In this video, Lenny Zeltser, a SANS instructor, outlines the basic concepts of reverse engineering malware, describing the process of analyzing the code and the behavior of the malware.
Browsing Category: Videos
Independent Security Evaluators’ Charlie Miller discusses Safari bugs, his predictions for this year’s PWN2OWN and mobile security with Ryan Naraine at RSA 2010.
This video demonstrates a proof-of-concept BlackBerry spyware package developed by Tyler Shields, one of Veracode’s senior security researchers.
[img_assist|nid=2755|title=|desc=|link=none|align=right|width=100|height=100]Microsoft has started dropping broad hints that an emergency patch for Internet Explorer will be released very soon to counter targeted attacks and the publication of exploit code for a “browse and you’re owned” vulnerability in its flagship Web browser.
Security researcher Robert “Rsnake” Hansen discusses the concept of DNS rebinding attacks and the threat they pose.
Security researcher Dino Dai Zovi discusses advanced techniques in exploitation, as well as exploit mitigation and shellcoding.
In part two of his lecture on exploiting Microsoft Windows, Dino Dai Zovi discusses specific techniques for attacking Windows machines.
Security researcher and former penetration tester Dino Dai Zovi delivers a lecture at the Polytechnic Institute of New York University on exploiting Windows.
In this video from Dojosec, Matthew Watchinski from Sourcefire’s Vulnerability Research Team reveals the timeline, from discovery to sale to exploitation to disclosure to patch, of the Adobe JBIG PDF flaw.
VoIP phones have taken off in both the enterprise and the consumer markets, thanks to their ease of deployment and low operating costs. But, as this video from Enablesecurity shows, there are a number of security risks that have yet to be addressed.