security.didici.cc

[Wi-Fi Attack-Defense] Wi-Fi Network Reconnaissance II

1 year ago

Learn cybersecurity with our hands-on, practical online labs like the one in this video: https://www.pentesteracad
emy.com/onlinelabs Pente
sterAcademy courses library: https://www.pentesteracad
emy.com/topics

[Wi-Fi Attack-Defense] Wi-Fi Network Reconnaissance

1 year ago

Learn cybersecurity with our hands-on, practical online labs like the one in this video: https://www.pentesteracad
emy.com/onlinelabs Pente
sterAcademy courses library: https://www.pentesteracad
emy.com/topics

[Wi-Fi Attack-Defense] Preferred Network List (Basics)

1 year ago

Learn cybersecurity with our hands-on, practical online labs like the one in this video: https://www.pentesteracad
emy.com/onlinelabs Pente
sterAcademy courses library: https://www.pentesteracad
emy.com/topics

SocialFish - The Ultimate Phishing Tool (Ngrok Integration) on Kali Linux

1 year ago

Ultimate phishing tool. Socialize with the credentials.

RouterSploit - Find Router Exploitation on Kali Linux 2018.2 (Router Exploitation Framework)

1 year ago

Find Vulnerability of any router exploitation. The RouterSploit Framework is an open-source exploitation framework dedicated to embedded devices.

XOR ECX 0x00 What The ShellCode (Part 2) - James Haughom Jr.

1 year ago

In this presentation titled What The Shellcode, James Haughom Jr. (@rnranalysis) continues from the Part 1 of the talk and gives a deep dive into analyzing Windows x86 shellcode. Unfortunately the lighting was not great for this presentation and James's ...

XOR ECX, 0x00 - What The ShellCode (Part 1) - Billy Meyers

1 year ago

In this presentation titled What The Shellcode, Billy Meyers (@_hAxel) gives a quick primer for Assembly language, and then goes over some quick analysis of shellcode for x86 Linux. XOR ECX (named so for the combination of the company name and the genera ...

Analysis of memory from a system infected with Zeus bot

1 year ago

Quick analysis with Volatility of a memory image from a system that was infected with zeus bot malware.

DNSAdmin To DC Compromise

1 year ago

This is an feature abuse where in a user who is a member of DNSAdmins group can load arbitary dll on the DNS server. Lets try to first find the users which are a part of DNSAdmins group. we will be using DNSadmin cmd to load dll on the DC server where the ...

Black Hat Asia 2019: Return of the Insecure Brazilian Voting Machines

1 year ago

This talk presents a detailed and up-to-date security analysis of the voting software used in upcoming Brazilian elections by more than 140 million voters. It is mainly based on results obtained recently in a restricted hacking challenge organized by the ...

Black Hat Asia 2019: Zombie POODLE, GOLDENDOODLE, and How TLSv1.3 Can Save Us All

1 year ago

HTTPS is the backbone for online privacy and commerce – yet, for two decades, the underlying TLS protocol received little more than a series of band-aid fixes. Rather than deprecating cryptographic techniques with known weakness, the TLSv1.2 specificati ...

Black Hat Asia 2019: Investigating Malware Using Memory Forensics - A Practical Approach

1 year ago

The number of cyber attacks is undoubtedly on the rise targeting government, military, public and private sectors. Most of these cyber attacks make use of malicious programs (Malware) for financial theft, espionage, intellectual property theft, and politi ...

Black Hat Asia 2019: CQTools: The New Ultimate Hacking Toolkit

1 year ago

CQURE Team has written over 200 hacking tools during penetration testing. We decided to choose the top 39 tools and pack them in a toolkit called CQTools. We are going to announce 5 new tools at Black Hat Asia, allowing the ultimate privilege elevation an ...

Black Hat Asia 2019: Keynote: The Next Arms Race

1 year ago

The Internet is not supposed to have borders, but it does. Countries fight and spy on each other on the Internet every day. So, borders still exist on the Internet, and almost all countries are investing into offensive use of cyber power. The new weapons ...

DEF CON 25 Crypto and Privacy Village - Lauren Rucker - Have You Seen My Naked Selfies Neither Has M

1 year ago

Privacy is fairly cut and dry when it’s US verses THEM, but what if it’s ME verses YOU within US? What are YOUR Privacy Rights, in the context of OUR relationship? Am I your non-trusting girlfriend? Am I your controlling boyfriend? Am I your snoopi ...

TekThing 161 – Bitcoin Sucks For Gaming PCs!!! Our Video Gear, Fingbox Home Network Security

3 years ago

—— Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week! https://www.patreon
.com/tekthing EMAIL US! [email protected] SUPPORT: Amazon Associates: http://amzn.to/2xbnsUa Su
bscribe: ...

FISA Lives On & The NSA Keeps Surveillance Authority – ThreatWire

3 years ago

The NSA can legally monitor some communications, some google chrome extensions were found to be malicious, and OnePlus had a credit card hack. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http ...

How to setup Metasploitable 3 – Metasploit Minute

3 years ago

Metasploit Minute – the break down on breaking in. Join Mubix (aka Rob Fuller) every Monday here on Hak5. Thank you for supporting this ad free programming. Sponsored by Hak5 and the HakShop – http://hakshop.com :: Subscribe and learn more at http://m ...

TekThing 160 – Anker Roav VIVA Alexa Car Charger, 33 More CES 2018 Products, Razer Linda vs. Sentio Superbook

3 years ago

CES Trends, 33 More CES 2018 Products! Anker Roav VIVA Alexa Enabled Car Charger, Razer Linda vs. Sentio Superbook —— 01:14 CES TRENDS What was driving CES 2018 this year? AI that’s not so I, Voice Assistance and Commands (Google Assistant was every ...

Meltdown and Spectre – Everything You Need To Know – ThreatWire

3 years ago

Everything you need to know about Spectre and Meltdown. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://w ...

Hak5 2319 – [[ PAYLOAD ]] – OS Detection Payload

3 years ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

TekThing 159 – CES 2018! New TVs From LG, Samsung, TCL, HiSense, Virtual Reality, 1TB Flash Drives, and more!

3 years ago

For those that requested it, here are each of our CES 2018 segments exported into one long video! These are the same segments already uploaded to Youtube, just clumped into one video. Thank you for supporting our coverage of CES! —— Luggage That Follo ...

Hak5 2318 – [[ PAYLOAD ]] – Best Payload Practices

3 years ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

TekThing 158 – New Dell XPS 13, HP Chromebooks, CES 2018, More Reasons Your Computer Gets Fried, Kill-A-Watt!!!

3 years ago

New Laptops! Dell XPS 13, HP HP Chromebook 14 G5 and 11 G6 Education Edition! CES 2018, Floating Neutral, Kill-A-Watt —— 00:56 TekThing Meetup Las Vegas Happy New Year!!! If you’re in Las Vegas for CES, live in Las Vegas, or feel like getting yourse ...

Hak5 2317 – [[ PAYLOAD ]] – The Situation Response Payload

3 years ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

Snowden’s New Security System; Browsing Tracked By Login Forms – ThreatWire

3 years ago

Your browsing data could be tracked by login forms, Forever21 got hacked, and Snowden released his very own mobile security system. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patr ...

Hak5 2316 – The Hak5 Annual Blooper Reel!

3 years ago

Celebrate another year of craziness with us by checking out some of our favorite bloopers from 2017! Happy New Year and we’ll see ya next week! ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subs ...

TekThing 157 – Amazon Echo Spot Review, Best Gear of 2017, Can You Speed Up Your VPN???

3 years ago

Best of 2017: TVs, Phones, Headphones, More. The Perfect Alarm Clock? Amazon Echo Spot Review. Two Fast VPNs Tested! —— 00:50 BEST OF 2017!!! What were the products that really stood out in 2017??? AMD’s Ryzen CPUs and Nvidia’s Switch are definite ...

The Biggest Hacks of 2017 – ThreatWire

3 years ago

The biggest, baddest, worst hacks and vulnerabilities of 2017! All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: h ...

GrrCon 2017 - Infrastructure Based Security

3 years ago

As the enterprise continues to be bombarded with advanced and increasingly more sophisticated attacks, the CISO must shift to accomplish three critical objectives: Gain Superior Visibility and Control over their environment, Automate tasks that enhance se ...

GrrCon 2017 - The Shuttle Columbia Disaster: Lessons That Were Not Learned

3 years ago

When the shuttle Challenger was destroyed in 1986, poor NASA culture was significant in the events the led to the disaster. NASA made serious changes to their space program to ensure human life was at the least risk possible. But in 2003, the shuttle Colu ...

GrrCon 2017 - Software Defined Segmentation

3 years ago

Acquisitions, partnerships, BYOD, IoT are just some business demands that increase security headaches for businesses and place demand on IT. Come explore segmentation as a mechanism to combat compromises of one system to another. For More Information Pl ...

GrrCon 2017 - Building a Usable Mobile Data Protection Strategy

3 years ago

Mobile smart devices from the consumer perspective are easy to activate for a enriched user experience. Enable smart devices in the enterprise, after the basics, the user experience they know drops while users and InfoSec demand more with competing agenda ...

GrrCon 2017 - The Future of Cyber Security

3 years ago

GrrCon 2017 - The Future of Cyber Security For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis

3 years ago

GrrCon 2017 - Securing the Internet of Things (IoT) -Through Security Research and Vulnerability Analysis For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Tales From The Trenches: Practical Information Security Lessons

3 years ago

In this talk, Michael Belton discusses his past experiences delivering penetration testing services. The format for this talk is conversational and audience participation is encouraged. Michael will provide background on the situation, discuss the actual ...

GrrCon 2017 - How do you POC? Are you really testing a product

3 years ago

We have all read the reports from the successful breaches from Target to Equifax. Have you ever questioned the nature of the security products not preventing or alerting earlier to breach? Trend Micro,s presentation will focus on the Proof-of-Concept phas ...

GrrCon 2017 - Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel

3 years ago

GrrCon 2017 - Infosec State of Affairs: Too much Kim Kardashian - not enough Malcolm Gladwel For More Information Please Visit:- http://www.grrcon.com/ ht
tp://www.irongeek.com/i.p
hp?page=videos/grrcon2017
/mainlist

GrrCon 2017 - Dissecting Destructive Malware and Recovering from Catastrophe

3 years ago

An in depth look into the NotPetya malware outbreak from a boots-on-ground incident responder with first-hand experience assisting organizations through response, recovery and investigation. This talk will cover how NotPetya operates, the geopolitical sig ...

The Tool Box | SessionGopher

3 years ago

Today's episode of The Tool Box features SessionGopher. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Session Gopher here: Github - https://github.com/fireey
e/SessionGo ...

DEF CON 25 Packet Hacking Village - Marek Majkowski - IP Spoofing

3 years ago

At Cloudflare we deal with DDoS attacks every day. Over the years, we've gained a lot of experience in defending from all different kinds of threats. We have found that the largest attacks that cause the internet infrastructure to burn are only possible d ...

DEF CON 25 Packet Hacking Village - Megan Roddie - Strengthen Secops By Leveraging Neurodiversity

3 years ago

High productivity, extreme attention to detail, logical/calculated, passionate, and hyper-focused. These are all characteristics considered valuable in the information security industry. However, a certain group of people who exceed expectations in these ...

DEF CON 25 Packet Hacking Village - Michael Gianarakis ,Keith Lee - Portia

3 years ago

Portia: it's a new tool we have written at SpiderLabs to aid in internal penetration testing test engagements. The tool allows you to supply a username and password that you have captured and cracked from Responder or other sources as well as an IP ranges ...

DEF CON 25 Packet Hacking Village - Mike Raggo, Chet Hosmer - Covert TCP with a Twist

3 years ago

Taking a modern day look on the 20 year anniversary of Craig Rowland's article on Covert TCP, we explore current day methods of covert communications and demonstrate that we are not much better off at stopping these exploits as we were 20 years ago. With ...

DEF CON 25 Packet Hacking Village - Peter Ewane - Cloudy With A Chance of Persistence

3 years ago

The use of Amazon Cloud as a base of operations for businesses is increasing at a rapid rate. Everyone from 2 person start-ups to major companies have been migrating to the cloud. Because of this migration, cloud vendors have become the focus of potential ...

DEF CON 25 Packet Hacking Village - Sam Erb - You're Going to Connect to the Wrong Domain Name

3 years ago

Can you tell the difference between gооgle.com and google.com? How about xn--ggle-55da.com and google.com? Both domain names are valid and show up in the Certificate Transparency log. This talk will be a fun and frustrating look at typosquatting, bitsqu ...

DEF CON 25 Packet Hacking Village - Brute Logic - XSS For the win

3 years ago

Cross-site Scripting (XSS) is the most widespread plague of the web but is usually restricted to a simple popup window with the infamous vector. In this short talk we will see what can be done with XSS as an attacker or pentester and the impact of it for ...

DEF CON 25 Packet Hacking Village - Ron Taylor - Demystifying The OPM breach, WTF Really Happened

3 years ago

In September 2016 the House Committee on oversight finally released their report. Four years after the original breach, we are still asking how the f*#! did this happen. This talk with go over the key findings of the report and the impact on those who wer ...

DEF CON 25 Packet Hacking Village - Tan Kean Siong - Stories from a 15 days SMB Honeypot Mum

3 years ago

WannaCry, Eternal Blue, SambaCry are the popular topic recently. During the outbreak in May 2017, we designed a 'real' Windows 7 / Samba server with the open source Dionaea honeypot and exposed the favourable SMB port to the world. There are tons of expec ...

DEF CON 25 Packet Hacking Village - Tom Sela - Fooling the Hound Deceiving Doman Admin Hunters

3 years ago

The conflict between cyber attackers and defenders is too often in favor of attackers. Recent results of graph theory research incorporated into red-team tools such as BloodHound, shift the balance even more dramatically towards attackers. Any regular dom ...

DEF CON 25 Packet Hacking Village - Vivek Ramachandran,Thomas d'Otreppe - Make a 802.11AC Monitor

3 years ago

802.11ac networks present a significant challenge for scalable packet sniffing and analysis. With projected speeds in the Gigabit range, USB Wi-Fi card based solutions are now obsolete! In this workshop, we will look at how to build a custom monitoring so ...

DEF CON 25 - Artem Kondratenko - Cisco Catalyst Exploitation

3 years ago

On March 17th, Cisco Systems Inc. made a public announcement that over 300 of the switches it manufactures are prone to a critical vulnerability that allows a potential attacker to take full control of the network equipment. This damaging public announce ...

USENIX Security '17 - Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game

3 years ago

Data Hemorrhage, Inequality, and You: How Technology and Data Flows are Changing the Civil Liberties Game Shankar Narayan, Technology and Liberty Project Director, American Civil Liberties Union of Washington Rapidly growing data flows and game-changing ...

USENIX Security '17 - Qapla: Policy compliance for database-backed systems

3 years ago

Aastha Mehta and Eslam Elnikety, Max Planck Institute for Software Systems (MPI-SWS); Katura Harvey, University of Maryland, College Park and Max Planck Institute for Software Systems (MPI-SWS); Deepak Garg and Peter Druschel, Max Planck Institute for Sof ...

USENIX Security '17 - Ensuring Authorized Updates in Multi-user Database-Backed Applications

3 years ago

Kevin Eykholt, Atul Prakash, and Barzan Mozafari, University of Michigan Ann Arbor Database-backed applications rely on access control policies based on views to protect sensitive data from unauthorized parties. Current techniques assume that the applica ...

USENIX Security '17 - REM: Resource-Efficient Mining for Blockchains

3 years ago

Fan Zhang, Ittay Eyal, and Robert Escriva, Cornell University; Ari Juels, Cornell Tech; Robbert van Renesse, Cornell University Blockchains show promise as potential infrastructure for financial transaction systems. The security of blockchains today, how ...

USENIX Security '17 - SmartPool: Practical Decentralized Pooled Mining

3 years ago

Loi Luu, National University of Singapore; Yaron Velner, The Hebrew University of Jerusalem; Jason Teutsch, TrueBit Foundation; Prateek Saxena, National University of Singapore Cryptocurrenci
es such as Bitcoin and Ethereum are operated by a handful of mi ...

USENIX Security '17 - A Privacy Analysis of Cross-device Tracking

3 years ago

Sebastian Zimmeck, Carnegie Mellon University; Jie S. Li and Hyungtae Kim, unaffiliated; Steven M. Bellovin and Tony Jebara, Columbia University Online tracking is evolving from browser- and device-tracking to people-tracking. As users are increasingly a ...

USENIX Security '17 - Walkie-Talkie: An Efficient Defense Against Passive Website Fingerprinting Attacks

3 years ago

Tao Wang, Hong Kong University of Science and Technology; Ian Goldberg, University of Waterloo Website fingerprinting (WF) is a traffic analysis attack that allows an eavesdropper to determine the web activity of a client, even if the client is using pri ...

USENIX Security '17 - Beauty and the Burst: Remote Identification of Encrypted Video Streams

3 years ago

Roei Schuster, Tel Aviv University, Cornell Tech; Vitaly Shmatikov, Cornell Tech; Eran Tromer, Tel Aviv University, Columbia University The MPEG-DASH streaming video standard contains an information leak: even if the stream is encrypted, the segmentation ...

USENIX Security '17 - "I Have No Idea What I'm Doing" - On the Usability of Deploying HTTPS

3 years ago

Katharina Krombholz, Wilfried Mayer, Martin Schmiedecker, and Edgar Weippl, SBA Research Protecting communication content at scale is a difficult task, and TLS is the protocol most commonly used to do so. However, it has been shown that deploying it in a ...

Circle City Con 2017 - Peakaboo - I own you: Owning hundreds of thousands of devices with a broken HTTP packet

3 years ago

Imagine that you've purchased your small a cheap ip security camera to feel just a little better with your own physical security. Now imagine that the people who designed that camera know nothing about secure programming, security or programming at all. I ...

Circle City Con 2017 - Creating Your Own Customized Metamorphic Algorithm

3 years ago

Most malware uses metamorphic code to evade Antivirus detection. These techniques also slow down security researchers when digging deeper into the malware code. On the malware side, there are many ways to generate and implements the said algorithms, yet o ...

Circle City Con 2017 - Ichthyology: Phishing as a Science

3 years ago

Many companies view phishing as a given: employees will click links and enter credentials, and we just need to be okay with that. Phishing prevention usually takes the form of training, and a warning to be careful when reading email. But does phishing tra ...

Circle City Con 2017 - We Don't Always Go Lights and Sirens

3 years ago

One of the most critical steps to Incident Response is the initial triage phase. The same can be said of the decision Paramedics make when responding to emergency calls. During this presentation we will review how to properly triage an incident based on t ...

Circle City Con 2017 - You're not old enough for that: A TLS extension to put the past behind us

3 years ago

TLS evolves rapidly. We don't all have the luxury of upgrading with it, unfortunately; new versions, extensions, cipher suites, and protocols require mutual support. This poses a serious problem for those who have legacy systems that cannot be upgraded (t ...

Circle City Con 2017 - Changing our future with 3D Printing

3 years ago

3D Printing represents the last tool that will be necessary is shifting into our new 21st century economy, as we finally break ourselves free from the shackles of the wealth inequality generated during the first three and a half industrial revolutions and ...

Circle City Con 2017 - See beyond the veil: Automating malicious javascript deobfuscation

3 years ago

Exploit kits use javascript to direct victim browsers to hosted exploits. These javascript are highly obfuscated to mask their intent and make analysis more difficult. Deobfuscating it manually is time consuming and does not scale. This talk with discuss ...

Circle City Con 2017 - Open Sesamee

3 years ago

Resettable combination locks are popular because they can be set to user-chosen codes. Multiple locks can be set alike to one another. Authorized users don't have to keep track of key or other physical credentials. These locks are often used to control ac ...

Circle City Con 2017 - The State of Security in the Medical Industry

3 years ago

Bringing awareness to the pain felt in the healthcare industry from a security standpoint, what attackers are targeting, and how the industry needs to steer itself to prevent further patient risk and mishandling of data. @cannibal has spent 10 years work ...

Circle City Con 2017 - Of Flags, Frogs and 4chan: OPSec vs. Weaponized Autism

3 years ago

This talk will tell the stories of people who got their data leaked, or trolled hard by 4chan because of bad OPSec, and what they could have done better. Internet Hate Machine: Because none of us as are cruel as all of us. ShowMeConVersion because I acci ...

Hak5 2315 – 3D Printer Filaments Explained

3 years ago

Join Shannon Morse and David Randolph to discuss 3D printer filaments and how to shop for the best ones. Special thanks to David from https://printedsolid.com/ for guest hosting this episode! —————
————- Shop: http://www.hakshop.com Su ...

Triton Malware Threatens Lives & The Net Neutrality Repeal – A History – Threat Wire

3 years ago

A history of ISP regulations, new malware is infecting industrial control systems, and three men plead guilty in the Mirai botnet case. All that coming up now on ThreatWire. ————
—————- Shop: http://www.hakshop.com Su
pport: http://www. ...

Circle City Con 2017 - Application Security Metrics

3 years ago

What's your current level of confidence in your application security program? Are you tracking any pen test metrics? Maybe you should. This session will detail several application security metrics used to measure the effectiveness of penetration testing a ...

The Tool Box | QRLJacking

3 years ago

Today's episode of The Tool Box features QRLJacking. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out QRLJacking here: Github - https://github.com/OWASP/
QRLJacking Website ...

GrrCon 2017 - Change is Simply an Act of Survival: Predicting the future while shackled to the past

3 years ago

This presentation will briefly review the history and development of the corporate network, it,s interaction with the Internet and how the adoption of SaaS and PaaS base solutions have rendered the network irrelevant from a security perspective. We will e ...

GrrCon 2017 - The Black Art of Wireless Post-Exploitation

3 years ago

Wireless is an inherently insecure protocol. Most companies recognize this, and focus their resources on minimizing the impact of wireless breaches rather than preventing them outright. During red team engagements, the wireless perimeter is cracked within ...

GrrCon 2017 - Hidden Treasure: Detecting Intrusions with ETW

3 years ago

Today, defenders consume the Windows Event Log to detect intrusions. While useful, audit logs don,t capture the full range of data needed for detection and response. ETW (Event Tracing for Windows) is an additional source of events that defenders can leve ...

GrrCon 2017 - A Reporter's Look at Open Source Intelligence

3 years ago

Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies for those driven or savvy enough to find it. This talk aims to ease the digital and bureaucratic guesswork from the perspective of an in ...

GrrCon 2017 - A Reporter's Look at Open Source Intelligence

3 years ago

Governmental and private agencies provide a vast amount of publicly-available information on individuals and companies for those driven or savvy enough to find it. This talk aims to ease the digital and bureaucratic guesswork from the perspective of an in ...

GrrCon 2017 - Learning from InfoSec Fails

3 years ago

This presentation will highlight some of the reasons why InfoSec either fails or is perceived to fail. People, Process, and Technology issues will be presented with examples. The goal of this talk is to allow people to pick up some pointers for doing thin ...

GrrCon 2017 - Threat Intelligence: Zero to Basics in presentation

3 years ago

This is an audience participation talk, on going from having DFIR with no Threat Intelligence to building a basic threat intelligence program. The majority of the data needed to start a Threat Intelligence program is probably already being captured by the ...

GrrCon 2017 - A GRReat New Way of Thinking about Innovating for Cyber Defense (and even Cyber Offense)

3 years ago

Since the origins of the Republic, the American people have shown a strong speculative knack that lead to novel ideas for tackling tough problems. From the first American colonists who made do with limited resources, to NASA astronauts who boldly explored ...

GrrCon 2017 - vAp0r and the Blooming Onion

3 years ago

vAp0r is a Linux distro that brings together a specific set of tools to allow for secure Tor use on the Raspberry Pi 3. Due to the standard Tor Browser bundle,s inability to support the ARMHF architecture. Included in the distro is Mozilla Firefox setup a ...

GrrCon 2017 - ProbeSpy: Tracking your past, predicting your future

3 years ago

As infosec enthusiasts and professionals, may of us are acutely aware that our devices may be giving away their current location as they sit in our pockets. What if I told you that your device may also be revealing where you,ve been and where you may be g ...

TekThing 155 – Tech Gifts for Travelers! Amazon Cloud Cam Review, Test Your Home Network Speed!

3 years ago

Tech Gifts for Travelers! Amazon Cloud Cam Review, Test Your Home Network Speed, $10,000 Surge Protector Save! —– 03:26 Amazon Cloud Cam When Canary Security Cameras dropped several of the features that came in the free plan, and paywalled the built i ...

DEF CON 25 - Avi Bashan, Slava Makkaveev - Everything to know about Android packers

3 years ago

To understand the Android ecosystem today, one must understand Android packers. Whether used for protecting legitimate apps' business logic or hiding malicious content, Android packer usage is on the rise. Android packers continue to increase their effort ...

DEF CON 25 Packet Hacking Village - Catherine Ullman, Chris Roberts - Breaking the Bad News

3 years ago

Enabling better communications between geeks and management. As humans, we have had 60,000 years to perfect communication, but those of us working in IT, regardless of which side (Blue or Red Team), still struggle with this challenge. We have done our bes ...

DEF CON 25 Packet Hacking Village - Chris Wysopal - How Hackers Changed the Security Industry

3 years ago

Before hackers got involved in cybersecurity the industry was focused on products and compliance. Security was security features: firewalls, authentication, encryption. Little thought was given to vulnerabilities that allowed the bypassing of those featur ...

DEF CON 25 BioHacking Village - C00p3r, Cur50r - Implantable Technology Show and Tell

3 years ago

Through sharing experiences learned first hand and through work on the Dangerous Minds Podcast, c00p3r will be introducing you to implantable technology, explaining the basic products that are available on the market now, from where, as well as provide a ...

DEF CON 25 BioHacking Village - Christopher Frenz - Standardizing Deployment Of Medical Devices

3 years ago

In recent months it seems like not a week passes where you do not encounter a headline that states that a healthcare organization has been held for ransom or in some other way involved in a breach. Healthcare has been a sector that has routinely been desc ...

DEF CON 25 BioHacking Village - Stanislav Naydin, Vlad Gostomelsky - Medical Device Ethics

3 years ago

We will engage the audience in a discussion of modern technological advances along with their ethical implications. We live in an era where the very implanted hardware that keeps you alive can be evidence in the court of law. Neuroscience is now a tool us ...

DEF CON 25 BioHacking Village - Amanda Plimpton, Evan Anderson - Psychoactive Chemicals in Combat

3 years ago

By looking at key experiments and trials done by the military we can learn about psychoactive chemicals and protocols that work, and don’t work, on humans. From biological enhancement to chemical deterrents, there is a wealth of information that grassro ...

DEF CON 25 BioHacking Village - Edward You - Biotechnology Needs A Security Patch Badly

3 years ago

What talk? Its going to be a theatrical song and interpretive dance related to the 5 w's and how to fix our bio economy. You get it, I know you do. For More Information Please Visit:- https://defcon.org/

DEF CON 25 BioHacking Village - Gingerbread - Neurogenic Peptides Smart Drugs 4 Minute Mile

3 years ago

Everything is impossible until it isn't. Every undertaking, defined by the hard limitations at the edges of our possible achievement. Lossless electrical conductivity, human travel beyond the sound 'barrier', running a four-minute mile...each, seen as s ...

DEF CON 25 BioHacking Village - Jay Radcliffe - The Scientific Method in Security Research

3 years ago

One of the huge criticisms of Security research is the lack of process and adherence to traditional research methods. Quite often our "research" is just tearing apart systems and exposing their vulnerabilities. While this is useful, there is a better way. ...

The Tool Box | Pupy

3 years ago

Today's episode of The Tool Box features Pupy. We breakdown everything you need to know! Including what it does, who it was developed by, and the best ways to use it! Check out Pupy here: Github - https://github.com/n1nj4s
ec/pupy Thanks for watching an ...

Circle City Con 2017 - How To Be Curious

3 years ago

Curiosity. It's not just for killing cats. In fact, it's *the heart* of the hacker mindset. Like many seemingly abstract mental qualities, those on the outside or those at the start of their journey can be left in the cold, wondering if they've ???got it ...