The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …
Category: Video
This is the ongoing video feed of the site. Anything I come across will be on this page, so the topics could go from music, to malware, to economic theory pretty darm quickly. I warned you.
1bb Music VIdeo – Wind Chimes
Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. Running around Chicago doing errands on a rainy day. #shotcutvideo #collage #collagelife #weird #weirdvisualfx #kaleidoscope #kaleidoscopevideos #kaleidoscopeoflife #driving #lsd #chicago #timelapse #groceryshopping #videotour #slipstream #version #version6 #versionsix #Visualart #kaleidoscopevideos #collage #groove #kaleidoscopeart #kaleidoscopeeffect #kaleidoscopevideo #kaleidoscope Read More …
Hacker TV – Hacker Course Buffer Overflow
A first step to become a true Hacker.
21 Youtube Settings That F*ck Small Channels
Here are 21 YouTube settings that can stunt your channel’s growth
Conference Video – Why We are Not Building a Defendable Internet
In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …
Hacker TV – Kerberoasting & Attacks 101
Want to understand how Kerberos works? Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …
Why You’re Not Getting Paid
Why You’re Not Getting Paid The Streaming Money You Earned (And How To Get It) SF MusicTech 2014
Initial Experiments – Deep Groove in the Floor
Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. Running around Chicago doing errands on a rainy day. #shotcutvideo #collage #collagelife #weird #weirdvisualfx #kaleidoscope #kaleidoscopevideos #kaleidoscopeoflife #driving #lsd #chicago #timelapse #groceryshopping #videotour #slipstream #version #version6 #versionsix #kaleidoscopeart #kaleidoscopevideos #kaleidoscopeeffect #kaleidoscopeworld #kaleidoscopevideo
Conference Video – Former CIA Officer Will Teach You How to Spot a Lie
In this participatory session, you will learn how to tell when someone is lying. Really. As a former CIA Officer with more than 20 years of experience in interviewing, interrogation and polygraph examination, Susan has seen her share of truth avoiders. She has, in fact, developed behavioral screening programs that are used by the federal Read More …