ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

149 results

Roel Van de Paar
When to use Data Execution Prevention?

When to use Data Execution Prevention? Helpful? Please support me on Patreon: https://www.patreon.com/roelvandepaar With ...

1:37
When to use Data Execution Prevention?

19 views

4 years ago

Roel Van de Paar
Data Execution Prevention in Windows Live Messenger (2 Solutions!!)

Data Execution Prevention in Windows Live Messenger Helpful? Please support me on Patreon: ...

1:48
Data Execution Prevention in Windows Live Messenger (2 Solutions!!)

2 views

5 years ago

Roel Van de Paar
Windows 10 version 1703 Data Execution Prevention blocking EXE

Windows 10 version 1703 Data Execution Prevention blocking EXE Helpful? Please support me on Patreon: ...

1:26
Windows 10 version 1703 Data Execution Prevention blocking EXE

8 views

5 years ago

Yaksas Security
Module 3.4 (Controlling the execution): Multi-staged Windows exploit

This video is part of the course Hands-on Fuzzing and Exploit Development. In this module, we'll be learning on how to exploit ...

15:49
Module 3.4 (Controlling the execution): Multi-staged Windows exploit

57 views

4 years ago

GitLab
Creating security policies - The basics (HD)

Policies in GitLab provide security teams a way to require scans of their choice to be run whenever a project pipeline runs ...

3:07
Creating security policies - The basics (HD)

5,140 views

2 years ago

OpenSecurityTraining2
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

26:15
Day 1 Part 5: Exploits 2: Exploits in the Windows Environment

2,178 views

13 years ago

collaborate.je
Exploiting Buffer Overflows - by Paul Dutot

Workshop presented at collaborate.je Open Source Day, 11th Feb 2015 at the Digital Jersey Hub. Thanks to Paul Dutot of ...

43:55
Exploiting Buffer Overflows - by Paul Dutot

305 views

10 years ago

OpenSecurityTraining2
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

51:26
Day 2 Part 1: Exploits 2: Exploits in the Windows Environment

1,926 views

13 years ago

OpenSecurityTraining2
Day 2 Part 3: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

1:27:56
Day 2 Part 3: Exploits 2: Exploits in the Windows Environment

1,764 views

13 years ago

OpenSecurityTraining2
Day 2 Part 1: Intermediate Intel X86: Architecture, Assembly, & Applications

... as non-executable (which Microsoft calls Data Execution Prevention (DEP)), to prevent some types of exploits from succeeding.

1:47:27
Day 2 Part 1: Intermediate Intel X86: Architecture, Assembly, & Applications

6,207 views

13 years ago

DEFCONConference
DEF CON 21 - Amr Thabet - EDS Exploitation Detection System

(Transcription coming soon, sorry for the delay ) EDS: Exploitation Detection System AMR THABET MALWARE RESEARCHER, ...

45:16
DEF CON 21 - Amr Thabet - EDS Exploitation Detection System

2,695 views

12 years ago

OpenSecurityTraining2
Day 1 Part 3: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

32:18
Day 1 Part 3: Exploits 2: Exploits in the Windows Environment

2,143 views

13 years ago

DEFCONConference
DEF CON 31 - Advanced ROP Framework  Pushing ROP to Its Limits - Brizendine, Kusuma

This research provides innovative contributions to return-oriented programming (ROP), not seen before. We introduce ROP ...

45:57
DEF CON 31 - Advanced ROP Framework Pushing ROP to Its Limits - Brizendine, Kusuma

3,151 views

2 years ago

DEFCON Switzerland
Area41 2016: Matthias Ganz: ROP mitigations and Control Flow Guard - the end of code reuse attacks?

Area41 Security Conference 2016: Matthias Ganz: ROP mitigations and Control Flow Guard - the end of code reuse attacks?

46:03
Area41 2016: Matthias Ganz: ROP mitigations and Control Flow Guard - the end of code reuse attacks?

367 views

9 years ago

OpenSecurityTraining2
Day 1 Part 4: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

37:19
Day 1 Part 4: Exploits 2: Exploits in the Windows Environment

2,100 views

13 years ago

OpenSecurityTraining2
Day 1 Part 2: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

41:33
Day 1 Part 2: Exploits 2: Exploits in the Windows Environment

2,875 views

13 years ago

OpenSecurityTraining2
Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

32:06
Day 3 Part 3: Exploits 2: Exploits in the Windows Environment

1,155 views

13 years ago

OpenSecurityTraining2
Day 3 Part 1: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

49:10
Day 3 Part 1: Exploits 2: Exploits in the Windows Environment

1,649 views

13 years ago

OpenSecurityTraining2
Day 2 Part 4: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

36:59
Day 2 Part 4: Exploits 2: Exploits in the Windows Environment

1,359 views

13 years ago

OpenSecurityTraining2
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

... Oriented Programming (ROP) to defeat Data Execution Prevention (DEP) aka non-executable (NX) stack * Using libraries which ...

44:12
Day 2 Part 2: Exploits 2: Exploits in the Windows Environment

1,729 views

13 years ago