Videos Tagged with "Tools"

Bd07d58f0d31d48d3764821d109bf165

Open Source Security Tools You Could Be Using

August 17, 2012

Jeff Bardin, a Principal at Treadstone 71 LLC, shared a variety of open source tools that businesses and consumers can use can for “espionage, competitive intelligence, and intellectual property” purposes. Check out this video to find out more about these tools and what they can do...

Comments  (0)

6d117b57d55f63febe392e40a478011f

DefCon: Dan Tentler Discusses the Power of Shodan

August 02, 2012

Everyone knows routers, switches and servers are connected to the internet - but what else is out there? Has anybody even looked? Some of Dan's Shodan findings were pretty surprising, and these discoveries are an excellent metric for identifying how successful our security campaigns as an industry are...

Comments  (0)

6d117b57d55f63febe392e40a478011f

BlackHat 2012: Dave Porcello Discusses the Power Pwn

July 30, 2012

Dave Porcello, Founder and CEO of Pwnie Express discusses the recently released Power Pwn, a fully-integrated enterprise-class penetration testing platform, covering the entire spectrum of a full-scale pentesting engagement, from the physical-layer to the application-layer...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik on Hacking Tools and Ethics

April 20, 2012

Joshua Corman wrote a post in which he raises some valid points about tools like Metasploit. Naturally, the purpose such tools is to aid a security tester in finding vulnerabilities. However you cannot dictate if someone will use this for attack or defensive purposes...

Comments  (0)

99edc1997453f90eb5ac1430fd9a7c61

Javvad Malik Interviews Didier Stevens at Black Hat Europe

April 04, 2012

We had the pleasure of catching up with Didier Stevens at Black Hat Europe 2012, where he spoke to us about his latest tools and PDF vulnerabilities. Javvad's coverage of Black Hat Europe courtesy of Infosec Island and NETpeas...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Introduction to Bro Network Security Monitor

February 08, 2012

Great intro video to the Bro Security Network Analysis Framework by Richard Bejtlich. Bro is an amazing tool that gives you a summary of what is going on in your network. It creates text log files of connections, protocols, communications, and what it sees on the wire...

Comments  (0)

B64e021126c832bb29ec9fa988155eaf

Security Onion Intrusion Detection System Setup Tutorial

January 25, 2012

Run this on a system that has two network cards and you have a complete NSM/IDS. One NIC connects to your network or internet side of your traffic and monitors every packet, the second NIC connects to your LAN side and can be used to remotely view and monitor intrusion attempts...

Comments  (2)