Skip to main content

Hacking and InfoSec stuff



rss RSS

224
RESULTS


More right-solid

Show sorted alphabetically

More right-solid

Show sorted alphabetically

More right-solid
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by Thug Crowd
movies

eye 27

favorite 0

comment 0

https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=WLpU4tLCBN8 Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 58

favorite 0

comment 0

Come hear the tale of reverse engineering the Satellaview, a satellite add-on for the Super Famicom to download games. You may have never heard of it, but come see how it works! https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=qUAmk8dYmrg Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, satellaview
Hacking and InfoSec stuff
by Thug Crowd
movies

eye 27

favorite 0

comment 0

Join the mainframe society, previously operating in secret to further the study and advancement of mainframe security around the world! @mainframed767 @nogonosa @bigendiansmalls @WizardOfzOS @zBit31 @ch1kpee --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=OQ5fk24_Q4E Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, mainframe
Hacking and InfoSec stuff
movies

eye 49

favorite 0

comment 0

Come examine a typical Layer 2 switch, without many features, identify a 'root' level vulnerability, and see what we can achieve. Drop or even modify packets in transit? Hide malicious activity? --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=RwJo5jnu3nY Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, networking, ics
Hacking and InfoSec stuff
movies

eye 23

favorite 0

comment 0

Come and discuss a number of different methods to exfiltrate data SSRF. We were able to hack some of the major transportation, hospitality, and social media companies for big bounties! --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=r2I0DD8boUc Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

Come see techniques using containers and QEMU used to emulate non-x86 firmware to demonstrate capabilities and limitations when used for security research (and target practice) --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=N0EYsO0VxZo Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
by Thug Crowd
movies

eye 14

favorite 0

comment 0

Come see how rapid prototyping has worked for projects that resulted in the demonseed and o.mg cable. MG is a thug of chaos, and this presentation promises to be nothing less! --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=-X5kSaKH08A Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
by Thug Crowd
movies

eye 19

favorite 0

comment 0

The Twitch2Shell event will begin! You can interact with a real shell using twitch chat commands. This time can be used for rigorous scrub downs and maintianing healthy fluid levels. --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=FRaLYtSbQv0 Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, twitch2shell
Hacking and InfoSec stuff
movies

eye 22

favorite 0

comment 0

Hit the back 9 on an adventure of binary mangling and manipulation. Lower your par with approach, rationale and techniques for ELF and PE formats. Enjoy tips, tricks and polyglot treats to minify your game. --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=VLmrsfSE-tA Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 16

favorite 0

comment 0

What about disclosure? Does hacking in a skimask make you a burglar? Meet the ghosts of past present and future to create conversation between builders and breakers with disclose.io --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=LQBVKJaQbQA Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 63

favorite 0

comment 0

A classic heap overflow can’t lead to code execution! Come see how with some grooming and a little application login how you can defeat all current mitigations in Linux allocators such as ptmalloc2 --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=fml320LCleI Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 20

favorite 0

comment 0

V8 is so complex that it has its own bug classes You'll be able to learn about the gory internals of one of the most used JS engines in the world and the best approach for finding JS engine vulns --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=i9O_vYQbZEo Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, v8
Hacking and InfoSec stuff
movies

eye 35

favorite 0

comment 0

From regular expression magic to Unicode jiu-jitsu, we will end mixing the two to create some Unicode/regular expression krav maga for maximum damage in Golang, Ruby, Python, C# --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=AqAI6Ta7V8w Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference, pentesting,...
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

A recap of the days events, announcing the winners of the CTF and Ch0pp3d events. --- https://airgapp.in https://twitter.com/Airgappin https://twitter.com/thugcrowd -- Watch live at https://www.twitch.tv/hardchat Source: https://www.youtube.com/watch?v=kcWW5n2Lig4 Uploader: Thug Crowd
Topics: Youtube, video, Gaming, twitch, games, airgap2020, infosec, security, conference
Hacking and InfoSec stuff
movies

eye 68

favorite 0

comment 0

How to Analyze Wi-Fi Data Using Jupyter Notebook Full Tutorial: https://nulb.app/x4ogu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 141 Wireshark is a great tool for analyzing Wi-Fi packets and collecting information about the network traffic. However, this much information can be burdensome so interpret in a meaningful way without some help. Today, on this episode of Cyber Weapons Lab, we'll use Jupyter Notebook to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

In this talk, we will explain why diversity is essential for reaching the desired security and anonymity properties. Both for the Tor Project organization itself, but also for our community, as well as in our daily work with creating privacy-enhancing tools such as the Tor Browser or safeguarding the network itself against attackers. Alex (ahf) is a Free software minded hacker from Copenhagen who enjoys working on privacy-enhancing technologies, cryptography, security, and distributed systems....
Topics: Youtube, video, Nonprofits & Activism
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 1,228

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education, software cracking, cracking, cracking software, software, hacking, crack...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 455

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education, hacking, hacking tutorial, hacker, hackers, learn hacking, hack, hacking...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 88

favorite 5

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. When I find the binaries for practice I will upload them on the first video of this...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 94

favorite 4

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 89

favorite 4

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 64

favorite 0

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Use Android & Raspberry Pi for Local Voice Comms Full Tutorial: https://nulb.app/x6vtu Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 163 It can be difficult to communicate off the grid when there's no infrastructure. That's also true when you're in situations where there is no cellular service or reliable Wi-Fi hotspots, such as a convoy...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

How to Track Nearby Wi-Fi Networks with Arduino Full Tutorial: https://nulb.app/z4nm4 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 147 VPNs are important for maintaining online privacy. But what if a hacker or pentester could bypass a VPN's ability to hide a device's location using the Wi-Fi networks around them? Today, on Cyber Weapons Lab, we'll explore that possibility with our third installment of hacking with...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
CNN on Twitter: "We asked a hacker to try and steal a CNN tech reporter's data. Here's what happened: https://t.co/OaAHV5FqCq https://t.co/XoMI4nno89" Source: https://twitter.com/CNN/status/1185251729643847680?ref_src=twsrc%5Etfw%7Ctwcamp%5Etweetembed%7Ctwterm%5E1185656917147783168 Uploader: CNN
Topics: TwitterCard, video
Hacking and InfoSec stuff
movies

eye 29

favorite 0

comment 0

Map Wi-Fi Devices with Jupyter Notebook Full Tutorial: https://nulb.app/z4pgg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 149 Wigle WiFi is an Android app that lets a hacker or pentester discover and map networks nearby, including those created by printers or other insecure devices. However, the default tools used to analyze data collected by Wigle don’t provide the robust results one would need to best survey nearby...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 39

favorite 0

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use Port Forwarding to Access Tools & Services Remotely Full Tutorial: https://nulb.app/x48k8 Subscribe to Null Byte: https://goo.gl/J6wEnH Michael's Twitter: https://twitter.com/the_Hoid Cyber Weapons Lab, Episode 189 Many services and tools we cover on Null Byte only run on the local network by default. In this episode of Cyber Weapons Lab, we're showing how to configure a router so that you can access...
Topics: Youtube, video, Howto & Style, nullbyte, null byte, hack, hacking, hacker, hacks, hackers, how...
Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Use MicroPython to Control Electronic Devices Full Tutorial: https://nulb.app/x5i8l Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 175 MicroPython is a great language for beginners trying to learn the how to program small electronic devices like an ESP8266. In this episode of Cyber Weapons Lab, we'll teach you how to use both —...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
We discuss ZoomBombing Court Hearings, The Mysteries of Europe, Database Shredding Hackers, Virtual Defcon, Human Augmentation, and more. 00:00 Introduction ... Source: https://www.youtube.com/watch?v=4GXDhCDbM24 Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
movies

eye 113

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use John the Ripper for Cracking Full Tutorial: https://nulb.app/x726p Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 176 The Secure Shell network protocol, usually used to manage remote machines, is prone to password brute-forcing. That's why key-based authentication is used when security is paramount since private keys can be encrypted....
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 124

favorite 1

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How a Hacker Would Create a Winning Password List Full Tutorial: https://nulb.app/x4a7b Subscribe to Null Byte: https://goo.gl/J6wEnH Tim's Twitter: https://twitter.com/tim51092 Cyber Weapons Lab, Episode 177 Brute-force attacks are a common way that hackers crack passwords. However, it also tends to be slow and inefficient. In this episode of Cyber Weapons Lab, we're going to use a tool called Pipal to analyze leaked...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 39

favorite 0

comment 0

How to Create Your Own Password-Cracking Libraries Full Tutorial: https://nulb.app/x4s5v Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 154 Dictionary attacks are one of the most common and successful forms of brute-forcing attacks around. Today, in this episode of Cyber Weapons Lab, we'll show you a tool called Wordlister, which allows you to create target-specific word lists for an increased chance of success. Big...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 62

favorite 0

comment 0

How to Turn an ESP8266 into a Fake AP Juggernaut Full Tutorial: https://nulb.app/x51lf Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 157 Creating fake access points is one method of tricking a target into giving up their Wi-Fi credentials — without them ever being the wiser. We've covered various tools for making rogue APs, but on this episode of Cyber Weapons Lab, we'll use an ESP8266 and simple MicroPython code to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 109

favorite 1

comment 0

Hacking with Arduino: Creating a Wi-Fi Backdoor Full Tutorial: https://nulb.app/x4njg Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 140 Rogue access points mimic trusted APs and grant a hacker access to your network activity. On this episode of Cyber Weapons Lab, we'll show you how to use Arduino and some low-cost hardware to create one that forces a target machine to connect, creating a backdoor. Preventing such an...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 36

favorite 1

comment 0

This talk presents and examines cybercraft. Cybercraft is used to understand great power conflicts from a strategic level that includes the cyber domain, and operations within the cyber domain. Under this lens, the details of individual cyber operations are less interesting than how they are collectively advancing towards strategic objectives. This expands the understanding of cyber conflict beyond the constraints of CyberWar. Existing discussions of CyberWar are severely hampered by focusing...
Topics: Youtube, video, Science & Technology, cyberwar, cyber warfare, infowar, cybercraft, cyber...
Hacking and InfoSec stuff
movies

eye 33

favorite 0

comment 0

In this episode, Kody and Tim will develop malicious Duckyscript payloads from scratch targeting PowerShell. Source: https://www.youtube.com/watch?v=8nZEkFcXFp0 Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, hacking, powershell, varonis, securityfwd, computer,...
Hacking and InfoSec stuff
by DeviantOllam
movies

eye 60

favorite 0

comment 0

My long-time friend Chris and his colleague and compatriot Ron have an excellent podcast based out of their San Jose offices. You all should totally check them out!... https://hackervalleystudio.podbean.com https://linktr.ee/hackervalleystudio Recently, these two gentlemen were awesome enough to invite me by their place and have me join them as a guest on their show. It was a blast, and in addition to them putting the audio up here......
Topics: Youtube, video, People & Blogs
Hacking and InfoSec stuff
movies

eye 32

favorite 0

comment 0

Kick things off with Okta's Chief Security Officer, David Bradbury then hear from our opening keynote surprise guest. This talk describes strategic cyber war... Source: https://www.youtube.com/watch?v=_k0MkJMHPi0 Uploader: OktaDev
Topics: Youtube, video, Disclosure2020, Okta, Security
Hacking and InfoSec stuff
movies

eye 59

favorite 1

comment 0

How to Discover Hidden HTTP Parameters with Arjun Full Tutorial: https://nulb.app/z4x2u Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 155 When auditing a website, it can be difficult to find all of the HTTP parameters the page takes. In today's Cyber Weapons Lab video, we'll go over an automated tool for discovering those hidden parameters. That tool is called Arjun. Big shoutout to Null Byte user drd_ whose article...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 42

favorite 0

comment 0

Kody Kinzie & Stefan Kremser show off the Wi-Fi Duck, an open-source, low-cost hacking platform capable of dropping advanced payloads into any device it's plugged into. Source: https://www.youtube.com/watch?v=PQmsMNdgl4g Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, SecurityFWD, Varonis, Wi-Fi Hacking, Duckyscript, WiFiDuck
We talked about EMP Weapons, Stalkers & Home Security, Deviant's covert Pie, Cars, Guns, Infosec Buzzwords, The Darknet, and Bad Risk Management. Featuring @... Source: https://www.youtube.com/watch?v=gNJYDSY4KBk Uploader: MalwareTech
Topics: Youtube, video
Hacking and InfoSec stuff
movies

eye 42

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Make an Offline Text-Based Chat System Full Tutorial: https://nulb.app/z6vu2 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 164 Sometimes, you need an offline way of communication, such as after a natural disaster, during a protest demonstration, or where there is just no cellular or Wi-Fi networks to get you online. In this Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 41

favorite 0

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Use GoScan for Network Enumeration Full Tutorial: https://nulb.app/x4ueo Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 173 Network enumeration is a vital yet tedious phase of an attack. In this episode of Cyber Weapons Lab we're going to take a look at a tool called GoScan which builds upon Nmap, offering an automated way to enumerate...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Null Byte
movies

eye 100

favorite 1

comment 0

Hide a Stager in One Line of Code Full Tutorial: https://nulb.app/x5i8r Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 153 A stager is how a hacker establishes a communication channel between them and their target in preparation for an attack. Today, on Cyber Weapons Lab, we'll explore how a stager works and how to execute any hidden Python commands you sneak onto a target's machine. Raspberry Pi Starter Kit:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 57

favorite 0

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop How to Use SUDO_KILLER to Identify & Abuse Sudo Misconfigurations Full Tutorial: https://nulb.app/x4pde Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 190 Sudo or superuser misconfigurations can easily lead to privilege escalation if not handled properly. In this episode of Cyber Weapons Lab, we're going to show you how hackers can take advantage...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 93

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Root Linux in Minutes with Linux Exploit Suggester Full Tutorial: https://nulb.app/z4s5u Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 162 Once you have access to a system, privilege escalation is your priority. Today, in this episode of Cyber Weapons Lab, we are showing a tool that keeps track of all the privilege escalation exploits and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 34

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Disguise Payloads in Different Ways Full Tutorial: https://nulb.app/z515c Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 159 Payloads can't always be run easily. Often, you need to get around antivirus software and other defenses. The best way to do that is by hiding or obfuscating the payload. Today, in this episode of Cyber...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Openfest Bulgaria
movies

eye 42

favorite 0

comment 0

Did you know that it is possible to create fully encrypted peer-to-peer connections between web browsers? That you can stream audio, video, and even arbitrary data between browsers (almost) without a server in between? Enter WebRTC: open web standards are truly amazing! This talk explains how WebRTC works, why it is relevant in 2019, how to write your own peer-to-peer applications, and how to move even beyond web browsers and into IoT applications. Source:...
Topics: Youtube, video, Science & Technology
Hacking and InfoSec stuff
movies

eye 47

favorite 0

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop What Hacking Looked Like from 1985–1990 Full Tutorial: https://nulb.app/x4lds Subscribe to Null Byte: https://goo.gl/J6wEnH Michael's Twitter: https://twitter.com/The_Hoid Cyber Weapons Lab, Episode 158 In today's episode of Cyber Weapons Lab, we're going to explore what hacking looked like in the 1980s and ' through a hacking video game called Telehack. You'll learn everything you need to know about navigating the...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 134

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=qFA3kFj4uwY Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, hacking, rootkits, ethical hacking, hacker, installing rootkit,...
Hacking and InfoSec stuff
movies

eye 74

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=ljUBvGS5SYo Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, rootkits, rootkit virus, rootkit removal, root-kit, rootkit do...
Hacking and InfoSec stuff
movies

eye 76

favorite 0

comment 0

In this video we will hook syscall_read. This is critical thing you must understand for making a Rootkit and interacting with the system calls. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=PNYzOWRPusY Uploader: Source Code Deleted
Topics: Youtube, video, Education, rootkit, rootkit virus, rootkit elevate, rootkit removal, kali linux...
Hacking and InfoSec stuff
movies

eye 69

favorite 0

comment 0

In this video we look at intercepting Syscall_Connect to monitor connections. In the next video we will See how we can control these to our will. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code https://github.com/SourceCodeDeleted/rootkitdev-linux Source: https://www.youtube.com/watch?v=P3uOyoBIDxI Uploader: Source Code Deleted
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 107

favorite 0

comment 0

Here we will take control Syscall_Connect functionality to force redirection to a port and IP of our wishes. Ironically , I don't see anyone that has done the same thing with his/her rootkit . Of the many SysCalls , I think this was one of the safer ones to manage. Like and Click the bell. Zayka's Gaming Twitch : Follow her for gaming stuff https://www.twitch.tv/zayka_gamer_girl JOIN OUR DISCORD !: https://discord.gg/wqKQcmK GIT HUB | Source Code...
Topics: Youtube, video, Education, rootkit, virus, development, hacking, how2hack, how to hack, make...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 54

favorite 0

comment 0

Here we will take control execve syscall. This is mainly for monitoring purposes, we can technically re do the commands fairly easily. Linux Kernel 5.3 solves the CR0 write exploit by making that register read only. Here is some information on this. The Write up: https://outflux.net/blog/archives/2019/11/14/security-things-in-linux-v5-3/ The Commit: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=873d50d58f67ef15d2777b5e7f7a5268bb1fbae2 Like and Click the bell....
Topics: Youtube, video, Education
Hacking and InfoSec stuff
movies

eye 138

favorite 0

comment 0

Linux Kernel 5.3 solves the CR0 write exploit by making that register read only. Today let's discuss how we can write to the SyscallTable directly and not rely on the CR0 write exploit that we have been using. I heard about this method some time ago and I thought it had long been patched and wouldn't work . However as Nasm points out the ptr exploit still works and still has application. https://en.wikipedia.org/wiki/Control_register...
Topics: Youtube, video, Education, x86 CR4 & CR0, pinning, bypass, hacking, rootkit, cr0 wp bit went...
Hacking and InfoSec stuff
by SecurityFWD
movies

eye 57

favorite 0

comment 0

With employees all over the world working from home, hackers are at an advantage when users don't have an IT department working in their defense. Kody Kinzie and Timothy Schellin demonstrate just how easy it is for hackers to lure victims into disclosing their Wi-Fi password using a tool called Airgeddon to execute an evil twin attack. After breaking in, hackers can take control of the router, redirect Wi-Fi traffic, steal information and attack other devices on the network. Source:...
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
Hacking and InfoSec stuff
movies

eye 194

favorite 0

comment 0

Millions of people are working remotely – and attackers are taking advantage. As more workers log into residential WiFi networks, cybercriminals have plenty of opportunities to launch attacks. Varonis security researcher Kody Kinzie created this video to show how easy it is for an attacker to launch an attack using an off-the-shelf hacking tool and trick an unsuspecting user into giving up their WiFi password. Source: https://www.youtube.com/watch?v=nHaJUjhfjjI Uploader: SecurityFWD
Topics: Youtube, video, Science & Technology, Hacking, Hacking WiFi, Airgeddon, Data Security, Varonis,...
Hacking and InfoSec stuff
movies

eye 163

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop How to Host Your Own Tor Hidden Service Full Tutorial: https://nulb.app/z472e Subscribe to Null Byte: https://goo.gl/J6wEnH Tim's Twitter: https://twitter.com/tim51092 Cyber Weapons Lab, Episode 172 The deep web. You might think of drugs, hackers, and other criminal activity when you hear those two words, but the Tor network is a valuable tool for preserving privacy and anonymity. To browse the deep web, you just...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 87

favorite 0

comment 0

Showing How Ettercap Works with Arp-Spoofing Full Video: https://nulb.app/z4g2l Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 061 (Recut - Partial Episode) Kali Linux comes with a lot of useful hacking tools by default. Today, on this episode of Cyber Weapons Lab, we'll show you Ettercap, which allows a hacker or pentester to attack a network from within. To be more specific, we'll be showing how Ettercap can be used to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 155

favorite 2

comment 0

BruteSpray Helps Hackers Brute-Force Network Service Passwords Full Video: https://nulb.app/x4aaw Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 055 (Recut - Partial Episode) Nmap is a powerful tool for network recon. However, when paired with other services, Nmap scan outputs can be used offensively as well. Today, on this episode of Cyber Weapons Lab, we'll show you how hackers and pentesters would pipe Nmap scans into...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 100

favorite 1

comment 0

The Right Wi-Fi Adapter Can Hack 2.4/5 GHz Networks Full Video: https://nulb.app/z4q4p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 150 (Teaser - Partial Episode) To relieve network congestion, most routers provide users the option to connect to either its 2.4 GHz or 5 GHz band, since they occupy different channels. As a white hat hacker or pentester, it's important to know how to access both during an attack, as...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Null Byte
movies

eye 88

favorite 1

comment 0

Hatch Can Brute-Force Web App Credentials Full Video: https://nulb.app/z4gw5 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 066 (Recut - Partial Episode) Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack. On this episode of Cyber Weapons Lab, we'll show you how easy it can be for a hacker or pentester, even if they're a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 59

favorite 1

comment 0

One Way Hackers Can Backdoor into a MacOS System Full Tutorial: https://nulb.app/x4dyn Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 112 (Recut - Partial Episode) MacOS security is highly regarded but it's far from perfect. In an attack by Tokyoneon (https://twitter.com/tokyoneon_), we can spoof a trusted app like iTunes for a malicious one, completely bypassing system security. We'll show you how, on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 114

favorite 1

comment 0

Intercepting Packets with Bettercap Full Video: https://nulb.app/x4iow Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 139 (Recut - Partial Episode) Bettercap is the successor to Ettercap and comes with useful modules for attacking Wi-Fi. In particular, it's especially useful to hackers and pentesters in deauthing and utilizing the PMKID vulnerability in certain routers. On this episode of Cyber Weapons Lab, we'll show you...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Null Byte
movies

eye 87

favorite 0

comment 0

How Hackers Jam Wi-Fi with Deauth & Disassociation Packets Full Video: https://nulb.app/x4boh Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 024 (Recut - Partial Episode) Wi-Fi jamming usually uses de-authentication packets to disconnect clients from an access point continuously, but MDK3 uses both de-authentication and disassociation packets to shut down a Wi-Fi network. Check out how this tool can take out a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 75

favorite 1

comment 0

Windows 10 & Firefox Leave Account Passwords Vulnerable Full Video: https://nulb.app/z4jka Subscribe to Null Byte: https://goo.gl/J6wEnH Nick's Twitter: https://twitter.com/nickgodshall Cyber Weapons Lab, Episode 082 (Recut - Partial Episode) Web browsers like Firefox make it very easy to access one's various account credentials as it saves them for you in a list easily reached from the application's preferences. Unfortunately, Firefox doesn't securely encrypt these site usernames and...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 21

favorite 0

comment 0

Arduino Can Help Track Networks a Mac Has Connected To Full Tutorial: https://nulb.app/x4nm3 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 144 (Teaser) Gaining access to the various networks a computer has connected to would be extremely useful to a hacker. Most notably, it would give a hacker looking to set up a fake AP all the information they would need to trick one's computer into connecting to it because it's...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 80

favorite 0

comment 0

EvilOSX Lets Hackers Hijack MacOS Machines Full Video: https://nulb.app/x47ch Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 096 (Recut - Partial Episode) While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll show you how a hacker or pentester could...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 48

favorite 0

comment 0

CATT (Cast All The Things) Can Control Chromecasts Full Tutorial: https://nulb.app/x4hej Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 075 (Recut - Partial Episode) Chromecast is a handy IoT device for broadcasting content to a nearby monitor or TV. Unfortunately, like most IoT devices, it's also vulnerable to hijacking. On this episode of Cyber Weapons Lab, we'll show you how hackers can use the Python script "Cast...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 52

favorite 0

comment 0

Sonos Speakers Can Be Hacked with Python Full Tutorial: https://nulb.app/x4g19 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 060 IoT devices such as speakers are great products, but they're a point of vulnerability when incorrectly secured onto a network. Today, on this episode of Cyber Weapons Lab, we'll show you how hackers and pentesters could use Python to take control of Sonos speakers. In our example, we're showing...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 55

favorite 1

comment 0

One Way Hackers Steal Passwords from a Unix System Full Tutorial: https://nulb.app/x4iia Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 137 (Recut - Partial Episode) Bash scripting is incredibly useful for automating frequently used commands. However, if a malicious bash function is saved to a Linux or macOS system, it can be used to steal all kinds of data. Today, on this episode of Cyber Weapons Lab, we'll show you how a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 42

favorite 0

comment 0

Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop Three Ways Hackers Can Hack into SSH Servers Full Tutorial: https://nulb.app/z4ikd Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 181 The Secure Shell, or SSH, is a common way to access remote hosts. However, it's not as secure as the name would imply. In this episode of Cyber Weapons Lab, we are going to show three different ways to brute...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 127

favorite 0

comment 0

One Way WPA2 Networks Can Be Hacked Full Video: https://nulb.app/z4ekt Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 046 (Recut - Partial Episode) Hacking WPA networks can be a fairly noisy attack that required the target to have someone connected in order to capture a handshake. However, some networks using PMKID are susceptible to a recently discovered vulnerability. On this episode of Cyber Weapons Lab, we'll show you...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 68

favorite 1

comment 0

BlackEye Can Create Phishing Pages of Any Site Full Video: https://nulb.app/x4kmk Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 113 (Recut - Partial Episode) Phishing is an effective method for hackers of stealing personal data from an unwitting target, but only if they can successfully fool their target into handing them said information. To do so, some use BlackEye, a tool to generate convincing phishing pages, which...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 65

favorite 0

comment 0

How Rpi-hunter Works to Grab Credentials Full Video: https://nulb.app/z4i8p Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 084 (Recut - Partial Episode) One of the most common mistakes a person makes with a new device is failing to change any default passwords. That leaves that device vulnerable to attack. On this episode of Cyber Weapons Lab, we’ll show you a tool that hackers and pentesters use called rpi-hunter,...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...