Blackhat  Europe 2015

Blackhat Europe 2015

du 10 au 13 Novembre 2015

Amsterdam

PAYS BAS

Blackhat-2015

 

 

Briefings : présentations de 25 à 50 minutes

  • IN-)SECURITY OF BACKEND-AS-A-SERVICE
  • A PEEK UNDER THE BLUE COAT
  • ALL YOUR ROOT CHECKS BELONG TO US: THE SAD STATE OF ROOT DETECTION
  • ANDROBUGS FRAMEWORK: AN ANDROID APPLICATION SECURITY VULNERABILITY SCANNER
  • ATTACKING THE XNU KERNEL IN EL CAPITAIN
  • AUTHENTICATOR LEAKAGE THROUGH BACKUP CHANNELS ON ANDROID
  • AUTOMATING LINUX MALWARE ANALYSIS USING LIMON SANDBOX
  • BREAKING ACCESS CONTROLS WITH BLEKEY
  • BYPASSING LOCAL WINDOWS AUTHENTICATION TO DEFEAT FULL DISK ENCRYPTION
  • BYPASSING SELF-ENCRYPTING DRIVES (SED) IN ENTERPRISE ENVIRONMENTS
  • COMMIX: DETECTING AND EXPLOITING COMMAND INJECTION FLAWS
  • CONTINUOUS INTRUSION: WHY CI TOOLS ARE AN ATTACKERS BEST FRIENDS
  • CRACKING ONLINE BANKS – EXPLOITING TEMENOS
  • CYBERCRIME IN THE DEEP WEB
  • CYBERSECURITY FOR OIL AND GAS INDUSTRIES: HOW HACKERS CAN MANIPULATE OIL STOCKS
  • DEFENDING AGAINST MALICIOUS APPLICATION COMPATIBILITY SHIMS
  • EVEN THE LASTPASS WILL BE STOLEN DEAL WITH IT!
  • EXPLOITING ADOBE FLASH PLAYER IN THE ERA OF CONTROL FLOW GUARD
  • FAUX DISK ENCRYPTION: REALITIES OF SECURE STORAGE ON MOBILE DEVICES
  • FUZZING ANDROID: A RECIPE FOR UNCOVERING VULNERABILITIES INSIDE SYSTEM COMPONENTS IN ANDROID
  • GOING AUTH THE RAILS ON A CRAZY TRAIN
  • HEY MAN HAVE YOU FORGOTTEN TO INITIALIZE YOUR MEMORY?
  • HIDING IN PLAIN SIGHT – ADVANCES IN MALWARE COVERT COMMUNICATION CHANNELS
  • HOW TO BREAK XML ENCRYPTION – AUTOMATICALLY
  • IMPLEMENTING PRACTICAL ELECTRICAL GLITCHING ATTACKS
  • IS YOUR TIMESPACE SAFE? – TIME AND POSITION SPOOFING OPENSOURCELY
  • LESSONS FROM DEFENDING THE INDEFENSIBLE
  • LOCKNOTE: CONCLUSIONS AND KEY TAKEAWAYS FROM BLACK HAT EUROPE 2015
  • LTE & IMSI CATCHER MYTHS
  • NEW (AND NEWLY-CHANGED) FULLY QUALIFIED DOMAIN NAMES: A VIEW OF WORLDWIDE CHANGES TO THE INTERNETS DNS
  • NEW TOOL FOR DISCOVERING FLASH PLAYER 0-DAY ATTACKS IN THE WILD FROM VARIOUS CHANNELS
  • PANEL: WHAT YOU NEED TO KNOW ABOUT THE CHANGING REGULATORY LANDSCAPE IN INFORMATION SECURITY
  • SELF-DRIVING AND CONNECTED CARS: FOOLING SENSORS AND TRACKING DRIVERS
  • SILENTLY BREAKING ASLR IN THE CLOUD
  • STEGOSPLOIT – EXPLOIT DELIVERY WITH STEGANOGRAPHY AND POLYGLOTS
  • TRIAGING CRASHES WITH BACKWARD TAINT ANALYSIS FOR ARM ARCHITECTURE
  • UNBOXING THE WHITE-BOX: PRACTICAL ATTACKS AGAINST OBFUSCATED CIPHERS
  • VOIP WARS: DESTROYING JAR JAR LYNC
  • VULNERABILITY EXPLOITATION IN DOCKER CONTAINER ENVIRONMENTS
  • WATCHING THE WATCHDOG: PROTECTING KERBEROS AUTHENTICATION WITH NETWORK MONITORING
  • YOUR SCRIPTS IN MY PAGE – WHAT COULD POSSIBLY GO WRONG?

 

Cours : le 10 et 11 Novembre

  • ADVANCED INFRASTRUCTURE HACKING
  • ADVANCED OSINT FOR SOCIAL ENGINEERS
  • ADVERSARY HUNTING AND INCIDENT RESPONSE: NETWORK EDITION
  • BEYOND THE BEAST: DEEP DIVES INTO CRYPTO VULNERABILITIES
  • CLOUD SECURITY HANDS-ON (CCSK-PLUS)
  • DARK SIDE OPS: CUSTOM PENETRATION TESTING
  • ENTERPRISE INFRASTRUCTURE BOOTCAMP
  • HANDS-ON HARDWARE HACKING AND REVERSE ENGINEERING
  • MALWARE ANALYSIS CRASH COURSE
  • OFFENSIVE IOT EXPLOITATION

 

Mais aussi des Ateliers, Special Events …

 

Pour plus d’informations, cliquer ici

 

 

Related posts

Leave a Reply