A video I uploaded for my dear friend Cory Doctorow, from the Moth Story-telling competition.
Category: Video
This is the ongoing video feed of the site. Anything I come across will be on this page, so the topics could go from music, to malware, to economic theory pretty darm quickly. I warned you.
Conference Video – Introductory Netflow Analysis
Miles Johnson Introductory Netflow Analysis is a 1 hour presentation on the basic concepts of Netflow and network forensics using netflow logs. All IT Security professionals will need to do network forensics at one time or another. Netflow analysis can empower you to discover and understand past network behavior.
Hacker Video – All Your Devices Can Be Hacked
Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …
Hacker Video – Exploiting Network Surveillance Cameras
Exploiting Network Surveillance Cameras Like a Hollywood Hacker
Hacker Video – Analyzing Meterpreter with Redline
A victim VM has been deliberately infected with Meterpreter via an IE exploit. The video shows copying over a Redline collector to extract forensic artifacts and save them to network share. The artifacts are then imported to an analysis workstation over sftp and opened in Redline. The analysis starts at the highest malicious score to Read More …
Hacker Video – Intro to Hacking Web Apps
Assessing the security posture of a web application is a common project for a penetration tester and a good skill for developers to know. In this talk, I’ll go over the different stages of a web application pen test, from start to finish. We’ll start with tools used during the discovery phase to utilize OSINT Read More …
Hacker Video – Fyodor – Nmap: Scanning The Internet – Defcon 16
Oldie but one of my favorites The Nmap Security Scanner was built to efficiently scan large networks, but Nmap’s author Fyodor took this to a new level by scanning millions of Internet hosts as part of the World scan project. He presents the most interesting findings and empirical statistics from these scans, along with practical Read More …
Hacker Video – SIEGECAST: Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Media walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Hacker Video – What Is An XXE Attack
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.