BlackOps
Channel:
Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=qrbMuB6Tjfg
If there's one thing we know, it's that we're doing it wrong. Sacred cows make the best hamburgers, so in this year's talk I'm going to play with some techniques that are obviously wrong and evil and naive. There will also be a lot of very interesting code, spanning the range from high speed network stacks to random number engines to a much deeper analysis of non-neutral networks. Finally, we will revisit DNSSEC, both in code, and in what it can mean to change the battleground in your favor.
Presented By:
Dan Kaminsky
Black Hat - USA - 2012 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security
Other Videos By All Hacking Cons
2021-12-31 | BinaryPig Scalable Malware Analytics in Hadoop |
2021-12-31 | Javascript Static Security Analysis Made Easy with JSPrime |
2021-12-31 | Just In Time Code Reuse The More Things Change, the More They Stay the Same |
2021-12-31 | Hacking for Fun & Profit |
2021-12-31 | Web Exploit Toolkits |
2021-12-31 | Secure Browser Plugins |
2021-12-31 | Bouncer Land |
2021-12-31 | Trust, Security and Society Presented By Bruce Schneier |
2021-12-31 | Ghost in the Air Traffic |
2021-12-31 | Random Number Generator in PHP |
2021-12-31 | BlackOps |
2021-12-31 | We have you by the Gadgets |
2021-12-31 | Torturing OpenSSL |
2021-12-31 | Probing The Mobile Operating Networks |
2021-12-31 | Find Me in your Database |
2021-12-31 | Digging Deep into the Flash Sandboxes |
2021-12-31 | The Big Picture |
2021-12-31 | SQL Injections |
2021-12-31 | File Disinfection Framework Striking back at the Polymorphic Viruses |
2021-12-31 | Easy Local Windows Kernel Exploitation |
2021-12-31 | Blended Threats and JavaScript: a plan for permanent network compromise |
Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
phishing
software
access
safety
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering
Dan Kaminsky