ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

171 results

DEFCONConference
DEF CON 18 - Paul Haas - Advanced Format String Attacks

Paul Haas - Advanced Format String Attacks Format string attacks remain difficult in both software and hackademic exercises as ...

31:16
DEF CON 18 - Paul Haas - Advanced Format String Attacks

814 views

12 years ago

Jo Praveen
Arbitrary write using format string exploit | Binary Exploitation tamil | 0x0D

In this video we are going to modify a variable using format string bug⚡️ -=[⬇️ challenge files]=- ...

24:15
Arbitrary write using format string exploit | Binary Exploitation tamil | 0x0D

217 views

4 years ago

secappdev.org
C-Based Application Exploits and Countermeasures - Yves Younan

The C and C++ programming languages have some serious shortcomings from the point of view of security. Certain kinds of bugs ...

1:26:43
C-Based Application Exploits and Countermeasures - Yves Younan

11,862 views

12 years ago

28c3
28c3: String Oriented Programming

This talk presents an algorithm and a technique that takes a vulnerable application that contains a format string exploit as a ...

48:00
28c3: String Oriented Programming

4,536 views

14 years ago

DEFCONConference
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain

With a surge in the production of internet of things (IoT) devices, embedded development tools are becoming commonplace and ...

21:55
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain

1,290 views

7 years ago

NorthSec
NSEC2021 - Pedro Ribeiro - Critical Vulnerabilities in Network Equipment: Past, Present and Future

In this talk, we will discuss common vulnerability patterns in network equipment (consumer and enterprise routers, firewalls, VPN, ...

30:59
NSEC2021 - Pedro Ribeiro - Critical Vulnerabilities in Network Equipment: Past, Present and Future

154 views

4 years ago

Adam Doupé
CSE 545 S16: "Application Insecurity pt. 16"

We discussed format string vulnerabilities http://adamdoupe.com/teaching/classes/cse545-software-security-s16/

52:07
CSE 545 S16: "Application Insecurity pt. 16"

170 views

9 years ago

Erarnitox
Protostar Format[3]

Playlist: https://youtube.com/playlist?list=PLTjUlazALHSCiCTI6f-UM_okfTRINPZgN You can find all info about this machine here: ...

22:34
Protostar Format[3]

231 views

4 years ago

OpenSecurityTraining2
Day 2 Part 4: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

1:05:22
Day 2 Part 4: Exploits1: Introduction to Software Exploits

2,688 views

13 years ago

SecurityHackingVideo
28C3  String Oriented Programming en)

Check out the following: http://solidshellsecurity.com/ (quality dedicated/vps servers and IT services) ...

48:00
28C3 String Oriented Programming en)

1 view

12 years ago

DEFCONConference
DEF CON 16 - Michael Brooks: Deciphering Captcha

DEF CON 16 - Michael Brooks: Deciphering Captcha This presentation will detail two methods of breaking captcha. One uses ...

20:50
DEF CON 16 - Michael Brooks: Deciphering Captcha

158 views

12 years ago

OWASP Foundation
AppSecEU 16 - Charlie Miller - Keynote  -  Bugs ruin everything

From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...

52:30
AppSecEU 16 - Charlie Miller - Keynote - Bugs ruin everything

2,976 views

9 years ago

Adam Doupé
CSE 545 F18: 3-14-18 "Application Insecurity Pt. 9"

Recorded lecture for CSE 545 F18 on 3-14-18. We discussed format string vulnerabilities and non-executable stack.

1:18:47
CSE 545 F18: 3-14-18 "Application Insecurity Pt. 9"

414 views

7 years ago

Studio IIT Bombay
CS C S006 Software Vulnerabilities

This is 6th session of Cyber Security workshop arranged for coordinators. It was delivered by Prof. Bernard L. Menezes from IIT ...

40:40
CS C S006 Software Vulnerabilities

163 views

9 years ago

Adam Doupé
CSE 545 S17: 3-22-17 "Application Insecurity Pt. 10"

Recorded lecture for CSE 545 S17 on 3-22-17. We discussed index overflow, off-by-one overflows, and format string ...

1:15:50
CSE 545 S17: 3-22-17 "Application Insecurity Pt. 10"

250 views

8 years ago

lseepita
HOWTO: Basic Vulnerabilities and their Exploitation, Samuel Angebault, LSE Week 2013

Bugs like buffer overflow, format string and use after free are often introduced by a wrong usage or bad coding practices. This talk ...

27:45
HOWTO: Basic Vulnerabilities and their Exploitation, Samuel Angebault, LSE Week 2013

284 views

12 years ago

DEFCON Switzerland
Area41 2014: Marc Ruef: Tracking and Consolidating Security Vulnerabilities

Area41 Security Conference 2014: Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities.

48:32
Area41 2014: Marc Ruef: Tracking and Consolidating Security Vulnerabilities

163 views

10 years ago

media.ccc.de
gannimo, npc@berkeley.edu: New memory corruption attacks: why can't we have nice things?

Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel ...

54:32
gannimo, npc@berkeley.edu: New memory corruption attacks: why can't we have nice things?

391 views

10 years ago

Nobody
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

56:45
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

2,093 views

12 years ago

DEFCONConference
DEF CON 16 - Panel: Hacking OpenVMS

DEF CON 16 - Panel: Hacking OpenVMS OpenVMS is considered a highly secure and reliable operating system relied upon by ...

45:12
DEF CON 16 - Panel: Hacking OpenVMS

286 views

12 years ago