2022-01-05 | Breaking the x86 Instruction Set | 44:29 | 6 | Tutorial |
|
2022-01-05 | Exploiting Network Printers | 45:09 | 1 | |
|
2022-01-05 | Game of Chromes Owning the Web with Zombie Chrome Extensions | 45:39 | 0 | |
|
2022-01-05 | Breaking XSS Mitigations Via Script Gadgets | 48:18 | 1 | |
|
2022-01-05 | Fad or Future Getting Past the Bug Bounty Hype | 51:03 | 9 | |
|
2022-01-05 | Go to Hunt, Then Sleep | 45:40 | 0 | |
|
2022-01-05 | Friday the 13th JSON Attacks | 43:11 | 1 | |
|
2022-01-05 | Broadpwn Remotely Compromising Android and iOS via a Bug in Broadcom's Wi Fi Chipsets | 53:16 | 4 | |
|
2022-01-05 | Hacking Hardware with a $10 SD Card Reader | 41:39 | 8 | |
|
2022-01-05 | Bug Collisions Meet Government Vulnerability Disclosure | 49:06 | 1 | |
|
2022-01-05 | Hacking Serverless Runtimes Profiling AWS Lambda Azure Functions & More | 47:39 | 3 | |
|
2022-01-05 | inSecurity in Building Automation How to Create Dark Buildings with Light Speed | 23:58 | 0 | Guide |
|
2022-01-05 | Adventures in Attacking Wind Farm Control Networks | 27:01 | 1 | |
|
2022-01-05 | Challenges of Cooperation Across Cyberspace | 50:41 | 0 | |
|
2022-01-05 | Honey, I Shrunk the Attack Surface Adventures in Android Security Hardening | 50:34 | 5 | |
|
2022-01-05 | All Your SMS & Contacts Belong to ADUPS & Others | 24:31 | 7 | |
|
2022-01-05 | An ACE Up the Sleeve Designing Active Directory DACL Backdoors | 46:32 | 2 | |
|
2022-01-05 | Cloak & Dagger From Two Permissions to Complete Control of the UI Feedback Loop | 44:59 | 0 | |
|
2022-01-05 | How Abusing Docker API Led to Remote Code Execution, Same Origin Bypass & more | 40:34 | 6 | |
|
2022-01-05 | Cracking the Lens Targeting HTTP's Hidden Attack Surface | 44:06 | 1 | |
|
2022-01-05 | How We Created the First SHA 1 Collision and What it Means for Hash Security | 43:11 | 0 | |
|
2022-01-05 | Attacking Encrypted USB Keys the Hardware Way | 37:49 | 10 | |
|
2022-01-05 | Automated Testing of Crypto Software Using Differential Fuzzing | 36:21 | 6 | |
|
2022-01-05 | Datacenter Orchestration Security and Insecurity Assessing Kubernetes, Mesos, and Docker at Scale | 44:53 | 18 | |
|
2022-01-05 | Nonce Disrespecting Adversaries Practical Forgery Attacks on GCM in TLS | 49:21 | 1 | |
|
2022-01-05 | GreatFET Making GoodFET Great Again | 45:42 | 13 | |
|
2022-01-05 | Pindemonium A DBI Based Generic Unpacker for Windows Executable | 24:59 | 1 | |
|
2022-01-05 | Towards a Holistic Approach in Building Intelligence to Fight Crimeware | 49:40 | 5 | |
|
2022-01-05 | Windows 10 Segment Heap Internals | 42:14 | 30 | |
|
2022-01-05 | Horse Pill A New Type of Linux Rootkit | 49:28 | 3 | |
|
2022-01-05 | PLC Blaster A Worm Living Solely in the PLC | 37:43 | 7 | |
|
2022-01-05 | O Checker Detection of Malicious Documents Through Deviation From File Format Specifications | 19:11 | 6 | |
|
2022-01-05 | Xenpwn Breaking Paravirtualized Devices | 53:23 | 0 | |
|
2022-01-05 | Understanding HL7 2 X Standards, Pen Testing, and Defending HL7 2 X Messages | 46:13 | 9 | |
|
2022-01-05 | HTTP 2 & Quic Teaching Good Protocols to Do Bad Things | 51:13 | 15 | |
|
2022-01-05 | OSS Security Maturity Time to Put on Your Big Boy Pants | 51:44 | 2 | |
|
2022-01-05 | Pwnie Awards 2016 | 49:46 | 0 | |
|
2022-01-05 | Unleash the Infection Monkey A Modern Alternative to Pen Tests | 31:01 | 44 | |
|
2022-01-05 | Viral Video Exploiting SSRF in Video Converters | 34:14 | 5 | |
|
2022-01-05 | Pwning Your Java Messaging With Deserialization Vulnerabilities | 48:36 | 1 | |
|
2022-01-05 | HTTP Cookie Hijacking in the Wild Security and Privacy Implications | 46:12 | 1 | |
|
2022-01-05 | Ouroboros Tearing Xen Hypervisor With the Snake | 24:45 | 4 | |
|
2022-01-05 | Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency | 50:29 | 0 | |
|
2022-01-05 | VoIP Wars the Phreakers Awaken | 52:44 | 9 | |
|
2022-01-05 | Over the Edge Silently Owning Windows 10's Secure Browser | 32:30 | 0 | |
|
2022-01-05 | Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy | 42:25 | 2 | |
|
2022-01-05 | I Came to Drop Bombs Auditing the Compression Algorithm Weapon Cache | 28:18 | 1 | |
|
2022-01-05 | Into the Core In Depth Exploration of Windows 10 IoT Core | 50:07 | 2 | |
|
2022-01-05 | Using EMET to Disable EMET | 51:56 | 2 | |
|
2022-01-05 | Access Keys Will Kill You Before You Kill the Password | 31:58 | 0 | |
|
2022-01-05 | Watching Commodity Malware Get Sold to a Targeted Actor | 31:05 | 9 | |
|
2022-01-05 | Samsung Pay Tokenized Numbers Flaws and Issues | 19:09 | 6 | |
|
2022-01-05 | Weaponizing Data Science for Social Engineering Automated E2E Spear Phishing on Twitter | 41:55 | 6 | |
|
2022-01-05 | Intra Process Memory Protection for Applications on ARM and X86 Leveraging the ELF ABI | 51:33 | 1 | |
|
2022-01-05 | Account Jumping Post Infection Persistency & Lateral Movement in AWS | 34:58 | 3 | |
|
2022-01-05 | Secure Penetration Testing Operations Demonstrated Weaknesses in Learning Material and Tools | 46:55 | 0 | |
|
2022-01-05 | Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR in the Process | 42:56 | 2 | |
|
2022-01-05 | Web Application Firewalls Analysis of Detection Logic | 40:08 | 2 | Vlog |
|
2022-01-05 | Adaptive Kernel Live Patching An Open Collaborative Effort | 47:24 | 0 | |
|
2022-01-05 | Security Through Design Making Security Better By Designing for People | 28:21 | 0 | |
|
2022-01-05 | The Art of Defense How Vulnerabilities Help Shape Security Features and Mitigations in Android | 52:55 | 1 | |
|
2022-01-05 | Investigating DDOS Architecture Actors and Attribution | 51:56 | 7 | |
|
2022-01-05 | What's the DFIRence for ICS | 24:51 | 0 | |
|
2022-01-05 | SGX Secure Enclaves in Practice Security and Crypto Review | 48:11 | 3 | Review |
|
2022-01-05 | Beyond the Mcse Active Directory for the Security Professional | 49:53 | 1 | |
|
2022-01-05 | When Governments Attack State Sponsored Malware Attacks Against Activists Lawyers and Journalists | 46:59 | 5 | |
|
2022-01-05 | The Art of Reverse Engineering Flash Exploits | 47:17 | 4 | |
|
2022-01-05 | Iran's Soft War for Internet Dominance | 51:44 | 4 | |
|
2022-01-05 | Side Channel Attacks on Everyday Applications | 23:49 | 0 | |
|
2022-01-05 | Blunting the Phisher's Spear A Risk Based Approach | 26:47 | 0 | |
|
2022-01-05 | When the Cops Come A Knocking Handling Technical Assistance Demands from Law Enforcement | 43:50 | 1 | |
|
2022-01-05 | Subverting Apple Graphics Practical Approaches to Remotely Gaining Root | 54:05 | 1 | |
|
2022-01-05 | The Beast Within Evading Dynamic Malware Analysis Using Microsoft COM | 50:15 | 3 | |
|
2022-01-05 | Cunning With CNG Soliciting Secrets From Schannel | 46:38 | 0 | |
|
2022-01-05 | Windows 10 Mitigation Improvements | 51:22 | 6 | |
|
2022-01-05 | The Linux Kernel Hidden Inside Windows 10 | 52:29 | 6 | |
|
2022-01-05 | TCP Injection Attacks in the Wild a Large Scale Study | 38:43 | 2 | |
|
2022-01-05 | Cyber War in Perspective Analysis From the Crisis in Ukraine | 28:35 | 2 | |
|
2022-01-05 | Dungeons Dragons and Security | 21:55 | 1 | |
|
2022-01-05 | Panel Removing Roadblocks to Diversity | 1:40:30 | 2 | |
|
2022-01-05 | Keystone Engine Next Generation Assembler Framework | 23:39 | 7 | |
|
2022-01-05 | The Remote Malicious Butler Did It | 49:14 | 3 | |
|
2022-01-05 | Exploiting Curiosity and Context How to Make People Click on a Dangerous Link | 43:10 | 5 | Guide |
|
2022-01-05 | Language Properties of Phone Scammers Cyberdefense At the Level of the Human | 48:44 | 0 | |
|
2022-01-05 | Gattacking Bluetooth Smart Devices Introducing a New BLE Proxy Tool | 39:40 | 53 | |
|
2022-01-04 | Advanced CAN Injection Techniques for Vehicle Networks | 50:08 | 2 | |
|
2022-01-04 | Breaking FIDO Are Exploits in There | 38:21 | 8 | |
|
2022-01-04 | Dangerous Hare Hanging Attribute References Hazards Due to Vendor Customization | 23:46 | 0 | |
|
2022-01-04 | Hacking Next Gen ATMs From Capture to Cashout | 33:04 | 14 | |
|
2022-01-04 | Dark Side of the DNS Force | 24:31 | 3 | |
|
2022-01-04 | Breaking Hardware Enforced Security With Hypervisors | 49:27 | 6 | |
|
2022-01-04 | Hackproofing Oracle Ebusiness Suite | 49:49 | 0 | |
|
2022-01-04 | AirBnBeware Short Term Rentals Long Term Pwnage | 44:38 | 0 | |
|
2022-01-04 | Defense at Hyperscale Technologies and Policies for a Defensible Cyberspace | 52:24 | 0 | Vlog |
|
2022-01-04 | Breaking Kernel Address Space Layout Randomization KASLR With Intel TSX | 50:27 | 4 | |
|
2022-01-04 | Hardening AWS Environments and Automating Incident Response for AWS Compromises | 46:15 | 3 | |
|
2022-01-04 | AMSI How Windows 10 Plans to Stop Script Based Attacks and How Well It Does It | 46:35 | 3 | |
|
2022-01-04 | Building a Product Security Incident Response Team Learnings From the Hivemind | 28:43 | 3 | |
|
2022-01-04 | Breaking Payment Points of Interaction POI | 49:49 | 2 | |
|
2022-01-04 | An AI Approach to Malware Similarity Analysis Mapping the Malware Genome With a Deep Neural Networ | 30:36 | 5 | |
|