ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

504 results

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,365 views

6 years ago

DEFCONConference
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...

44:15
DEF CON 31 - Retro Exploitation - Vintage Computing as a Vuln Research Playground - Wesley McGrew

665 views

2 years ago

DEFCONConference
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

He is passionate about ASM, reverse engineering, shellcode and exploit development and he has a MCTS Windows Internals ...

41:56
DEF CON 23 - Ionut Popescu - NetRipper: Smart Traffic Sniffing for Penetration Testers

7,436 views

10 years ago

DEFCONConference
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

... also well versed at network penetration testing, web application testing, reverse engineering, fuzzing and exploit development.

47:11
DEF CON 21 - Fatih Ozavci - VoIP Wars Return of the SIP

4,281 views

12 years ago

Endi Situs1
Why Metasploit Framework AKA MSF
5:34
Why Metasploit Framework AKA MSF

0 views

2 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 31 - StackMoonwalk  - Alessandro Magnosi, Arash  Parsa, Athanasios Tserpelis

The rapid advancement of cyber defense products has led to an increase in sophisticated memory evasion techniques employed ...

39:41
DEF CON 31 - StackMoonwalk - Alessandro Magnosi, Arash Parsa, Athanasios Tserpelis

1,515 views

2 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

His focus includes performing root-cause analysis, fuzzing and exploit development. Prior to joining HP, Hariri worked as an ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,090 views

10 years ago

DEFCONConference
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...

43:09
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

3,845 views

10 years ago

DEFCONConference
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

... systems program, Mark's work has focused primarily on vulnerability discovery and exploit development for embedded systems.

40:06
Douglas McKee - HVACking Understand the Delta Between Security and Reality - DEF CON 27 Conference

7,434 views

6 years ago

OpenSecurityTraining2
Exploitation 4011, Windows Kernel Exploitation: Race + UAF in KTM 13 1 Arbitrary Increment Primitive

View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...

10:58
Exploitation 4011, Windows Kernel Exploitation: Race + UAF in KTM 13 1 Arbitrary Increment Primitive

148 views

1 year ago

Channel2600
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

Friday, July 12, 2024: 11:00 am (Little Theatre): In this revealing presentation, an ethical hacker with 25 years of experience ...

51:13
HOPE XV (2024): Why Are We Insecure? An Ethical Hacker's Lonely Road to Cyber Dystopia

69 views

1 year ago

DEFCONConference
DEF CON 31 - Attacking And Securing the Pixel Modem  - Karimi,  Xing , Gong, Rodionov

To ensure Google Pixel devices are always at their most secure, the Android Red Team continuously attacks the riskiest areas of ...

48:11
DEF CON 31 - Attacking And Securing the Pixel Modem - Karimi, Xing , Gong, Rodionov

1,811 views

2 years ago

DEFCONConference
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

For decades, software vulnerabilities have remained an unsolvable security problem regardless of years of investment in various ...

41:48
DEF CON 30 - Adam Zabrocki, Alex Tereshkin - Exploitation in the era of Formal Verification

5,575 views

3 years ago

DEFCONConference
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

In this exploit development focused talk, we will first introduce eBPF and discuss several nefarious techniques enabled by the ...

46:59
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

4,898 views

6 years ago

DEFCONConference
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

... reverse engineering, exploit development and the defensive side as a chief security officer for software companies running wide ...

48:25
DEF CON 24 - Amro Abdelgawad - The Remote Metamorphic Engine

1,433 views

9 years ago

DEFCONConference
DEF CON 21 -  Brian Gorenc and Jasiel Spelman -  Java Every Days

Java Every-Days: Exploiting Software Running on 3 Billion Devices BRIAN GORENC ZERO DAY INITIATIVE, HP SECURITY ...

43:16
DEF CON 21 - Brian Gorenc and Jasiel Spelman - Java Every Days

1,731 views

12 years ago

DEFCONConference
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...

47:07
DEF CON 23 - Tony Trummer and Tushar Dalvi - QARK: Android App Exploit and SCA Tool

6,174 views

10 years ago

OpenSecurityTraining2
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

View the full free MOOC at https://ost2.fyi/Vulns1001. This class is for C/C++ developers learning secure development, and ...

25:12
Vulns1001 03 Heap Buffer Overflow 🥷CVE-2020-0917🦾 03 Exploit

1,342 views

2 years ago

DEFCONConference
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

... in the UK, where he performs vulnerability discovery, exploit development, bespoke protocol analysis and reverse engineering.

44:57
DEF CON 24 - Alex Chapman and Paul Stone - Toxic Proxies: Bypassing HTTPS

3,052 views

9 years ago

DEFCONConference
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

Hello, my name is BWL-X8620, and I'm a SOHO router. For many years my fellow SOHO routers and I were victims of endless ...

39:19
DEF CON 30 - Gal Zror - Hacking ISPs with Point-to-Pwn Protocol over Ethernet (PPPoE)

39,586 views

3 years ago

DEFCONConference
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JRE

Managed Code Rootlets (MCRs) are terrifying post-exploitation attacks that open the doors for cementing and expanding a ...

42:55
DEF CON 24 - Benjamin Holland - Developing Managed Code Rootkits for JRE

1,830 views

9 years ago

DEFCONConference
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...

36:58
DEF CON 21 - James Denaro - How to Disclose or Sell an Exploit

1,474 views

12 years ago

DEFCONConference
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101

If you're interested in vulnerability research for fun or profit, or if you're a beginner and you're not sure how to progress, it can be ...

43:18
DEF CON 24 - Joshua Drake, Steve Christey Coley - Vulnerabilities 101

10,646 views

9 years ago

DEFCONConference
DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

We conducted a research to assess the current security of NFC payment readers that are present in most of the major ATM brands ...

39:44
DEF CON 31 - Contactless Overflow Code Execution in Payment Terminals & ATMs - Josep Rodriguez

117,691 views

2 years ago