/BlackhatUSA2017-presentations/
|
us-17-Ablon-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Zero-Days-Thousands-Of-Nights-RAND.pdf
|
1.8 MB
|
us-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf
|
2.5 MB
|
us-17-Alva-So-You-Want-To-Market-Your-Security-Product.pdf
|
3.9 MB
|
us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf
|
788.5 KB
|
us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection.pdf
|
4.8 MB
|
us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets-wp.pdf
|
430.2 KB
|
us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf
|
2.9 MB
|
us-17-Aumasson-Automated-Testing-Of-Crypto-Software-Using-Differential-Fuzzing.pdf
|
5.6 MB
|
us-17-Bates-Splunking-Dark-Tools-A-Pentesters-Guide-To-Pwnage-Visualization.pdf
|
74.0 MB
|
us-17-Beery-The-Industrial-Revolution-Of-Lateral-Movement.pdf
|
4.6 MB
|
us-17-Bianco-Go-To-Hunt-Then-Sleep.pdf
|
2.9 MB
|
us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdf
|
2.5 MB
|
us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science.pdf
|
5.8 MB
|
us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf
|
6.6 MB
|
us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-BIOS-UEFI-Security-Vulnerabilities.pdf
|
1.4 MB
|
us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp.pdf
|
369.1 KB
|
us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed.pdf
|
4.2 MB
|
us-17-Bulygin-Fractured-Backbone-Breaking-Modern-OS-Defenses-With-Firmware-Attacks.pdf
|
3.1 MB
|
us-17-Burnett-Ichthyology-Phishing-As-A-Science-wp.pdf
|
2.2 MB
|
us-17-Burnett-Ichthyology-Phishing-As-A-Science.pdf
|
6.4 MB
|
us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp.pdf
|
686.8 KB
|
us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf
|
8.6 MB
|
us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence.pdf
|
5.2 MB
|
us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf
|
968.1 KB
|
us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp.pdf
|
702.4 KB
|
us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit.pdf
|
37.4 MB
|
us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf
|
1.7 MB
|
us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients-wp.pdf
|
644.9 KB
|
us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients.pdf
|
3.4 MB
|
us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems-wp.pdf
|
813.2 KB
|
us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems.pdf
|
3.4 MB
|
us-17-Cranor-Real-Users-Simulated-Attacks.pdf
|
21.6 MB
|
us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf
|
7.8 MB
|
us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf
|
234.4 KB
|
us-17-Domas-Breaking-The-x86-ISA.pdf
|
9.7 MB
|
us-17-Eissa-Network-Automation-Isnt-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network.pdf
|
2.4 MB
|
us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp.pdf
|
4.0 MB
|
us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader.pdf
|
15.7 MB
|
us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough-wp.pdf
|
2.6 MB
|
us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough.pdf
|
3.1 MB
|
us-17-Feng-Many-Birds-One-Stone-Exploiting-A-Single-SQLite-Vulnerability-Across-Multiple-Software.pdf
|
1.1 MB
|
us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop-wp.pdf
|
734.8 KB
|
us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop.pdf
|
3.4 MB
|
us-17-Gil-Web-Cache-Deception-Attack-wp.pdf
|
1.1 MB
|
us-17-Gil-Web-Cache-Deception-Attack.pdf
|
3.8 MB
|
us-17-Giuliano-Lies-And-Damn-Lies-Getting-Past-The-Hype-Of-Endpoint-Security-Solutions.pdf
|
2.9 MB
|
us-17-Gostomelsky-Hunting-GPS-Jammers.pdf
|
65.3 MB
|
us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&C-Toolkits-wp.pdf
|
50.6 KB
|
us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&C-Toolkits.pdf
|
4.6 MB
|
us-17-Gray-FlowFuzz-A-Framework-For-Fuzzing-OpenFlow-Enabled-Software-And-Hardware-Switches.pdf
|
3.3 MB
|
us-17-Herr-Bug-Collisions-Meet-Government-Vulnerability-Disclosure.pdf
|
23.0 MB
|
us-17-Hypponen-The-Epocholypse-2038-Whats-In-Store-For-The-Next-20-Years.pdf
|
4.8 MB
|
us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf
|
8.4 MB
|
us-17-Johnson-All-Your-SMS-&-Contacts-Belong-To-Adups-&-Others-wp.pdf
|
251.4 KB
|
us-17-Johnson-All-Your-SMS-&-Contacts-Belong-To-Adups-&-Others.pdf
|
15.5 MB
|
us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf
|
5.3 MB
|
us-17-Jurczyk-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-With-X86-Emulation-And-Taint-Tracking.pdf
|
6.1 MB
|
us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdf
|
3.7 MB
|
us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf
|
4.1 MB
|
us-17-Keliris-And-Then-The-Script-Kiddie-Said-Let-There-Be-No-Light-Are-Cyberattacks-On-The-Power-Grid-Limited-To-Nation-State-Actors-wp.pdf
|
85.0 KB
|
us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-tool.zip
|
36.2 KB
|
us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-wp.pdf
|
681.8 KB
|
us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf
|
6.3 MB
|
us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems-wp.pdf
|
1.0 MB
|
us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems.pdf
|
2.2 MB
|
us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox-wp.pdf
|
1.4 MB
|
us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox.pdf
|
18.6 MB
|
us-17-Kralevich-Honey-I-Shrunk-The-Attack-Surface-Adventures-In-Android-Security-Hardening.pdf
|
3.8 MB
|
us-17-Krug-Hacking-Severless-Runtimes-wp.pdf
|
645.8 KB
|
us-17-Krug-Hacking-Severless-Runtimes.pdf
|
6.0 MB
|
us-17-Lackey-Practical%20Tips-for-Defending-Web-Applications-in-the-Age-of-DevOps.pdf
|
1.2 MB
|
us-17-Lain-Skype-&-Type-Keystroke-Leakage-Over-VoIP.pdf
|
2.2 MB
|
us-17-Lee-Industroyer-Crashoverride-Zero-Things-Cool-About-A-Threat-Group-Targeting-The-Power-Grid.pdf
|
5.2 MB
|
us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf
|
1.1 MB
|
us-17-Lundgren-Taking-Over-The-World-Through-Mqtt-Aftermath.pdf
|
3.9 MB
|
us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices-wp.pdf
|
1.5 MB
|
us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices.pdf
|
4.1 MB
|
us-17-Matrosov-Betraying-The-BIOS-Where-The-Guardians-Of-The-BIOS-Are-Failing.pdf
|
9.2 MB
|
us-17-Mavroudis-Opencrypto-Unchaining-The-JavaCard-Ecosystem.pdf
|
2.3 MB
|
us-17-Mazurov-Brown-Protecting-Visual-Assets-Digital-Image-Counter-Forensics.pdf
|
1.4 MB
|
us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests-wp.pdf
|
295.9 KB
|
us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests.pdf
|
352.3 KB
|
us-17-Miller-The-Active-Directory-Botnet.pdf
|
4.0 MB
|
us-17-Mittal-Evading-MicrosoftATA-for-ActiveDirectory-Domination.pdf
|
1.7 MB
|
us-17-Mueller-Exploiting-Network-Printers.pdf
|
1.7 MB
|
us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf
|
795.5 KB
|
us-17-Munoz-Friday-The-13th-Json-Attacks.pdf
|
16.8 MB
|
us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers-wp.pdf
|
392.7 KB
|
us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers.pdf
|
459.1 KB
|
us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization-wp.pdf
|
786.3 KB
|
us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization.pdf
|
6.4 MB
|
us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf
|
1.1 MB
|
us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf
|
1.9 MB
|
us-17-OFlynn-Breaking-Electronic-Locks.pdf
|
3.9 MB
|
us-17-Osborn-White-Hat-Privilege-The-Legal-Landscape-For-A-Cybersecurity-Professional-Seeking-To-Safeguard-Sensitive-Client-Data.pdf
|
1.1 MB
|
us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification-wp.pdf
|
5.8 MB
|
us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification.pdf
|
4.4 MB
|
us-17-Pfoh-rVMI-A-New-Paradigm-For-Full-System-Analysis.pdf
|
3.6 MB
|
us-17-Picod-Attacking-Encrypted-USB-Keys-The-Hard_ware_-Way.pdf
|
16.4 MB
|
us-17-Pomonis-KR%5EX-%20Comprehensive-%20Kernel-Protection-Against-Just-In-Time-Code-Reuse.pdf
|
12.0 MB
|
us-17-Prandl-PEIMA-Harnessing-Power-Laws-To-Detect-Malicious-Activities-From-Denial-Of-Service-To-Intrusion-Detection-Traffic-Analysis-And-Beyond-wp.pdf
|
397.7 KB
|
us-17-Prandl-PEIMA-Harnessing-Power-Laws-To-Detect-Malicious-Activities-From-Denial-Of-Service-To-Intrusion-Detection-Traffic-Analysis-And-Beyond.pdf
|
1.8 MB
|
us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots-wp.pdf
|
2.1 MB
|
us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots.pdf
|
8.8 MB
|
us-17-Radocea-Intercepting-iCloud-Keychain.pdf
|
2.2 MB
|
us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog-wp.pdf
|
5.4 MB
|
us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog.pdf
|
500.9 KB
|
us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices-wp.pdf
|
317.8 KB
|
us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf
|
2.6 MB
|
us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors-wp.pdf
|
7.7 MB
|
us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors.pdf
|
3.1 MB
|
us-17-Ruthven-Fighting-Targeted-Malware-In-The-Mobile-Ecosystem.pdf
|
1.5 MB
|
us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data-wp.pdf
|
4.6 MB
|
us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data.pdf
|
2.0 MB
|
us-17-Sanders-What-Theyre-Teaching-Kids-These-Days-Comparing-Security-Curricula-And-Accreditations-To-Industry-Needs.pdf
|
1.1 MB
|
us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices-wp.pdf
|
18.3 MB
|
us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices.pdf
|
33.9 MB
|
us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update-wp.pdf
|
1.0 MB
|
us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update.pdf
|
2.1 MB
|
us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf
|
5.2 MB
|
us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf
|
9.2 MB
|
us-17-Shortridge-Big-Game-Theory-Hunting-The-Peculiarities-Of-Human-Behavior-In-The-Infosec-Game.pdf
|
4.9 MB
|
us-17-Silvanovich-The-Origin-Of-Array-Symbol-Species.pdf
|
750.4 KB
|
us-17-Singh-Wire-Me-Through-Machine-Learning.pdf
|
6.3 MB
|
us-17-Staggs-Adventures-In-Attacking-Wind-Farm-Control-Networks.pdf
|
3.3 MB
|
us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf
|
2.4 MB
|
us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf
|
2.1 MB
|
us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf
|
5.4 MB
|
us-17-Valtman-The-Art-Of-Securing-100-Products.pdf
|
20.7 MB
|
us-17-Vanhoef-WiFuzz-Detecting-And-Exploiting-Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake-tools.zip
|
15.8 KB
|
us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention-wp.pdf
|
207.7 KB
|
us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention.pdf
|
2.0 MB
|
us-17-Wang-Sonic-Gun-To-Smart-Devices-Your-Devices-Lose-Control-Under-Ultrasound-Or-Sound.pdf
|
7.2 MB
|
us-17-Wardle-Offensive-Malware-Analysis-Dissecting-OSXFruitFly-Via-A-Custom-C&C-Server.pdf
|
17.7 MB
|
us-17-Wright-Orange-Is-The-New-Purple-wp.pdf
|
225.0 KB
|
us-17-Wright-Orange-Is-The-New-Purple.pdf
|
29.5 MB
|
us-17-Yunusov-The-Future-Of-Applepwn-How-To-Save-Your-Money.pdf
|
2.7 MB
|
us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf
|
4.7 MB
|
us-17-Ziv-Escalating-Insider-Threats-Using-Vmwares-Api.pdf
|
2.1 MB
|
/
|
_in_Security_in_Building_Automation_How_to_Create_Dark_Buildings_with_Light_Speed.mp4
|
82.1 MB
|
A_New_Era_of_SSRF-Exploiting_URL_Parser_in_Trending_Programming_Languages.mp4
|
160.8 MB
|
Advanced_Pre-Breach_Planning_Utilizing_a_Purple_Team_to_Measure_Effectiveness_vs._Maturity.mp4
|
232.4 MB
|
Adventures_in_Attacking_Wind_Farm_Control_Networks.mp4
|
128.0 MB
|
All_Your_SMS_and_Contacts_Belong_to_ADUPS_and_Others.mp4
|
139.1 MB
|
An_ACE_Up_the_Sleeve_Designing_Active_Directory_DACL_Backdoors.mp4
|
287.4 MB
|
And_Then_the_Script-Kiddie_Said,_Let_There_be_No_Light._Are_Cyber-Attacks_on_the_Power_Grid_Limited_to_Nation-State_Actors.mp4
|
260.3 MB
|
Attacking_Encrypted_USB_Keys_the_Hard_ware_Way.mp4
|
99.1 MB
|
Automated_Detection_of_Vulnerabilities_in_Black-Box_Routers_and_Other_Network_Devices_.mp4
|
140.4 MB
|
Automated_Testing_of_Crypto_Software_Using_Differential_Fuzzing.mp4
|
159.4 MB
|
Avalanche_and_GozNym.mp4
|
147.2 MB
|
AVPASS_Leaking_and_Bypassing_Antivirus_Detection_Model_Automatically.mp4
|
175.7 MB
|
Behind_the_Plexiglass_Curtain_Stats_and_Stories_from_the_Black_Hat_NOC.mp4
|
134.1 MB
|
Betraying_the_BIOS_Where_the_Guardians_of_the_BIOS_are_Failing.mp4
|
355.6 MB
|
Big_Game_Theory_Hunting_The_Peculiarities_of_Human_Behavior_in_the_InfoSec_Game.mp4
|
178.5 MB
|
Black_Hat_USA_2017_Briefings_What_to_Keep_Track_Of.mp4
|
56.7 MB
|
Blue_Pill_for_Your_Phone.mp4
|
170.4 MB
|
Bochspwn_Reloaded_Detecting_Kernel_Memory_Disclosure_with_x86_Emulation_and_Taint_Tracking.mp4
|
191.9 MB
|
Bot_vs._Bot_for_Evading_Machine_Learning_Malware_Detection.mp4
|
82.8 MB
|
Breaking_Electronic_Door_Locks_Like_Youre_on_CSI_Cyber.mp4
|
157.4 MB
|
Breaking_the_Laws_of_Robotics_Attacking_Industrial_Robots.mp4
|
124.7 MB
|
Breaking_the_x86_Instruction_Set.mp4
|
158.3 MB
|
Broadpwn_Remotely_Compromising_Android_and_iOS_via_a_Bug_in_Broadcoms_Wi-Fi_Chipsets.mp4
|
209.0 MB
|
Bug_Collisions_Meet_Government_Vulnerability_Disclosure.mp4
|
232.9 MB
|
Challenges_of_Cooperation_Across_Cyberspace.mp4
|
260.5 MB
|
Cloak_and_Dagger_From_Two_Permissions_to_Complete_Control_of_the_UI_Feedback_Loop.mp4
|
133.8 MB
|
Cracking_the_Lens_Targeting_HTTPs_Hidden_Attack-Surface.mp4
|
186.8 MB
|
Cyber_Wargaming_Lessons_Learned_in_Influencing_Security_Stakeholders_Inside_and_Outside_Your_Organization.mp4
|
224.4 MB
|
Datacenter_Orchestration_Security_and_Insecurity_Assessing_Kubernetes,Mesos,and_Docker_at_Scale.mp4
|
158.6 MB
|
Death_by_a_Thousand_Abstracts_How_Not_to_Get_Your_Research_into_Black_Hat.mp4
|
77.7 MB
|
Defeating_Samsung_KNOX_with_Zero_Privilege.mp4
|
106.9 MB
|
Delivering_Javascript_to_World+Dog.mp4
|
134.5 MB
|
Developing_Trust_and_Gitting_Betrayed.mp4
|
189.5 MB
|
Digital_Vengeance_Exploiting_the_Most_Notorious_C_and_C_Toolkits.mp4
|
120.6 MB
|
Diversity_Panel_2017_Making_Diversity_a_Priority_In_Security.mp4
|
888.4 MB
|
Dont_Panic_The_Hitchhikers_Guide_to_Black_Hat.mp4
|
65.9 MB
|
Dont_Trust_the_DOM_Bypassing_XSS_Mitigations_via_Script_Gadgets.mp4
|
142.6 MB
|
Electronegativity-A_Study_of_Electron_Security.mp4
|
202.1 MB
|
Escalating_Insider_Threats_Using_VMwares_API.mp4
|
91.9 MB
|
Evading_Microsoft_ATA_for_Active_Directory_Domination.mp4
|
321.8 MB
|
Evil_Bubbles_or_How_to_Deliver_Attack_Payload_via_the_Physics_of_the_Process.mp4
|
189.5 MB
|
Evilsploit-A_Universal_Hardware_Hacking_Toolkit.mp4
|
241.3 MB
|
Evolutionary_Kernel_Fuzzing.mp4
|
213.9 MB
|
Exploit_Kit_Cornucopia.mp4
|
317.8 MB
|
Exploiting_Network_Printers.mp4
|
159.3 MB
|
Fad_or_Future_Getting_Past_the_Bug_Bounty_Hype.mp4
|
155.3 MB
|
Fighting_Targeted_Malware_in_the_Mobile_Ecosystem.mp4
|
48.2 MB
|
Fighting_the_Previous_War_aka_Attacking_and_Defending_in_the_Era_of_the_Cloud_.mp4
|
249.6 MB
|
Firmware_is_the_New_Black-Analyzing_Past_Three_Years_of_BIOSUEFI_Security_Vulnerabilities.mp4
|
206.6 MB
|
FlowFuzz-A_Framework_for_Fuzzing_OpenFlow-Enabled_Software_and_Hardware_Switches.mp4
|
129.4 MB
|
Fractured_Backbone_Breaking_Modern_OS_Defenses_with_Firmware_Attacks.mp4
|
188.0 MB
|
Free-Fall_Hacking_Tesla_from_Wireless_to_CAN_Bus.mp4
|
243.7 MB
|
Friday_the_13th_JSON_Attacks.mp4
|
183.0 MB
|
Game_of_Chromes_Owning_the_Web_with_Zombie_Chrome_Extensions.mp4
|
282.7 MB
|
Garbage_In,Garbage_Out_How_Purportedly_Great_Machine_Learning_Models_can_be_Screwed_Up_by_Bad_Data.mp4
|
90.7 MB
|
Ghost_Telephonist_Link_Hijack_Exploitations_in_4G_LTE_CS_Fallback.mp4
|
194.0 MB
|
Go_Nuclear_Breaking_Radiation_Monitoring_Devices.mp4
|
348.4 MB
|
Go_to_Hunt,Then_Sleep.mp4
|
299.7 MB
|
Hacking_Hardware_with_a_$10_SD_Card_Reader.mp4
|
254.9 MB
|
Hacking_Serverless_Runtimes_Profiling_AWS_Lambda,Azure_Functions,and_More.mp4
|
297.6 MB
|
Honey,I_Shrunk_the_Attack_Surface-Adventures_in_Android_Security_Hardening.mp4
|
207.6 MB
|
How_We_Created_the_First_SHA-1_Collision_and_What_it_Means_for_Hash_Security.mp4
|
116.3 MB
|
Hunting_GPS_Jammers.mp4
|
240.3 MB
|
Ichthyology_Phishing_as_a_Science.mp4
|
71.2 MB
|
IndustroyerCrashoverride_Zero_Things_Cool_About_a_Threat_Group_Targeting_the_Power_Grid.mp4
|
261.0 MB
|
Infecting_the_Enterprise_Abusing_Office365+Powershell_for_Covert_C2.mp4
|
188.7 MB
|
Influencing_the_Market_to_Improve_Security.mp4
|
96.3 MB
|
Intel_AMT_Stealth_Breakthrough.mp4
|
136.0 MB
|
Intel_SGX_Remote_Attestation_is_Not_Sufficient.mp4
|
300.5 MB
|
Intercepting_iCloud_Keychain.mp4
|
100.3 MB
|
IoTCandyJar_Towards_an_Intelligent-Interaction_Honeypot_for_IoT_Devices.mp4
|
214.8 MB
|
Keynote_Speaker.mp4
|
525.8 MB
|
kR^X_Comprehensive_Kernel_Protection_Against_Just-In-Time_Code_Reuse.mp4
|
92.2 MB
|
Lies,and_Damn_Lies_Getting_Past_the_Hype_of_Endpoint_Security_Solutions.mp4
|
189.2 MB
|
Many_Birds,One_Stone_Exploiting_a_Single_SQLite_Vulnerability_Across_Multiple_Software.mp4
|
110.0 MB
|
Network_Automation_is_Not_Your_Safe_Haven_Protocol_Analysis_and_Vulnerabilities_of_Autonomic_Network.mp4
|
312.8 MB
|
New_Adventures_in_Spying_3G_and_4G_Users_Locate,Track_and_Monitor.mp4
|
177.5 MB
|
Ochko123-How_the_Feds_Caught_Russian_Mega-Carder_Roman_Seleznev.mp4
|
134.6 MB
|
Offensive_Malware_Analysis_Dissecting_OSXFruitFly_via_a_Custom_C_and_C_Server.mp4
|
75.9 MB
|
OpenCrypto_Unchaining_the_JavaCard_Ecosystem.mp4
|
71.6 MB
|
Orange_is_the_New_Purple-How_and_Why_to_Integrate_Development_Teams_with_RedBlue_Teams_to_Build_More_Secure_Software.mp4
|
155.8 MB
|
PEIMA_Harnessing_Power_Laws_to_Detect_Malicious_Activities_from_Denial_of_Service_to_Intrusion_Detection,Traffic_Analysis,and_Beyond.mp4
|
63.5 MB
|
Practical_Tips_for_Defending_Web_Applications_in_the_Age_of_Agile_DevOps.mp4
|
120.0 MB
|
Practical_Tips_for_Defending_Web_Applications_in_the_Age_of_DevOps.mp4
|
120.0 MB
|
Protecting_Pentests_Recommendations_for_Performing_More_Secure_Tests.mp4
|
73.2 MB
|
Protecting_Visual_Assets_Digital_Image_Counter-Forensics.mp4
|
147.8 MB
|
Pwnie_Awards.mp4
|
293.2 MB
|
Quantifying_Risk_in_Consumer_Software_at_Scale-Consumer_Reports_Digital_Standard.mp4
|
109.8 MB
|
RBN_Reloaded-Amplifying_Signals_from_the_Underground.mp4
|
94.5 MB
|
Real_Humans,Simulated_Attacks_Usability_Testing_with_Attack_Scenarios.mp4
|
223.7 MB
|
Redesigning_PKI_to_Solve_Revocation,Expiration,and_Rotation_Problems.mp4
|
158.9 MB
|
Revoke-Obfuscation_PowerShell_Obfuscation_Detection_And_Evasion_Using_Science.mp4
|
274.7 MB
|
rVMI_A_New_Paradigm_for_Full_System_Analysis.mp4
|
165.6 MB
|
ShieldFS_The_Last_Word_in_Ransomware_Resilient_File_Systems.mp4
|
146.1 MB
|
Skype_and_Type_Keystroke_Leakage_over_VoIP.mp4
|
114.3 MB
|
So_You_Want_to_Market_Your_Security_Product….mp4
|
153.0 MB
|
Sonic_Gun_to_Smart_Devices_Your_Devices_Lose_Control_Under_UltrasoundSound.mp4
|
201.7 MB
|
Splunking_Dark_Tools-A_Pentesters_Guide_to_Pwnage_Visualization.mp4
|
213.6 MB
|
SS7_Attacker_Heaven_Turns_into_Riot_How_to_Make_Nation-State_and_Intelligence_Attackers_Lives_Much_Harder_on_Mobile_Networks.mp4
|
139.2 MB
|
Taking_DMA_Attacks_to_the_Next_Level_How_to_do_Arbitrary_Memory_ReadsWrites_in_a_Live_and_Unmodified_System_Using_a_Rogue_Memory_Controller.mp4
|
110.5 MB
|
Taking_Over_the_World_Through_MQTT-Aftermath.mp4
|
242.3 MB
|
Taking_Windows_10_Kernel_Exploitation_to_the_Next_Level-Leveraging_Write-What-Where_Vulnerabilities_in_Creators_Update.mp4
|
179.3 MB
|
The_Active_Directory_Botnet.mp4
|
160.4 MB
|
The_Adventures_of_AV_and_the_Leaky_Sandbox.mp4
|
139.9 MB
|
The_Art_of_Securing_100_Products.mp4
|
191.2 MB
|
The_Epocholypse_2038_Whats_in_Store_for_the_Next_20_Years.mp4
|
99.9 MB
|
The_Future_of_ApplePwn-How_to_Save_Your_Money.mp4
|
86.4 MB
|
The_Industrial_Revolution_of_Lateral_Movement.mp4
|
100.5 MB
|
The_Origin_of_Array_[@@species]_How_Standards_Drive_Bugs_in_Script_Engines.mp4
|
163.8 MB
|
The_Shadow_Brokers-Cyber_Fear_Game-Changers.mp4
|
100.8 MB
|
Theyre_Coming_for_Your_Tools_Exploiting_Design_Flaws_for_Active_Intrusion_Prevention.mp4
|
50.9 MB
|
Toolswatch_and_Black_Hat_Arsenal_A_Virtuous_Cycle.mp4
|
78.6 MB
|
Tracking_Ransomware_End_to_End.mp4
|
75.6 MB
|
Web_Cache_Deception_Attack.mp4
|
52.6 MB
|
Well,that_Escalated_Quickly_How_Abusing_Docker_API_Led_to_Remote_Code_Execution,Same_Origin_Bypass_and_Persistence_in_the_Hypervisor_via_Shadow_Containers.mp4
|
120.1 MB
|
What_Theyre_Teaching_Kids_These_Days_Comparing_Security_Curricula_and_Accreditations_to_Industry_Needs.mp4
|
290.3 MB
|
Whats_on_the_Wireless_Automating_RF_Signal_Identification.mp4
|
264.7 MB
|
When_IoT_Attacks_Understanding_the_Safety_Risks_Associated_with_Connected_Devices.mp4
|
284.1 MB
|
Where_No_Person_Has_Gone_Before.mp4
|
60.6 MB
|
White_Hat_Privilege_The_Legal_Landscape_for_a_Cybersecurity_Professional_Seeking_to_Safeguard_Sensitive_Client_Data.mp4
|
183.5 MB
|
Why_Most_Cyber_Security_Training_Fails_and_What_We_Can_Do_About_it.mp4
|
151.9 MB
|
WiFuzz_Detecting_and_Exploiting_Logical_Flaws_in_the_Wi-Fi_Cryptographic_Handshake.mp4
|
234.6 MB
|
Wire_Me_Through_Machine_Learning.mp4
|
70.6 MB
|
WSUSpendu_How_to_Hang_WSUS_Clients.mp4
|
135.8 MB
|
Zero_Days,Thousands_of_Nights_The_Life_and_Times_of_Zero-Day_Vulnerabilities_and_Their_Exploits.mp4
|
129.6 MB
|
Total files 264
|