AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Watch our Drone hacking skynet shotgun shells drone net shell testing video
Workshops & Training

Drone Hacking: SKYNET Shotgun Shells - Drone Net Shell Testing

Defeating net-based drone defense products by using a protective chicken wire bubble: The SKYNET 12 gauge shotgun shells blew a hole right through our chicken wire protective cage.

Watch Workshop
Watch our Weaponizing machine learning humanity was overrated anyway video
Virtual Sessions

Weaponizing Machine Learning: Humanity Was Overrated Anyway

A video teaser to Bishop Fox's "DeepHack" program, presented at DEF CON 25 on July 29th.

Watch Session
Watch our Deephack demo exploiting sqli by using an open source hacking ai tool video
Workshops & Training

DeepHack Demo - Exploiting SQLi by Using an Open-source Hacking AI Tool

At risk of appearing like mad scientists, reveling in our latest unholy creation, we proudly introduce you to DeepHack: the open-source hacking AI. This bot learns how to break into web applications using a neural network, trial-and-error, and a frightening disregard for humankind.

Watch Workshop
Watch our Def con 18 2010 lord of the bing search engine hacking video
Workshops & Training

Lord of the Bing - Search Engine Hacking

This presentation picks up the subtle art of search engine hacking at the current state and discusses why these techniques fail. We will then reveal several new search engine hacking techniques that have resulted in remarkable breakthroughs against both Google and Bing.

Watch Workshop
Watch our How we can stop email spoofing video
Workshops & Training

How We Can Stop Email Spoofing

According to our research, 98 percent of the internet is not protected against email spoofing, which is a relatively easy problem to solve. If you’re concerned that your domain may be vulnerable to spoofing, check out SpoofCheck, our tool that diagnoses web and email domains.

Watch Workshop
Watch our Black hat usa 2016 danger drone arsenal demo vegas casino video
Workshops & Training

Danger Drone - Arsenal DEMO

Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox. She handles great!

Watch Workshop
Watch our Drone hacking live footage of danger drone video
Workshops & Training

Drone Hacking: Live Footage of Danger Drone

Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox. She handles great!

Watch Workshop
Watch our Def con 24 2016 game over man reversing video games to create an unbeatable ai player video
Workshops & Training

Game Over, Man! – Reversing Video Games to Create an Unbeatable AI Player

“Super Smash Bros: Melee.” – Furrowed brows, pain in your thumbs, trash talk your Mom would blush to hear. What started as a fun coding project in response to a simple dare grew into an obsession that encompassed the wombo-combo of hacking disciplines including binary reverse engineering, AI research, and programming.

Watch Workshop
Watch our If you cant break crypto break the client video
Workshops & Training

If You Can't Break Crypto, Break the Client

CVE-2016-1764, fixed by Apple in March of 2016, is an application-layer bug that leads to the remote disclosure of all message content and attachments in plaintext by exploiting the OS X Messages client.

Watch Workshop
Watch our Black hat usa 2015 bypass surgery abusing cdns with ssrf flash and dns video
Workshops & Training

Bypass Surgery - Abusing CDNs with SSRF Flash and DNS

It is unlikely when a bug affects almost every CDN and it becomes vulnerable, but when this happens the possibilities are endless and potentially disastrous. This is a story of exploit development with fascinating consequences.

Watch Workshop
Watch our Def con 23 2015 rfidiggity pentester guide to hacking hf nfc and uhf rfid video
Workshops & Training

RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID

Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for penetration testers on hacking High Frequency (HF - 13.56 MHz) and Ultra-High Frequency (UHF – 840-960 MHz).

Watch Workshop
Watch our Brinks smart safe hacking video
Workshops & Training

Brink's Smart Safe Hacking

It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.

Watch Workshop
Watch our Airdroid exploit demo video
Technical Briefings

AirDroid Exploit Demo

A vulnerability in the AirDroid application’s web interface made it possible for an attacker to essentially hijack a user’s phone. This video highlights the vulnerability’s implications and how an app’s permissions can become too pervasive.

Read Briefing
Watch our Black hat usa 2014 cloudbots harvesting crypto coins like a botnet farmer video
Resource

Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer

In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.

Learn More
Watch our Hope x 2014 rickrolling your neighbors with google chromecast video
Resource

HOPE X (2014) - Rickrolling your neighbors with Google Chromecast

Take control over your neighbors’ TVs like in the movies! This talk will demonstrate how to hijack any Google Chromecast – even if it’s behind a secure Wi-Fi network – to do your bidding.

Learn More
Watch our Bsides lv 2014 untwisting the mersenne twister how i killed the prng video
Resource

Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG

Untwister is a tool designed to help pentesters predict random number sequences when an application generates them using an insecure algorithm. This presentation focuses on weaponizing what used to be theoretical into our tool: untwister.

Learn More
Watch our Rickmote controller hijacking tvs via google chromecast video
Resource

RickMote Controller - Hijacking TVs via Google Chromecast

Video Demo - using Bishop Fox's "RickMote Controller" to wirelessly hijack someones nearby TV by taking over their Google Chromecast.

Learn More
August Home customer story on IoT devices security. August: Built-in Security in IoT Devices.
Customer Stories

August: Built-in Security in IoT Devices

Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.

Read Story
Watch our Toorcon 15 2013 rickrolling your neighbors with google chromecast 2 video
Resource

ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast

This presentation will demonstrate how to hijack a Google Chromecast on any network to play videos of your choosing. Let no TV be safe.

Learn More
Watch our Rfid hacking over the head move stealing badges w tastic rfid thief video
Resource

RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief

The Tastic RFID Thief can be concealed in a briefcase or messenger bag, and used to silently steal the proximity badge information from an unsuspecting employee as they physically walk near the concealed device. Learn how to get full coverage of all pockets as you walk by your target.

Learn More
Watch our Microsoft bluehat v8 real world code review video
Resource

Microsoft BlueHat v8 - Real World Code Review

This presentation provides a thorough and objective review of the benefits, shortcomings, and trade-offs of static code analysis tools, black box application scanners, and expert analysis.

Learn More
Watch our Mozilla security blog threat modeling using trike video
Resource

Mozilla Security Blog - Threat Modeling Using Trike

Threat modeling is heavily used by the Mozilla Security team in order to analyze potential threats and weaknesses in Firefox and also our other systems, such as addons.mozilla.org, browserID, etc. This video highlights the Trike methodology for threat modeling.

Learn More
Watch our Uat what palpatine can teach about pentesters video
Resource

UAT - What Palpatine Can Teach About Pentesters

Learn about the differences in skill sets and qualities that make a good pen tester.

Learn More
Watch our Baythreat where to start when securing a startup video
Resource

BayThreat - Where To Start When Securing A Startup?

This presentation will give you actionable tips on where to start when securing a startup, and how to bridge the gap between your small company and a Fortune 1000 company you want to secure as a client.

Learn More

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.