Featured Resource

Bishop Fox Livestream at DEF CON 32

Join us for a livestream from DEF CON 32 to hear seasoned hackers and cybersecurity experts inspire and empower the tech community to reclaim the security landscape through active engagement and innovation.

Watch our Black hat usa 2015 bypass surgery abusing cdns with ssrf flash and dns video
Video

Black Hat USA (2015) - Bypass Surgery - Abusing CDNs with SSRF Flash and DNS

It is unlikely when a bug affects almost every CDN and it becomes vulnerable, but when this happens the possibilities are endless and potentially disastrous. This is a story of exploit development with fascinating consequences.
Watch our Def con 23 2015 rfidiggity pentester guide to hacking hf nfc and uhf rfid video
Video

DEF CON 23 (2015) - RFIDiggity - Pentester Guide to Hacking HF/NFC and UHF RFID

Have you ever attended an RFID hacking presentation and walked away with more questions than answers? This talk will finally provide practical guidance for penetration testers on hacking High Frequency (HF - 13.56 MHz) and Ultra-High Frequency (UHF – 840-960 MHz).
Watch our Brinks smart safe hacking video
Video

Brink's Smart Safe Hacking

It’s possible for a thief to plug a USB drive into Brink’s CompuSafe Galileo, automate hacking the safe, and steal the cash inside. Our video explains this exploit in under 60 seconds.
Watch our Airdroid exploit demo video
Video

AirDroid Exploit Demo

A vulnerability in the AirDroid application’s web interface made it possible for an attacker to essentially hijack a user’s phone. This video highlights the vulnerability’s implications and how an app’s permissions can become too pervasive.
Watch our Black hat usa 2014 cloudbots harvesting crypto coins like a botnet farmer video
Video

Black Hat USA 2014 - CloudBots - Harvesting Crypto Coins like a Botnet Farmer

In this presentation, we explore how to (ab)use free trials to get access to vast amounts of computing power, storage, and pre-made hacking environments.

Watch our Hope x 2014 rickrolling your neighbors with google chromecast video
Video

HOPE X (2014) - Rickrolling your neighbors with Google Chromecast

Take control over your neighbors’ TVs like in the movies! This talk will demonstrate how to hijack any Google Chromecast – even if it’s behind a secure Wi-Fi network – to do your bidding.
Watch our Bsides lv 2014 untwisting the mersenne twister how i killed the prng video
Video

Bsides LV 2014 - Untwisting The Mersenne Twister: How I killed the PRNG

Untwister is a tool designed to help pentesters predict random number sequences when an application generates them using an insecure algorithm. This presentation focuses on weaponizing what used to be theoretical into our tool: untwister.
Watch our Rickmote controller hijacking tvs via google chromecast video
Video

RickMote Controller - Hijacking TVs via Google Chromecast

Video Demo - using Bishop Fox's "RickMote Controller" to wirelessly hijack someones nearby TV by taking over their Google Chromecast.
August Home customer story on IoT devices security. August: Built-in Security in IoT Devices.
Customer Story

August: Built-in Security in IoT Devices

Home Security Meets Cybersecurity to Secure Homes Without Introducing Backdoors to the Back Door.
Watch our Toorcon 15 2013 rickrolling your neighbors with google chromecast 2 video
Video

ToorCon 15 (2013) - Rickrolling your neighbors with Google Chromecast

This presentation will demonstrate how to hijack a Google Chromecast on any network to play videos of your choosing. Let no TV be safe.
Watch our Rfid hacking over the head move stealing badges w tastic rfid thief video
Video

RFID Hacking: Over-the-head Move - Stealing Badges w Tastic RFID Thief

The Tastic RFID Thief can be concealed in a briefcase or messenger bag, and used to silently steal the proximity badge information from an unsuspecting employee as they physically walk near the concealed device. Learn how to get full coverage of all pockets as you walk by your target.
Watch our Microsoft bluehat v8 real world code review video
Video

Microsoft BlueHat v8 - Real World Code Review

This presentation provides a thorough and objective review of the benefits, shortcomings, and trade-offs of static code analysis tools, black box application scanners, and expert analysis.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.