Attending Black Hat USA 2014 was a sobering and exciting experience.
Here’s a playlist of interesting presentations from Black Hat conferences in 2014:
- KEYNOTE: Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014
- BadUSB – On Accessories that Turn Evil by Karsten Nohl + Jakob Lell
- Windows: Abusing Microsoft Kerberos Sorry You Guys Don’t Get It
- Forensics Investigating: PowerShell Attacks
- Forensics: APT Attribution and DNS Profiling
- Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani
- Malware: Catching Malware En Masse DNS and IP Style
- USB Attacks Need Physical Access Right? Not Any More… by Andy Davis
- Scan All the Things – Project Sonar by Mark Schloesser
- Mobile: Cellular Exploitation on a Global Scale The Rise & Fall of the Control
- SATCOM Terminals: Hacking by Air, Sea, and Land by Ruben Santamarta
- Breaking the Security of Physical Devices by Silvio Cesare
- OFFENSIVE: Exploiting DNS Servers Changes by Leonardo Nve
- Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel
- You Can’t See Me: A Mac OS X Rootkit Uses the Tricks You Haven’t Known Yet
- Persist It: Using and Abusing Microsoft’s Fix It Patches by Jon Erickson
- Advanced JPEG Steganography and Detection by John Ortiz
- Windows: Computrace Backdoor Revisited
- Exploit: Write Once, Pwn Anywhere
- Exploit: My Google Glass Sees Your Passwords!
- Exploit: Extreme Privilege Escalation on Windows 8UEFI Systems
- Exploit: Exploiting Unpatched iOS Vulnerabilities for Fun and Profit
- Malware: A Practical Attack Against VDI Solutions
- Malware: What Goes Around Comes Back Around Exploiting Fundamental Weaknesses
- Malware: The New Scourge of Ransomware A Study of CryptoLocker and Its Friends
- Malware: Prevalent Characteristics in Modern Malware
- Enterprise: The Devil Does Not Exist The Role of Deception in Cyber
- Enterprise: Stay Out of the Kitchen A DLP Security Bake Off
- Enterprise: Learn How to Ctrl Every Room at a Luxury Hotel Remotely The Dangers
- Virtualization: Poacher Turned Gamekeeper Lessons Learned from Eight Years
- Network: VoIP Wars Attack of the Cisco Phones
- Network: Network Attached Shell N A S ty Systems that Store Network Accessible
- Network: Multipath TCP Breaking Today’s Networks with Tomorrow’s Protocols
- Incident Response: Secure Because Math A Deep Dive on Machine Learning
- The State of Incident Response by Bruce Schneier
- Windows: Windows Kernel Graphics Driver Attack Surface
- Exploit: Abusing Performance Optimization Weaknesses to Bypass ASLR
- Network: Badger The Networked Security State Estimation Toolkit
- Malware: One Packer to Rule Them All Empirical Identification, Comparison
- Malware: Exposing Bootkits with BIOS Emulation
- Comprehensive Virtual Appliance Detection by Kang Li
- Digital Intelligence Gathering Using Maltego Video Preview
- Incident Response: Threat Intelligence Library A New Revolutionary Technology
- Hardware: How to Wear Your Password
- Network: Evasion of High End IPS Devices in the Age of IPv6
Recent Comments