**Summary:** The video discusses a talk given by Mikov, a senior security researcher, regarding a zero-click remote code execution vulnerability demonstrated on the Alpine H9 infotainment system at a security competition in Tokyo. The presentation covers Bluetooth internals, the exploitation process…
Category: Youtube
// Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: https://www.youtube.com/channel/UC1szFCBUWXY3ESff8dJjjzw/join
// Courses //
Full Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Web Ethical Hacking Course: https://www.udemy.com/course/full-web-ethical-hacking-course/
Full Mobile Hacking Course: https://www.udemy.com/course/full-mobile-hacking-course/
// Books //
Kali Linux Hacking: https://amzn.to/3IUXaJv
Linux Basics for Hackers: https://amzn.to/3EzRPV6
The Ultimate Kali Linux Book: https://amzn.to/3m7cutD
// Social Links //
Website: https://www.loiliangyang.com
Facebook: https://www.facebook.com/Loiliangyang/
Instagram: https://www.instagram.com/loiliangyang/
LinkedIn: https://www.linkedin.com/in/loiliangyang/
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
Build your Hacker Dropbox with Twingate (it’s free): https://ntck.co/twingate_ztna
In this video, we’re building a Hacker Dropbox, a device that can be dropped into any network and give us remote access. This can pretty much be any device, including a Raspberry Pi…which is what I’ll be showing you. And no….it’s not using VPN, it’s ZTNA (Twingate) which is much more secure and easier to setup. Why do this? If you’re like me, you are by default the helpdesk support of every circle you’re in. I am that for my church, my parents, my grandma…and I need a very quick and easy way to remotely access these networks…even when I don’t know the subnet info. This is where the Hacker Drop box comes in handy, operating as a magic device for remote IT support. It also doubles as a penetration testing tool, giving pentesters easy access to a remote network in seconds.
RESOURCES:
📝GUIDE/WALKTHROUGH: https://ntck.co/hackerdropbox
💻 Raspberry Pi Imager: https://www.raspberrypi.com/software/
🛒 Buy a Raspberry Pi:
Raspberry Pi 4: https://geni.us/mzJF55
Raspberry Pi 5: https://geni.us/z0BVIc
📚 Exploring Twingate APIs: https://www.twingate.com/docs/exploring-the-apis
📖 Twingate Quick Start Tutorial: https://www.twingate.com/docs/quick-start
🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy
**Sponsored by Twingate
SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership: https://ntck.co/Premium
☕☕ COFFEE and MERCH: https://ntck.co/coffee
Check out my new channel: https://ntck.co/ncclips
🆘🆘NEED HELP?? Join the Discord Server: https://discord.gg/networkchuck
STUDY WITH ME on Twitch: https://bit.ly/nc_twitch
READY TO LEARN??
—————————————————
-Learn Python: https://bit.ly/3rzZjzz
-Get your CCNA: https://bit.ly/nc-ccna
FOLLOW ME EVERYWHERE
—————————————————
Instagram: https://www.instagram.com/networkchuck/
Twitter: https://twitter.com/networkchuck
Facebook: https://www.facebook.com/NetworkChuck/
Join the Discord server: http://bit.ly/nc-discord
AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear: https://geni.us/L6wyIUj
Amazon Affiliate Store: https://www.amazon.com/shop/networkchuck
Buy a Raspberry Pi: https://geni.us/aBeqAL
Do you want to know how I draw on the screen?? Go to https://ntck.co/EpicPen and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud: https://hostifi.com/?via=chuck
How to Use a Raspberry Pi to Access Any Network
The Raspberry Pi Hack for Secure Network Access
Access Remote Networks with Twingate and Raspberry Pi
Set Up a Raspberry Pi for Secure Remote Access
Unlock Any Network Using Twingate and Raspberry Pi
Raspberry Pi + Twingate: The Perfect Network Hack
How to Find IP Addresses with a Raspberry Pi and Twingate
Hacking Networks Securely with Raspberry Pi and Python
Free Remote Access with Twingate and Raspberry Pi
Raspberry Pi Networking Secrets: Secure Remote Access
Create a Portable Network Access Device with Raspberry Pi
Twingate Makes Raspberry Pi Remote Access Easy
DIY Network Hacking Device with Raspberry Pi
Raspberry Pi Remote Access Hack Tutorial
Securely Access Your Network Anywhere with Raspberry Pi
Twingate and Raspberry Pi: Secure Network Entry
Build a Free Network Access Tool with Raspberry Pi
Raspberry Pi Hacks for Network Security and Access
Custom Python Script to Access Any Network Remotely
Why Twingate + Raspberry Pi Is a Game-Changer
#RaspberryPi #Twingate #NetworkAccess
Follow along → https://ibm.biz/BdGXxn
In this tutorial, you will use IBM® Docling and open source Granite™ 3.1 to perform document visual question answering for various file types.
AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM → https://ibm.biz/BdGXxb
Summary: The video discusses a presentation by a reverse engineer at Hexacon, who shares insights on vulnerabilities found in older video games, specifically focusing on the multiplayer aspects of Neverwinter Nights. The speaker introduces old game bugs, describes how these vulnerabilities can lead…
**Summary:** The video discusses a detailed analysis of vulnerabilities in the Tesla Model 3’s VCC (Vehicle Control Computer) ECU by security researchers David Bar and his team. This research focuses on a specific exploitation involving the Tire Pressure Monitoring System (TPMS). Through reverse eng…
Get 20% off DeleteMe US consumer plans when you go to https://joindeleteme.com/seytonic and use promo code SEYTONIC at checkout.
DeleteMe International Plans: https://international.joindeleteme.com/
0:00 Intro
0:32 Is Telegram Really a Criminal’s Paradise?
4:21 DeleteMe
5:36 Android Malware Swipes Your Credit Card’s NFC Data
8:20 Will TP-Link Be Banned?
Sources:
https://www.404media.co/how-telegrams-founder-pavel-durov-became-a-culture-war-martyr/
https://prestonbyrne.com/2024/08/24/thoughts-on-the-durov-arrest/?ref=404media.co
https://www.welivesecurity.com/en/eset-research/ngate-android-malware-relays-nfc-traffic-to-steal-cash/
https://www.policie.cz/clanek/pozor-podvodnici-vymysleli-novy-system.aspx
https://selectcommitteeontheccp.house.gov/sites/evo-subsites/selectcommitteeontheccp.house.gov/files/evo-media-document/2024-08-13%20Letter%20to%20Commerce%20re%20TP-Link%20(filed).pdf
===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================
How Hackers Are Using Game Cheats to Steal Your Info
Listen to the full episode 🎙 Darknet Diaries Ep. 115: Player Cheater Dev Spy
#cybersecurity #podcast #cheating #rust
⬇️ OPEN FOR LINKS TO ARTICLES TO LEARN MORE ⬇️
@endingwithali →
Twitch: https://twitch.tv/endingwithali
Twitter: https://twitter.com/endingwithali
YouTube: https://youtube.com/@endingwithali
Everywhere else: https://links.ali.dev
Want to work with Ali? [email protected]
[❗] Join the Patreon→ https://patreon.com/threatwire
00:00 0 – Intro
00:12 1 – Take Downs of DDOS for Hire
01:39 2 – Microsoft LDAP At High Risk
02:48 3 – BADRAM fleeces AMD
05:04 4 – Outro
LINKS
🔗 Story 1: Take Downs of DDOS for Hire
https://www.europol.europa.eu/media-press/newsroom/news/law-enforcement-shuts-down-27-ddos-booters-ahead-of-annual-christmas-attacks
https://www.theregister.com/2024/12/12/operation_poweroff_ddos_takedowns/
🔗 Story 2: Microsoft LDAP At High Risk
https://www.securityweek.com/microsoft-ships-urgent-patch-for-exploited-windows-clfs-zero-day/
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-49112
🔗 Story 3: BADRAM fleeces AMD
https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3015.html
https://badram.eu/badram.pdf
https://www.amd.com/en/developer/sev.html
https://www.securityweek.com/badram-attack-uses-10-equipment-to-break-amd-processor-protections/
—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆—–☆
Our Site → https://www.hak5.org
Shop → http://hakshop.myshopify.com/
Community → https://www.hak5.org/community
Subscribe → https://www.youtube.com/user/Hak5Darren?sub_confirmation=1
Support → https://www.patreon.com/threatwire
Contact Us → http://www.twitter.com/hak5
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Summary: The video discusses the opening remarks of Hexacon, an offensive cybersecurity conference held in Paris. The founder, Renault, emphasizes the importance of community, the focus on advanced research, and the significance of maintaining a smaller, intimate attendee count to foster connections…
HEXACON2024 – Cross-CPU Allocation to Exploit Preempt-Disabled Linux Kernel by Mingi Cho & Wongi Lee
The video discusses utilizing cross CPU allocation to exploit Linux kernel vulnerabilities, specifically focusing on two exploits related to NF tables and the traffic control subsystem. The speakers, identified as vulnerability researchers, explain their processes and techniques for identifying and…
The video discusses the AMD Silo vulnerability, a significant architectural flaw affecting System Management Mode (SMM) in AMD processors. Presenters Sri Nim and G. Christopher Kopski explain how this vulnerability allows arbitrary code execution with high privileges, evading detection by operating…
Go checkout my video: https://youtu.be/An4IapvutzM
Learn more about artificial intelligence → https://ibm.biz/BdGX3z
Is pre-training a thing of the past? In Episode 34 of Mixture of Experts, host Tim Hwang is joined by Abraham Daniels, Vagner Santana and Volkmar Uhlig to debrief this week in AI. First, OpenAI cofounder Ilya Sutskever said that “peak data” was achieved, does this mean there is no longer a need to model pre-training? Next, IBM released Granite 3.1 with a slew of features, we cover them all. Then, there is a new way to steal AI models, how do we protect against model exfiltration. Finally, can NVIDIA Jetson for AI developers really increase hardware accessibility? Tune-in for more!
Subscribe for AI updates → https://ibm.biz/BdGX3q
Segments:
00:01 — Intro
00:49— Is pre-training over?
10:25 — Granite 3.1
22:23 — AI model stealing
33:38—NVIDIA Jetson
The opinions expressed in this podcast are solely those of the participants and do not necessarily reflect the views of IBM or any other organization or entity.
Summary: The video discusses the Windows Clip Service, specifically focusing on the Client Licensed Platform (CLIP) and its System Policy (CPSP). Philip Lett, a researcher at Cisco Talos, explains the architecture and functions of CPSP, the process of reversing it, and the vulnerabilities discovered…