_    ___ ___      _                               
/ \ |_ _/ _ \ ___| |_ _ __ ___ __ _ _ __ ___ ___
/ _ \ | | | | / __| __| '__/ _ \/ _` | '_ ` _ \/ __|
/ ___ \ | | |_| \__ \ |_| | | __/ (_| | | | | | \__ \
/_/ \_\___\___/|___/\__|_| \___|\__,_|_| |_| |_|___/
Twitch
Invidious (YT)

Invidious > Channel > HackersOnBoard

Trending
HackersOnBoard 71600 subscribers    RSS
View channel on YouTube
Videos
Playlists

YT 46 minutes 55 seconds
HackersOnBoard
Black Hat USA 2016 Secure Penetration Testing Operations Demonstrated Weaknesses in...
YT 51 minutes 57 seconds
HackersOnBoard
Black Hat USA 2016 Using EMET to Disable EMET
YT 50 minutes 29 seconds
HackersOnBoard
Black Hat USA 2016 Using An Expanded Cyber Kill Chain Model to Increase Attack Resiliency
YT 51 minutes 13 seconds
HackersOnBoard
Black Hat USA 2016 HTTP 2 & Quic - Teaching Good Protocols to Do Bad Things
YT 50 minutes 27 seconds
HackersOnBoard
Black Hat USA 2016 Breaking Kernel Address Space Layout Randomization KASLR With Intel TSX
YT 31 minutes 58 seconds
HackersOnBoard
Black Hat USA 2016 Access Keys Will Kill You Before You Kill the Password
YT 25 minutes 38 seconds
HackersOnBoard
Black Hat USA 2016 Brute Forcing Lockdown Harddrive Pin Codes
YT 53 minutes 23 seconds
HackersOnBoard
Black Hat USA 2016 Xenpwn Breaking Paravirtualized Devices
YT 48 minutes 18 seconds
HackersOnBoard
Black Hat USA 2016 A Journey From JNDI LDAP Manipulation to Remote Code Execution Dream Land
YT 28 minutes 19 seconds
HackersOnBoard
Black Hat USA 2016 An Inconvenient Trust User Attitudes Toward Security and Usability Tradeoffs
YT 25 minutes 54 seconds
HackersOnBoard
Black Hat USA 2016 A Lightbulb Worm
YT 30 minutes 36 seconds
HackersOnBoard
Black Hat USA 2016 An AI Approach to Malware Similarity Analysis Mapping the Malware Genome
YT 50 minutes 47 seconds
HackersOnBoard
Black Hat USA 2016 A Retrospective on the Use of Export Cryptography
YT 44 minutes 38 seconds
HackersOnBoard
Black Hat USA 2016 AirBnBeware Short Term Rentals Long Term Pwnage
YT 49 minutes 9 seconds
HackersOnBoard
Black Hat USA 2016 Hell on Earth From Browser to System Compromise
YT 23 minutes 49 seconds
HackersOnBoard
Black Hat USA 2016 Side Channel Attacks on Everyday Applications
YT 50 minutes 51 seconds
HackersOnBoard
Black Hat USA 2016 An Insider's Guide to Cyber Insurance and Security Guarantees
YT 34 minutes 58 seconds
HackersOnBoard
Black Hat USA 2016 Account Jumping Post Infection Persistency & Lateral Movement in AWS
YT 43 minutes 10 seconds
HackersOnBoard
Black Hat USA 2016 The Tao of Hardware the Te of Implants
YT 46 minutes 35 seconds
HackersOnBoard
Black Hat USA 2016 AMSI How Windows 10 Plans to Stop Script Based Attacks and How Well It Does It
YT 49 minutes 49 seconds
HackersOnBoard
Black Hat USA 2016 Breaking Payment Points of Interaction POI
YT 38 minutes 21 seconds
HackersOnBoard
Black Hat USA 2016 Breaking FIDO Are Exploits in There
YT 50 minutes 8 seconds
HackersOnBoard
Black Hat USA 2016 Advanced CAN Injection Techniques for Vehicle Networks
YT 28 minutes 21 seconds
HackersOnBoard
Black Hat USA 2016 Security Through Design - Making Security Better By Designing for People
YT 47 minutes 19 seconds
HackersOnBoard
Black Hat USA 2016 1000 Ways to Die in Mobile Oauth
YT 43 minutes 8 seconds
HackersOnBoard
Black Hat USA 2016 Abusing Bleeding Edge Web Standards for Appsec Glory
YT 49 minutes 27 seconds
HackersOnBoard
Black Hat USA 2016 Breaking Hardware Enforced Security With Hypervisors
YT 51 minutes 13 seconds
HackersOnBoard
Black Hat USA 2016 Analysis of the Attack Surface of Windows 10 Virtualization Based Security
YT 24 minutes 59 seconds
HackersOnBoard
Black Hat USA 2016 Pindemonium A DBI Based Generic Unpacker for Windows Executable
YT 46 minutes 53 seconds
HackersOnBoard
Black Hat USA 2016 Pangu 9 Internals
YT 26 minutes 47 seconds
HackersOnBoard
Black Hat USA 2016 Blunting the Phisher's Spear A Risk Based Approach
YT 48 minutes 10 seconds
HackersOnBoard
Black Hat USA 2016 Capturing 0Day Exploits With Perfectly Placed Hardware Traps
YT 28 minutes 19 seconds
HackersOnBoard
Black Hat USA 2016 I Came to Drop Bombs Auditing the Compression Algorithm Weapon Cache
YT 34 minutes 14 seconds
HackersOnBoard
Black Hat USA 2016 Viral Video - Exploiting SSRF in Video Converters
YT 52 minutes 55 seconds
HackersOnBoard
Black Hat USA 2016 The Art of Defense: How Vulnerabilities Help Shape Security Features and...
YT 33 minutes 4 seconds
HackersOnBoard
Black Hat USA 2016 Hacking Next Gen ATMs From Capture to Cashout
YT 52 minutes 24 seconds
HackersOnBoard
Black Hat USA 2016 Defense At Hyperscale Technologies and Policies for a Defensible Cyberspace
YT 47 minutes 44 seconds
HackersOnBoard
Black Hat USA 2016 DPTrace Dual Purpose Trace for Exploitability Analysis of Program Crashes
YT 52 minutes 42 seconds
HackersOnBoard
Black Hat USA 2016 Call Me Gathering Threat Intelligence on Telephony Scams to Detect Fraud
YT 35 minutes 24 seconds
HackersOnBoard
Black Hat USA 2016 Building Trust & Enabling Innovation for Voice Enabled IoT
YT 49 minutes 47 seconds
HackersOnBoard
Black Hat USA 2016 Pwnie Awards 2016
YT 18 minutes 14 seconds
HackersOnBoard
Black Hat USA 2016 The Risk From Power Lines How to Sniff the G3 & Prime Data & Detect the...
YT 49 minutes 53 seconds
HackersOnBoard
Black Hat USA 2016 Measuring Adversary Costs to Exploit Commercial Software
YT 37 minutes 58 seconds
HackersOnBoard
Black Hat USA 2016 Design Approaches for Security Automation
YT 48 minutes 11 seconds
HackersOnBoard
Black Hat USA 2016 SGX Secure Enclaves in Practice Security and Crypto Review
YT 50 minutes 15 seconds
HackersOnBoard
Black Hat USA 2016 The Beast Within - Evading Dynamic Malware Analysis Using Microsoft COM
YT 54 minutes 5 seconds
HackersOnBoard
Black Hat USA 2016 Subverting Apple Graphics Practical Approaches to Remotely Gaining Root
YT 51 minutes 44 seconds
HackersOnBoard
Black Hat USA 2016 Iran's Soft War for Internet Dominance
YT 51 minutes 56 seconds
HackersOnBoard
Black Hat USA 2016 Investigating DDOS Architecture Actors and Attribution
YT 1 hour 12 minutes 49 seconds
HackersOnBoard
Black Hat USA 2016 Keynote The Hidden Architecture of our Time Why This Internet Worked
YT 49 minutes 28 seconds
HackersOnBoard
Black Hat USA 2016 Horse Pill A New Type of Linux Rootkit
YT 49 minutes 33 seconds
HackersOnBoard
Black Hat USA 2016 HEIST HTTP Encrypted Information can be Stolen Through TCP Windows
YT 49 minutes 14 seconds
HackersOnBoard
Black Hat USA 2016 The Remote Malicious Butler Did It!
YT 39 minutes 40 seconds
HackersOnBoard
Black Hat USA 2016 Gattacking Bluetooth Smart Devices - Introducing a New BLE Proxy Tool
YT 37 minutes 43 seconds
HackersOnBoard
Black Hat USA 2016 PLC Blaster A Worm Living Solely in the PLC
YT 38 minutes 31 seconds
HackersOnBoard
Black Hat USA 2016 Bad for Enterprise Attacking BYOD Enterprise Mobile Security Solutions
YT 45 minutes 42 seconds
HackersOnBoard
Black Hat USA 2016 GreatFET Making GoodFET Great Again
YT 51 minutes 33 seconds
HackersOnBoard
Black Hat USA 2016 Intra-Process Memory Protection for App on ARM & X86 Leveraging the ELF ABI
YT 38 minutes 43 seconds
HackersOnBoard
Black Hat USA 2016 TCP Injection Attacks in the Wild: a Large Scale Study
YT 41 minutes 38 seconds
HackersOnBoard
Black Hat USA 2016 Discovering and Exploiting Novel Security Vulnerabilities in Apple ZeroConf
YT 23 minutes 46 seconds
HackersOnBoard
Black Hat USA 2016 Dangerous Hare Hanging Attribute References Hazards Due to Vendor Customization
YT 27 minutes 59 seconds
HackersOnBoard
Black Hat USA 2016 AVLeak Fingerprinting Antivirus Emulators for Advanced Malware Evasion
YT 42 minutes 25 seconds
HackersOnBoard
Black Hat USA 2016 Recover a RSA Private Key From a TLS Session With Perfect Forward Secrecy
YT 46 minutes 59 seconds
HackersOnBoard
Black Hat USA 2016 When Governments Attack State Sponsored Malware Attacks Against Activists Lawyers
YT 52 minutes 44 seconds
HackersOnBoard
Black Hat USA 2016 VoIP Wars the Phreakers Awaken
YT 43 minutes 10 seconds
HackersOnBoard
Black Hat USA 2016 Exploiting Curiosity and Context How to Make People Click on a Dangerous Link
YT 31 minutes 1 second
HackersOnBoard
Black Hat USA 2016 Unleash the Infection Monkey A Modern Alternative to Pen Tests
YT 46 minutes 12 seconds
HackersOnBoard
Black Hat USA 2016 HTTP Cookie Hijacking in the Wild Security and Privacy Implications
YT 47 minutes 24 seconds
HackersOnBoard
Black Hat USA 2016 Adaptive Kernel Live Patching An Open Collaborative Effort
YT 49 minutes 40 seconds
HackersOnBoard
Black Hat USA 2016 Towards a Holistic Approach in Building Intelligence to Fight Crimeware
YT 48 minutes 36 seconds
HackersOnBoard
Black Hat USA 2016 Pwning Your Java Messaging With Deserialization Vulnerabilities
YT 21 minutes 55 seconds
HackersOnBoard
Black Hat USA 2016 Dungeons Dragons and Security
YT 25 minutes 49 seconds
HackersOnBoard
Black Hat USA 2016 Certificate Bypass Hiding & Executing Malware from a Digitally Signed Executable
YT 55 minutes 14 seconds
HackersOnBoard
Black Hat USA 2016 Crumbling the Supercookie and Other Ways the FCC Protects Your Internet Traffic
YT 1 hour 40 minutes 30 seconds
HackersOnBoard
Black Hat USA 2016 Panel Removing Roadblocks to Diversity
YT 46 minutes 15 seconds
HackersOnBoard
Black Hat USA 2016 Hardening AWS Environments and Automating Incident Response for AWS Compromises
YT 28 minutes 35 seconds
HackersOnBoard
Black Hat USA 2016 Cyber War in Perspective Analysis From the Crisis in Ukraine
YT 43 minutes 46 seconds
HackersOnBoard
Black Hat USA 2016 Crippling HTTPs With Unholy PAC
YT 49 minutes 49 seconds
HackersOnBoard
Black Hat USA 2016 Hackproofing Oracle Ebusiness Suite
YT 23 minutes 39 seconds
HackersOnBoard
Black Hat USA 2016 Keystone Engine Next Generation Assembler Framework
YT 31 minutes 5 seconds
HackersOnBoard
Black Hat USA 2016 Watching Commodity Malware Get Sold to a Targeted Actor
YT 49 minutes 22 seconds
HackersOnBoard
Black Hat USA 2016 Nonce Disrespecting Adversaries Practical Forgery Attacks on GCM in TLS
YT 24 minutes 50 seconds
HackersOnBoard
Black Hat USA 2016 BadWPAD
YT 51 minutes 44 seconds
HackersOnBoard
Black Hat USA 2016 OSS Security Maturity Time to Put on Your Big Boy Pants!
YT 19 minutes 11 seconds
HackersOnBoard
Black Hat USA 2016 O-Checker Detection of Malicious Documents Through Deviation From File Format
YT 49 minutes 53 seconds
HackersOnBoard
Black Hat USA 2016 Beyond the Mcse Active Directory for the Security Professional
YT 24 minutes 31 seconds
HackersOnBoard
Black Hat USA 2016 Dark Side of the DNS Force
YT 1 second

[Deleted video]
YT 34 minutes
HackersOnBoard
Black Hat USA 2016 Does Dropping USB Drives in Parking Lots and Other Places Really Work
YT 47 minutes 17 seconds
HackersOnBoard
Black Hat USA 2016 The Art of Reverse Engineering Flash Exploits
YT 48 minutes 55 seconds
HackersOnBoard
Black Hat USA 2016 Pay No Attention to That Hacker Behind the Curtain
YT 19 minutes 9 seconds
HackersOnBoard
Black Hat USA 2016 Samsung Pay Tokenized Numbers Flaws and Issues
YT 42 minutes 42 seconds
HackersOnBoard
Black Hat USA 2016 Augmenting Static Analysis Using Pintool Ablation
YT 40 minutes 8 seconds
HackersOnBoard
Black Hat USA 2016 Web Application Firewalls Analysis of Detection Logic
YT 24 minutes 51 seconds
HackersOnBoard
Black Hat USA 2016 What's the DFIRence for ICS
YT 40 minutes 23 seconds
HackersOnBoard
Black Hat USA 2016 The Year in Flash
YT 51 minutes 22 seconds
HackersOnBoard
Black Hat USA 2016 Windows 10 Mitigation Improvements
YT 32 minutes 54 seconds
HackersOnBoard
Black Hat USA 2016 Memory Forensics Using Virtual Machine Introspection for Cloud Computing
YT 42 minutes 56 seconds
HackersOnBoard
Black Hat USA 2016 Using Undocumented CPU Behavior to See Into Kernel Mode and Break KASLR...
YT 24 minutes 45 seconds
HackersOnBoard
Black Hat USA 2016 Ouroboros Tearing Xen Hypervisor With the Snake
YT 43 minutes 50 seconds
HackersOnBoard
Black Hat USA 2016 When the Cops Come
YT 43 minutes 50 seconds
HackersOnBoard
Black Hat USA 2016 When the Cops Come
YT 28 minutes 43 seconds
HackersOnBoard
Black Hat USA 2016 Building a Product Security Incident Response Team Learnings From the Hivemind
YT 52 minutes 29 seconds
HackersOnBoard
Black Hat USA 2016 The Linux Kernel Hidden Inside Windows 10
YT 43 minutes 58 seconds
HackersOnBoard
Black Hat USA 2016 Can You Trust Me Now An Exploration Into the Mobile Threat Landscape
YT 50 minutes 7 seconds
HackersOnBoard
Black Hat USA 2016 Into the Core In Depth Exploration of Windows 10 IoT Core
YT 21 minutes 50 seconds
HackersOnBoard
Black Hat USA 2016 Attacking SDN Infrastructure Are We Ready for the Next Gen Networking
YT 47 minutes 39 seconds
HackersOnBoard
Black Hat USA 2016 Demystifying the Secure Enclave Processor
YT 46 minutes 38 seconds
HackersOnBoard
Black Hat USA 2016 Cunning With CNG Soliciting Secrets From Schannel
YT 48 minutes 44 seconds
HackersOnBoard
Black Hat USA 2016 Language Properties of Phone Scammers Cyberdefense At the Level of the Human
YT 22 minutes 41 seconds
HackersOnBoard
Black Hat USA 2016 Next Generation of Exploit Kit Detection By Building Simulated Obfuscators
YT 32 minutes 30 seconds
HackersOnBoard
Black Hat USA 2016 Over the Edge Silently Owning Windows 10's Secure Browser
YT 24 minutes 41 seconds
HackersOnBoard
Black Hat USA 2016 BadTunnel How Do I Get Big Brother Power
YT 51 minutes 18 seconds
HackersOnBoard
Black Hat USA 2016 Timing Attacks Have Never Been So Practical Advanced Cross Site Search Attacks
YT 46 minutes 13 seconds
HackersOnBoard
Black Hat USA 2016 Understanding HL7 2 X Standards, Pen Testing, and Defending HL7 2 X Messages
YT 42 minutes 14 seconds
HackersOnBoard
Black Hat USA 2016 Windows 10 Segment Heap Internals
YT 42 minutes 24 seconds
HackersOnBoard
Black Hat USA 2016 Canspy A Platform for Auditing Can Devices
YT 43 minutes 39 seconds
HackersOnBoard
Black Hat USA 2016 Applied Machine Learning for Data Exfil and Other Fun Topics
YT 51 minutes 32 seconds
HackersOnBoard
Black Hat USA 2016 Behind the Scenes of iOS Security
YT 41 minutes 55 seconds
HackersOnBoard
Black Hat USA 2016 Weaponizing Data Science for Social Engineering...
YT 42 minutes 56 seconds
HackersOnBoard
Black Hat USA 2016 Drone Attacks on Industrial Wireless A New Front in Cyber Security