Android reversing #1: APK, Smali and ADB
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
https://youtu.be/uc7eZGE07ps
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
https://youtu.be/uc7eZGE07ps
YouTube
Android reversing #1: APK, Smali and ADB
Android reverse-engineering part 1: The APK format, an introduction to Smali and using ADB
Demystifying Modern Windows Rootkits
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode.
https://youtu.be/ZASsIpdumcY
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user-mode network stack. Analysis includes common patterns seen in malware and the drawbacks that come with malware in kernel-mode rather than user-mode.
https://youtu.be/ZASsIpdumcY
YouTube
Demystifying Modern Windows Rootkits
This talk will demystify the process of writing a rootkit, moving past theory and instead walking the audience through the process of going from a driver that says "Hello World" to a driver that abuses never-before-seen hooking methods to control the user…
ATT&CK® Deep Dive: How to Detect Rootkits
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows, and macOS
Learn how to detect rootkits and identify activities for threat hunts and alert investigations
Get insights into how you can use the ATT&CK framework to shore up your vulnerabilities
Address your visibility requirements so you can configure preventative and detection controls
Rootkits exist at the lowest levels of an operating system, offering adversaries stealthy, persistent, and comprehensive control over an infected machine. Since this kind of malicious software often resides beneath the application layer of the operating system in a highly privileged piece of software called the kernel, it can be difficult to observe, let alone detect.
https://youtu.be/Kmq9TFXdkg4
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows, and macOS
Learn how to detect rootkits and identify activities for threat hunts and alert investigations
Get insights into how you can use the ATT&CK framework to shore up your vulnerabilities
Address your visibility requirements so you can configure preventative and detection controls
Rootkits exist at the lowest levels of an operating system, offering adversaries stealthy, persistent, and comprehensive control over an infected machine. Since this kind of malicious software often resides beneath the application layer of the operating system in a highly privileged piece of software called the kernel, it can be difficult to observe, let alone detect.
https://youtu.be/Kmq9TFXdkg4
YouTube
ATT&CK® Deep Dive: How to Detect Rootkits
Immerse yourself in the world of rootkits—a potent and obscure variety of malware that’s as attractive to adversaries as it is elusive to defenders.
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows…
Get the rootkit definition, explore different types of rootkits, and see how they manifest on Linux, Windows…
Hacking Digital Outdoor on Hong Kong - Red Team Physical Attack
Hackeando Outdoor Digital em Hong Kong - Red Team Attack Fisico.
https://youtu.be/-giVfEF1RD0
Hackeando Outdoor Digital em Hong Kong - Red Team Attack Fisico.
https://youtu.be/-giVfEF1RD0
Forwarded from SHELL SHOCK
Udemy
Python para no matemáticos: De 0 hasta reconocimiento facial
Forwarded from @Phantasm_Lab ([L]uth1er)
Forwarded from Red Team Alerts
Exploiting misconfigured OAuth to takeover accounts
https://infosecwriteups.com/exploiting-misconfigured-oauth-to-takeover-accounts-225a367bca43
https://infosecwriteups.com/exploiting-misconfigured-oauth-to-takeover-accounts-225a367bca43
Medium
Exploiting misconfigured OAuth to takeover accounts
Hi, in this writeup I will talk about two misconfigured OAuth flaws I found while looking for bugs, without further ado let’s begin.