Overview
Syllabus
Intro
black hat Disclaimer
black hat Introduction
black hat Trading software
black hat Unencrypted comms
black hat Denial of Service
black hat Trading languages supporting DLL imports
black hat Passwords stored unencrypted
black hat Trading data stored unencrypted
black hat Weak password policies
black hat Authentication
black hat Session still valid after logout
black hat Privacy mode
black hat Hardcoded secrets
black hat Anti-exploitation mitigations
black hat Root detection
black hat Other weaknesses
black hat Responsible disclosure
black hat Regulators
black hat Rating organizations
black hat Recommendations
black hat Black Hat Sound Bytes
Taught by
Black Hat