A first step to become a true Hacker.
Category: InforSecTV
This is the main page for the video channels I will build under this
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Month of AI Video – Hacking AI Infrastructure Providers for Fun
An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …
Conference Video – Former CIA Officer Will Teach You How to Spot a Lie
In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …
Malware TV – Reverse Engineering
CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Month of AI Video – Practical LLM Security
Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …
Conference Video – Threat Hunting Within Organizations Andrew Case
These are the videos from B Sides Tampa 2015
Moran Cerf – Moth GrandSLAM winning story
Moran Cerf – Moth GrandSLAM winning story
Conference Video – Deep Web – what to do and what not to do
Presented at the Cysinfo 9th Quarterly Meetup on 19th November 2016 at Bangalore Presentation Link