Selling 0-Days to Governments and Offensive Security Companies
Selling 0-days is a fascinating process that not a lot of people are familiar with. This talk will discuss a vulnerability brokerage company called Q-recon and provide a glimpse of how this market works. In the presentation, questions will be answered from three different angles: researcher, broker and client
By Maor Shwartz
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#selling--days-to-governments-and-offensive-security-companies-14453
Видео Selling 0-Days to Governments and Offensive Security Companies канала Black Hat
By Maor Shwartz
Full Abstract & Presentation Materials: https://www.blackhat.com/us-19/briefings/schedule/#selling--days-to-governments-and-offensive-security-companies-14453
Видео Selling 0-Days to Governments and Offensive Security Companies канала Black Hat
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
CQTools: The New Ultimate Hacking ToolkitThe Memory Sinkhole - Unleashing An X86 Design Flaw Allowing Universal Privilege Escalation35C3 - From Zero to Zero DayCracking the Lens: Targeting HTTP's Hidden Attack-SurfaceThe Discovery of a Government Malware and an Unexpected Spy ScandalGhidra - Journey from Classified NSA Tool to Open SourceCyber Insecurity: Why You Are The Vulnerability | John LaCour | TEDxCharlestonRisk, vulnerability, and resilienceUnveiling the Underground World of Anti-CheatsOffensive Security's OSCP Certificate - My Journey & Review0-Day Exploit Bidding WarMobile Network Hacking, IP EditionOchko123 - How the Feds Caught Russian Mega-Carder Roman SeleznevHackadayU: Reverse Engineering with Ghidra Class 1GDPArrrrr: Using Privacy Laws to Steal IdentitiesTop Five Emerging Cybersecurity Challenges | Srini Sampalli | TEDxDalhousieUReverse Engineering WhatsApp Encryption for Chat Manipulation and MoreUnderstanding SCADA's Modbus ProtocolTop 3 Certifications for Landing an Ethical Hacking Job