AI-Powered Application Penetration Testing—Scale Security Without Compromise Learn More

Workshops & Training

If You Can't Break Crypto, Break the Client

If You Can't Break Crypto, Break the Client
CVE-2016-1764, fixed by Apple in March of 2016, is an application-layer bug that leads to the remote disclosure of all message content and attachments in plaintext by exploiting the OS X Messages client.
Watch Workshop
Workshops & Training

Bypass Surgery - Abusing CDNs with SSRF Flash and DNS

Bypass Surgery - Abusing CDNs with SSRF Flash and DNS
It is unlikely when a bug affects almost every CDN and it becomes vulnerable, but when this happens the possibilities are endless and potentially disastrous. This is a story of exploit development with fascinating consequences.
Watch Workshop
Workshops & Training

RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID

RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID
Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for penetration testers on hacking High Frequency (HF - 13.56 MHz) and Ultra-High Frequency (UHF – 840-960 MHz).
Watch Workshop
Workshops & Training

Brink's Smart Safe Hacking

Brink's Smart Safe Hacking

It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.

Watch Workshop
Technical Briefings

AirDroid Exploit Demo

AirDroid Exploit Demo
A vulnerability in the AirDroid application’s web interface made it possible for an attacker to essentially hijack a user’s phone. This video highlights the vulnerability’s implications and how an app’s permissions can become too pervasive.
Read Briefing
Resource

Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer

Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer

In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.

Learn More
Resource

HOPE X (2014) - Rickrolling your neighbors with Google Chromecast

HOPE X (2014) - Rickrolling your neighbors with Google Chromecast
Take control over your neighbors’ TVs like in the movies! This talk will demonstrate how to hijack any Google Chromecast – even if it’s behind a secure Wi-Fi network – to do your bidding.
Learn More
Resource

Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG

Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG
Untwister is a tool designed to help pentesters predict random number sequences when an application generates them using an insecure algorithm. This presentation focuses on weaponizing what used to be theoretical into our tool: untwister.
Learn More
Resource

RickMote Controller - Hijacking TVs via Google Chromecast

RickMote Controller - Hijacking TVs via Google Chromecast
Video Demo - using Bishop Fox's "RickMote Controller" to wirelessly hijack someones nearby TV by taking over their Google Chromecast.
Learn More
Customer Stories

August: Built-in Security in IoT Devices

August: Built-in Security in IoT Devices

Secured a new voice-enabled speaker at launch by integrating security testing into every stage of development.

Read Story
Resource

ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast

ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast
This presentation will demonstrate how to hijack a Google Chromecast on any network to play videos of your choosing. Let no TV be safe.
Learn More
Resource

RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief

RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief
The Tastic RFID Thief can be concealed in a briefcase or messenger bag, and used to silently steal the proximity badge information from an unsuspecting employee as they physically walk near the concealed device. Learn how to get full coverage of all pockets as you walk by your target.
Learn More
Resource

Microsoft BlueHat v8 - Real World Code Review

Microsoft BlueHat v8 - Real World Code Review
This presentation provides a thorough and objective review of the benefits, shortcomings, and trade-offs of static code analysis tools, black box application scanners, and expert analysis.
Learn More
Resource

Mozilla Security Blog - Threat Modeling Using Trike

Mozilla Security Blog - Threat Modeling Using Trike
Threat modeling is heavily used by the Mozilla Security team in order to analyze potential threats and weaknesses in Firefox and also our other systems, such as addons.mozilla.org, browserID, etc. This video highlights the Trike methodology for threat modeling.
Learn More
Resource

UAT - What Palpatine Can Teach About Pentesters

UAT - What Palpatine Can Teach About Pentesters
Learn about the differences in skill sets and qualities that make a good pen tester.
Learn More
Resource

BayThreat - Where To Start When Securing A Startup?

BayThreat - Where To Start When Securing A Startup?
This presentation will give you actionable tips on where to start when securing a startup, and how to bridge the gap between your small company and a Fortune 1000 company you want to secure as a client.
Learn More
Resource

Black Hat USA 2005 - Catch Me If You Can

Black Hat USA 2005 - Catch Me If You Can
Prepare to watch trusted forensics tools crumble. James C. Foster and Vincent T. Liu share over eighteen months of continued private forensic research, including ground-breaking vulnerabilities and key weaknesses in some of the most popular tools used by forensic examiners.
Learn More
Resource

HP Webinar-Harness the Power of Agile

HP Webinar-Harness the Power of Agile

Watch this webinar and learn how organizations have harnessed the power of Agile.

Learn More
Resource

Black Hat USA 2011 - Pulp Google Hacking

Black Hat USA 2011 - Pulp Google Hacking
We once again tear down the basic assumptions about what Google/Bing Hacking is and the extent to which it can be exploited to target organizations and even governments.
Learn More
Resource

DEF CON 20 (2012) - Tenacious Diggity

DEF CON 20 (2012) - Tenacious Diggity
Check out all brand new tool additions to the Google Hacking Diggity Project - The Next Generation Search Engine Hacking Arsenal. We explore these tools and more in this DEMO rich presentation.
Learn More
Resource

RFID Hacking: Distance Limitation - Proxmark3

RFID Hacking: Distance Limitation - Proxmark3
Distance limitation of traditional RFID hacking tools. Stealing card info with the Proxmark3.
Learn More
Resource

RFID Hacking: Intro to Tastic RFID Thief

RFID Hacking: Intro to Tastic RFID Thief
Introducing the TasticRFID Thief - a long range RFID hacking tool.
Learn More
Resource

RFID Hacking: Look at Insides - Tastic RFID Thief

RFID Hacking: Look at Insides - Tastic RFID Thief
Take a closer look at the insides of the Tastic RFID Thief.
Learn More

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.