ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

446 results

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,117 views

2 years ago

DEFCONConference
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans

There's an escalating arms race between bots and the people who protect sites from them. Bots, or web scrapers, can be used to ...

24:26
DEF CON 23 - Ryan Mitchell - Separating Bots from the Humans

10,472 views

10 years ago

DEFCONConference
DEF CON 31 - certmitm  Automatic Exploitation of TLS Certificate Validation Vulns - Aapo Oksman

TLS is the de facto way of securing network connections. It provides an easy way of ensuring confidentiality, integrity and ...

50:09
DEF CON 31 - certmitm Automatic Exploitation of TLS Certificate Validation Vulns - Aapo Oksman

14,607 views

2 years ago

BocoupLLC
Hacking your health with JavaScript - Alan McLean

Hacking your health with JavaScript. It was a title that made a lot of sense a couple months ago. So, you know, a couple years ago ...

27:15
Hacking your health with JavaScript - Alan McLean

1,051 views

8 years ago

DEFCONConference
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

HTTP requests are traditionally viewed as isolated, standalone entities. In this session, I'll introduce techniques for remote, ...

41:32
albinowax - HTTP Desync Attacks: Smashing into the Cell Next Door - DEF CON 27 Conference

65,107 views

6 years ago

DEFCONConference
DEF CON Safe Mode - ayoul3 - Only Takes a Spark Popping a Shell on 1000 Nodes

Apache Spark is one of the major players if not the leader when it comes to distributed computing and processing. Want to use ...

45:03
DEF CON Safe Mode - ayoul3 - Only Takes a Spark Popping a Shell on 1000 Nodes

5,427 views

5 years ago

DEFCONConference
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.

16:21
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

2,228 views

6 years ago

DEFCONConference
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

How to use CSP to stop XSS KENNETH LEE PRODUCT SECURITY ENGINEER, ETSY INC. Crosssite scripting attacks have ...

21:39
DEF CON 21 - Kenneth Lee - How to use CSP to stop XSS

1,385 views

12 years ago

DEFCONConference
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story

In this talk we will tell the story of an insane exploit we used to compromise the otherwise secure KASM Workspaces software.

32:07
DEF CON 30 - Samuel Erb, Justin Gardner - Crossing the KASM - a Webapp Pentest Story

3,432 views

3 years ago

DEFCONConference
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

Return-oriented Programming (ROP) has been the predominate code-reuse attack for over a decade, but there are other options.

22:22
Dr Bramwell Brizendine - JOP ROCKET A Wicked Tool for JOP Gadget Discovery - DEF CON 27 Conference

1,363 views

6 years ago

DEFCONConference
DEF CON 23 -  El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths

Fuzzing is a well-established technique for finding bugs, hopefully exploitable ones, by brute forcing inputs to explore code paths ...

21:26
DEF CON 23 - El Sherei and Stalmans - Extending Fuzzing Grammars to Exploit Code Paths

2,210 views

10 years ago

LiveOverflow
Hacking into Google's Network for $133,337

In this video we hear the story how Ezequiel Pereira found a critical vulnerability in Google Cloud and was awarded $164674 in ...

31:32
Hacking into Google's Network for $133,337

1,076,249 views

4 years ago

DEFCONConference
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

MacOS is known for an additional layer of privacy controls called TCC - Transparency, Consent, and Control (TCC) that restricts ...

19:55
DEF CON 31 - ELECTRONizing MacOS Privacy - A New Weapon in Your Red Teaming Armory - Wojciech Reguła

5,498 views

2 years ago

Chrome for Developers
Hacking Without Being a Hack (Polymer Summit 2016)

Almost everyone has had a moment when they have been asked to build something quickly at 3pm on a Friday. Come explore ...

11:51
Hacking Without Being a Hack (Polymer Summit 2016)

2,140 views

9 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

In this talk, we will provide insight into both the documented and undocumented APIs available in Adobe Reader. Several code ...

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,088 views

10 years ago

DEFCONConference
DEF CON Safe Mode - Dylan Ayrey and Allison Donovan - Lateral Movement & Privilege Escalation in GCP

Google Cloud's security model in many ways is quite different from AWS. Spark jobs, Cloud Functions, Jupyter Notebooks, and ...

40:26
DEF CON Safe Mode - Dylan Ayrey and Allison Donovan - Lateral Movement & Privilege Escalation in GCP

7,937 views

5 years ago

DEFCONConference
DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w/a single vuln

macOS local security is shifting more and more to the iOS model, where every application is codesigned, sandboxed and needs to ...

39:20
DEF CON 30 - Thijs Alkemade - Process injection: breaking all macOS security layers w/a single vuln

1,962 views

3 years ago

DEFCONConference
Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

The 2016 WWDC saw the dawn of Apple Pay Web, an API that lets websites embed an Apple Pay button within their web-facing ...

40:48
Joshua Maddux - API Induced SSRF How ApplePay Scattered Vulns Across the Web - DEF CON 27 Conference

5,275 views

6 years ago

Rahad Chowdhury
Firebase database takeover vulnerability | firebase exploit

Firebase Database takeover vulnerability | Rahad Chowdhury What is firebase database? Firebase is Google mobile application ...

4:47
Firebase database takeover vulnerability | firebase exploit

8,179 views

2 years ago

DEFCONConference
DEF CON 31 - Calling it a 0 Day  -  Hacking at PBX UC Systems - good pseudonym

PBX (Private Branch Exchange) and UC (Unified Communications) servers are the big communication brokers in enterprise ...

37:23
DEF CON 31 - Calling it a 0 Day - Hacking at PBX UC Systems - good pseudonym

4,813 views

2 years ago