ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

1,206 results

Ring Zero Labs
Ring Ø Labs - Story Time With DEP (Data Execution Prevention)

Ring Ø Labs: https://RingZeroLabs.com How do you get started in #Malware Analysis and #ReverseEngineering? First, you need ...

24:23
Ring Ø Labs - Story Time With DEP (Data Execution Prevention)

467 views

8 years ago

Black Hat
The Beast is in Your Memory

... executable to bypass data execution prevention (DEP). As a consequence, several new control-flow integrity (CFI) mechanisms ...

55:03
The Beast is in Your Memory

1,041 views

10 years ago

In Marketing We Trust
AI-Powered SEO with Botify: Automation in Prevention, Execution, and Implementation at Scale

In this joint webinar with Botify and In Marketing We Trust learn how to automate common and complex SEO tasks to free up your ...

1:18:09
AI-Powered SEO with Botify: Automation in Prevention, Execution, and Implementation at Scale

596 views

3 years ago

RISC-V International
RISC-V Technical Session | Dorami: Privilege Separating Security Monitor on RISC-V TEEs

TEE implementations on RISC-V use a security monitor (SM) for enclave isolation, employing privileged ISA instructions for ...

1:04:04
RISC-V Technical Session | Dorami: Privilege Separating Security Monitor on RISC-V TEEs

676 views

1 year ago

Black Hat
Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge

Address Space Layout Randomization(ASLR) and Data Execution Prevention (DEP) and Control Flow Guard (CFG) are default ...

35:20
Cross the Wall - Bypass All Modern Mitigations of Microsoft Edge

623 views

6 years ago

HackerOne
All Your (Data)base Are Belong To Us | @spaceraccoon

Getting Started in Vulnerability Research with Code Execution Bugs in Office Applications Modern office applications support a ...

24:24
All Your (Data)base Are Belong To Us | @spaceraccoon

1,606 views

4 years ago

CyberSecurity
5.3 Symantec DLP 15 5 Enhancing Data Loss Prevention with Integrations

Welcome to the enhancing data loss prevention with integrations module of the semantic data loss prevention 15.5 administration ...

1:02:38
5.3 Symantec DLP 15 5 Enhancing Data Loss Prevention with Integrations

471 views

4 years ago

SANS Offensive Operations
SANS Pen Test: Webcast - Utilizing ROP on Windows 10 | A Taste of SANS SEC660

... we will take a look at utilizing Return Oriented Programming (ROP) to disable Data Execution Prevention (DEP) on Windows 10.

1:03:57
SANS Pen Test: Webcast - Utilizing ROP on Windows 10 | A Taste of SANS SEC660

12,836 views

10 years ago

TalksDump
[DEFCON 21] EMET 4.0 PKI Mitigation

EMET 4.0 PKI Mitigation Speaker: Neil Sikka - Software Security Engineer, Microsoft Microsoft EMET is a free Mitigation tool.

38:58
[DEFCON 21] EMET 4.0 PKI Mitigation

257 views

11 years ago

USENIX
USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks

Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks Stefano Cristalli and Mattia Pagnozzi, University of ...

29:46
USENIX Security '16 - Micro-Virtualization Memory Tracing to Detect and Prevent Spraying Attacks

54 views

4 years ago

Off By One Security
Modern Windows Binary Patch Diffing!

In this video we look at some of the most effective ways to examine a Microsoft security patch to identify the vulnerability being ...

1:03:27
Modern Windows Binary Patch Diffing!

2,371 views

2 years ago

Muhammad Burhanullah
legolas Assessment

This must be done with Data Execution Prevention, Stack-Smashing protection, and Address Space Layout Randomization ...

25:57
legolas Assessment

296 views

2 years ago

Ryan & Matt Data Science
Scale Your n8n Workflows with Sub-Workflows + Parallel Executions

Don't miss out! Get FREE access to my Skool community — packed with resources, tools, and support to help you with Data, ...

21:22
Scale Your n8n Workflows with Sub-Workflows + Parallel Executions

1,563 views

2 months ago

Microsoft Security Response Center (MSRC)
BlueHat v18 || DEP for the app layer - Time for app sec to grow up

... Nothing in the security industry has moved the needle like Data Execution Prevention and it's sister protections like ASLR.

37:53
BlueHat v18 || DEP for the app layer - Time for app sec to grow up

474 views

7 years ago

Blackhawk-Technical-College-IT-Web-Software-Developer
Microsoft SDL Unit14 - Compiler Defenses (Level 300)

Read all right next let's talk about Hardware enforced data execution prevention also known as/ NX compat Hardware enforced ...

24:23
Microsoft SDL Unit14 - Compiler Defenses (Level 300)

162 views

10 years ago

Sam Bowne
CNIT 127: Ch 14: Protection Mechanisms

A college lecture at City College San Francisco. Based on "The Shellcoder's Handbook: Discovering and Exploiting Security ...

57:46
CNIT 127: Ch 14: Protection Mechanisms

320 views

7 years ago

Abdullah
Heap Analysis and Use-After-Free Vulnerability Case Study

All the credit to the amazing team at @shellmatesclub6687, and especially for Hafidh for presenting this talk. Shellmates YT ...

44:08
Heap Analysis and Use-After-Free Vulnerability Case Study

402 views

3 years ago

Business Infopro
Data protection trends and best practices to implement today

Data protection trends and best practices to implement today.

31:29
Data protection trends and best practices to implement today

9 views

11 months ago

OpenSecurityTraining2
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

51:26
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

1,926 views

13 years ago

Business Infopro
Data protection trends and best practices to implement today
31:29
Data protection trends and best practices to implement today

18 views

1 year ago