2300 тысяч подписчиков
2.6 тысяч видео
Keynote - Securing Our Cyberspace Together
Fireside Chat: Jeff Moss and Ruimin He
LinkDoor: A Hidden Attack Surface in the Android Netlink Kernel Modules
Emerging Frontiers: Insights from the Black Hat Asia Review Board
What the TrustZone-M Doesn't See, the MCU Does Grieve Over: Lessons Learned
The Hack@DAC Story: Learnings from Organizing the World's Largest Hardware Hacking Competition
Privacy Detective: Sniffing Out Your Data Leaks for Android
Debug7: Leveraging a Firmware Modification Attack for Remote Debugging of Siemens S7 PLCs
The Final Chapter: Unlimited ways to bypass your macOS privacy mechanisms
One Flip is All It Takes: Identifying Syscall-Guard Variables for Data-Only Attacks
Faults in Our Bus: Novel Bus Fault Attack to Break Trusted Execution Environments
You Shall Not PASS - Analysing a NSO iOS Spyware Sample
Unpacking the Packed Unpacker: Reverse Engineering an Android Anti-Analysis Native Library
Chain of Fools: An Exploration of Certificate Chain Validation Mishaps
Towards a Policy-Agnostic Control-Flow Integrity Implementation
Memory Forensics Using Virtual Machine Introspection for Cloud Computing
return-to-csu: A New Method to Bypass 64-bit Linux ASLR
XOM-switch: Hiding Your Code from Advanced Code Reuse Attacks In One Shot
From Hackathon to Hacked: Web3's Security Journey
Black Hat USA 2001 - Computer Forensics: A Critical Process in Your Incident Response Plan
Keynote: Embedding a Human-Centric Approach Into a Global Cyber Security Program
GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs
My Invisible Adversary: Burnout
How Embedded TCP/IP Stacks Breed Critical Vulnerabilities
Attacking The XNU Kernel In El Capitain
Black Hat USA 2005 - Legal Aspects of Computer Network Defense
Red Vs. Blue: Modern Active Directory Attacks, Detection, And Protection
ALPACA: Application Layer Protocol Confusion - Analyzing and Mitigating Cracks in TLS Authentication
Pulling Back the Curtain on Airport Security: Can a Weapon Get Past TSA?
Scavenger: Misuse Error Handling Leading to Qemu/KVM Escape
Pre-Stuxnet, Post-Stuxnet: Everything Has Changed, Nothing Has Changed
TrustKit: Code Injection on iOS 8 for the Greater Good
Three New Attacks Against JSON Web Tokens
Booting the iOS Kernel to an Interactive Bash Shell on QEMU
Vulnerability Exploitation In Docker Container Environments
Routopsy: Modern Routing Protocol Vulnerability Analysis and Exploitation
HostSplit: Exploitable Antipatterns in Unicode Normalization
802.1x and Beyond!
A Journey From JNDI/LDAP Manipulation to Remote Code Execution Dream Land
Certified Pre-Owned: Abusing Active Directory Certificate Services
AAD Joined Machines - The New Lateral Movement
Hello From the Other Side: SSH Over Robust Cache Covert Channels in the Cloud
Breaking the IIoT: Hacking industrial Control Gateways
A Journey Into Fuzzing WebAssembly Virtual Machines
Analyzing & Breaking QNX Exploit Mitigations and PRNGs For Embedded Systems
Tackling Privilege Escalation with Offense and Defense
SVG: Exploiting Browsers without Image Parsing Bugs
Fuzzing the Native NTFS Read-Write Driver (NTFS3) in the Linux Kernel
Google Reimagined a Phone. It was Our Job to Red Team and Secure it.
"Man-in-the-SCADA:" Anatomy of Data Integrity Attacks in Industrial Control Systems
PeriScope: An Effective Probing and Fuzzing Framework for the Hardware-OS Boundary
Gyrophone: Eavesdropping Using a Gyroscope
Internal Server Error: Exploiting Inter-Process Communication in SAP's HTTP Server
Access Keys Will Kill You Before You Kill the Password
The Origin of Array [@@species]: How Standards Drive Bugs in Script Engines
Implementing the Lessons Learned From a Major Cyber Attack
Black Hat USA 2003 - Digital Information, User Tokens, Privacy & Forensics Investigations
Attacking SDN Infrastructure: Are We Ready for the Next-Gen Networking?
A Fully Trained Jedi, You Are Not
Black Hat USA 2013 - Evading deep inspection for fun and shell
Black Hat USA 2012 - Libinjection: A C Library for SQLI Det. & Gen. Through Lexical Analysis
Breaking Theoretical Limits: The Gap Between Virtual NICs and Physical Network Cards