Cenzic 232 Patent
Paid Advertising
sla.ckers.org is
ha.ckers sla.cking
Sla.ckers.org
If you have some interesting news or want to throw up a link to discuss it, here's the place. Anything is okay, even shameless vendor launches (since that is often applicable to what we work on). 

Current Page: 1 of 1
Results 1 - 23 of 23
4 years ago
ramaz
Dear All, SecurityTube.net is pleased to announce the CFP for SecurityTubeCon, the first hacker conference, to be held completely online! SecurityTubeCon is aimed at democratizing hacker conferences by allowing any researcher, regardless of his physical location, to share his work with the community. Unlike other Cons we will not *accept / reject* speakers. If you have something interesting
Forum: News and Links
5 years ago
ramaz
Nice video from Netinfinity on analyzing simple malware programs: http://securitytube.net/Simple-Malware-Analyzing-video.aspx
Forum: News and Links
5 years ago
ramaz
Hello All, I will be posting interesting video on SecurityTube in this thread. It is important to note that these are videos which people have submitted / referred to SecurityTube and have not been made by me. 1. Hacker News Network: HNNCast for the 4th Week of June http://securitytube.net/HNNCast-for-the-4th-Week-of-June-video.aspx 2. Endianness Basics: http://securitytube.net/End
Forum: News and Links
5 years ago
ramaz
@thrill and @Gareth Heyes, Thanks a lot for the encouragement! I am really glad to hear you liked the videos! :)
Forum: News and Links
5 years ago
ramaz
Hello All, Here is the next set of videos: 1. Format String Vulnerabilities Primer (Part 2 Understanding Format Functions) In this video we will try to understand why functions such as Printf are susceptible to Format String attacks. This video is very hands on in nature - we will explore the stack of a vulnerable program using GDB and see how the Printf function interprets the format str
Forum: News and Links
5 years ago
ramaz
Hello All, After covering Assembly Language and Buffer Overflow ( ) basics in detail, I am now moving on to Format String Bugs. This will also be around a 8 part video series, so please bear with me. I will be posting the videos on this thread as I make them. Video 1: The Basics In this first video of the series, we will understand the basics of format strings and format functions and w
Forum: News and Links
5 years ago
ramaz
Most of us install software downloaded both known and unknown sources. Sometimes, we might have a reason to suspect that the software in question may be doing some malicious activity on our PC - such as modifying a registry key, overwriting an important system DLL etc. In this video we will look at how to reverse engineer a software install process by using InstallWatch. http://securitytube.ne
Forum: News and Links
5 years ago
ramaz
Thanks @Gareth Heyes! Hello All, Just wanted to add 2 more videos on Advanced Buffer Overflow techniques: 1. Exploiting Buffer Overflows on systems with linux kernel without ASLR http://securitytube.net/Exploiting-Buffer-Overflows-on-Linux-Kernels-without-ASLR-video.aspx 2. Exploiting Buffer Overflows on systems with ASLR enabled in the kernel using a Brute Force on the Stack ht
Forum: News and Links
5 years ago
ramaz
Hello All, I just completed a couple of more videos in this series. So here goes: 6. Exploiting a vulnerable program: In this video we will understand how to overwrite the stack with our shellcode and exploit a vulnerable program. http://securitytube.net/Buffer-Overflow-Primer-Part-6-(Exploiting-a-Program)-video.aspx 7. Demo of an actual exploitation: This will consist of a dem
Forum: News and Links
5 years ago
ramaz
Hello All, Next 2 videos in this series are online now: 4. Disassembling Execve: In this video we will look at how to invoke execve in assembly. http://securitytube.net/Buffer-Overflow-Primer-Part-4-(Disassembling-Execve)-video.aspx 5. Creating Shellcode for Execve: In thie video we will look at how to create shellode for invoking the execve syscall. http://securitytube.net/
Forum: News and Links
5 years ago
ramaz
Hello All, Here are the next 2 videos in the Buffer Overflow Primer Series: 2. Writing Shellcode - we will take a very simple case of converting the exit() syscall into shellcode http://securitytube.net/Buffer-Overflow-Primer-Part-2-(Writing-Exit-Shellcode)-video.aspx 3. Executing Shellcode - we will look at how to write a simple C program to test the shellcode we wrote in the previo
Forum: News and Links
5 years ago
ramaz
Check if VA Space Randomization is enabled (its done by default in 2.6x kernels) cat /proc/sys/kernel/randomize_va_space
Forum: News and Links
5 years ago
ramaz
Hello All, Hope you liked the Assembly Language Primer series I made before this. I will be adding a couple of more videos to it soon. In the meantime wanted to get started with some real fun - Buffer Overflow Primer Videos In this video series we will take an in-depth look into Buffer Overflow attacks - how they work and how to exploit them. I made the first video in the series tod
Forum: News and Links
5 years ago
ramaz
Hello All, Here are the next videos in the series: 9. Conditional Branching using the Jump family of instructions http://securitytube.net/Assembly-Primer-for-Hackers-(Part-9)-Conditional-Branching-video.aspx 10. Writing Functions in Assembly http://securitytube.net/Assembly-Primer-for-Hackers-(Part-10)-Functions-video.aspx 11. Passing arguments to functions using the Stack h
Forum: News and Links
5 years ago
ramaz
@Gareth yes, windows asm is planned and I will post them here when done.
Forum: News and Links
5 years ago
ramaz
Hello All, The next 2 videos in the series are as follows: 7. Working with Strings: In this video we will look at how to work with strings in assembly using the MOVS, STOS, REP etc. instruction sets. http://securitytube.net/Assembly-Primer-for-Hackers-(Part-7)-Working-with-Strings-video.aspx 8. Unconditional branching: In this video we will look at how to perform unconditional
Forum: News and Links
5 years ago
ramaz
Thanks All for your encouragement :) I am really happy many of you found these videos useful. Matt, Yes, I will be making video tuts on exploitation techniques such as buffer overflows, heap overflows etc, reverse engineering, virus and worm programming after this. As ASM is required for all the above, i decided to make the primer videos first :D
Forum: News and Links
5 years ago
ramaz
Hello All, Just finished creating the next set of videos in the "Assembly Language Primer for Hackers" video series: 4. Writing your First Hello World Program in Assembly http://securitytube.net/Assembly-Primer-for-Hackers-(Part-4)-Hello-World-video.aspx 5. Understanding Data types in Assembly Language http://securitytube.net/Assembly-Primer-for-Hackers-(Part-5)-Data-Type
Forum: News and Links
5 years ago
ramaz
Guys! Thanks so much for the encouragement! I am glad you found my videos useful. I will be making the rest of the series over this weekend and will be posting a link in this thread! Recommendations and criticism both welcome!
Forum: News and Links
5 years ago
ramaz
Hello All, Assembly language is a must know before one can get into the world of code exploitation techniques, reverse engineering, virus writing etc. Unfortunately, as Assembly is also a bit tough to grasp for newbies as it is very low level. Thus, I decided to create a video tutorial series on "how to get started with Assembly for hackers". The series is far from complete yet. I
Forum: News and Links
5 years ago
ramaz
In this Shmoocon 2009 talk, Dave Kennedy the author of Fast-Track gives a primer on the tool and demonstrates around 7 scenarios which can be easily exploited using Fast-Track. http://securitytube.net/Hacking-with-FastTrack-(Shmoocon-2009)-video.aspx In this video, we look at how the MS09-002 remote vulnerability in IE7 can be exploited in under a minute using Fast-Track. http://security
Forum: News and Links
5 years ago
ramaz
Spyware Wrote: ------------------------------------------------------- > It's probably worth to note that each video has a > small bit of text preluding it, giving some > background information on whatever you're about to > watch. Yes, the text provides the context for the video and should definitely be read first. In many cases, links to code snippets, tools etc used in the
Forum: News and Links
5 years ago
ramaz
http://www.securitytube.net worth a look ...
Forum: News and Links
Current Page: 1 of 1