2021-12-13 | Tales from the NOC Going Public in Asia Black Hat - Asia - Singapore - 2018 | 47:18 | 1 | |
|
2021-12-13 | Server Tailgating A Chosen PlainText Attack on RDP Black Hat - Asia - Singapore - 2018 | 41:11 | 10 | |
|
2021-12-13 | Day 2 Keynote A Short Course in Cyber Warfare Black Hat - Asia - Singapore - 2018 | 54:54 | 1 | |
|
2021-12-13 | Hourglass Model 2 0 Case Study of Southeast Asia Underground Services Abusing Global 2FA | 40:48 | 1 | |
|
2021-12-13 | Day 1 Keynote National Cyber Aggression and Private Sector Internet Infrastructure | 45:58 | 0 | |
|
2021-12-13 | Securing Your In Ear Fitness Coach Challenges in Hardening Next Generation Wearables | 53:38 | 0 | |
|
2021-12-13 | International Problems Serialized Fuzzing for ICU Vulnerabilities | 35:46 | 1 | |
|
2021-12-13 | Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems | 53:33 | 35 | |
|
2021-12-13 | Counter Infiltration Future Proof Counter Attacks Against Exploit Kit Infrastructure | 58:48 | 2 | |
|
2021-12-13 | New Compat Vulnerabilities in Linux Device Drivers | 23:50 | 1 | |
|
2021-12-13 | return to csu A New Method to Bypass 64 bit Linux ASLR Black Hat - Asia - Singapore - 2018 | 56:33 | 8 | |
|
2021-12-13 | All Your Payment Tokens Are Mine Vulnerabilities of Mobile Payment Systems | 23:02 | 17 | |
|
2021-12-13 | A New Era of SSRF Exploiting URL Parser in Trending Programming Languages | 47:17 | 18 | |
|
2021-12-13 | Nation State Moneymule's Hunting Season APT Attacks Targeting Financial Institutions | 55:21 | 2 | |
|
2021-12-13 | Detecting Security Hazards in SEAndroid Vendor Customizations via Large Scale Supervised ML | 45:42 | 0 | |
|
2021-12-13 | XOM switch Hiding Your Code from Advanced Code Reuse Attacks In One Shot | 49:22 | 2 | |
|
2021-12-13 | Mac A Mal An Automated Platform for Mac Malware Hunting Black Hat - Asia - Singapore - 2018 | 17:37 | 5 | |
|
2021-12-13 | A Deal with the Devil Breaking Smart Contracts Black Hat - Asia - Singapore - 2018 | 50:49 | 4 | |
|
2021-12-13 | Death Profile Now iOS Has Been Compromised to Suspected Ransomware | 30:19 | 3 | |
|
2021-12-13 | Breaking the Attack Graph How to Leverage Graphs to Strengthen Security in a Domain Environment | 26:16 | 5 | Guide |
|
2021-12-13 | Breach Detection At Scale With AWS Honey Tokens Black Hat - Asia - Singapore - 2018 | 25:29 | 1 | |
|
2021-12-13 | Fried Apples Jailbreak DIY Black Hat - Asia - Singapore - 2017 | 42:16 | 0 | |
|
2021-12-13 | Beyond the Blacklists Detecting Malicious URL Through Machine Learning | 50:47 | 2 | |
|
2021-12-13 | The Power of Data Oriented Attacks Black Hat - Asia - Singapore - 2017 | 1:02:51 | 8 | |
|
2021-12-13 | Man in the SCADA Anatomy of Data Integrity Attacks in Industrial Control Systems | 56:09 | 10 | |
|
2021-12-13 | Exploiting USB IP in Linux | 44:11 | 8 | |
|
2021-12-13 | Betting Against the House Security and Stability When the Odds are Against You | 30:05 | 0 | |
|
2021-12-13 | The Irrelevance of K Bytes Detection Building a Robust Pipeline for Malicious Documents | 52:04 | 2 | |
|
2021-12-13 | Remotely Compromising iOS via Wi Fi and Escaping the Sandbox | 37:58 | 0 | |
|
2021-12-13 | Drop the ROP Fine Grained Control Flow Integrity for the Linux Kernel | 46:15 | 1 | |
|
2021-12-13 | Locknote Conclusions & Key Takeaways from Black Hat Asia 2017 | 46:36 | 0 | |
|
2021-12-13 | Phishing for Funds Understanding Business Email Compromise | 59:45 | 3 | |
|
2021-12-13 | Anti Plugin Don't Let Your App Play as an Android Plugin | 46:33 | 2 | |
|
2021-12-13 | Keynote Why We are Not Building a Defendable Internet | 41:12 | 1 | |
|
2021-12-13 | Domo Arigato, Mr Roboto Security Robots a la Unit Testing | 1:00:00 | 1 | |
|
2021-12-13 | All Your Emails Belong to Us Exploiting Vulnerable Email Clients via Domain Name Collision | 30:39 | 0 | |
|
2021-12-13 | Dig Into the Attack Surface of PDF and Gain 100+ CVEs in 1 Year | 21:54 | 2 | |
|
2021-12-13 | Keynote The Seven Axioms of Security | 50:38 | 1 | |
|
2021-12-13 | Open Sourcing Automotive Diagnostics | 59:08 | 2 | |
|
2021-12-13 | Delegate to the Top Abusing Kerberos for Arbitrary Impersonations and RCE | 39:44 | 0 | |
|
2021-12-13 | 24 Techniques to Gather Threat Intel and Track Actors | 52:50 | 3 | |
|
2021-12-13 | Never Let Your Guard Down Finding Unguarded Gates to Bypass Control Flow Guard with Big Data | 37:28 | 1 | |
|
2021-12-13 | Hello From the Other Side SSH Over Robust Cache Covert Channels in the Cloud | 57:17 | 2 | |
|
2021-12-13 | Daily Life Peeper Bug Hunting and Exploit Techniques in IoT | 55:37 | 0 | |
|
2021-12-13 | 3G 4G Intranet Scanning and its Application on the WormHole Vulnerability | 44:06 | 8 | |
|
2021-12-13 | Hacking HTTP 2 New Attacks on the Internet's Next Generation Foundation | 21:44 | 1 | |
|
2021-12-13 | What Malware Authors Don't Want You to Know Evasive Hollow Process Injection | 55:02 | 1 | |
|
2021-12-13 | Cross the Wall Bypass All Modern Mitigations of Microsoft Edge | 35:20 | 2 | |
|
2021-12-13 | Myth and Truth About Hypervisor Based Kernel Protector The Reason Why You Need Shadow Box | 37:36 | 1 | |
|
2021-12-13 | Hack Microsoft Using Microsoft Signed Binaries Black Hat - Asia - Singapore - 2017 | 54:53 | 4 | |
|
2021-12-13 | Welcome & Introduction to Black Hat Asia 2017 | 19:48 | 1 | |
|
2021-12-13 | Cache Side Channel Attack Exploitability and Countermeasures | 56:15 | 4 | |
|
2021-12-13 | Mobile Telephony Threats in Asia Black Hat - Asia - Singapore - 2017 | 58:49 | 4 | |
|
2021-12-13 | Go Get My Vulnerabilities Black Hat - Asia - Singapore - 2017 | 50:50 | 0 | |
|
2021-12-13 | The UEFI Firmware Rootkits Myths and Reality | 58:09 | 17 | |
|
2021-12-13 | Breaking Korea Transit Card with Side Channel Attack Unauthorized Recharging | 19:03 | 3 | |
|
2021-12-13 | MASHaBLE Mobile Applications of Secret Handshakes Over Bluetooth LE | 32:52 | 0 | |
|
2021-12-13 | Automated Dynamic Fireware Analysis At Scale A Case Study on Embedded Web Interfaces | 1:08:13 | 1 | |
|
2021-12-13 | Keynote Devaluing Attack Disincentivizing Threats Against The Next Billion Devices | 1:05:49 | 1 | |
|
2021-12-13 | Rapid Radio Reversing | 1:01:07 | 5 | |
|
2021-12-13 | Automated Detection of Firefox Extension Reuse Vulnerabilities | 57:06 | 1 | |
|
2021-12-13 | Exploiting Linux and Pax ASLR's Weaknesses on 32 Bit and 64 Bit Systems | 58:28 | 4 | |
|
2021-12-13 | PLC Blaster A worm Living Solely In The PLC Black Hat - Asia - Singapore - 2016 | 55:29 | 6 | |
|
2021-12-13 | Android Commercial Spyware Disease and Medication | 28:35 | 1 | |
|
2021-12-13 | Practical New Developments in The Breach Attack Black Hat - Asia - Singapore - 2016 | 53:18 | 4 | |
|
2021-12-13 | Enterprise Apps Bypassing the IOS Gatekeeper | 36:39 | 2 | |
|
2021-12-13 | A New CVE 2015 0057 Exploit Technology | 51:35 | 1 | Vlog |
|
2021-12-13 | Numchecker A System Approach for Kernel Rootkit Detection | 52:43 | 1 | |
|
2021-12-13 | The Tactical Application Security Program Getting Stuff Done | 57:42 | 1 | |
|
2021-12-13 | DSCOMPROMISED A Windows DSC Attack Framework Black Hat - Asia - Singapore - 2016 | 59:26 | 4 | |
|
2021-12-13 | Cantact An Open Tool for Automative Exploitation Black Hat - Asia - Singapore - 2016 | 54:25 | 1 | |
|
2021-12-13 | Incident Response @ Scale Building a Next Generation SOC | 16:56 | 3 | |
|
2021-12-13 | Never Trust Your Inputs Causing 'Catastrophic Physical Consequences' From The Sensor | 53:49 | 2 | |
|
2021-12-13 | Bypassing Browser Security Policies for Fun and Profit | 26:35 | 2 | |
|
2021-12-13 | I'm Not a Human Breaking the Google Recaptcha | 28:01 | 2 | |
|
2021-12-13 | The Security Wolf of Wall Street Fighting Crime With High Frequency Classification and | 57:36 | 2 | |
|
2021-12-13 | The Perl Jam 2 The Camel Strikes Back | 27:13 | 4 | |
|
2021-12-13 | Multivariate Solutions To Emerging Passive DNS Challenges | 58:14 | 0 | |
|
2021-12-13 | Hey, Your Parcel Looks Bad Fuzzing and Exploiting Parcel Ization Vulnerabilties in Android | 35:00 | 6 | |
|
2021-12-13 | Break Out of The Truman Show Active Detection and Escape of Dynamic Binary Instrumentation | 45:07 | 4 | |
|
2021-12-13 | Browsers Gone Wild | 58:59 | 0 | |
|
2021-12-13 | MLD Considered Harmful Breaking Another IPv6 Subprotocol | 1:01:33 | 0 | |
|
2021-12-13 | Slime Automated Anti Sandboxing Disarmament System | 43:48 | 3 | |
|
2021-12-13 | From Zero to Secure in One Minute | 54:17 | 0 | |
|
2021-12-13 | Locknote Conclusions and Key Takeaways from Black Hat 2015 | 1:01:52 | 0 | |
|
2021-12-13 | Client Side Protection Against DOM Based XSS Done Right tm | 1:00:37 | 1 | |
|
2021-12-13 | Bypassing Malware Detection Mechanisms in Online Banking | 42:39 | 0 | |
|
2021-12-13 | Welcome and Introduction to Black Hat Asia 2015 | 10:55 | 0 | |
|
2021-12-13 | Security Content Metadata Model with an Efficient Search Methodology For Real Time Monitoring | 26:59 | 1 | Vlog |
|
2021-12-13 | We Can Still Crack You General Unpacking Method For Android Packer no Root | 33:02 | 1 | |
|
2021-12-13 | Manna from Heaven Improving the State of Wireless Rogue AP Attacks | 44:01 | 7 | |
|
2021-12-12 | Bar Mitzva Attack Breaking SSL with 13 Year Old RC4 Weakness | 48:56 | 7 | |
|
2021-12-12 | Forging the USB Armory Black Hat - Asia - Singapore - 2015 | 53:53 | 4 | |
|
2021-12-12 | API Deobfuscator Identifying Runtime Obfuscated API Calls Via Memory Access Analysis | 27:21 | 2 | |
|
2021-12-12 | Keynote Information Technology Systems in a Post Silcon World | 56:51 | 0 | Guide |
|
2021-12-12 | Exploiting Social Navigation Black Hat - Asia - Singapore - 2015 | 29:54 | 1 | |
|
2021-12-12 | Understanding SCADA's Modbus Protocol Black Hat - Asia - Singapore - 2015 | 1:51:34 | 14 | |
|
2021-12-12 | Resurrecting The Read Logs Permission on Samsung Devices Black Hat - Asia - Singapore - 2015 | 28:11 | 2 | Vlog |
|
2021-12-12 | I Know Where You've Been Geo Inference Attacks Via The Browser Cache | 48:07 | 1 | |
|
2021-12-12 | The Underground Ecosystem of Credit Card Frauds Black Hat - Asia - Singapore - 2015 | 53:52 | 8 | |
|