کنفرانس BlackHat 2018 در شهر لاس وگاس آمریکا

دانلود

Telegram_GEEKBOY

در 18 سال گذشته کنفرانس های بلک هت (BlackHat) با گردهمایی متخصصین حوزه امنیت اطلاعات ، هکرها و دوستداران این زمینه بهترین هم اندیشی را برای کسب تجربه و ایده های جدید بوجود آورده است ،بلک هت در سال 1997 توسط جف موس از یک کنفرانس سالیانه در لاس‌وگاس فعالیت خود را آغاز کرد ، بلک هت در مدت کوتاهی به معتبرترین کنفرانس و مرجع برای علاقمندان حوزه امنیت تبدیل شده است ، اینبار در سال 2018 بلک هت کنفرانس خود را در شهر لاس وگاس برپا کرده است  ، در این پست قصد داریم موضوعات مختلفی که در این سمینار به آن پرداخته شده است را به صورت تیتروار همراه با لینک دانلود در اختیار شما کاربران قرار دهیم ، امیدواریم برای شما هم الهام بخش و مفید واقع گردد .

Now in its 21st year, Black Hat USA is the world’s leading information security event, providing attendees with the very latest in research, development and trends. Black Hat USA 2018 opens with four days of technical Trainings (August 4 – 7) followed by the two-day main conference (August 8 – 9) featuring Briefings, Arsenal, Business Hall, and more.

 

Applied Security

دانلود نام فایل
دانلود مستقیم A Tangled Curl
دانلود مستقیم AFLs Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries
دانلود مستقیم ARTist – A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
دانلود مستقیم Applied Self-Driving Car Security
دانلود مستقیم Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies
دانلود مستقیم Black Box is Dead – Long Live Black Box
دانلود مستقیم Blockchain Autopsies – Analyzing Ethereum Smart Contract Deaths
دانلود مستقیم Detecting Credential Compromise in AWS
دانلود مستقیم Don’t (at) Me – Hunting Twitter Bots at Scale
دانلود مستقیم Follow the White Rabbit – Simplifying Fuzz Testing Using FuzzExMachina
دانلود مستقیم Lessons and Lulz – The 4th Annual Black Hat USA NOC Repor
دانلود مستقیم Meltdown – Basics Details Consequences
دانلود مستقیم Real Eyes Realize Real Lies – Beating Deception Technologies
دانلود مستقیم So I became a Domain Controller
دانلود مستقیم The Air-Gap Jumpers

 

Community

دانلود نام فایل
دانلود مستقیم ..Demystifying PTSD in the Cybersecurity Environm
دانلود مستقیم Holding on for Tonight – Addiction in InfoSec.mp4
دانلود مستقیم How can Communities Move Forward After Incidents of Sexual Harassment or Assault
دانلود مستقیم How can Someone with Autism Specifically Enhance the Cyber Security Workforce
دانلود مستقیم Legal Landmines – How Law and Policy are Rapidly Shaping Information Security
دانلود مستقیم Mental Health Hacks – Fighting Burnout Depression and Suicide in the Hacker Community
دانلود مستقیم Stress and Hacking – Understanding Cognitive Stress in Tactical Cyber Ops
دانلود مستقیم The Science of Hiring and Retaining Female Cybersecurity Engineers

 

Cryptography

دانلود نام فایل
دانلود مستقیم Blockchain Autopsies – Analyzing Ethereum Smart Contract Deaths
دانلود مستقیم Compression Oracle Attacks on VPN Networks
دانلود مستقیم Efail – Breaking SMIME and OpenPGP Email Encryption using Exfiltration Channels
دانلود مستقیم Lowering the Bar – Deep Learning for Side Channel Analysis
دانلود مستقیم Playback – A TLS 1.3 Story
دانلود مستقیم Return of Bleichenbachers Oracle Threat – ROBOT
دانلود مستقیم Screaming Channels – When Electromagnetic Side Channels Meet Radio Transceivers
دانلود مستقیم Squeezing a Key through a Carry Bit
دانلود مستقیم WireGuard – Next Generation Secure Network Tunnel

 

Data Forensics and Incident Response

دانلود نام فایل
دانلود مستقیم Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure
دانلود مستقیم Detecting Credential Compromise in AWS
دانلود مستقیم Dissecting Non-Malicious Artifacts – One IP at a Time
دانلود مستقیم Lessons from Virginia – A Comparative Forensic Analysis of WinVote Voting Machines
دانلود مستقیم Money-rity Report – Using Intelligence to Predict the Next Payment Card Fraud Victims
دانلود مستقیم None of My Pixel is Your Business – Active Watermarking Cancellation Against Video Streaming Service
دانلود مستقیم Reconstruct the World from Vanished Shadow – Recovering Deleted VSS Snapshots

 

Day Zero

دانلود نام فایل
دانلود مستقیم Day Zero

 

Enterprise

دانلود نام فایل
دانلود مستقیم A Deep Dive into macOS MDM and How it can be Compromised
دانلود مستقیم An Attacker Looks at Docker – Approaching Multi-Container Applications
دانلود مستقیم Compression Oracle Attacks on VPN Networks
دانلود مستقیم Deep Neural Networks for Hackers – Methods Applications and Open Source Tools
دانلود مستقیم From Workstation to Domain Admin – Why Secure Administration isn’t Secure and How to Fix it
دانلود مستقیم Identity Theft – Attacks on SSO Systems
دانلود مستقیم InfoSec Philosophies for the Corrupt Economy
دانلود مستقیم Mainframe zOS Reverse Engineering and Exploit Development
دانلود مستقیم Money-rity Report – Using Intelligence to Predict the Next Payment Card Fraud Victims
دانلود مستقیم Open Sesame – Picking Locks with Cortana
دانلود مستقیم Real Eyes Realize Real Lies – Beating Deception Technologies
دانلود مستقیم Remotely Attacking System Firmware
دانلود مستقیم So I became a Domain Controller
دانلود مستقیم Stop that Release There’s a Vulnerability

 

Exploit Development

دانلود نام فایل
دانلود مستقیم A Brief History of Mitigation – The Path to EL1 in iOS 11
دانلود مستقیم Another Flip in the Row
دانلود مستقیم Attacking Client-Side JIT Compilers
دانلود مستقیم Automated Discovery of Deserialization Gadget Chains
دانلود مستقیم Breaking Parser Logic – Take Your Path Normalization off and Pop 0days Out
دانلود مستقیم DeepLocker – Concealing Targeted Attacks with AI Locksmithing
دانلود مستقیم Exploitation of a Modern Smartphone Baseband
دانلود مستقیم Fire and Ice – Making and Breaking macOS Firewalls
دانلود مستقیم From Thousands of Hours to a Couple of Minutes – Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
دانلود مستقیم Hardening Hyper-V through Offensive Security Research
دانلود مستقیم Its a PHP Unserialization Vulnerability Jim but Not as We Know It
دانلود مستقیم KeenLab iOS Jailbreak Internals – Userland Read-Only Memory can be Dangerous
دانلود مستقیم Over-the-Air – How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars
دانلود مستقیم SirenJack – Cracking a Secure Emergency Warning Siren System

 

Hardware Embedded

دانلود نام فایل
دانلود مستقیم For the Love of Money – Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
دانلود مستقیم GOD MODE UNLOCKED – Hardware Backdoors in x86 CPUs
دانلود مستقیم I for One Welcome Our New Power Analysis Overlords
دانلود مستقیم Last Call for SATCOM Security
دانلود مستقیم Screaming Channels – When Electromagnetic Side Channels Meet Radio Transceivers
دانلود مستقیم Software Attacks on Hardware Wallets
دانلود مستقیم The Unbearable Lightness of BMCs
دانلود مستقیم There will be Glitches – Extracting and Analyzing Automotive Firmware Efficiently
دانلود مستقیم TLBleed – When Protecting Your CPU Caches is Not Enough
دانلود مستقیم TRITON – How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems Forever
دانلود مستقیم Understanding and Exploiting Implanted Medical Devices
دانلود مستقیم Wrangling with the Ghost – An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities

 

Human Factors

دانلود نام فایل
دانلود مستقیم AI and ML in Cyber Security – Why Algorithms are Dangerous
دانلود مستقیم Catch me Yes we can – Pwning Social Engineers using Natural Language Processing Techniques in Real-Time
دانلود مستقیم Dont (at) Me – Hunting Twitter Bots at Scale
دانلود مستقیم Every ROSE has its Thorn – The Dark Art of Remote Online Social Engineering
دانلود مستقیم Exposing the Bait – A Qualitative Look at the Impact of Autonomous Peer Communication to Enhance Organizational Phishing Detection
دانلود مستقیم InfoSec Philosophies for the Corrupt Economy
دانلود مستقیم Is the Mafia Taking Over Cybercrime
دانلود مستقیم Stress and Hacking – Understanding Cognitive Stress in Tactical Cyber Ops
دانلود مستقیم Two-Factor Authentication Usable or Not – A Two-Phase Usability Study of the FIDO U2F Security Key
دانلود مستقیم Your Voice is My Passport

 

Internet of Things

دانلود نام فایل
دانلود مستقیم Back to the Future – A Radical Insecure Design of KVM on ARM
دانلود مستقیم Breaking the IIoT – Hacking industrial Control Gateways
دانلود مستقیم How I Learned to Stop Worrying and Love the SBOM
دانلود مستقیم I for One Welcome Our New Power Analysis Overlords
دانلود مستقیم IoT Malware – Comprehensive Survey Analysis Framework and Case Studies
دانلود مستقیم Legal Liability for IOT Cybersecurity Vulnerabilities
دانلود مستقیم Outsmarting the Smart City
دانلود مستقیم Over-the-Air – How we Remotely Compromised the Gateway BCM and Autopilot ECUs of Tesla Cars
دانلود مستقیم Pestilential Protocol – How Unsecure HL7 Messages Threaten Patient Lives
دانلود مستقیم Reversing a Japanese Wireless SD Card – From Zero to Code Execution
دانلود مستقیم Snooping on Cellular Gateways and Their Critical Role in ICS
دانلود مستقیم Understanding and Exploiting Implanted Medical Devices
دانلود مستقیم Your Voice is My Passport

 

Key Note

دانلود نام فایل
دانلود مستقیم Optimistic Dissatisfaction with the Status Quo – Steps We Must Take to Improve Security in Complex Landscapes

 

Malware

دانلود نام فایل
دانلود مستقیم Decompiler Internals – Microcode
دانلود مستقیم Deep Neural Networks for Hackers – Methods Applications and Open Source Tools
دانلود مستقیم DeepLocker – Concealing Targeted Attacks with AI Locksmithing
دانلود مستقیم Dissecting Non-Malicious Artifacts – One IP at a Time
دانلود مستقیم IoT Malware – Comprehensive Survey Analysis Framework and Case Studies
دانلود مستقیم Kernel Mode Threats and Practical Defenses
دانلود مستقیم Measuring the Speed of the Red Queens Race – Adaption and Evasion in Malware
دانلود مستقیم Miasm2 – Reverse Engineering Framework
دانلود مستقیم No Royal Road – Notes on Dangerous Game
دانلود مستقیم Protecting the Protector – Hardening Machine Learning Defenses Against Adversarial Attacks
دانلود مستقیم Reconstruct the World from Vanished Shadow – Recovering Deleted VSS Snapshots
دانلود مستقیم Stealth Mango and the Prevalence of Mobile Surveillanceware
دانلود مستقیم Subverting Sysmon – Application of a Formalized Security Product Evasion Methodology
دانلود مستقیم The Air-Gap Jumpers
دانلود مستقیم Windows Offender – Reverse Engineering Windows Defenders Antivirus Emulator

 

Key Note

دانلود نام فایل
دانلود مستقیم Optimistic Dissatisfaction with the Status Quo – Steps We Must Take to Improve Security in Complex Landscapes

 

Malware

دانلود نام فایل
دانلود مستقیم Decompiler Internals – Microcode
دانلود مستقیم Deep Neural Networks for Hackers – Methods Applications and Open Source Tools
دانلود مستقیم DeepLocker – Concealing Targeted Attacks with AI Locksmithing
دانلود مستقیم Dissecting Non-Malicious Artifacts – One IP at a Time
دانلود مستقیم IoT Malware – Comprehensive Survey Analysis Framework and Case Studies
دانلود مستقیم Kernel Mode Threats and Practical Defenses
دانلود مستقیم Measuring the Speed of the Red Queens Race – Adaption and Evasion in Malware
دانلود مستقیم Miasm2 – Reverse Engineering Framework
دانلود مستقیم No Royal Road – Notes on Dangerous Game
دانلود مستقیم Protecting the Protector – Hardening Machine Learning Defenses Against Adversarial Attacks
دانلود مستقیم Reconstruct the World from Vanished Shadow – Recovering Deleted VSS Snapshots
دانلود مستقیم Stealth Mango and the Prevalence of Mobile Surveillanceware
دانلود مستقیم Subverting Sysmon – Application of a Formalized Security Product Evasion Methodology
دانلود مستقیم The Air-Gap Jumpers
دانلود مستقیم Windows Offender – Reverse Engineering Windows Defenders Antivirus Emulator

 

Mobile

دانلود نام فایل
دانلود مستقیم ARTist – A Novel Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware
دانلود مستقیم Back to the Future – A Radical Insecure Design of KVM on ARM
دانلود مستقیم Exploitation of a Modern Smartphone Baseband
دانلود مستقیم For the Love of Money – Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
دانلود مستقیم KeenLab iOS Jailbreak Internals – Userland Read-Only Memory can be Dangerous
دانلود مستقیم LTE Network Automation Under Threat
دانلود مستقیم Malware Analysts vs Malware Authors
دانلود مستقیم Stealth Mango and the Prevalence of Mobile Surveillanceware

 

Network Defense

دانلود نام فایل
دانلود مستقیم Beating the Blockchain by Mapping Out Decentralized Namecoin and Emercoin Infrastructure
دانلود مستقیم Detecting Malicious Cloud Account Behavior – A Look at the New Native Platform Capabilities
دانلود مستقیم Edge Side Include Injection – Abusing Caching Servers into SSRF and Transparent Session Hijacking
دانلود مستقیم Fire & Ice – Making and Breaking macOS Firewalls
دانلود مستقیم From Workstation to Domain Admin – Why Secure Administration isnt Secure and How to Fix it
دانلود مستقیم LTE Network Automation Under Threat
دانلود مستقیم Open Sesame – Picking Locks with Cortana
دانلود مستقیم Subverting Sysmon – Application of a Formalized Security Product Evasion Methodology
دانلود مستقیم The Finest Penetration Testing Framework for Software-Defined Networks
دانلود مستقیم WireGuard – Next Generation Secure Network Tunnel
دانلود مستقیم ZEROing Trust – Do Zero Trust Approaches Deliver Real Security

 

Platform Security

دانلود نام فایل
دانلود مستقیم A Deep Dive into macOS MDM and How it can be Compromised
دانلود مستقیم A Dive in to Hyper-V Architecture snd Vulnerabilities
دانلود مستقیم Another Flip in the Row
دانلود مستقیم Behind the Speculative Curtain – The True Story of Fighting Meltdown and Spectre
دانلود مستقیم Detecting Malicious Cloud Account Behavior – A Look at the New Native Platform Capabilities
دانلود مستقیم Hardening Hyper-V through Offensive Security Research
دانلود مستقیم Mainframe zOS Reverse Engineering and Exploit Development
دانلود مستقیم Meltdown – Basics Details Consequences
دانلود مستقیم Remotely Attacking System Firmware
دانلود مستقیم The Windows Notification Facility – Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
دانلود مستقیم WebAssembly – A New World of Native Exploits on the Browser
دانلود مستقیم Why so Spurious – How a Highly Error-Prone x86 x64 CPU Feature can be Abused
دانلود مستقیم Wrangling with the Ghost – An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
دانلود مستقیم ZEROing Trust – Do Zero Trust Approaches Deliver Real Security

 

Policy

دانلود نام فایل
دانلود مستقیم Demystifying PTSD in the Cybersecurity Environment
دانلود مستقیم From Bot to Robot – How Abilities and Law Change with Physicality
دانلود مستقیم How I Learned to Stop Worrying and Love the SBOM
دانلود مستقیم New Norms and Policies in Cyber-Diplomacy

 

Pwnie Awards

دانلود نام فایل
دانلود مستقیم Pwnie Awards

 

Reverse Engineering

دانلود نام فایل
دانلود مستقیم A Brief History of Mitigation – The Path to EL1 in iOS 11
دانلود مستقیم A Dive in to Hyper-V Architecture anf Vulnerabilities
دانلود مستقیم Attacking Client-Side JIT Compilers
دانلود مستقیم Decompiler Internals – Microcode
دانلود مستقیم Finding Xori – Malware Analysis Triage with Automated Disassembly
دانلود مستقیم Last Call for SATCOM Security
دانلود مستقیم Malware Analysts vs Malware Authors
دانلود مستقیم Miasm2 – Reverse Engineering Framework
دانلود مستقیم Reversing a Japanese Wireless SD Card – From Zero to Code Execution
دانلود مستقیم The Windows Notification Facility – Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet
دانلود مستقیم There will be Glitches – Extracting and Analyzing Automotive Firmware Efficiently
دانلود مستقیم Windows Offender – Reverse Engineering Windows Defenders Antivirus Emulator

 

Security Development Lifecycle

دانلود نام فایل
دانلود مستقیم SDL for the Rest of Us – Getting Started with Software Security
دانلود مستقیم Threat Modeling in 2018 – Attacks Impacts and Other Updates.mp4Reverse Engineering Windows Defenders Antivirus Emulator

 

Smart Grid

دانلود نام فایل
دانلود مستقیم Deep Dive into an ICS Firewall Looking for the Fire Hole

 

Web AppSec

دانلود نام فایل
دانلود مستقیم Practical Web Cache Poisoning – Redefining Unexploitable
اگر شما نیز به رشد دانش خود و به اشتراک گزاری آن با دیگران علاقه مندید می توانید به ما بپیوندید

ارسال یک نظر

آدرس ایمیل شما منتشر نخواهد شد.

این سایت از اکیسمت برای کاهش هرزنامه استفاده می کند. بیاموزید که چگونه اطلاعات دیدگاه های شما پردازش می‌شوند.