Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
1,140 results
It can be very difficult for those new to hacking to learn about vulnerability discovery and exploit development on modern ...
668 views
2 years ago
Memory corruption vulnerabilities have plagued computer systems since we started programming software. Techniques for ...
3,850 views
10 years ago
How to Disclose or Sell an Exploit Without Getting in Trouble JAMES DENARO PARTNER, CIPHERLAW You have identified a ...
1,475 views
12 years ago
A new wave of attacks has targeted CentreStack and Triofox servers using an unpatched Local File Inclusion vulnerability ...
64 views
3 months ago
In this talk I will show how to reverse engineer a proprietary HTTP Server in order to leverage memory corruption vulnerabilities ...
1,799 views
3 years ago
DARPA's Grand Cyber Challenge foretold an ominous future stricken with machines exploiting our code and automatically ...
1,898 views
6 years ago
In this talk, we will present novel vulnerabilities and exploitation techniques that reliably bypass Linux syscall tracing. A user mode ...
1,303 views
View the full free MOOC at https://ost2.fyi/Exp4011. This is it! This is the class that *actually* teaches you how to exploit a race ...
150 views
1 year ago
Phantom attack is a collection of attacks that evade Linux system call monitoring. A user mode program does not need any special ...
3,061 views
4 years ago
Privilege escalation is a common attack vector in the Windows OS. Today, there are multiple offensive tools in the wild that can ...
3,636 views
A Password is Not Enough: Why disk encryption is broken and how we might fix it DANIEL SELIFONOV Since the publication of ...
1,921 views
Like most modern devices, building controllers have increasingly become network connected, exposing them to a wider range of ...
7,439 views
What can you do, as an attacker, when you find yourself as a low privileged Windows user with no path to SYSTEM? Install a ...
6,236 views
Imagine being able to get together with a few of your co-workers, look at your office keys and derive a building master key. Or you ...
6,562 views
5 years ago
Cisco ASA and ASA-X are widely deployed firewalls that are relied upon to protect internal networks from the dangers of the ...
1,739 views
A debugger is always a valuable tool when searching for vulnerabilities, particularly in embedded systems where multiple ...
253 views
5 days ago
Cisco has issued an urgent warning regarding a critical vulnerability, CVE-2024-20353, in its Identity Services Engine (ISE).
35 views
1 month ago
VoIP Wars: Return of the SIP FATIH OZAVCI INFORMATION SECURITY RESEARCHER AND CONSULTANT, VIPROY ...
4,284 views
A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...
5,273 views
Ever wonder why there isn't a metasploit-style framework for Android apps? We did! Whether you're a developer trying to protect ...
6,175 views
Over the past years, our team has used several new approaches to identify multiple critical vulnerabilities in SQLite and Curl, two ...
1,822 views
Alarm systems are ubiquitous - no longer the realm of banks and vaults only, many people now have them in their homes or ...
49,027 views
In this presentation we are going to explain and demonstrate step by step in a real attack scenario how a remote attacker could ...
1,300 views
9 years ago
299 views
In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment ...
4,884 views