2021-12-21 | Technological Changes that Affect Forensic Investigations Diane Barrett BloomCon - 2017 | 58:50 | 14 | Vlog |
|
2021-12-20 | Breaking Bad Stealing Patient Data Through Medical Devices | 57:51 | 3 | |
|
2021-12-20 | Fed Up Getting Shattered and Log Jammed A New Generation of Crypto Is Coming | 50:55 | 6 | Vlog |
|
2021-12-20 | The Apple of Your EFI An Updated Study of EFI Security | 1:01:02 | 4 | Vlog |
|
2021-12-20 | Locknote Conclusions and Key Takeaways From Black Hat Europe 2017 | 44:12 | 2 | |
|
2021-12-20 | Exposing Hidden Exploitable Behaviors In Programming Languages Using Differential Fuzzing | 26:21 | 7 | |
|
2021-12-20 | Exfiltrating Reconnaissance Data from Air Gapped ICS SCADA Networks | 47:10 | 19 | Guide |
|
2021-12-20 | Key Reinstallation Attacks Breaking the WPA2 Protocol Black Hat - Europe - 2017 | 47:09 | 54 | |
|
2021-12-20 | Self Verifying Authentication A Framework For Safer Integrations of Single Sign On Services | 57:23 | 0 | |
|
2021-12-20 | Jailbreaking Apple Watch Black Hat - Europe - 2017 | 29:35 | 7 | |
|
2021-12-20 | BlueBorne A New Class of Airborne Attacks that can Remotely Compromise Any Linux IoT Device | 57:28 | 24 | |
|
2021-12-20 | Automating Incident Response | 48:01 | 1 | |
|
2021-12-20 | Detach Me Not DoS Attacks Against 4G Cellular Users Worldwide from your Desk | 52:34 | 0 | |
|
2021-12-20 | Mobile Espionage in the Wild Pegasus and Nation State Level Attacks | 45:17 | 10 | |
|
2021-12-20 | Real World Post Quantum Cryptography Introducing the OpenQuantumSafe Software Project | 43:35 | 18 | |
|
2021-12-20 | Backslash Powered Scanning Hunting Unknown Vulnerability Classes | 46:25 | 94 | |
|
2021-12-20 | Narcos, Counterfeiters and Scammers An Approach to Visualize Illegal Markets | 37:08 | 2 | |
|
2021-12-20 | Rooting EVERY Android From Extension to Exploitation | 40:05 | 7 | |
|
2021-12-20 | DRAMA How Your DRAM Becomes a Security Problem | 51:04 | 2 | |
|
2021-12-20 | Breaking BHAD Abusing Belkin Home Automation Devices | 48:07 | 1 | |
|
2021-12-20 | Pocket Sized Badness Why Ransomware Comes as a Plot Twist in the Cat Mouse Game | 53:32 | 0 | |
|
2021-12-20 | Signing Into One Billion Mobile App Accounts Effortlessly with OAuth2 0 | 23:56 | 4 | |
|
2021-12-20 | Effective File Format Fuzzing Thoughts, Techniques and Results | 46:59 | 6 | |
|
2021-12-20 | Randomization Can't Stop BPF JIT Spray Black Hat - Europe - 2016 | 24:04 | 14 | |
|
2021-12-20 | Stumping the Mobile Chipset Black Hat - Europe - 2016 | 35:38 | 1 | |
|
2021-12-20 | EGO MARKET When People's Greed for Fame Benefits Large Scale Botnets | 49:32 | 2 | |
|
2021-12-20 | Breaking Big Data Evading Analysis of the Metadata of Your Life | 48:45 | 2 | |
|
2021-12-20 | Ghost in the PLC Designing an Undetectable Programmable Logic Controller Rootkit | 50:57 | 7 | Vlog |
|
2021-12-20 | Talking Behind Your Back Attacks and Countermeasures of Ultrasonic Cross Device Tracking | 1:02:58 | 17 | |
|
2021-12-20 | Bypassing Clang's SafeStack for Fun and Profit Black Hat - Europe - 2016 | 43:13 | 5 | |
|
2021-12-20 | Flip Feng Shui Rowhammering the VM's Isolation | 50:33 | 3 | |
|
2021-12-20 | PenTesting Vehicles with CANToolz Black Hat - Europe - 2016 | 1:01:09 | 7 | |
|
2021-12-20 | GPU Security Exposed Black Hat - Europe - 2016 | 22:26 | 3 | |
|
2021-12-20 | Bypassing Secure Boot Using Fault Injection | 45:21 | 18 | |
|
2021-12-20 | Towards a Policy Agnostic Control Flow Integrity Implementation | 47:31 | 1 | |
|
2021-12-20 | How to Fool an ADC, Part II or Hiding Destruction of Turbine with a Little Help of Signal Processing | 50:59 | 0 | Guide |
|
2021-12-20 | Chasing Foxes by the Numbers Patterns of Life and Activity in Hacker Forums | 25:30 | 1 | |
|
2021-12-20 | 50 Thousand Needles in 5 Million Haystacks Understanding Old Malware Tricks | 49:06 | 1 | |
|
2021-12-20 | Code Deobfuscation Intertwining Dynamic, Static and Symbolic Approaches | 50:33 | 11 | |
|
2021-12-20 | I Know What You Saw Last Minute The Chrome Browser Case | 27:33 | 1 | |
|
2021-12-20 | Use After Use After Free Exploit UAF by Generating Your Own | 37:46 | 10 | |
|
2021-12-20 | Inside Web Attacks The Real Payloads Black Hat - Europe - 2016 | 17:14 | 1 | |
|
2021-12-20 | CTX Eliminating BREACH with Context Hiding Black Hat - Europe - 2016 | 46:12 | 0 | |
|
2021-12-20 | When Virtualization Encounter AFL A Portable Virtual Device Fuzzing Framework with AFL | 27:39 | 1 | |
|
2021-12-20 | Locknote Conclusions and Key Takeaways from Black Hat Europe 2016 | 45:26 | 0 | |
|
2021-12-20 | AI based Antivirus Can AlphaAV Win the Battle in which Man Has Failed | 29:28 | 2 | |
|
2021-12-20 | WiFi Based IMSI Catcher Black Hat - Europe - 2016 | 59:24 | 73 | |
|
2021-12-20 | Cyber Judo Offensive Cyber Defense Black Hat - Europe - 2016 | 45:15 | 4 | |
|
2021-12-20 | Another Brick Off the Wall Deconstructing Web Application Firewalls Using Automata Learning | 44:03 | 1 | |
|
2021-12-20 | ARMageddon How Your Smartphone CPU Breaks Software Level Security and Privacy | 40:16 | 2 | |
|
2021-12-20 | Witchcraft Compiler Collection Towards Self Aware Computer Programs | 54:34 | 4 | |
|
2021-12-20 | Attacking Windows by Windows Black Hat - Europe - 2016 | 31:52 | 1 | |
|
2021-12-20 | Fuzzing Android A Recipe For Uncovering Vulnerabilities Inside System Components In Android | 44:48 | 6 | |
|
2021-12-20 | Breaking Access Controls with Blekey Black Hat - Europe - 2015 | 50:25 | 4 | |
|
2021-12-20 | Faux Disk Encryption Realities of Secure Storage On Mobile Devices | 57:03 | 2 | |
|
2021-12-20 | Locknote Conclusions and Key Takeaways from Black Hat Europe 2015 | 45:26 | 0 | |
|
2021-12-20 | Stegospolit Exploit Delivery With Steganography and Polyglots Black Hat - Europe - 2015 | 58:22 | 4 | |
|
2021-12-20 | Lessons From Defending The Indefensible Black Hat - Europe - 2015 | 30:13 | 1 | |
|
2021-12-20 | Exploiting Adobe Flash Player In The Era Of Control Flow Guard | 57:43 | 10 | |
|
2021-12-20 | Automating Linux Malware Analysis Using Limon Sandbox | 56:17 | 33 | |
|
2021-12-20 | Triaging Crashed With Backward Taint Analysis For Arm Architecture | 23:56 | 1 | |
|
2021-12-20 | Unboxing The White Box Practical Attacks Against Obfuscated Ciphers | 56:50 | 1 | |
|
2021-12-20 | Bypassing Local Windows Authentication To Defeat Full Disk Encryption | 25:57 | 3 | |
|
2021-12-20 | Going Auth The Rails On A Crazy Train Black Hat - Europe - 2015 | 58:30 | 0 | |
|
2021-12-20 | LTE & IMSI Catcher Myths Black Hat - Europe - 2015 | 1:06:24 | 60 | |
|
2021-12-20 | Bypassing Self Encrypting Drives SED in Enterprise Environments | 59:11 | 13 | |
|
2021-12-20 | Hey Man, Have You Forgotten To Intialize Your Memory Black Hat - Europe - 2015 | 50:33 | 0 | |
|
2021-12-20 | New And Newly Changed Fully Qualified Doman Names A View of Worldwide Changes to DNS | 58:24 | 1 | |
|
2021-12-20 | Continuous Intrusion Why CI Tools Are An Attacker s Best Friends | 59:45 | 0 | |
|
2021-12-20 | Commix Detecting and Exploiting Command Injection Flaws | 30:18 | 20 | |
|
2021-12-20 | New Tool For Discovering Flash player 0 Day Attacks in the Wild from Various Channels | 17:13 | 1 | |
|
2021-12-20 | Hiding In Plain Sight Advances In Malware Covert Communication Channels | 57:16 | 5 | |
|
2021-12-20 | Vulnerability Exploitation In Docker Container Environments | 49:20 | 6 | |
|
2021-12-20 | Watching The Watchdog Protecting Kerberos Authentication With Network Monitoring | 50:15 | 0 | |
|
2021-12-20 | Cybercrime in The Deep Web Black Hat - Europe - 2015 | 55:08 | 16 | |
|
2021-12-20 | How To Break XML Encryption Automatically Black Hat - Europe - 2015 | 43:19 | 7 | Guide |
|
2021-12-20 | A Peek Under the Blue Coat Black Hat - Europe - 2015 | 50:08 | 1 | |
|
2021-12-20 | Implementing Practical Electrical Glitching Attacks | 42:44 | 6 | |
|
2021-12-20 | Cybersecurity for Oil and Gas Industries How Hackers Can Manipulate Oil Stocks | 1:00:53 | 6 | |
|
2021-12-20 | All your Root Checks Belong To Us The Sad State of Root Detection | 31:13 | 0 | |
|
2021-12-20 | Your Scripts In My Page What Could Possibly Go Wrong | 28:43 | 0 | |
|
2021-12-20 | Is Your Timespace Safe Time and Position Spoofing Opensourcely | 32:43 | 1 | |
|
2021-12-20 | Androbugs Framework An Android Application Security Vilnerability Scanner | 50:20 | 16 | |
|
2021-12-20 | Keynote What Got Us Here Wont Get Us There | 57:51 | 0 | |
|
2021-12-20 | Panel What You Need To Know About The Changing Regulatory Landscape In Information Security | 58:52 | 0 | Guide |
|
2021-12-20 | Defending Against Malicious Application Compatibility Shims | 57:15 | 2 | |
|
2021-12-20 | Attacking The XNU Kernel In El Capitain Black Hat - Europe - 2015 | 37:24 | 7 | |
|
2021-12-20 | Even The Lastpass Will Be Stolen, Deal With It Black Hat - Europe - 2015 | 52:30 | 13 | |
|
2021-12-20 | Authenticator Leakage Through Backup Channels on Android Black Hat - Europe - 2015 | 46:34 | 0 | |
|
2021-12-20 | Silently Breaking ASLR In The Cloud Black Hat - Europe - 2015 | 52:48 | 1 | |
|
2021-12-20 | Blended Web and Database Attacks on Real Time, In Memory Platforms Black Hat - Europe - 2014 | 55:51 | 1 | |
|
2021-12-20 | Lights Off The Darkness of the Smart Meters Black Hat - Europe - 2014 | 55:38 | 5 | |
|
2021-12-20 | Industrial Control Systems Pentesting PLCs 101 Part 2 2 Black Hat - Europe - 2014 | 51:11 | 6 | |
|
2021-12-20 | Evasion of High End IDPS Devices at the IPv6 Era Black Hat - Europe - 2014 | 57:53 | 1 | |
|
2021-12-20 | Session Identifier are for Now, Passwords are Forever XSS Based Abuse of Browser Password Managers | 55:20 | 1 | |
|
2021-12-20 | Endrun Secure Digital Communications for Our Modern Dystopia | 50:36 | 1 | |
|
2021-12-20 | The Power of Pair One Template that Reveals 100 UAF IE Vulnerabilities Black Hat - Europe - 2014 | 34:05 | 1 | |
|
2021-12-20 | SSL Validation Checking vs Going to Fail Black Hat - Europe - 2014 | 25:54 | 1 | |
|
2021-12-20 | Lessons Learned from Eight Years of Breaking Hypervisors | 54:36 | 0 | |
|
2021-12-19 | Firmware RE Firmware Unpacking, Analysis and Vulnerability Discovery as a Service | 45:22 | 5 | |
|