Hacker TV – How I Would Learn Cyber Security If I Could Start Over

How I Would Learn Cyber Security If I Could Start Over Want to learn all about cyber-security and become an ethical hacker? His thoughts on the basics and fundamentals is so right on.  Networking, User or Desktop support, Server maintenance, whatever.  I firmly believe that the best security people started in IT originally.  Experience on Read More …

LLM Vulnerability Scanning with Garrick

This video provides a tutorial on using Garrick, a large language model vulnerability scanner, to test custom chat bots. Garrick employs probes (test cases) and detectors to identify vulnerabilities, drawing from a large, constantly updated probe library. The tutorial focuses on testing a simple chat application called Wy chat, which utilizes Llama 3 and the Read More …

Hacker TV – Start Web App Pentesting

Looking to step up your web app pentesting and bug bounty skills? In this video, Alex from TCM Security walks you through some of the best FREE tools and resources to help you sharpen your AppSec knowledge and techniques. Whether you’re just starting out or looking to boost your skill set, these tools are must-haves!

hacker TV – Understanding buffer overflow exploitation

The fascinating interplay of CPU, stack, C-compiler and shellcode in a nutshell Everything started with Aleph One’s paper “Smashing the Stack for Fun and Profit”. These techniques are still the basis for modern exploitation of buffer, heap and format string vulnerabilities. We will give a swift overview about C functions, stack usage, assembler, gcc, gdb Read More …

Hacker TV – Kerberoasting & Attacks 101

Want to understand how Kerberos works?  Would you like to understand modern Kerberos attacks? Tim Medin walks you through how to attack Kerberos with ticket attacks and Kerberoasting. He covers the basics of Kerberos authentication and then shows you how the trust model can be exploited for persistence, pivoting, and privilege escalation. At the conclusion, Read More …

Month of AI Video – Hacking AI Infrastructure Providers for Fun

An increasing number of companies are adopting AI-as-a-Service solutions to collaborate, train, and operate their artificial intelligence applications. From emerging AI startups like Hugging Face and Replicate to established cloud providers such as Microsoft Azure and SAP, thousands of customers place their trust in these services, relying on them to handle their proprietary models and Read More …

Month of AI Video – Practical LLM Security

Practical LLM Security As large language models (LLMs) become increasingly integrated into various applications, the security standards for these integrations have not kept pace. Much of the current security research tends to focus on either 1) the social harms and biases associated with LLMs, along with content moderation issues, or 2) the LLMs themselves, often Read More …

Malware TV – Automatically Extracting Obfuscated Strings from Malware

The FireEye Labs Obfuscated String Solver (FLOSS) is an open-source tool that automatically detects, extracts, and decodes obfuscated strings in Windows Portable Executable (PE) files. Malware analysts, forensic investigators, and incident responders can use FLOSS to quickly extract sensitive strings to identify indicators of compromise (IOCs). Malware authors encode strings in their programs to hide Read More …