#Hacktivity2023 // AI Security
40:46
#Hacktivity2023 // Formshaker
34:07
Пікірлер
@rkkr9587
@rkkr9587 27 күн бұрын
I like it, one of the old recording.
@indietonne
@indietonne Ай бұрын
It was a great conference with really awesome people. Can‘t wait for 2025.
@travispatt907
@travispatt907 3 ай бұрын
Haha 35:00 is so cool! For some rudimentary clarification, if any of you guys remember downloading games off the net in the old days. They would put a cd-key on the game cover to prevent piracy. If you ever downloaded a "crack" to play the game (a patch essentially), what that does is it over writes the part of the code for the jump (JMP) operation to check the serial Key (CD-key). It replaces that part of the code with a NOP (No Operation) instruction. This prevents the program from jumping to the protection code (e.g., where it checks for the serial key), effectively bypassing the check. NOP's are nice because they take up the same amount of space as the instruction being replaced (so it doesn't affect the size of the program). No go out and play Starcraft for free you crazy 90's kids!
@ahmedbenalal191
@ahmedbenalal191 4 ай бұрын
Cheers to you akhi, well done!
@mohamedboublenza8207
@mohamedboublenza8207 5 ай бұрын
I'm proud of you brother
@logan0x
@logan0x 5 ай бұрын
how to download the slides ?
@fatm3at
@fatm3at 6 ай бұрын
where can I get this slide?
@hacktivityconf
@hacktivityconf 5 ай бұрын
Hi. We have contacted the presenter for the slides.
@fatm3at
@fatm3at 5 ай бұрын
@@hacktivityconf Thanks! looking forward to it!
@tamassari7529
@tamassari7529 6 ай бұрын
Szuper előadás volt! Köszönöm Péter!
@hacktivityconf
@hacktivityconf 5 ай бұрын
Nekünk is nagyon tetszett :)
@imca_b_5517
@imca_b_5517 6 ай бұрын
Thanks for information ❤
@MikeLitoris-h7s
@MikeLitoris-h7s 7 ай бұрын
Wow 500,000 devices that's insane I'm just now hearing about this
@Photoemulator
@Photoemulator 7 ай бұрын
The close captioning needs work mostly because the speaker has a significant accent, which makes the captioning process difficult. But it should have been checked.
@hacktivityconf
@hacktivityconf 5 ай бұрын
Thank you for the feedback. We forwarded this issue to the online media team for review.
@telecatsermaster
@telecatsermaster 7 ай бұрын
Excellent demonstration. Well done.
@JNET_Reloaded
@JNET_Reloaded 7 ай бұрын
voice is boring asf an cant even see screen that well pointless
@faucetcryptos8148
@faucetcryptos8148 7 ай бұрын
Muito bom! Uma tecnica bastante volatil, o poder dos socks proxys.
@g.s.3389
@g.s.3389 8 ай бұрын
that's why companies should have their own github or gitlab repository.
@d8rh8r35
@d8rh8r35 8 ай бұрын
Great talk man.. awesome
@TheCyberWarriorGuy
@TheCyberWarriorGuy 8 ай бұрын
:)
@ilovetensor
@ilovetensor 9 ай бұрын
There are bad guys every where, I dont know why they do this but this is really cruel to get over someone's open source. Really a great topic and a great video which requires more and more popularity so that it creates awareness.
@lancemarchetti8673
@lancemarchetti8673 9 ай бұрын
Brilliant
@TurkVladimir
@TurkVladimir 9 ай бұрын
Thanks Great Video
@AnilYadav-ce3gf
@AnilYadav-ce3gf 9 ай бұрын
Nice work. Is it ported on an actual ARM chipset?
@NAWAF-SUDO
@NAWAF-SUDO 9 ай бұрын
Pretty good video, We want more videos about AD.
@hacktivityconf
@hacktivityconf 8 ай бұрын
Thank you. We recommend the following one for you kzbin.info/www/bejne/hYLCp4qtqJV5gZI
@יקירזילברמן-ע5צ
@יקירזילברמן-ע5צ 9 ай бұрын
Really like the content, Yossi! One small question - you showed that after stealing the security token of a domain admin's WinRM process (initiated after logon type = network), you can not only impersonate the user on the local machine, but also over the network. Can you explain how is it possible? I thought that the TGT / NTLM hash is not stored on the remote machine when doing network logon, so what kind of information was relayed to the remote services which made them 'trust' they are indeed talking to the domain admin, after the impersonation?
@hacktivityconf
@hacktivityconf 8 ай бұрын
Your question has been relayed to the speaker.
@imca_b_5517
@imca_b_5517 9 ай бұрын
Thank you so much for providing valuable information ❤
@imca_b_5517
@imca_b_5517 9 ай бұрын
Great information ❤
@w3w3w3
@w3w3w3 10 ай бұрын
very interesting, thanks
@pwnonymous
@pwnonymous 10 ай бұрын
what a bountiful lesson from a grade A professional!
@knoblauchhorst9405
@knoblauchhorst9405 10 ай бұрын
great talk!
@sotecluxan4221
@sotecluxan4221 10 ай бұрын
@nathanfitzpatrick3152
@nathanfitzpatrick3152 11 ай бұрын
Would like hear his thoughts on the Pmkid attack!
@user-vg5rv5xf4u
@user-vg5rv5xf4u 11 ай бұрын
Ahhhh ahmmmmmm
@davidtchanga6470
@davidtchanga6470 Жыл бұрын
what is PTK sir ?
@LockSpaz
@LockSpaz Жыл бұрын
Great presentation; but I had to chuckle @ 7:05 when the key pins defied gravity and floated back up after their driver pins were set.
@ankurverma1157
@ankurverma1157 Жыл бұрын
Nice
@AlexPund
@AlexPund Жыл бұрын
HAHAHAAHA POPUP WINDOW BYPASS CRACK 2022
@dzxxbj
@dzxxbj Жыл бұрын
code properties graph???
@marcuswilliams3455
@marcuswilliams3455 Жыл бұрын
Wow, this presentation has been very informative. From ages ago, I always felt mainframe should be accessed only from the within the network, with limited access to the real world via proxies, security tunnels, etc. Yeah, mainframe security reminds like when you are locked outside your house, but then you realize the loopholes as to get in.
@vaster1142
@vaster1142 Жыл бұрын
He's funny 😂
@TsukiCTF
@TsukiCTF Жыл бұрын
Great talk!
@an0n_r0
@an0n_r0 Жыл бұрын
Thank you! :)
@huzifaahmed1426
@huzifaahmed1426 Жыл бұрын
still worth 💗💗💗
@tdsrtfgrshdty
@tdsrtfgrshdty Жыл бұрын
dgrhtjykgh
@night_xdrive
@night_xdrive Жыл бұрын
Zbs 🎉
@douro20
@douro20 Жыл бұрын
Péter Szőr, bless his soul ..he died very young... anyone know how he died?
@MohamedAfzal
@MohamedAfzal Жыл бұрын
great tool and very informative presentation
@kushakush8776
@kushakush8776 Жыл бұрын
Website name
@britox.6216
@britox.6216 Жыл бұрын
this man’s a legend
@GreddyCZ91
@GreddyCZ91 Жыл бұрын
second!
@patriciaukem5738
@patriciaukem5738 Жыл бұрын
Joe i love ya video soooooooooooooooooooooooo much
@gtworek
@gtworek 2 жыл бұрын
Thank you again for inviting ma and for your hospitability :)
@takedownccp
@takedownccp 2 жыл бұрын
china boy: privacy?