Parent directory/ | - | - |
BlackHat 2013 - Combating the Insider Threat at the FBI - Real-world Lessons Learned.mp4 | 92.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - With BIGDATA comes BIG responsibility - Practical exploiting of MDX injections.mp4 | 69.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Virtual Deobfuscator - A DARPA Cyber Fast Track Funded Effort.mp4 | 55.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - What s on the Wire - Physical Layer Tapping with Project Daisho.mp4 | 88.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Welcome & Introduction to Black Hat USA 2013.mp4 | 84.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Universal DDoS Mitigation Bypass.mp4 | 86.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Truncating TLS Connections to Violate Beliefs in Web Applications.mp4 | 39.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Using Online Activity as Digital DNA to Create a Better Spear Phisher.mp4 | 78.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - UART THOU MAD.mp4 | 82.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - TOR... ALL-THE-THINGS.mp4 | 39.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - TLS - SECRETS.mp4 | 84.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Tribute to Barnaby Jack.mp4 | 13.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Untwining Twine.mp4 | 35.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Stepping p3wns - Adventures in Full Spectrum Embedded Exploitation.mp4 | 88.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - The Outer Limits - Hacking The Samsung Smart TV.mp4 | 92.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - The Factoring Dead - Preparing for Cyptopocalypse.mp4 | 84.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Teridian SoC Exploitation - Exploration of Harvard Architecture Smart Grid Systems.mp4 | 87.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - The Web IS Vulnerable - XSS Defense on the BattleFront.mp4 | 42.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - The SCADA That Didn't Cry Wolf - Who s Really Attacking Your ICS Devices - 2 2.mp4 | 83.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Spy-jacking the Booters.mp4 | 89.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Revealing Embedded Fingerprints - Deriving intelligence from USB stack interactions.mp4 | 72.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Rooting SIM cards.mp4 | 56.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - RFID Hacking - Live Free or RFID Hard.mp4 | 94.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Shattering Illusions in Lock-Free Worlds - Compiler Hardware Behaviors in OS and VMs.mp4 | 28.7 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Smashing the Font Scaler Engine in Windows Kernel.mp4 | 71.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - SSL, Gone in 30 Seconds - A BREACH beyond CRIME.mp4 | 86.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Password Hashing - The Future is Now.mp4 | 37.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Post Exploitation Operations with Cloud Synchronization.mp4 | 88.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - PWNIE AWARDS.mp4 | 62.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.mp4 | 75.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Predicting Susceptibility to Socialbots on Twitter.mp4 | 94.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Power Analysis Attacks for Cheapskates.mp4 | 93.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Pass the Hash and other credential theft and reuse - Preventing Lateral Movement.mp4 | 61.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - New Trends in FastFlux Networks.mp4 | 34.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Owning the Routing Table - Part II.mp4 | 63.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Multiplexed Wired Attack Surfaces.mp4 | 96.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Out of Control - Demonstrating SCADA Device Exploitation.mp4 | 57.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - OPSEC Failures of Spies.mp4 | 39.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - OptiROP - The Art of Hunting ROP Gadgets.mp4 | 103.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Pass-the-Hash 2 - The Admin's Revenge.mp4 | 76.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Mobile Malware - Why the Traditional AV Paradigm is Doomed.mp4 | 39.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Million Browser Botnet.mp4 | 75.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Mainframes - The Past Will Come to Haunt You.mp4 | 91.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Maltego Tungsten As a Collaborative Attack Platform.mp4 | 108.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Malicious File for Exploiting Forensic Software.mp4 | 34.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Mactans - Injecting Malware Into iOS Devices via Malicious Chargers.mp4 | 76.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Legal Considerations for Cellular Research.mp4 | 37.7 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Javascript Static Security Analysis Made Easy with JSPrime.mp4 | 93.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Just-In-Time Code Reuse - The More Things Change, the More They Stay the Same.mp4 | 85.7 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Java Every-Days - Exploiting Software Running on Three Billion Devices.mp4 | 79.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Keynote - Gen. Alexander.mp4 | 58.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Let s Get Physical - Breaking Home Security Systems and Bypassing Building Controls.mp4 | 77.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Lawful Access Panel.mp4 | 91.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - I Can Hear You Now - Traffic Interception and Remote Mobile Phone Cloning....mp4 | 70.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - How to grow a TREE (Taint-Enabled Reverse Engineering Environment) from a CBASS.mp4 | 83.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Hot Knives Through Butter - Bypassing Automated Analysis Systems.mp4 | 49.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Home Invasion v2.0 - Attacking Network-Controlled Hardware.mp4 | 82.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Honey, I m Home - Hacking Z-Wave Home Automation Systems.mp4 | 87.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - How to Build a SpyPhone.mp4 | 70.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Hunting the Shadows - In-Depth Analysis of Escalated APT Attacks.mp4 | 89.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Hacking, Surveilling, and Deceiving victims on Smart TV.mp4 | 57.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Fact and Fiction - Defending Medical Device.mp4 | 73.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Fully Arbitrary 802.3 Packet Injection - Maximizing Ethernet Attack Surface.mp4 | 81.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Hiding @ Depth - Exploring, Subverting, and Breaking NAND Flash Memory.mp4 | 50.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker.mp4 | 52.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Funderbolt - Adventures in Thunderbolt DMA Attacks.mp4 | 88.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Hacking Like in the Movies - Visualizing Page Tables for Local Exploitation.mp4 | 86.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Energy Fraud and Orchestrated Blackouts - Issues with Wireless Metering Protocols.mp4 | 67.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Detecting Vulnerabilities in Virtual Devices with Conformance Testing.mp4 | 29.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Dissecting CSRF Attacks and Countermeasures.mp4 | 72.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Evading Deep Inspection for Fun and Shell.mp4 | 69.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Defending Networks With Incomplete Information - A Machine Learning Approach.mp4 | 87.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Denying Service to DDoS Protection Services.mp4 | 37.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Denial of Service as a Service - Asymmetrical Warfare at its Finest.mp4 | 25.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - End-to-end Analysis of Domain Generating Algorithm Malware Family.mp4 | 82.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - CrowdSource - Open Source Crowd Trained Machine Learning Model for Malware Detection.mp4 | 43.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Buying into the Bias - Why Vulnerability Statistics Suck.mp4 | 88.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Clickjacking Revisted - A Perceptual View of UI Security.mp4 | 35.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - CreepyDOL - Cheap, Distributed Stalking.mp4 | 84.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Compromising Industrial Facilities from 40 Miles Away.mp4 | 67.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Bochspwn - Identifying 0-Days via System-Wide Memory Access Pattern Analysis.mp4 | 87.8 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - CMX - IEEE Clean File Metadata Exchange.mp4 | 41.3 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - BlackberryOS 10 From a Security Perspective.mp4 | 79.6 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Big Data for Web Application Security.mp4 | 31.7 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Beyond the Application - Cellular Privacy Regulatory Space.mp4 | 30.0 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - BIOS Security.mp4 | 90.9 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Android - One Root to Own them All.mp4 | 93.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Black-box Assessment of Pseudorandom Algorithms.mp4 | 81.7 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - BinaryPig - Scalable Malware Analytics in Hadoop.mp4 | 75.2 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - A Tale of One Software Bypass of Windows 8 Secure Boot.mp4 | 76.1 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Abusing Web APIs Through Scripted Android Applications.mp4 | 46.5 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - Above My Pay Grade - Cyber Response at the National Level.mp4 | 87.4 MiB | 2021 Mar 30 11:21 |
Black Hat 2013 - UART THOU MAD.srt | 68.6 KiB | 2019 Oct 01 07:24 |
Black Hat 2013 - SSL, Gone in 30 Seconds - A BREACH beyond CRIME.srt | 84.9 KiB | 2019 Oct 01 07:23 |
Black Hat 2013 - How CVSS is DOSsing Your Patching Policy (and wasting your money).srt | 76.0 KiB | 2019 Oct 01 07:23 |
Black Hat 2013 - Java Every-Days - Exploiting Software Running on Three Billion Devices.srt | 86.3 KiB | 2019 Sep 30 16:24 |
Black Hat 2013 - Press ROOT to Continue - Detecting OSX and Windows Bootkits with RDFU.srt | 70.3 KiB | 2019 Sep 30 16:24 |
Black Hat 2013 - Bluetooth Smart - The Good, the Bad, the Ugly, and the Fix.srt | 57.5 KiB | 2019 Sep 30 16:23 |