ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

224 results

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,365 views

6 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

666 views

2 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,282 views

12 years ago

DEFCONConference
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...

45:58
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

13,365 views

10 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,090 views

10 years ago

DEFCONConference
DEF CON 31 - StackMoonwalk  - Alessandro Magnosi, Arash  Parsa, Athanasios Tserpelis

The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...

39:41
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis

1,517 views

2 years ago

DEFCONConference
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...

41:48
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

5,577 views

3 years ago

DEFCONConference
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...

43:09
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

3,847 views

10 years ago

Channel2600
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...

51:13
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

69 views

1 year ago

DEFCONConference
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...

47:07
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

6,174 views

10 years ago

Samuel Henrique
The Security of Debian - An introduction to advanced users  - DebConf25

How Debian handles security vulnerabilities (CVEs) for its packages. Learn how security vulnerabilities are tracked and fixed, ...

43:52
The Security of Debian - An introduction to advanced users - DebConf25

625 views

2 months ago

DEFCONConference
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...

36:58
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

1,474 views

12 years ago

DEFCONConference
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov

To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...

48:11
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov

1,811 views

2 years ago

DEFCONConference
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.

40:06
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

7,435 views

6 years ago

DEFCONConference
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

In this exploit development focused talk, we will first introduce eBPF and discuss several nefarious techniques enabled by the ...

46:59
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

4,904 views

6 years ago

DEFCONConference
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

1,433 views

9 years ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

25:12
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

1,349 views

2 years ago

DEFCONConference
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...

42:13
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

5,267 views

6 years ago

DEFCONConference
DEF CON 21 -  Brian Gorenc and Jasiel Spelman -  Java Every Days

Java Every-Days: Exploiting Software Running on 3 Billion Devices BRIAN GORENC ZERO DAY INITIATIVE, HP SECURITY ...

43:16
DEF CON 21 - Brian Gorenc and Jasiel Spelman - Java Every Days

1,731 views

12 years ago

DEFCONConference
DEF CON 29 - David Dworken - Worming through IDEs

You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...

22:49
DEF CON 29 - David Dworken - Worming through IDEs

2,153 views

4 years ago

DEFCONConference
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JRE

Managed Code Rootlets (MCRs) are terrifying post-exploitation attacks that open the doors for cementing and expanding a ...

42:55
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JRE

1,830 views

9 years ago

DEFCONConference
Wenxiang Qian - Breaking Google Home Exploit It with SQLite - DEF CON 27 Conference

Over the past years, our team has used several new approaches to identify multiple critical vulnerabilities in SQLite and Curl, two ...

38:36
Wenxiang Qian - Breaking Google Home Exploit It with SQLite - DEF CON 27 Conference

1,821 views

6 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,053 views

9 years ago