ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

273 results

DEFCONConference
DEF CON 31 - The Art of Compromising C2 Servers  A Web App Vulns Perspective - Vangelis Stykas

C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...

35:06
DEF CON 31 - The Art of Compromising C2 Servers A Web App Vulns Perspective - Vangelis Stykas

16,075 views

2 years ago

DEFCONConference
DEF CON 31 - Prototype Pollution Leads to Remote Code Execution in NodeJS -  Shcherbakov, Balliu

Many have heard about Prototype Pollution vulnerabilities in JavaScript applications. This kind of vulnerability allows an attacker ...

20:18
DEF CON 31 - Prototype Pollution Leads to Remote Code Execution in NodeJS - Shcherbakov, Balliu

3,981 views

2 years ago

DEFCONConference
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack

Remember that web application you wrote when you where first learning PHP? Ever wonder how vulnerable that code base is?

38:46
DEF CON 23 - Nemus - Hacking SQL Injection for Remote Code Execution on a LAMP Stack

8,995 views

10 years ago

DEFCONConference
DEF CON 30  - Martin Doyhenard  - Internet Server Error  - Exploiting Interprocess Communication

In this talk I will show how to reverse engineer a proprietary HTTP Server in order to leverage memory corruption vulnerabilities ...

48:26
DEF CON 30 - Martin Doyhenard - Internet Server Error - Exploiting Interprocess Communication

1,795 views

3 years ago

DEFCONConference
DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

The presented attack results in an unfixable compromise of the Starlink UT and allows us to execute arbitrary code. Obtaining root ...

35:49
DEF CON 30 - Lennert Wouters - A Black-Box Security Evaluation of SpaceX Starlink User Terminal

31,023 views

3 years ago

DEFCONConference
Omer Gull - SELECT code execution from using SQlite - DEF CON 27 Conference

Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the ...

40:56
Omer Gull - SELECT code execution from using SQlite - DEF CON 27 Conference

2,354 views

6 years ago

DEFCONConference
DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs

MS-RPC is Microsoft's implementation of the Remote Procedure Calls protocol. Even though the protocol is extremely widespread ...

45:26
DEF CON 30 - Ben Barnea, Ophir Harpaz - Exploring Ancient Ruins to Find Modern Bugs

1,349 views

3 years ago

DEFCONConference
DEF CON 29 - David Dworken - Worming through IDEs

You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...

22:49
DEF CON 29 - David Dworken - Worming through IDEs

2,150 views

4 years ago

DEFCONConference
DEF CON 29 - Seth Kintigh  - OTA remote code execution on the DEF CON 27 badge via NFMI

The DEF CON 27 badge employed an obscure form of wireless communication: Near Field Magnetic Inductance (NFMI).

47:30
DEF CON 29 - Seth Kintigh - OTA remote code execution on the DEF CON 27 badge via NFMI

1,395 views

4 years ago

DEFCONConference
DEF CON 31 - ndays are also 0days - Bohan Liu, Zheng Wang, GuanCheng Li

Chromium is not only the most popular browser in the world but also one of the most widely integrated supply chain components.

39:50
DEF CON 31 - ndays are also 0days - Bohan Liu, Zheng Wang, GuanCheng Li

783 views

2 years ago

DEFCONConference
DEF CON 31 - Apples Predicament - NSPredicate Exploitation on macOS and iOS - Austin Emmitt

This new technique allowed attackers to sidestep codesigning, ASLR, and all other mitigations to execute arbitrary code on Apple ...

34:35
DEF CON 31 - Apples Predicament - NSPredicate Exploitation on macOS and iOS - Austin Emmitt

6,423 views

2 years ago

DEFCONConference
DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop Apps

... either via feature or misconfiguration of Deep Link or Open redirect or XSS it would lead to Remote Code Execution on the OS.

44:48
DEF CON 30 - Aaditya Purani, Max Garrett - ElectroVolt - Pwning Popular Desktop Apps

2,258 views

3 years ago

CyberNews AI
Hackers Exploit Unpatched Flaw in CentreStack & Triofox | CVE-2025-11371 Exposed

A new wave of attacks has targeted CentreStack and Triofox servers using an unpatched Local File Inclusion vulnerability ...

5:12
Hackers Exploit Unpatched Flaw in CentreStack & Triofox | CVE-2025-11371 Exposed

62 views

2 months ago

DEFCONConference
DEF CON 31 - Calling it a 0 Day  -  Hacking at PBX UC Systems - good pseudonym

PBX (Private Branch Exchange) and UC (Unified Communications) servers are the big communication brokers in enterprise ...

37:23
DEF CON 31 - Calling it a 0 Day - Hacking at PBX UC Systems - good pseudonym

4,803 views

2 years ago

DEFCONConference
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

eBPF (or "extended" Berkeley Packet Filter) is a bytecode instruction set and virtual machine used as a safe computing ...

46:59
Jeff Dileo - Evil eBPF Practical Abuses of In-Kernel Bytecode Runtime- DEF CON 27 Conference

4,866 views

6 years ago

DEFCONConference
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

Techniques for transforming memory corruption primitives into arbitrary code execution exploits have evolved significantly over ...

43:09
DEF CON 23 - Daniel Selifonov - Drinking from LETHE: Exploiting Memory Corruption Vulns

3,845 views

10 years ago

DEFCONConference
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

Finally, we'll describe how to construct an exploit that achieves remote code execution without the need for memory corruption.

36:58
DEF CON 23 - Panel - Abusing Adobe Readers JavaScript APIs

3,081 views

10 years ago

DEFCONConference
DEF CON 23 - Jason Haddix - How to Shot Web:  Web and mobile hacking in 2015

2014 was a year of unprecedented participation in crowdsourced and static bug bounty programs, and 2015 looks like a ...

48:23
DEF CON 23 - Jason Haddix - How to Shot Web: Web and mobile hacking in 2015

65,792 views

10 years ago

DEFCONConference
DEF CON 29 - Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing

Openness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams.

39:38
DEF CON 29 - Kelly Kaoudis, Sick Codes - Rotten code, aging standards, & pwning IPv4 parsing

4,498 views

4 years ago

DEFCONConference
DEF CON Safe Mode - Zhipeng Huo, Chuanda Ding - Hack Windows Machines with Printer Protocol

It can be exploited both locally and remotely, escapes sandbox, executes arbitrary code, and also elevates to SYSTEM.

35:02
DEF CON Safe Mode - Zhipeng Huo, Chuanda Ding - Hack Windows Machines with Printer Protocol

6,800 views

5 years ago