Black Hat Asia 2024嘉宾演讲PPT合集(共25套打包)

Black Hat Asia 2024嘉宾演讲PPT合集(共25套打包)

更新时间:2024-05-09 报告数量:25份 浏览次数:58

报告合集目录

报告预览

  • 全部
    • Black Hat Asia 2024嘉宾演讲PPT合集
      • Asia-24-Zhou-How-to-Make-Hugging-Face.pdf
      • Asia-24-Ye-One-Flip-Is-All.pdf
      • Asia-24-Stott-The-Fault-in-Our-Metrics.pdf
      • Asia-24-VictorV-Unveiling-the-Cracks-in-Virtualization-Mastering-the-Host-System.pdf
      • Asia-24-Ryu-Voice-Phishing-Syndicates-Unmasked-An-In-Depth-Investigation-and-Exposure.pdf
      • Asia-24-Fitzl-Wojciech-Unlimited-ways-to-bypass-your-macOS-privacy-mechanisms.pdf
      • Asia-24-Pinto-What-The-TrustZone-M-Doesnt-See.pdf
      • Asia-24-Ding-CertifiedDCOM-The-Privilege-Escalation-Journey-to-Domain-Admin.pdf
      • Asia-24-Bernstein-How-to-Get-the-Most-Out-of-the-Python.pdf
      • Asia-24-Beery-BadRandomness.pdf
      • bh-asia-2024-llm4shell.pdf
      • Asia-24-Wood-Confused-Learning.pdf
      • Asia-24-Shupeng-The-Key-to-Remote-compressed.pdf
      • Asia-24-Yair-magicdot-a-hackers-magic-show-of-disappearing-dots-and-spaces.pdf
      • Asia-24-Kim-Operation-PoisonedApple.pdf
      • Asia-24-Singh-ChinasMilitaryCyberOperationsHas.pdf
      • Asia-24-Chen-Chinese-APT.pdf
      • Asia-24-Liu-The-Hole-in-Sandbox.pdf
      • Asia-24-Chudo-Bypassing-Entra-ID-Conditional-Access-Like-APT.pdf
      • Asia-24_Bar-EDREraseDataRemotelyReloaded.pdf
      • Asia-24-Zhou-PrivacyDetective.pdf
      • Asia-24-WeiMinCheng-systemui-as-evilpip-the-hijacking-attacks-on-modern-mobile-devices.pdf
      • Asia-24-Shi-A-Glimpse-Into-The-Protocol.pdf
      • Asia-24-Frielingsdorf-YouShallNotPassAnalysing.pdf
      • Asia-24-Bohannon-CloudConsoleCartographer.pdf
请点击导航文件预览
资源包简介:

1、How to Make Hugging Face to Hug Worms:Discovering and Exploiting Unsafe Pickle.loadsover Pre-Trained Large Model HubsPeng Zhou()Shanghai University1Peng Zhou(zpbrent)Associate Professor at Shanghai U。

2、#BHASIA BlackHatEventsOne Flip is All It Takes:Identifying Syscall-Guard Variables for Data-Only Attacks Speaker:Hengkai YeThe Pennsylvania State UniversityOther Contributors:Hong Hu,Song Liu,Zhechan。

3、The Fault in Our MetricsRethinking How We Measure Detection&ResponseBoD meeting is coming up.Gonna need updated program metrics.Lets chat tomorrowyou got it bossBossmanTeam ChatBoD metrics.what h。

4、Unveiling the Cracks in Virtualization,Mastering the Host SystemVMware Workstation EscapeSpeaker:VictorV#BHASIA BlackHatEventsVMware Workstation Escape TianfuCup2018/2021/2023Zer0Con 2022HITB 2020Hyp。

5、#BHASIA BlackHatEventsVoice Phishing Syndicates Unmasked:An In-Depth Investigation and ExposureSojun Ryu(S2W Inc.),Yeongjae Shin(Ex-S2W Inc.)#BHASIA BlackHatEvents1.Background2.Overview3.Attack infra。

6、#BHASIA BlackHatEventsTHE FINAL*CHAPTERUNLIMITED WAYS TO BYPASS YOUR MACOS PRIVACY MECHANISMSCSABA FITZL&WOJCIECH REGUA#BHASIA BlackHatEventsNSFullUserName()Wojciech Regua Head of Mobile Security。

7、#BHASIA BlackHatEventsWhat the TrustZone-M Doesnt See,theMCU Does Grieve OverLessons Learned from Assessing a Microcontroller TEECristiano Rodrigues|Sandro Pinto,PhD(Centro ALGORITMI/LASI,Universidad。

8、#BHASIA BlackHatEventsCertifiedDCOMThePrivilegeEscalationJourneytoDomainAdminwithDCOMTianze Ding(D1iv3)Tencent Security Xuanwu Lab#BHASIA BlackHatEventsWhoamiTianze Ding(D1iv3)Senior Security Researc。

9、BlackHat Asia 2024/rockygnu.orgBlackHat Asia 2024/rockygnu.org-uncompyle6 and decompyle3:How to Read and Write a High-Level Bytecode Decompiler and:How to Read and Writea High-Level Bytecode Decompil。

10、#BHASIA BlackHatEventsBad Randomness:Protecting Against Cryptographys Perfect CrimeTal Beery,CTO&Co-Founder ZengoCo-Founder,CTO ZenGo20+years cyber security9th time BH Speaker1st time BHASIA spea。

11、#BHASIA BlackHatEventsLLM4Shell:Discovering and Exploiting RCE Vulnerabilities in Real-World LLM-Integrated Frameworks and AppsSpeakers:Tong Liu,Yuekang LiContributors:Zizhuang Deng,Guozhu Meng,Kai C。

12、Confused Learning:Supply Chain Attacks through Machine Learning ModelsThreat IntelligenceDropboxHello!Mary WalkerAdrian Wood Red Team DropboxThrelfallwhitehacksecMairebearmairebearIntroduction01Targe。

13、#BHASIA BlackHatEventsThe Key to Remote Vehicle Control:Autonomous Driving Domain ControllerShupeng Gao,Yingtao Zeng,Yimi Hu,Jie Gao From Baidu Security Lab#BHASIA BlackHatEventsTraditional Cars#BHAS。

14、Security Research Team Lead at SafeBreach6+years in security researchLinux,embedded and some Android research3 years Windows researchCreator of Aikido Wiper,DoubleDriveOr YairAgendaWindows Known Issu。

15、#BHASIA BlackHatEventsOperation PoisonedApple:Tracing Credit Card Information Theft to Payment FraudGyuyeon Kim&Hyunho Cho Financial Security Institute#BHASIA BlackHatEventsWho are we?Senior rese。

16、#BHASIA BlackHatEventsChinas Military Cyber OperationsHas the Strategic Support Force Come of Age?Pukhraj SinghDisclaimerThe views expressed in this presentation are strictly personal,and not of my e。

17、#BHASIA BlackHatEventsChinese APT:A Master of Exploiting Edge DevicesCharles LiGreg Chen#BHASIA BlackHatEventsAgendanExploit Target ChangednCase Study of Weaponized Edge Device nMalware implanted in 。

18、#BHASIA BlackHatEventsThe Hole in Sandbox:The Hole in Sandbox:EscapeEscape Modern WebModern Web-Based App Sandbox From Based App Sandbox From SiteSite-Isolation PerspectiveIsolation PerspectiveBohan 。

19、#BHASIA BlackHatEventsBypassing Bypassing EntraEntra ID Conditional Access Like APTID Conditional Access Like APTA Deep Dive Into Device Authentication Mechanisms for Building Your Own PRT Cookie Spe。

20、EDR=Erase Data RemotelyTomer BarShmuel CohenThis talk is SafeBreachs 15th talk at Black Hat20 years experience in security researchMain focus in APT and vulnerability researchPresented at many global。

21、#BHASIA BlackHatEventsPrivacy DetectivePrivacy DetectiveSniffing Out Your Data Leaks for AndroidAbbie&MeggieAbbie&Meggie#BHASIA BlackHatEventsAbout usAbout usMeggie He,A security researcher a。

22、#BHASIA BlackHatEventsS SystemUIystemUI As As EvilPiPEvilPiPWeiMin Cheng()The Hijacking Attacks on Modern Mobile Device#BHASIA BlackHatEventsWhoAreWeWhoAreWeWeiMin ChengQI-ANXINGithub:MG1937Twitter:M。

23、#BHASIA BlackHatEventsA Glimpse Into The ProtocolFuzz Windows RDP Client For Fun And ProfitYingqi Shi(Mas0nShi),Mingjia Liu(cyberestro),Quan Jin(jq0904)DBAPPSecurity#BHASIA BlackHatEventsAbout UsYing。

24、#BHASIA BlackHatEventsYou Shall not PASSAnalysing a NSO iOS Spyware SampleMatthias Frielingsdorf#BHASIA BlackHatEventsMatthias FrielingsdorfVP of Research at iVerifyiOS Malware&Mobile Device Secu。

25、ASIA 2024Cloud Console CartographerTapping Into Mapping Slogging Thru LoggingIntroductionCloud Logs for DefendersPROBLEM:Noisy Console LogsSOLUTION:Mapping for ClarityTool Demo+ReleaseANDI AHMETIASSO。

展开阅读全文
客服
商务合作
小程序
服务号