| | Cellular Exploit on a Global Scale: The Rise and Fall of the Control Protocol [pdf] (blackhat.com) |
|
1 point by CHEF-KOCH 46 days ago | past
|
| | Black Hat 2024: Secure Shells in Shambles [pdf] (blackhat.com) |
|
101 points by hdmoore 3 months ago | past | 30 comments
|
| | Are Your Backups Still Immutable, Even Though You Can't Access Them? (blackhat.com) |
|
1 point by gnabgib 3 months ago | past
|
| | All Your Secrets Belong to Us: Leveraging Firmware Bugs to Break Tees (blackhat.com) |
|
1 point by gnabgib 3 months ago | past
|
| | Breaching AWS Accounts Through Shadow Resources (blackhat.com) |
|
2 points by gnabgib 3 months ago | past
|
| | Bitsquatting – DNS Hijacking without Exploitation [pdf] (blackhat.com) |
|
1 point by todsacerdoti 6 months ago | past
|
| | Ovpnx: Zero-Days Leading to RCE, LPE and KCE Affecting Endpoints (blackhat.com) |
|
1 point by choult 6 months ago | past | 1 comment
|
| | LLM4Shell: Exploiting RCE Vulnerabilities in LLM-Integrated Frameworks and Apps (blackhat.com) |
|
1 point by jviide 6 months ago | past
|
| | Fixing/Making Holes in Binaries [pdf] (blackhat.com) |
|
2 points by alexahn on Oct 23, 2023 | past
|
| | The Art of Rooting Android Devices by GPU MMU Features [pdf] (blackhat.com) |
|
2 points by skilled on Aug 16, 2023 | past | 1 comment
|
| | Unsafe at Any Speed: CISA's Plan to Foster Tech Ecosystem Security (blackhat.com) |
|
1 point by pjmlp on Aug 15, 2023 | past
|
| | Diving into Windows Remote Access Service for Pre-Auth Bugs (blackhat.com) |
|
1 point by rmason on Aug 11, 2023 | past
|
| | Passive Fingerprinting of HTTP/2 Client (2017) [pdf] (blackhat.com) |
|
2 points by 8organicbits on April 19, 2023 | past
|
| | Make Redirection Evil Again: URL Parser Issues in OAuth (2013) [pdf] (blackhat.com) |
|
1 point by mooreds on March 8, 2023 | past
|
| | Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com) |
|
2 points by Tomte on Jan 20, 2023 | past
|
| | Even the LastPass will be stolen, deal with it (2015) [pdf] (blackhat.com) |
|
43 points by kl343 on Dec 25, 2022 | past | 21 comments
|
| | Compromising CI for Backdoors [pdf] (blackhat.com) |
|
3 points by vmoore on Oct 2, 2022 | past | 1 comment
|
| | Detecting Fake 4G Base Stations in Real Time (2020) [pdf] (blackhat.com) |
|
85 points by walterbell on July 26, 2022 | past | 17 comments
|
| | Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com) |
|
2 points by Tomte on May 30, 2022 | past
|
| | Managing and Understanding Entropy Usage (2015) [pdf] (blackhat.com) |
|
1 point by Tomte on May 2, 2022 | past
|
| | Hacking chemical plants for competition and extortion (2015) [pdf] (blackhat.com) |
|
1 point by Tomte on April 26, 2022 | past
|
| | 2021: A Titan M Odyssey [pdf] (blackhat.com) |
|
54 points by todsacerdoti on April 12, 2022 | past | 7 comments
|
| | How to hack SPF, DKIM и DMARC [pdf] (blackhat.com) |
|
3 points by sam_lowry_ on Feb 9, 2022 | past
|
| | Attacks on Email Sender Authentication (blackhat.com) |
|
85 points by _wldu on Jan 15, 2022 | past | 13 comments
|
| | HPE iLO5 Firmware Security – Go Home Cryptoprocessor, You're Drunk (blackhat.com) |
|
1 point by fulafel on Dec 15, 2021 | past
|
| | Apple Neural Engine Internal: From ML Algorithm to HW Registers (blackhat.com) |
|
126 points by blopeur on Dec 8, 2021 | past | 63 comments
|
| | Intel Visa: Through the Rabbit Hole (2019) [pdf] (blackhat.com) |
|
2 points by Tomte on Sept 19, 2021 | past
|
| | Managing and Understanding Entropy Usage [pdf] (blackhat.com) |
|
3 points by Tomte on Aug 26, 2021 | past
|
| | Hacking chemical plants for competition and extortion (2015) [pdf] (blackhat.com) |
|
2 points by Tomte on Aug 21, 2021 | past
|
| | Everything has changed in iOS 14, but Jailbreak is eternal [pdf] (blackhat.com) |
|
191 points by clubdorothe on Aug 7, 2021 | past | 64 comments
|
|
|
More |