File List
-
Day Zero/Day Zero.mp4 2.75 GB
Pwnie Awards/Pwnie Awards.mp4 1.74 GB
Community/Legal Landmines - How Law and Policy are Rapidly Shaping Information Security.mp4 1.61 GB
Community/The Science of Hiring and Retaining Female Cybersecurity Engineers.mp4 1.6 GB
Community/Mental Health Hacks - Fighting Burnout Depression and Suicide in the Hacker Community.mp4 1.56 GB
Malware/Decompiler Internals - Microcode.mp4 1.55 GB
Reverse Engineering/Decompiler Internals - Microcode.mp4 1.55 GB
Platform Security/Why so Spurious - How a Highly Error-Prone x86 x64 CPU Feature can be Abused.mp4 1.51 GB
Security Development Lifecycle/SDL for the Rest of Us - Getting Started with Software Security.mp4 1.5 GB
Malware/Windows Offender - Reverse Engineering Windows Defenders Antivirus Emulator.mp4 1.49 GB
Reverse Engineering/Windows Offender - Reverse Engineering Windows Defenders Antivirus Emulator.mp4 1.49 GB
Cryptography/WireGuard - Next Generation Secure Network Tunnel.mp4 1.49 GB
Network Defense/WireGuard - Next Generation Secure Network Tunnel.mp4 1.49 GB
Applied Security/Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies.mp4 1.43 GB
Enterprise/From Workstation to Domain Admin - Why Secure Administration isn't Secure and How to Fix it.mp4 1.38 GB
Network Defense/From Workstation to Domain Admin - Why Secure Administration isnt Secure and How to Fix it.mp4 1.38 GB
Enterprise/Remotely Attacking System Firmware.mp4 1.37 GB
Platform Security/Remotely Attacking System Firmware.mp4 1.37 GB
Human Factors/AI and ML in Cyber Security - Why Algorithms are Dangerous.mp4 1.37 GB
Exploit Development/DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4 1.37 GB
Malware/DeepLocker - Concealing Targeted Attacks with AI Locksmithing.mp4 1.37 GB
Smart Grid/Deep Dive into an ICS Firewall Looking for the Fire Hole.mp4 1.36 GB
Exploit Development/From Thousands of Hours to a Couple of Minutes - Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities.mp4 1.36 GB
Network Defense/ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4 1.34 GB
Platform Security/ZEROing Trust - Do Zero Trust Approaches Deliver Real Security.mp4 1.34 GB
Exploit Development/Attacking Client-Side JIT Compilers.mp4 1.34 GB
Reverse Engineering/Attacking Client-Side JIT Compilers.mp4 1.34 GB
Exploit Development/KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4 1.34 GB
Mobile/KeenLab iOS Jailbreak Internals - Userland Read-Only Memory can be Dangerous.mp4 1.34 GB
Internet of Things/Snooping on Cellular Gateways and Their Critical Role in ICS.mp4 1.34 GB
Malware/Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4 1.33 GB
Mobile/Stealth Mango and the Prevalence of Mobile Surveillanceware.mp4 1.33 GB
Mobile/LTE Network Automation Under Threat.mp4 1.33 GB
Network Defense/LTE Network Automation Under Threat.mp4 1.33 GB
Internet of Things/Legal Liability for IOT Cybersecurity Vulnerabilities.mp4 1.31 GB
Network Defense/Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4 1.28 GB
Platform Security/Detecting Malicious Cloud Account Behavior - A Look at the New Native Platform Capabilities.mp4 1.28 GB
Platform Security/The Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4 1.28 GB
Reverse Engineering/The Windows Notification Facility - Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet.mp4 1.28 GB
Hardware Embedded/Last Call for SATCOM Security.mp4 1.27 GB
Reverse Engineering/Last Call for SATCOM Security.mp4 1.27 GB
Hardware Embedded/Understanding and Exploiting Implanted Medical Devices.mp4 1.27 GB
Internet of Things/Understanding and Exploiting Implanted Medical Devices.mp4 1.27 GB
Network Defense/The Finest Penetration Testing Framework for Software-Defined Networks.mp4 1.27 GB
Platform Security/WebAssembly - A New World of Native Exploits on the Browser.mp4 1.26 GB
Applied Security/So I became a Domain Controller.mp4 1.25 GB
Enterprise/So I became a Domain Controller.mp4 1.25 GB
Cryptography/Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4 1.24 GB
Hardware Embedded/Screaming Channels - When Electromagnetic Side Channels Meet Radio Transceivers.mp4 1.24 GB
Internet of Things/Outsmarting the Smart City.mp4 1.24 GB
Enterprise/Open Sesame - Picking Locks with Cortana.mp4 1.24 GB
Network Defense/Open Sesame - Picking Locks with Cortana.mp4 1.24 GB
Platform Security/A Dive in to Hyper-V Architecture snd Vulnerabilities.mp4 1.23 GB
Reverse Engineering/A Dive in to Hyper-V Architecture anf Vulnerabilities.mp4 1.23 GB
Community/Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4 1.23 GB
Human Factors/Stress and Hacking - Understanding Cognitive Stress in Tactical Cyber Ops.mp4 1.23 GB
Enterprise/Deep Neural Networks for Hackers - Methods Applications and Open Source Tools.mp4 1.22 GB
Malware/Deep Neural Networks for Hackers - Methods Applications and Open Source Tools.mp4 1.22 GB
Exploit Development/Its a PHP Unserialization Vulnerability Jim but Not as We Know It.mp4 1.21 GB
Enterprise/A Deep Dive into macOS MDM and How it can be Compromised.mp4 1.21 GB
Platform Security/A Deep Dive into macOS MDM and How it can be Compromised.mp4 1.21 GB
Applied Security/Follow the White Rabbit - Simplifying Fuzz Testing Using FuzzExMachina.mp4 1.21 GB
Malware/No Royal Road - Notes on Dangerous Game.mp4 1.21 GB
Human Factors/Catch me Yes we can - Pwning Social Engineers using Natural Language Processing Techniques in Real-Time.mp4 1.2 GB
Exploit Development/Exploitation of a Modern Smartphone Baseband.mp4 1.19 GB
Mobile/Exploitation of a Modern Smartphone Baseband.mp4 1.19 GB
Applied Security/Applied Self-Driving Car Security.mp4 1.19 GB
Cryptography/Efail - Breaking SMIME and OpenPGP Email Encryption using Exfiltration Channels.mp4 1.17 GB
Malware/Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4 1.16 GB
Network Defense/Subverting Sysmon - Application of a Formalized Security Product Evasion Methodology.mp4 1.16 GB
Human Factors/Your Voice is My Passport.mp4 1.15 GB
Internet of Things/Your Voice is My Passport.mp4 1.15 GB
Cryptography/Lowering the Bar - Deep Learning for Side Channel Analysis.mp4 1.15 GB
Policy/From Bot to Robot - How Abilities and Law Change with Physicality.mp4 1.15 GB
Exploit Development/Hardening Hyper-V through Offensive Security Research.mp4 1.14 GB
Platform Security/Hardening Hyper-V through Offensive Security Research.mp4 1.14 GB
Exploit Development/Over-the-Air - How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars.mp4 1.13 GB
Internet of Things/Over-the-Air - How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars.mp4 1.13 GB
Internet of Things/IoT Malware - Comprehensive Survey Analysis Framework and Case Studies.mp4 1.13 GB
Malware/IoT Malware - Comprehensive Survey Analysis Framework and Case Studies.mp4 1.13 GB
Malware/Protecting the Protector - Hardening Machine Learning Defenses Against Adversarial Attacks.mp4 1.11 GB
Internet of Things/Pestilential Protocol - How Unsecure HL7 Messages Threaten Patient Lives.mp4 1.11 GB
Malware/Kernel Mode Threats and Practical Defenses.mp4 1.11 GB
Exploit Development/TLBleed - When Protecting Your CPU Caches is Not Enough.mp4 1.1 GB
Hardware Embedded/TLBleed - When Protecting Your CPU Caches is Not Enough.mp4 1.1 GB
Applied Security/Lessons and Lulz - The 4th Annual Black Hat USA NOC Report.mp4 1.1 GB
Security Development Lifecycle/Threat Modeling in 2018 - Attacks Impacts and Other Updates.mp4 1.09 GB
Data Forensics and Incident Response/Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4 1.07 GB
Malware/Reconstruct the World from Vanished Shadow - Recovering Deleted VSS Snapshots.mp4 1.07 GB
Hardware Embedded/TRITON - How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever.mp4 1.04 GB
Internet of Things/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4 1018.17 MB
Reverse Engineering/Reversing a Japanese Wireless SD Card - From Zero to Code Execution.mp4 1018.17 MB
Applied Security/Don't (at) Me - Hunting Twitter Bots at Scale.mp4 1013.54 MB
Human Factors/Dont (at) Me - Hunting Twitter Bots at Scale.mp4 1013.54 MB
Exploit Development/The Unbearable Lightness of BMCs.mp4 994.19 MB
Hardware Embedded/The Unbearable Lightness of BMCs.mp4 994.19 MB
Enterprise/Identity Theft - Attacks on SSO Systems.mp4 993.35 MB
Mobile/Malware Analysts vs Malware Authors.mp4 989.56 MB
Reverse Engineering/Malware Analysts vs Malware Authors.mp4 989.56 MB
Enterprise/Mainframe zOS Reverse Engineering and Exploit Development.mp4 982.69 MB
Platform Security/Mainframe zOS Reverse Engineering and Exploit Development.mp4 982.69 MB
Exploit Development/Automated Discovery of Deserialization Gadget Chains.mp4 980.58 MB
Hardware Embedded/Wrangling with the Ghost - An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4 979.59 MB
Platform Security/Wrangling with the Ghost - An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities.mp4 979.59 MB
Human Factors/Every ROSE has its Thorn - The Dark Art of Remote Online Social Engineering.mp4 968.91 MB
Enterprise/An Attacker Looks at Docker - Approaching Multi-Container Applications.mp4 968.31 MB
Applied Security/Black Box is Dead - Long Live Black Box.mp4 965.02 MB
Hardware Embedded/There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4 944.55 MB
Reverse Engineering/There will be Glitches - Extracting and Analyzing Automotive Firmware Efficiently.mp4 944.55 MB
Applied Security/Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4 915.53 MB
Cryptography/Blockchain Autopsies - Analyzing Ethereum Smart Contract Deaths.mp4 915.53 MB
Exploit Development/Another Flip in the Row.mp4 905.13 MB
Platform Security/Another Flip in the Row.mp4 905.13 MB
Malware/Miasm2 - Reverse Engineering Framework.mp4 902.95 MB
Reverse Engineering/Miasm2 - Reverse Engineering Framework.mp4 902.95 MB
Web AppSec/Practical Web Cache Poisoning - Redefining Unexploitable.mp4 897.97 MB
Exploit Development/A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4 895.69 MB
Reverse Engineering/A Brief History of Mitigation - The Path to EL1 in iOS 11.mp4 895.69 MB
Exploit Development/SirenJack - Cracking a Secure Emergency Warning Siren System.mp4 891.36 MB
Hardware Embedded/GOD MODE UNLOCKED - Hardware Backdoors in x86 CPUs.mp4 876 MB
Hardware Embedded/For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 872.51 MB
Mobile/For the Love of Money - Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems.mp4 872.51 MB
Internet of Things/Breaking the IIoT - Hacking industrial Control Gateways.mp4 843.15 MB
Exploit Development/Breaking Parser Logic - Take Your Path Normalization off and Pop 0days Out.mp4 831.46 MB
Data Forensics and Incident Response/Lessons from Virginia - A Comparative Forensic Analysis of WinVote Voting Machines.mp4 811.78 MB
Exploit Development/Fire and Ice - Making and Breaking macOS Firewalls.mp4 775.58 MB
Network Defense/Fire & Ice - Making and Breaking macOS Firewalls.mp4 775.58 MB
Hardware Embedded/I for One Welcome Our New Power Analysis Overlords.mp4 751.13 MB
Internet of Things/I for One Welcome Our New Power Analysis Overlords.mp4 751.13 MB
Cryptography/Squeezing a Key through a Carry Bit.mp4 742.91 MB
Cryptography/Compression Oracle Attacks on VPN Networks.mp4 733.47 MB
Enterprise/Compression Oracle Attacks on VPN Networks.mp4 733.47 MB
Malware/Measuring the Speed of the Red Queens Race - Adaption and Evasion in Malware.mp4 709.86 MB
Enterprise/Stop that Release There's a Vulnerability.mp4 707.82 MB
Cryptography/Playback - A TLS 1.3 Story.mp4 702.56 MB
Internet of Things/Back to the Future - A Radical Insecure Design of KVM on ARM.mp4 697.78 MB
Mobile/Back to the Future - A Radical Insecure Design of KVM on ARM.mp4 697.78 MB
Applied Security/AFLs Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries.mp4 687.21 MB
Human Factors/Two-Factor Authentication Usable or Not - A Two-Phase Usability Study of the FIDO U2F Security Key.mp4 676.46 MB
Data Forensics and Incident Response/None of My Pixel is Your Business - Active Watermarking Cancellation Against Video Streaming Service.mp4 666.11 MB
Human Factors/Exposing the Bait - A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection.mp4 648.3 MB
Community/Holding on for Tonight - Addiction in InfoSec.mp4 640.36 MB
Data Forensics and Incident Response/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4 630.78 MB
Network Defense/Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure.mp4 630.78 MB
Applied Security/The Air-Gap Jumpers.mp4 618.09 MB
Malware/The Air-Gap Jumpers.mp4 618.09 MB
Key Note/Optimistic Dissatisfaction with the Status Quo - Steps We Must Take to Improve Security in Complex Landscapes.mp4 562.6 MB
Reverse Engineering/Finding Xori - Malware Analysis Triage with Automated Disassembly.mp4 558.88 MB
Community/How can Communities Move Forward After Incidents of Sexual Harassment or Assault.mp4 546.75 MB
Network Defense/Edge Side Include Injection - Abusing Caching Servers into SSRF and Transparent Session Hijacking.mp4 543.09 MB
Applied Security/A Tangled Curl.mp4 521.62 MB
Data Forensics and Incident Response/Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4 514.91 MB
Enterprise/Money-rity Report - Using Intelligence to Predict the Next Payment Card Fraud Victims.mp4 514.91 MB
Internet of Things/How I Learned to Stop Worrying and Love the SBOM.mp4 508.29 MB
Policy/How I Learned to Stop Worrying and Love the SBOM.mp4 508.29 MB
Data Forensics and Incident Response/Dissecting Non-Malicious Artifacts - One IP at a Time.mp4 507.69 MB
Malware/Dissecting Non-Malicious Artifacts - One IP at a Time.mp4 507.69 MB
Applied Security/Detecting Credential Compromise in AWS.mp4 479.53 MB
Data Forensics and Incident Response/Detecting Credential Compromise in AWS.mp4 479.53 MB
Cryptography/Return of Bleichenbachers Oracle Threat - ROBOT.mp4 474.49 MB
Policy/New Norms and Policies in Cyber-Diplomacy.mp4 473.21 MB
Applied Security/Real Eyes Realize Real Lies - Beating Deception Technologies.mp4 453.52 MB
Enterprise/Real Eyes Realize Real Lies - Beating Deception Technologies.mp4 453.52 MB
Community/How can Someone with Autism Specifically Enhance the Cyber Security Workforce.mp4 444.33 MB
Applied Security/ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4 440.35 MB
Mobile/ARTist - A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.mp4 440.35 MB
Platform Security/Behind the Speculative Curtain - The True Story of Fighting Meltdown and Spectre.mp4 434.03 MB
Community/Demystifying PTSD in the Cybersecurity Environment.mp4 395.32 MB
Policy/Demystifying PTSD in the Cybersecurity Environment.mp4 395.32 MB
Exploit Development/The Problems and Promise of WebAssembly.mp4 337.11 MB
Applied Security/Meltdown - Basics Details Consequences.mp4 304.4 MB
Platform Security/Meltdown - Basics Details Consequences.mp4 304.4 MB
Human Factors/Is the Mafia Taking Over Cybercrime.mp4 232.65 MB
Enterprise/InfoSec Philosophies for the Corrupt Economy.mp4 223 MB
Human Factors/InfoSec Philosophies for the Corrupt Economy.mp4 223 MB
Hardware Embedded/Software Attacks on Hardware Wallets.mp4 216.67 MB
Download Info
-
Tips
“blackhat2018videos” Its related downloads are collected from the DHT sharing network, the site will be 24 hours of real-time updates, to ensure that you get the latest resources.This site is not responsible for the authenticity of the resources, please pay attention to screening.If found bad resources, please send a report below the right, we will be the first time shielding.
-
DMCA Notice and Takedown Procedure
If this resource infringes your copyright, please email([email protected]) us or leave your message here ! we will block the download link as soon as possiable.