资源详情

返回首页 | 相关搜索
Black Hat Asia 2021 Videos
大小 4.24 GB
文件数 40
Info Hash: 21F2BF0C0A89F94D1FAF4558022B365C3275A3AC
收录时间 2025-12-26 17:10:19
更新时间 2025-12-28 12:31:20
文件列表 (40)
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation.mp4
244.25 MB
2. Complexity Killed Security.mp4
121.99 MB
1. BitLeaker- Subverting BitLocker with One Vulnerability.mp4
130.47 MB
4. The Black Hat NOC- Greatest Hits and Holy...Cows.mp4
119.42 MB
5. Escaping Virtualized Containers.mp4
98.17 MB
6. Patching Loopholes- Finding Backdoors in Applications.mp4
46.21 MB
7. What the Log-! So Many Events, so Little Time.mp4
159.39 MB
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2.mp4
72.85 MB
9. Misuse of DNS, the Second Most Used Protocol.mp4
85.27 MB
10. Faking a Factory- Creating and Operating a Realistic Honeypot.mp4
83.94 MB
11. Raiden Glitching Framework.mp4
97.33 MB
12. First Contact - Vulnerabilities in Contactless Payments.mp4
93.31 MB
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services.mp4
123.87 MB
14. The Evil of Spy Camera.mp4
94.24 MB
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4
216.9 MB
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4
111.5 MB
17. WIFI-Important Remote Attack Surface- Threat is Expanding.mp4
64.25 MB
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp-.mp4
151.65 MB
19. Attacking and Defending Machine Learning Applications of Public Cloud.mp4
51.11 MB
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4
85.1 MB
21. Redback- Advanced Static Binary Injection.mp4
93.5 MB
22. Store-to-Leak Forwarding- There and Back Again.mp4
135.38 MB
23. ZombieLoad- Leaking Data on Intel CPUs.mp4
98.67 MB
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4
119.52 MB
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device.mp4
79.29 MB
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware.mp4
125.74 MB
27. Wi-Fi Brokering.mp4
91.72 MB
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments.mp4
69.87 MB
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices.mp4
101.52 MB
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet.mp4
97.45 MB
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature.mp4
104.95 MB
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4
116.54 MB
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier.mp4
59.17 MB
34. Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4
54.99 MB
35. Tracking the Criminal of Fake News Based on a Unified Embedding.mp4
54.77 MB
36. The Inside Story- There are Apps in Apps and Here is How to Break Them.mp4
55.79 MB
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful.mp4
169.97 MB
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4
87.35 MB
39. Locknote- Conclusions and Key Takeaways from Day 1.mp4
158.53 MB
40. Locknote- Conclusions and Key Takeaways from Day 2.mp4
219.62 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。