Hacking and InfoSec stuff
1,082
1.1K
May 5, 2022
05/22
May 5, 2022
by
Black Hat Ethical Hacking
movies
eye 1,082
favorite 6
comment 1
by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
Android applications are becoming more and more obfuscated to prevent reverse engineering. The purpose of this talk is to present dynamic binary instrumentation techniques that can help reverse engineers to deal with obfuscated codes... By: Romain Thomas Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#dynamic-binary-instrumentation-techniques-to-address-native-code-obfuscation-18309 Source: https://www.youtube.com/watch?v=MRku-2fW42w Uploader:...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Travel & Events
لمزيد من المعلومات عن الحق في الخصوصية، برجاء الدخول على privacyinternational.org Source: https://www.youtube.com/watch?v=sjhvauht71A Uploader: Privacy International
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
The fourth episode of the Zcash Show & Tell series will feature two Zcash Company engineers Ariel Gabizon and Jay Graber who have been working on an implementation of XCAT (cross-chain atomic trades) between Zcash and Bitcoin. Atomic cross-chain trading is a concept that has been floating around in the cryptocurrency space for a while now and the work Zcash Company has been doing on XCAT is shaping up to be the first implementation for trades with ZEC and BTC (and eventually ETH). Each Show...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, zcash, xcat, cryptocurrencies, trading, decentralized,...
This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=QML9a_No0Qo Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
We discuss Corporate Ransomware, The TikTok Ban, Dream Homes, Dieting & Workouts, How We Got Started In Infosec + Career Advice, Drovorub Malware, Hacking Us... Source: https://www.youtube.com/watch?v=Tiphi0YNzz8 Uploader: MalwareTech
Topics: Youtube, video
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=ac0MkSkPBcM Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Ron Woerner, President / Chief Trusted Advisor, RWX Security Solutions, LLC This rapid-fire presentation, an update from the hugely popular 2018 talk, will showcase apps used in cybersecurity testing, investigations, administration and just day-to-day work. You’ll experience advanced techniques using security tools such as Kali Linux, Windows SysInternals Suite, VMWare, Wireshark, NMAP and many more. You will get many tricks and techniques to optimize their use based on your need.Learning...
Topics: RSAC, RSA2019, RSA
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=e_rwG7MA5VU Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
It's not just home users that are susceptible to targeted attacks, companies are too! In this webcast, our experts will tell you what you can do to protect your corporate network against them. Source: https://www.youtube.com/watch?v=RaQfuQ4j8RE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab, Lab Matters, Targeted Attacks, Corporate...
A talk about privacy, identity, surveillance, hierarchies and the future of network-centric private and secure money. Source: https://www.youtube.com/watch?v=Vcvl5piGlYg Uploader: aantonop Upload date: 2016-04-12
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Every year, internet censorship increases globally. From network level blocking to nation-wide internet blackouts, governments and private companies have powerful tools to restrict information and hault connection between people. Many people, groups, and organizations are doing innovative work to study, measure, and fight back against internet censorship--and they are helping millions of people connect more regularly and safely to the internet. Despite these successes, we're faced with...
Topics: Youtube, video, Nonprofits & Activism
In this edition of the Lab Matters webcast, malware researcher Tillman Werner and Ryan Naraine discuss the ongoing battle to control the Conficker botnet and the need for the computer security industry to consider newer approaches to mitigating the botnet epidemic. Source: https://www.youtube.com/watch?v=azuLgVUafL4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, mitigating botnets, Conficker, law enforcement, Ryan...
Last year exhibited an unusual mix of consistency amongst general trends and completely unexpected milestone events. Against the background hum of leftover Kido infections, targeted attacks on corporations and industrial enterprises reached an unexpected place in the limelight with Aurora and Stuxnet. This year will present a new class of organizers with a new aim - steal everything. Their methods will include an even "greedier" class of malware - spyware 2.0. The increased volume of...
Topics: Youtube, video, Science & Technology, cyberthreat landscape, Kido, Aurora, Stuxnet, spyware...
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=sQMm4w23mhw Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=t4caEr9hh98 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Source: https://www.youtube.com/watch?v=x7DEdCh7trU Uploader: Georgia Weidman
Topics: Youtube, video, Education
by Roman Unuchek A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=6v4mPCQAmQU Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=7FeiZQ2BkiA Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Kaspersky Lab's CTO, Nikolay Grebennikov, joins Ryan Naraine to discuss the evolution of anti-malware software. Grebennikov talks about the changing face of the malicious threat facing desktop users and the additional components added to Kaspersky's anti-malware products to move beyond signature-based detection of threats. He goes into detail about heuristics and emulation, behavior-based detection and newer proactive technologies to handle real-time malware detection. Source:...
Topics: Youtube, video, Science & Technology, anti-malware, software, evolution, malicious threat,...
Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
Google Python Class Day 1 Part 2: Lists, Sorting, and Tuples. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=EPYupizJYQI Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
The second episode of the Zcash Show & Tell series will feature whyrusleeping who has created zmsg, a small program for sending messages via zcash encrypted memo fields. (https://github.com/whyrusleeping/zmsg) zmsg uses the encrypted memo field of zcash shielded transactions to send messages to other parties. The sent messages get stored in the zcash blockchain and the recipient can check for messages at any time (no need to be online at the same time). Since the messages get stored in the...
Topics: Youtube, video, Science & Technology, zcash, cryptocurrency, encryption, memo field,...
Note: The audio cuts out at 5:42 and doesn't pick up again until 10:32. It's like this in the source material. Sorry for the inconvenience. We don’t need a Cyber Moonshot; we’ve got enough already. Computing technology is enabling multiple concurrent revolutions, in biotechnology, manufacturing, robotics, AI, and literal rocket engineering. These are our Moonshots, fueled by governments, companies, and tinkerers, powering the growth engine of the global economy and reshaping society. Our...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, firetalks
From the quest for digital money and history of Bitcoin, to the emergence of Ethereum and smart contracts, this short presentation from Linda Xie (co-founder and managing director of Scalar Capital, and former product manager at Coinbase) covers a practical introduction and tour through key terms and concepts in the crypto(currencies, tokens, networks) space. The talk was given at a16z's annual innovation summit, which features invited speakers from various organizations discussing innovation...
Topics: Youtube, video, Science & Technology, crypto, cryptocurrencies, ethereum, bitcoin
How to Use QR Codes to Hack Mobile Phones & Scanners Full Tutorial: https://nulb.app/x4l5g Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie QR Codes are a fun way of scanning information with your mobile device on the go. However, this popular technique can be taken advantage of and used to inject malicious code and commands by a knowledgeable hacker. On this episode of Cyber Weapons Lab, we'll introduce you to a malicious QR code generator called...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Use an RPi for Monitor Mode Without an External Adapter Full Tutorial: http://bit.ly/MMforPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is already a powerful device perfect for on-the-go hacking or war driving. But up until recently, no Pi has been capable of being put into monitor mode or achieve packet injection without a wireless adapter. We'll show you how you can update your Pi to make it an all-in-one hacking device on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Today we take a look at OSINT and how it can be used to glean unintended information from a photo. Big thanks to Ryan and Michael for letting me cover their content. Ryan: https://twitter.com/RyansNotAHacker Michael: https://twitter.com/The4rchangel Twitter thread this video is based on: https://twitter.com/RyansNotAHacker/status/1221611299726979072 The OSINT Framework: https://osintframework.com/ Source: https://www.youtube.com/watch?v=Uud6xapckXk Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
How to Set Up the Ultimate Beginner Arch Linux Hacking Distro Full Tutorial: https://nulb.app/x48dr Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is usually the go-to hacker OS for beginners because of how straightforward it is to use and it's large community of support. Arch Linux is generally used by more advanced users looking for a more minimalistic experience that's still powerful. Today, on this episode of Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Use Android & Raspberry Pi for Local Voice Comms Full Tutorial: https://nulb.app/x6vtu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 163 It can be difficult to communicate off the grid when there's no infrastructure. That's also true when you're in situations where there is no cellular service or reliable Wi-Fi hotspots, such as a convoy...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
In this newest edition of Lab Matters, Director of Kaspersky Lab's Global Research and Analysis Team Costin Raiu offers some predictions about what we will see in the second half of 2011. Raiu's predictions include a surge in malicious activity on mobile device app stores. Source: https://www.youtube.com/watch?v=mfMSBzi25SE Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, malicious activity, predictions 2011, Android, Costin...
Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=n6xSpIE-lSQ Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip3
Unrestricted Warfare on Campus: Chinese Information Operations and American Higher Education CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Lauren Cooper, Carnegie Mellon University CERT Recording Sponsored by RiskIQ American colleges and universities serve as reliable sources of both cutting edge research and earnest idealism, and this combination has not gone unnoticed by intelligence and security services from around the world. China, in particular, has been targeting American...
Topics: Youtube, video, People & Blogs
How to Manage Code on Your Local Repo with Git Full Tutorial: http://bit.ly/GitTut Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Most hackers will write some code at some point or other. Knowing how to manage that code in a local repository is an important aspect to software development. Today, we'll show you how to perform basic tasks with Git on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
John Lambert /Microsoft We've heard that attackers have all the advantages. Defenders are too slow, too disorganized, and too far behind the curve. The physics of cyber favor the offense. Today's modern defenders are changing all of this. The world is in transition and the playbook for network defense is being re- rewritten as a new set of forces take hold. Modern defenders are harnessing the cloud to store data volumes that were economically out-of-reach just a few years ago. Attacker's opsec...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab
How to Test a Wireless Network Card for Kali Linux Compatibility Full Tutorial: http://bit.ly/MmAndPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux doesn't work with all wireless network adapters on the market. Aside from chipset compatibility, one needs their adapter to be able to be put into monitor mode as well as perform packet injection. Today, we'll guide you through the selection process and show you how to test for these features...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hello Everyone, Part 3 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
by Trey Ford A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=bAv3Whgw5PI Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
How to Create a Test Hacking Computer with a Raspberry Pi Full Tutorial: http://bit.ly/DV-Pi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Every hacker needs to practice their skills, and finding a vulnerable device can be pretty hit and miss. In this video, we'll show you how to turn a Raspberry Pi into a deliberately vulnerable server for all your hacking needs on this episode of Cyber Weapons Lab. Recommended Raspberry Pi Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
In this video we take a look at one of my newest creations, a half door which has hot swappable hardware for quick and easy under door tool practice for a variety of situations. Link to my dimensional sketches: https://drive.google.com/file/d/1pJbsdbja5GzQf9Tg2pgc6Rech9ivRYP7/view?usp=sharing Source: https://www.youtube.com/watch?v=hUTm8pk4g6g Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Google Python Class Day 2 Part 1: Regular Expressions. By Nick Parlante. Support materials and exercises: http://code.google.com/edu/languages/google-python-class Source: https://www.youtube.com/watch?v=kWyoYtvJpe4 Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, language, python, tutorial
Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
The HTTP Alternative Services header (Alt-Svc, RFC 7838) was introduced in 2013 by seasoned developers with good intentions in a bid to streamline load balancing, protocol optimizations, and client segmentation... By: David Starobinski, Trishita Tiwari & Ari Trachtenberg Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#the-evil-alt-ego-abusing-http-alternative-services-18822 Source: https://www.youtube.com/watch?v=u-PVpQ2xr-I Uploader: Black...
Topics: Youtube, video, Travel & Events
Today we take a look at how we can use the credentials we received from the ESPKey in the previous video to then clone to a new card to have persistent access. Purchase the Proxmark3: https://redteamtools.com/Proxmark3-RDV4.0 Purchase the ESPKey: https://redteamtools.com/espkey Source: https://www.youtube.com/watch?v=vfRC-ijIg6s Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Jay Beale, CTO, COO, InGuardians Adam Crompton, Senior Security Analyst, InGuardians With microservices’ rise, Kubernetes gain adopters every day. It’s time for information security specialists to learn how to attack and defend container orchestration systems. This talk will demonstrate attacks on Kubernetes clusters, then defenses that break those attacks. Attendees will be able to download the cluster used in the demos, as well as the YAML files used to break the attacks.Learning...
Topics: RSAC, RSA2019, RSA
Cyberpunk is a science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983. I compiled all five parts into one. If you're a fan of the genre, please check out our other videos and music. WWW.FUTANT.NET Source: https://www.youtube.com/watch?v=wbp6G8do2_E Uploader: FUTANTCOLLECTIVE
Topics: Youtube, video, Education, Futant, Dystopia, Psychedelic, Electronica, Timothy Leary, Cyberpunk,...
How to Run Kali Linux on any Android Device Without Rooting Full Tutorial: http://bit.ly/KaliAndroid Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie For a beginner, Kali Linux is the best OS to learn simple hacking tools on, but not everyone has access to a machine that can run it. However, with over 2 billion Android smartphones around the world, chances are you already have a device capable of running Kali. Today, we'll show you how to download and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
In this video I take you through how I was able to use nothing more than a bag of fast food to get into a restricted-access facility. Source: https://www.youtube.com/watch?v=zgcP_mj9dJE Uploader: TheNotSoCivilEngr
Topics: Youtube, video, Education, lock, lockpicking, pentesting, physical penetration testing, picking,...
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-FZ2f1S_7mQ Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Sergey Gordeychik, Positive Hack Days A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=FreoHdDCe8o Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Infosec 1930 CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Thomas Rid, Johns Hopkins SAIS Recording Sponsored by RiskIQ SAVE THE DATE FOR CYBERWARCON 2! November 21, 2019 Arlington, Virginia Source: https://www.youtube.com/watch?v=Fx5od5ucQao Uploader: CYBERWARCON
Topics: Youtube, video, People & Blogs
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-IXJ7Q01gpY Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Join us for the (virtual) State of the Onion at on Nov 16, 2020 @ 16:00 - 18:00 UTC.* Resist the surveillance pandemic, support Tor: https://donate.torproject.org The Tor Project is building usable free software to fight surveillance and censorship across the globe. In this talk we'll give an update on what we got up to during 2020, what happened in the wider Tor ecosystem, and what lies ahead of us. https://blog.torproject.org/state-of-the-onion-2020 Source:...
Topics: Youtube, video, Entertainment
Kaspersky Lab is paying a lot of attention to IT security education & literacy development sharing its knowledge & experience actively through its educational program "Kaspersky Academy" which offers unique opportunities for students & young professionals to improve their knowledge of IT security, gain new experience and communicate with industry experts, realize their scientific potential as well as get exciting career opportunities & open the door to the professional...
Topics: Youtube, video, Science & Technology, Kaspersky Academy, IT Security, education, Ram...
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=Y99ry-m5R9I Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
In this video we take a look at EXIF data and how we can use it to learn more about the contents of a photo. Unfortunately after about a month the facebook profile was deleted by facebook, as a result the challenge is no longer active. Source: https://www.youtube.com/watch?v=RRViySt-T4c Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
In this video we will take a look at using retractable key ring holders as UDT strings, something which I first introduced in video #2 and which I have since improved upon. Source: https://www.youtube.com/watch?v=EB0LLO_Dvpo Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs
Zulfikar Ramzan, Ph.D., Chief Technology Officer, RSA Whitfield Diffie, Cryptographer and Security Expert, Cryptomathic Shafi Goldwasser, Director, Simons Institute for the Theory of Computing Paul Kocher, Independent Tal Rabin, Distinguished Researcher and the Manager of the Cryptographic Research Group, IBM Research Ronald Rivest, Professor, Massachusetts Institute of Technology Humans have been using cryptographic techniques since the dawn of time to safeguard their data and achieve...
Topics: RSAC, RSA2019, RSA
Git is a widely-used Version Control System for software development projects. Because of the way Git works, “deleted” secrets don’t disappear from the filesystem. That means when a developer commits encryption keys, production passwords, or other secrets to the repository, removing them in a later commit won’t scrub them from the history. They live on in compressed plaintext on every developers’ machine, unless the history is rewritten. Grawler is a command line utility written in...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, AWS, Git hacking,...
The world is turning… But SAS will always be the same... Tenerife, Spain, February 7-11, 2016. #TheSAS2016 Source: https://www.youtube.com/watch?v=zbXpQyZRi8o Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2016, Kaspersky Lab (Business Operation),...
Hackerspace Design Patterns 2.0 The presentation of the Hackerspace Design Patterns at CCCamp 2007 / 24C3 started the international hackerspace movement! These patterns described what has worked well, and not worked well, for the 40 or so hackerspaces existing at the time. Now that over 2,000 have blossomed all over the planet, it is time to add Patterns from this collective experience. In 2007 there were about 40 hackerspaces in the world, mostly in Germany. From their research of what worked...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Inbar Raz PerimeterX First, there was the perimeter. Then came the the firewall, the IPS and sandboxing. More and more tools were being used to look at the traffic coming into the organization from the Internet, and eventually also traffic going out. But all that didn’t help, and soon enough it was clear that guarding the gate was just not going to be enough and the attackers were going to get it, one way or another. Prevention, equal to the Border Police, has failed. Then, came the premises....
Topics: Youtube, video, Science & Technology
Source: https://www.youtube.com/watch?v=0xhC3n4CDrs Uploader: BSides Belfast
Topics: Youtube, video, Education
by Artem Semenchenko A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=4aVihpUFqiY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=6O8LTwVfTVs Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Help us make 2015 a great year for privacy, anonymity, and censorship resistance! https://www.torproject.org/donate/donate.html.en Your support is critical to our success. The Tor Project is a US 501(c)(3) non-profit dedicated to research, development, and education about online anonymity and privacy. Donations to The Tor Project may be tax deductible to persons who are in the US; or who pay taxes in countries with reciprocity with the US on charitable donations. Source:...
Topics: Youtube, video, Nonprofits & Activism
https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=Djv2R2muHCg Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=K0EOPddWpsE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Source: https://www.youtube.com/watch?v=6K5EWHGPxXE Uploader: Georgia Weidman
Topics: Youtube, video, Education
USBdriveby (http://samy.pl/usbdriveby) is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks. It also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings,...
Topics: Youtube, video, Science & Technology, hacking, usbdriveby, samy kamkar, reverse engineering,...
Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, fraud or third party interference. Ethereum is how the Internet was supposed to work: it's a censorship-proof planetary scale computer, where users always stay in control of their funds and personal data. Ethereum was crowdfunded during August 2014 by fans all around the world. It is developed by ETH/DEV with contributions from great minds across the...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, dapp, decentralization
by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=ja60U2K5dsk Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, maltego, hacking, mr...