2300 тысяч подписчиков
2.6 тысяч видео
Keynote - Securing Our Cyberspace Together
Fireside Chat: Jeff Moss and Ruimin He
LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules
Emerging Frontiers: Insights from the Black Hat Asia Review Board
What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned
The Hack@DAC Story: Learnings from Organizing the World's Largest Hardware Hacking Competition
Privacy Detective: Sniffing Out Your Data Leaks for Android
Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs
The Final Chapter: Unlimited ways to bypass your macOS privacy mechanisms
One Flip is All It Takes: Identifying Syscall-Guard Variables for Data-Only Attacks
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments
You Shall Not PASS - Analysing a NSO iOS Spyware Sample
Beyond the Mcse: Active Directory for the Security Professional
The Kali Linux Dojo Workshop #1: Rolling Your Own - Generating Custom Kali Linux 2.0 ISOs
KSMA: Breaking Android Kernel Isolation and Rooting with ARM MMU Features
Black Hat USA 2005 - Announcing OWASP Guide To Securing Web Applications & Services 2.0
Same Origin Method Execution (SOME) - Exploiting a Callback for Same Origin Policy Bypass
Back to the Future: A Radical Insecure Design of KVM on ARM
The Devils in the Dependency Data Driven Software Composition Analysis
Exploring & Exploiting Zero-Click Remote Interfaces of Modern Huawei Smartphones
Im Not a Human: Breaking the Google Recaptcha
Black Hat USA 2013 - BIOS Security
Reversing a Japanese Wireless SD Card - From Zero to Code Execution
Inside Web Attacks: The Real Payloads
Room for Escape: Scribbling Outside the Lines of Template Security
Black Hat USA 2013 - Fully Arbitrary 802.3 Packet Injection: Maximizing the Ethernet Attack Surface
The Hat Trick: Exploit Chrome Twice from Runtime to JIT
Calling all Cybersecurity Pros! Join Us at Black Hat USA 2024 at the Mandalay Bay.
ElectroVolt: Pwning Popular Desktop Apps While Uncovering New Attack Surface on Electron
ChaosDB: How We Hacked Databases of Thousands of Azure Customers (rev)
Fixing a Memory Forensics Blind Spot: Linux Kernel Tracing
Discovering Hidden Properties to Attack the Node.js Ecosystem
Catch Me If You Can: Deterministic Discovery of Race Conditions with Fuzzing
Locknote: Conclusions and Key Takeaways from Day 2
Nothing but Net: Leveraging macOSs Networking Frameworks to Heuristically Detect Malware
Bad Randomness: Protecting Against Cryptographys Perfect Crime
Windows Agentless C2: (Ab)using the MDM Client Stack
Reverse Engineering the Customized Pointer Authentication Hardware Implementation on Apple M1
Defending Against Malicious Application Compatibility Shims
Certificate Bypass: Hiding and Executing Malware from a Digitally Signed Executable
How to Get the Most Out of the Python Decompilers Uncompyle6 and Decompyle3 - How to Write and Read
Bypassing Entra ID Conditional Access Like APT: A Deep Dive Into Device Authentication Mechanisms
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
The Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation
Beyond Root: Custom Firmware for Embedded Mobile Chipsets
Understanding SCADAs Modbus Protocol
How to Break PDF Encryption
Black Hat USA 2012 - iOS Application Security Assessment and Automation: Introducing SIRA
Deep Neural Networks for Hackers: Methods, Applications, and Open Source Tools
Black Hat USA 2004 - Shoot the Messenger
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
Chain of Fools: An Exploration of Certificate Chain Validation Mishaps
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
return-to-csu: A New Method to Bypass 64-bit Linux ASLR
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
From Hackathon to Hacked: Web3's Security Journey
Black Hat USA 2001 - Computer Forensics: A Critical Process in Your Incident Response Plan
Keynote: Embedding a Human-Centric Approach Into a Global Cyber Security Program
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
My Invisible Adversary: Burnout
How Embedded TCP/IP Stacks Breed Critical Vulnerabilities