2021-12-24 | Locknote Conclusions and Key Takeaways from Black Hat Asia 2016 | 51:02 | 0 | |
|
2021-12-24 | The Kitchen's Finally Burned Down DLP Security Bakeoff | 53:44 | 3 | Let's Play |
|
2021-12-24 | Day 2 Keynote Security Through Distrusting | 56:58 | 1 | |
|
2021-12-24 | Dealing The Perfect Hand Shuffling Memory Blocks On z OS | 45:42 | 16 | |
|
2021-12-24 | Jennifer Granick and Mark Eckenwiler What Internet Service Providers Need to Know About the Law | 1:34:01 | 5 | |
|
2021-12-23 | Black Hat USA 1999 Larry Korba Hope Hype and Horrors E Commerce Explored | 1:00:49 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Eugene Schultz Security Issues with Configuring and Maintaining an IIS 4 Serv | 44:46 | 2 | |
|
2021-12-23 | Black Hat USA 1999 Marcus Ranum Burglar Alarms and Booby Traps | 52:16 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Mike Schiffmman The Firewalk Tool | 51:51 | 6 | |
|
2021-12-23 | David LeBlanc Real World Techniques in Network Security Management | 1:13:03 | 5 | |
|
2021-12-23 | Bruce Schneier The Instrument and Death of Security | 30:11 | 6 | |
|
2021-12-23 | Brian Snow We Need Assurance | 33:44 | 1 | |
|
2021-12-23 | Jeff Thompson Making Unix Secure for the Internet with Trusted Operating Systems | 1:10:41 | 0 | |
|
2021-12-23 | Marcus Ranum Full Disclosure and Open Source | 1:54:46 | 29 | |
|
2021-12-23 | Terry Losonky National Information Assurance Partnership | 41:09 | 4 | Guide |
|
2021-12-23 | Arthur Money Closing Keynote | 53:26 | 0 | |
|
2021-12-23 | Jason Garms Defending Windows 2000 on the Internet | 54:20 | 1 | |
|
2021-12-23 | Simple Nomad Strategies for Defeating Distributed Attacks | 57:04 | 1 | |
|
2021-12-23 | Ian Poynter and Diana Kelly The Truth About ASPs | 1:11:35 | 2 | |
|
2021-12-23 | Lee Kushner The State of Employment in the Information Security Industry | 1:00:03 | 0 | Guide |
|
2021-12-23 | Scott Blake The Pros and Cons of Hiring Hackers | 1:00:08 | 4 | |
|
2021-12-23 | Hal McConnell Threats from Organized Crime and Terrorists | 48:13 | 1 | |
|
2021-12-23 | Kingpin and Brian Oblivian Secure Hardware Design | 1:12:00 | 5 | |
|
2021-12-23 | Greg Hoglund Advanced Buffer Overflow Techniques | 1:07:51 | 20 | |
|
2021-12-23 | John McDonald Stateful Inspection of FireWall 1 | 46:53 | 0 | |
|
2021-12-23 | Rooster and JD Glaser Defending Your Network With Active Directory Services | 1:51:42 | 29 | |
|
2021-12-23 | Gordon Reichard Jr Trust, Security, Partnership Strategies in Selecting a Managed Service Provider | 1:03:08 | 1 | |
|
2021-12-23 | Ron Moritz Proactive Defense Against Malicious Code | 42:19 | 1 | |
|
2021-12-23 | John McDonald Group Talk | 1:11:25 | 2 | |
|
2021-12-23 | Edward G Schwartz and Diana Kelly Data Privacy What should the CIO and CISO be doing | 1:16:33 | 1 | |
|
2021-12-23 | Ron Gula Bypassing Intrusion Detection Systems | 1:06:26 | 5 | |
|
2021-12-23 | Joey Advanced Windows NT and 2000 Security | 55:01 | 4 | |
|
2021-12-23 | Dominque Brezinski Anatomy of Common Programming Security Issues | 34:12 | 0 | |
|
2021-12-23 | Black Hat USA 1999 Simple Nomad Modern NetWare Hacking | 59:52 | 3 | |
|
2021-12-23 | Black Hat USA 1999 Bruce Schneier A hacker looks at cryptography | 1:05:50 | 51 | |
|
2021-12-23 | Black Hat USA 1999 Ira Winkler The Road to Riches | 1:04:46 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Panel Competitive Intelligence | 53:10 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Tatum Managing the External Environment | 55:45 | 1 | |
|
2021-12-23 | Black Hat USA 1999 David Bovee VPN Architectures Looking at the Complete Picture | 1:00:11 | 1 | |
|
2021-12-23 | Black Hat USA 1999 JD Glaser Auditing NT Catching Greg Hoglund | 38:29 | 6 | |
|
2021-12-23 | Black Hat USA 1999 Peter Shipley and Tom Jackiewicz Security Issues with Implementing and Deploy | 47:05 | 12 | |
|
2021-12-23 | Black Hat USA 1999 Teresa Lunt Taxonomy of Intrusion Detection Systems | 45:33 | 2 | |
|
2021-12-23 | Black Hat USA 1999 Jeff Moss Remarks Before the keynote | 5:38 | 2 | |
|
2021-12-23 | Black Hat USA 1999 Jeffrey Hunker Keynote Protecting Americas Cyberspace Version 1 0 of the Nati | 40:30 | 9 | |
|
2021-12-23 | Black Hat USA 1999 Davis, Ozier, Nebel, and Migues Panel Discussion | 1:03:20 | 3 | Discussion |
|
2021-12-23 | Black Hat USA 1999 Peter Stephenson Introduction to Cyber Forensic Analysis | 1:02:04 | 0 | |
|
2021-12-23 | Black Hat USA 1999 William Cheswick Closing Session | 56:14 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Jennifer Grannick Forensic Issues in Hacker Prosecutions | 55:08 | 31 | |
|
2021-12-23 | Black Hat USA 1999 Dominique Brezinski Building a Forensics Toolkit That Will Protect You from E | 54:40 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Jeremy Rauch How Responsive are Vendors to Security Problems When They Aren't | 59:26 | 9 | |
|
2021-12-23 | Black Hat USA 1999 William Cheswick Keynote | 29:52 | 3 | |
|
2021-12-23 | Black Hat USA 1999 Dr Mudge Keynote | 1:09:47 | 7 | |
|
2021-12-23 | Black Hat USA 1999 Rob Karas Open Source Monitoring | 24:34 | 1 | |
|
2021-12-23 | Black Hat USA 1999 Adam Shostack Towards a Taxonomy of Network Testing Techniques | 49:50 | 0 | |
|
2021-12-23 | Black Hat USA 1999 Rooster DNS Security Issues | 28:09 | 5 | |
|
2021-12-23 | Black Hat USA 1999 Jim Litchko Total BS Security business based systems security | 45:39 | 4 | |
|
2021-12-23 | Black Hat USA 1999 Sarah Gordon Viruses in the Information Age | 58:46 | 3 | Guide |
|
2021-12-23 | Black Hat USA 1999 Ed Gerck Overview of Certification systems x509, CA, PGP and SKIP | 50:50 | 3 | |
|
2021-12-23 | Black Hat USA 1999 Base Security or lack thereof and our Friends in Redmond | 47:31 | 0 | |
|
2021-12-23 | Black Hat USA 1999 Jon David Putting Intrusion Detection into Intrusion Detection Systems | 57:28 | 2 | |
|
2021-12-23 | Black Hat USA 1999 Scott Culp Building a Security Response Process | 58:29 | 0 | |
|
2021-12-23 | Black Hat USA 1999 Batz Security Issues Affecting Internet Transit Points and Backbone Providers | 1:05:08 | 5 | |
|
2021-12-23 | Black Hat USA 1999 Brent Huston Appliance Firewalls a detailed review | 55:21 | 0 | Review |
|
2021-12-23 | Black Hat USA 1999 Greg Hoglund 1000 Hackers in a box Failings of Security Scanners | 41:33 | 5 | |
|
2021-12-23 | Black Hat USA 1999 Padgett Peterson Overlooked Local Attack Techniques | 59:44 | 0 | |
|
2021-12-22 | Design Pitfalls in Commercial Mini Programs on Android and iOS | 25:44 | 4 | |
|
2021-12-22 | Graph Convolutional Network Based Suspicious Communication Pair Estimation for Industrial Control | 25:55 | 2 | |
|
2021-12-22 | Discovering 20 Year Old Vulnerabilities in Modern Windows Kernel | 23:40 | 4 | |
|
2021-12-22 | Jack in the Cache A New Code injection Technique through Modifying X86 to ARM Translation Cache | 25:23 | 5 | |
|
2021-12-22 | Shield with Hole New Security Mitigation Helps Us Escape Chrome Sandbox to Exfiltrate User Privacy | 35:59 | 8 | |
|
2021-12-22 | Hacking Government Cybersecurity | 36:53 | 6 | |
|
2021-12-22 | Effective Vulnerability Discovery with Machine Learning | 27:26 | 3 | |
|
2021-12-22 | LadderLeak Breaking ECDSA with Less than One Bit of Nonce Leakage | 34:12 | 34 | |
|
2021-12-22 | Story of Jailbreaking iOS 13 Black Hat - Europe - 2020 | 37:30 | 4 | |
|
2021-12-22 | efiXplorer Hunting for UEFI Firmware Vulnerabilities at Scale with Automated Static Analysis | 51:35 | 16 | |
|
2021-12-22 | Hermes Attack Steal DNN Models In AI Privatization Deployment Scenarios | 30:57 | 4 | |
|
2021-12-22 | Light Commands Hacking Voice Assistants with Lasers | 29:48 | 13 | |
|
2021-12-22 | The Hunt for Major League IoT ICS Threats A Deep Dive into IoT Threat Terrain | 31:25 | 3 | |
|
2021-12-22 | How Embedded TCP IP Stacks Breed Critical Vulnerabilities | 36:43 | 4 | |
|
2021-12-22 | A New Hope The One Last Chance to Save Your SSD Data | 37:21 | 3 | |
|
2021-12-22 | Manufacturing Hardware Implants from Idea to Mass Production A Hacker's Journey | 24:51 | 6 | |
|
2021-12-22 | The Subtle Art of Chaining Headers IKEv2 Attack Surface Case Study | 34:13 | 3 | |
|
2021-12-22 | How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration | 25:31 | 0 | |
|
2021-12-22 | My Ticks Don't Lie New Timing Attacks for Hypervisor Detection | 34:49 | 8 | |
|
2021-12-22 | BinTyper Type Confusion Detection for C Binaries | 25:20 | 3 | |
|
2021-12-22 | Finding Bugs Compiler Knows but Doesn't Tell You Dissecting Undefined Behavior Optimizations in LLVM | 33:15 | 2 | |
|
2021-12-22 | This is for the Pwners Exploiting a WebKit 0 day in PlayStation 4 | 31:19 | 3 | |
|
2021-12-22 | Bypassing NGAV for Fun and Profit Black Hat - Europe - 2020 | 34:54 | 6 | |
|
2021-12-22 | Please Make a Dentist Appointment ASAP Attacking IOBluetoothFamily HCI and Vendor Specific Commands | 37:47 | 6 | |
|
2021-12-22 | Permission Mining in GCP Black Hat - Europe - 2020 | 30:33 | 20 | |
|
2021-12-22 | Fingerprint Jacking Practical Fingerprint Authorization Hijacking in Android Apps | 34:10 | 3 | |
|
2021-12-22 | How the Security Features in TLS Inspection Solutions can be Exploited for Covert Data Exfiltration | 25:31 | 7 | |
|
2021-12-22 | Cross Site Escape Pwning macOS Safari Sandbox the Unusual Way | 25:59 | 4 | |
|
2021-12-22 | FPs are Cheap Show me the CVEs | 23:51 | 1 | |
|
2021-12-22 | Portable Data exFiltration XSS for PDFs | 33:22 | 9 | |
|
2021-12-22 | How to Better Fuzz Windows 10 Directx Kernel at Present | 23:17 | 7 | Guide |
|
2021-12-22 | Debug Resurrection on Nordic nRF52 Series | 34:31 | 3 | |
|
2021-12-22 | From Zero to Sixty The Story of North Korea's Rapid Ascent to Becoming a Global Cyber Superpower 2 | 37:51 | 6 | |
|
2021-12-22 | POSWorld Should You be Afraid of Hands On Payment Devices | 31:23 | 5 | |
|
2021-12-22 | IAM Concerned OAuth Token Hijacking in Google Cloud GCP | 36:50 | 10 | |
|