EDR = Erase Data Remotely, By Cooking An Unforgettable (Byte) Signature Dish Published 2024-01-30 Download video MP4 360p Download video MP4 720p Recommendations 31:44 You Can Run, but You Can't Hide - Finding the Footprints of Hidden Shellcode 37:54 All You Need is Guest 38:03 The Black Hat Europe Network Operations Center (NOC) Report 41:03 Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater 17:47 Installing Linux Like It's 1992 1:18:10 License to Kill: Malware Hunting with the Sysinternals Tools 39:50 Off The Record - Weaponizing DHCP DNS Dynamic Updates 13:19 What is Endpoint Detection and Response (EDR)? 35:22 The Pool Party You Will Never Forget: New Process Injection Techniques Using Windows Thread Pools 25:11 Black Hat 2013 - OPSEC Failures of Spies 37:52 Dirty Vanity: A New Approach to Code Injection & EDR Bypass 1:07:39 Docker Crash Course for Absolute Beginners [NEW] 37:59 Alice in Kernel Land: Lessons Learned From the eBPF Rabbit Hole 30:14 One Million ASUS Routers Under Control: Exploiting ASUS DDNS to MITM Admin Credentials 41:02 Keynote: Industrialising Cyber Defence in an Asymmetric World 40:27 Something Rotten in the State of Data Centers 44:30 The Magnetic Pull of Mutable Protection: Worked Examples in Cryptographic Agility 36:13 When The Front Door Becomes a Backdoor: The Security Paradox of OSDP 28:23 A World-View of IP Spoofing in L4 Volumetric DoS Attacks - and a Call to Enable BCP38 08:54 What is XDR vs EDR vs MDR? Breaking down Extended Detection and Response