Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
171 results
Paul Haas - Advanced Format String Attacks Format string attacks remain difficult in both software and hackademic exercises as ...
814 views
12 years ago
In this video we are going to modify a variable using format string bug⚡️ -=[⬇️ challenge files]=- ...
217 views
4 years ago
The C and C++ programming languages have some serious shortcomings from the point of view of security. Certain kinds of bugs ...
11,862 views
This talk presents an algorithm and a technique that takes a vulnerable application that contains a format string exploit as a ...
4,536 views
14 years ago
With a surge in the production of internet of things (IoT) devices, embedded development tools are becoming commonplace and ...
1,290 views
7 years ago
In this talk, we will discuss common vulnerability patterns in network equipment (consumer and enterprise routers, firewalls, VPN, ...
154 views
We discussed format string vulnerabilities http://adamdoupe.com/teaching/classes/cse545-software-security-s16/
170 views
9 years ago
Playlist: https://youtube.com/playlist?list=PLTjUlazALHSCiCTI6f-UM_okfTRINPZgN You can find all info about this machine here: ...
231 views
The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...
2,688 views
13 years ago
Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...
1 view
DEF CON 16 - Michael Brooks: Deciphering Captcha This presentation will detail two methods of breaking captcha. One uses ...
158 views
From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...
2,976 views
Recorded lecture for CSE 545 F18 on 3-14-18. We discussed format string vulnerabilities and non-executable stack.
414 views
This is 6th session of Cyber Security workshop arranged for coordinators. It was delivered by Prof. Bernard L. Menezes from IIT ...
163 views
Recorded lecture for CSE 545 S17 on 3-22-17. We discussed index overflow, off-by-one overflows, and format string ...
250 views
8 years ago
Bugs like buffer overflow, format string and use after free are often introduced by a wrong usage or bad coding practices. This talk ...
284 views
Area41 Security Conference 2014: Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities.
10 years ago
Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel ...
391 views
This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...
2,093 views
DEF CON 16 - Panel: Hacking OpenVMS OpenVMS is considered a highly secure and reliable operating system relied upon by ...
286 views