Executive brief on how PCI DSS 4.0 affects offensive security practices, penetration testing, and segmentation testing. Watch Now

Featured Workshops & Training

Workshop: Sliver - Getting Started & 1.6 Features

Watch an interactive workshop led by Bishop Fox Senior Security Consultant, Tim Ghatas, as we dive into Sliver, the open-source C2 framework making waves in Red Team ops.

Watch our How we can stop email spoofing video
Workshops & Training

How We Can Stop Email Spoofing

According to our research, 98 percent of the internet is not protected against email spoofing, which is a relatively easy problem to solve. If you’re concerned that your domain may be vulnerable to spoofing, check out SpoofCheck, our tool that diagnoses web and email domains.
Watch our Black hat usa 2016 danger drone arsenal demo vegas casino video
Workshops & Training

Danger Drone - Arsenal DEMO

Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox. She handles great!
Watch our Drone hacking live footage of danger drone video
Workshops & Training

Drone Hacking: Live Footage of Danger Drone

Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox. She handles great!

Watch our Def con 24 2016 game over man reversing video games to create an unbeatable ai player video
Workshops & Training

Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player

“Super Smash Bros: Melee.” – Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming.
Watch our If you cant break crypto break the client video
Workshops & Training

If You Can't Break Crypto, Break the Client

CVE-2016-1764, fixed by Apple in March of 2016, is an application-layer bug that leads to the remote disclosure of all message content and attachments in plaintext by exploiting the OS X Messages client.
Watch our Black hat usa 2015 bypass surgery abusing cdns with ssrf flash and dns video
Workshops & Training

Bypass Surgery - Abusing CDNs with SSRF Flash and DNS

It is unlikely when a bug affects almost every CDN and it becomes vulnerable, but when this happens the possibilities are endless and potentially disastrous. This is a story of exploit development with fascinating consequences.
Watch our Def con 23 2015 rfidiggity pentester guide to hacking hf nfc and uhf rfid video
Workshops & Training

RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID

Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for penetration testers on hacking High Frequency (HF - 13.56 MHz) and Ultra-High Frequency (UHF – 840-960 MHz).
Watch our Brinks smart safe hacking video
Workshops & Training

Brink's Smart Safe Hacking

It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.