vulnerability

  • LinuxReverse Engineering 101 tutorial with the amazing Stephen Sims!

    Reverse Engineering 101 tutorial with the amazing Stephen Sims!

    Big thank you to Brilliant for sponsoring this video! To try Brilliant for free (for 30 days) and to get a 20% discount, visit: // YouTube video REFERENCE // Free Exploit development training (beginner and advanced) Buffer Overflow Hacking Tutorial (Bypass Passwords): // Stephen’s Social // X: YouTube: // Stephen RECOMMENDS // Disassemblers: Binary Ninja: IDA Pro: Ghidra: Free Learning…

    Read More »
  • VMwareCritical VMware ESXi Hypervisor Vulnerability

    Critical VMware ESXi Hypervisor Vulnerability

    The conversation discusses a vulnerability in VMware ESXi hypervisors that grants full admin privileges to threat actors. The vulnerability has been exploited by ransomware groups to deploy ransomware after gaining access to a network. The hosts emphasize the importance of patching systems and working with security teams or MSP/MSSPs to address the vulnerability. They also highlight the need for better…

    Read More »
  • Linuxresearchers find an unfixable bug in EVERY ARM cpu

    researchers find an unfixable bug in EVERY ARM cpu

    ARM is a great computer architecture with some great security features. In this video we talk about TikTag, a new attack that shows how one can use speculative execution to see the future. 🏫 COURSES 🏫 Learn to code in C at πŸ›’ GREAT BOOKS FOR THE LOWEST LEVELπŸ›’ Blue Fox: Arm Assembly Internals and Reverse Engineering: Practical Reverse Engineering:…

    Read More »
  • How Hackers Exploit Struts2 on Linux and Windows Servers

    The Jakarta Multipart Parser in Apache Struts 2 2.3.x before 2.3.32 and 2.5.x before 2.5.10.1 has incorrect exception handling and error-message generation during file-upload attempts allowing an attacker to execute code remotely. For more information, feel free to check our complete tutorial [ad_2] source

    Read More »
  • Enable and Use Windows Sandbox | Quick Setup Guide – FULL VIDEO (140 – 365)

    “Tired of third-party virtual machines? Learn to enable and use Windows Sandbox in Windows 10! Follow our quick setup guide to create a secure, isolated environment for testing software and visiting suspicious websites safely. Steps: Enable virtualization in BIOS Turn on Windows Sandbox via Control Panel Launch and use Windows Sandbox If you found this video helpful, share and subscribe…

    Read More »
  • Install Nessus for Free and scan for Vulnerabilities (New Way)

    Big thank you to Proton for Sponsoring the video! Get Proton Mail for FREE: // Videos REFERENCE // They’re watching you. Protect your online privacy!: // Nessus PDF // Nessus PDF: // David’s SOCIAL // Discord: X: Instagram: LinkedIn: Facebook: TikTok: YouTube: // MY STUFF // // SPONSORS // Interested in sponsoring my videos? Reach out to my team here:…

    Read More »
Back to top button