ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

196 results

DEFCONConference
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack

Remember that web application you wrote when you where first learning PHP? Ever wonder how vulnerable that code base is?

38:46
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack

8,992 views

10 years ago

DEFCONConference
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

Evolving Exploits Through Genetic Algorithms SOEN HACKER FOR TEAM VANNED This talk will discuss the next logical step ...

23:35
DEF CON 21 - Soen - Evolving Exploits Through Genetic Algorithms

4,454 views

12 years ago

MalwareAnalysisForHedgehogs
Malware Theory - Process Injection

This is an overview to common process injection techniques used by malware, including AtomBombing, Process Hollowing aka ...

9:26
Malware Theory - Process Injection

30,162 views

4 years ago

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,028 views

2 years ago

Ruslan Brilenkov
PostgreSQL Stored Procedures EXPLAINED | Step-by-step Guide In pgAdmin 4 | Intermediate SQL Tutorial

Welcome back to another intermediate-advanced SQL tutorial! Let us talk about Stored Procedures in SQL, more specifically, ...

14:08
PostgreSQL Stored Procedures EXPLAINED | Step-by-step Guide In pgAdmin 4 | Intermediate SQL Tutorial

5,330 views

1 year ago

Valigo
XSS - Vulnerability which we deserve (with English subtitles)

My talk about XSS from http://поиб.рф 2018-03-03 - security meetup in Khabarovks. Moaning and mumbling all the way.

29:14
XSS - Vulnerability which we deserve (with English subtitles)

1,580 views

7 years ago

Void Box
Anti-Cheat Has More Power Than You Do

Kernel-level anti-cheat isn't “better aim detection.” It's a signed driver living in Ring 0, watching the exact choke points cheats rely ...

11:12
Anti-Cheat Has More Power Than You Do

596 views

9 days ago

Void Box
The Ubisoft Hack Gets Way Worse When You Look Deeper

Two billion R6 Credits. Every skin unlocked. Total chaos. The Rainbow Six Siege hack was a wild glitch everyone could see—but ...

11:08
The Ubisoft Hack Gets Way Worse When You Look Deeper

480 views

5 days ago

Bald. Bearded. Builder.
Should my Services be Transient, Scoped, or Singleton?

The basics of Transient, Scoped, and Singleton .NET dependency injection lifetime scopes. This video covers the basics of each ...

3:40
Should my Services be Transient, Scoped, or Singleton?

16,254 views

1 year ago

Alex Demko
Cybersecurity Secrets: Hackers Don't Want You to Know This... 🔍

00:02:00 SQL Injection Explained 00:03:30 Cross-Site Scripting (XSS) Unveiled 🕷️ 00:05:00 DDoS Attacks: How They Work ...

21:42
Cybersecurity Secrets: Hackers Don't Want You to Know This... 🔍

124 views

3 months ago

DEFCONConference
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks

Over the years, XML has been a rich target for attackers due to flaws in its design as well as implementations. It is a tempting ...

34:31
DEF CON 23 - Fernando Arnabold - Abusing XSLT for Practical Attacks

1,667 views

10 years ago

The Tor Project
Tor Pluggable Transports Break Through Internet Censorship

While Tor Browser provides many security and privacy properties and features, not everyone around the world has the luxury to ...

1:00
Tor Pluggable Transports Break Through Internet Censorship

13,611 views

9 years ago

DEFCONConference
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

Apache Solr is a search platform used by many enterprise companies to add a full text search functionality to their websites.

16:21
Michael Stepankin - Apache Solr Injection- DEF CON 27 Conference

2,224 views

6 years ago

RaZa Fitness Fusion
Bubble Gut in Bodybuilders: Causes, Controversy, and Solutions | Raza Fitness Fusion

Bubble Gut in Bodybuilders: Causes, Controversy, and Solutions Why do modern bodybuilders like Ronnie Coleman, Kai Greene ...

0:40
Bubble Gut in Bodybuilders: Causes, Controversy, and Solutions | Raza Fitness Fusion

13,750,855 views

8 months ago

OWASP LATAM
Using OWASP NETTACKER - OWASP LATAM@Home 2021

Sam Stepanyan.

54:32
Using OWASP NETTACKER - OWASP LATAM@Home 2021

177 views

4 years ago

Chrome for Developers
JavaScript Vulnerabilities - The State of the Web

In this episode of The State of the Web, Rick and Tim talk about how insecure much of the Web really is. They talk about the ...

12:47
JavaScript Vulnerabilities - The State of the Web

28,981 views

7 years ago

Microsoft Visual Studio
Building Web APIs Part1

This is the first of a three part series where Robert is joined by Chris Woodruff who shows how to build ASP.NET Core Web APIs.

35:34
Building Web APIs Part1

23,697 views

7 years ago

weecology
SQL Databases For dplyr Users: Order Of SQL Keywords

This video is about the order of different keywords or commands in SQL. The order of commands in SQL goes in a strict order.

2:07
SQL Databases For dplyr Users: Order Of SQL Keywords

597 views

5 years ago

DEFCONConference
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

Take a look at weaknesses in Point of sale systems and the foundation of hotel key data and the Property management systems ...

44:20
DEF CON 24 - Weston Hecker - Hacking Hotel Keys and POS systems

5,524 views

9 years ago

engineerguy
Plastic Injection Molding

Bill details the key engineering principles underlying plastic injection molding. He describes its history and, then, reveals the ...

9:37
Plastic Injection Molding

4,809,619 views

10 years ago