ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

142 results

Jo Praveen
Arbitrary write using format string exploit | Binary Exploitation tamil | 0x0D

In this video we are going to modify a variable using format string bug⚡️ -=[⬇️ challenge files]=- ...

24:15
Arbitrary write using format string exploit | Binary Exploitation tamil | 0x0D

217 views

4 years ago

secappdev.org
C-Based Application Exploits and Countermeasures - Yves Younan

The C and C++ programming languages have some serious shortcomings from the point of view of security. Certain kinds of bugs ...

1:26:43
C-Based Application Exploits and Countermeasures - Yves Younan

11,864 views

12 years ago

Erarnitox
Protostar Format[3]

Playlist: https://youtube.com/playlist?list=PLTjUlazALHSCiCTI6f-UM_okfTRINPZgN You can find all info about this machine here: ...

22:34
Protostar Format[3]

231 views

4 years ago

DEFCONConference
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain

With a surge in the production of internet of things (IoT) devices, embedded development tools are becoming commonplace and ...

21:55
DEF CON 26 - Zach and Alex - Infecting The Embedded Supply Chain

1,290 views

7 years ago

Adam Doupé
CSE 545 S16: "Application Insecurity pt. 16"

We discussed format string vulnerabilities http://adamdoupe.com/teaching/classes/cse545-software-security-s16/

52:07
CSE 545 S16: "Application Insecurity pt. 16"

170 views

9 years ago

OpenSecurityTraining2
Day 2 Part 4: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

1:05:22
Day 2 Part 4: Exploits1: Introduction to Software Exploits

2,688 views

13 years ago

Adam Doupé
CSE 545 F18: 3-14-18 "Application Insecurity Pt. 9"

Recorded lecture for CSE 545 F18 on 3-14-18. We discussed format string vulnerabilities and non-executable stack.

1:18:47
CSE 545 F18: 3-14-18 "Application Insecurity Pt. 9"

414 views

7 years ago

OWASP Foundation
AppSecEU 16 - Charlie Miller - Keynote  -  Bugs ruin everything

From AppSecEU 2016 in Rome https://2016.appsec.eu/ - Managed by the official OWASP Media Project ...

52:30
AppSecEU 16 - Charlie Miller - Keynote - Bugs ruin everything

2,976 views

9 years ago

Adam Doupé
CSE 545 S17: 3-22-17 "Application Insecurity Pt. 10"

Recorded lecture for CSE 545 S17 on 3-22-17. We discussed index overflow, off-by-one overflows, and format string ...

1:15:50
CSE 545 S17: 3-22-17 "Application Insecurity Pt. 10"

250 views

8 years ago

NorthSec
NSEC2021 - Pedro Ribeiro - Critical Vulnerabilities in Network Equipment: Past, Present and Future

In this talk, we will discuss common vulnerability patterns in network equipment (consumer and enterprise routers, firewalls, VPN, ...

30:59
NSEC2021 - Pedro Ribeiro - Critical Vulnerabilities in Network Equipment: Past, Present and Future

154 views

4 years ago

lseepita
HOWTO: Basic Vulnerabilities and their Exploitation, Samuel Angebault, LSE Week 2013

Bugs like buffer overflow, format string and use after free are often introduced by a wrong usage or bad coding practices. This talk ...

27:45
HOWTO: Basic Vulnerabilities and their Exploitation, Samuel Angebault, LSE Week 2013

284 views

12 years ago

Studio IIT Bombay
CS C S006 Software Vulnerabilities

This is 6th session of Cyber Security workshop arranged for coordinators. It was delivered by Prof. Bernard L. Menezes from IIT ...

40:40
CS C S006 Software Vulnerabilities

163 views

9 years ago

media.ccc.de
gannimo, npc@berkeley.edu: New memory corruption attacks: why can't we have nice things?

Memory corruption is an ongoing problem and in past years we have both developed a set of defense mechanisms and novel ...

54:32
gannimo, npc@berkeley.edu: New memory corruption attacks: why can't we have nice things?

391 views

10 years ago

Studio IIT Bombay
CS M S014 Software Vulnerabilities and Web Application Security - II

This is 14th session of Cyber Security workshop arranged for teachers. It was delivered by Prof. Bernard L. Menezes from IIT ...

1:01:39
CS M S014 Software Vulnerabilities and Web Application Security - II

240 views

9 years ago

Z. Cliffe Schreuders
Understanding Vulnerabilities 2: Categories of Flaws: Computer Security Lectures 2014/15 S2

This video is part of the computer/information/cyber security and ethical hacking lecture series; by Z. Cliffe Schreuders at Leeds ...

48:24
Understanding Vulnerabilities 2: Categories of Flaws: Computer Security Lectures 2014/15 S2

1,117 views

10 years ago

Nobody
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

This is the 16th video recorded course lecture for CIS5930/CIS4930 "Offensive Security" from Spring 2013 at the Florida State ...

56:45
Offensive Security 2013 - FSU - Lecture16: Midterm review & Exploit Development 105

2,093 views

12 years ago

Jo Praveen
Bypass canary | Binary exploitation Tamil | 0x0E

... exploit dbd, dbog exploit, c exploit development, windows exploit development, format string vulnerability, format string attack, ...

21:11
Bypass canary | Binary exploitation Tamil | 0x0E

437 views

4 years ago

DEFCON Switzerland
Area41 2014: Marc Ruef: Tracking and Consolidating Security Vulnerabilities

Area41 Security Conference 2014: Marc Ruef: Adventures in a Decade of Tracking and Consolidating Security Vulnerabilities.

48:32
Area41 2014: Marc Ruef: Tracking and Consolidating Security Vulnerabilities

163 views

10 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits1: Introduction to Software Exploits

The class materials are available at http://www.OpenSecurityTraining.info/Exploits1.html Follow us on Twitter for class news ...

59:07
Day 1 Part 3: Exploits1: Introduction to Software Exploits

6,725 views

13 years ago

Adam Doupé
Pwndevils: 2016 Tokyo Westerns/MMA CTF "judgment" Walkthrough

Walkthrough of the Tokyo Westerns/MMA CTF challenge "judgment" during the pwndevils meeting 9/15/16. Binary file can be ...

37:51
Pwndevils: 2016 Tokyo Westerns/MMA CTF "judgment" Walkthrough

1,107 views

9 years ago