Dark Future

My latest music video for “Dark Future” is out now, offering a unique visual journey that parallels the song’s genesis. This track was born from a deep dive into the world of future bass, specifically inspired by the insightful techniques and concepts explored in the Native Instruments blog series on how to craft the genre. Read More …

hacker TV – Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …

1bb Music VIdeo – Wind Chimes

Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. Running around Chicago doing errands on a rainy day. #shotcutvideo #collage #collagelife #weird #weirdvisualfx #kaleidoscope #kaleidoscopevideos #kaleidoscopeoflife #driving #lsd #chicago #timelapse #groceryshopping #videotour #slipstream #version #version6 #versionsix #Visualart #kaleidoscopevideos #collage #groove #kaleidoscopeart #kaleidoscopeeffect #kaleidoscopevideo #kaleidoscope Read More …

Conference Video – Why We are Not Building a Defendable Internet

In IT security, offensive problems are technical – but most defensive problems are political and organisational. Attackers have the luxury to focus only on the technical aspects of their work, while defenders have to navigate complex political and regulatory environments. In a previous talk (“Rearchitecting a defendable internet”) I discussed what technical measures would yield Read More …

Hacker TV – Kerberoasting & Attacks 101

Want to understand how Kerberos works?  Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …