CNN - Series Originals: A Republica Hackeada
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
https://youtu.be/edjznNDHf74
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
https://youtu.be/edjznNDHf74
YouTube
Exclusivo: Lava Jato queria prender Gilmar Mendes e Toffoli, diz hacker à CNN
O hacker Walter Delgatti Neto afirmou, em entrevista exclusiva ao CNN Séries Originais, que a Operação Lava Jato tinha por objetivo prender os ministros do Supremo Tribunal Federal Dias Toffoli e Gilmar Mendes. #CNNBrasil
Inscreva-se no canal da CNN Brasil…
Inscreva-se no canal da CNN Brasil…
Introduction to AWS Services
This video gives the complete overview of various AWS services by designing a sample Application. Ideal for those who are new to AWS and those who want to understand where particular AWS service fits into a sample application architecture
https://youtu.be/Z3SYDTMP3ME
This video gives the complete overview of various AWS services by designing a sample Application. Ideal for those who are new to AWS and those who want to understand where particular AWS service fits into a sample application architecture
https://youtu.be/Z3SYDTMP3ME
YouTube
Introduction to AWS Services
[2024 version has been released - please check here on this channel]
This video is part of my AWS Cerfified Cloud Practitioner course on Udemy: https://www.udemy.com/course/aws-certified-cloud-practitioner-clf-c02-latest/?referralCode=E4E802AB0D47D58AC70A…
This video is part of my AWS Cerfified Cloud Practitioner course on Udemy: https://www.udemy.com/course/aws-certified-cloud-practitioner-clf-c02-latest/?referralCode=E4E802AB0D47D58AC70A…
The Most Important AWS Services That You NEED To Learn!
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB, and many more!
https://youtu.be/B08iQQhXG1Y
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB, and many more!
https://youtu.be/B08iQQhXG1Y
YouTube
The Most Important AWS Core Services That You NEED To Know About!
If you're looking to understand the wide variety of AWS services, this is the video for you. In this video, I explain to you the core AWS services through an easy to follow example. We explore services such as Amazon S3, AWS Lambda, Amazon RDS, DynamoDB,…
[Exploit] - Impropper Access Control - Arbitrary File Download + IDOR (0day Vulnerability) MEC
I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.
https://youtu.be/yOzoIGJJqvk
I found a IDOR Lead to Arbitrary File Download in a subdomain of the mec.gov.br, with this vulnerability we can generate random id and request to the server to discovery sensitive files, with this vulnerability it's possible to access, bidding for works,PDF Files sent via emails, information about City's of the country.
https://youtu.be/yOzoIGJJqvk
Forwarded from SHELL SHOCK
https://www.udemy.com/course/digital-forensics-zero-to-hero-computer-forensics/?couponCode=FORENSICS
Udemy
Online Courses - Learn Anything, On Your Schedule | Udemy
Udemy is an online learning and teaching marketplace with over 250,000 courses and 73 million students. Learn programming, marketing, data science and more.
CYBER SECURITY KILL CHAIN / LIFE CYCLE
A Cyber Security Kill Chain framework is developed by Lockheed Martin which applies to Cyber Security and is part of the Intelligence Driven Defense model for identification and prevention of cyber intrusions activity.
https://hacklido.com/blog/30-cyber-security-kill-chain-life-cycle
A Cyber Security Kill Chain framework is developed by Lockheed Martin which applies to Cyber Security and is part of the Intelligence Driven Defense model for identification and prevention of cyber intrusions activity.
https://hacklido.com/blog/30-cyber-security-kill-chain-life-cycle
Router Firmware Hacking - Extraction
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router to give commands. Analysing routers gives an insight into potential vulnerabilities held by router firmware.
https://youtu.be/tmnvJe-TkJQ
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router to give commands. Analysing routers gives an insight into potential vulnerabilities held by router firmware.
https://youtu.be/tmnvJe-TkJQ
YouTube
Router Firmware Hacking - Extraction
This video outlines various ways routers compress their firmware. Firmware will have all the files needed for the routers operating system and applications. Things such as a web server so a user can interact with the router and telnet to connect to the router…
Simple Firmware Reverse Engineering
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
https://youtu.be/oqk3cU7ekag
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
https://youtu.be/oqk3cU7ekag
YouTube
Simple Firmware Reverse Engineering
Getting access to and examining firmware is easier than you think and it gives some really good insight into how things work. It's never been easier to get started.
Hope you enjoyed the video!
Join my Discord server to chat with me:
https://discord.gg/engineerman…
Hope you enjoyed the video!
Join my Discord server to chat with me:
https://discord.gg/engineerman…
Introduction to Firmware Reversing
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
https://youtu.be/GIU4yJn2-2A
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
https://youtu.be/GIU4yJn2-2A
YouTube
Introduction to Firmware Reversing
To help explain how attackers reverse engineer device firmware, this walkthrough takes a piece of firmware from a binary file to an extracted file system you can explore on your own. For more information check out
http://1585security.com/Firmware-Reversing…
http://1585security.com/Firmware-Reversing…
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware
Over the last few years, as the world has moved closer to realizing the idea of the Internet of Things, an increasing amount of the things with which we interact every day have been replaced with embedded devices. These include previously non-electronic devices, such as locks, light switches, and utility meters (such as electric meters and water meters), as well as increasingly more complex and ubiquitous devices, such as network routers and printers. Other devices are becoming increasingly intelligent as well. Modern printers and cameras include complex social media functionality, smart televisions are increasingly including Internet-based entertainment options, and even previously-simple devices, such as watches and glasses are being augmented with complex embedded components.
https://youtu.be/Fi_S2F7ud_g
Over the last few years, as the world has moved closer to realizing the idea of the Internet of Things, an increasing amount of the things with which we interact every day have been replaced with embedded devices. These include previously non-electronic devices, such as locks, light switches, and utility meters (such as electric meters and water meters), as well as increasingly more complex and ubiquitous devices, such as network routers and printers. Other devices are becoming increasingly intelligent as well. Modern printers and cameras include complex social media functionality, smart televisions are increasingly including Internet-based entertainment options, and even previously-simple devices, such as watches and glasses are being augmented with complex embedded components.
https://youtu.be/Fi_S2F7ud_g
YouTube
Using Static Binary Analysis To Find Vulnerabilities And Backdoors In Firmware
by Christopher Kruegel & Yan Shoshitaishvili
Over the last few years, as the world has moved closer to realizing the idea of the Internet of Things, an increasing amount of the things with which we interact every day have been replaced with embedded devices.…
Over the last few years, as the world has moved closer to realizing the idea of the Internet of Things, an increasing amount of the things with which we interact every day have been replaced with embedded devices.…
[DEFCON 20] Embedded device firmware vulnerability hunting using FRAK
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
https://youtu.be/k9nC8wYVhoU
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
https://youtu.be/k9nC8wYVhoU
YouTube
[DEFCON 20] Embedded device firmware vulnerability hunting using FRAK
Embedded Device Firmware Vulnerability Hunting Using FRAK, the Firmware Reverse Analysis Konsole
Ang Cui - Red Balloon Security
We present FRAK, the firmware reverse analysis konsole. FRAK is a framework for unpacking, analyzing, modifying and repacking…
Ang Cui - Red Balloon Security
We present FRAK, the firmware reverse analysis konsole. FRAK is a framework for unpacking, analyzing, modifying and repacking…
36C3 - Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale
https://youtu.be/nynW9LP0njY
https://youtu.be/nynW9LP0njY
YouTube
36C3 - Identifying Multi-Binary Vulnerabilities in Embedded Firmware at Scale - deutsche Übersetzun
https://media.ccc.de/v/36c3-10891-identifying_multi-binary_vulnerabilities_in_embedded_firmware_at_scale
Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of…
Low-power, single-purpose embedded devices (e.g., routers and IoT devices) have become ubiquitous. While they automate and simplify many aspects of…
#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware code looks like original
https://youtu.be/rK0tmVa19ME
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware code looks like original
https://youtu.be/rK0tmVa19ME
YouTube
#Eko2020 Main Track | Static analysis-based recovery of service function calls in UEFI firmware
Reversing #UEFI firmware requires a lot of background and knowledge about #firmware and understanding of #hardware before you can start hunting for vulnerabilities. With our new tool, we automatically recover services calls and EFI type info, so that a firmware…
Introduction to IoT Reversing Firmware
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
https://youtu.be/pHSDeCszNvU
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
https://youtu.be/pHSDeCszNvU
YouTube
Introduction to IoT Reversing Firmware | Payatu | Arun Magesh
#IoT #Firmware #infosec
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
***************************************
STAY TUNED:…
In this webinar, we talked about how to get started with IoT pentesting and hands-on approach for firmware reversing and finding bugs on the classic router and other gateways.
***************************************
STAY TUNED:…