2022-01-10 | BlueHat IL 2019 Bhavna Soman | 21:56 | 3 | |
|
2022-01-10 | BlueHat IL 2019 Matt Miller | 45:22 | 2 | |
|
2022-01-10 | BlueHat IL 2019 Day 2 Recap | 0:58 | 0 | |
|
2022-01-10 | BlueHat IL 2019 x0rz No Code No Crime UPnP as an Off the Shelf Attacker's Toolkit | 21:52 | 10 | |
|
2022-01-10 | BlueHat IL 2019 Benjamin Delpy @gentilkiwi You disliked mimikatz Wait for kekeo | 48:24 | 39 | |
|
2022-01-10 | BlueHat IL 2019 Lucas Leong Make Static Instrumentation Great Again | 38:38 | 0 | |
|
2022-01-10 | BlueHat IL 2019 Ulf Frisk Practical Uses for Hardware assisted Memory Visualization | 43:02 | 5 | |
|
2022-01-10 | BlueHat IL 2019 Andrew bunnie Huang Supply Chain Security If I were a Nation State ” | 45:38 | 17 | |
|
2022-01-10 | BlueHat IL 2019 Luca Todesco @qwertyoruiop Life as an iOS Attacker | 43:12 | 53 | |
|
2022-01-10 | BlueHat IL 2019 Day 1 Recap | 0:58 | 0 | |
|
2022-01-10 | BlueHat IL 2019 Or Pinchasof Bridging Emulation and the Real World with the Nintendo Game Boy | 38:55 | 4 | |
|
2022-01-10 | BlueHat IL 2019 Ido Li On & Uri Farkas The AMDFlaws Story Technical Deep Dive | 41:54 | 0 | |
|
2022-01-10 | BlueHat IL 2019 Bruno Keith Attacking Edge Through the JavaScript Just In Time Compiler | 42:49 | 2 | |
|
2022-01-10 | BlueHat IL 2019 Niek Timmers, Albert Spruyt & Cristofaro Mune | 44:49 | 2 | |
|
2022-01-10 | BlueHat IL 2018 David Weston Windows Hardening with Hardware | 46:28 | 89 | |
|
2022-01-10 | BlueHat IL 2018 Marion Marschalek The Wolf in SGX Clothing | 49:10 | 5 | |
|
2022-01-10 | BlueHat IL 2018 Daniel Gruss, Moritz Lipp & Michael Schwarz The Case of Spectre and Meltdown | 43:43 | 3 | |
|
2022-01-10 | BlueHat IL 2018 Marina Simakov & Itai Grady Computers Gone Rogue | 29:21 | 1 | |
|
2022-01-10 | BlueHat IL 2018 – Oran Avraham eMMC Hacking, Or How I Fixed Long Dead Galaxy S3 Phones | 46:28 | 9 | |
|
2022-01-10 | BlueHat Nights Event | 1:43 | 0 | |
|
2022-01-10 | BlueHat IL 2018 Lee Holmes How to Design a New Cloud Platform with a Strong Security Posture | 41:02 | 4 | Guide |
|
2022-01-10 | BlueHat IL 2018 Matt Tait Keynote Fake News and Info Ops Modern Information Warfare… | 46:58 | 2 | Guide |
|
2022-01-10 | BlueHat IL 2018 Jordan Rabet Browser Security Beyond Sandboxing | 31:37 | 13 | |
|
2022-01-10 | BlueHat IL 2018 Mathy Vanhoef KRACKing WPA2 in Practice Using Key Reinstallation Attacks | 40:32 | 5 | |
|
2022-01-10 | BlueHat IL 2018 Vincent Le Toux & Benjamin Delpy What Can Make Your Million Dollar SIEM Go Blind | 40:28 | 12 | |
|
2022-01-10 | BlueHat IL 2018 John Lambert The New Paradigm of Security Controls | 38:41 | 0 | |
|
2022-01-10 | BlueHat IL 2018 Matt Suiche Ethereum VM, Bytecode & Bugged Smart Contracts | 45:35 | 3 | |
|
2022-01-10 | BlueHat IL 2018 Saar Amar Linux Vulnerabilities Windows Exploits Escalating Privileges with WSL | 44:52 | 16 | |
|
2022-01-10 | BlueHat IL 2018 Matt Graeber Hi, My Name is CN=Microsoft Windows, O=Microsoft Corporation… | 30:59 | 5 | |
|
2022-01-10 | BlueHat IL 2018 Gunter Ollmann Extracting Secrets from Silicon A New Generation of Bug Hunting | 46:40 | 5 | |
|
2022-01-10 | BlueHat IL 2017 John Lambert, Microsoft | 37:47 | 11 | |
|
2022-01-10 | BlueHat IL 2017 Daniel Bohannon, Mandiant | 46:36 | 7 | |
|
2022-01-10 | BlueHat IL 2017 Mark Russinovich, Microsoft | 50:39 | 17 | |
|
2022-01-10 | BlueHat IL 2017 Omer Zohar, Topspin Security | 39:12 | 0 | |
|
2022-01-10 | BlueHat IL 2017 | 1:57 | 0 | |
|
2022-01-10 | BlueHat IL 2017 Benjamin Delpy 'gentilkiwi' | 47:51 | 6 | |
|
2022-01-10 | BlueHat IL 2017 Marion Marschalek | 45:45 | 4 | |
|
2022-01-10 | BlueHat IL 2017 Prof Yehuda Lindell, Dyadic Security | 44:24 | 4 | |
|
2022-01-10 | BlueHat IL 2017 Matt Swann, Microsoft | 29:25 | 3 | |
|
2022-01-10 | BlueHat IL 2017 Marina Simakov & Tal Be'ery, Microsoft | 41:47 | 4 | |
|
2022-01-10 | The Risk From Power Lines How to Sniff the G3 and Prime Data and Detect the Interfere Attack | 18:14 | 3 | Guide |
|
2022-01-10 | Measuring Adversary Costs to Exploit Commercial Software | 49:53 | 0 | |
|
2022-01-10 | The Tao of Hardware the Te of Implants | 43:10 | 0 | |
|
2022-01-10 | Pangu 9 Internals | 46:52 | 4 | |
|
2022-01-10 | Memory Forensics Using Virtual Machine Introspection for Cloud Computing | 32:54 | 6 | |
|
2022-01-10 | The Year in Flash | 40:23 | 0 | |
|
2022-01-10 | Timing Attacks Have Never Been So Practical Advanced Cross Site Search Attacks | 51:18 | 2 | |
|
2022-01-10 | Pay No Attention to That Hacker Behind the Curtain A Look Inside the Black Hat Network | 48:55 | 2 | |
|
2022-01-10 | Next Generation of Exploit Kit Detection By Building Simulated Obfuscators | 22:41 | 0 | |
|
2022-01-10 | IoT Skimmer Energy Market Manipulation through High Wattage IoT Botnets | 34:54 | 2 | |
|
2022-01-10 | Repurposing Neural Networks to Generate Synthetic Media for Information Operations | 40:23 | 3 | Guide |
|
2022-01-10 | Web Cache Entanglement Novel Pathways to Poisoning | 39:21 | 6 | |
|
2022-01-10 | Whispers Among the Stars A Practical Look at Perpetrating Satellite Eavesdropping Attacks | 37:27 | 5 | |
|
2022-01-10 | Kr00k Serious Vulnerability Affected Encryption of Billion Wi Fi Devices | 40:48 | 2 | |
|
2022-01-10 | Spectra Breaking Separation Between Wireless Chips | 40:29 | 1 | |
|
2022-01-10 | Reverse Engineering the Tesla Battery Management System to increase Power Available | 40:57 | 4 | |
|
2022-01-10 | You have No Idea Who Sent that Email 18 Attacks on Email Sender Authentication | 40:06 | 11 | |
|
2022-01-10 | Lamphone Real Time Passive Reconstruction of Speech Using Light Emitted from Lamps | 37:15 | 3 | |
|
2022-01-10 | Stealthily Access Your Android Phones Bypass the Bluetooth Authentication | 40:46 | 9 | |
|
2022-01-10 | Reversing the Root Identifying the Exploited Vulnerability in 0 days Used In The Wild | 41:47 | 2 | |
|
2022-01-10 | When Lightning Strikes Thrice Breaking Thunderbolt 3 Security | 41:36 | 2 | |
|
2022-01-10 | Lateral Movement & Privilege Escalation in GCP Compromise Organizations without Dropping an Implant | 40:53 | 3 | |
|
2022-01-10 | Stopping Snake Oil with Smaller Healthcare Providers Addressing Security with Actionable Plans | 40:15 | 0 | |
|
2022-01-10 | Room for Escape Scribbling Outside the Lines of Template Security | 39:22 | 0 | |
|
2022-01-10 | When TLS Hacks You | 29:36 | 5 | |
|
2022-01-10 | Stress Testing Democracy Election Integrity During A Global Pandemic | 1:08:47 | 1 | |
|
2022-01-10 | Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community | 40:05 | 0 | |
|
2022-01-10 | Routopsy Modern Routing Protocol Vulnerability Analysis and Exploitation | 42:02 | 13 | |
|
2022-01-10 | Ruling StarCraft Game Spitefully Exploiting the Blind Spot of AI Powered Game Bots | 40:17 | 0 | |
|
2022-01-10 | All You Ever Wanted to Know about the AMD Platform Security Processor and were Afraid to Emulate | 55:27 | 19 | |
|
2022-01-10 | Superman Powered by Kryptonite Turn the Adversarial Attack into Your Defense Weapon | 23:56 | 3 | |
|
2022-01-10 | Security Research on Mercedes Benz From Hardware to Car Control | 48:18 | 9 | |
|
2022-01-10 | The Dark Side of the Cloud How a Lack of EMR Security Controls Helped Amplify the Opioid Crisis | 31:54 | 2 | |
|
2022-01-10 | An Unauthenticated Journey to Root Pwning Your Company's Enterprise Software Servers | 40:28 | 0 | |
|
2022-01-10 | The Devils in the Dependency Data Driven Software Composition Analysis | 37:52 | 0 | |
|
2022-01-10 | Mind Games Using Data to Solve for the Human Element Copy | 36:04 | 0 | |
|
2022-01-10 | Beyond Root Custom Firmware for Embedded Mobile Chipsets | 39:20 | 4 | |
|
2022-01-10 | The Paramedic's Guide to Surviving Cybersecurity | 40:14 | 1 | Guide |
|
2022-01-10 | Operation Chimera APT Operation Targets Semiconductor Vendors | 41:53 | 2 | |
|
2022-01-10 | Detecting Fake 4G Base Stations in Real Time | 42:59 | 13 | |
|
2022-01-10 | TiYunZong Exploit Chain to Remotely Root Modern Android Devices Pwn Android Phones from 2015 2020 | 49:12 | 10 | |
|
2022-01-10 | OTRazor Static Code Analysis for Vulnerability Discovery in Industrial Automation Scripts | 39:58 | 3 | |
|
2022-01-10 | Uncommon Sense Detecting Exploits with Novel Hardware Performance Counters and ML Magic | 44:03 | 1 | |
|
2022-01-10 | Discovering Hidden Properties to Attack the Node js Ecosystem | 39:35 | 2 | |
|
2022-01-10 | Plundervolt Flipping Bits from Software without Rowhammer | 40:09 | 5 | |
|
2022-01-10 | Virtually Private Networks | 47:18 | 0 | |
|
2022-01-10 | Dive into Apple IO80211FamilyV2 | 39:54 | 21 | |
|
2022-01-10 | Policy Implications of Faulty Cyber Risk Models and How to Fix Them | 45:41 | 0 | Guide |
|
2022-01-10 | Heroku Abuse Operations Hunting Wolves in Sheep's Clothing | 40:31 | 5 | |
|
2022-01-10 | Portable Document Flaws 101 | 50:04 | 7 | |
|
2022-01-10 | Hiding Process Memory via Anti Forensic Techniques | 37:10 | 6 | |
|
2022-01-10 | How I Created My Clone Using AI Next Gen Social Engineering | 41:37 | 0 | |
|
2022-01-10 | Practical Defenses Against Adversarial Machine Learning | 31:15 | 4 | |
|
2022-01-10 | iOS Kernel PAC, One Year Later Copy | 40:48 | 2 | |
|
2022-01-10 | Remote Timing Attacks on TPMs, AKA TPM Fail | 38:34 | 7 | |
|
2022-01-09 | Black-Box Laser Fault Injection on a Secure Memory | 41:01 | 33 | |
|
2022-01-09 | EdTech- The Ultimate APT | 29:08 | 1 | |
|
2022-01-09 | HTTP Request Smuggling in 2020 – New Variants, New Defenses and New Challenges | 42:36 | 15 | |
|
2022-01-09 | Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community | 40:05 | 0 | |
|
2022-01-09 | Election Security: Securing America's Future | 20:20 | 7 | |
|