CTF Field Guide Alex Sotirov, Reverse Engineering 1, Fall 2011
Category: Video
This is the ongoing video feed of the site. Anything I come across will be on this page, so the topics could go from music, to malware, to economic theory pretty darm quickly. I warned you.
Conference Video – Threat Hunting Within Organizations Andrew Case
These are the videos from B Sides Tampa 2015
Moran Cerf – Moth GrandSLAM winning story
Moran Cerf – Moth GrandSLAM winning story
Music Video – kaleidoscope – Tension
Sometimes I get bored and just start mucking around with #shotcut video editor, and things like these videos come out. This video is from me running around Chicago doing errands on a rainy day.
Conference Video – Deep Web – what to do and what not to do
Presented at the Cysinfo 9th Quarterly Meetup on 19th November 2016 at Bangalore Presentation Link
Malware TV – Automatically Extracting Obfuscated Strings from Malware
The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …
How Tech Billionaires Plan to Destroy America
A look into how the tech leaders may be using the new administration to achieve their own agenda. Looking specifically at Peter Thiel, Elon Musk, Marc Andreessen, Ben Horowitz, Brian Armstrong, and David Sacks as well as their relationship with figures like JD Vance, Balaji Srinivasan, and Curtis Yarvin. There is a focused discussion on Read More …
Conference Video – Defending Against Power Shell Attacks
Dutch Power Shell User Group – 3rd Power Shell Saturday 2017-04-08
Hacker TV – What Is An XXE Attack?
XML files can incorporate inline references to other documents. Unsafe treatment of external references allows an attacker to probe your file system for sensitive information – an XML External Entity (XXE) attack.
Backyard Chickens – Clean the Coop Again
Generally you need to do a full cleaning of your backyard coop/ run/ etc. around once every 3 months. By this, I mean the area around the chickens. The nesting boxes you have to keep much cleaner. Those I try and do about once a month. This is where you chicken is going to lay Read More …