ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

11 results

DEFCONConference
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

A concept is a brick. It can be used to build a courthouse of reason. Or it can be thrown through the window.” ― Gilles Deleuze ...

42:13
Omer Yair - Exploiting Windows Exploit Mitigation for ROP Exploits - DEF CON 27 Conference

5,254 views

6 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

DEFCONConference
DEF CON 30 - LiveCTF -  Day 2

Live Coverage of Day 2 of the DEF CON 30 CTF.

9:56:26
DEF CON 30 - LiveCTF - Day 2

338 views

3 years ago

DEFCONConference
DEF CON 14 - Atlas: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

Atlas: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights Abstract: atlas was just a kiddie when asked to write his first ...

51:30
DEF CON 14 - Atlas: The Making of atlas: Kiddie to Hacker in 5 Sleepless Nights

2,003 views

11 years ago

LiveOverflow
Hacking into Google's Network for $133,337

In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...

31:32
Hacking into Google's Network for $133,337

1,076,156 views

4 years ago

DEFCONConference
DEF CON Safe Mode - Peleg Hadar and Tomer Bar - After Stuxnet Printing still the Stairway to Heaven

In 2010, Stuxnet, the most powerful malware in the world revealed itself, causing physical damage to Iranian nuclear enrichment ...

31:17
DEF CON Safe Mode - Peleg Hadar and Tomer Bar - After Stuxnet Printing still the Stairway to Heaven

4,884 views

5 years ago

DEFCONConference
DEF CON 30  - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

Mainframes run the world, literally. Have you ever paid for something, a mainframe was involved, flown? Used a bank? Gone to ...

38:52
DEF CON 30 - Jake Labelle - Doing the Impossible - How I Found Mainframe Buffer Overflows

1,649 views

3 years ago

DEFCONConference
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR

For decades, the EICAR test string has been used by antivirus and security vendors to safely test their detection engines without ...

43:40
DEF CON 29 - Richard Henderson - Old MacDonald Had a Barcode, E I E I CAR

17,737 views

4 years ago

DEFCONConference
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

Security has gone from a curiosity to a phenomenon in the last decade. Fortunately for us, despite the rise of memory-safe, ...

45:58
DEF CON 23 - Shoshitaishvili and Wang - Angry Hacking: The next gen of binary analysis

13,356 views

10 years ago

DEFCONConference
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

Whether we want it to be or not, the Internet of Things is upon us. Network interfaces are the racing stripes of today's consumer ...

43:29
DEF CON 23 - Ricky Lawshae - Let's Talk About SOAP Baby, Let's Talk About UPNP

6,889 views

10 years ago

cs631apue
Advanced Programming in the UNIX Environment: Week 11, Segment 1 - The Executable & Linkable Format

In this video lecture, we begin our exploration of shared libraries. We start with a look at the Executable and Linkable Format (ELF) ...

11:35
Advanced Programming in the UNIX Environment: Week 11, Segment 1 - The Executable & Linkable Format

4,938 views

5 years ago