Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Reviewed
Creator
Hacking and InfoSec stuff
May 5, 2022 Black Hat Ethical Hacking
movies

eye 1,099

favorite 6

comment 1

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
Hacking and InfoSec stuff
movies

eye 25

favorite 0

comment 1

Android applications are becoming more and more obfuscated to prevent reverse engineering. The purpose of this talk is to present dynamic binary instrumentation techniques that can help reverse engineers to deal with obfuscated codes... By: Romain Thomas Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#dynamic-binary-instrumentation-techniques-to-address-native-code-obfuscation-18309 Source: https://www.youtube.com/watch?v=MRku-2fW42w Uploader:...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
Jun 1, 2019 Privacy International
movies

eye 95

favorite 1

comment 1

لمزيد من المعلومات عن الحق في الخصوصية، برجاء الدخول على privacyinternational.org Source: https://www.youtube.com/watch?v=sjhvauht71A Uploader: Privacy International
favoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
Sep 22, 2017 Zcash
movies

eye 28

favorite 0

comment 1

The fourth episode of the Zcash Show & Tell series will feature two Zcash Company engineers Ariel Gabizon and Jay Graber who have been working on an implementation of XCAT (cross-chain atomic trades) between Zcash and Bitcoin. Atomic cross-chain trading is a concept that has been floating around in the cryptocurrency space for a while now and the work Zcash Company has been doing on XCAT is shaping up to be the first implementation for trades with ZEC and BTC (and eventually ETH). Each Show...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, zcash, xcat, cryptocurrencies, trading, decentralized,...
Hacking and InfoSec stuff
Sep 22, 2017 aantonop
movies

eye 531

favorite 1

comment 1

This is the first part of a talk which took place on February 22nd 2017 at the inaugural Bloktex Conference pre-event, hosted at Technology Park in Kuala Lumpur, Malaysia: https://antonopoulos.com/event/kualalumpur/ RELATED: A collection of my talks on Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTthcG265_FYSaV24hFScvC0 A collection of Q&A on various topics in Bitcoin - https://www.youtube.com/playlist?list=PLPQwGV1aLnTsHvzevl9BAUlfsfwFfU7aP Andreas M. Antonopoulos is a...
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, network, internet, money
01:02 - Twitter Hackers Caught 09:19 - Where is Dr Tran & Corona Science 17:59 - Apple's Hacker Phone, Zerodays 30:04 - How We Got Into Infosec, Advice for B... Source: https://www.youtube.com/watch?v=eU6qWbw6HHs Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

Speaker: Max Kelly With the current media hype about cyber threats and cyber warfare, Max Kelly - former CSO of Facebook - offers his perspective on the effects of internet militarization and it's relationship to traditional security operations. For presentations, whitepapers or audio version of the Defcon 18 presentations visit: http://defcon.org/html/links/dc-archives/dc-18-archive.html Source: https://www.youtube.com/watch?v=ewDSRE4yBgw Uploader: Christiaan008 Upload date: 2010-10-27
Topics: Youtube, video, Science & Technology, 10, defcon, 004, clip2
Hacking and InfoSec stuff
movies

eye 39

favorite 0

comment 0

Richard Thieme: Hacking UFOlogy: Thirty Years in the Wilderness of Mirrors You're over the line," an intelligence professional told Richard Thieme recently. "You know enough to know what's not true but you can't know enough to know what is. You're well into the wilderness of mirrors." Hacking one complex system is always in some ways like hacking another. You must see nested levels of the context that others assume and which is therefore invisible, you must see through the story...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=ZxbheZHnnw8 Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 27

favorite 0

comment 0

The SAS 2015 martial-artists are in advanced stages of preparation. Join the battle… Source: https://www.youtube.com/watch?v=VbS061V7NE4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, Kaspersky Lab (Business Operation), The sas, SAS,...
Hacking and InfoSec stuff
- MIT Alumni Association
movies

eye 13

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=WBgsRyvEPJM Uploader: MIT Alumni Association Upload date: 2016-09-27
Topics: Youtube, video, Education
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 21

favorite 0

comment 0

The Security Analyst Summit (SAS) is an exclusive, invite-only gig, with only the cream of the world’s crop of top IT security movers and shakers taking part. It’s not massive – it’s more intimate, which means it’s more meaningful and more gets done – and twice as engaging and interesting for all participants. But don’t feel left-out by this guest-list-only cliquishness. Read More http://eugene.kaspersky.com/2015/02/26/kaspersky-lab-security-analyst-summit-2015/ Join the...
Topics: Youtube, video, Science & Technology, #TheSAS2015, KASPERSKY LAB, cyber security, anti-virus,...
You’re arrested and your phone is held up to your face to be unlocked by the arresting officer, then sent to a forensics lab. Dystopian future or one where FaceID collides with weak self-incrimination protections for biometrics? This talk will explain how your 4th and 5th Amendment rights interact with advances in biometric technology. Along the way it will offer design suggestions for creators of mobile devices and tips to end users. Wendy Knox Everette (@wendyck) is a hacker lawyer who...
Topics: Youtube, video, Science & Technology, shmoocon, hacking, shmoocon 2018, civil rights
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=mcEHVvcqUzU Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 9

favorite 0

comment 0

In this talk, we will explore the various types of biometric data, their uses by both government and private organizations, and whether the collection and use of such data is covered by the privacy legislation in the APAC region in particular, but more broadly around the world... By: Melissa Wingard Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#biometrics--privacy-time-to-faceoff-or-is-that-faceapp-18743 Source:...
Topics: Youtube, video, Travel & Events
The attack surface exposed by proprietary layer 2 protocols contains hidden bugs that have severe implications to the security of the devices that use them, as well as the networks they belong to. We discovered 5 such zero-day vulnerabilities.... By: Barak Hadad & Ben Seri Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#cdpwn-taking-over-millions-of-enterprise-things-with-layer--zero-days-18806 Source:...
Topics: Youtube, video, Travel & Events
https://creativecommons.org/licenses/by-nc-sa/4.0/ Source: https://www.youtube.com/watch?v=VOUqD8H2ZSs Uploader: 0xdade
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking
Hacking and InfoSec stuff
movies

eye 9

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=GqY7YUv8b5Y Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

Buying a home is in many ways the pinnacle of the American dream. And yet the way things work today, it's a painful process. Real estate agents, brokers, banks, notaries, title insurers, and many other intermediaries all make for a convoluted, difficult, and expensive process for home buyers and sellers alike. In this presentation from a16z's annual Summit event, a16z general partner Alex Rampell explains how as consumers get used to less friction and more transparency in the age of mobile,...
Topics: Youtube, video, Science & Technology, software, technology, real estate, home buying, a16z...
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Traditional banking services have fallen flat for an enormous segment of the population -- whether because they’re “unbanked,” or because the state of those services makes it even more expensive to be poor. Why are so many low-income populations -- both in the U.S. and around the world -- left behind? In this talk delivered at our most recent annual a16z Summit in November 2017, Angela Strange shares what’s happening and why; how we might address the problem; and where this creates...
Topics: Youtube, video, Science & Technology, fintech, financial services, payments
Source: https://www.youtube.com/watch?v=17CmswQtSng Uploader: Georgia Weidman
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 32

favorite 0

comment 0

In this episode, Kody and Tim will develop malicious Duckyscript payloads from scratch targeting PowerShell. Source: https://www.youtube.com/watch?v=8nZEkFcXFp0 Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, hacking, powershell, varonis, securityfwd, computer,...
A Torifying Tale Our experiences of building and running Tor servers In the spirit of “Failosophy” we would like to give a brief talk about the mistakes we made, and lessons we learned, in running Tor bridge, relay, and exit nodes. In this talk we will highlight some of the challenges we have faced in building performant Tor relays and exit nodes. We have made plenty of mistakes, and learned from most of them. In the spirit of “Failosophy” we would like to share the lessons we learned...
Topics: Youtube, video, Education, Chaos Communication Camp 2015, cccamp15, CCC, Chaos Computer Club,...
Hacking and InfoSec stuff
movies

eye 30

favorite 0

comment 0

Security researchers are working hard to show off their discoveries and creations at #TheSAS2017. Take a sneak peek.... Take a sneak peek and get yours ready. CFP closes on December 1st, 2016 https://sas.kaspersky.com/#call-for-papers #KasperskyLab #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=M1pzAEusTgw Uploader: Kaspersky Lab
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

Introduced in 2007, contactless (NFC) payments have been used widely for a decade. Contactless payments are fast replacing cash and CHIP. Yet, contactless makes use of protocols much older than the technology itself... By: Leigh-Anne Galloway & Tim Yunusov Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#first-contact---vulnerabilities-in-contactless-payments-19359 Source: https://www.youtube.com/watch?v=YmJ4ULncNwg Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 13

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=5TUPntyIZu4 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=5T_c-lqgjso Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 17

favorite 0

comment 0

by Brandon Dixon A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=i8D9cL0xFQ0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=l7xV5z1eJLw Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=krO_RqRGd40 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- Real World Crypto
movies

eye 9

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=-nV2Rdddk0M Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=o4U0Gfh-0L4 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
- The Tor Project
movies

eye 16

favorite 0

comment 0

Help us make 2015 a great year for privacy, anonymity, and censorship resistance! https://www.torproject.org/donate/donate.html.en Your support is critical to our success. The Tor Project is a US 501(c)(3) non-profit dedicated to research, development, and education about online anonymity and privacy. Donations to The Tor Project may be tax deductible to persons who are in the US; or who pay taxes in countries with reciprocity with the US on charitable donations. Source:...
Topics: Youtube, video, Nonprofits & Activism
Hacking and InfoSec stuff
- Black Hat Ethical Hacking
movies

eye 202

favorite 2

comment 0

Hello Everyone, Today's Learning Linux Series, gives you the opportunity, to see you useful commands for Kali Linux. The commands that we will be looking at today are : pwd command: print working directory ls command: List information about files cd command: Change Directory echo command: Display message on screen mkdir command: Create new folders cp command: Copy one or more files to another location rm command: Remove files rmdir command: Remove folders rm command: Remove files We hope you...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
movies

eye 334

favorite 0

comment 0

PoisonTap - siphons cookies, exposes internal router & installs web backdoor (reverse tunnel) on locked/password protected computers with a $5 Raspberry Pi Zero and Node.js. https://samy.pl/poisontap/ By Samy Kamkar Full details and source code at https://samy.pl/poisontap/ Buy a Raspberry Pi Zero here: https://amzn.to/2eMr2WY Buy cement for your USB ports here: https://amzn.to/2fX0I1e When PoisonTap (Raspberry Pi Zero & Node.js) is plugged into a locked/password protected computer...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, coding, samy kamkar,...
The WiFi Deauther Can Be Used with Many Boards Full Video: https://nulb.app/z4i87 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 081 (Recut - Partial Episode) Hackers don't always have the budget for conventional hacking hardware, so they get thrifty when they want to hack Wi-Fi networks. Today, on this episode of Cyber Weapons Lab, we'll show how a hacker or pentester can scan and attack Wi-Fi networks using an...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 399

favorite 2

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=BGvPv0A-rcc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethicl hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=BrxJlp_3utk Uploader: Alec Muffett
Topics: Youtube, video, Science & Technology
In this talk, we'll help you extract more value out of your threat intel program, giving you an easy win to level up not just your team, but the other teams in your security department... By: Xena Olsen Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#adversary-detection-pipelines-finally-making-your-threat-intel-useful-18346 Source: https://www.youtube.com/watch?v=D9R0E_CfSQ4 Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 28

favorite 0

comment 0

Security expert from around the world and beyond, let's communicate at the Security Analyst Summit http://sas.kaspersky.com/ Source: https://www.youtube.com/watch?v=DfPsjr86kYk Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2014, cybersecurity, infosec
Hacking and InfoSec stuff
movies

eye 65

favorite 2

comment 0

Anand Prasad, CISO, Rakuten Mobile Networks In this talk we will present 4G security and issues identified recently followed by in-depth explanation of security enhancements in 5G. We will also cover potential security implications from usage of technologies such as virtualization in mobile networks. Finally we will summarize 5G related security activities expected in near future.Learning Objectives:1: Get a refresher on 4G security, security issues and solutions.2: Learn in-depth regarding 5G...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

Join us at Way West Wild West Hackin' Fest in San Diego in March 2020: https://www.wildwesthackinfest.com/ Are you tired of demonstrations of products that take months or years to get effective data from? How many products have you seen half-implemented (but fully paid for!) that didn’t ever deliver any real value to your organization? Here, I’ll discuss multiple free products that you can use next week to find evil inside your organization. Some techniques will find less advanced...
Topics: Youtube, video, People & Blogs
Revisiting past CVEs can be a useful tool for finding patterns, to increase our critical thinking, gain knowledge in techniques that have been previously used, and to increase our skills to eventually be able to contribute to the wider security community. In addition, when a known exploit currently exists for a CVE, and our experiments yield different results from the known exploit, we must practice our critical thinking skills to determine the discrepancies, and to determine if any unstated...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, CVEs
Hacking and InfoSec stuff
movies

eye 60

favorite 0

comment 0

Today we take a look at how I take an under door tool with me every day and everywhere I go... Without needing a bulky backpack or case to put it in! Belt I have: https://ansonbelt.com/ Other Options: (I cant vouch for any of these, however they look like they will work at a cursory glance) https://www.amazon.com/SlideBelts-Vegan-Leather-without-Holes/dp/B01M0L45AQ/ref=sr_1_7?dchild=1&keywords=slide+belt&qid=1589076326&sr=8-7 Source: https://www.youtube.com/watch?v=DpCDD1kQXPA...
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
SkyJack is a drone engineered to autonomously seek out, hack, and wirelessly take over other drones within wifi distance, creating an army of zombie drones under your control. More details below... by Samy Kamkar FULL DETAILS on SkyJack website: http://samy.pl/skyjack You can support SkyJack on Suprmasv: https://www.suprmasv.com/projects/161/skyjack Follow me on Twitter: https://twitter.com/samykamkar Hardware/software used: SkyJack: http://samy.pl/skyjack Raspberry Pi:...
Topics: Youtube, video, Science & Technology, skyjack, drone, parrot, ar.drone, aircrack, aircrack-ng,...
Hacking and InfoSec stuff
movies

eye 102

favorite 0

comment 0

Like us on Facebook! https://www.facebook.com/MITBitcoinClub Follow us on Twitter! https://twitter.com/MITBitcoinClub Follow us on Instagram! @mitbitcoinclub Check out our website http://bitcoin.mit.edu/ Source: https://www.youtube.com/watch?v=J8y_GypCWf4 Uploader: MIT Bitcoin Club Upload date: 2015-02-17
Topics: Youtube, video, Education, Bitcoin (Currency), Andreas Antonopoulos, MIT
Hacking and InfoSec stuff
movies

eye 56

favorite 0

comment 0

Stuart McClure, CEO, Cylance In this latest installment, we will explore the vulnerability and exploitability of everyday objects in the very fabric of our economy. In usual Hacking Exposed LIVE style we will demonstrate LIVE real-world hacks of these devices and systems and show how simple countermeasures can slow and even stop the likelihood of attack. https://www.rsaconference.com/events/us17/agenda/sessions/6829-Hacking-Exposed-NextGen https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, stuart mcclure, cylance,...
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

What about disclosure? Does hacking in a skimask make you a burglar? Meet the ghosts of past present and future to create conversation between builders and breakers with disclose.io --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=LQBVKJaQbQA Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
In this talk, we will demystify the techniques armed by binary disassembling through a presentation on our study with 8 open-released tools (Ghidra, Angr, McSema, Dyninst, Radare2, Jakstab, Uroboros, and Objdump).... By: Eric Koskinen, Chengbin Pang & Jun Xu Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#demystify-todays-binary-disassembling-and-how-modern-abi-makes-it-easier-18415 Source: https://www.youtube.com/watch?v=LYCufH9KQxE...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 51

favorite 0

comment 0

by Kris McConkey, PwC A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=NFJqD-LcpIg Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 137

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=NUynVw9f_Vc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, maltego, hacking, mr...
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 43

favorite 0

comment 0

While WikiLeaks managed to get mainstream media attention all around the world by publishing leaked documents which turned governments upside down and caught multi-national companies off-guard, smaller organizations and even individuals are facing a very similar threat of their own, which is as dangerous as it is overlooked. Stolen identities, data breaches and financial crimes - they are all examples of what the average user is facing on a day-to-day basis. Even though these crimes are carried...
Topics: Youtube, video, Science & Technology, wikileaks, stolen identities, data breaches, financial...
Hacking and InfoSec stuff
- Zcash
movies

eye 16

favorite 0

comment 0

Live stream of the launch of the Zcash crypto-currency Source: https://www.youtube.com/watch?v=O8QA6Nvg8RI Uploader: Zcash
Topics: Youtube, video, Science & Technology, zcash, #hangoutsonair, Hangouts On Air, #hoa
Ian Allison, Sr Manager Security Testing/Red Team, Intuit Inc. Join Ian Allison and Javier Godinez as they demonstrate the Red Teaming of Amazon Web Services Identity Access Management Instance roles and how they can be used to compromise an AWS account. https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=OkWBHOJr5YQ Uploader: RSA Conference Upload date: 2017-02-22
Topics: Youtube, video, Science & Technology, RSA Conference 2017, DevOps, Security Awareness,...
Hacking and InfoSec stuff
- Black Hat Ethical Hacking
movies

eye 100

favorite 1

comment 0

Hello Everyone! In this How-To video we are going to take a look at how to find vulnerabilities in a web application using the tool "OWASP-ZAP". We are going to setup "OWASP-ZAP" as a proxy in which we can send our traffic, which is then analyzed by the web application vulnerability scanner. Furthermore, we are going to do some basic recon on the web server and show you how to perform an active vulnerability scan using the program that is installed in Kali Linux by default....
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 71

favorite 0

comment 0

In this video we will discuss door hardware and how various handles and latches influence the effect and use of the under door tool. Link to the full playlis... Source: https://www.youtube.com/watch?v=0bMR5PYTUR8 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
Hacking and InfoSec stuff
- RSA Conference
movies

eye 642

favorite 1

comment 0

Konstantinos Karagiannis, Chief Technology Officer, Security Consulting, BT Proponents of blockchain want to apply it to more than Bitcoin. Suggested applications include identity management, verifiable records and digital assets such as stocks. Is it really future-proof? https://www.rsaconference.com/events/us17 Source: https://www.youtube.com/watch?v=0gL6DsR6vGg Uploader: RSA Conference Upload date: 2017-02-15
Topics: Youtube, video, Science & Technology, Cryptography, Identity Management & Governance,...
How to Scan for Website Vulnerabilities Online Full Tutorial: http://bit.ly/Uniscan Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Web application security is huge part of penetration testing. However, the topic can be a bit confusing and overwhelming for beginners. There are many scanners available for hackers or penetration testers to use to find web vulnerabilities, some of which we've covered. Today, on this episode of Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 73

favorite 0

comment 0

In this video we will perform some live demos with the under door tool on crash bars, showing what goes right and what goes wrong so that you know how to per... Source: https://www.youtube.com/watch?v=1oKncvpRx6s Uploader: TheNotSoCivilEngr
Topics: Youtube, video, lock, lockpicking, pentesting, physical penetration testing, picking, lock picking,...
Protect Your Ubuntu System from Network-Based Threats Full Tutorial: https://nulb.app/z4bky Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie tokyoneon's Twitter: https://twitter.com/tokyoneon_ One of the most common attack vectors a hacker exploits is a target's network. If not secured correctly, a hacker could easily discover vulnerabilities during their recon phase and subsequently seek to attack your system. We've covered how to lock down your...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Speaker: RICHARD THIEME THIEMEWORKS Thieme's keynote at DEF CON 4 for a few hundred people was "Hacking as Practice for Trans-planetary Life in the 21st Century." Mudge recently said, "Some of us knew what you meant, and some of us thought you were nuts." That's likely to be the response to this talk too. Thieme addresses what he said 17 cons ago, why it was true, and illuminates some likely futures for hacking and hackers, anonymous 2.0.1, and the gray space of the noir...
Topics: Youtube, video, Science & Technology, DEFCON, security conference
Security Tools to Keep Your New MacOS Computer Secure Full Tutorial: https://nulb.app/x4klx Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you've recently purchased a new Mac or macOS computer, it's important to install some sort of protections from any attacks that may be targeted at you by malicious actors. On this episode of Cyber Weapons Lab, we'll feature a couple of tools by Objective-See that will help you defend your computer from spying...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
- Tor Project
movies

eye 219

favorite 1

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=6v0ga4f2myY...
Topics: Youtube, video, Education, Online Privacy, Anonymity, Tor (Software), Arabic, Surveillance,...
Keren Elazari, Analyst & Researcher, K3r3n3.com Amit Elazari Bar On, Director, Global Cybersecurity Policy/Lecturer, Intel Corporation/UC Berkeley School of Information (MICS) The future of cybersecurity is not about protecting secrets; it’s about our way of life. Join us for a journey to the near future, told from the perspectives of a friendly hacker and a lawyer, who also happen to be sisters. Discover how evolving attack trends are impacting policy landscapes, why trust has become a...
Topics: RSAC, RSA2019, RSA
In recent years, Machine Learning (ML) techniques have been extensively deployed for computer vision tasks, particularly visual classification problems, where new algorithms reported to achieve or even surpass the human performance... By: Dou Goodman, Yang Wang & Hao Xin Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#attacking-and-defending-machine-learning-applications-of-public-cloud-18725 Source:...
Topics: Youtube, video, Travel & Events
With the demise of dtrace on macOS, and Apple’s push to rid the kernel of 3rd-party kexts, another option is needed to perform effective auditing on macOS. Lucky for us, OpenBSM fits the bill. Though quite powerful, this auditing mechanism is rather poorly documented and suffered from a variety of kernel vulnerabilities. In this talk, we’ll begin with an introductory overview of OpenBSM’s goals, capabilities, and components before going ‘behind-the-scenes’ to take a closer look at...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, openbsm, macos
Hacking and InfoSec stuff
- Kaspersky Lab
movies

eye 79

favorite 0

comment 0

Ransomware has been a threat for many years, but most threats of this type were cracked in minutes. However, there is also a special type of ransomware that has not yet been broken due to the fact that it is based on strong encryption. A few years ago, Kaspersky Lab warned of the high risk presented by such malware and stated that we expected it to become even harder to crack in the future. Now that time has arrived, and it is something that we should be very worried about. The 'Real...
Topics: Youtube, video, Science & Technology, Ransomware, encryption, cyber threats, Vitaly Kamluk,...
Hacking and InfoSec stuff
- cultdeadcow
movies

eye 225

favorite 3

comment 0

This is the very first episode of the Net Cafe series. It was shot on location at a cybercafe in San Francisco called CoffeeNet. It looks at the hacker culture and their influence on the early growth of the internet. Guests include Dan Farmer, author of SATAN and COPS; Elias Levi (aka Aleph 1), webmaster of underground.org and Bugtraq; also "Reid Fleming" and "White Knight" from Cult of the Dead Cow. Originally broadcast in 1996. Source:...
Topics: Youtube, video, Howto & Style, cult, of, the, dead, cow, cDc, PBS, satan, cops, bugtraq,...
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Andreas presents expert witness testimony to the Canadian Senate Banking and Commerce Committee Source: https://www.youtube.com/watch?v=GP_eT6E4os8 Uploader: aantonop Upload date: 2016-04-15
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
movies

eye 89

favorite 0

comment 0

The Wi-Fi deauther is a cheap and easy tool designed by Stefan Kremser to scan and attack Wi-Fi devices. Watch Stefan and I troubleshoot the advanced new features of the latest deauther release! Source: https://www.youtube.com/watch?v=I0N2KpwGETI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, deauther, securityFWD, spacehuhn, wifi hacking, Stefan...
Hacking and InfoSec stuff
movies

eye 78

favorite 5

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education
One Way Hackers Can Backdoor into a MacOS System Full Tutorial: https://nulb.app/x4dyn Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 112 (Recut - Partial Episode) MacOS security is highly regarded but it's far from perfect. In an attack by Tokyoneon (https://twitter.com/tokyoneon_), we can spoof a trusted app like iTunes for a malicious one, completely bypassing system security. We'll show you how, on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Come see techniques using containers and QEMU used to emulate non-x86 firmware to demonstrate capabilities and limitations when used for security research (and target practice) --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=N0EYsO0VxZo Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 15

favorite 0

comment 0

Speakers: Michael Ligh Malicious Code Analyst, iDefense Matthew Richard Malicious Code Operations Lead, Raytheon Corporation Would you laugh if you saw a bank robber accidentally put his mask on backwards and fall into a man hole during the getaway, because he couldn't tell where he was going? Criminals do ridiculous things so often, its impossible to capture them all on video. Rest assured, when the criminals are malware authors, we can still make fun of them through evidence found in...
Topics: Youtube, video, Science & Technology, code, capture, authors, criminals
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=RkuCWquegto Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto