Video
WIRELESS LAN SECURITY MEGAPRIMER PART 13 : SSL Man-In-The-Middle Attack
Description: Welcome to Part 13 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »BSIDESLA 2013 – Popping the Penguin: AN INTRODUCTION TO THE PRINCIPLES OF LINUX PERSISTENCE – MARK KITA
Description: Breaking in is half the battle. I’ve talked to so many people whose only objective is to try and break…
Read More »NOTACON 11 – A BRIEF INTRODUCTION TO GAME THEORY
Description: SynopsisFrom game shows to warfare, strategic decision-making surrounds us every day, whether you realize it or not. Game theory is…
Read More »Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux
Cracking WPA & WPA2 key with Aircrack-ng on Kali Linux. This video is taken from YouTube and for education purpose…
Read More »How Stuxnet infect PLCs
This video demonstrates how W32.Stuxnet can compromise a Programmable Logic Controller (PLC), resulting in unintended consequences for the machines connected…
Read More »Peter Warren Singer, “Cybersecurity and Cyberwar: What Everyone Needs to Know”
Published on Feb 10, 2014 Cybersecurity and CyberWar discusses the cybersecurity issues that challenge everyone: politicians wrestling with everything from…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 12: MAN-IN-THE-MIDDLE ATTACK
Description: Welcome to Part 12 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 11:ALFA CARD KUNG-FU
Description: Welcome to Part 11 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »WIRELESS LAN SECURITY MEGAPRIMER PART 10: HACKING ISOLATED CLIENTS
Description: Welcome to Part 10 of the WLAN Security Megaprimer! Please start this series by watching Part 1http://www.securitytube.net/video/1756, if you have…
Read More »Security Awareness – Shoulder Surfing
នៅក្នុងវិដេអូឃ្លីបមួយនេះនឹងបង្ហាញអ្នកអំពីវិធីសាស្ត្រក្នុងការលួចមើលនូវពាក្យសម្ងាត់របស់អ្នកដោយមើលពីខាងក្រោយអ្នក។
Read More »KY ISSA May 2014: Introduction to Intercepting Mobile Device Application Traffic
Title: Introduction to Intercepting Mobile Device Application Traffic Author: Jeremy Druin Twitter: @webpwnized Description: From the KY ISSA May meeting,…
Read More »OpenSSL Heartbeat (Heartbleed) Explained
ការពន្យល់ពី OpenSSL Heartbleed មាននូវចំនុចខ្សោយមួយដ៏ធំនៅក្នុង OpenSSL ដែលដំណើរការនូវ SSL/TLS Protocol (CVE-2014-0160). ចំនុចខ្សោយនេះគឺកើតឡើងត្រូវបាន គេស្គាល់ថាជា heartbeat extension ចំពោះ protocol នេះ ហើយវាមានផលប៉ះពាល់ទៅលើជំនាន់ 1.0.1 និង beta…
Read More »Understanding Heartbleed in Video
តើអ្វីទៅដែលហៅថា HeartBleed? វិដេអូឃ្លីបខាងលើនេះ អ្នកនឹងយល់ដឹងអំពីអ្វីទៅដែលហៅថា HeartBleed? HeartBleed ត្រូវបានគេរកឃើញថាមានចំនុចខ្សោយដែលអាចអនុញ្ញាតឲ្យមាន ការវាយប្រហារទៅលើ OpenSSL។ សូមទស្សនាទាំងអស់គ្នា
Read More »How botnet “command-and-control” works
Botnet command and control centers come in many different forms – here’s a breakdown of how it works and how…
Read More »