种子简介
种子名称:
Black Hat Asia 2021 Videos
文件类型:
视频
文件数目:
40个文件
文件大小:
4.24 GB
收录时间:
2021-5-18 17:59
已经下载:
3次
资源热度:
127
最近下载:
2024-11-8 06:12
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:822f67cb41e2dc72869748c1bf5671f0d371bbdd&dn=Black Hat Asia 2021 Videos
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Black Hat Asia 2021 Videos.torrent
3. Engineering Cybersecurity for a Nation- What Singapore is Learning from Cars and Sanitation [ zerodaylab.us ].mp4244.25MB
2. Complexity Killed Security [ zerodaylab.us ].mp4121.99MB
1. BitLeaker- Subverting BitLocker with One Vulnerability [ zerodaylab.us ].mp4130.47MB
4. The Black Hat NOC- Greatest Hits and Holy...Cows [ zerodaylab.us ].mp4119.42MB
5. Escaping Virtualized Containers [ zerodaylab.us ].mp498.17MB
6. Patching Loopholes- Finding Backdoors in Applications [ zerodaylab.us ].mp446.21MB
7. What the Log-! So Many Events, so Little Time [ zerodaylab.us ].mp4159.39MB
8. Securing the Next Version of HTTP- How QUIC and HTTP3 Compare to HTTP2 [ zerodaylab.us ].mp472.85MB
9. Misuse of DNS, the Second Most Used Protocol [ zerodaylab.us ].mp485.27MB
10. Faking a Factory- Creating and Operating a Realistic Honeypot [ zerodaylab.us ].mp483.94MB
11. Raiden Glitching Framework [ zerodaylab.us ].mp497.33MB
12. First Contact - Vulnerabilities in Contactless Payments [ zerodaylab.us ].mp493.31MB
13. The Evil Alt-Ego- (ab)using HTTP Alternative Services [ zerodaylab.us ].mp4123.87MB
14. The Evil of Spy Camera [ zerodaylab.us ].mp494.24MB
15. Walking Your Dog in Multiple Forests - Breaking AD Trust Boundaries through Kerberos Vulnerabilities [ zerodaylab.us ].mp4216.9MB
16. CDPwn- Taking Over Millions of Enterprise-Things with Layer 2 Zero-Days [ zerodaylab.us ].mp4111.5MB
17. WIFI-Important Remote Attack Surface- Threat is Expanding [ zerodaylab.us ].mp464.25MB
18. Biometrics & Privacy- Time to Faceoff or is that FaceApp- [ zerodaylab.us ].mp4151.65MB
19. Attacking and Defending Machine Learning Applications of Public Cloud [ zerodaylab.us ].mp451.11MB
20. Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale [ zerodaylab.us ].mp485.1MB
21. Redback- Advanced Static Binary Injection [ zerodaylab.us ].mp493.5MB
22. Store-to-Leak Forwarding- There and Back Again [ zerodaylab.us ].mp4135.38MB
23. ZombieLoad- Leaking Data on Intel CPUs [ zerodaylab.us ].mp498.67MB
24. Back to the Future. Cross-Protocol Attacks in the Era of 5G [ zerodaylab.us ].mp4119.52MB
25. 3d Red Pill- A Guest-to-Host Escape on QEMUKVM Virtio Device [ zerodaylab.us ].mp479.29MB
26. Page Cache Attacks- Microarchitectural Attacks on Flawless Hardware [ zerodaylab.us ].mp4125.74MB
27. Wi-Fi Brokering [ zerodaylab.us ].mp491.72MB
28. May the Trust be with You- Empowering TrustZone-M with Multiple Trusted Environments [ zerodaylab.us ].mp469.87MB
29. Kr00k- How KRACKing Amazon Echo Exposed a Billion+ Vulnerable Wi-Fi Devices [ zerodaylab.us ].mp4101.52MB
30. From an URGENT11 Vulnerability to a Full Take-Down of a Factory Using a Single Packet [ zerodaylab.us ].mp497.45MB
31. Hey Google, Activate Spyware! – When Google Assistant Uses a Vulnerability as a Feature [ zerodaylab.us ].mp4104.95MB
32. Making an Impact from India to the Rest of the World by Building & Nurturing Women Infosec Community [ zerodaylab.us ].mp4116.54MB
33. Demystify Today's Binary Disassembling and How Modern ABI Makes it Easier [ zerodaylab.us ].mp459.17MB
34. Win the 0-Day Racing Game Against Botnet in Public Cloud [ zerodaylab.us ].mp454.99MB
35. Tracking the Criminal of Fake News Based on a Unified Embedding [ zerodaylab.us ].mp454.77MB
36. The Inside Story- There are Apps in Apps and Here is How to Break Them [ zerodaylab.us ].mp455.79MB
37. Adversary Detection Pipelines- Finally Making Your Threat Intel Useful [ zerodaylab.us ].mp4169.97MB
38. Dynamic Binary Instrumentation Techniques to Address Native Code Obfuscation [ zerodaylab.us ].mp487.35MB
39. Locknote- Conclusions and Key Takeaways from Day 1 [ zerodaylab.us ].mp4158.53MB
40. Locknote- Conclusions and Key Takeaways from Day 2 [ zerodaylab.us ].mp4219.62MB