View
Tube
search
Sign in
Sign up
Subscriptions
Black Hat
Black Hat USA 2019
67,059 views
118 items
Last updated on Apr 23, 2020
public playlist
Black Hat
47:36
Ghidra - Journey from Classified NSA Tool to Open Source
Black Hat
52:46
DevSecOps : What, Why and How
Black Hat
1:04:10
Black Hat USA 2019 Keynote: Every Security Team is a Software Team Now by Dino Dai Zovi
Black Hat
44:29
Behind the scenes of iOS and Mac Security
Black Hat
22:34
Reverse Engineering WhatsApp Encryption for Chat Manipulation and More
Black Hat
39:18
Selling 0-Days to Governments and Offensive Security Companies
Black Hat
48:31
Process Injection Techniques - Gotta Catch Them All
Black Hat
50:23
Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD)
Black Hat
20:08
Detecting Malicious Files with YARA Rules as They Traverse the Network
Black Hat
47:52
MITRE ATT&CK: The Play at Home Edition
Black Hat
26:28
WebAuthn 101 - Demystifying WebAuthn
Black Hat
21:57
GDPArrrrr: Using Privacy Laws to Steal Identities
Black Hat
45:14
Inside the Apple T2
Black Hat
46:57
Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities
Black Hat
26:28
Death to the IOC: What's Next in Threat Intelligence
Black Hat
48:06
The Path Less Traveled: Abusing Kubernetes Defaults
Black Hat
43:36
New Vulnerabilities in 5G Networks
Black Hat
43:18
Breaking Samsung's ARM TrustZone
Black Hat
43:18
Breaking Samsung's ARM TrustZone
Black Hat
45:57
Infiltrating Corporate Intranet Like NSA - Pre-auth RCE on Leading SSL VPNs
Black Hat
47:49
Securing the System: A Deep Dive into Reversing Android Pre-Installed Apps
Black Hat
25:23
Biometric Authentication Under Threat: Liveness Detection Hacking
Black Hat
50:37
Practical Approach to Automate the Discovery & Eradication of Open-Source Software Vulnerabilities
Black Hat
50:48
The Enemy Within: Modern Supply Chain Attacks
Black Hat
43:10
A Compendium of Container Escapes
Black Hat
44:05
Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover
Black Hat
39:24
Backdooring Hardware Devices by Injecting Malicious Payloads on Microcontrollers
Black Hat
22:16
Woke Hiring Won't Save Us: An Actionable Approach to Diversity Hiring and Retention
Black Hat
50:46
Automation Techniques in C++ Reverse Engineering
Black Hat
48:56
Command Injection in F5 iRules
Black Hat
24:49
Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing
Black Hat
34:38
Attacking iPhone XS Max
Black Hat
50:51
Shifting Knowledge Left: Keeping up with Modern Application Security
Black Hat
43:47
Rogue7: Rogue Engineering-Station Attacks on S7 Simatic PLCs
Black Hat
44:04
Breaking Encrypted Databases: Generic Attacks on Range Queries
Black Hat
50:13
Exploiting the Hyper-V IDE Emulator to Escape the Virtual Machine
Black Hat
46:30
Infighting Among Russian Security Services in the Cyber Sphere
Black Hat
40:24
Fantastic Red-Team Attacks and How to Find Them
Black Hat
45:27
The Discovery of a Government Malware and an Unexpected Spy Scandal
Black Hat
52:59
Behind the Scenes of Intel Security and Manageability Engine
Black Hat
37:27
Preventing Authentication Bypass: A Tale of Two Researchers
Black Hat
44:01
Cyber Insurance 101 for CISO’s
Black Hat
51:09
Messaging Layer Security: Towards a New Era of Secure Group Messaging
Black Hat
42:47
The Most Secure Browser? Pwning Chrome from 2016 to 2019
Black Hat
42:12
Look, No Hands! -- The Remote, Interaction-less Attack Surface of the iPhone
Black Hat
50:31
Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project
Black Hat
49:45
PicoDMA: DMA Attacks at Your Fingertips
Black Hat
52:49
Project Zero: Five Years of 'Make 0Day Hard'
Black Hat
47:24
Dragonblood: Attacking the Dragonfly Handshake of WPA3
Black Hat
48:14
Everybody be Cool, This is a Robbery!
Black Hat
44:56
Exploiting Qualcomm WLAN and Modem Over The Air
Black Hat
44:56
Exploiting Qualcomm WLAN and Modem Over The Air
Black Hat
54:12
Adventures in the Underland: The CQForensic Toolkit as a Unique Weapon Against Hackers
Black Hat
50:30
0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars
Black Hat
49:29
All the 4G Modules Could be Hacked
Black Hat
57:01
How Do Cyber Insurers View The World?
Black Hat
44:44
Finding Our Path: How We're Trying to Improve Active Directory Security
Black Hat
45:56
Chip.Fail - Glitching the Silicon of the Connected World
Black Hat
50:05
HTTP Desync Attacks: Smashing into the Cell Next Door
Black Hat
49:12
Breaking Through Another Side: Bypassing Firmware Security Boundaries from Embedded Controller
Black Hat
47:26
How to Detect that Your Domains are Being Abused for Phishing by Using DNS
Black Hat
48:54
Responding to a Cyber Attack with Missiles
Black Hat
48:12
Moving from Hacking IoT Gadgets to Breaking into One of Europe's Highest Hotel Suites
Black Hat
50:23
Selling 0-Days to Governments and Offensive Security Companies
Black Hat
33:30
Towards Discovering Remote Code Execution Vulnerabilities in Apple FaceTime
Black Hat
54:06
Controlled Chaos: The Inevitable Marriage of DevOps & Security
Black Hat
40:18
HostSplit: Exploitable Antipatterns in Unicode Normalization
Black Hat
33:04
API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web
Black Hat
53:39
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Black Hat
53:39
Lessons and Lulz: The 5th Annual Black Hat USA NOC Report
Black Hat
47:48
Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware
Black Hat
48:55
Paging All Windows Geeks – Finding Evil in Windows 10 Compressed Memory
Black Hat
43:21
Women in Security: Building a Female InfoSec Community in Korea, Japan, and Taiwan
Black Hat
45:50
Lessons From Two Years of Crypto Audits
Black Hat
26:58
Monsters in the Middleboxes: Building Tools for Detecting HTTPS Interception
Black Hat
45:22
Internet-Scale Analysis of AWS Cognito Security
Black Hat
43:41
Critical Zero Days Remotely Compromise the Most Popular Real-Time OS
Black Hat
39:47
All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices
Black Hat
36:17
Defense Against Rapidly Morphing DDOS
Black Hat
49:22
He Said, She Said – Poisoned RDP Offense and Defense
Black Hat
24:35
MINimum Failure - Stealing Bitcoins with Electromagnetic Fault Injection
Black Hat
46:52
Exploring the New World : Remote Exploitation of SQLite and Curl
Black Hat
50:35
Arm IDA and Cross Check: Reversing the Boeing 787's Core Network
Black Hat
25:00
ClickOnce and You're in - When Appref-ms Abuse is Operating as Intended
Black Hat
25:45
Legal GNSS Spoofing and its Effects on Autonomous Vehicles
Black Hat
29:46
Transparency in the Software Supply Chain: Making SBOM a Reality
Black Hat
25:20
Testing Your Organization's Social Media Awareness
Black Hat
51:52
Making Big Things Better The Dead Cow Way
Black Hat
43:00
Debug for Bug: Crack and Hack Apple Core by Itself
Black Hat
50:48
Playing Offense and Defense with Deepfakes
Black Hat
37:45
Managing for Success: Maintaining a Healthy Bug Bounty Program Long Term
Black Hat
25:59
Cybersecurity Risk Assessment for Safety-Critical Systems
Black Hat
44:04
Breaking Encrypted Databases: Generic Attacks on Range Queries
Black Hat
24:06
A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works
Black Hat
51:27
Firmware Cartography: Charting the Course for Modern Server Compromise
Black Hat
43:13
Hunting for Bugs, Catching Dragons
Black Hat
21:16
On Trust: Stories from the Front Lines
Black Hat
25:38
The Future of Securing Intelligent Electronic Devices Using the IEC 62351-7 Standard for Monitoring
Black Hat
51:07
The Future of ATO
Black Hat
53:29
Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months