slides&video
28.6K views | +2 today
Follow
slides&video
Your new post is loading...
Your new post is loading...
Scooped by Danen Raas
Scoop.it!

z0ro Repository | index-of

Ebooks / Pdf's for Cryptography, hacking, Exploits, Linux, CS, Pentesting, Viruses, Malwares, Security, forensics...

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 | DC20

Defeating PPTP VPNs and WPA2 Enterprise with MS-CHAPv2 | DC20 | Moxie Marlinspike...
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Unpacking Ursnif

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Introduction to Firmware Reversing

To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Unearth Hidden Treasures In The Stack - Bypass CFG Via Stack Data Corruption - [PDF]

Unearth Hidden Treasures In The Stack - Bypass CFG Via Stack Data Corruption
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Complete Hacking Video using Metasploit - Meterpreter

Complete Hacking Video using Metasploit - Meterpreter | slides&video | Scoop.it
Click here to Complete Hacking Video using Metasploit - Meterpreteredit the content
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Huawei Reversing Part 3 - SPI FLash Data Flowing

Yellow: MISO (Flash to main IC) Blue: MOSI (Main IC to Flash) Full post: http://jcjc-dev.com/2016/05/23/reversing-huawei-3-sniffing/ ;

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Using Amazon AWS as a Cobalt Strike Communication Channel

This video is a brief demo of the S3 transport mechanism dictated by Cobalt Strike's External C2 Specification. This allows for the malicious executable to communicate exclusively with AWS APIs and never the Team Server, allowing for more subversive traffic.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Tutorial: Cracking Denuvo V4

https://revolt.group/ Denuvo V4 (also V3), checks for the following things: - CPUID hash of 0x1, 0x8000002, 0x8000003 and 0x8000004 - Image Data Director 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Metasploit Demo of MS17-010 EternalSynergy + EternalRomance + EternalChampion

R7 Metasploit developer Matthew Kienow gives the rundown (and demo!) of the latest MS17-010 modules to land in Metasploit Framework. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

The Art of Fuzzing – Slides and Demos

The Art of Fuzzing – Slides and Demos | slides&video | Scoop.it

Over the last weeks I presented talks on the topic of fuzzing at conferences such as DefCamp, Heise Dev Sec, IT-SeCX and BSides Vienna.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Cracking Codes with Python

Cracking Codes with Python | slides&video | Scoop.it
Cracking Codes with Python teaches complete beginners how to program in the Python programming language. The book features the source code to several ciphers and hacking programs for these ciphers.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Malware Theory - Memory Mapping of PE Files

How are PE files mapped into memory? How are PE files mapped into memory? Follow me on Twitter: https://twitter.com/struppigel ;

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Wireshark Comments

Wireshark Comments | slides&video | Scoop.it

For NVISO, I'm providing Wireshark training at BruCON Spring 2018: Wireshark and Lua Programming. In the following video, I show how to add comments to packets and capture files in Wireshark: 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

VH#33 PAN-OS Auth bypass and RCE on

This is "VH#33 PAN-OS Auth bypass and RCE" by «Хакер» on Vimeo, the home for high quality videos and the people who love them. 

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

KRACKing WPA2 by Forcing Nonce Reuse

KRACKing WPA2 by Forcing Nonce Reuse | slides&video | Scoop.it

We introduce key reinstallation attacks (KRACKs). These attacks abuse features of a protocol to reinstall an already in-use key, thereby resetting nonces and/or replay counters associated to this key. We show that our novel attack technique breaks several handshakes that are used in a WPA2-protected network.

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

SeEnableDelegationPrivilege Active Directory backdoor

A quick demo of how SeEnableDelegationPrivilege can be leveraged to create a backdoor in AD, allowing constrained delegation to be used to regain access

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

DEF CON 25 - Get $pwnd: Attacking Battle Hardened Windows Server - Lee Holmes

Windows Server has introduced major advances in remote management hardening in recent years through PowerShell Just Enough Administration ("JEA").
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Having a look on KINS 3.3.7.0

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Live Session 10 Highlight: Kernel Arbitrary Write HalDispatchTable

This is a short highlight of the tenth Patron live session. In this session we exploited an arbitrary Kernel write on Windows 7.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

In-memory Evasion (2 of 4) - A Payload's Life

In-memory Evasion is a four-part mini course on the cat and mouse game related to memory detections.
more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

Malware Analysis - When De4dot fails, Deobfuscating NullShield

Decompilation fails and de4dot cannot deobfuscate this trojan spy named Evrial. We discover code in the module's constructor (.cctor)

more...
No comment yet.
Scooped by Danen Raas
Scoop.it!

How to use Quirk - Toy Quantum Circuit Simulator

Explains the basics of using Quirk ( http://algassert.com/quirk )

more...
No comment yet.