Want to play with AI technology yourself? Explore our interactive demo β†’ https://ibm.biz/BdaR4j
Explore IBM iX β†’ https://ibm.biz/BdaR4Z

Join Amanda Downie on a journey into the world of augmented reality. In this comprehensive introduction, she covers the basics of AR, its differences from other technologies, and its potential to transform industries and daily life. From enhanced product visualization to seamless omnichannel experiences, discover how AR can revolutionize the way you interact with the world around you.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdaR4Y

Read More

Malware Development is not only for shellcode runners, it is also for creating exploits and C2 frameworks. Join me on this stream where we continue the series of Mythic C2 agent development! We are getting closer and closer to the end goal of having a nice and easy powershell beacon.

πŸš€ In this stream, you’ll learn:

* How to debug your code
* How to code with step by step approach
* The fundamentals of C2 frameworks and how they are used in penetration testing.
* Step-by-step malware development techniques tailored for ethical hacking.
* How to customize a Mythic C2 agent to suit specific red team operations.
* Best practices for ensuring operational security (OPSEC) while using C2 frameworks.

SUPPORT MY WORK BY BECOMMING PATREON
—————————————————
https://patreon.com/Lsecqt

⚠️ DISCLAIMER: This video is for educational purposes only. The techniques demonstrated are intended solely for ethical hacking and lawful security testing on systems where you have explicit permission. Always follow legal guidelines and obtain proper authorization before conducting any security tests.

If you’re interested in deepening your knowledge of cybersecurity, ethical hacking, or just want to see what goes into creating a powerful C2 agent, this stream is for you! Don’t forget to like, comment, and subscribe for more content on ethical hacking, penetration testing, and advanced cybersecurity topics.

#EthicalHacking #MythicC2 #MalwareDevelopment #RedTeam #Cybersecurity #C2Agent #PenetrationTesting #LiveCoding

FOLLOW ME
—————————————————
Patreon: https://patreon.com/Lsecqt
Twitter: https://twitter.com/lsecqt
Twitch: https://www.twitch.tv/lsecqt
Reddit: https://www.reddit.com/user/lsecqt
Medium: https://medium.com/@lsecqt
Support my Work: https://www.buymeacoffee.com/lsecqt
Red Teaming Army Discord Server: https://discord.gg/dWCe5ZMvtQ Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/
Red Teaming Army Blog: https://lsecqt.github.io/Red-Teaming-Army/

malware development
maldev
creating c2 agent
coding malware
hacking
ethical hacking

Read More

Part 6 continues to explore runtime-linking by seeing how Lockbit not only uses the EXPORT_DIRECTORY structure to find APIs, but also how it uses the DLL name seed to compute the checksum values to identify necessary APIs.

Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

0:38 Seed from DLL name
1:20 Computing checksum from API name
4:00 Getting the API name
4:36 Using the export directory structure
5:40 Starting in the export directory
8:00 Debugging to see API names
10:09 When a precomputed value matches
12:00 Easy button to find APIs

Read More

Want to learn more about hacking? Checkout our courses on https://www.hextree.io (ad)

I have spent many hours looking at the webp vulnerability used in the 0day attack against iPhones. In the past videos we have seen why fuzzers have a hard time finding the issue, so I wanted to understand how this was discovered. And I think I have a good theory!

Part 1: Huffman Tables https://youtu.be/lAyhKaclsPM
Part 2: Fuzzing libwebp https://youtu.be/PJLWlmp8CDM

Sources:
https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html
https://github.com/seemoo-lab/frida-scripts/blob/main/scripts/libdispatch.js
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://github.com/libjxl/libjxl/blob/4b9dbde293f7f282b6952a02340300abfca2b184/lib/jxl/huffman_table.cc#L51
https://github.com/webmproject/libwebp/blob/7861947813b7ea02198f5d0b46afa5d987b797ae/src/dec/vp8l_dec.c#L86C3-L86C76
https://github.com/Tencent/mars/blob/9ab46e19ed3d4fcafe9d0de4b36547321f5ead83/mars/comm/windows/zlib/inftrees.h#L41
https://github.com/google/brunsli/blob/master/c/enc/jpeg_huffman_decode.h#L20

00:00 – Intro
01:18 – The iPhone Remote Attack Surface
02:49 – Targeting iMessage
04:04 – Dangerous Parsing / BlastDoor
06:53 – Image I/O and libwebp
08:11 – A Pattern of Image Vulnerabilities
09:28 – Huffman Tables are Everywhere!
10:50 – My Theory: known issue with enough.c
13:50 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tv/LiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

IBM Granite β†’ https://ibm.biz/BdaEaE
Learn more about AI solutions β†’ https://ibm.biz/BdacW9

This video, presented by Suj Perepa, discusses the importance of choosing the right type of generative AI model for business applications. The video focuses on the Granite models, which are particularly good for end-users and employees to automate daily tasks. The video covers various abilities of the Granite models, including Q&A, text generation, extraction, summarization, and classification, as well as their capabilities in multiple languages and code generation.

AI news moves fast. Sign up for a monthly newsletter for AI updates from IBM β†’ https://ibm.biz/BdacWC

Read More

Get 20% off DeleteMe US consumer plans when you go to https://joindeleteme.com/seytonic and use promo code SEYTONIC at checkout.
DeleteMe International Plans: https://international.joindeleteme.com/

0:00 Intro
0:13 US Special Forces Run WiFi hacking Drills
2:25 Deleteme
3:29 Fake OnlyFans Tools
5:19 How Not to Extort Your Employer

===============================================
My Website: https://www.seytonic.com/
Follow me on TWTR: https://twitter.com/seytonic
Follow me on INSTA: https://www.instagram.com/jhonti/
===============================================

Read More

Some of the most common questions prospective customers have about working with hackers are β€œHow do I know I can trust hackers?” and β€œHow do I retain control of my environment?” HackerOne human-powered security program is the most trusted in the industry.

See why how our customers love working with the ethical hacker community at: https://www.hackerone.com/product/how-human-powered-security-works

Read More

Learn why using a compiled language can enhance your malware development skills in this detailed video. We cover the benefits of compiled languages in creating more effective and undetectable malware. This tutorial is perfect for those interested in malware creation, ethical hacking, and understanding the impact of programming languages on malware efficacy. #CompiledLanguage #MalwareDevelopment #EthicalHacking #CyberSecurity #Malware

Compiled Language
Malware Development
MalDev
Ethical Hacking
Cyber Security
Programming for Hackers
Malware Creation
Malware Analysis
Hacking Techniques
Penetration Testing
Cyber Security Tips
Exploit Development
Offensive Security
Malware Programming
Ethical Hacker Guide
Security Research
Programming Languages
Hacking Tutorial
Cyber Threats
Advanced Hacking
Cybersecurity Training
Malware Guide
Security Measures
Stealth Malware

Read More

Discover how to save time and resources by accurately identifying false positives and analyzing clean files. Karsten Hahn joins the live stream to share real-world examples and actionable tips to improve your malware analysis workflow.

πŸ”₯ Join this channel to get access to perks:
https://www.youtube.com/channel/UCI8zwug_Lv4_-KPT62oeDUA/join

Cybersecurity, reverse engineering, malware analysis and ethical hacking content!
πŸŽ“ Courses on Pluralsight πŸ‘‰πŸ» https://www.pluralsight.com/authors/josh-stroschein
🌢️ YouTube πŸ‘‰πŸ» Like, Comment & Subscribe!
πŸ™πŸ» Support my work πŸ‘‰πŸ» https://patreon.com/JoshStroschein
🌎 Follow me πŸ‘‰πŸ» https://twitter.com/jstrosch, https://www.linkedin.com/in/joshstroschein/
βš™οΈ Tinker with me on Github πŸ‘‰πŸ» https://github.com/jstrosch
🀝 Join the Discord community and more πŸ‘‰πŸ» https://www.thecyberyeti.com

Read More

Want to learn more about hacking? Checkout our courses on https://www.hextree.io (ad)

I have spent many hours looking at the webp vulnerability used in the 0day attack against iPhones. In the past videos we have seen why fuzzers have a hard time finding the issue, so I wanted to understand how this was discovered. And I think I have a good theory!

Part 1: Huffman Tables https://youtu.be/lAyhKaclsPM
Part 2: Fuzzing libwebp https://youtu.be/PJLWlmp8CDM

Sources:
https://citizenlab.ca/2023/09/blastpass-nso-group-iphone-zero-click-zero-day-exploit-captured-in-the-wild/
https://googleprojectzero.blogspot.com/2019/08/the-fully-remote-attack-surface-of.html
https://googleprojectzero.blogspot.com/2020/01/remote-iphone-exploitation-part-1.html
https://googleprojectzero.blogspot.com/2021/01/a-look-at-imessage-in-ios-14.html
https://github.com/seemoo-lab/frida-scripts/blob/main/scripts/libdispatch.js
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://citizenlab.ca/2023/04/nso-groups-pegasus-spyware-returns-in-2022/
https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
https://github.com/libjxl/libjxl/blob/4b9dbde293f7f282b6952a02340300abfca2b184/lib/jxl/huffman_table.cc#L51
https://github.com/webmproject/libwebp/blob/7861947813b7ea02198f5d0b46afa5d987b797ae/src/dec/vp8l_dec.c#L86C3-L86C76
https://github.com/Tencent/mars/blob/9ab46e19ed3d4fcafe9d0de4b36547321f5ead83/mars/comm/windows/zlib/inftrees.h#L41
https://github.com/google/brunsli/blob/master/c/enc/jpeg_huffman_decode.h#L20

00:00 – Intro
01:18 – The iPhone Remote Attack Surface
02:49 – Targeting iMessage
04:04 – Dangerous Parsing / BlastDoor
06:53 – Image I/O and libwebp
08:11 – A Pattern of Image Vulnerabilities
09:28 – Huffman Tables are Everywhere!
10:50 – My Theory: known issue with enough.c
13:50 – Outro

=[ ❀️ Support ]=

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

2nd Channel: https://www.youtube.com/LiveUnderflow

=[ πŸ• Social ]=

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Streaming: https://twitch.tv/LiveOverflow/
β†’ TikTok: https://www.tiktok.com/@liveoverflow_
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/

Read More

Want to play with the technology yourself? Book a live demo β†’ https://ibm.biz/BdKNkG
Learn more about Shift-left testingΒ β†’ https://ibm.biz/BdKNkn

In this video, we explore the concept of Shift-Left Security, a software development methodology that integrates security into every stage of the development lifecycle. By shifting security left, developers can identify and address security vulnerabilities earlier, resulting in more secure and reliable software.
Learn more:
β€’Β Red Hat Advanced Cluster Security for Kubernetes β†’ https://ibm.biz/BdKNkp
β€’ Red Hat Trusted Software Supply Chain β†’ https://ibm.biz/BdKNk8

Read the Cost of a Data Breach report β†’ https://ibm.biz/BdKNkg

#SecurityLeadership #RiskManagement #Compliance #SecurityGovernance #DevOpsManagement

Read More