Channel Avatar

HackersOnBoard @UChGDEluRG9r5kCecRAQTx_Q@youtube.com

72K subscribers - no pronouns :c

Hi there, This collection deserves the research and trainin


37:35
DEF CON 27 - Hila Cohen - Malproxy Leave Your Malware at Home
35:53
DEF CON 27 - Christopher Wade - Tag-side attacks against NFC
37:31
DEF CON 27 - Junyu Zhou - Web2Own Attacking Desktop Apps From Web Securitys Perspective
23:55
DEF CON 27 - Breaking The Back End It Is Not Always A Bug Sometimes It Is Just Bad Design
43:51
DEF CON 27 - Kyle Gwinnup - Next Generation Process Emulation with Binee
42:02
DEF CON 27 - State of DNS Rebinding Attack & Prevention Techniques and the Singularity of Origin
20:25
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON
41:38
DEF CON 27 - g richter - Reverse-Engineering 4g Hotspots for Fun Bugs and Net Financial Loss
46:19
DEF CON 27 - Joseph Menn - Change the World cDc Style Cow tips from the first 35 years
38:17
DEF CON 27 - Jack Baker - Hacking WebAssembly Games with Binary Instrumentation
40:59
DEF CON 27 - Katherine Pratt - Hacking Your Thoughts Batman Forever meets Black Mirror
38:36
DEF CON 27 - How You Can Buy ATandT T-Mobile and Sprint Real-Time Location Data on the Black Market
36:43
DEF CON 27 - Leon Jacobs - Meticulously Modern Mobile Manipulations
22:43
DEF CON 27 - Jens Muller - Re What's up Johnny Covert Content Attacks on Email End-to-End Encryption
41:58
DEF CON 27 - Jayson Grace - MOSE Using Configuration Management for Evil
48:08
DEF CON 27 - 100 Seconds of Solitude Defeating Cisco Trust Anchor With FPGA Bitstream Shenanigans
45:06
DEF CON 27 - Michael Leibowitz - EDR Is Coming Hide Yo Sh!t
23:58
DEF CON 27 - jiska - Vacuum Cleaning Security Pinky and the Brain Edition
36:47
DEF CON 27 - Matt Wixey - Sound Effects Exploring Acoustic Cyber-weapons
46:59
DEF CON 27 - Jeff Dileo - Evil eBPF In-Depth Practical Abuses of an In-Kernel Bytecode Runtime
42:13
DEF CON 27 - Jacob Baines - Help Me Vulnerabilities Youre My Only Hope
41:03
DEF CON 27 - Jmaxxz - Your Car is My Car
56:07
DEF CON 27 - Joe Grand Kingpin - Behind the Scenes of the DEFCON 27 Badge
48:49
DEF CON 27 - Jesse Michael - Get Off the Kernel if You Cant Drive
40:48
DEF CON 27 - Joshua Maddux - API-Induced SSRF How Apple Pay Scattered Vulnerabilities Across the Web
44:26
DEF CON 27 - Marina Simakov - Relaying Credentials Has Never Been Easier
20:21
DEF CON 27 - Mike Spicer - I Know What You Did Last Summer 3 Years of Wireless Monitoring at DEF CON
16:21
DEF CON 27 - Michael Stepankin - Apache Solr Injection
40:31
DEF CON 27 - How To Improve Coverage-Guided Fuzzing and Find New 0days in Tough Targets
36:16
DEF CON 27 - Hadrien Barral - The ABC of Next-Gen Shellcoding
01:17
Hacking the Samsung Galaxy S8 Irisscanner
46:11
DEF CON 27 - Panel - DEF CON to help hackers anonymously submit bugs to the government discuss
56:07
DEF CON 27 - Joe Grand - Behind the Scenes of the DEF CON 27 Badge
46:19
DEF CON 27 - Cult of the Dead Cow - Change the World, cDc Style Cow tips from the first 35 years
47:43
Black Hat USA 2018 - A Deep Dive into macOS MDM and How it can be Compromised
22:46
Black Hat USA 2018 - Back to the Future A Radical Insecure Design of KVM on ARM
01:36:53
Day Zero A Road Map to #BHUSA 2018
50:52
Black Hat USA 2018 - Are You Trading Stocks Securely Exposing Security Flaws in Trading Technologies
47:06
Black Hat USA 2018 - A Dive in to Hyper V Architecture & Vulnerabilities
24:17
Attacks on the Curl-P Hash Function Leading to Signature Forgeries in the IOTA Signature Scheme
40:47
An Inside Story of Mitigating Speculative Execution Side Channel Vulnerabilities
49:52
Black Hat USA 2018 - Another Flip in the Row
43:39
Black Hat USA 2018 - Automating Exploit Generation for Arbitrary Types of Kernel Vulnerabilities
28:43
Black Hat USA 2018 - AFL's Blindspot and How to Resist AFL Fuzzing for Arbitrary ELF Binaries
39:14
Black Hat USA 2018 - Automated Discovery of Deserialization Gadget Chains
44:20
Black Hat USA 2018 - AI & ML in Cyber Security - Why Algorithms are Dangerous
20:23
ARTist - An Instrumentation Framework for Reversing and Analyzing Android Apps and the Middleware.
44:56
Black Hat USA 2018 - A Brief History of Mitigation The Path to EL1 in iOS 11
38:57
Black Hat USA 2018 - An Attacker Looks at Docker Approaching Multi Container Applications
42:34
Black Hat USA 2018 - Attacking Client Side JIT Compilers
50:02
Black Hat USA 2018 - Decompiler Internals Microcode
40:58
Black Hat USA 2018 - Exploitation of a Modern Smartphone Baseband
48:51
Detecting Malicious Cloud Account Behavior A Look at the New Native Platform Capabilities
51:12
Black Hat USA 2018 - Hardening Hyper V through Offensive Security Research
21:15
Black Hat USA 2018 - Dissecting Non Malicious Artifacts One IP at a Time
25:19
Black Hat USA 2018 - Fire & Ice Making and Breaking macOS Firewalls
52:49
Black Hat USA 2018 - DeepLocker - Concealing Targeted Attacks with AI Locksmithing
23:38
Black Hat USA 2018 - Detecting Credential Compromise in AWS
40:40
For the Love of Money Finding and Exploiting Vulnerabilities in Mobile Point of Sales Systems
48:23
How TRITON Disrupted Safety Systems & Changed the Threat Landscape of Industrial