Download link
File List
-
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation [ zerodaylab.us ].mp4 244.25 MB
2. Complexity Killed Security [ zerodaylab.us ].mp4 121.99 MB
1. BitLeaker- Subverting BitLocker with One Vulnerability [ zerodaylab.us ].mp4 130.47 MB
4. The Black Hat NOC- Greatest Hits and Holy...Cows [ zerodaylab.us ].mp4 119.42 MB
5. Escaping Virtualized Containers [ zerodaylab.us ].mp4 98.17 MB
6 Simple Memory Techniques.html 98 B
6. Patching Loopholes- Finding Backdoors in Applications [ zerodaylab.us ].mp4 46.21 MB
7. What the Log-! So Many Events, so Little Time [ zerodaylab.us ].mp4 159.39 MB
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2 [ zerodaylab.us ].mp4 72.85 MB
9. Misuse of DNS, the Second Most Used Protocol [ zerodaylab.us ].mp4 85.27 MB
10. Faking a Factory- Creating and Operating a Realistic Honeypot [ zerodaylab.us ].mp4 83.94 MB
11. Raiden Glitching Framework [ zerodaylab.us ].mp4 97.33 MB
12. First Contact - Vulnerabilities in Contactless Payments [ zerodaylab.us ].mp4 93.31 MB
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services [ zerodaylab.us ].mp4 123.87 MB
14. The Evil of Spy Camera [ zerodaylab.us ].mp4 94.24 MB
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities [ zerodaylab.us ].mp4 216.9 MB
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days [ zerodaylab.us ].mp4 111.5 MB
17. WIFI-Important Remote Attack Surface- Threat is Expanding [ zerodaylab.us ].mp4 64.25 MB
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp- [ zerodaylab.us ].mp4 151.65 MB
40. Locknote- Conclusions and Key Takeaways from Day 2 [ zerodaylab.us ].mp4 219.62 MB
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale [ zerodaylab.us ].mp4 85.1 MB
21. Redback- Advanced Static Binary Injection [ zerodaylab.us ].mp4 93.5 MB
22. Store-to-Leak Forwarding- There and Back Again [ zerodaylab.us ].mp4 135.38 MB
23. ZombieLoad- Leaking Data on Intel CPUs [ zerodaylab.us ].mp4 98.67 MB
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G [ zerodaylab.us ].mp4 119.52 MB
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device [ zerodaylab.us ].mp4 79.29 MB
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware [ zerodaylab.us ].mp4 125.74 MB
27. Wi-Fi Brokering [ zerodaylab.us ].mp4 91.72 MB
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments [ zerodaylab.us ].mp4 69.87 MB
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices [ zerodaylab.us ].mp4 101.52 MB
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet [ zerodaylab.us ].mp4 97.45 MB
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature [ zerodaylab.us ].mp4 104.95 MB
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community [ zerodaylab.us ].mp4 116.54 MB
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier [ zerodaylab.us ].mp4 59.17 MB
34. Win the 0-Day Racing Game Against Botnet in Public Cloud [ zerodaylab.us ].mp4 54.99 MB
35. Tracking the Criminal of Fake News Based on a Unified Embedding [ zerodaylab.us ].mp4 54.77 MB
36. The Inside Story- There are Apps in Apps and Here is How to Break Them [ zerodaylab.us ].mp4 55.79 MB
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful [ zerodaylab.us ].mp4 169.97 MB
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation [ zerodaylab.us ].mp4 87.35 MB
39. Locknote- Conclusions and Key Takeaways from Day 1 [ zerodaylab.us ].mp4 158.53 MB
19. Attacking and Defending Machine Learning Applications of Public Cloud [ zerodaylab.us ].mp4 51.11 MB
Download Info
-
Tips
“Black Hat Asia 2021 Videos” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.