Black Hat
2024, A Space Hacking Odyssey
Sure, maybe you've hacked the planet, but how about hacking off planet? The final frontier has been designated as critical infrastructure. Satellites and other space systems are an integral part of our daily lives from navigation to communications, financial transactions, and national security. Cybersecurity for these assets is environmentally and ...
2024, A Space Hacking Odyssey [2100]
Sure, maybe you've hacked the planet, but how about hacking off planet? The final frontier has been designated as critical infrastructure. Satellites and other space systems are an integral part of our daily lives from navigation to communications, financial transactions, and national security. Cybersecurity for these assets is environmentally and ...
360° Ransomware Response: Detection, Negotiation, Recovery, and Prevention
Learn to respond to ransomware effectively and efficiently. In this hands-on boot camp, we'll show you a comprehensive approach to ransomware response, covering key aspects such as early detection, negotiation tactics, and decryption challenges. We'll analyze the latest ransomware strains and learn about evolving detection strategies. Then we'll ...
5G infrastructure Attacking and Defense
As the world gears up for the imminent arrival of 5G technology, the future looks bright and full of promise. The early adopters have already conducted successful test deployments and market adoption is on the rise. Operators are eagerly preparing for a massive rollout, eager to take advantage of the cutting-edge technology.But with great power comes ...802.11 Unplugged: Modern Wi-Fi Hacking
If you want to learn how to understand and compromise Wi-Fi networks, this is your course.
Key Points:Foundations of wireless network technologies
How to approach wireless network exploitation when facing obstacles
New approaches and tooling in the Wi-Fi hacking field
If ...A Basic Guide to Bug Hunting with Ghidra
Discover the art of uncovering vulnerabilities without the aid of source code or commercial tooling. This class is a deep-dive on how to use open source tools to shed light on closed source binaries. We will cover how bug hunters use free tools like Ghidra, AFL, QEMU, Frida, and GDB, to find exploitable bugs in modern software. Students will be introduced ...
A Beginner's Guide to Reversing with Ghidra (v10/2022 Edition)
Since 2019, the NSA's software reverse engineering toolkit, Ghidra, has made powerful multi-architecture/multi-platform decompilation capabilities freely available. Join us for an introduction to Ghidra and a series of incremental challenges to build up hands-on experience. Students will learn how to navigate Ghidra, analyze binaries, and use integrated ...A Beginner's Guide to Reversing with Ghidra (v10/2022 Edition)
Since 2019, the NSA's software reverse engineering toolkit, Ghidra, has made powerful multi-architecture/multi-platform decompilation capabilities freely available. Join us for an introduction to Ghidra and a series of incremental challenges to build up hands-on experience. Students will learn how to navigate Ghidra, analyze binaries, and use integrated ...A Beginner's Guide To Threat Hunting: How to Shift Focus from IOCs to Behaviors and TTPs
This course is designed to provide the students with hands-on experience in behavioral threat hunting. This includes covering common models and how they relate to threat hunting, how to operationalize an intel report focusing on tactics, techniques, and procedures (TTPs), how to leverage intelligence to initiate and conduct a hunt, data pivoting ...
A Beginners Guide To Reversing With Ghidra
Since 2019, the NSA's software reverse engineering toolkit, Ghidra, has made powerful multi-architecture/multi-platform decompilation capabilities freely available. Join us for an introduction to Ghidra and a series of incremental challenges to build up hands-on experience. Students will learn how to navigate Ghidra, analyze binaries, and use integrated ...