{"id":455,"date":"2014-11-05T23:21:54","date_gmt":"2014-11-06T04:21:54","guid":{"rendered":"http:\/\/adsecurity.org\/?p=455"},"modified":"2014-11-13T20:57:08","modified_gmt":"2014-11-14T01:57:08","slug":"black-hat-usa-2014-presentation-videos-play-list","status":"publish","type":"post","link":"https:\/\/adsecurity.org\/?p=455","title":{"rendered":"Black Hat 2014 Presentation Video Play List"},"content":{"rendered":"<p>Attending Black Hat USA 2014 was a sobering and exciting experience.<\/p>\n<p>Here&#8217;s a playlist of interesting presentations from Black Hat conferences in 2014:<\/p>\n<ul>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=nT-TGvYOBpI\">KEYNOTE: Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014 <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=nuruzFqMgIw\">BadUSB &#8211; On Accessories that Turn Evil by Karsten Nohl + Jakob Lell <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=-IMrNGPZTl0&amp;index=4&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Windows: Abusing Microsoft Kerberos Sorry You Guys Don&#8217;t Get It <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=Z0eRS5JVxXs&amp;index=57&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Forensics Investigating: PowerShell Attacks<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=6jwZm1Qxqfs&amp;index=60&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Forensics: APT Attribution and DNS Profiling <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=7QvtMhlipzs\">Abusing the Internet of Things: Blackouts, Freakouts, and Stakeouts by Nitesh Dhanjani <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=OzWGssWIVZI&amp;index=48&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: Catching Malware En Masse DNS and IP Style <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=90MIjgh5ESU\">USB Attacks Need Physical Access Right? Not Any More\u2026 by Andy Davis <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=BzAK7eLIhpk\">Scan All the Things &#8211; Project Sonar by Mark Schloesser <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=HD1ngJ85vWM&amp;index=39&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Mobile: Cellular Exploitation on a Global Scale The Rise &amp; Fall of the Control <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=PokQ93Cbo0s\">SATCOM Terminals: Hacking by Air, Sea, and Land by Ruben Santamarta <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=TMpHB-pWseM\">Breaking the Security of Physical Devices by Silvio Cesare <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=Q3siIqS9LVA\">OFFENSIVE: Exploiting DNS Servers Changes by Leonardo Nve <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=Nh9E2Lnvcik\">Disasters in the Making: How I Torture Open Government Data Systems for Fun, Profit, and Time Travel <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=LQ9QKJYcq5A\">You Can\u2019t See Me: A Mac OS X Rootkit Uses the Tricks You Haven\u2019t Known Yet <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=pJ9yuuMO03Y\">Persist It: Using and Abusing Microsoft\u2019s Fix It Patches by Jon Erickson <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=BQPkRlbVFEs\">Advanced JPEG Steganography and Detection by John Ortiz<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=YZO0wN30h0Q&amp;index=3&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Windows: Computrace Backdoor Revisited<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=DShnxiXvNEM&amp;index=61&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Exploit: Write Once, Pwn Anywhere<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=kTlLC_yQUxM&amp;index=64&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Exploit: My Google Glass Sees Your Passwords! <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=UJp_rMwdyyI&amp;index=66&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Exploit: Extreme Privilege Escalation on Windows 8UEFI Systems<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=Iqxbbiuqvag&amp;index=67&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Exploit: Exploiting Unpatched iOS Vulnerabilities for Fun and Profit <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=OzWGssWIVZI&amp;index=48&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: A Practical Attack Against VDI Solutions <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=y4qzpRcikQM&amp;index=41&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: What Goes Around Comes Back Around Exploiting Fundamental Weaknesses <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=a2SSqEdKVUs&amp;index=42&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: The New Scourge of Ransomware A Study of CryptoLocker and Its Friends <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=MvkfIj9UKKM&amp;index=43&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: Prevalent Characteristics in Modern Malware <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=NTuhwwWLpQE&amp;index=77&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Enterprise: The Devil Does Not Exist The Role of Deception in Cyber <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=56Dx0B8yfAg&amp;index=78&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Enterprise: Stay Out of the Kitchen A DLP Security Bake Off <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=23-WwKFg-9w&amp;index=81&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Enterprise: Learn How to Ctrl Every Room at a Luxury Hotel Remotely The Dangers<\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=S6LRRaoEo8A&amp;index=5&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Virtualization: Poacher Turned Gamekeeper Lessons Learned from Eight Years <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=hqL25srtoEY&amp;index=20&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Network: VoIP Wars Attack of the Cisco Phones <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=Mx8WZEcWnWI&amp;index=21&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Network: Network Attached Shell N A S ty Systems that Store Network Accessible <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=T-R_vWdmFpY&amp;index=22&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Network: Multipath TCP Breaking Today&#8217;s Networks with Tomorrow&#8217;s Protocols <\/a><\/strong><\/li>\n<li><strong><a href=\"https:\/\/www.youtube.com\/watch?v=e_PEMBAYwBk&amp;index=51&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Incident Response: Secure Because Math A Deep Dive on Machine Learning <\/a><\/strong><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=u54Radu2bF0\">The State of Incident Response by Bruce Schneier <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=wcV0k5GUFOw&amp;index=1&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Windows: Windows Kernel Graphics Driver Attack Surface <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=H46lN_kab0I&amp;index=73&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Exploit: Abusing Performance Optimization Weaknesses to Bypass ASLR <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=bO4cML8fwjs&amp;index=26&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Network: Badger The Networked Security State Estimation Toolkit <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=y4qzpRcikQM&amp;index=41&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: One Packer to Rule Them All Empirical Identification, Comparison <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=FWGmczb_qpE&amp;index=46&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Malware: Exposing Bootkits with BIOS Emulation <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=PokQ93Cbo0s\">Comprehensive Virtual Appliance Detection by Kang Li <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=neLt43TwPYI\">Digital Intelligence Gathering Using Maltego Video Preview <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=1GKy56Nv750&amp;index=50&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Incident Response: Threat Intelligence Library A New Revolutionary Technology <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=kV4Ic25o8Uw&amp;index=54&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Hardware: How to Wear Your Password <\/a><\/li>\n<li><a href=\"https:\/\/www.youtube.com\/watch?v=DShnxiXvNEM&amp;index=61&amp;list=UUbbgnifxfH-nqx6z9XQ963Q\">Network: Evasion of High End IPS Devices in the Age of IPv6 <\/a><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Attending Black Hat USA 2014 was a sobering and exciting experience. Here&#8217;s a playlist of interesting presentations from Black Hat conferences in 2014: KEYNOTE: Cybersecurity as Realpolitik by Dan Geer presented at Black Hat USA 2014 BadUSB &#8211; On Accessories that Turn Evil by Karsten Nohl + Jakob Lell Windows: Abusing Microsoft Kerberos Sorry You &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/adsecurity.org\/?p=455\">Continue reading<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[17,21,234],"tags":[235,236],"class_list":["post-455","post","type-post","status-publish","format-standard","hentry","category-continuing-education","category-security","category-security-conference-presentationvideo","tag-blackhatusa2014videos","tag-securityconference","item-wrap"],"_links":{"self":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/455","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=455"}],"version-history":[{"count":5,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/455\/revisions"}],"predecessor-version":[{"id":500,"href":"https:\/\/adsecurity.org\/index.php?rest_route=\/wp\/v2\/posts\/455\/revisions\/500"}],"wp:attachment":[{"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=455"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=455"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/adsecurity.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=455"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}