2021-12-29 | Siemens Simatic S7 PLC Exploitation Dillon Beresford | 52:15 | 151 | |
|
2021-12-29 | Constant Insecurity Things You Didn’t Know About PECOFF Portable Executable File Format Mario Vuks | 1:01:26 | 7 | |
|
2021-12-29 | Hacking Medical Devices for Fun and Insulin Breaking the Human SCADA System Jay Radckiffe | 58:39 | 8 | |
|
2021-12-29 | Smartfuzzing the Web Carpe Vestra Foramina Nathan Hamiel, Justin Engler, Seth Law, Gregory Fleisch | 1:01:26 | 2 | |
|
2021-12-29 | Corporate Espionage for Dummies The Hidden Threat of Embedded Web Servers Michael Sutton | 55:07 | 3 | |
|
2021-12-29 | Killing the Myth of Cisco IOS Diversity Towards Large Scale Exploitation of Cisco IOS Ang Cui, Jat | 27:34 | 3 | |
|
2021-12-29 | Covert Post Exploitation Forensics with Metasploit Wesley McGrew | 1:04:11 | 4 | |
|
2021-12-29 | Legal Aspects of Cybersecurity AKA CYBERLAW A Year in Review, Cases, Issues, Your Questions My All | 1:00:04 | 0 | Review |
|
2021-12-29 | Sophail A Critical Analysis of Sophos Antivirus Tavis Ormandy | 1:00:34 | 184 | |
|
2021-12-29 | A Crushing Blow at the Heart of SAP’s J2EE Engine Alexander Polyakov | 58:45 | 3 | |
|
2021-12-29 | Crypto for Pentesters Thomas Ptacek, Michael Tracy | 1:09:55 | 278 | |
|
2021-12-29 | Sour Pickles Marco Slaviero | 1:15:26 | 29 | |
|
2021-12-29 | Lives on The Line Securing Crisis Maps in Libya, Sudan, and Pakistan Securing Crisis Maps in Libya | 1:10:19 | 1 | |
|
2021-12-29 | Aerial Cyber Apocalypse If We Can Do It So Can They Richard Perkins, Mike Tassey | 1:08:40 | 1 | |
|
2021-12-29 | Don’t Drop the SOAP Real World Web Service Testing for Web Hackers Tom Eston, Joshua Abraham | 53:07 | 2 | |
|
2021-12-29 | Macs in the Age of the APT Alex Stamos, BJ Orvis, Paul Youn | 1:00:10 | 3 | |
|
2021-12-29 | Spy Sense Spyware Tool for Executing Stealthy Exploits Against Sensor Networks Thanassis Giannetso | 1:04:17 | 1 | |
|
2021-12-29 | Don’t Hate the Player, Hate the Game Inside the Android Patch Lifecycle Anthony Lineberry, Tim Str | 1:01:46 | 0 | |
|
2021-12-29 | Affiliate Programs Legitimate Business or Fueling Cybercrime Bradley Anstis | 19:25 | 2 | |
|
2021-12-29 | Analyzing SPDY Getting to Know the New Web Protocol Thomas Roth | 46:50 | 41 | |
|
2021-12-29 | Microsoft Vista NDA less The Good, The Bad, and The Ugly Chris Paget | 54:59 | 14 | |
|
2021-12-29 | SSH as the Next Back Door Are You Giving Hackers Root Access Joe Skehan | 26:46 | 2 | |
|
2021-12-29 | Exploiting the iOS Kernel Stefan Esser | 1:01:09 | 206 | |
|
2021-12-29 | Apple iOS Security Evaluation Vulnerability Analysis and Data Encryptio Dino Dai Zovi | 1:12:48 | 14 | |
|
2021-12-29 | Physical Memory Forensics for Files and Cache Jamie Butler, Justin Murdock | 1:00:22 | 2 | |
|
2021-12-29 | Mobile Malware Madness, and How To Cap the Mad Hatters Neil Daswani | 48:30 | 7 | Guide |
|
2021-12-29 | Social Networking Special Ops Chris Sumner Black Hat - USA - 2010 | 1:12:27 | 1 | |
|
2021-12-29 | These aren't the permissions you're looking for Anthony Lineberry, Tim Wyatt, David Luke Richardso | 1:05:33 | 0 | |
|
2021-12-29 | Utilizing code reuse Stefan Esser Black Hat - USA - 2010 | 1:13:08 | 14 | |
|
2021-12-29 | WPA Migration Mode Leandro Meiners, Diego Sor Black Hat - USA - 2010 | 52:58 | 1 | |
|
2021-12-29 | You will be billed 90000 for this call Mikko Hypponen Black Hat - USA - 2010 | 34:13 | 42 | |
|
2021-12-29 | SprayPAL Patrick Engebretson, Josh Pauli, Kyle Cronin Black Hat - USA - 2010 | 15:53 | 17 | |
|
2021-12-29 | Things you wanted to know but were afraid to ask Lee Kushner, Mike Murray | 1:16:29 | 0 | |
|
2021-12-29 | Virt ICE next gen debugger for malware analysis NGUYEN Anh Quynh | 1:16:13 | 3 | |
|
2021-12-29 | Standing on the shoulders of the blue monster olle b | 1:11:45 | 0 | |
|
2021-12-29 | Your career is your business Lee Kushner, Mike Murray | 1:14:57 | 5 | |
|
2021-12-29 | TitanMist Your First Step to reversing nirvana Mario Vuksan, Tomislav Pericin | 1:02:28 | 18 | |
|
2021-12-29 | Virtual Forensics Christiaan Beek Black Hat - USA - 2010 | 38:17 | 4 | |
|
2021-12-29 | BlindElephant Patrick Thomas Black Hat - USA - 2010 Black Hat - USA - 2010 | 57:36 | 5 | |
|
2021-12-29 | Voyage of the reverser Sergey Bratus, Greg Conti Black Hat - USA - 2010 | 1:13:47 | 12 | |
|
2021-12-29 | Virtually Pwned Claudio Criscione Black Hat - USA - 2010 | 56:14 | 1 | |
|
2021-12-29 | State of SSL on the internet Ivan Ristic Black Hat - USA - 2010 | 59:18 | 4 | |
|
2021-12-29 | Burning Asgrd Enno Rey, Daniel Mende, Rene Graf | 1:10:02 | 2 | |
|
2021-12-29 | Unauthorized Internet Wiretapping Tim Cross Black Hat - USA - 2010 | 58:28 | 2 | |
|
2021-12-29 | Wardriving the smart Grid shawn moyer Black Hat - USA - 2010 | 1:20:26 | 2 | |
|
2021-12-29 | The black art of binary hijacking Nick Harbour | 20:07 | 4 | |
|
2021-12-29 | CLOUDINOMICON christopher Black Hat - USA - 2010 | 1:02:06 | 1 | |
|
2021-12-29 | The DMCA and ACTA Vs Academic and Professional Research Tiffany Rad, Christopher Mooney | 1:11:42 | 0 | |
|
2021-12-29 | Understanding the Low Fragmenation Heap Chris Valasek | 57:17 | 4 | |
|
2021-12-29 | Welcome and introduction to Black Hat Keynote Speaker | 44:21 | 0 | |
|
2021-12-29 | Security innovation network panel | 1:04:17 | 0 | |
|
2021-12-29 | The emperor has no cloths Ben Feinstein, Ben Keen | 56:08 | 0 | |
|
2021-12-29 | Understanding the Windows SMB NTLM weak nonce vulnerablity Hernan Ochoa, Agustin Azubel | 1:14:28 | 4 | |
|
2021-12-29 | Security is not a four letter word Michael Davis Black Hat - USA - 2010 | 23:39 | 0 | |
|
2021-12-29 | Semiconductor Security Awareness Today and yesterday Christopher Tarnovsky | 1:16:54 | 15 | |
|
2021-12-29 | Reverse Engineering by Crayon Danny Quist, Lorie Liebrock | 1:01:14 | 9 | |
|
2021-12-29 | Rapid Enterprise Triaging Aaron LeMasters, Michael Murphy | 1:08:25 | 0 | |
|
2021-12-29 | Psychotronica Nitesh Dhanjani Black Hat - USA - 2009 | 49:31 | 3 | |
|
2021-12-29 | Practical Windows XP2003 Heap Exploitation John McDonald, Chris Valasek | 55:47 | 7 | |
|
2021-12-29 | Ruby for Pentesters Michael Tracy, Chris Rohlf, Eric Monti | 55:53 | 57 | |
|
2021-12-29 | Router Exploitation FX Black Hat - USA - 2009 | 56:34 | 18 | |
|
2021-12-29 | Unmasking You Joshua Abraham, Robert Hansen | 52:05 | 6 | |
|
2021-12-29 | Something to Do with Network Security Dan Kaminsky | 1:00:26 | 12 | |
|
2021-12-29 | There’s a Fox in the Henhouse Jeff Williams | 1:13:07 | 0 | |
|
2021-12-29 | Win at Reversing Nick Harbour Black Hat - USA - 2009 | 51:48 | 2 | |
|
2021-12-29 | The Pwnie Awards Black Hat - USA - 2009 | 52:25 | 2 | |
|
2021-12-29 | What the Hell is Inside There Chris Tarnovsky | 1:08:28 | 240 | |
|
2021-12-29 | Smart Parking Meter Implementations, Globalism, and You Joe Grand, Jacob Appelbaum, Chris Tarnovsk | 1:12:19 | 141 | |
|
2021-12-29 | The Laws of Vulnerabilities Research Version 2 0 Comparing Critical Infrastructure Industries Pane | 59:35 | 0 | |
|
2021-12-29 | SADE Injecting Agents in to VM Guest OS Matt Conover | 47:35 | 1 | |
|
2021-12-29 | Weaponizing the Web Nathan Hamiel, Shawn Moyer | 1:01:53 | 2 | |
|
2021-12-29 | The Conficker Mystery Mikko Hypponen | 20:27 | 154 | |
|
2021-12-29 | VC Panel Security Business Strategies During a Recession Panel | 1:11:44 | 1 | |
|
2021-12-29 | Veiled A Browser Based Darknet Billy Hoffman, Matt Wood | 57:22 | 3 | |
|
2021-12-29 | Stoned Bootkit Peter Kleissner Black Hat - USA - 2009 | 54:17 | 56 | |
|
2021-12-29 | Using Guided Missiles in Drive Bys Automatic Browser Fingerprinting Egypt | 1:09:46 | 4 | Guide |
|
2021-12-29 | Your Mind Legal Status, Rights and Securing Yourself Tiffany Rad & James Arlen | 1:13:51 | 1 | |
|
2021-12-29 | Worst of the Best of the Best Kevin Stadmeyer Black Hat - USA - 2009 | 23:00 | 0 | |
|
2021-12-29 | Unraveling Unicode Chris Weber Black Hat - USA - 2009 | 43:22 | 29 | |
|
2021-12-29 | Reversing and Exploiting an Apple Firmware Update K Chen | 1:14:23 | 6 | Vlog |
|
2021-12-29 | State of the Art Post Exploitation in Hardened PHP Environments Stefan Esser | 1:08:21 | 14 | |
|
2021-12-29 | Post Exploitation Bliss Loading Meterpreter on a Factory iPhone Vincenzo Iozzo, Charlie Miller | 1:13:41 | 10 | |
|
2021-12-29 | Ofir Arkin Introducing X Playing Tricks with ICMP | 1:02:55 | 0 | |
|
2021-12-29 | Jeff Nathan and Kevin Depeugh Layer 2 Attacks | 34:05 | 7 | |
|
2021-12-29 | Job de Haas GSM WAP and SMS Security | 1:31:13 | 9 | |
|
2021-12-29 | JD Glaser JDs Toolbox Fire and Ice | 42:09 | 1 | Guide |
|
2021-12-29 | Dan Veeneman Wireless Overview Protocols and Threat Models | 1:04:48 | 4 | |
|
2021-12-29 | Panel Vulnerability Disclosure What the Feds Think | 1:37:12 | 0 | |
|
2021-12-28 | Welcome and Introduction to Black Hat USA 2009 Jeff Moss Black Hat - USA - 2009 | 5:50 | 10 | |
|
2021-12-28 | The Language of Trust: Exploiting Trust Relationships in Active Content Mark Dowd, Ryan Smith | 1:10:54 | 18 | |
|
2021-12-28 | Recoverable Advanced Metering Infrastructure Mike Davis Black Hat - USA - 2009 | 58:10 | 38 | |
|
2021-12-28 | Attacking SMS Zane Lackey, Luis Miras Black Hat - USA - 2009 | 47:35 | 28 | |
|
2021-12-28 | Deactivate the Rootkit Alfredo Ortega Black Hat - USA - 2009 | 30:02 | 10 | |
|
2021-12-28 | Is Your Phone Pwned Kevin Mahaffey, Anthony Lineberry, John Hering Black Hat - USA - 2009 | 1:13:28 | 10 | |
|
2021-12-28 | Meet the Feds Feds vs Ex Feds Panel Black Hat - USA - 2009 | 1:14:59 | 4 | |
|
2021-12-28 | Defensive Rewriting Bryan Sullivan Black Hat - USA - 2009 | 23:33 | 2 | |
|
2021-12-28 | Automated Malware Similarity Analysis Daniel Raygoza Black Hat - USA - 2009 | 23:42 | 1 | |
|
2021-12-28 | Beckstrom’s Law Rod Beckstrom Black Hat - USA - 2009 | 56:59 | 14 | |
|
2021-12-28 | Demystifying Fuzzers Michael Eddington Black Hat - USA - 2009 | 1:05:36 | 3 | |
|
2021-12-28 | Johnny Long Me to We Johnny Long Black Hat - USA - 2009 | 53:30 | 7 | |
|