Black Hat Asia 2021
4.55 GB
Filelist:
PDF
Bai Zhang Hey You Get Off My Private Data Do Apps Respect Your Privacy As They Claim.pdf
Bassat Alarm Disarm Remotely Exploiting and Disarming Popular Physical Security System.pdf
Bergin Anti Forensics Reverse Engineering A Leading Phone Forensic Tool.pdf
Brizendine Babcock Prebuilt Jop Chains With The Jop Rocket-wp.pdf
Brizendine Babcock Prebuilt Jop Chains With The Jop Rocket.pdf
Canella Enter Sandbox wp.pdf
Canella Enter Sandbox.pdf
Chen-A-General-Approach-To-Bypassing-Many-Kernel-Protections-And-Its-Mitigation.pdf
Cocomazzi-The-Rise-of-Potatoes-Privilege-Escalations-in-Windows-Services.pdf
Devonshire-Vibe-check-IDK-about-this.pdf
Ding-Domain-Borrowing-Catch-My-C2-Traffic-If-You-Can.pdf
dosSantos-The-Cost-of-Complexity-Different-Vulnerabilities-While-Implementing-the-Same-RFC-wp.pdf
dosSantos-The-Cost-of-Complexity-Different-Vulnerabilities-While-Implementing-the-Same-RFC.pdf
Fan-The-Price-Of-Compatibility-Defeating-MacOS-Kernel-Using-Extended-File-Attributes.pdf
Hernandez-A-Walk-Through-Historical-Correlations-Between-Security-Issues-And-Stock-Prices.pdf
Hunting-Vulnerabilities-of-Grpc-Protocol-Armed-Mobileiot-Applications.pdf
In-Depth-Analyzing-Fuzzing-Qualcomm-Hexagon-Processor.pdf
Johnson-Unprotected-Broadcasts-In-Android-9-and-10-wp.pdf
Johnson-Unprotected-Broadcasts-In-Android-9-and-10.pdf
Khanna-Threat-Hunting-In-Active-Directory-Environment.pdf
Kuo-We-Are-About-To-Land-How-CloudDragon-Turns-A-Nightmare-Into-Reality.pdf
Liu-Disappeared-Coins-Steal-Hashrate-In-Stratum-Secretly.pdf
Nassi-The-Motion-Sensor-Western.pdf
Pan-Scavenger-Misuse-Error-Handling-Leading-To-QEMU-KVM-Escape.pdf
PaPa-Ziegler-Hiding-Objects-From-Computer-Vision-By-Exploiting-Correlation-Biases.pdf
Qin-The-Tangled-WebView-JavascriptInterface-Once-More.pdf
Shi-Mining-And-Exploiting-Mobile-Payment-Credential-Leaks-In-The-Wild-wp.pdf
Shi-Mining-And-Exploiting-Mobile-Payment-Credential-Leaks-In-The-Wild.pdf
Shostack-Reverse-Engineering-Compliance.pdf
Shostack-The-B-MAD-Approach-To-Threat-Modeling.pdf
Taniguchi-How-Did-The-Adversaries-Abusing-The-Bitcoin-Blockchain-Evade-Our-Takeover.pdf
Tseng-Mem2Img-Memory-Resident-Malware-Detection-via-Convolution-Neural-Network.pdf
Tychalas-Stuxnet-In-A-Box-In-Field-Emulation-and-Fuzzing.pdf
Wang-Racing-The-Dark-A-New-Tocttou-Story-From-Apples-Core.pdf
Wu-Apple-Neural_Engine.pdf
Wu-X-In-The-Middle-Attacking-Fast-Charging-Piles-And-Electric-Vehicles.pdf
Xie-New-Attack-Surface-In-Safari-Use-Just-One-WebAudio-Vulnerability-To-Rule-Safari-wp.pdf
Xie-New-Attack-Surface-In-Safari-Use-Just-One-WebAudio-Vulnerability-To-Rule-Safari.pdf
Yan-Give-Me-a-Sql-Injection-I-Shall-Pwn-IIS-and-Sql-Server.pdf
Yuan-How-I-Can-Unlock-Your-Smart-Door-Security-Pitfalls-In-Cross-Vendor-IoT-Access-Control.pdf
Zeng-A-New-Era-Of-One-Click.pdf
Zhang-A-Mirage-Of-Safety-Bug-Finding-And-Exploit-Techniques-Of-Top-Android-Vendors-Privacy-Protection-Apps.pdf
Zhao-Wideshears-Investigating-And-Breaking-Widevine-On-QTEE-wp.pdf
Zhao-Wideshears-Investigating-And-Breaking-Widevine-On-QTEE.pdf
Videos
1. BitLeaker- Subverting BitLocker with One Vulnerability.mp4
2. Complexity Killed Security.mp4
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation.mp4
4. The Black Hat NOC- Greatest Hits and Holy…Cows.mp4
5. Escaping Virtualized Containers.mp4
6. Patching Loopholes- Finding Backdoors in Applications.mp4
7. What the Log-! So Many Events, so Little Time.mp4
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2.mp4
9. Misuse of DNS, the Second Most Used Protocol.mp4
10. Faking a Factory- Creating and Operating a Realistic Honeypot.mp4
11. Raiden Glitching Framework.mp4
12. First Contact – Vulnerabilities in Contactless Payments.mp4
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services.mp4
14. The Evil of Spy Camera.mp4
15. Walking Your Dog in Multiple Forests – Breaking AD Trust Boundaries through Kerberos Vulnerabilities.mp4
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days.mp4
17. WIFI-Important Remote Attack Surface- Threat is Expanding.mp4
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp-.mp4
19. Attacking and Defending Machine Learning Applications of Public Cloud.mp4
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale.mp4
21. Redback- Advanced Static Binary Injection.mp4
22. Store-to-Leak Forwarding- There and Back Again.mp4
23. ZombieLoad- Leaking Data on Intel CPUs.mp4
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G.mp4
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device.mp4
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware.mp4
27. Wi-Fi Brokering.mp4
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments.mp4
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices.mp4
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet.mp4
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature.mp4
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community.mp4
33. Demystify Today’s Binary Disassembling and How Modern ABI Makes it Easier.mp4
34. Win the 0-Day Racing Game Against Botnet in Public Cloud.mp4
35. Tracking the Criminal of Fake News Based on a Unified Embedding.mp4
36. The Inside Story- There are Apps in Apps and Here is How to Break Them.mp4
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful.mp4
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation.mp4
39. Locknote- Conclusions and Key Takeaways from Day 1.mp4
40. Locknote- Conclusions and Key Takeaways from Day 2.mp4
Reviews
There are no reviews yet.