Skip to main content

Hacking and InfoSec stuff



rss RSS

161
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
movies

eye 50

favorite 0

comment 0

False Leaks" - A Network Lens on Cyber-Enabled Information Operations CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Camille François, Graphika Recording Sponsored by RiskIQ This talk presents our work mapping the social media dissemination networks around a series of “False Leaks” incidents in the recent years, where information obtained by cyber attacks (primarily phishing) are later disseminated, inorganically amplified and presented as “leaks”. It analyzes the...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Strange Loop
movies

eye 34

favorite 0

comment 0

French composer Erik Satie was the forefather of avant-garde music, the founder of a one-man occult sect, and the inventor of entirely new genres for his hauntingly repetitive, minimalist piano works. Personally, I could listen to his "Gnossiennes" forever, so I created a way to do so, using digital sheet music, markov chains, and browser-based midi to create a generative, unending Gnossienne. This talk will explore the strategies, algorithms, and libraries I used to go from 19th and...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 19

favorite 0

comment 0

Beware lest staring into the abyss turns into the abyss staring into you, Nietzsche warned. But once we are committed to seeing clearly and saying clearly what we see, it is hard to turn away. Richard Thieme has spent 25+ years in this “infosec space,” and the phase changes of the industry have taken him and all of us beyond the beginning of the end to the end itself – the end of what we thought we were doing by hacking in the spirit of the hacker ethos. We have created a world that is...
Topics: Youtube, video, Science & Technology, hitb, hitbsecconf, hackinthebox
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 66

favorite 0

comment 0

Source: https://www.youtube.com/watch?v=WgBWFuDTGBM Uploader: Kaspersky Lab
Topics: Youtube, video, Science & Technology, thegrugq
Hacking and InfoSec stuff
by flash /me back
movies

eye 68

favorite 1

comment 0

This is the final part of my 386 machine build series. Sadly, the 386SX mainboard died after briefly coming back to life in the last video. I went hunting for a new one and found a gem of a 386DX40 mainboard. Its BIOS supports 4 floppy drives, but for reasons I only had space for three. But how often have you seen more than two floppy drives on a DOS computer? I'm also adding a network adapter so I can go online with this machine. All the hardware I am using gets a major refurbishment and...
Topics: Youtube, video, Gaming, retro, 386, dos, floppy, networking, internet, refurbish, hardware,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 68

favorite 2

comment 0

Anand Prasad, CISO, Rakuten Mobile Networks In this talk we will present 4G security and issues identified recently followed by in-depth explanation of security enhancements in 5G. We will also cover potential security implications from usage of technologies such as virtualization in mobile networks. Finally we will summarize 5G related security activities expected in near future.Learning Objectives:1: Get a refresher on 4G security, security issues and solutions.2: Learn in-depth regarding 5G...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
movies

eye 151

favorite 2

comment 0

How to Program in Arduino for Hacking Projects Full Tutorial: http://bit.ly/HackMCU Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Knowing how to make use of small-form computers and microcontrollers is a valuable skill for a hacker. But first you have to know the differences between them before you can program them to tailor to your needs. On this episode of Cyber Weapons Lab, we'll give you a short introduction to programming microcontrollers. MCU...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

Ted Claypoole, Partner, Womble Bond Dickinson Natalie Pierce, Shareholder, Littler Mendelson P.C. Stephen Wu, Shareholder, Silicon Valley Law Group Companies that develop, sell or even just operate AI applications and robots are vulnerable to liability for causing accidents, data breaches and other possible system-wide disasters. This talk will explain how the behavior of neural networks and machine learning can cause vulnerabilities and open companies to litigation. The panelists will cover...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
movies

eye 56

favorite 0

comment 0

How to Access Multiple Wi-Fi Adapters Over the Internet Full Tutorial: https://nulb.app/z4k2p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you've ever wanted to take a wireless adapter and make it accessible to other computers on the network, today's tool is for you. With Airserv-ng, you can make use of multiple wireless adapters connected to a Raspberry Pi from the convenience of your computer without SSH. We'll show you how to use it on this...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Wild West Hackin' Fest
movies

eye 67

favorite 0

comment 0

Join us at Way West Wild West Hackin' Fest in San Diego in March 2020: https://www.wildwesthackinfest.com/ Today’s Red Team isn’t enough Why do we care? Because we want to move our defenses and understanding beyond a detection-based approach which has repeatedly been demonstrated to fail. Why did I build SCYTHE? What led me here? - Fortune 50 Retailer Use Case - Bounded Attack Space Philosophy - the atoms of an attack (different way to look at ATT&CK) - Lessons Learned as a CNO expert...
Topics: Youtube, video, People & Blogs, Wild West Hackin Fest, Deadwood, John Strand, Bryson Bort,...
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

An Analysis of Micro and Macro Cyber Attacks in the Ongoing War in Yemen CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Allan Liska, Winnona DeSombre, and Greg Lesnewich, Recorded Future Recording Sponsored by RiskIQ Yemen has been at civil war for more than 3 years. The Yemeni civil war isn't just a war between different factions in Yemen it has also served a proxy war for major global powers. This means that while there are cyber attacks ongoing between the two Yemeni factions...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

Are US Cyber Deterrence Operations Suppressing or Inciting Attacks? CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Jason Healey and Neil Jenkins, Columbia University and Cyber Threat Alliance Recording Sponsored by RiskIQ It is now the policy of the United States to use offensive cyber operations to force adversaries to stop or reduce their attacks. Critics believe such counteroffensive activity may only inflame adversaries, seeing the new U.S. actions as aggressive themselves,...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
movies

eye 349

favorite 2

comment 0

How to Automate Wi-Fi Hacking with Wifite2 on Kali Full Tutorial: http://bit.ly/Wifite2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux comes with an array of tools designed to scan and attack Wi-Fi networks out of the box. We'll show you how to automate this process with Wifite2 on this episode of Cyber Weapons Lab. If you don't have Wifite2 installed, it's easy enough to do so. Wifite2 can target WPS, WPA, and WEP networks. And it uses...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by cultdeadcow
movies

eye 340

favorite 0

comment 0

CULT OF THE DEAD COW released Back Orifice 2000 at DEF CON 7, held in July 1999 at the Alexis Park Resort in Las Vegas. Withheld from the public for 20 years, this candid footage taken inside the Suite of the Elite provides an eyewitness glimpse of the final hours leading up to this unforgettable point in hacker culture. Back during the days of media demonization of hackers, before industry embraced bug bounties, and before the mainstream adoption of Linux, cDc found a way to raise public...
Topics: Youtube, video, Science & Technology, Cult of the Dead Cow, Ninja Strike Force, Back Orifice...
Hacking and InfoSec stuff
movies

eye 26

favorite 0

comment 0

My talk at BSides Orlando 2019 was all about running physical security operations for conferences and events. In an arena where words are your most powerful weapons and you most useful tools, I ask all in attendance to consider what training and techniques they've learned and practiced when it comes to conflict de-escalation, crisis management, and victim counseling. The full talk is up on their YouTube channel... https://www.youtube.com/watch?v=dVTcifBspRc ...and I'd value and appreciate your...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
by CYBERWARCON
movies

eye 17

favorite 0

comment 0

Barely Whispering CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Kurt Baumgartner, Kaspersky Recording Sponsored by RiskIQ Data points over the past couple of years provide quiet hints of links between what was previously considered Sofacy, Zebrocy, and Black Energy. Now, evidence seems to suggest yet another clustering. Some of these connectors breezed through public discussion and some have not. However, when data unexpectedly overlaps between even Turla and Zebrocy, these weak...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Bears in the Lines: Russian Critical Infrastructure Espionage in the Face of US Grid Resilience CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Alex Orleans, FireEye Recording Sponsored by RiskIQ This talk examines the relative resiliency across the U.S. electricity sector to Russia-nexus cyber operations and why, despite significant resiliency in key targets, actors like TEMP.Isotope (aka Dragonfly 2.0, Berserk/Energetic Bear) will continue to engage such targets into the...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by CYBERWARCON
movies

eye 17

favorite 0

comment 0

Behind the Next Destructive Attack CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Adam Meyers, Crowdstrike Recording Sponsored by RiskIQ Board of Directors and C-Level executives concerns around cyber attacks consistently reflect the need for resiliency: can you defend against the next attack like NotPetya? Do you know what threat actors target your industry? What is your plan for crisis response when an attack occurs or after a breach? Gain valuable insight into topics ranging...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
movies

eye 36

favorite 1

comment 0

Artificial intelligence has not only become an international arms race, competition has now heated up as companies look to adopt machine learning/deep learning at an unprecedented pace. But the conversation about AI has largely focused on pitting humanity against AI, instead of what happens when we bring together humans *with* AI. In this talk by a16z operating partner Frank Chen, given at the annual a16z Summit, Chen goes beyond the hype to look forward at how AI and automation will augment,...
Topics: Youtube, video, Science & Technology, artificial intelligence, AI, machine learning, ML,...
Hacking and InfoSec stuff
movies

eye 317

favorite 3

comment 0

How to Brute-Force Web App Credentials with Hatch Full Tutorial: http://bit.ly/HatchWin Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack and today we'll show you how easy it can be, even for a beginner, with a Python tool called Hatch, on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 52

favorite 0

comment 0

How to Identify Deceptive Users Online Using Grabify Full Tutorial: http://bit.ly/Grabify Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie The internet is a wild place where people aren't always who they claim to be. We've likely all encountered a "catfish" online at some point or other, and being able to identify one can be extremely useful to both hackers and common users alike. Today, on this episode of Cyber Weapons Lab, we speak to the...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 60

favorite 1

comment 0

How to Scan Your MacOS Computer for Malware & Keyloggers Full Tutorial: https://nulb.app/z4kmb Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you're worried about the security of your macOS computer, there aren't many reliable services for you to consider that are both effective and free. On this episode of Cyber Weapons Lab, we'll introduce you to Objective-See and a couple of their tools for detecting malware and keyloggers on your Mac....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Medvejatnik
movies

eye 83

favorite 0

comment 0

ТЕЛ. для справок +38073-444-98-95, +38093-300-84-10 WHATSAPP, VIBER, Telegram Сайт: medvejatnik.kiev.ua *Курсы Lock Master*!!!!! Source: https://www.youtube.com/watch?v=Y9n1suS3BPI Uploader: Medvejatnik
Topics: Youtube, video, People & Blogs, Эльбор, Yale, Класс, Securemme, Abus, DOM, Abloy,...
Hacking and InfoSec stuff
movies

eye 61

favorite 0

comment 0

How to Manage Code on Your Local Repo with Git Full Tutorial: http://bit.ly/GitTut Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Most hackers will write some code at some point or other. Knowing how to manage that code in a local repository is an important aspect to software development. Today, we'll show you how to perform basic tasks with Git on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

How to Perform Recon with ReconT & Final Recon Full Tutorial: https://nulb.app/x4lpe Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: twitter.com/KodyKinzie Recon is an essential step in any hacker's operation. Without spending time to understand what a target looks like, a hacker would waste a lot of time running various attacks that yield little to no results. Today, we'll introduce you to a couple Python tools that you can use to conduct recon before an attack, on this...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by DeviantOllam
movies

eye 35

favorite 0

comment 0

There are a variety of ways to copy a key... a simple duplicator with a blank is what most folk have used when they've needed a key in the past. In our training courses, we also talk about stamping, hand-filing, and using code-cutter machines. But all of these techniques rely on your ability to source (or at least replicate) a particular manufacturer's key blank. What if you encounter a particularly obscure lock design or are trying to duplicate a key from a system where the blank is not...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 667

favorite 2

comment 0

How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
movies

eye 109

favorite 0

comment 0

How to Create Fake Packets Using a Packet Manipulation Tool Full Tutorial: http://bit.ly/Scapy Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Being able to infiltrate communications between devices is extremely valuable to a hacker. On this episode of Cyber Weapons Lab, we'll show you how to create and manipulate packets with a Python tool called Scapy. This is just a quick example of how a hacker could use Scapy to craft packets that allow them to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 90

favorite 0

comment 0

How to Code in Lua to Create Nmap Scripts Full Tutorial: http://bit.ly/NmapLua Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Nmap is a powerful tool for network scanning and analysis. On this episode of Cyber Weapons Lab, we'll teach you how to use Lua to code out your own Nmap script to run, that way you're not always relying on other hackers and pentesters' scripts to get a job done. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 80

favorite 0

comment 0

How to Power Lights with a NodeMCU & aRest Full Tutorial: http://bit.ly/WiFiRelay Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Creating an easy to control power relay that operates over WI-Fi sounds much more complicated than it really is. With just a few inexpensive supplies, one can turn a simple ESP8266 and relay into a power switch that can control just about anything over any of your devices. We'll show you how to create one of these on...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 2,280

favorite 18

comment 0

Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
movies

eye 53

favorite 0

comment 0

Ron Woerner, President / Chief Trusted Advisor, RWX Security Solutions, LLC This rapid-fire presentation, an update from the hugely popular 2018 talk, will showcase apps used in cybersecurity testing, investigations, administration and just day-to-day work. You’ll experience advanced techniques using security tools such as Kali Linux, Windows SysInternals Suite, VMWare, Wireshark, NMAP and many more. You will get many tricks and techniques to optimize their use based on your need.Learning...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
movies

eye 40

favorite 2

comment 0

Incorporating natural elements, complex fabrication techniques, and components rarely seen by the outside world, the DEF CON 27 Badge brings our community together through Technology's Promise. Join DEF CON's original electronic badge designer Joe Grand on a behind-the-scenes journey of this year's development process and the challenges, risks, and adventures he faced along the way. Joe Grand (Kingpin) Joe Grand, also known as Kingpin, is a computer engineer, hardware hacker, DEF CON badge...
Topics: Youtube, video, Science & Technology, DEF, CON, DEFCON, DEF CON 27, DC27, DEF CON 2019, hacker,...
Hacking and InfoSec stuff
movies

eye 60

favorite 1

comment 0

How to Defeat Evil Maid Attacks & Malware on a Mac Full Tutorial: http://bit.ly/LuLuDND Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you're serious about your Mac's security and want to take fortifying its defenses a little further, we have a couple tools just right for you. On this episode of Cyber Weapons Lab, we'll recommend tools by Objective-See that will help you detect un-granted access to your computer as well as unknown outgoing...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 71

favorite 0

comment 0

Protect Your Ubuntu System from Network-Based Threats Full Tutorial: https://nulb.app/z4bky Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie tokyoneon's Twitter: https://twitter.com/tokyoneon_ One of the most common attack vectors a hacker exploits is a target's network. If not secured correctly, a hacker could easily discover vulnerabilities during their recon phase and subsequently seek to attack your system. We've covered how to lock down your...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hills Information Security
movies

eye 120

favorite 0

comment 0

Deviant Ollam, from The Core Group, gives a presentation on physical penetration testing and the emotional impact on stakeholders that must be considered when scoping and conducting an engagement. This is a must see for any penetration testing professional or security team considering hiring someone to test their physical security. Download slides: https://deviating.net/lockpicking/slides.html Direct link: https://deviating.net/lockpicking/slides/pen_testing_and_emotional_work.pdf The CORE...
Topics: Youtube, video, Education, Physical Penetration Testing, Pentesting, Pentester, Ethical Hacker,...
Hacking and InfoSec stuff
movies

eye 90

favorite 0

comment 0

Scan & Attack Raspberry Pis with Default Login Credentials Full Tutorial: http://bit.ly/RpiHunt Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie One of the most common mistakes a person makes with a new device is failing to change any default passwords. This leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, we’ll show you a tool called rpi-hunter that can discover and attack any vulnerable Raspberry Pi on a network....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 87

favorite 0

comment 0

Kali Hacking Tools: How to Use Sparta on Network Devices Full Tutorial: http://bit.ly/SpartaKali Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is the best hacking operating system for beginners. What makes it so useful are all the prepackaged hacking tools that come with it, and today we'll cover another big one. On this episode of Cyber Weapons Lab, learn how to easily discover and attack network devices with Sparta. And make sure to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 77

favorite 0

comment 0

How to Analyze & Visualize Network Hosts with ARP Full Tutorial: http://bit.ly/ARPabuse Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie For a hacker, understanding a network environment is a crucial step in preparing for an attack. This involves scanning a network and identifying the various devices, or hosts, on that network to pinpoint your target. Today, on this episode of Cyber Weapons Lab, we'll show you how to use ARP (Address Resolution...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
How to Scan for Website Vulnerabilities Online Full Tutorial: http://bit.ly/Uniscan Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Web application security is huge part of penetration testing. However, the topic can be a bit confusing and overwhelming for beginners. There are many scanners available for hackers or penetration testers to use to find web vulnerabilities, some of which we've covered. Today, on this episode of Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 20

favorite 0

comment 0

Disinformation or Debate? Finding Signal Amid Political Noise CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Olga Belogolova and Madelyn Wilson, Facebook Recording Sponsored by RiskIQ During an elections period, the information environment can become increasingly polarized and noisy, making it ripe for politically-motivated disinformation campaigns. Olga and Madelyn will present on their work at Facebook identifying and disrupting coordinated disinformation campaigns and the...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Min-Hwei Liu, Director, Information Security, Aetna Maintaining focus in an ever-changing threat landscape: Global Security Top 10 Risks. How do we remain focused as a security organization in the ever-changing threat landscape? In this session Aetna will share the steps to the top 10 security risks, the key success factors and metrics, and the steps to kick off this program in your organization.Learning Objectives:1: Understand the importance of a top 10 security risks list to an...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Donald Knuth is one of the greatest and most impactful computer scientists and mathematicians ever. He is the recipient in 1974 of the Turing Award, considered the Nobel Prize of computing. He is the author of the multi-volume work, the magnum opus, The Art of Computer Programming. He made several key contributions to the rigorous analysis of the computational complexity of algorithms. He popularized asymptotic notation, that we all affectionately know as the big-O notation. He also created the...
Topics: Youtube, video, Science & Technology, donald knuth, tex, latex, algorithms, big-o, complexity,...
Hacking and InfoSec stuff
movies

eye 38

favorite 1

comment 0

James Foster, CEO, ZeroFOX Avi Rubin, Professor, Johns Hopkins University Facebook is not to blame for nearly every country’s lack of guidance, regulation or legal precedent on how to secure their sovereignty from election meddling and hacking. This talk will show how nation-state adversaries are targeting election systems, election system supply chains, regional populations, elected officials and the democratic state.Learning Objectives:1: Understand the history of election hacking and how...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 27

favorite 0

comment 0

Michael Aisenberg, Principle Cyber Policy Counsel, The MITRE Corporation Serge Jorgensen, Founding Partner/CTO, Sylint Group Robert Martin, Senior Principal Engineer, MITRE Corporation Lucy Thomson, Attorney, Livingston PLC Adversaries are using cyber-weapons to conduct psychological operations to influence the hearts and minds of voters and interfere with elections. Combatting cyberattacks and social media manipulation is critical to the preservation of the voting process. Come behind the...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
movies

eye 831

favorite 8

comment 0

How to Run an OSINT Investigation on a Phone Number Full Tutorial: http://bit.ly/PhoneOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie IMPORTANT (JUNE 6, 2019): The OSINT Tools by Mike Bazzel featured in this guide were taken down from his website due to increased DDoS-style attacks, as well as DMCAs and cease-and-desists from some of the tools included. Phoneinfoga will still work in this guide, but for the others, you can try using each...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 97

favorite 0

comment 0

Discovering Network Vulnerabilities with Nmap Scripts Full Tutorial: http://bit.ly/NmapCVE Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Nmap is a useful tool in assessing networks prior to attack. In this episode of Cyber Weapons Lab, we'll show you how to use Nmap scripts offensively to discover network vulnerabilities. We used Null Byte writer Tokyoneon's article as inspiration for this video: http://bit.ly/NmapCVE Nmap lets you scan a network...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 224

favorite 0

comment 0

How to Find Hidden Information Online Using Google Dorks Full Tutorial: https://nulb.app/z4m32 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: twitter.com/KodyKinzie A Google search may not be what one thinks of when it comes to hacking. However, Google offers advanced techniques when searching which can offer a treasure trove of hidden and vulnerable services if used correctly. Today, we'll introduce you to Google dorking, on this episode of Cyber Weapons Lab. To learn more,...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Wild West Hackin' Fest
movies

eye 50

favorite 0

comment 0

Join us at Way West Wild West Hackin' Fest in San Diego in March 2020: https://www.wildwesthackinfest.com/ Are you tired of demonstrations of products that take months or years to get effective data from? How many products have you seen half-implemented (but fully paid for!) that didn’t ever deliver any real value to your organization? Here, I’ll discuss multiple free products that you can use next week to find evil inside your organization. Some techniques will find less advanced...
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 91

favorite 1

comment 0

How to Detect Web App Firewalls with Wafw00f Full Tutorial: https://nulb.app/z4lqa Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: twitter.com/KodyKinzie When a hacker is looking to attack a website or web application, it's best that they detect any defenses before they make their move. Using Nmap and a handy tool called wafw00f, a hacker can discover a services firewall and then plan accordingly before running their attack. We'll show you how to use these tools on this episode...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 44

favorite 0

comment 0

How to Fingerprint Hashed Passwords Full Tutorial: https://nulb.app/z4nm2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 132 Hashes are a way to avoid storing passwords in plain-text. It's a common security feature that requires cracking or brute-forcing in order to obtain a password during an attack. But in order to go about doing this, a hacker or pentester would need to know what kind of hash they're dealing with....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 55

favorite 0

comment 0

Watch me fumble my way though my first impression of Ghidra. If you like my videos, please consider supporting me on Patreon: https://www.patreon.com/join/MalwareTech First broadcasted live on Twitch -- Watch live at https://www.twitch.tv/malwaretechblog Source: https://www.youtube.com/watch?v=285b_DEmvHY Uploader: MalwareTech
Topics: Youtube, video, Science & Technology, twitch, Ghidra, NSA, Reverse Engineering
Hacking and InfoSec stuff
movies

eye 39

favorite 0

comment 0

Keren Elazari, Analyst & Researcher, K3r3n3.com Amit Elazari Bar On, Director, Global Cybersecurity Policy/Lecturer, Intel Corporation/UC Berkeley School of Information (MICS) The future of cybersecurity is not about protecting secrets; it’s about our way of life. Join us for a journey to the near future, told from the perspectives of a friendly hacker and a lawyer, who also happen to be sisters. Discover how evolving attack trends are impacting policy landscapes, why trust has become a...
Topics: RSAC, RSA2019, RSA
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 472

favorite 1

comment 0

How to Set Up a Hacking Computer with Parrot Security Full Tutorial: http://bit.ly/ParrotSec Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While Kali Linux is the go-to OS for beginners interesting in penetration testing or hacking, Parrot Security OS is a comparable alternative for those looking for a change. On this episode of Cyber Weapons Lab, we'll show you how to download, install, and run Parrot Security on any computer via a virtual...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 90

favorite 1

comment 0

This is a complete static analysis of the Shadow Hammer Stage 1 Setup.exe. The Ghidra project is available either as a shared project in the rManganese repository on the ghidra-server.org Ghidra server (see https://www.youtube.com/watch?v=ka4vGxLmr4w on how to use this repository) or as a download from https [://] anonfile [.] com [/] 57Uan9ifne [/] ShadowHammer_2019_04_24_gar (WARNING: This is real malware!). Materials used in the video: - Scripts: https://github.com/0x6d696368/ghidra_scripts...
Topics: Youtube, video, Education, 0x6d696368, Ghidra, malware analysis, ShadowHammer, shadow hammer,...
Hacking and InfoSec stuff
by Pen Test Partners LLP
movies

eye 32

favorite 1

comment 0

Car alarm hacking demonstration Source: https://www.youtube.com/watch?v=aZUQmJMuf8c Uploader: Pen Test Partners LLP
Topics: Youtube, video, Science & Technology, hacking, car hacking, IoT security, Automotive security,...
Hacking and InfoSec stuff
by Null Byte
movies

eye 115

favorite 1

comment 0

How to Google Like a Hacker for Files & Target Info Full Tutorial: https://nulb.app/x4m33 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Google is a great search engine but many people don't understand how it actually works. This is why some searches yield poor results and frustrate those in need of more refined information. Today, we'll show you how to utilize Google operators to better narrow down the sea of results while searching, on this...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by CYBERWARCON
movies

eye 28

favorite 0

comment 0

GreyEnergy: Beyond BlackEnergy and NotPetya CYBERWARCON, November 28, 2018, Arlington, VA Presentation by Robert Lipovsky and Anton Cherepanov, ESET Recording Sponsored by RiskIQ In this talk, we’ll uncover connections between several APT groups that have been terrorizing critical infrastructure in Ukraine in the past few years but have, in some cases, been active in other countries as well. The main focus of the talk will be the introduction of GreyEnergy – a malware framework which has...
Topics: Youtube, video, People & Blogs, CYBERWARCON
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 441

favorite 3

comment 0

This aims to be the first in a series of rootkit development. I hate theory so I will move on as soon as possible! Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=8dZFJEc-8uI Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, ethical hacking, hack, russian hacking, why i...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 106

favorite 1

comment 0

Hello World of our Rootkit. JOIN OUR DISCORD!: https://discord.gg/wqKQcmK Zayka's gaming stream Join her army and help the bunnies! https://www.twitch.tv/zayka_gamer_girl Source: https://www.youtube.com/watch?v=nWezK0ydgFA Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, rootkit virus, rootkit - dreams, rootkit removal, rootkit...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 92

favorite 0

comment 0

I am uploading these slowly . The code is done for this part , I am just wanting to make sure that the information is presented well. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=6C-mysDhSs8 Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, root kit, development, driver, linux, programming, programmer,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 157

favorite 3

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=D3Mo7Z74Hfs Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, hacker, learn hacking, learn ethical...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 106

favorite 0

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=q5I8B6b-BoY Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, ethical hacking, hack, wifi hacking, learn hacking, learn...
Hacking and InfoSec stuff
movies

eye 88

favorite 0

comment 0

Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=XJ2w98nRe7Q Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, learn hacking, learn ethical hacking for free, hacking course,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 61

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=_BSZKj_rF5A Uploader: Source Code Deleted
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 100

favorite 0

comment 0

We Have A Discord : https://discord.gg/NEjz9r Zayka_Girl does gaming streams https://www.twitch.tv/zayka_gamer_girl GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=QXj2sYRuk8k Uploader: Source Code Deleted
Topics: Youtube, video, Education, hacking, hack, learn hacking, hacker, ethical hacking, fortnite hacking,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 162

favorite 0

comment 0

Dmitri Alperovitch, Co-Founder & CTO, CrowdStrike George Kurtz, CEO, CrowdStrike Real-world case studies of advanced intrusions on MacOS systems, with detailed breakdown of TTPs and artifacts. In the typical raw Hacking Exposed style, the session will demonstrate these attacks and provide relevant countermeasures for detection and response. Reprising their appearance again this year are also the must-see Adversary Oscars.Learning Objectives:1: Learn what the different attacker TTPs are on...
Topics: Youtube, video, Science & Technology, rsa, rsaconference, rsac, information, security,...
Hacking and InfoSec stuff
by RSA Conference
movies

eye 19

favorite 0

comment 0

Stuart McClure, Chairman and CEO, Blackberry Cylance Brian Robison, Chief Evangelist, Blackberry Cylance In typical Hacking Exposed style, this session will deliver the latest and greatest hacks in live demonstrations that will illuminate the tools and techniques of the attacker. Attacks will include file-based, memory-based, fileless, living on the land, script-based, application-based and many others. And every single hack we demonstrate will bypass existing NextGen solutions available...
Topics: RSAC, RSA2019, RSA
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 350

favorite 2

comment 0

Hello Everyone! In today's Armitage Series Part (4), we offer you the opportunity to show you how Armitage is used in general focusing on bruteforcing techniques via SSH. In the previous video we saw how to Elevate from Shell to a Meterpreter Session. In this Hacking Minutes Series we will be talking about BruteForcing Via SSH and how you can do it. There are a few methods of performing an SSH brute-force attack that will ultimately lead to the discovery of valid login credentials, many...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 196

favorite 1

comment 0

Hello Everyone! Today's Armitage Series, offers you an opportunity showing you how Armitage is used in general. In the previous video we saw what is Armitage and how to setup it up. Armitage organizes Metasploit's capabilities around the hacking process. There are features for discovery, access and post-exploitation. When you exploit a host, you will have a session on that host. Armitage knows how to interact with shell and meterpreter sessions. To use Armitage, it helps to understand...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 158

favorite 1

comment 0

Hello Everyone! In today's Armitage Series Part (3), we offer you an opportunity showing you how Armitage is used in general. In the previous video we saw how you can exploit a host, you will have a meterpreter session on that host using Armitage. Running NMAP scans with Armitage we will find all open ports and the service version on Target. Shell is the beginning because there are some exploits which provide directly to the victim’s command shell instead of meterpreter session, we have tried...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 166

favorite 2

comment 0

Hello Everyone! In Today’s Hacking Minutes Series, we will focus on Post Exploitation where Shell is just the beginning. We will see how with meterpreter session you can upload a file on victim machine and then you can run it . Giving you the power to run any file that you need to, to extract the information you want. In this video, we will use The LaZagne Project, how black hats, real fast, what they can do using their skill and choices of tools, because when you have session, and you have...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 341

favorite 1

comment 0

Hello Everyone! In this video, we will see the usage of the Armitage tool which is the GUI of Metasploit by Rapid 7, and how to setup it up. Armitage is a cyber-attack management tool for the Metasploit Project. It is Java-based GUI frond-end for the Metasploit Framework and is included in Kali. The usage is the same job with Metasploit but Armitage is a different point of view of experience advanced post-exploitation features in the framework because you can perform many jobs at the same time,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
movies

eye 112

favorite 0

comment 0

How to Use QR Codes to Hack Mobile Phones & Scanners Full Tutorial: https://nulb.app/x4l5g Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie QR Codes are a fun way of scanning information with your mobile device on the go. However, this popular technique can be taken advantage of and used to inject malicious code and commands by a knowledgeable hacker. On this episode of Cyber Weapons Lab, we'll introduce you to a malicious QR code generator called...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...