Skip to main content

Hacking and InfoSec stuff



rss RSS

37
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D E F G H I J K L M N O P Q R S T remove-circle U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=krO_RqRGd40 Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
by Samy Kamkar
movies

eye 226

favorite 0

comment 0

USBdriveby (http://samy.pl/usbdriveby) is a device you stylishly wear around your neck which can quickly and covertly install a backdoor and override DNS settings on any unlocked machine via USB in a matter of seconds. It does this by emulating a keyboard and mouse, blindly typing things, flailing the mouse pointer around and weaponizing mouse clicks. It also evades several security measures in OS X, including hacking the accessibility settings, window positioning, overriding network settings,...
Topics: Youtube, video, Science & Technology, hacking, usbdriveby, samy kamkar, reverse engineering,...
Hacking and InfoSec stuff
by Privacy International
movies

eye 17

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=dZclHtF-URk Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international, data protection
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 49

favorite 0

comment 0

_Unauthorized Access_ documentary by Annaliza Savage 1994 Source: https://www.youtube.com/watch?v=EUiWzwmDSx8 Uploader: cultdeadcow
Topics: Youtube, video, Science & Technology, unauthorized, access, annaliza, savage, cDc, cult, of,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 35

favorite 0

comment 0

Koldo Valle Garcia, Elecnor Group; Lorenzo Martinez, Securízame A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=acUnNQ-AuJY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
by Google Students
movies

eye 892

favorite 5

comment 0

The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators, metaclasses, reference-counting and the...
Topics: Youtube, video, People & Blogs, Google, Students, Learning, Python
Hacking and InfoSec stuff
movies

eye 66

favorite 1

comment 0

In the last few years, we've seen more and more interest in Tor onion services (aka Tor hidden services). They are used by press to host whistleblowing platforms, by activists who want to set up a website that authorities want to shut down, by service providers to offer more security to their users, and for tons of other uses as well. This panel will be presenting the technical aspects of Tor onion services as well as interesting use cases. As the onion service protocol aged, weaknesses started...
Topics: Youtube, video, Science & Technology, Dark Web, Darknet, Darkweb, Hidden Services, Tor, Onion...
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

The talk about cyberphysical threats on water systems by Riccardo Taormina from SUTD on Industrial Cybersecurity Conference 2019. #KasperskyLab #KICS #cybersecurity #ITsecurity Source: https://www.youtube.com/watch?v=dZuUFuDID-Q Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, ICSSecurity, ICSCybersecurity, KICS, Industrial,...
Hacking and InfoSec stuff
movies

eye 36

favorite 0

comment 0

Request an invite to this discussion or post your questions in the chat or as comments on this video about zk-SNARKs (zero-knowledge non-interactive succinct arguments of knowledge). We'll be hosting an educational session based on the initial explainer series (start here: https://z.cash/blog/snark-explain.html). Chat transcript: https://docs.google.com/document/d/1cE64xsnOkPryo7dDoeWKSL7DpYh5V0LH9L80u9vjnxY/edit?usp=sharing Source: https://www.youtube.com/watch?v=yNS_ttTj1KE Uploader: Zcash
Topics: Youtube, video, Science & Technology, cryptography, zero-knowledge proofs, zcash,...
Hacking and InfoSec stuff
movies

eye 145

favorite 1

comment 0

Unlocking Motion-Sensor Secured Doors With Air Duster (Canned Air) by Samy Kamkar (read more...) After testing various methods purportedly used to defeat motion sensors that are used to unlock doors, I found none of the methods documented on the Internet or that I heard about actually work. After performing my own research, I discovered a new technique that actually does work, and is simple and inexpensive -- using air duster (canned air) to set off the PIR (passive infrared) motion sensor from...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, canned air, air duster,...
Ben Lorica and Roger Chen describe the state of adoption of AI technologies and provide a glimpse into tools and trends that are poised to accelerate innovation and the introduction of new applications. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source:...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Unrestricted Warfare on Campus: Chinese Information Operations and American Higher Education CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Lauren Cooper, Carnegie Mellon University CERT Recording Sponsored by RiskIQ American colleges and universities serve as reliable sources of both cutting edge research and earnest idealism, and this combination has not gone unnoticed by intelligence and security services from around the world. China, in particular, has been targeting American...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 14

favorite 0

comment 0

Technical talks from the Real World Crypto conference series. Source: https://www.youtube.com/watch?v=8FFVCWWpygE Uploader: Real World Crypto
Topics: Youtube, video, Science & Technology, #realworldcrypto
Hacking and InfoSec stuff
movies

eye 24

favorite 0

comment 0

We're back! Here's what we've been up to, where we've been, and what we've changed to make sure we can keep bringing you great content! Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Thanks to a new policy banning instructional hacking, many of our videos started attracting unwanted attention. To fix this, we've been working on ways to keep bringing you the content you love, without getting banned from the platform. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Privacy International
movies

eye 18

favorite 0

comment 0

More videos and information here: https://privacyinternational.org Support PI here: https://privacyinternational.org/donate Source: https://www.youtube.com/watch?v=b8-hT-QHwhc Uploader: Privacy International
Topics: Youtube, video, People & Blogs, privacy, surveillance, privacy international, communications...
How To Use Viim on Your Kali System Full Tutorial: http://bit.ly/VIMbasics Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Text Editors in a terminal or command line setting can be a little confusing at first. A common text editor is Vim and it's an editor every hacker should be familiar with. Today, we'll show you not only how to use it, but also how to exit Vim on this episode of Cyber Weapons Lab. For a written reference, please check out Barrow's...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 43

favorite 1

comment 0

How to Set Up Google Advanced Protect on Any Device Full Smartphone Tutorial: http://bit.ly/GAPphones Subscribe to Null Byte: https://goo.gl/J6wEnH - Setting up Advanced Protection on Windows: 0:45 - Using keys on Kali Linux: 4:30 - Using keys on Arch: 9:40 - Using keys on macOS: 10:31 - Using keys on Android devices 11:05 - Using keys on iOS devices 12:06 For celebrities, business owners, human rights workers, and other security-conscious users, the threat of phishing can be reduced...
Topics: Youtube, video, People & Blogs, google, security, advanced protection, advanced protection...
Hacking and InfoSec stuff
movies

eye 189

favorite 0

comment 0

How to Attack Network Hosts & Intercept Passwords Over WiFi Full Tutorial: http://bit.ly/EtterARP Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux comes with a lot of useful hacking tools by default. Today, we'll show you Ettercap, which allows a hacker to attack a network from within on this episode of Cyber Weapons Lab. To be more specific, we'll be using Ettercap to perform an ARP spoofing attack. When successful, we can get traffic...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 60

favorite 0

comment 0

How to Find Hidden Subdomains from Certificate Trust Logs Full Tutorial: http://bit.ly/CTexposer Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Certificate Trust logs are a security feature designed to prevent attackers from creating malicious subdomains to trick users. Unfortunately, it also creates a list of all the various subdomains that have a certificate attached, sometimes revealing private information a company might not want public. We'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 189

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Exfiltrate Data from a Mac Using Pictures Full Tutorial: https://nulb.app/x4kw8 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 170 Compromising a computer is usually just the first part of a larger attack. A hacker must then figure out a way to sneak off with any stolen data without being detected. Today, in this Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 117

favorite 0

comment 0

How to Create Reverse Shells with Netcat Full Tutorial: http://bit.ly/NetcatNC Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Netcat and Ncat are two useful tools for copying data across a network. To a hacker, the only limit to these tools utility is your imagination, and we'll demonstrate the ability to do everything from copying data across a local network to remotely controlling a computer with a reverse shell. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 101

favorite 2

comment 0

How to Conduct Network Recon with Nmap Full Tutorial: http://bit.ly/NmapTactical Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you find yourself on a Wi-Fi or Ethernet connection, it might be confusing to know how to figure out what else is on the network. Nmap is a powerful tool for exploring and learning about devices around you on a network. We'll explore the various uses of Nmap, and show you some of the most useful scans for a beginner, in...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Automate the Generation of Common One-Liners Full Tutorial: https://nulb.app/x4oke Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 167 One-liners are the result of taking multiple lines of code and combining and condensing them into a single executable line that a computer will use as instructions. They can be used for mundane tasks or they...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 97

favorite 1

comment 0

How to Run an OSINT Investigation with Photon Scanner Full Tutorial: http://bit.ly/photonOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Planning is an essential phase to any hack. If you have a target website and you wanted to mine it for information, having the right tool capable of scraping for OSINT data is priceless. On this episode of Cyber Weapons Lab, we'll introduce you to such a tool called Photon Scanner. Follow Null Byte on:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 134

favorite 2

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Find License Plate OSINT with Skiptracer Full Tutorial: https://nulb.app/x5j6g Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 160 Running someone's plates may seem like something only the police can do, but it's open-source intelligence, for the most part. In today's episode of Cyber Weapons Lab, we'll use a Python program called Skiptracer...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Hide & Detect Secret Messages in Plain Text Full Tutorial: https://nulb.app/x4m6w Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/the_hoid Cyber Weapons Lab, Episode 161 Today, in this episode of Cyber Weapons Lab, we are going to take advantage of a little-known feature in Unicode to hide messages in plain text. As a bonus, the hidden message will go with the text...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Use an RTL-SDR Dongle on an Android Phone Full Tutorial: http://bit.ly/SDRandroid Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The RTL-SDR is a cheap, powerful software-defined radio dongle that is popular in the hacker community. While it can be annoying to set up, using it on an Android device is free and surprisingly easy. Once set up, you can listen to radio conversations from a wide range of radio frequencies. Police dispatch traffic,...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacker, hacks, hackers,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 17

favorite 0

comment 0

Erik Johansson, Management Doctors A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=_8OltGxPxHY Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly Instagram: https://www.instagram.com/oreillymedia LinkedIn: https://www.linkedin.com/company-beta/8459/ Source: https://www.youtube.com/watch?v=wgjnAYp4qTg Uploader: O'Reilly
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
by Alec Muffett
movies

eye 68

favorite 0

comment 0

A short introduction to how to use EOTK, the Enterprise Onion Toolkit. Software and documentation at https://github.com/alecmuffett/eotk See also the next video, "Rough Edges", at https://youtu.be/UieLTllLPlQ Source: https://www.youtube.com/watch?v=ti_VkVmE3J4 Uploader: Alec Muffett
Topics: Youtube, video, Science & Technology, tor, eotk, onion networking, privacy
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Followup to Video #1, dealing with SSL and HTML challenges. Source: https://www.youtube.com/watch?v=UieLTllLPlQ Uploader: Alec Muffett
Topics: Youtube, video, Science & Technology, tor
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 37

favorite 0

comment 0

Runa Sandvik, Freedom of the Press A talk at Kaspersky Lab's Security Analyst Summit #TheSAS2015 Source: https://www.youtube.com/watch?v=tPJv5B-DKoI Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology
Our world is one of constantly changing business environments across various business units, limited end-to-end visibility, and high alerts. Join Akhilesh Tripathi to learn how to use machine learning to identify root causes of problems in minutes instead of hours or days by automating routine tasks without scripting or preprogramming. Subscribe to O'Reilly on YouTube: http://goo.gl/n3QSYi Follow O'Reilly on: Twitter: http://twitter.com/oreillymedia Facebook: http://facebook.com/OReilly...
Topics: Youtube, video, Science & Technology, O'Reilly Media (Publisher), O'Reilly, OReilly, OReilly...
Hacking and InfoSec stuff
movies

eye 70

favorite 0

comment 0

In this episode, Kody and Stefan introduce the ESP32 microcontroller, and use it to capture packets like a wireless network adapter in Wireshark. Source: https://www.youtube.com/watch?v=4Hs6x1tMzf4 Uploader: SecurityFWD
Topics: Youtube, video, Entertainment, securityfwd, varonis, esp32, esp32 microcontroller, packet sniffing,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 156

favorite 0

comment 0

Lets switch gears and instead of picking locks, we will bypass them! I showcase my upgraded Sparrows under door tool (UDT) and show you its various applications. Source: https://www.youtube.com/watch?v=5y4kNsS38F0 Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 40

favorite 0

comment 0

In this video we take a look at one of my newest creations, a half door which has hot swappable hardware for quick and easy under door tool practice for a variety of situations. Link to my dimensional sketches: https://drive.google.com/file/d/1pJbsdbja5GzQf9Tg2pgc6Rech9ivRYP7/view?usp=sharing Source: https://www.youtube.com/watch?v=hUTm8pk4g6g Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 26

favorite 0

comment 0

In this video we will take a look at using retractable key ring holders as UDT strings, something which I first introduced in video #2 and which I have since improved upon. Source: https://www.youtube.com/watch?v=EB0LLO_Dvpo Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs