fbpx
Home Video

Video

Exploring Vulnerabilities in HDMI

The HDMI (High Definition Multimedia Interface) standard has gained extensive market penetration. Nearly every piece of modern home theater equipment has HDMI support and...

New Developments in the BREACH Attack

2013 was the year when BREACH attack was introduced to Black Hat USA that is still a serious attack vector that exploited compression to...

Linux Weaknesses Making It Easier To Get Exploited

Today we will discuss four weaknesses in current Linux and PaX ASLR design and implementation. 1) Too low entropy. 2) Non-uniform distribution. 3) Correlation between objects. 4) Inheritance. The...

Change IMEI – MEUI META 3G

Note : Please read this post before proceeding - All About IMEI . It is important that you know what is database file , etc. Pre-requests...

Hack any website | Brute Force Attack Using Firefox

What is Brute Forcing ? Brute force is a technique in which a hacker tries random passwords ( which are generated by application or via...

How to Deny TOR user Access your Website

Tor users become risk for our servers as they can implement unethical practice into your website, server wihtout tracing as they are using tor...

Penetrating the Perimeter – Tales from the Battlefield

Phil Grimes is a Security Consultant versed in providing logistics, security assessments, & penetration testing services for nearly a decade. Small businesses, financial institutions...

Empire pure PowerShell Post Exploitation Agent

Empire is a pure PowerShell post-exploitation agent built on cryptologically-secure communications and a flexible architecture. Empire implements the ability to run PowerShell agents without...

Website Fingerprinting on Tor: attacks and defenses

Tor project is know because of its anonymity, recently many researchers and the security agencies tried to find ways to get in the tor...

OpenSesame: Drive it Like You HACKED it!

OpenSesame is a device that can wirelessly open virtually any fixed-code garage door in seconds, exploiting a new attack I've discovered on wireless fixed-pin...

Machine vs. Machine: Inside DARPA’s Fully Automated CTF

As you may know, DEF CON 24 is hosting the finals of the DARPA Cyber Grand Challenge - a CTF played by fully autonomous...

Metasploit & Windows Kernel Exploitation

Many local exploits have been released over the last year targeting the Windows kernel. These exploits are particularly useful for penetration testers that need...
- Advertisment -

Most Read

What Makes ICS/OT Infrastructure Vulnerable?

Infrastructure security for operational technologies (OT) and industrial control systems (ICS) varies from IT security in several ways, with the inverse confidentiality, integrity, and...

Everything You Must Know About IT/OT Convergence

What is an Operational Technology (OT)? Operational technology (OT) is a technology that primarily monitors and controls physical operations. It can automate and control machines,...

Understand the OT Security and Its Importance

This article discusses OT security and why it is essential for protecting industrial systems from cyberattacks. We will also discuss common control objectives that can...

What is Deepfake, and how does it Affect Cybersecurity?

Producing deepfake is easy. It is hard to detect. They operate with a description of reality rather than reality itself (e.g., a video). Any...