2022-01-06 | There will be Glitches Extracting and Analyzing Automotive Firmware Efficiently | 49:19 | 11 | |
|
2022-01-06 | SDL the Wont Break the Bank | 51:44 | 0 | |
|
2022-01-06 | Miasm Reverse Engineering Framework | 49:48 | 7 | |
|
2022-01-06 | Return of Bleichenbacher's Oracle Threat ROBOT | 32:23 | 0 | |
|
2022-01-06 | Reversing a Japanese Wireless SD Card From Zero to Code Execution | 47:58 | 4 | |
|
2022-01-06 | Money rity Report Using Intelligence to Predict the Next Payment Card Fraud Victims | 23:27 | 1 | |
|
2022-01-06 | ARTist An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware | 20:23 | 3 | |
|
2022-01-06 | Day Zero A Road Map to #BHUSA 2018 | 1:36:53 | 3 | |
|
2022-01-06 | GOD MODE UNLOCKED Hardware Backdoors in x86 CPUs | 51:00 | 17 | |
|
2022-01-06 | Is the Mafia Taking Over Cybercrime | 25:21 | 10 | |
|
2022-01-06 | Attacking Client Side JIT Compilers | 42:34 | 2 | |
|
2022-01-06 | Detecting Credential Compromise in AWS | 23:38 | 4 | |
|
2022-01-06 | It's a PHP Unserialization Vulnerability Jim, but Not as We Know It | 47:26 | 0 | |
|
2022-01-06 | Attacks on the Curl P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme | 24:17 | 1 | |
|
2022-01-06 | Detecting Malicious Cloud Account Behavior A Look at the New Native Platform Capabilities | 48:51 | 0 | |
|
2022-01-06 | Automated Discovery of Deserialization Gadget Chains | 39:14 | 0 | |
|
2022-01-06 | KeenLab iOS Jailbreak Internals Userland Read Only Memory can be Dangerous | 50:10 | 6 | |
|
2022-01-06 | Decompiler Internals Microcode | 50:03 | 2 | |
|
2022-01-06 | Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities | 43:39 | 0 | |
|
2022-01-06 | Dissecting Non Malicious Artifacts One IP at a Time | 21:14 | 0 | |
|
2022-01-06 | Kernel Mode Threats and Practical Defenses | 47:21 | 4 | |
|
2022-01-06 | Don't @ Me Hunting Twitter Bots at Scale | 46:59 | 1 | |
|
2022-01-06 | Back to the Future A Radical Insecure Design of KVM on ARM | 22:46 | 1 | |
|
2022-01-06 | Deep Dive into an ICS Firewall, Looking for the Fire Hole | 44:17 | 2 | |
|
2022-01-06 | Edge Side Include Injection Abusing Caching Servers into SSRF and Transparent Session Hijacking | 22:01 | 4 | |
|
2022-01-06 | Keynote Optimistic Dissatisfaction with the Status Quo | 1:01:25 | 0 | |
|
2022-01-06 | A Brief History of Mitigation The Path to EL1 in iOS 11 | 44:56 | 2 | |
|
2022-01-06 | Deep Neural Networks for Hackers Methods, Applications, and Open Source Tools | 43:40 | 8 | |
|
2022-01-06 | Efail Breaking S MIME and OpenPGP Email Encryption using Exfiltration Channels | 46:12 | 9 | |
|
2022-01-06 | A Deep Dive into macOS MDM and How it can be Compromised | 47:43 | 13 | |
|
2022-01-06 | Every ROSE has its Thorn The Dark Art of Remote Online Social Engineering | 46:08 | 8 | |
|
2022-01-06 | DeepLocker Concealing Targeted Attacks with AI Locksmithing | 52:49 | 3 | |
|
2022-01-06 | A Dive in to Hyper V Architecture & Vulnerabilities | 47:06 | 2 | |
|
2022-01-06 | Hardening Hyper V through Offensive Security Research | 51:12 | 6 | |
|
2022-01-06 | Exploitation of a Modern Smartphone Baseband | 40:58 | 24 | |
|
2022-01-06 | Demystifying PTSD in the Cybersecurity Environment | 17:52 | 0 | |
|
2022-01-06 | Follow the White Rabbit Simplifying Fuzz Testing Using FuzzExMachina | 42:14 | 2 | |
|
2022-01-06 | An Attacker Looks at Docker Approaching Multi Container Applications | 38:57 | 2 | |
|
2022-01-06 | An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities | 40:47 | 6 | |
|
2022-01-06 | Black Box is Dead Long Live Black Box | 32:55 | 0 | |
|
2022-01-06 | For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems | 40:40 | 2 | |
|
2022-01-06 | How I Learned to Stop Worrying and Love the SBOM | 25:42 | 3 | |
|
2022-01-06 | Another Flip in the Row | 49:52 | 0 | |
|
2022-01-06 | How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial Control Systems | 48:23 | 0 | |
|
2022-01-06 | Black Hat USA 2018 Keynote Parisa Tabriz | 1:12:08 | 8 | |
|
2022-01-06 | From Bot to Robot How Abilities and Law Change with Physicality | 48:07 | 0 | |
|
2022-01-06 | Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies | 50:52 | 2 | Vlog |
|
2022-01-06 | From Workstation to Domain Admin Why Secure Administration isn't Secure and How to Fix it | 48:45 | 9 | Guide |
|
2022-01-06 | I, for One, Welcome Our New Power Analysis Overlords | 25:30 | 2 | |
|
2022-01-06 | Identity Theft Attacks on SSO Systems | 41:06 | 3 | |
|
2022-01-06 | Blockchain Autopsies Analyzing Ethereum Smart Contract Deaths | 39:08 | 9 | |
|
2022-01-06 | InfoSec Philosophies for the Corrupt Economy | 24:07 | 3 | |
|
2022-01-06 | Breaking Parser Logic Take Your Path Normalization off and Pop 0days Out | 42:35 | 5 | Vlog |
|
2022-01-06 | Breaking the IIoT Hacking industrial Control Gateways | 35:51 | 11 | |
|
2022-01-06 | Catch me, Yes we can Pwning Social Engineers | 50:10 | 0 | |
|
2022-01-06 | IoT Malware Comprehensive Survey, Analysis Framework and Case Studies | 46:46 | 4 | |
|
2022-01-06 | How can Someone with Autism Specifically Enhance the Cyber Security Workforce | 48:38 | 5 | |
|
2022-01-06 | Behind the Speculative Curtain The True Story of Fighting Meltdown and Spectre | 47:36 | 5 | |
|
2022-01-06 | Fire & Ice Making and Breaking macOS Firewalls | 25:19 | 1 | |
|
2022-01-06 | AI & ML in Cyber Security Why Algorithms are Dangerous | 44:20 | 3 | |
|
2022-01-06 | How can Communities Move Forward After Incidents of Sexual Harassment or Assault | 25:02 | 0 | |
|
2022-01-06 | Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure | 23:57 | 15 | |
|
2022-01-06 | Finding Xori Malware Analysis Triage with Automated Disassembly | 21:05 | 2 | |
|
2022-01-06 | AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries | 28:43 | 5 | Guide |
|
2022-01-06 | Holding on for Tonight Addiction in InfoSec | 24:00 | 0 | |
|
2022-01-06 | Compression Oracle Attacks on VPN Networks | 42:41 | 21 | |
|
2022-01-06 | Digital Vengeance Exploiting the Most Notorious C&C Toolkits | 33:11 | 4 | |
|
2022-01-06 | PEIMA Harnessing Power Laws to Detect Malicious Activities | 24:30 | 0 | |
|
2022-01-06 | They're Coming for Your Tools Exploiting Design Flaws for Active Intrusion Prevention | 23:09 | 0 | |
|
2022-01-06 | Escalating Insider Threats Using VMware's API | 20:06 | 2 | |
|
2022-01-06 | Practical Tips for Defending Web Applications in the Age of DevOps | 35:43 | 0 | |
|
2022-01-06 | Tracking Ransomware End to End | 22:14 | 1 | |
|
2022-01-06 | Evading Microsoft ATA for Active Directory Domination | 47:44 | 2 | |
|
2022-01-06 | Web Cache Deception Attack | 23:02 | 10 | |
|
2022-01-06 | Redesigning PKI to Solve Revocation Expiration and Rotation Problems | 48:40 | 2 | |
|
2022-01-06 | Why Most Cyber Security Training Fails and What We Can Do About it | 49:48 | 5 | |
|
2022-01-06 | Ichthyology Phishing as a Science | 24:28 | 1 | Vlog |
|
2022-01-06 | Revoke Obfuscation PowerShell Obfuscation Detection And Evasion Using Science | 57:24 | 2 | |
|
2022-01-06 | WiFuzz Detecting and Exploiting Logical Flaws in the Wi Fi Cryptographic Handshake | 43:35 | 4 | Vlog |
|
2022-01-06 | Behind the Plexiglass Curtain Stats and Stories from the Black Hat NOC | 45:57 | 1 | |
|
2022-01-06 | Betraying the BIOS Where the Guardians of the BIOS are Failing | 49:51 | 5 | |
|
2022-01-06 | ShieldFS The Last Word in Ransomware Resilient File Systems | 50:55 | 2 | |
|
2022-01-06 | Infecting the Enterprise Abusing Office365Powershell for Covert C2 | 36:29 | 0 | |
|
2022-01-06 | The Active Directory Botnet | 43:24 | 3 | |
|
2022-01-06 | Intel AMT Stealth Breakthrough | 39:08 | 6 | |
|
2022-01-06 | Big Game Theory Hunting The Peculiarities of Human Behavior in the InfoSec Game | 46:29 | 0 | |
|
2022-01-06 | Intercepting iCloud Keychain | 25:22 | 9 | |
|
2022-01-06 | Black Hat USA 2017 Keynote | 1:03:59 | 3 | |
|
2022-01-06 | The Industrial Revolution of Lateral Movement | 24:08 | 1 | |
|
2022-01-06 | kR^X Comprehensive Kernel Protection Against Just In Time Code Reuse | 39:54 | 0 | |
|
2022-01-06 | Defeating Samsung KNOX with Zero Privilege | 39:04 | 13 | |
|
2022-01-06 | Making Diversity a Priority in Security | 1:41:09 | 0 | |
|
2022-01-06 | Developing Trust and Gitting Betrayed | 48:05 | 0 | |
|
2022-01-06 | OpenCrypto Unchaining the JavaCard Ecosystem | 25:47 | 4 | |
|
2022-01-05 | Bochspwn Reloaded Detecting Kernel Memory Disclosure with x86 Emulation and Taint Tracking | 53:49 | 1 | |
|
2022-01-05 | Exploit Kit Cornucopia | 45:09 | 3 | |
|
2022-01-05 | Network Automation is Not Your Safe Haven | 37:46 | 0 | |
|
2022-01-05 | Breaking the Laws of Robotics Attacking Industrial Robots | 39:32 | 3 | |
|
2022-01-05 | Exploiting a Single SQLite Vulnerability Across Multiple Software | 48:35 | 10 | |
|
2022-01-05 | Ochko123 How the Feds Caught Russian Mega Carder Roman Seleznev | 49:06 | 42 | |
|