Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 101 to 110
Prowler V1.6 – AWS Security Assessment And Forensics Tool
27th Feb 2018 [3 years ago] from ToolsWatch
Prowler is a tool for AWS security assessment, auditing and hardening. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark. It performs extra checks as well. Tool based on...[[ This is a content summary only. Visit...
Habu V0.0.45 – Python Network Hacking Toolkit
26th Feb 2018 [3 years ago] from ToolsWatch
Habu is a simple Python Network Hacking Toolkit, developed by Fabian Martinez Portantier with the main idea to learn new concepts and attacks implemented using Python. These are basic functions that...[[ This is a content summary only....
WebLorean V.2017 – Time-Travel For Web Admins
26th Feb 2018 [3 years ago] from ToolsWatch
WebLorean is a time-travel tool for web admins and IT security people. This tool allows pentesters and sysadmins to run an infogather phase against a websites past hosts, exploting the human...[[ This is a content summary only. Visit my...
Black Hat Arsenal Asia 2018 Great Lineup
25th Jan 2018 [3 years ago] from ToolsWatch
After days of reviewing the hundreds of submitted tools, ToolsWatch and Black Hat teams selected 30 tools. They will be demonstrated over 2 days the 22nd and 23rd of March 2018 at the Marina Bay...[[ This is a content summary only. Visit...
DeepSec2017 - The Future Of The Internet
4th Jan 2018 [3 years ago] from DeepSec
Where are we headed with all our things as they become connected to the internet? Everything is already so vulnerable, but companies are building convenient products and services so fast without thinking about the security issues. This...
DeepSec2017 - Uncovering And Visualizing Botnet Infrastructure And Behavior
4th Jan 2018 [3 years ago] from DeepSec
How much information about a botnet can one find using a single IP address, domain name or indicator of compromise (IOC)? What kind of behavior can be determined when looking at attacker and victim infrastructure? In an attempt to discover...
DeepSec2017 - XFLTReaT: A New Dimension In Tunnelling
4th Jan 2018 [3 years ago] from DeepSec
This presentation will sum up how to do tunnelling with different protocols and will feature different perspectives in detail. For example, companies are fighting hard to block exfiltration from their network: They use http(s) proxies,...
DeepSec2017 - Lock, Stock And Two Smoking Apples - XNU Kernel Security
4th Jan 2018 [3 years ago] from DeepSec
This talk will aim to cover the research which has been undertaken following on from the Defcon presentation on MWRs platform agnostic kernel fuzzing, to automatically identify critical flaws within Apple macOS. It was observed that there...
ROOTS 2017 - Paying The Price For Disruption: A FinTech Allowed Account Takeover
4th Jan 2018 [3 years ago] from DeepSec
In this paper, we look at N26, a pan-European banking startup and the poster child for young FinTechs, to see how security is treated by startups that provide disruptive technologies in the financial sector. We find out that, in an area...
ROOTS 2017 - A Survey On Automated Dynamic Malware Analysis Evasion And Counter-Evasion: PC, Mobile, And Web
4th Jan 2018 [3 years ago] from DeepSec
Automated dynamic malware analysis systems are important in combating the proliferation of modern malware. Unfortunately, malware can often easily detect and evade these systems. Competition between malware authors and analysis system developers...
« Newer 6 7 8 9 10 11 12 13 14 15 Older »