BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ablon-Bug-Collisions-Meet-Government-Vulnerability-Disclosure-Zero-Days-Thousands-Of-Nights-RAND.pdf |
1.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ablon-Zero-Days-Thousands-Of-Nights-The-Life-And-Times-Of-Zero-Day-Vulnerabilities-And-Their-Exploits.pdf |
2.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Alva-So-You-Want-To-Market-Your-Security-Product.pdf |
3.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection-wp.pdf |
770 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Anderson-Bot-Vs-Bot-Evading-Machine-Learning-Malware-Detection.pdf |
4.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets-wp.pdf |
420 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Artenstein-Broadpwn-Remotely-Compromising-Android-And-iOS-Via-A-Bug-In-Broadcoms-Wifi-Chipsets.pdf |
2.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Aumasson-Automated-Testing-Of-Crypto-Software-Using-Differential-Fuzzing.pdf |
5.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Bates-Splunking-Dark-Tools-A-Pentesters-Guide-To-Pwnage-Visualization.pdf |
70.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Beery-The-Industrial-Revolution-Of-Lateral-Movement.pdf |
4.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Bianco-Go-To-Hunt-Then-Sleep.pdf |
2.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science-wp.pdf |
2.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Bohannon-Revoke-Obfuscation-PowerShell-Obfuscation-Detection-And%20Evasion-Using-Science.pdf |
5.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Borgaonkar-New-Adventures-In-Spying-3G-And-4G-Users-Locate-Track-And-Monitor.pdf |
6.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Branco-Firmware-Is-The-New-Black-Analyzing-Past-Three-Years-Of-BIOS-UEFI-Security-Vulnerabilities.pdf |
1.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed-wp.pdf |
360 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Brandstetter-insecurity-In-Building-Automation-How-To-Create-Dark-Buildings-With-Light-Speed.pdf |
4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Bulygin-Fractured-Backbone-Breaking-Modern-OS-Defenses-With-Firmware-Attacks.pdf |
3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Burnett-Ichthyology-Phishing-As-A-Science-wp.pdf |
2.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Burnett-Ichthyology-Phishing-As-A-Science.pdf |
6.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security-wp.pdf |
671 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Carettoni-Electronegativity-A-Study-Of-Electron-Security.pdf |
8.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence.pdf |
5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Cherny-Well-That-Escalated-Quickly-How-Abusing-The-Docker-API-Led-To-Remote-Code-Execution-Same-Origin-Bypass-And-Persistence_wp.pdf |
945 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit-wp.pdf |
686 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Chui-Evilsploit-A-Universal-Hardware-Hacking-Toolkit.pdf |
35.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Cohen-Game-Of-Chromes-Owning-The-Web-With-Zombie-Chrome-Extensions-wp.pdf |
1.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients-wp.pdf |
630 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Coltel-WSUSpendu-Use-WSUS-To-Hang-Its-Clients.pdf |
3.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems-wp.pdf |
794 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Continella-ShieldFS-The-Last-Word-In-Ransomware-Resilient-Filesystems.pdf |
3.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Cranor-Real-Users-Simulated-Attacks.pdf |
20.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Dods-Infecting-The-Enterprise-Abusing-Office365-Powershell-For-Covert-C2.pdf |
7.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Domas-Breaking-The-x86-Instruction-Set-wp.pdf |
229 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Domas-Breaking-The-x86-ISA.pdf |
9.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Eissa-Network-Automation-Isnt-Your-Safe-Haven-Protocol-Analysis-And-Vulnerabilities-Of-Autonomic-Network.pdf |
2.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader-wp.pdf |
3.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Etemadieh-Hacking-Hardware-With-A-$10-SD-Card-Reader.pdf |
14.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough-wp.pdf |
2.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Evdokimov-Intel-AMT-Stealth-Breakthrough.pdf |
3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Feng-Many-Birds-One-Stone-Exploiting-A-Single-SQLite-Vulnerability-Across-Multiple-Software.pdf |
1.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop-wp.pdf |
718 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Fratantonio-Cloak-And-Dagger-From-Two-Permissions-To-Complete-Control-Of-The-UI-Feedback-Loop.pdf |
3.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Gil-Web-Cache-Deception-Attack-wp.pdf |
1.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Gil-Web-Cache-Deception-Attack.pdf |
3.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Giuliano-Lies-And-Damn-Lies-Getting-Past-The-Hype-Of-Endpoint-Security-Solutions.pdf |
2.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Gostomelsky-Hunting-GPS-Jammers.pdf |
62.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&C-Toolkits-wp.pdf |
49 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Grange-Digital-Vengeance-Exploiting-The-Most-Notorious-C&C-Toolkits.pdf |
4.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Gray-FlowFuzz-A-Framework-For-Fuzzing-OpenFlow-Enabled-Software-And-Hardware-Switches.pdf |
3.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Herr-Bug-Collisions-Meet-Government-Vulnerability-Disclosure.pdf |
21.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Hypponen-The-Epocholypse-2038-Whats-In-Store-For-The-Next-20-Years.pdf |
4.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Invernizzi-Tracking-Ransomware-End-To-End.pdf |
8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Johnson-All-Your-SMS-&-Contacts-Belong-To-Adups-&-Others-wp.pdf |
245 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Johnson-All-Your-SMS-&-Contacts-Belong-To-Adups-&-Others.pdf |
14.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Jung-AVPASS-Leaking-And-Bypassing-Anitvirus-Detection-Model-Automatically.pdf |
5.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Jurczyk-Bochspwn-Reloaded-Detecting-Kernel-Memory-Disclosure-With-X86-Emulation-And-Taint-Tracking.pdf |
5.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks-wp.pdf |
3.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kacer-SS7-Attacker-Heaven-Turns-Into-Riot-How-To-Make-Nation-State-And-Intelligence-Attackers-Lives-Much-Harder-On-Mobile-Networks.pdf |
3.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Keliris-And-Then-The-Script-Kiddie-Said-Let-There-Be-No-Light-Are-Cyberattacks-On-The-Power-Grid-Limited-To-Nation-State-Actors-wp.pdf |
83 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-tool.zip |
35 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface-wp.pdf |
666 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kettle-Cracking-The-Lens-Exploiting-HTTPs-Hidden-Attack-Surface.pdf |
6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems-wp.pdf |
1002 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Knopf-Redesigning-PKI-To-Solve-Revocation-Expiration-And-Rotation-Problems.pdf |
2.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox-wp.pdf |
1.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kotler-The-Adventures-Of-Av-And-The-Leaky-Sandbox.pdf |
17.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Kralevich-Honey-I-Shrunk-The-Attack-Surface-Adventures-In-Android-Security-Hardening.pdf |
3.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Krug-Hacking-Severless-Runtimes-wp.pdf |
631 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Krug-Hacking-Severless-Runtimes.pdf |
5.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Lackey-Practical%20Tips-for-Defending-Web-Applications-in-the-Age-of-DevOps.pdf |
1.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Lain-Skype-&-Type-Keystroke-Leakage-Over-VoIP.pdf |
2.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Lee-Industroyer-Crashoverride-Zero-Things-Cool-About-A-Threat-Group-Targeting-The-Power-Grid.pdf |
5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Lekies-Dont-Trust-The-DOM-Bypassing-XSS-Mitigations-Via-Script-Gadgets.pdf |
1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Lundgren-Taking-Over-The-World-Through-Mqtt-Aftermath.pdf |
3.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices-wp.pdf |
1.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Luo-Iotcandyjar-Towards-An-Intelligent-Interaction-Honeypot-For-IoT-Devices.pdf |
4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Matrosov-Betraying-The-BIOS-Where-The-Guardians-Of-The-BIOS-Are-Failing.pdf |
8.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Mavroudis-Opencrypto-Unchaining-The-JavaCard-Ecosystem.pdf |
2.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Mazurov-Brown-Protecting-Visual-Assets-Digital-Image-Counter-Forensics.pdf |
1.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests-wp.pdf |
289 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-McGrew-Protecting-Pentests-Recommendations-For-Performing-More-Secure-Tests.pdf |
344 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Miller-The-Active-Directory-Botnet.pdf |
3.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Mittal-Evading-MicrosoftATA-for-ActiveDirectory-Domination.pdf |
1.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Mueller-Exploiting-Network-Printers.pdf |
1.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Munoz-Friday-The-13th-JSON-Attacks-wp.pdf |
777 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Munoz-Friday-The-13th-Json-Attacks.pdf |
16 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers-wp.pdf |
383 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nakibly-Automated-Detection-of-Vulnerabilities-in-Black-Box-Routers.pdf |
448 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization-wp.pdf |
768 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nichols-Cyber-Wargaming-Lessons-Learned-In-Influencing-Stakeholders-Inside-And-Outside-Your-Organization.pdf |
6.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus-wp.pdf |
1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Nie-Free-Fall-Hacking-Tesla-From-Wireless-To-CAN-Bus.pdf |
1.8 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-OFlynn-Breaking-Electronic-Locks.pdf |
3.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Osborn-White-Hat-Privilege-The-Legal-Landscape-For-A-Cybersecurity-Professional-Seeking-To-Safeguard-Sensitive-Client-Data.pdf |
1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification-wp.pdf |
5.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ossmann-Whats-On-The-Wireless-Automating-RF-Signal-Identification.pdf |
4.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Pfoh-rVMI-A-New-Paradigm-For-Full-System-Analysis.pdf |
3.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Picod-Attacking-Encrypted-USB-Keys-The-Hard_ware_-Way.pdf |
15.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Pomonis-KR%5EX-%20Comprehensive-%20Kernel-Protection-Against-Just-In-Time-Code-Reuse.pdf |
11.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Prandl-PEIMA-Harnessing-Power-Laws-To-Detect-Malicious-Activities-From-Denial-Of-Service-To-Intrusion-Detection-Traffic-Analysis-And-Beyond-wp.pdf |
388 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Prandl-PEIMA-Harnessing-Power-Laws-To-Detect-Malicious-Activities-From-Denial-Of-Service-To-Intrusion-Detection-Traffic-Analysis-And-Beyond.pdf |
1.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots-wp.pdf |
2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Quarta-Breaking-The-Laws-Of-Robotics-Attacking-Industrial-Robots.pdf |
8.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Radocea-Intercepting-iCloud-Keychain.pdf |
2.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog-wp.pdf |
5.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Randolph-Delivering-Javascript-to-World-Plus-Dog.pdf |
489 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices-wp.pdf |
310 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Rios-When-IoT-Attacks-Understanding-The-Safety-Risks-Associated-With-Connected-Devices.pdf |
2.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors-wp.pdf |
7.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Robbins-An-ACE-Up-The-Sleeve-Designing-Active-Directory-DACL-Backdoors.pdf |
3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ruthven-Fighting-Targeted-Malware-In-The-Mobile-Ecosystem.pdf |
1.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data-wp.pdf |
4.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Sanders-Garbage-In-Garbage-Out-How-Purportedly-Great-ML-Models-Can-Be-Screwed-Up-By-Bad-Data.pdf |
1.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Sanders-What-Theyre-Teaching-Kids-These-Days-Comparing-Security-Curricula-And-Accreditations-To-Industry-Needs.pdf |
1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices-wp.pdf |
17.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Santamarta-Go-Nuclear-Breaking%20Radition-Monitoring-Devices.pdf |
32.4 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update-wp.pdf |
998 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Schenk-Taking-Windows-10-Kernel-Exploitation-To-The-Next-Level%E2%80%93Leveraging-Write-What-Where-Vulnerabilities-In-Creators-Update.pdf |
2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege-wp.pdf |
4.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Shen-Defeating-Samsung-KNOX-With-Zero-Privilege.pdf |
8.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Shortridge-Big-Game-Theory-Hunting-The-Peculiarities-Of-Human-Behavior-In-The-Infosec-Game.pdf |
4.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Silvanovich-The-Origin-Of-Array-Symbol-Species.pdf |
733 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Singh-Wire-Me-Through-Machine-Learning.pdf |
6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Staggs-Adventures-In-Attacking-Wind-Farm-Control-Networks.pdf |
3.1 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Swami-SGX-Remote-Attestation-Is-Not-Sufficient-wp.pdf |
2.3 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Trikalinou-Taking-DMA-Attacks-To-The-Next-Level-How-To-Do-Arbitrary-Memory-Reads-Writes-In-A-Live-And-Unmodified-System-Using-A-Rogue-Memory-Controller.pdf |
2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf |
5.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Valtman-The-Art-Of-Securing-100-Products.pdf |
19.7 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Vanhoef-WiFuzz-Detecting-And-Exploiting-Logical-Flaws-In-The-Wi-Fi-Cryptographic-Handshake-tools.zip |
15 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention-wp.pdf |
203 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ventura-Theyre-Coming-For-Your-Tools-Exploiting-Design-Flaws-For-Active-Intrusion-Prevention.pdf |
1.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Wang-Sonic-Gun-To-Smart-Devices-Your-Devices-Lose-Control-Under-Ultrasound-Or-Sound.pdf |
6.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Wardle-Offensive-Malware-Analysis-Dissecting-OSXFruitFly-Via-A-Custom-C&C-Server.pdf |
16.9 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Wright-Orange-Is-The-New-Purple-wp.pdf |
220 KB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Wright-Orange-Is-The-New-Purple.pdf |
28.2 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Yunusov-The-Future-Of-Applepwn-How-To-Save-Your-Money.pdf |
2.6 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Yuwei-Ghost-Telephonist-Link-Hijack-Exploitations-In-4G-LTE-CS-Fallback.pdf |
4.5 MB |
BlackhatUSA2017/BlackhatUSA2017-presentations/us-17-Ziv-Escalating-Insider-Threats-Using-Vmwares-Api.pdf |
2 MB |
BlackhatUSA2017/_in_Security_in_Building_Automation_How_to_Create_Dark_Buildings_with_Light_Speed.mp4 |
78.3 MB |
BlackhatUSA2017/A_New_Era_of_SSRF-Exploiting_URL_Parser_in_Trending_Programming_Languages.mp4 |
153.3 MB |
BlackhatUSA2017/Advanced_Pre-Breach_Planning_Utilizing_a_Purple_Team_to_Measure_Effectiveness_vs._Maturity.mp4 |
221.6 MB |
BlackhatUSA2017/Adventures_in_Attacking_Wind_Farm_Control_Networks.mp4 |
122.1 MB |
BlackhatUSA2017/All_Your_SMS_and_Contacts_Belong_to_ADUPS_and_Others.mp4 |
132.6 MB |
BlackhatUSA2017/An_ACE_Up_the_Sleeve_Designing_Active_Directory_DACL_Backdoors.mp4 |
274.1 MB |
BlackhatUSA2017/And_Then_the_Script-Kiddie_Said,_Let_There_be_No_Light._Are_Cyber-Attacks_on_the_Power_Grid_Limited_to_Nation-State_Actors.mp4 |
248.2 MB |
BlackhatUSA2017/Attacking_Encrypted_USB_Keys_the_Hard_ware_Way.mp4 |
94.5 MB |
BlackhatUSA2017/Automated_Detection_of_Vulnerabilities_in_Black-Box_Routers_and_Other_Network_Devices_.mp4 |
133.9 MB |
BlackhatUSA2017/Automated_Testing_of_Crypto_Software_Using_Differential_Fuzzing.mp4 |
152 MB |
BlackhatUSA2017/Avalanche_and_GozNym.mp4 |
140.4 MB |
BlackhatUSA2017/AVPASS_Leaking_and_Bypassing_Antivirus_Detection_Model_Automatically.mp4 |
167.5 MB |
BlackhatUSA2017/Behind_the_Plexiglass_Curtain_Stats_and_Stories_from_the_Black_Hat_NOC.mp4 |
127.9 MB |
BlackhatUSA2017/Betraying_the_BIOS_Where_the_Guardians_of_the_BIOS_are_Failing.mp4 |
339.1 MB |
BlackhatUSA2017/Big_Game_Theory_Hunting_The_Peculiarities_of_Human_Behavior_in_the_InfoSec_Game.mp4 |
170.3 MB |
BlackhatUSA2017/Black_Hat_USA_2017_Briefings_What_to_Keep_Track_Of.mp4 |
54.1 MB |
BlackhatUSA2017/Blue_Pill_for_Your_Phone.mp4 |
162.5 MB |
BlackhatUSA2017/Bochspwn_Reloaded_Detecting_Kernel_Memory_Disclosure_with_x86_Emulation_and_Taint_Tracking.mp4 |
183 MB |
BlackhatUSA2017/Bot_vs._Bot_for_Evading_Machine_Learning_Malware_Detection.mp4 |
79 MB |
BlackhatUSA2017/Breaking_Electronic_Door_Locks_Like_Youre_on_CSI_Cyber.mp4 |
150.1 MB |
BlackhatUSA2017/Breaking_the_Laws_of_Robotics_Attacking_Industrial_Robots.mp4 |
118.9 MB |
BlackhatUSA2017/Breaking_the_x86_Instruction_Set.mp4 |
151 MB |
BlackhatUSA2017/Broadpwn_Remotely_Compromising_Android_and_iOS_via_a_Bug_in_Broadcoms_Wi-Fi_Chipsets.mp4 |
199.3 MB |
BlackhatUSA2017/Bug_Collisions_Meet_Government_Vulnerability_Disclosure.mp4 |
222.1 MB |
BlackhatUSA2017/Challenges_of_Cooperation_Across_Cyberspace.mp4 |
248.5 MB |
BlackhatUSA2017/Cloak_and_Dagger_From_Two_Permissions_to_Complete_Control_of_the_UI_Feedback_Loop.mp4 |
127.6 MB |
BlackhatUSA2017/Cracking_the_Lens_Targeting_HTTPs_Hidden_Attack-Surface.mp4 |
178.2 MB |
BlackhatUSA2017/Cyber_Wargaming_Lessons_Learned_in_Influencing_Security_Stakeholders_Inside_and_Outside_Your_Organization.mp4 |
214 MB |
BlackhatUSA2017/Datacenter_Orchestration_Security_and_Insecurity_Assessing_Kubernetes,Mesos,and_Docker_at_Scale.mp4 |
151.3 MB |
BlackhatUSA2017/Death_by_a_Thousand_Abstracts_How_Not_to_Get_Your_Research_into_Black_Hat.mp4 |
74.1 MB |
BlackhatUSA2017/Defeating_Samsung_KNOX_with_Zero_Privilege.mp4 |
101.9 MB |
BlackhatUSA2017/Delivering_Javascript_to_World+Dog.mp4 |
128.3 MB |
BlackhatUSA2017/Developing_Trust_and_Gitting_Betrayed.mp4 |
180.7 MB |
BlackhatUSA2017/Digital_Vengeance_Exploiting_the_Most_Notorious_C_and_C_Toolkits.mp4 |
115 MB |
BlackhatUSA2017/Diversity_Panel_2017_Making_Diversity_a_Priority_In_Security.mp4 |
847.2 MB |
BlackhatUSA2017/Dont_Panic_The_Hitchhikers_Guide_to_Black_Hat.mp4 |
62.8 MB |
BlackhatUSA2017/Dont_Trust_the_DOM_Bypassing_XSS_Mitigations_via_Script_Gadgets.mp4 |
136 MB |
BlackhatUSA2017/Electronegativity-A_Study_of_Electron_Security.mp4 |
192.7 MB |
BlackhatUSA2017/Escalating_Insider_Threats_Using_VMwares_API.mp4 |
87.6 MB |
BlackhatUSA2017/Evading_Microsoft_ATA_for_Active_Directory_Domination.mp4 |
306.9 MB |
BlackhatUSA2017/Evil_Bubbles_or_How_to_Deliver_Attack_Payload_via_the_Physics_of_the_Process.mp4 |
180.7 MB |
BlackhatUSA2017/Evilsploit-A_Universal_Hardware_Hacking_Toolkit.mp4 |
230.1 MB |
BlackhatUSA2017/Evolutionary_Kernel_Fuzzing.mp4 |
204 MB |
BlackhatUSA2017/Exploit_Kit_Cornucopia.mp4 |
303 MB |
BlackhatUSA2017/Exploiting_Network_Printers.mp4 |
151.9 MB |
BlackhatUSA2017/Fad_or_Future_Getting_Past_the_Bug_Bounty_Hype.mp4 |
148.1 MB |
BlackhatUSA2017/Fighting_Targeted_Malware_in_the_Mobile_Ecosystem.mp4 |
45.9 MB |
BlackhatUSA2017/Fighting_the_Previous_War_aka_Attacking_and_Defending_in_the_Era_of_the_Cloud_.mp4 |
238 MB |
BlackhatUSA2017/Firmware_is_the_New_Black-Analyzing_Past_Three_Years_of_BIOSUEFI_Security_Vulnerabilities.mp4 |
197 MB |
BlackhatUSA2017/FlowFuzz-A_Framework_for_Fuzzing_OpenFlow-Enabled_Software_and_Hardware_Switches.mp4 |
123.4 MB |
BlackhatUSA2017/Fractured_Backbone_Breaking_Modern_OS_Defenses_with_Firmware_Attacks.mp4 |
179.2 MB |
BlackhatUSA2017/Free-Fall_Hacking_Tesla_from_Wireless_to_CAN_Bus.mp4 |
232.4 MB |
BlackhatUSA2017/Friday_the_13th_JSON_Attacks.mp4 |
174.5 MB |
BlackhatUSA2017/Game_of_Chromes_Owning_the_Web_with_Zombie_Chrome_Extensions.mp4 |
269.6 MB |
BlackhatUSA2017/Garbage_In,Garbage_Out_How_Purportedly_Great_Machine_Learning_Models_can_be_Screwed_Up_by_Bad_Data.mp4 |
86.5 MB |
BlackhatUSA2017/Ghost_Telephonist_Link_Hijack_Exploitations_in_4G_LTE_CS_Fallback.mp4 |
185 MB |
BlackhatUSA2017/Go_Nuclear_Breaking_Radiation_Monitoring_Devices.mp4 |
332.3 MB |
BlackhatUSA2017/Go_to_Hunt,Then_Sleep.mp4 |
285.8 MB |
BlackhatUSA2017/Hacking_Hardware_with_a_$10_SD_Card_Reader.mp4 |
243.1 MB |
BlackhatUSA2017/Hacking_Serverless_Runtimes_Profiling_AWS_Lambda,Azure_Functions,and_More.mp4 |
283.8 MB |
BlackhatUSA2017/Honey,I_Shrunk_the_Attack_Surface-Adventures_in_Android_Security_Hardening.mp4 |
198 MB |
BlackhatUSA2017/How_We_Created_the_First_SHA-1_Collision_and_What_it_Means_for_Hash_Security.mp4 |
110.9 MB |
BlackhatUSA2017/Hunting_GPS_Jammers.mp4 |
229.1 MB |
BlackhatUSA2017/Ichthyology_Phishing_as_a_Science.mp4 |
67.9 MB |
BlackhatUSA2017/IndustroyerCrashoverride_Zero_Things_Cool_About_a_Threat_Group_Targeting_the_Power_Grid.mp4 |
248.9 MB |
BlackhatUSA2017/Infecting_the_Enterprise_Abusing_Office365+Powershell_for_Covert_C2.mp4 |
180 MB |
BlackhatUSA2017/Influencing_the_Market_to_Improve_Security.mp4 |
91.9 MB |
BlackhatUSA2017/Intel_AMT_Stealth_Breakthrough.mp4 |
129.7 MB |
BlackhatUSA2017/Intel_SGX_Remote_Attestation_is_Not_Sufficient.mp4 |
286.5 MB |
BlackhatUSA2017/Intercepting_iCloud_Keychain.mp4 |
95.6 MB |
BlackhatUSA2017/IoTCandyJar_Towards_an_Intelligent-Interaction_Honeypot_for_IoT_Devices.mp4 |
204.8 MB |
BlackhatUSA2017/Keynote_Speaker.mp4 |
501.4 MB |
BlackhatUSA2017/kR^X_Comprehensive_Kernel_Protection_Against_Just-In-Time_Code_Reuse.mp4 |
88 MB |
BlackhatUSA2017/Lies,and_Damn_Lies_Getting_Past_the_Hype_of_Endpoint_Security_Solutions.mp4 |
180.4 MB |
BlackhatUSA2017/Many_Birds,One_Stone_Exploiting_a_Single_SQLite_Vulnerability_Across_Multiple_Software.mp4 |
104.9 MB |
BlackhatUSA2017/Network_Automation_is_Not_Your_Safe_Haven_Protocol_Analysis_and_Vulnerabilities_of_Autonomic_Network.mp4 |
298.3 MB |
BlackhatUSA2017/New_Adventures_in_Spying_3G_and_4G_Users_Locate,Track_and_Monitor.mp4 |
169.3 MB |
BlackhatUSA2017/Ochko123-How_the_Feds_Caught_Russian_Mega-Carder_Roman_Seleznev.mp4 |
128.4 MB |
BlackhatUSA2017/Offensive_Malware_Analysis_Dissecting_OSXFruitFly_via_a_Custom_C_and_C_Server.mp4 |
72.4 MB |
BlackhatUSA2017/OpenCrypto_Unchaining_the_JavaCard_Ecosystem.mp4 |
68.3 MB |
BlackhatUSA2017/Orange_is_the_New_Purple-How_and_Why_to_Integrate_Development_Teams_with_RedBlue_Teams_to_Build_More_Secure_Software.mp4 |
148.6 MB |
BlackhatUSA2017/PEIMA_Harnessing_Power_Laws_to_Detect_Malicious_Activities_from_Denial_of_Service_to_Intrusion_Detection,Traffic_Analysis,and_Beyond.mp4 |
60.6 MB |
BlackhatUSA2017/Practical_Tips_for_Defending_Web_Applications_in_the_Age_of_Agile_DevOps.mp4 |
114.5 MB |
BlackhatUSA2017/Practical_Tips_for_Defending_Web_Applications_in_the_Age_of_DevOps.mp4 |
114.5 MB |
BlackhatUSA2017/Protecting_Pentests_Recommendations_for_Performing_More_Secure_Tests.mp4 |
69.8 MB |
BlackhatUSA2017/Protecting_Visual_Assets_Digital_Image_Counter-Forensics.mp4 |
140.9 MB |
BlackhatUSA2017/Pwnie_Awards.mp4 |
279.6 MB |
BlackhatUSA2017/Quantifying_Risk_in_Consumer_Software_at_Scale-Consumer_Reports_Digital_Standard.mp4 |
104.8 MB |
BlackhatUSA2017/RBN_Reloaded-Amplifying_Signals_from_the_Underground.mp4 |
90.1 MB |
BlackhatUSA2017/Real_Humans,Simulated_Attacks_Usability_Testing_with_Attack_Scenarios.mp4 |
213.3 MB |
BlackhatUSA2017/Redesigning_PKI_to_Solve_Revocation,Expiration,and_Rotation_Problems.mp4 |
151.5 MB |
BlackhatUSA2017/Revoke-Obfuscation_PowerShell_Obfuscation_Detection_And_Evasion_Using_Science.mp4 |
262 MB |
BlackhatUSA2017/rVMI_A_New_Paradigm_for_Full_System_Analysis.mp4 |
157.9 MB |
BlackhatUSA2017/ShieldFS_The_Last_Word_in_Ransomware_Resilient_File_Systems.mp4 |
139.4 MB |
BlackhatUSA2017/Skype_and_Type_Keystroke_Leakage_over_VoIP.mp4 |
109 MB |
BlackhatUSA2017/So_You_Want_to_Market_Your_Security_Product….mp4 |
146 MB |
BlackhatUSA2017/Sonic_Gun_to_Smart_Devices_Your_Devices_Lose_Control_Under_UltrasoundSound.mp4 |
192.4 MB |
BlackhatUSA2017/Splunking_Dark_Tools-A_Pentesters_Guide_to_Pwnage_Visualization.mp4 |
203.8 MB |
BlackhatUSA2017/SS7_Attacker_Heaven_Turns_into_Riot_How_to_Make_Nation-State_and_Intelligence_Attackers_Lives_Much_Harder_on_Mobile_Networks.mp4 |
132.8 MB |
BlackhatUSA2017/Taking_DMA_Attacks_to_the_Next_Level_How_to_do_Arbitrary_Memory_ReadsWrites_in_a_Live_and_Unmodified_System_Using_a_Rogue_Memory_Controller.mp4 |
105.4 MB |
BlackhatUSA2017/Taking_Over_the_World_Through_MQTT-Aftermath.mp4 |
231.1 MB |
BlackhatUSA2017/Taking_Windows_10_Kernel_Exploitation_to_the_Next_Level-Leveraging_Write-What-Where_Vulnerabilities_in_Creators_Update.mp4 |
171 MB |
BlackhatUSA2017/The_Active_Directory_Botnet.mp4 |
153 MB |
BlackhatUSA2017/The_Adventures_of_AV_and_the_Leaky_Sandbox.mp4 |
133.4 MB |
BlackhatUSA2017/The_Art_of_Securing_100_Products.mp4 |
182.3 MB |
BlackhatUSA2017/The_Epocholypse_2038_Whats_in_Store_for_the_Next_20_Years.mp4 |
95.3 MB |
BlackhatUSA2017/The_Future_of_ApplePwn-How_to_Save_Your_Money.mp4 |
82.4 MB |
BlackhatUSA2017/The_Industrial_Revolution_of_Lateral_Movement.mp4 |
95.8 MB |
BlackhatUSA2017/The_Origin_of_Array_[@@species]_How_Standards_Drive_Bugs_in_Script_Engines.mp4 |
156.2 MB |
BlackhatUSA2017/The_Shadow_Brokers-Cyber_Fear_Game-Changers.mp4 |
96.1 MB |
BlackhatUSA2017/Theyre_Coming_for_Your_Tools_Exploiting_Design_Flaws_for_Active_Intrusion_Prevention.mp4 |
48.5 MB |
BlackhatUSA2017/Toolswatch_and_Black_Hat_Arsenal_A_Virtuous_Cycle.mp4 |
75 MB |
BlackhatUSA2017/Tracking_Ransomware_End_to_End.mp4 |
72.1 MB |
BlackhatUSA2017/Web_Cache_Deception_Attack.mp4 |
50.2 MB |
BlackhatUSA2017/Well,that_Escalated_Quickly_How_Abusing_Docker_API_Led_to_Remote_Code_Execution,Same_Origin_Bypass_and_Persistence_in_the_Hypervisor_via_Shadow_Containers.mp4 |
114.6 MB |
BlackhatUSA2017/What_Theyre_Teaching_Kids_These_Days_Comparing_Security_Curricula_and_Accreditations_to_Industry_Needs.mp4 |
276.8 MB |
BlackhatUSA2017/Whats_on_the_Wireless_Automating_RF_Signal_Identification.mp4 |
252.4 MB |
BlackhatUSA2017/When_IoT_Attacks_Understanding_the_Safety_Risks_Associated_with_Connected_Devices.mp4 |
271 MB |
BlackhatUSA2017/Where_No_Person_Has_Gone_Before.mp4 |
57.8 MB |
BlackhatUSA2017/White_Hat_Privilege_The_Legal_Landscape_for_a_Cybersecurity_Professional_Seeking_to_Safeguard_Sensitive_Client_Data.mp4 |
175 MB |
BlackhatUSA2017/Why_Most_Cyber_Security_Training_Fails_and_What_We_Can_Do_About_it.mp4 |
144.8 MB |
BlackhatUSA2017/WiFuzz_Detecting_and_Exploiting_Logical_Flaws_in_the_Wi-Fi_Cryptographic_Handshake.mp4 |
223.8 MB |
BlackhatUSA2017/Wire_Me_Through_Machine_Learning.mp4 |
67.3 MB |
BlackhatUSA2017/WSUSpendu_How_to_Hang_WSUS_Clients.mp4 |
129.5 MB |
BlackhatUSA2017/Zero_Days,Thousands_of_Nights_The_Life_and_Times_of_Zero-Day_Vulnerabilities_and_Their_Exploits.mp4 |
123.6 MB |