2022-01-08 | Command Injection in F5 iRules | 48:56 | 1 | |
|
2022-01-08 | Battle of Windows Service: A Silver Bullet to Discover File Privilege Escalation Bugs Automatically | 20:39 | 13 | |
|
2022-01-08 | Denial of Service with a Fistful of Packets: Exploiting Algorithmic Complexity Vulnerabilities | 46:57 | 4 | |
|
2022-01-08 | HostSplit: Exploitable Antipatterns in Unicode Normalization | 40:18 | 14 | |
|
2022-01-08 | Behind the scenes of iOS and Mac Security | 44:29 | 43 | |
|
2022-01-08 | How Do Cyber Insurers View The World? | 57:01 | 1 | |
|
2022-01-08 | Controlled Chaos: The Inevitable Marriage of DevOps & Security | 54:06 | 3 | |
|
2022-01-08 | Detecting Deep Fakes with Mice | 26:02 | 2 | |
|
2022-01-08 | Behind the Scenes: The Industry of Social Media Manipulation Driven by Malware | 47:48 | 8 | |
|
2022-01-08 | Detecting Malicious Files with YARA Rules as They Traverse the Network | 20:08 | 39 | Guide |
|
2022-01-08 | 0-days & Mitigations: Roadways to Exploit and Secure Connected BMW Cars | 50:30 | 11 | |
|
2022-01-08 | Critical Zero Days Remotely Compromise the Most Popular Real Time OS | 43:41 | 23 | |
|
2022-01-08 | DevSecOps : What, Why and How | 52:46 | 1 | |
|
2022-01-08 | How to Detect that Your Domains are Being Abused for Phishing by Using DNS | 47:26 | 28 | Guide |
|
2022-01-08 | A Compendium of Container Escapes | 43:10 | 23 | |
|
2022-01-08 | Cyber Insurance 101 for CISO's | 44:01 | 2 | |
|
2022-01-08 | A Decade After Bleichenbacher '06, RSA Signature Forgery Still Works | 24:06 | 14 | |
|
2022-01-08 | HTTP Desync Attacks: Smashing into the Cell Next Door | 50:05 | 11 | |
|
2022-01-08 | Dragonblood: Attacking the Dragonfly Handshake of WPA3 | 47:25 | 64 | |
|
2022-01-08 | Cybersecurity Risk Assessment for Safety-Critical Systems | 25:59 | 8 | |
|
2022-01-08 | Adventures in the Underland The CQForensic Toolkit as a Unique Weapon Against Hackers | 54:12 | 4 | Guide |
|
2022-01-08 | Everybody be Cool, This is a Robbery! | 48:14 | 8 | |
|
2022-01-08 | Biometric Authentication Under Threat Liveness Detection Hacking | 25:24 | 75 | |
|
2022-01-08 | Hunting for Bugs, Catching Dragons | 43:13 | 0 | |
|
2022-01-08 | Exploiting Qualcomm WLAN and Modem Over The Air | 44:56 | 43 | |
|
2022-01-08 | I'm Unique, Just Like You: Human Side-Channels and Their Implications for Security and Privacy | 48:09 | 2 | |
|
2022-01-08 | All the 4G Modules Could be Hacked! | 49:29 | 10 | |
|
2022-01-08 | Exploiting the Hyper V IDE Emulator to Escape the Virtual Machine | 50:13 | 38 | |
|
2022-01-08 | Infighting Among Russian Security Services in the Cyber Sphere | 46:31 | 4 | |
|
2022-01-08 | All Your Apple are Belong to Us: Unique Identification and Cross-Device Tracking of Apple Devices | 39:47 | 3 | |
|
2022-01-08 | Exploring the New World : Remote Exploitation of SQLite and Curl | 46:52 | 5 | |
|
2022-01-08 | Firmware Cartography: Charting the Course for Modern Server Compromise | 51:27 | 7 | |
|
2022-01-08 | API-Induced SSRF: How Apple Pay Scattered Vulnerabilities Across the Web | 33:04 | 11 | |
|
2022-01-08 | Fantastic Red-Team Attacks and How to Find Them | 40:25 | 5 | Guide |
|
2022-01-08 | Arm IDA and Cross Check Reversing the Boeing 787's Core Network | 50:35 | 18 | |
|
2022-01-08 | Finding a Needle in an Encrypted Haystack: Detect the Most Prevalent Attacks on Active Directory | 46:39 | 20 | |
|
2022-01-08 | Flying a False Flag: Advanced C2, Trust Conflicts, and Domain Takeover | 44:05 | 8 | |
|
2022-01-08 | Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) | 50:23 | 57 | |
|
2022-01-08 | GDPArrrrr: Using Privacy Laws to Steal Identities | 21:57 | 6 | |
|
2022-01-08 | Finding Our Path: How We're Trying to Improve Active Directory Security | 44:44 | 1 | |
|
2022-01-08 | Ghidra - Journey from Classified NSA Tool to Open Source | 47:37 | 34 | |
|
2022-01-08 | Bounty Operations: Best Practices and Common Pitfalls to Avoid in the First 6-12 Months | 53:29 | 5 | |
|
2022-01-08 | Attacking Electric Motors for Fun and Profit | 47:40 | 5 | |
|
2022-01-08 | Death to the IOC What's Next in Threat Intelligence | 26:28 | 25 | |
|
2022-01-08 | Going Beyond Coverage-Guided Fuzzing with Structured Fuzzing | 24:49 | 30 | Guide |
|
2022-01-08 | Debug for Bug Crack and Hack Apple Core by Itself | 43:00 | 4 | |
|
2022-01-08 | Hacking Ten Million Useful Idiots: Online Propaganda as a Socio-Technical Security Project | 50:31 | 20 | |
|
2022-01-08 | Breaking Encrypted Databases: Generic Attacks on Range Queries | 44:04 | 3 | Guide |
|
2022-01-08 | Hacking Your Non Compete | 50:24 | 2 | |
|
2022-01-08 | Breaking Samsung's ARM TrustZone | 43:18 | 26 | |
|
2022-01-08 | Breaking Through Another Side Bypassing Firmware Security Boundaries from Embedded Controller | 49:12 | 15 | |
|
2022-01-07 | No Royal Road … Notes on Dangerous Game | 48:53 | 1 | |
|
2022-01-07 | So I became a Domain Controller | 41:53 | 5 | |
|
2022-01-07 | Understanding and Exploiting Implanted Medical Devices | 49:27 | 2 | |
|
2022-01-07 | Your Voice is My Passport | 35:50 | 2 | |
|
2022-01-07 | None of My Pixel is Your Business Active Watermarking Cancellation Against Video Streaming Service | 33:46 | 0 | |
|
2022-01-07 | Unpacking the Packed Unpacker Reverse Engineering an Android Anti Analysis Native Library | 39:32 | 23 | |
|
2022-01-07 | Outsmarting the Smart City | 38:38 | 1 | |
|
2022-01-07 | Squeezing a Key through a Carry Bit | 45:45 | 3 | |
|
2022-01-07 | ZEROing Trust Do Zero Trust Approaches Deliver Real Security | 53:41 | 0 | |
|
2022-01-07 | Stealth Mango and the Prevalence of Mobile Surveillanceware | 46:47 | 2 | |
|
2022-01-07 | WebAssembly A New World of Native Exploits on the Browser | 45:21 | 83 | |
|
2022-01-07 | Windows Offender Reverse Engineering Windows Defender's Antivirus Emulator | 48:48 | 8 | |
|
2022-01-07 | Over the Air How we Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars | 49:14 | 2 | |
|
2022-01-07 | Pestilential Protocol How Unsecure HL7 Messages Threaten Patient Lives | 51:09 | 0 | |
|
2022-01-07 | Stop that Release, There's a Vulnerability | 23:10 | 0 | |
|
2022-01-07 | Why so Spurious Achieving Local Privilege Escalation on Operating Systems | 48:33 | 4 | |
|
2022-01-07 | WireGuard Next Generation Secure Network Tunnel | 50:43 | 9 | |
|
2022-01-07 | Stress and Hacking Understanding Cognitive Stress in Tactical Cyber Ops | 50:00 | 1 | |
|
2022-01-07 | Playback A TLS 1 3 Story | 35:45 | 3 | |
|
2022-01-07 | Windows Notification Facility Peeling the Onion of the Most Undocumented Kernel Attack Surface Yet | 51:01 | 3 | |
|
2022-01-07 | Subverting Sysmon Application of a Formalized Security Product Evasion Methodology | 50:00 | 3 | Vlog |
|
2022-01-07 | Last Call for SATCOM Security | 41:27 | 10 | |
|
2022-01-07 | The Finest Penetration Testing Framework for Software Defined Networks | 44:57 | 7 | |
|
2022-01-07 | The Air Gap Jumpers | 23:53 | 4 | |
|
2022-01-07 | Legal Landmines How Law and Policy are Rapidly Shaping Information Security | 49:48 | 0 | Guide |
|
2022-01-07 | Practical Web Cache Poisoning Redefining 'Unexploitable' | 43:55 | 7 | |
|
2022-01-07 | The Problems and Promise of WebAssembly | 21:24 | 30 | |
|
2022-01-07 | The Science of Hiring and Retaining Female Cybersecurity Engineers | 50:04 | 0 | |
|
2022-01-07 | Protecting the Protector, Hardening Machine Learning Defenses Against Adversarial Attacks | 49:30 | 2 | |
|
2022-01-07 | Pwnie Awards | 54:08 | 13 | |
|
2022-01-07 | Threat Modeling in 2018 Attacks, Impacts and Other Updates | 47:31 | 0 | Vlog |
|
2022-01-07 | Lessons and Lulz The 4th Annual Black Hat USA NOC Report | 35:43 | 0 | |
|
2022-01-07 | TLBleed When Protecting Your CPU Caches is Not Enough | 52:46 | 1 | |
|
2022-01-07 | Qualitative Look at Autonomous Peer Communication's Impact on Organizational Phishing Detection | 24:09 | 0 | |
|
2022-01-07 | Lessons from Virginia A Comparative Forensic Analysis of WinVote Voting Machines | 24:54 | 6 | |
|
2022-01-07 | Real Eyes, Realize, Real Lies Beating Deception Technologies | 19:26 | 2 | Vlog |
|
2022-01-07 | Lowering the Bar Deep Learning for Side Channel Analysis | 48:20 | 11 | |
|
2022-01-07 | Screaming Channels When Electromagnetic Side Channels Meet Radio Transceivers | 46:01 | 1 | |
|
2022-01-07 | LTE Network Automation Under Threat | 49:03 | 5 | |
|
2022-01-07 | SirenJack Cracking a Secure Emergency Warning Siren System | 51:20 | 2 | |
|
2022-01-07 | Mainframe zOS Reverse Engineering and Exploit Development | 49:23 | 7 | |
|
2022-01-07 | Snooping on Cellular Gateways and Their Critical Role in ICS | 45:08 | 4 | |
|
2022-01-07 | New Norms and Policies in Cyber Diplomacy | 51:56 | 1 | |
|
2022-01-06 | Measuring the Speed of the Red Queen's Race Adaption and Evasion in Malware | 25:40 | 0 | |
|
2022-01-06 | Meltdown Basics, Details, Consequences | 46:54 | 2 | |
|
2022-01-06 | Reconstruct the World from Vanished Shadow Recovering Deleted VSS Snapshots | 47:54 | 2 | |
|
2022-01-06 | The Unbearable Lightness of BMC's | 51:50 | 0 | |
|
2022-01-06 | Mental Health Hacks Fighting Burnout, Depression and Suicide in the Hacker Community | 48:28 | 2 | |
|
2022-01-06 | Remotely Attacking System Firmware | 48:10 | 11 | |
|