Security researcher Robert “Rsnake” Hansen discusses the concept of DNS rebinding attacks and the threat they pose.
Browsing Category: Videos
Security researcher Dino Dai Zovi discusses advanced techniques in exploitation, as well as exploit mitigation and shellcoding.
In part two of his lecture on exploiting Microsoft Windows, Dino Dai Zovi discusses specific techniques for attacking Windows machines.
Security researcher and former penetration tester Dino Dai Zovi delivers a lecture at the Polytechnic Institute of New York University on exploiting Windows.
In this video from Dojosec, Matthew Watchinski from Sourcefire’s Vulnerability Research Team reveals the timeline, from discovery to sale to exploitation to disclosure to patch, of the Adobe JBIG PDF flaw.
VoIP phones have taken off in both the enterprise and the consumer markets, thanks to their ease of deployment and low operating costs. But, as this video from Enablesecurity shows, there are a number of security risks that have yet to be addressed.