In this webcast, Trevin Edgeworth, Red Team Practice Director, will share key insights from decades of experience to help you determine whether Red Teaming is the right next step.
Unredacter Challenge: Shawn A.'s Solution
Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Shawn A. showcases his solution.
Unredacter Challenge: Alejandro's Solution
Challenge Accepted! We asked the security community to take Unredacter to the next level by decoding our secret blurred message. Watch as Alejandro showcases his solution.
Eyeballer: Automating Security Triage with Machine Learning
This easy-to-follow guide explores the capabilities of Eyeballer, a first-of-its-kind AI-powered pen testing tool.
SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns
Presented at Black Hat 2020, this presentation looks at the most pragmatic ways to continuously analyze your AWS environments and operationalize that information to answer vital security questions. Demonstrations include integration between IAM Access Analyzer, Tiros Reachability API, and Bishop Fox CAST Cloud Connectors, along with a new open source tool SmogCloud to find continuously changing AWS internet-facing services.
DerpCon 2020 - Demystifying Capture The Flags (CTF)s
Ham Hacks: Breaking into the World of Software Defined Radio
If you’re a hacker who has always been too afraid of RF protocols to try getting into SDRs, or you have a HackRF collecting dust in your closet, this talk will show you the ropes.
.NET Roulette: Exploiting Insecure Deserialization in Telerik UI
Demystifying Capture the Flags (CTFs)
DerpCon 2020 presentation on CTF formats, the skills they require, and the experience they develop.
Zigbee Hacking: Smarter Home Invasion with ZigDiggity
Finding Secrets In Publicly Exposed EBS Volumes
Network Penetration Testing Toolkit: Netcat, Nmap, and Metasploit Basics
Presentation from Day of Shecurity 2019 familiarizes you with the necessary tools to continue your ethical hacking journey.
Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone
Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox.
This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.