engineering and Exploit Development.mp4

1.0 GB

Meltdown - Basics Details Consequences.mp4

319.2 MB

Remotely Attacking System Firmware.mp4

1.5 GB

The Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4

1.4 GB

WebAssembly - A New World of Native Exploits on the Browser.mp4

1.4 GB

Why so Spurious - How a Highly Error-Prone x86 x64 CPU Feature can be Abused.mp4

1.6 GB

Wrangling with the Ghost - An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4

1.0 GB

ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4

1.4 GB

/Policy/

Demystifying PTSD in the Cybersecurity Environment.mp4

414.5 MB

From Bot to Robot - How Abilities and Law Change with Physicality.mp4

1.2 GB

How I Learned to Stop Worrying and Love the SBOM.mp4

533.0 MB

New Norms and Policies in Cyber-Diplomacy.mp4

496.2 MB

/Pwnie Awards/

Pwnie Awards.mp4

1.9 GB

/Reverse Engineering/

A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4

939.2 MB

A Dive in to Hyper-V Architecture anf Vulnerabilities.mp4

1.3 GB

Attacking Client-Side JIT Compilers.mp4

1.4 GB

Decompiler Internals - Microcode.mp4

1.7 GB

Finding Xori - Malware Analysis Triage with Automated Disassembly.mp4

586.0 MB

Last Call for SATCOM Security.mp4

1.4 GB

Malware Analysts vs Malware Authors.mp4

1.0 GB

Miasm2 - Reverse Engineering Framework.mp4

946.8 MB

Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4

1.1 GB

The Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4

1.4 GB

There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4

990.4 MB

Windows Offender - Reverse Engineering Windows Defenders Antivirus Emulator.mp4

1.6 GB

/Security Development Lifecycle/

SDL for the Rest of Us - Getting Started with Software Security.mp4

1.6 GB

Threat Modeling in 2018 - Attacks Impacts and Other Updates.mp4

1.2 GB

/Smart Grid/

Deep Dive into an ICS Firewall Looking for the Fire Hole.mp4

1.5 GB

/Web AppSec/

Practical Web Cache Poisoning - Redefining Unexploitable.mp4

941.6 MB

 

Total files 176


Copyright © 2024 FileMood.com