Upload date
All time
Last hour
Today
This week
This month
This year
Type
All
Video
Channel
Playlist
Movie
Duration
Short (< 4 minutes)
Medium (4-20 minutes)
Long (> 20 minutes)
Sort by
Relevance
Rating
View count
Features
HD
Subtitles/CC
Creative Commons
3D
Live
4K
360°
VR180
HDR
273 results
C2 servers of mobile and Windows malware are usually left to their own fate after they have been discovered and the malware is ...
16,075 views
2 years ago
Many have heard about Prototype Pollution vulnerabilities in JavaScript applications. This kind of vulnerability allows an attacker ...
3,981 views
Remember that web application you wrote when you where first learning PHP? Ever wonder how vulnerable that code base is?
8,995 views
10 years ago
In this talk I will show how to reverse engineer a proprietary HTTP Server in order to leverage memory corruption vulnerabilities ...
1,795 views
3 years ago
The presented attack results in an unfixable compromise of the Starlink UT and allows us to execute arbitrary code. Obtaining root ...
31,023 views
Everyone knows that databases are the crown jewels from a hacker's point of view, but what if you could use a database as the ...
2,354 views
6 years ago
MS-RPC is Microsoft's implementation of the Remote Procedure Calls protocol. Even though the protocol is extremely widespread ...
1,349 views
You might think that as long as you never hit run, opening up that interesting new POC in your IDE and checking out the code is ...
2,150 views
4 years ago
The DEF CON 27 badge employed an obscure form of wireless communication: Near Field Magnetic Inductance (NFMI).
1,395 views
Chromium is not only the most popular browser in the world but also one of the most widely integrated supply chain components.
783 views
This new technique allowed attackers to sidestep codesigning, ASLR, and all other mitigations to execute arbitrary code on Apple ...
6,423 views
... either via feature or misconfiguration of Deep Link or Open redirect or XSS it would lead to Remote Code Execution on the OS.
2,258 views
A new wave of attacks has targeted CentreStack and Triofox servers using an unpatched Local File Inclusion vulnerability ...
62 views
2 months ago
PBX (Private Branch Exchange) and UC (Unified Communications) servers are the big communication brokers in enterprise ...
4,803 views
eBPF (or "extended" Berkeley Packet Filter) is a bytecode instruction set and virtual machine used as a safe computing ...
4,866 views
Techniques for transforming memory corruption primitives into arbitrary code execution exploits have evolved significantly over ...
3,845 views
Finally, we'll describe how to construct an exploit that achieves remote code execution without the need for memory corruption.
3,081 views
2014 was a year of unprecedented participation in crowdsourced and static bug bounty programs, and 2015 looks like a ...
65,792 views
Openness to responsibly disclosed external vulnerability research is crucial for modern software maintainers and security teams.
4,498 views
It can be exploited both locally and remotely, escapes sandbox, executes arbitrary code, and also elevates to SYSTEM.
6,800 views
5 years ago