Skip to main content

Hacking and InfoSec stuff



rss RSS

34
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D remove-circle E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by In The Rabbit Hole - Urban Survival
movies

eye 164

favorite 2

comment 0

** Check out the end of year sale and help support the show: https://www.intherabbithole.com/shop/ Michael Bazzel drops in to discuss Open Source Intelligence. He shares with some extremely creepy things people can find out about you from the internet. And we’ll discuss how to cleans them. ~ Resources from this episode can be found at: https://www.intherabbithole.com/e245 Open Source Intelligence, or OSINT as it is often referred to, is anything information openly obtainable. Now, this...
Topics: Youtube, video, News & Politics, Survivalist, Survivalism, Prepper, Prepardness, Survival Skills
Hacking and InfoSec stuff
movies

eye 48

favorite 0

comment 0

Once an attacker gets their hands on an embedded, IoT, medical, or industrial control device's firmware, exploitable bugs start screaming for attention thanks to 20th century software development practices; however, bringing current software and security best practices to firmware is only a part of the solution to securing hardware. On the other hand, you might be wrong about the cost and effectiveness of your hardware countermeasures. We have plenty of data about how much time, money, skill,...
Topics: Youtube, video, Entertainment, KASPERSKY LAB, cyber security, anti-virus, HuMachine, itsec, IT...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 20

favorite 0

comment 0

The IT and OT worlds have happily been ignoring each other for the last few decades. Why? We will go back in time to find out where it all went wrong, and look into the future, where it will all continue to go wrong. Because IT and OT are no longer ignoring each other. They have spawned a love baby, aptly named IoT. With the differences between IT and OT shrinking we face a looming OT crisis. The speed of change in the traditional industry is absurdly slow compared to the increasing...
Topics: Youtube, video, Entertainment, KASPERSKY LAB, cyber security, anti-virus, HuMachine, itsec, IT...
We talked about EMP Weapons, Stalkers & Home Security, Deviant's covert Pie, Cars, Guns, Infosec Buzzwords, The Darknet, and Bad Risk Management. Featuring @... Source: https://www.youtube.com/watch?v=gNJYDSY4KBk Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
movies

eye 25

favorite 0

comment 0

How to easily deploy 24 Tor daemons and 120 NGINX daemons to support your website. Video notes/sample code at: /redirect?v=HNJaMNVCb-U&event=video_description&redir_token=IHVIGkCzHxEsRUZoPi2M-AHPBmx8MTUwOTIyMjQ4MkAxNTA5MTM2MDgy&q=https%3A%2F%2Fgist.github.com%2Falecmuffett%2F31881067c8d07aadd17581a1262cf7cd Source: https://www.youtube.com/watch?v=HNJaMNVCb-U Uploader: Alec Muffett
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 13

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=B5EY65YP5p0 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 38

favorite 1

comment 0

James Foster, CEO, ZeroFOX Avi Rubin, Professor, Johns Hopkins University Facebook is not to blame for nearly every country’s lack of guidance, regulation or legal precedent on how to secure their sovereignty from election meddling and hacking. This talk will show how nation-state adversaries are targeting election systems, election system supply chains, regional populations, elected officials and the democratic state.Learning Objectives:1: Understand the history of election hacking and how...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 27

favorite 0

comment 0

Michael Aisenberg, Principle Cyber Policy Counsel, The MITRE Corporation Serge Jorgensen, Founding Partner/CTO, Sylint Group Robert Martin, Senior Principal Engineer, MITRE Corporation Lucy Thomson, Attorney, Livingston PLC Adversaries are using cyber-weapons to conduct psychological operations to influence the hearts and minds of voters and interfere with elections. Combatting cyberattacks and social media manipulation is critical to the preservation of the voting process. Come behind the...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
movies

eye 38

favorite 1

comment 0

Co-authors: Joe Hall, Margaret MacAlpine, and Harri Hursti (Sorry, the title was too long to include all of you!) Modern electronic voting systems were introduced in the US at large scale after the passage of the 2002 Help America Vote Act. Almost from the moment they appeared, serious questions have been raised about the security and integrity of these systems. This talk will review the architecture of current E-voting systems, the security risks and attack surfaces inherent in these designs,...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, electronic voting
Researching embedded devices is not always straightforward, as such devices often vastly differ from one another. Such research is difficult to repeat and results are not easily comparable because it is difficult to conceive a standard approach for analysis. This document proposes an initial research methodology for vulnerability analysis that can be applied to any embedded device. This methodology looks beyond preliminary research findings, such as open ports and running services, and takes a...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, embedded device, trommel
Hacking and InfoSec stuff
by aantonop
movies

eye 59

favorite 1

comment 0

In this talk, Andreas looks at the symbiotic relationship between opportunities that Bitcoin offers for improving India's general welfare, and the talent and potential India can contribute in return to help it thrive. He argues that, like the early internet, Bitcoin began as a weird and difficult place for the average consumer; if we embrace the good and reject the fear of this global phenomenon, we can make the financial world as accessible and intuitive as a swipe on an iPad. TOPICS: 1:35...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, internet, money, finance,...
Hacking and InfoSec stuff
movies

eye 124

favorite 0

comment 0

Use an RPi for Monitor Mode Without an External Adapter Full Tutorial: http://bit.ly/MMforPi Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The Raspberry Pi is already a powerful device perfect for on-the-go hacking or war driving. But up until recently, no Pi has been capable of being put into monitor mode or achieve packet injection without a wireless adapter. We'll show you how you can update your Pi to make it an all-in-one hacking device on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 42

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Make an Offline Text-Based Chat System Full Tutorial: https://nulb.app/z6vu2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 164 Sometimes, you need an offline way of communication, such as after a natural disaster, during a protest demonstration, or where there is just no cellular or Wi-Fi networks to get you online. In this Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 114

favorite 0

comment 0

How to Encrypt Your Important Files with EncryptPad Full Tutorial: http://bit.ly/EncryptPad Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie A great way for a privacy conscience individual to keep their files safe is through encryption. Today, we'll show you how to keep your important files for your eyes only with EncryptPad on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 16

favorite 1

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=mx04_bH646Y Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 33

favorite 0

comment 0

South Korea is very interesting region when it comes to cyber security. In this session, we present about an APT attack case where the threat actor has been using not only general exploits but also custom exploit to infect potential victims. We describe the custom exploit and their TTPs related to each APT attack lifecycle.osec TopCERT * Get exclusive access to more presentations given at #TheSAS2017: https://kas.pr/721r #KasperskyLab #cybersecurity #ITsecurity Source:...
Topics: Youtube, video, Science & Technology, kaspersky lab, thesas2017, apt, advanced persistent...
Defending a country is different from a corporate network. Singapore wants to be a Smart Nation and wants to shift the paradigm of cybersecurity in order to achieve that. Doing so will require us to challenge some mental models... By: Gaurav Keerthi Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#engineering-cybersecurity-for-a-nation-what-singapore-is-learning-from-cars-and-sanitation-21680 Source: https://www.youtube.com/watch?v=p68JbKkmY7Q...
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use GoScan for Network Enumeration Full Tutorial: https://nulb.app/x4ueo Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 173 Network enumeration is a vital yet tedious phase of an attack. In this episode of Cyber Weapons Lab we're going to take a look at a tool called GoScan which builds upon Nmap, offering an automated way to enumerate...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat
movies

eye 19

favorite 0

comment 0

Containers offer speed, performance, and portability, but do they actually contain? While they try their best, the shared kernel is a disturbing attack surface: a mere kernel vulnerability may allow containerized processes to escape and compromise the host.... By: Yuval Avrahami Full Abstract & Presentation Materials: https://www.blackhat.com/asia-20/briefings/schedule/#escaping-virtualized-containers-21671 Source: https://www.youtube.com/watch?v=0hrv0qyOEd0 Uploader: Black Hat
Topics: Youtube, video, Travel & Events
Hacking and InfoSec stuff
by Ethereum
movies

eye 138

favorite 2

comment 0

Ethereum is a decentralized platform that runs smart contracts: applications that run exactly as programmed without any possibility of downtime, fraud or third party interference. Ethereum is how the Internet was supposed to work: it's a censorship-proof planetary scale computer, where users always stay in control of their funds and personal data. Ethereum was crowdfunded during August 2014 by fans all around the world. It is developed by ETH/DEV with contributions from great minds across the...
Topics: Youtube, video, Science & Technology, ethereum, smart contracts, dapp, decentralization
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 22

favorite 0

comment 0

Eugene Buyakin, Chief Operating Officer of Kaspersky Lab, reveals the company's mindset towards investing in different kinds of protection technologies in terms of the current industry environment. He also shares his vision of today's role played by mobile security, and explains the position of free anti-virus software on the security market and its impact on the industry. In conclusion, Eugene shares Kaspersky Lab's investment areas and priorities. Source:...
Topics: Youtube, video, Science & Technology, Ryan Narain, Lab Matters, Kaspersky Lab, Eugene Buyakin,...
Hacking and InfoSec stuff
movies

eye 36

favorite 0

comment 0

Eugene Kaspersky presents on the cyber crime landscape and the threats of the age of cyber-warfare during Kaspersky Lab's Cyber Security Symposium and Global Corporate Product Launch. Source: https://www.youtube.com/watch?v=Qsp9SJiCX_I Uploader: Kaspersky Lab Upload date: 2011-10-17
Topics: Youtube, video, Science & Technology, IT security, business, IT business, Internet Security,...
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 12

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=QE7s95TgZiI Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 16

favorite 0

comment 0

by Roman Vasilenko A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=Ez_Gl5D_BV0 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, #TheSAS2015, Kaspersky Lab (Business Operation)
Hacking and InfoSec stuff
by Real World Crypto
movies

eye 10

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=sQMm4w23mhw Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 74

favorite 2

comment 0

Briefly demonstrating how to build an EvilOSX payload that will call back to your server over the local network. In this example, we start the payload creation process, add our IP address, and then start a server to listen for connections after our payload is ready to send. Nice and easy! Using Parrot Security OS. Source: https://www.youtube.com/watch?v=csqnJUxrpOw Uploader: Null Byte
Topics: Youtube, video, People & Blogs, EvilOSX, payload, hacking, null byte, Parrot Security, Parrot...
Hacking and InfoSec stuff
by Null Byte
movies

eye 100

favorite 1

comment 0

Hide a Stager in One Line of Code Full Tutorial: https://nulb.app/x5i8r Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 153 A stager is how a hacker establishes a communication channel between them and their target in preparation for an attack. Today, on Cyber Weapons Lab, we'll explore how a stager works and how to execute any hidden Python commands you sneak onto a target's machine. Raspberry Pi Starter Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 142

favorite 0

comment 0

In this follow-up video I go over the full details of cracking open any Master combination lock in 8 tries or less. In my previous video, I provided a simple online tool to crack open any Master combination lock in 8 combinations or less! This new technique will allow you to learn the combination of any Master combo lock with only eight attempts maximum: http://samy.pl/mastervuln/ Online calculator: http://samy.pl/master/ By Samy Kamkar First part here: http://youtu.be/09UgmwtL12c Third part...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, master, cracking, lock,...
Hacking and InfoSec stuff
by Privacy International
movies

eye 32

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=NMxR2_hM2Oc Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 17

favorite 0

comment 0

Again we have an external expert, a participant of SAS 2011, Aviv Raff from Seculert. He talks about the evolution of exploit kits, especially on the server side. Source: https://www.youtube.com/watch?v=fLS4-ogOBN4 Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, exploit kits, Lab Matters, Aviv Raff, Ryan Naraine,...
Hacking and InfoSec stuff
movies

eye 57

favorite 0

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Use SUDO_KILLER to Identify & Abuse Sudo Misconfigurations Full Tutorial: https://nulb.app/x4pde Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 190 Sudo or superuser misconfigurations can easily lead to privilege escalation if not handled properly. In this episode of Cyber Weapons Lab, we're going to show you how hackers can take advantage...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by aantonop
movies

eye 19

favorite 0

comment 0

This talk took place at the 3rd Hackers Congress Paralelní Polis (30th of September - 2nd of October) in Prague, celebrating the age of digital freedom and decentralisation. #HCPP16 Steemit, Yours Network, and future social platforms https://youtu.be/ntoJNuzlTSA What should not go on a blockchain? https://youtu.be/shn9otsT-Pw Proprietary editable blockchains & patent trolls https://youtu.be/Pryy7n1a7UQ Innovations in wallet design https://youtu.be/K5Ei3_D8LQ8 A voluntary alternative to...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks
Hacking and InfoSec stuff
by a16z
movies

eye 75

favorite 1

comment 0

Aging has always been inevitable -- and mysterious in when and how it happens. But now, we're finally beginning to understand the processes behind the deterioration of tissues, cells, functions -- collectively described as "aging" -- that is also the greatest single cause of countless chronic diseases. If we can understand aging, we can perhaps begin to slow it. So in this short talk first delivered at a16z's annual Summit, BIOAGE CEO Kristen Fortney (and PhD in medical biophysics as...
Topics: Youtube, video, Science & Technology, biology, aging, chronic disease, technology, longevity,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 275

favorite 2

comment 0

Learn the easiest way to get into lock picking which you can do for free! Source: https://www.youtube.com/watch?v=Gh5raNMlisc Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, tubular, key, picking, lock...