New: penetration-testingAll contenthive-129948hive-196917krsteemhive-183959zzanphotographyhive-180932hive-166405hive-185836uncommonlabhive-188619hive-144064hive-150122bitcoinhive-183397hive-101145krsuccesshive-124908lifehive-139150hive-145157hive-103599hive-181136hive-109690TrendingNewHotLikersnigelmarkdias (69)in hive-177070 • 3 years agosteemCreated with Sketch.AWARE7 at GISEC | AWARE7 GmbH | Full service awareness agency | Pentesting & Live Hacking | Matteo Große-Kampmann, Co-Founder & Managing Director, AWARE7AWARE7 at GISEC AWARE7 AWARE7 GmbH Full service awareness agency Pentesting & Live Hacking w: www.aware7.de e: [email protected] t: +49 (0) 209 8830 67 62 a: Munscheidstr. 14, 45886…cristi (70)in cybersecurity • 5 years agoWriting your Own Exploits as a PentesterIn this video I share my thoughts on the difficulty/feasibility of developing your own exploits as a penetration tester.sqlinsix (55)in stem • 6 years agosteemCreated with Sketch.Are Spam and Robocalls A Sign of A Future Hack?Many people have complained about a rise in spam or robocalls. Media have acted dismissive of these facts, but could these robo and spam calls be an indicator of a future attack. We discussed with…sqlinsix (55)in stem • 6 years agosteemCreated with Sketch.Technical Weaknesses Are Not Enough For Penetration TestsRecently, hackers found a way to abuse Microsoft support similar in architecture to the dreaded sim-swaps we see growing every year. While this comes as a shock to some, I've warned these…cristi (70)in experiment • 6 years agoWalkthrough for Quaoar - A Vulnerable Machine from VulnhubIn this video I exploit the vulnerable machine called Quaoar from vulnhub. My demonstrations usually go in two parts. Part one is about getting inside the server - so finding a way in. And part…cristi (70)in cybersecurity • 6 years agoWalkthrough for Bob - Part 2 [Vulnhub]This is the second part of my walkthrough for Bob, a vulnerable virtual machine from vulnhub. In the first part of this walkthrough I demonstrated how you get into the server, which was not a pretty…cristi (70)in cybersecurity • 6 years agoWhat is My Youtube Channel About - [Quick Update]So, in this video I discuss about my focus with my youtube channel in the next period of time. I'm not specifically defining the period of time, because the focus might change as I go along my…cristi (70)in cybersecurity • 6 years agoWalkthrough for Bob - A Vulnerable Machine [Vulnhub]Back again with another demonstration of penetration testing. In this video we're going through Bob, an easily exploitable machine from vulnhub. I've been doing a lot of demonstrations from…cristi (70)in cybersecurity • 6 years agoGoogle CTF 2018 - Livestream with Gynvael [Beginners]This ain't the first video of Gynvael that I recommend here. In my view, Gynvael Coldwind is one of the most knowledgeable figures in cybersecurity that I know of - who has a lot of hands-on…cristi (70)in cybersecurity • 6 years agoWalkthrough for Optimum - A Vulnerable Machine [HackTheBox]In this video I demonstrate how I exploit another vulnerable machine from HackTheBox. For those who don't know, HTB is a platform where cybersecurity people can grow their skills in a safe and legal…cristi (70)in cybersecurity • 6 years agoWeb Penetration Testing - 12 Part Series [Adrian Crenshaw Channel]Adrian Crenshaw, one of the greatest popularizer and person to bring awareness on cybersecurity has posted (a couple of years ago) on his channel the videos and demonstrations that were presented…cristi (70)in science • 6 years agoMethodology for Cybersecurity Bug Bounty Programs - [BugCrowd]The team at BugCrowd, a platform for bug bounty programs, has posted a series to help people interested in getting into the field. I would have to say, bug bounty is pretty lucrative when it comes…cristi (70)in cybersecurity • 6 years agoWalkthrough for SolidState - A Vulnerable Machine [HackTheBox]So far, I've been able to exploit about 20 servers from hackthebox.eu. In this video I demonstrate how I completely pwned (got into and escalated my privileges to the top user account) for the…cristi (70)in cybersecurity • 6 years agoThe VPNFilter Router Malware - What to Do if Infected [Talos]Folks at Talos Intelligence Group have made a public released of their research on the VPNFilter, a malware that targets wireless routers around the world. Their first public release about their…cristi (70)in cybersecurity • 6 years agoViolent Python Workshop - Prof. Sam Bowne [BSides]There's this popular book on penetration testing titled Violent Python. It's been written by T. J. O'Connor and was published in 2012. Professor Sam Bowne held a workshop at BSidesSF this April…cristi (70)in cybersecurity • 6 years agoWalkthrough for Blocky - A Vulnerable Machine [HackTheBox]This is probably one of the longest videos on my Youtube channel. Still waiting for @dtube to become a reliable platform (I've been waiting for months) so that I can keep uploading my videos there…cristi (70)in cybersecurity • 6 years agoTeaching myself Reverse Engineering - Lafarge CrackMe [RE Tutorial]One of the ways in which I teach myself reverse engineering is through hands-on practice. So, I take these binaries that are hosted on crackmes.one and I try to reverse them. In this context…cristi (70)in cybersecurity • 6 years agoWalkthrough for DerpNStink - A Vulnerable Machine from Vulnhub - [Part 2]In the previous demonstration, the first part of this walkthrough for DerpNStink vulnerable machine, we've managed to get inside the server by exploiting different services. Now, in this part, our…cristi (70)in cybersecurity • 6 years agoPractical Malware Analysis - Lecture 5 - [Prof. Sam Bowne]Ok, so if you've been following my stuff, you know that I'm into Professor Sam Bowne's course from the Community College of San Francisco. So far, we've been going through some basics in this…cristi (70)in cybersecurity • 6 years agoWalkthrough for Shocker - A Vulnerable Machine [HackTheBox]In this video I demonstrate how I get into and own a vulnerable virtual machine from hackthebox.eu. This box, as its name might suggest, is vulnerable to a shellshock exploit. For those who don't…