Conference Video – Win32 Exploit Development With Mona and the MSF Framework

In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …

Conference Video – Dirty Red Team tricks

Let’s time travel to 2003 with today’s tools and own everything. This talk takes you inside the red teams at the North East and Mid Atlantic Collegiate Cyber Defense competition events. Raphael Mudge, the developer of the Armitage Metasploit GUI, will guide you on this journey. You will learn how to automate Metasploit, nmap, and Read More …

Conference Video – Offensive Countermeasures: Still trying to bring sexy back

Why is it that the Hackers and Penetration Testers get to have all of the “sexy” fun? In this presentation we will cover some cool tricks to confuse, block or mislead attackers. Penetration testers may be angered during this presentation as we will describe how to make their lives difficult. The term “hacking back” will Read More …

Conference Video – Fantastic OSINT and where to find it

Open-Source security intelligence is bountiful if you know where to look. The goal of my talk is show you where to find this data, how to utilize it, and how the data you find can be enriched through free and/or commercial tools.

Hacker Video – All Your Devices Can Be Hacked

Avi Rubin is Professor of Computer Science at Johns Hopkins University and Technical Director of the JHU Information Security Institute. Avi’s primary research area is Computer Security, and his latest research focuses on security for electronic medical records. Avi is credited for bringing to light vulnerabilities in electronic voting machines. In 2006 he published a Read More …

Hacker Video – Intro to Hacking Web Apps

Assessing the security posture of a web application is a common project for a penetration tester and a good skill for developers to know. In this talk, I’ll go over the different stages of a web application pen test, from start to finish. We’ll start with tools used during the discovery phase to utilize OSINT Read More …

Hacker Video – Fyodor – Nmap: Scanning The Internet – Defcon 16

Oldie but one of my favorites The Nmap Security Scanner was built to efficiently scan large networks, but Nmap’s author Fyodor took this to a new level by scanning millions of Internet hosts as part of the World scan project. He presents the most interesting findings and empirical statistics from these scans, along with practical Read More …