Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. This video is from me running around Chicago doing errands on a rainy day.
Category: Video
This is the ongoing video feed of the site. Anything I come across will be on this page, so the topics could go from music, to malware, to economic theory pretty darm quickly. I warned you.
Conference Video – Deep Web – what to do and what not to do
Presented at the Cysinfo 9th Quarterly Meetup on 19th November 2016 at Bangalore Presentation Link
Malware TV – Automatically Extracting Obfuscated Strings from Malware
The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …
How Tech Billionaires Plan to Destroy America
A look into how the tech leaders may be using the new administration to achieve their own agenda. Looking specifically at Peter Thiel, Elon Musk, Marc Andreessen, Ben Horowitz, Brian Armstrong, and David Sacks as well as their relationship with figures like JD Vance, Balaji Srinivasan, and Curtis Yarvin. There is a focused discussion on Read More …
Conference Video – Defending Against Power Shell Attacks
Dutch Power Shell User Group – 3rd Power Shell Saturday 2017-04-08
Hacker TV – What Is An XXE Attack?
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.
Backyard Chickens – Clean the Coop Again
Generally you need to do a full cleaning of your backyard coop/ run/ etc. around once every 3 months. By this, I mean the area around the chickens. The nesting boxes you have to keep much cleaner. Those I try and do about once a month. This is where you chicken is going to lay Read More …
Do you really need to do that Human?
On a warm spring morning, the sun rose over the Johnson family’s backyard, revealing a perfectly manicured lawn, vibrant flowerbeds, and a gleaming new vegetable patch. The yard was the pride of the family, especially Mrs. Johnson, who had spent months cultivating it. But lurking in the coop by the fence was a group of Read More …
Conference Video – Invoke-Obfuscation: PowerShell obFUsk8tion
Power Shell has increasingly become the de facto standard for penetration testers and hackers alike. It enables attackers to “live off the land” by using a Microsoft-signed binary that can execute remote code entirely in memory while bypassing both A/V and application whitelisting solutions. Today’s detection techniques monitor for certain strings in powershell.exe’s command-line arguments. Read More …
Conference Video – Win32 Exploit Development With Mona and the MSF Framework
In this talk, Corelanc0d3r and Nullthreat will walk the audience through the process of writing exploits for Win32 User Land, while elaborating on the subtleties of writing effective and reliable exploits that bypass common memory protections. Using a number of example exploits, they will demonstrate how the various functions available in mona.py, the Corelan Team Read More …