Keynote: My Lessons from the Uber Case
1:05:00
My Invisible Adversary: Burnout
40:39
Місяць тому
Black Hat USA 2024 - Short Reel
0:19
Місяць тому
Black Hat USA 2024
0:42
Місяць тому
КОМЕНТАРІ
@thakursahabofficial7377
@thakursahabofficial7377 7 днів тому
that a important information given by you SIR ....thankyou
@abdougaming9905
@abdougaming9905 7 днів тому
Great content🔥
@subxi5744
@subxi5744 12 днів тому
34:16 - Not entirely true. You can actually use `PAGE_READWRITE` during the mem alloc phase, write the code and then switch the permission to `PAGE_EXECUTE_READ` using `VirtualProtectEx`. This method provides you with a RW buffer for data copy which becomes an RX buffer for execution. By the way, malfind is dependent on `vadinfo` plugin, `vadinfo` shows the original protection only, meaning you'll not see the `PAGE_EXECUTE_READ` memory segment, so there's that. EDIT: Props to Monnappa for this demonstration. Not many people have the guts to demonstrate and explain such topics.
@DROPSHIPCAPTAIN
@DROPSHIPCAPTAIN 12 днів тому
Cool!
@arashinoatode
@arashinoatode 14 днів тому
such simple presemtation. loved it
@apple.3947
@apple.3947 16 днів тому
what the fuck is this.
@blitzkrieg19397
@blitzkrieg19397 18 днів тому
16:06
@lingdatang669
@lingdatang669 20 днів тому
29:29 BOOKmark
@Koenfred19
@Koenfred19 24 дні тому
Is there a Adguard or Pihole blocklist for the domain's of pegasus so Day2Day users can have a extra (Little) layer of protection against them?
@lingdatang669
@lingdatang669 25 днів тому
24:14 bookmark
@jahwni
@jahwni 27 днів тому
Would be interested to see how the first phase was done, how the "light bulb" strings are actually generated, I get they are different function calls but what the process looks like and the tools used and how it's actually done would be good to see!
@CyberDeck-pg7sf
@CyberDeck-pg7sf Місяць тому
Is it possible to get the sample you are analyzing ?
@florencetown4024
@florencetown4024 Місяць тому
05:00
@miralnuruyev9177
@miralnuruyev9177 Місяць тому
Up
@DerIchBinDa
@DerIchBinDa Місяць тому
"Intel has a 95% market share" - oh boy did that not age well 😅
@Lou-sassole3
@Lou-sassole3 Місяць тому
Oh hell yea
@michaeldula462
@michaeldula462 Місяць тому
Interesting. Even if this is more than 2 decades old, it's still applicable today.
@ack1299
@ack1299 Місяць тому
Very insightful session. Thanks a lot!
@marianarlt
@marianarlt 2 місяці тому
Cat tries to eat plushy fish: 80mio views in two days Very good in-depth talk about the technologies that run our world that are still valuable years later:
@KatyYoder-cq1kc
@KatyYoder-cq1kc 2 місяці тому
All militia, governments, white supremacists, and communists: Cease and desist all malicious use of AI against myself and my family. We are not your property.
@GullKhan006
@GullKhan006 2 місяці тому
Am from Pakistan 🎉
@GullKhan006
@GullKhan006 2 місяці тому
I love My heroes ❤
@jimmyblaze_4115
@jimmyblaze_4115 2 місяці тому
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications or even Pegasus.
@jimmyblaze_4115
@jimmyblaze_4115 2 місяці тому
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications.
@jimmyblaze_4115
@jimmyblaze_4115 2 місяці тому
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications.
@OhMyVideology
@OhMyVideology 2 місяці тому
Great talk
@shubham_srt
@shubham_srt 2 місяці тому
ayoooo
@shubham_srt
@shubham_srt 2 місяці тому
i am late af
@ihacksi
@ihacksi 2 місяці тому
Best memory forensics presentation ever! Thank you sir!
@Shinesunny-sg6qc
@Shinesunny-sg6qc 2 місяці тому
a good idea about treat definder
@AliTunahanGuner
@AliTunahanGuner 2 місяці тому
legend
@iocan1693
@iocan1693 3 місяці тому
Improve ur english or speak with a translator. Impossible to listen to. Shame because its an interesting topic
@reverse_meta9264
@reverse_meta9264 3 місяці тому
Ad-hoc - allow devices to connect to each other (not that commonly used) as opposed to connecting to central AP 08:43 Discovery (how 802.11 discovery works) 10:25 Discovery on peer-to-peer network, find the P2P group owner Need active scanning, passive scanning will not work 13:00 looking at probe response packet as seen in wireshark 14:50 P2P service discovery
@Thedude897
@Thedude897 3 місяці тому
Radar based pin detection! WTF
@tippimaravala
@tippimaravala 3 місяці тому
how come medical hackers never asked me
@sunshinenewday8195
@sunshinenewday8195 3 місяці тому
How can I block ultra sonic frequency attack they are using some kind of high noise?
@kingofallhackers
@kingofallhackers 3 місяці тому
One of the best keynotes I have ever scene in person. Re-watching still gives me goose bumps. Color me a "fan boy".
@dolboebkorova3516
@dolboebkorova3516 3 місяці тому
Fantastic talk, perhaps ahead of its time. As a beginner in CTI I am wondering, has opsec been considerably improved since these times or are these techniques still relevant?
@adamdnewman
@adamdnewman 4 місяці тому
TSA = Totaly Stupid A$$holes
@Lost-im8xr
@Lost-im8xr 4 місяці тому
This dude is nervous asf, he really should have rehearsed more before presenting he was jumping all over the place it made it very hard to follow
@TheLastairbender-jw6kd
@TheLastairbender-jw6kd 2 дні тому
I recommend @CITYMETHODS for more tutorials 😊
@TobyChampion
@TobyChampion 4 місяці тому
I didn't think I would ever be able to understand WireGuard if it wasn't for this presentation. Seems either none of the UKpostsrs or writers who try to explain it really understand it, or they do, but they're terrible at explaining it. Or, of course, I'm not just not smart enough. But this is the guy who conceived and created WireGuard, so he understands it, and crikey, he can explain it, and has clearly sweated blood and tears towards being able to explain it, so I don't have sweat those things. WireGuard seems to me to be one of those technologies where if you put the effort into understand it from first principles-by watching this-you'll get it. And if you don't, you won't, and you'll be, as I thought I was until I watched this, doomed to never understand it. Elegance, indeed.
@seattledutch
@seattledutch 2 місяці тому
My thoughts as well! All the youtube tutorials do not seem to explain wireguard properly. And often incorrectly.
@elguero933
@elguero933 4 місяці тому
So vintage, so good
@elguero933
@elguero933 4 місяці тому
The year tor was born 😍🧅
@rpuig3974
@rpuig3974 4 місяці тому
the fact that no body is talking about computrace more seriously smells really strongly like conpiracy and cover up, this software is perfect for spying on the population
@zaduhel4595
@zaduhel4595 4 місяці тому
Reverse hacking the hackers software technology and then eliminating their software should be available to consumers, like what Engineers are using on our Moon.
@KatyYoder-cq1kc
@KatyYoder-cq1kc 4 місяці тому
Cease and desist all malicious use of AI @global white supremacists and terrorists
@HafizhAsadA2
@HafizhAsadA2 4 місяці тому
Miss this 0day
@MherZaqaryann
@MherZaqaryann 4 місяці тому
Very clear explanation, respect to this guy!
@wolphe4953
@wolphe4953 4 місяці тому
I got ifected with this and im screwed cant get rid of it :(
@seattledutch
@seattledutch 4 місяці тому
Amazed about the elegance of WireGuard. Feels both elegant and brilliant in its simplicity. Was looking for a presentation as a walkthough for the white paper. This is a great presentation! Amazed it doesn't have millions of views given the amount of tutorials on wg.
@user-kk7mi7vl9x
@user-kk7mi7vl9x 4 місяці тому
Thank you for your speech. Although I am currently tormented by the topic of "SHA1's Collision Attack Research"