Tag: blackhat 2010
Blackhat 2010 Videos
by zitstif on Aug.24, 2010, under Posts, Videos
If there are any of you out there on the internet who are regularly reading my website, you may have noticed I haven’t updated in a while and this has been due to the fact that I’ve been busy with work and other aspects of life.
I still have projects in mind that I’m working on that I’d like to post but I haven’t made the time for them.
Without further ado, here are some links to videos of this years premier Blackhat 2010 Las Vegas security conference:
http://www.securitytube.net/Wardriving-the-Smart-Grid-(Blackhat-2010)-video.aspx
http://www.securitytube.net/SCADA-and-ICS-for-Security-Experts-(Blackhat-2010)-video.aspx
http://www.securitytube.net/Offensive-Python-for-Web-Hackers-(Blackhat)-video.aspx
http://www.securitytube.net/Jackpotting-Automated-Teller-Machines-Redux-(Blackhat-2010)-video.aspx
http://media.blackhat.com/bh-us-10/video/Keynote2/BlackHat-USA-2010-Keynote-Hayden.m4v
-
Welcome to #!/zitstif.no-ip.org/
-
Recent Posts
- Domain Controller/Active directory fix over Meraki VPN fix
- Cisco Meraki security is kind of a joke…
- IPMI EVERYWHERE! w/The Pi-KVM – Level1Techs
- 1283 A Lock Picking Game Changer (LockPickingLawyer)
- Portable virtual lab that fits in your pocket
- Pentesting with Evil WinRM – Practical Exploitation [mubix]
- command-not-found.com script
- Useful post regarding Office 365 security hardening
- Deepfake Technology
- kubernetes.io web terminal root shell
Calender
May 2022 S M T W T F S 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 Blogroll
- .:: Phrack Magazine ::.
- @GelosSnake
- /dev/ttyS0
- 100-hacking-tools-and-resources [hackerone.com]
- 2600: The Hacker Quarterly
- Academic Torrents
- Ansible is Simple IT Automation
- Anti Fraud News Blog | AntiFraudNews.com
- AppleExaminer Home
- Armis
- Atek – An open source peer-to-peer Home Cloud | Atek.Cloud
- Attack-Defense Online Lab
- Autonomous Red Teaming for Everyone | Prelude Operator
- BackBox Linux | Flexible Penetration Testing Distribution
- BackTrack Linux
- Binary Revolution Forums
- BIOS Master Password Generator for Laptops
- BleepingComputer.com
- Blog – Black Hills Information Security
- Blog – NotSoSecure
- Blog | GoSecure
- BREAKDEV
- ByteXD – Practical Tutorials for Web Developers & Entrepreneurs
- carnal0wnage.attackresearch.com
- Cisco Talos Intelligence Group
- Cloudflare
- CloudSecDocs
- Cockpit Project – Cockpit Project
- Command Line Kung Fu
- CommandLineFu
- Computer Forensics World
- Core Security Technologies (Blog)
- CrowdSec: the next-gen open source, crowd-powered, & dynamic firewall
- Cryptome
- CS6038/CS5138 Malware Analysis, UC
- CVE security vulnerability database
- Cyber Arch Blog
- Dark Operator
- Dark Reading
- Darknet – The Darkside | Ethical Hacking
- DeCloudUS – Privacy DNS Blocks Google, Ads, and More
- Default Password List for Routers
- Default passwords list
- Digital Experience Monitoring | ThousandEyes
- Digital Forensiscs, Computer Forensics, eDiscovery | ForensicFocus.com
- DigitalMunition – Ethical Hacking & Computer Security
- Distributed Denial of Secrets
- DNS-based Content Filtering and Security (cleanbrowsing.org)
- Docker.com
- DSLReports Home Broadband ISP reviews, news, tools and forums
- DZone Security
- Electronic Frontier Foundation
- Exotic Liability
- Exploit Education
- Exploits Database by Offensive Security
- FingerprintJS Blog | FingerprintJS
- FOG Project
- Forensics Wiki
- Free RMM Tools for MSP and Small Businesses (action1.com)
- Ghetto Forensics
- Ghidra
- GNUCITIZEN
- Golem Network
- GRAVITL
- GTFOBins
- Guadicore: Cloud and Data Center Security Simplified
- Guardicore
- Hack A Day
- HackerOne – Bug Bounty program
- HackerspaceWiki
- Hacking-Printers
- Hak5
- Handshake
- Hash Generator
- hdm.io
- HITB
- HolisticInfoSec
- Home – Virtue Security
- Home | OpenSCAP portal
- Homepage | CISA
- How-To Geek
- I2P Anonymous Network
- InfoSec Institute
- Infosec Island
- InfosecMatter
- Inj3ct0r – exploit database
- Innernet
- Insecure Magazine
- Inside Laura's Lab
- Instructables – Technology
- IPDS – Domain Name System for IPFS
- IronGeek
- iSecur1ty
- IT Security – stackexchange.com
- ITFlow
- James Brine – Australian Cyber Threat Intelligence
- Kali Linux
- Katacoda – Interactive Learning Platform for Software Engineers
- Keycloak
- KitPloit – PenTest Tools for your Security Arsenal
- Kon-boot
- Krebs On Security
- LaNMaSteR53.blog
- Learn Pentesting Online
- LibreNMS
- Lifehack – Tips for Life
- Lifehacker
- Linux Kodachi 6.2 The Secure OS
- Linux Security
- Live Hacking
- LiveOverflow – YouTube
- LMG Security
- MalwareTech
- Malwr – Malware Analysis by Cuckoo Sandbox
- Mandiant Blog
- MASS | Metal as a Service
- Metasploit Blog
- Metasploit Unleashed – Mastering the Framework
- MG
- MITRE ATT&CK
- MorningStar Security News
- Moxie Marlinspike >> Thoughtcrime Labs
- MSPGeek a free MSP Community for all Service Providers
- NETSEC – Ramblings of a NetSec addict
- news.ycombinator.com
- nixCraft – (www.cyberciti.biz)
- NTLM Decrypter
- Objective-See
- Offensive-Security
- Online LM hash cracking engine
- Online Password Hash Crack
- OpenBSD Router Guide
- OpenNIC Project
- OpenSecurity
- OpenSecurityTraining
- OpenWISP: Open Source Network Management System
- osquery | Easily ask questions about your Linux, Windows, and macOS Infrastructure
- osTicket | Support Ticketing system
- OWASP
- Packet Life
- PacketStorm Securtiy
- Parrot Security
- Passbolt | Open source password manager for teams
- PaulDotCom
- Penetration Testing and Vulnerability Analysis Polytechnic Insitute
- Penetration Testing Lab
- Pentester Academy TV – Youtube
- Pentester Academy: Learn Pentesting Online
- PenTestIT
- PentHertz Blog
- Peteris Krumins' Blog
- Pi-hole
- Pi-KVM – Open and cheap DIY IP-KVM on Raspberry Pi
- Portcullis Labs
- Pritunl, Enterprise Distributed OpenVPN, IPsec and WireGuard Server
- PrivacyTools – Encryption Against Global Mass Surveillance
- Project Honey Pot
- Project Zero (Google)
- Qubes OS: A reasonably secure operating system
- rConfig – Network Configuration Management!
- RiskIQ Community Edition
- Risky Business
- Routerpwn
- SaltStack: Home
- samy kamkar – home
- Sanesecurity signatures: improve ClamAV detection rate
- SANS Digital Forensics Blog
- SANS Penetration Testing Blog
- Schneier on Security
- SecLists
- SecLists
- secret club | Blog about reverse-engineering, hacking, and breaking your software in ever way
- Secure Data Recovery Services
- Security Awareness Training | KnowBe4
- Security Database Tools Watch
- Security Insights | AdaptiveMobile
- Security Research | mr.d0x
- Security Watch
- SecurityFocus
- SecurityTube.net
- SecurityTube.net Hack of the Day
- SentinelLabs – Intelligence Redefined
- Server Fault
- ServeTheHome: Server, Storage, and Software Reviews
- Sevro Security | SS
- Shell is coming …
- Shell.Systems – WE POP SHELLS
- Shelter Project
- shieldwall – secure your most private servers – shieldwall.me
- SHODAN – Computer Search Engine
- Signal >> Home
- Silent Break Security Blog
- SkullSecurity
- Slashdot
- Snipe-It Free open source IT asset management
- SNOsoft Research Team
- Social Engineering – Security Through Education
- SpiderFoot
- Spork: Peer-to-peer socket magic in the air | Spork.sh
- Spy Culture | Intelligence Agencies and Popular Culture
- Stack Exchange
- Stop Ransomware | CISA
- Sucuri Blog
- Super User
- T E X T F I L E S
- Tails OS
- Tailscale – private networks made easy
- Tales from a Security Professional
- The Black Vault
- The C2 Matrix
- The Citizen Lab – University of Toronto
- The Ethical Hacker Network
- The Exploit Database
- The Free Thought Project – Your online news and discussion platform
- The No More Ransom Project
- The Pragmatic Bookshelf
- The Shadowserver Foundation
- the world.according to koto
- the-infosec
- TheHive Project
- THN: The Hacker News
- threatpost | The First Stop for Security News
- TinyPilot
- Tools to explore BGP
- Top 100 Network Security Tools
- Tor Project | Anonymity Online
- TorBox – TorBox is an easy to use, anonymizing router based on Raspberry Pi.
- TrustedSec News and Events (Blog)
- tssci security
- Unmask Parasites. Blog.
- Veil – AV Evasion
- Ventoy – A New Bootable USB Solution
- VIPER VAST
- virtuallyGhetto
- VoidSec
- Volatile Systems Blog
- Vulners – Vulnerability Data Base
- War Room
- Welcome to Enable Sysadmin | Enable Sysadmin
- What is this? Red Teaming Experiments
- What's My Pass?
- WikiLeaks
- Will Hack For SUSHI
- Windows Command Line -CMD commands, command prompt, batch files, Powershell
- Wiz: Cloud infrastructure security reimagined
- Word List Downloads
- xorl
- ZeroTier – Global Area Networking