ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

9 results

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 30 - LiveCTF -  Day 2

Live Coverage of Day 2 of the DEF CON 30 CTF.

9:56:26
DEF CON 30 - LiveCTF - Day 2

338 views

3 years ago

DEFCONConference
DEF CON Safe Mode - Peleg Hadar and Tomer Bar - After Stuxnet Printing still the Stairway to Heaven

In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment ...

31:17
DEF CON Safe Mode - Peleg Hadar and Tomer Bar - After Stuxnet Printing still the Stairway to Heaven

4,884 views

5 years ago

DEFCONConference
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR

For decades, the EICAR test string has been used by antivirus and security vendors to safely test their detection engines without ...

43:40
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR

17,755 views

4 years ago

LiveOverflow
Hacking into Google's Network for $133,337

In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...

31:32
Hacking into Google's Network for $133,337

1,076,213 views

4 years ago

DEFCONConference
DEF CON 30  - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...

38:52
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

1,650 views

3 years ago

DEFCONConference
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...

45:58
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

13,357 views

10 years ago

DEFCONConference
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...

42:13
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

5,258 views

6 years ago

DEFCONConference
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

Whether we want it to be or not, the Internet of Things is upon us. Network interfaces are the racing stripes of today's consumer ...

43:29
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

6,889 views

10 years ago