slides&video
24.7K views | +0 today
Follow
slides&video
Your new post is loading...
Your new post is loading...
Scooped by Danen Raas
Scoop.it!

Checks and Balances in Vulnerability Management | Rapid7

Checks and Balances in Vulnerability Management | Rapid7 | slides&video | Scoop.it

Learn more about building checks and balances into the asset and vulnerability management processes. Watch now. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Hackingz Ze Komputerz - Linux SRP Overwrite and ROP Redux

Here we go back to our previous Linux ROP exploit and make it work properly with arbitrary Linux/Libc versions.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

HTTPS is Hard - Sessions by Pusher

My name is Steve. I’m the head of web engineering at Yell, or Yell.com. You may have seen we’ve dumped some pieces of paper on your doorstep recently.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

$hell on Earth:
From Browser to System Compromise

$hell on Earth:<br/>From Browser to System Compromise | slides&video | Scoop.it
Since Pwn2Own’s inception, the contest has evolved to the global stage where it is today. In the beginning, exploitation often required only brief development time. In recent years, exploit mitigations have successfully driven up the cost of vulnerability discovery and exploit development.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

First steps into networking with net0 from exploit-exercises protostar

We will learn how to daemonize a process and see how a server handles connections net0: https://exploit-exercises.com/protostar/net0/ join the discussion 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

IP Over QR Code!

Waaay back I had the idea of sending data over the audio/mic jack, and made a crummy implementation that could only send text messages (very unreliable).

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Joomla - From XSS to RCE 2.5 - Black Hat Europe Arsenal 2016

This video demonstrates how to utilise Cross-Site Scripting (XSS) to inject a new super user into Joomla, and subsequently upload a custom Joomla extension

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Top 10 best tutorials to start learning hacking with Kali Linux

Kali Linux is one of the most loved distros by the hacking and security community because of its pentesting and exploit tools. It is one of the best security auditing operating systems based on the Linux kernel and the successor of the popular BackTrack.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

You didnt see it’s coming? "Dawn of hardened Windows Kernel"

Past few years our team was focusing on different operating systems including Microsoft windows kernel.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Video: ntds.dit: Extract Hashes With secretsdump.py

Video: ntds.dit: Extract Hashes With secretsdump.py | slides&video | Scoop.it

In this video I show an alternative to my blogpost on extracting hashes from the Active Directory database file ntds.dit. I use secretsdump.py from Core Security's impacket Python modules.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Security B-Sides London - YouTube

Security B-Sides London - YouTube | slides&video | Scoop.it

The Official Security B-Sides London YouTube Channel This is where you will find official videos from the events hosted in London.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Powershell Netcat: PowerCat

Powershell Netcat: PowerCat | slides&video | Scoop.it

powercat is a powershell function. First you need to load the function before you can execute it. You can put one of the below commands into your powershell profile so powercat is automatically loaded when powershell starts.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Penetration Testing PDF

PENETRATION.TESTING.WITH.THE.BASH.SHELL, PP.Kali.Linux.Assuring.Security.by.Penetration.Testing, PP.Kali.Linux.Social.Engineering.Dec.2013.pdf Packt - Kali Linux, Network Scanning Cookbook 2014 RETAiL.pdf Packt Kali Linux-Assuring Security By Penetration Testing, Penetration Testing Procedures & Methodologies.pdf Penetration Testing With The Bash Shell.pdf Penetration Testing with Raspberry Pi-Ascetic_trip.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

ShinoBOT Suite

ShinoBOT Suite is a cyber attack campaign simulator. This slide was presented at the Black Hat USA 2014 Arsenal.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Owning a crappy socks proxy on Windows 10

This video is a walkthrough of how to own the "Easy Internet Sharing Proxy Server" from fuzz to shell on Windows 10 via a stack buffer overflow

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Python Scripting - Adam Byers SecureWV 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

Python Scripting - Adam Byers SecureWV 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

WordPress - From XSS to RCE 2.5 - Black Hat Europe Arsenal 2016

This video demonstrates how to utilise Cross-Site Scripting (XSS) to inject pentestmonkey's reverse PHP shell into the footer.php

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Black Hat USA 2016 36 Pwning Your Java Messaging With Deserialization Vulnerabilities

Black Hat USA 2016 01 The Hidden Architecture of Our Time Why This Internet Worked How We Could Lose It and the Role Hackers Play.mp4 Black Hat USA 2016

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

How to Hack any windows using Msfvenom in Kali 2.0

Hack any windows using msfvenom bypass Antivirus using encoding and how to make persistence backdoor in metasploit 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Infected Classic Shell/Audacity Trojan (MBR overwriting)

http://www.twitter.com/danooct1 edit: FossHub may still be offering malicious downloads. Cross check file sizes on everything you download from there

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Catastrophic Backtracking ‒ When Regular Expressions Explode

When crafting regular expressions, you have to be careful to not make them susceptible to catastrophic backtracking, because that would allow a DOS attack using a specifically crafted input. In this short talk, I explain how catastrophic backtracking works, why it happens, and I give a few tips on how to avoid it.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Powershell injection attacks via commix & TrustedSec's magic unicorn

Powershell injection attacks via commix & TrustedSec's magic unicorn (*) https://github.com/stasinopoulos/commix (*) https://github.com/trustedsec/unicorn

more...
No comment yet.