Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
Prior Page
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
movies

eye 109

favorite 1

comment 0

In this video we take a look at Bellingcat's online investigation toolkit and how we can use it to enhance our OSINT investigations. The toolkit: https://docs.google.com/document/d/1BfLPJpRtyq4RFtHJoNpvWQjmGnyVkfE2HYoICKOGguA/edit# Article on Maritime OSINT techniques: https://medium.com/@raebaker/osint-on-the-ocean-maritime-intelligence-gathering-techniques-2ee39e554fe1 LicensePlateMania: https://www.licenseplatemania.com/ Source: https://www.youtube.com/watch?v=WBx0fo_9meE Uploader:...
Topics: Youtube, video, Education, pentesting, physical penetration testing, picking, lock picking, attack,...
Hacking and InfoSec stuff
by a16z
movies

eye 61

favorite 1

comment 0

What is a medicine, really? From the days of aspirin from willow bark, medicine is as old as humanity itself: something humans have been discovering, designing, and creating for ages to help heal ourselves. But now, thanks to technology, we’re entering an entirely new age where the very definition of what a medicine is, is changing. In this talk given at a16z’s annual Summit event, Jorge Conde — general partner on the bio fund at Andreessen Horowitz — talks about how we are now...
Topics: Youtube, video, Science & Technology, biology, medicine, health, healthcare, gene therapy,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 34

favorite 0

comment 0

Koldo Valle Garcia, Elecnor Group; Lorenzo Martinez, Securízame A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=acUnNQ-AuJY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 290

favorite 2

comment 0

Kody's Twitter: https://twitter.com/KodyKinzie Use of Wi-Fi is incredibly widespread in 2017. In the city of Los Angeles alone, there are hundreds of thousands of wireless networks, many of which touch critical infrastructure. Kody Kinzie is a CS student researching Wi-Fi security, and the tactics people use to hack it. He explains the tactics currently used to break or bypass the technology that makes Wi-Fi secure, and the motivations behind groups who hack Wi-Fi in 2017. For more, check out:...
Topics: Youtube, video, People & Blogs, wifi, hacking, lindset, null byte, nullbyte, pasadena computer...
Hacking and InfoSec stuff
movies

eye 233

favorite 2

comment 0

KeySweeper (http://samy.pl/keysweeper) is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboards (using proprietary 2.4GHz RF) in the area. Keystrokes are sent back to the KeySweeper operator over the Internet via an optional GSM chip, or can be stored on a flash chip and delivered wirelessly when a secondary KeySweeper device comes...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, keysweeper, microsot,...
Hacking and InfoSec stuff
movies

eye 83

favorite 0

comment 0

Fluxion Can Be Used to Obtain Wi-Fi Passwords Full Video: https://nulb.app/x43re Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 092 (Recut - Partial Episode) There are several tools out there available to hackers and pentesters for hacking Wi-Fi networks. Many of them involve targeting the encryption in an attempt to crack the password. Others, however, bypass that entirely by employing a social engineering attack to get...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 72

favorite 0

comment 0

EvilOSX Lets Hackers Hijack MacOS Machines Full Video: https://nulb.app/x47ch Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 096 (Recut - Partial Episode) While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll show you how a hacker or pentester could...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 45

favorite 1

comment 0

Vitaly Kamluk, Principal Security Researcher, Global Research and Analysis Team (GReAT) shows a secret side of #YARA that many would think is not possible. #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=fbidgtOXvc0 Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, SAS, Security Analyst Conference, Yara, KASPERSKY LAB, cyber...
How to Boot Up Multiple Operating Systems on a Raspberry Pi Full Tutorial: http://bit.ly/BerryBootPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is an incredibly versatile device capable of running various operating systems. Trying a new OS can be cumbersome without the ability store more than one per Pi. In this video, we'll show you how to boot multiple OS's using BerryBoot on this episode of Cyber Weapons Lab. Recommended...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 403

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=mLxOVWQhEZ0 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, owasp, zap, nikto, w3af, blackhatethicalhacking, black hat ethical...
Hacking and InfoSec stuff
by Google Students
movies

eye 877

favorite 5

comment 0

The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators, metaclasses, reference-counting and the...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
movies

eye 189

favorite 1

comment 0

Tor: Hidden Services and Deanonymisation This talk presents the results from what we believe to be one of the largest studies into Tor Hidden Services (The Darknet) to date. There is no public list of onion addresses available; instead, over a period of 6 months, we ran a large number of Tor relays to infiltrate the Distributed Hash Table which Hidden Services publish to. From this, we were able to collect the list of Tor onion addresses AND the number of requests for each site (e.g. loosely...
Topics: Youtube, video, Education, 31c3, CCC, Chaos Computer Club, Lecture, Tor (Software), Hacking,...
Hacking and InfoSec stuff
movies

eye 170

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=io3Z0ztRk1M Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethical hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
movies

eye 74

favorite 0

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com/courses/ ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
movies

eye 73

favorite 0

comment 0

How to Find Vulnerable Devices Online with Shodan Full Tutorial: https://nulb.app/x3ldp Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Shodan is a search engine that indexes nearly every device connected to the internet. This makes it much easier to search for devices poorly set up and easy to infiltrate. On this episode of Cyber Weapons Lab, we'll show you how to use Shodan to search for vulnerable devices around the world, including webcams and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 317

favorite 0

comment 0

CULT OF THE DEAD COW released Back Orifice 2000 at DEF CON 7, held in July 1999 at the Alexis Park Resort in Las Vegas. Withheld from the public for 20 years, this candid footage taken inside the Suite of the Elite provides an eyewitness glimpse of the final hours leading up to this unforgettable point in hacker culture. Back during the days of media demonization of hackers, before industry embraced bug bounties, and before the mainstream adoption of Linux, cDc found a way to raise public...
Topics: Youtube, video, Science & Technology, Cult of the Dead Cow, Ninja Strike Force, Back Orifice...
Hacking and InfoSec stuff
movies

eye 182

favorite 1

comment 0

Emily Wilson, Director of Analysis, Terbium Labs The reality of the dark web goes against industry reports. Most of the dark web is legal, even ridiculous activity amidst drugs, fraud and other crimes. This session will look at the funny and absurd. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=sCaiWFyKVBY Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, data security, identity theft,...
During Lab Matters Live -- Online Press Conference Kaspersky Lab expert Vicente Diaz presented a detailed analysis of the two latest Mac OS X malware outbreaks: the new "SabPub" Trojan and the Flashfake botnet. The session also provided an overview of the evolution of Mac malware and address the reasons behind the recent surge of Mac OS X threat. Presenter: Vicente Diaz, Senior Malware Analyst, Global Research & Analysis Team, Kaspersky Lab Source:...
Topics: Youtube, video, Science & Technology, Trojan Horse (computing), Research (Job Title), Computer,...
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

Detect & Classify Wi-Fi Jamming with a NodeMCU Full Tutorial: http://bit.ly/NodeLED Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you suspect your network is under attack, gathering information on what kind of attack is crucial in devising a defensive strategy. With just a NodeMCU, LED light, and a little code, you can create a detection device capable of classifying possible jamming attacks on your network. Today, we'll show you how to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 62

favorite 0

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Spanish Language (Human Language), Online Privacy,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 115

favorite 3

comment 0

Synopsis The subjects of this documentary are either dangerous terrorists, computer security activists, or simply out-of-control adolescents. Your opinion may vary, depending on your stock holdings, after you watch for yourself as the members of The Cult of the Dead Cow demonstrate the ease with which their software program, "Back Orifice 2000" can seize control of a Windows computer connected to the internet. Crew Joshua Backer, Director Kelly Riley, Camera Perry Hallinan, Camera...
Topics: Youtube, video, People & Blogs, cult, of, the, dead, cow, cDc, documentary, student, RISD,...
Hacking and InfoSec stuff
movies

eye 37

favorite 0

comment 0

Ever since the first samples of Android ransomware were discovered, the greater task for us in the Android Security team was to introduce system improvements that would act as a proactive protection against this type of malware, that would minimize the damage a ransomware app can potentially do to device, data and user’s experience. In my talk, I will go through the history of Android ransomware evolution as we see it from our side, and what changes were done in Android OS and services, from...
Topics: Youtube, video, Entertainment, KASPERSKY LAB, cyber security, anti-virus, HuMachine, itsec, IT...
Hacking and InfoSec stuff
movies

eye 67

favorite 0

comment 0

In this video we discuss what goes into the ultimate budget-focused covert entry kit. This kit has just enough to get you into the game while being cognizant of the high costs some tools have. Tools: Toool Wicked Waves: https://toool.us/equipment.html Under Door Tool: https://www.sparrowslockpicks.com/product_p/underdoor.htm Traveler Hook: https://redteamtools.com/quick-entry/traveler-hook-steel Door Shims: Make your own! American Bypass Tool:...
Topics: Youtube, video, Education, lock, lockpicking, pentesting, physical penetration testing, picking,...
Hacking and InfoSec stuff
movies

eye 150

favorite 1

comment 0

BruteDum Can Be Used by Hackers to Help Crack Passwords Full Video: https://nulb.app/z4l6e Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 136 (Recut - Partial Episode) Online password hacking requires a connection between victim and attacker. However, not all cracking tools offer a way to attack many services. Today, on this episode of Cyber Weapons Lab, we'll show you how hackers could attack SSH, FTP, VNC, or telnet...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 18

favorite 0

comment 0

Stuart McClure, Chairman and CEO, Blackberry Cylance Brian Robison, Chief Evangelist, Blackberry Cylance In typical Hacking Exposed style, this session will deliver the latest and greatest hacks in live demonstrations that will illuminate the tools and techniques of the attacker. Attacks will include file-based, memory-based, fileless, living on the land, script-based, application-based and many others. And every single hack we demonstrate will bypass existing NextGen solutions available...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
movies

eye 120

favorite 0

comment 0

How to Scan Websites for Vulnerabilities with Nikto Full Tutorial: http://bit.ly/NiktoScan Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Not all websites are developed the same, and a lack of security measures is all the opening a hacker needs to wreak some havoc. In this episode of Cyber Weapons Lab, we'll show you how to scan websites for vulnerabilities with Nikto, a powerful but simple tool that can perform scans on SSL/HTTPS websites, an IP...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Creative Commons License "CC-BY-SA"...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies

eye 210

favorite 3

comment 0

Best Hacker Browser Extensions for Chrome & Firefox Full Tutorial: http://bit.ly/OSINTaddons Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Any hacker and OSINT researcher should strive to get the most out of their browser experience. We've heard (or read) your comments, and on this episode of Cyber Weapons Lab, we'll break down the top 10 browser extensions for hackers and researchers. Some of them will be on Mozilla Firefox, while others work...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 186

favorite 1

comment 0

Hello Everyone! Today's Armitage Series, offers you an opportunity showing you how Armitage is used in general. In the previous video we saw what is Armitage and how to setup it up. Armitage organizes Metasploit's capabilities around the hacking process. There are features for discovery, access and post-exploitation. When you exploit a host, you will have a session on that host. Armitage knows how to interact with shell and meterpreter sessions. To use Armitage, it helps to understand...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 732

favorite 5

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, We will See how to take over a machine, dump the hash key from a user, and decrypt by cracking the hash key to reveal in plain text the password. Doing this, we will go through creating a payload, copying the payload remotely to a machine, in this example we will use a kali machine, running on a macbook air, and send it to a raspberry pi since, the rpi, has no 32bit or 64bit architecture, and uses...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Researching embedded devices is not always straightforward, as such devices often vastly differ from one another. Such research is difficult to repeat and results are not easily comparable because it is difficult to conceive a standard approach for analysis. This document proposes an initial research methodology for vulnerability analysis that can be applied to any embedded device. This methodology looks beyond preliminary research findings, such as open ports and running services, and takes a...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, embedded device, trommel
Hacking and InfoSec stuff
movies

eye 59

favorite 0

comment 0

How to Create a Test Hacking Computer with a Raspberry Pi Full Tutorial: http://bit.ly/DV-Pi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Every hacker needs to practice their skills, and finding a vulnerable device can be pretty hit and miss. In this video, we'll show you how to turn a Raspberry Pi into a deliberately vulnerable server for all your hacking needs on this episode of Cyber Weapons Lab. Recommended Raspberry Pi Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by a16z
movies

eye 49

favorite 3

comment 0

From the quest for digital money and history of Bitcoin, to the emergence of Ethereum and smart contracts, this short presentation from Linda Xie (co-founder and managing director of Scalar Capital, and former product manager at Coinbase) covers a practical introduction and tour through key terms and concepts in the crypto(currencies, tokens, networks) space. The talk was given at a16z's annual innovation summit, which features invited speakers from various organizations discussing innovation...
Topics: Youtube, video, Science & Technology, crypto, cryptocurrencies, ethereum, bitcoin
Hacking and InfoSec stuff
movies

eye 183

favorite 0

comment 0

Hello Everyone, Part 3 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, saintdrug, mitm, bettercap,...
Hacking and InfoSec stuff
movies

eye 338

favorite 4

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=fef6TKs_sQ0 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, 2.0, linux, metasploit, armitage, mr robot, hacking, setoolkit,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 185

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=_Uic7mRuvVQ Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, kali 2.0, saintdrug, setoolkit, linux, hacking, cyprus, credential...
Hacking and InfoSec stuff
movies

eye 138

favorite 2

comment 0

How to Run Recon on Bluetooth Devices with Kali Linux Full Tutorial: https://nulb.app/z3tpo Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 138 Bluetooth is a very useful and popular technology that many people use daily but don't necessarily understand. A hacker can capitalize on this lack of understanding and exploit Bluetooth devices to gather information about a target and the device itself. Today, on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 55

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=dBtmzY5gcO8 Uploader: HackersOnBoard Upload date: 2013-06-25
Topics: Youtube, video, Science & Technology, Defcon, 18, Changing, threats, to, privacy, Moxie,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 41

favorite 0

comment 0

Arbor Networks researcher Jose Nazario talks about new DDoS bot families, most previously unidentified. Nazario provides a tour of recently discovered DDoS bots from around the world showing the proliferation of attack models, adoption of .Net, and new modular functionalities. Source: https://www.youtube.com/watch?v=9uHXGLvWhps Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, DDoS, botnets, Jose Nazario, Ryan Naraine, Lab Matters,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 56

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=_BSZKj_rF5A Uploader: Source Code Deleted
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 17

favorite 0

comment 0

In this special edition Ryan Naraine joins David Lenoe, Head of the Product Security Incident Response Team, Adobe, in a discussion about how Adobe is responding to attacks against zero-day vulnerabilities in PDF Reader and Flash Player. Source: https://www.youtube.com/watch?v=iPcmKa4uKBY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, zero-day vulnerabilities, Flash Player, PDF reader,...
Hacking and InfoSec stuff
movies

eye 82

favorite 0

comment 0

How to Install & Shield Your Ubuntu System Against Physical Attacks Full Tutorial: https://nulb.app/z4bgu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie tokyoneon's Twitter: https://twitter.com/tokyoneon_ Some of the most effective attacks on any system are carried out through physical access to a target's device. This is why USB Rubber Ducky-based attacks are so efficient and even popularized in the media. On this episode of Cyber Weapons Lab,...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 43

favorite 0

comment 0

Thomas Rid of King's College London presents the previously untold story of MOONLIGHT MAZE, the first known state-on-state computer espionage campaign in history. A detailed account is in the last chapter of his book RISE OF THE MACHINES, out in the summer of 2016, http://amzn.to/1qGVOGX APT, a bit of jargon Thomas uses to open the talk, stands for "Advanced Persistent Threat," a common shorthand for espionage campaign. Source: https://www.youtube.com/watch?v=zSrjkWDXSS8 Uploader:...
Topics: Youtube, video, Science & Technology, thesas2016, kaspersky lab, cybersecurity
Hacking and InfoSec stuff
movies

eye 165

favorite 0

comment 0

Creating Encrypted Payloads with Armor Full Tutorial: http://bit.ly/TNarmor Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Executing an attack script on a target computer can be tricky. An antivirus program could detect and curtail your attempts so concealing your attack is important. Today, we'll show you how to encrypt and hide an attack payload for a Mac computer using Armor on this episode of Cyber Weapons Lab. This tool was created by...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Ethereum
movies

eye 563

favorite 0

comment 0

Presented by Stephan Tual, CCO - (Twitter: @stephantual) Companion Document: https://medium.com/@ethereumproject/4790bf5f7743 Ethereum is a platform that makes it possible for any developer to write and distribute next-generation decentralized applications. Borrowing the concept of distributed consensus and cryptographic proof that makes cryptocurrencies such as Bitcoin so effective in trustless payments, Ethereum extends the use of these technologies to trustless agreements. This allows...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, decentralized applications,...
Hacking and InfoSec stuff
movies

eye 52

favorite 0

comment 0

How to Scan Twitter for an OSINT Investigation Full Tutorial: http://bit.ly/twintOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Twitter is a treasure trove of information for an OSINT investigator. With users constantly updating it, knowing how to wade through so much data is crucial. On this episode of Cyber Weapons Lab, we'll show you how using a tool called Twint which can let you target a specific individual's tweets to find incriminating...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 317

favorite 2

comment 0

How to Automate Wi-Fi Hacking with Wifite2 on Kali Full Tutorial: http://bit.ly/Wifite2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux comes with an array of tools designed to scan and attack Wi-Fi networks out of the box. We'll show you how to automate this process with Wifite2 on this episode of Cyber Weapons Lab. If you don't have Wifite2 installed, it's easy enough to do so. Wifite2 can target WPS, WPA, and WEP networks. And it uses...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hills Information Security
movies

eye 112

favorite 0

comment 0

Deviant Ollam, from The Core Group, gives a presentation on physical penetration testing and the emotional impact on stakeholders that must be considered when scoping and conducting an engagement. This is a must see for any penetration testing professional or security team considering hiring someone to test their physical security. Download slides: https://deviating.net/lockpicking/slides.html Direct link: https://deviating.net/lockpicking/slides/pen_testing_and_emotional_work.pdf The CORE...
Topics: Youtube, video, Education, Physical Penetration Testing, Pentesting, Pentester, Ethical Hacker,...
Donald Knuth is one of the greatest and most impactful computer scientists and mathematicians ever. He is the recipient in 1974 of the Turing Award, considered the Nobel Prize of computing. He is the author of the multi-volume work, the magnum opus, The Art of Computer Programming. He made several key contributions to the rigorous analysis of the computational complexity of algorithms. He popularized asymptotic notation, that we all affectionately know as the big-O notation. He also created the...
Topics: Youtube, video, Science & Technology, donald knuth, tex, latex, algorithms, big-o, complexity,...
Hacking and InfoSec stuff
movies

eye 47

favorite 0

comment 0

How to Geospoof Locations with SkyLift Full Tutorial: https://nulb.app/x4q82 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 152 Spoofing your location can be a useful ability in a number of cases. However, smartphone apps and hacks can be cumbersome or even expensive if you let yourself get taken advantage of by some shady service. Today, in this episode of Cyber Weapons Lab, we'll show you how you can spoof your GPS...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 59

favorite 0

comment 0

Man in the Middle attacks intercept and redirect traffic, and can be extremely dangerous when employed correctly. Ian O'Neill explains in detail the fundamentals of a MITM attack, from creating a fake network to downgrading HTTPS connections to HTTP. Man in the Middle attacks continue to present a viable threat when users fall for phishing and ignore warnings, in spite of the trend towards HTTPS and more secure internet connections. Take a trip to the dark side with us to explore the hands-on...
Topics: Youtube, video, People & Blogs, mitm, sslstrip, mitmproxy, hacking, null space labs, null byte,...
Hacking and InfoSec stuff
by Medvejatnik
movies

eye 82

favorite 0

comment 0

ТЕЛ. для справок +38073-444-98-95, +38093-300-84-10 WHATSAPP, VIBER, Telegram Сайт: medvejatnik.kiev.ua *Курсы Lock Master*!!!!! Source: https://www.youtube.com/watch?v=Y9n1suS3BPI Uploader: Medvejatnik
Topics: Youtube, video, People & Blogs, Эльбор, Yale, Класс, Securemme, Abus, DOM, Abloy,...
Hacking and InfoSec stuff
movies

eye 60

favorite 1

comment 0

DDoS - Full Course Preview. Subscribe to our online Black Hat Ethical Hacking Lessons with over 1000+ Videos with a very flexible membership! http://www.blackhatethicalhacking.com... ** This Course is for Educational Purpose Only! What you do with it, is your responsibility and Black Hat Ethical Hacking, Or the Author are not to be held responsible for what motive you do with such info, it is to demonstrate, so you protect** Support our work on Patreon:...
Topics: Youtube, video, Education, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr Robot, Black...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 155

favorite 0

comment 0

Learning Linux | cp command Today's Learning Linux Series, gives you the opportunity so we can show you how to use the cp command. The cp command it's shell command provides you with the power to copy files and directories through the command line. In this tutorial, we are going to show you the basic usage of this tool using easy to understand examples. The faster you are, the more knowledge you have of the Linux operating system, in combination with offensive security, WILL make you become...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 127

favorite 0

comment 0

In this follow-up video I go over the full details of cracking open any Master combination lock in 8 tries or less. In my previous video, I provided a simple online tool to crack open any Master combination lock in 8 combinations or less! This new technique will allow you to learn the combination of any Master combo lock with only eight attempts maximum: http://samy.pl/mastervuln/ Online calculator: http://samy.pl/master/ By Samy Kamkar First part here: http://youtu.be/09UgmwtL12c Third part...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, master, cracking, lock,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 101

favorite 1

comment 0

Executeu Greets You ! This is for Black Hat Ethical Hacking . Today's Learning Linux Series, is a follow up of Part 1 How to Boot Kali Linux with a USB Storage Device. Today we will show you Persistence and Encryption. This will make your Kali Live USB Boot with a Password and your data are forever saved in the USB Storage Device. I hope you enjoy the Tutorial. Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by 13Cubed
movies

eye 115

favorite 0

comment 0

As a continuation of the "Introduction to Malware Analysis" series, this episode covers another tool that will help us extract embedded content from within a PDF. We’ll first run the tool against evil.pdf from the last episode, and we’ll find that it can easily extract the embedded Word document that we were able to manually extract using pdf-parser. Then, we’ll run the tool against another sample PDF that contains embedded images. You may be surprised by the results. *** If you...
Topics: Youtube, video, Science & Technology, forensics, digital forensics, DFIR, malware analysis,...
Hacking and InfoSec stuff
movies

eye 103

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use Sparrow-wifi to Conduct Wireless Reconnoissance Full Tutorial: https://nulb.app/z51lg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 182 Recon is an important step in various hacking scenarios. Gathering data on the network environment around you can give you an edge in finding and exploiting vulnerabilities in the devices you're...
Topics: Youtube, video, Howto & Style, nullbyte, null byte, hack, hacking, hacker, hacks, hackers, how...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 96

favorite 1

comment 0

Hello Everyone! In this How-To video we are going to take a look at how to find vulnerabilities in a web application using the tool "OWASP-ZAP". We are going to setup "OWASP-ZAP" as a proxy in which we can send our traffic, which is then analyzed by the web application vulnerability scanner. Furthermore, we are going to do some basic recon on the web server and show you how to perform an active vulnerability scan using the program that is installed in Kali Linux by default....
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 70

favorite 0

comment 0

In this video we will discuss door hardware and how various handles and latches influence the effect and use of the under door tool. Link to the full playlis... Source: https://www.youtube.com/watch?v=0bMR5PYTUR8 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 74

favorite 0

comment 0

Ransomware has been a threat for many years, but most threats of this type were cracked in minutes. However, there is also a special type of ransomware that has not yet been broken due to the fact that it is based on strong encryption. A few years ago, Kaspersky Lab warned of the high risk presented by such malware and stated that we expected it to become even harder to crack in the future. Now that time has arrived, and it is something that we should be very worried about. The 'Real...
Topics: Youtube, video, Science & Technology, Ransomware, encryption, cyber threats, Vitaly Kamluk,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 145

favorite 0

comment 0

Open Microphone A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=cDxHzNPCdyA Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
by MIT Bitcoin Club
movies

eye 98

favorite 0

comment 0

Like us on Facebook! https://www.facebook.com/MITBitcoinClub Follow us on Twitter! https://twitter.com/MITBitcoinClub Follow us on Instagram! @mitbitcoinclub Check out our website http://bitcoin.mit.edu/ Source: https://www.youtube.com/watch?v=J8y_GypCWf4 Uploader: MIT Bitcoin Club Upload date: 2015-02-17
Topics: Youtube, video, Education, Bitcoin (Currency), Andreas Antonopoulos, MIT
Hacking and InfoSec stuff
movies

eye 129

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=NUynVw9f_Vc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, maltego, hacking, mr...
Hacking and InfoSec stuff
by aantonop
movies

eye 518

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 43

favorite 0

comment 0

You guys asked for it, so here it is! My personal covert entry bag and everything I typically carry inside it. Red team tools ESPKey: https://redteamtools.com/electronic-attacks/interception-devices/espkey Source: https://www.youtube.com/watch?v=g8z6tOhj83U Uploader: TheNotSoCivilEngr
Topics: Youtube, video, Education, lock, lockpicking, pentesting, physical penetration testing, picking,...
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

#days Security & Risk Conference 2012: Ange Albertini: Binary art: Byteing the PE that fails you Source: https://www.youtube.com/watch?v=kibEcaG0zCk Uploader: defconswitzerland
Topics: Youtube, video, Science & Technology, #days, ange albertini, pe, binary
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 400

favorite 3

comment 0

This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
How to Set Up Kali Linux on the New Raspberry Pi 4 Full Tutorial: https://nulb.app/z4onw Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi 4 Model B is finally out! When coupled with the Kali Linux OS, you can create a powerful and inexpensive hacking machine that's great for beginners. On this episode of Cyber Weapons Lab, we'll show you how to set up Kali Linux on the new Raspberry Pi 4. Recommended kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 266

favorite 1

comment 0

Hello Everyone, SaintDruG with another Hacking Minutes Episode for Black Hat Ethical Hacking. We will see how after having access to a website, or exploiting a cpanel, or credentials and you can transfer files, using a modified custom web shell that you can download for testing purposes only, how fast Black Hats work, escalate, and easy they can perform post exploitations, the power of uploading any file, to hackers has a different mindset, they can put code in a file, rename it to an extension...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 161

favorite 0

comment 0

Today we look at reverse picking, a method of opening wafer locks that I think has implementations in red team engagements. Source: https://www.youtube.com/watch?v=e4Xg9hzCk2U Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 31

favorite 0

comment 0

In this edition of Lab Matters, Ryan Naraine interviews Kaspersky Lab CTO Nikolay Nikolay Grebennikov about malicious threats on mobile devices. Grebennikov talks about the taxonomy of threats and explains Kaspersky Lab's vision for protecting data on smart phones. The discussion touches on privacy issues, data protection, anti-theft recovery, social engineering, URL filtering and parental control. Source: https://www.youtube.com/watch?v=wpswUzjlC3Y Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, mobile security, mobile threats, smart phones, privacy...
Hacking and InfoSec stuff
movies

eye 108

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use John the Ripper for Cracking Full Tutorial: https://nulb.app/x726p Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 176 The Secure Shell network protocol, usually used to manage remote machines, is prone to password brute-forcing. That's why key-based authentication is used when security is paramount since private keys can be encrypted....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 197

favorite 3

comment 0

How to Spot Fakes & Collect Signatures Through OSINT Investigations Full Tutorial: https://nulb.app/x4l6p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Local and state governments usually maintain a plethora of business documentation that is open to the public to search. When accessible online, this can be a treasure trove of open-source information for a hacker to take advantage of. We'll show you how to perform a basic OSINT investigation on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 231

favorite 2

comment 0

Airgeddon Used for an Evil Twin AP with Captive Portal Full Video: https://nulb.app/x4a3p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 010 (Recut - Partial Episode) Wi-Fi networks can be set up by smart IT people, but that doesn't mean the users of the network are similarly tech-savvy. We'll demonstrate how bad actors can use am evil twin attack to steal Wi-Fi passwords. Essentially, they kick a user off their trusted...
Topics: Youtube, video, Howto & Style, wht, nullbyte, hacker, hacks, hackers, how to hack, howto, how...