Home | Latest News | Popular News | Our Network | About | Contact
Latest Security Videos | www.SecurityPhresh.com
Latest Security Videos
Showing 'Latest Security Videos' from 41 to 50
Offpath Attacks Against PKI
31st Jan 2019 [2 years ago] from DeepSec
The security of Internet-based applications fundamentally rely on the trustworthiness of Certificate Authorities (CAs). We practically demonstrate for the first time that even a very weak off-path attacker can effectively subvert the trustworthiness...
Open Source Network Monitoring
31st Jan 2019 [2 years ago] from DeepSec
Id like to offer an introduction into Network System Monitoring using different open tools available in linux. The talk is a technical approach to identify the best sniffing points in a network and how to orchestrate a full analysis of...
Orchestrating Security Tools With AWS Step Functions
31st Jan 2019 [2 years ago] from DeepSec
Increasingly frequent deployments make it impossible for security teams to manually review all of the code before it is released. We wrote a Terraform-deployed application to solve this problem by tightly integrating into the developer...
Pure In-Memory (Shell)Code Injection In Linux Userland
31st Jan 2019 [2 years ago] from DeepSec
A lot of research has been conducted in recent years on performing code injection in the Windows operating system without touching the disk. The same cannot be said about *NIX (and Linux specifically). Imagine yourself sitting in front...
RFID Chip Inside The Body: Reflecting The Current State Of Usage, Triggers, And Ethical Issues
31st Jan 2019 [2 years ago] from DeepSec
Chipping humans can be seen as one of the most invasive biometric identification technologies. RFID (Radio Frequency Identification) as the key technology in the field of the Internet of Things produces many applications. For example, human...
New Attack Vectors For The Mobile Core Networks
31st Jan 2019 [2 years ago] from DeepSec
Structure of the talk: - Introduction & background - Introduction to interconnection network (What is it, how does it work) - Why is it important for all of us? - Where does it come from? (Basics to understand the problems) - Existing...
Moving Money: Inside The Global Watchlist For Banking Across Borders
31st Jan 2019 [2 years ago] from DeepSec
Its a rare glimpse of an otherwise tightly guarded datastore - and its worrying: many innocent people and organizations find themselves in the World Check database, which protects banks against potentially dangerous customers. This was...
Mapping And Tracking WiFi Networks _ Devices Without Being Connected
31st Jan 2019 [2 years ago] from DeepSec
Sure, WiFi hacking has been around for a while, and everyone knows about tools like airmon-ng, kismet, et al. But what if you just want to view a list of all networks in your area along with all the devices connected to them? Or maybe you...
IoD – Internet Of Dildos, A Long Way To A Vibrant Future
31st Jan 2019 [2 years ago] from DeepSec
In recent years the internet of things has slowly creeped into our daily life and is now an essential part of it, whether you want it or not. A long-existing sub category of the internet of things is a mysterious area called teledildonics....
Injecting Security Controls Into Software Applications
31st Jan 2019 [2 years ago] from DeepSec
SQL Injection was first mentioned in a 1998 article in Phrack Magazine. Twenty years later, injection is still a common occurrence in software applications (No.1 in latest OWASP Top 10 2017). For the last 20 years, we have been focusing...
« Newer 1 2 3 4 5 6 7 8 9 10 Older »