Fast and furious reverse engineering
Tomislav Pericin is one of the founders of ReversingLabs and the company’s Chief Software Architect. In this video, recorded at Hack in The Box Amsterdam 2012, he talks …
DDoS attacks protection advice from the EFF
Denial of service (DoS) and distributed denial of service (DDoS) attacks are increasingly common phenomena, used by a variety of actors—from activists to governments—to …
Automated hacking
The automatic tools that are available online save the attacker the trouble of studying attack methods and coming up with exploits to applications’ vulnerabilities. An …
Hardening Windows processes
Didier Stevens is an IT security consultant working for a large financial corporation in Belgium. In this video recorded at Hack in The Box 2012 Amsterdam, Didier talks about …
Bruce Schneier: Trust, security and society
Human societies run on trust. Every day, we all trust millions of people, organizations, and systems — and we do it so easily that we barely notice. But in any system of …
Security vulnerabilities of DVB chipsets
This video from Hack in The Box Amsterdam 2012 focuses on the security of audio and video MPEG streams broadcasted to subscribers via their set-top-boxes by a digital …
Cuckoo Sandbox: Automated malware analysis
Cuckoo Sandbox is an open source automated malware analysis system. It started as a Google Summer of Code 2010 project with The Honeynet Project and evolved into being one of …
Getting ahead of the security poverty line
Being stuck below the security poverty line isn’t about budget, it’s about attitude, motivation, and focusing not simply on basic compliance but rather on your …
Monitoring the quality of SSL support
Ivan Ristic, Director of Engineering at Qualys, talks about SSL Pulse – a continuous and global dashboard for monitoring the quality of SSL support across the top one …
Video: Attacking XML preprocessing
Documenting more than a year of research in XML technologies, this talk by Nicolas Grégoire at Hack in The Box 2012 Amsterdam details security implications of the XML format …
Investigating Android permissions
Georgia Weidman is the founder of Bulb Security. She’s also a penetration tester, security researcher, and trainer. In this video recorded at Hack in The Box 2012 …
Make your pentester work harder for his money
In this video recorded at Infosecurity 2012, Wolfgang Kandek, CTO at Qualys, talks about their recent research dealing with Java. Many modern exploits use Java as a stepping …