My Invisible Adversary: Burnout
40:39
Black Hat USA 2024 - Short Reel
0:19
Пікірлер
@naranggakhoirulutama422
@naranggakhoirulutama422 2 күн бұрын
good information, helpful video
@MouatassimMajhoul
@MouatassimMajhoul 4 күн бұрын
Why not dissassemble with nanoscope ?
@tkothadev
@tkothadev 8 күн бұрын
22:26 ok this part genuinely looks like what you would see in hollywood movies
@electronikeur6741
@electronikeur6741 12 күн бұрын
I discover this talk and love it some ten years after.
@user-yi4ef2gk1o
@user-yi4ef2gk1o 17 күн бұрын
Great video you are the MAN Matt😁
@ChaplainDaveSparks
@ChaplainDaveSparks 18 күн бұрын
When you mentioned _"came in with a B-210"_ ... I'm just old enough to think of a certain 1970s era *Datsun* (before it was rebranded as _"Nissan'.)_ Now all we need is for someone to hack _Microsoft Flight Simulator_ to import realtime ADS-B data ...
@ChaplainDaveSparks
@ChaplainDaveSparks 18 күн бұрын
That encryption scheme - maybe the _”Puzzle Palace”_ should take notes … Just kidding - sort of. Or maybe .. it’s so _”ridiculous”_ that it might be useful because no one would suspect such a naive implementation. (Or use something _”super secure”,_ like *ROT13.)*
@KatyYoder-cq1kc
@KatyYoder-cq1kc 21 күн бұрын
NOW on LIFE SUPPORT: All militia, governments, supremacists, and communists: Cease and desist all malicious use of AI against myself and my family. We are not your property
@mikehibbett3301
@mikehibbett3301 23 күн бұрын
They aren't secret, they are just side effects of the hardware.
@Queenema-yd4lq
@Queenema-yd4lq 27 күн бұрын
WHITEDUMPS thanks for put me thru with apple method + cc-fullz, I was able to hit easily without op required glad on easy cash out steps you walk me thru. hit twice and still hitting
@Karlavaegen
@Karlavaegen Ай бұрын
It's obvious that you dont know what you are talking about... but anyway, hope you have learned anything during the joureny. Please tell what qVSDC is in terms of EMV
@i.am.abhi747
@i.am.abhi747 Ай бұрын
Found this after lot of digging after 9 years
@bbuggediffy
@bbuggediffy Ай бұрын
Is this still valid? Calling over Wifi was deprecated some time in 2021 am I right?
@olbluelips
@olbluelips Ай бұрын
Still my favourite talk
@caliniaru1673
@caliniaru1673 Ай бұрын
Very good research. Thank you!
@thakursahabofficial7377
@thakursahabofficial7377 Ай бұрын
that a important information given by you SIR ....thankyou
@abdougaming9905
@abdougaming9905 Ай бұрын
Great content🔥
@subxi5744
@subxi5744 Ай бұрын
34:16 - Not entirely true. You can actually use `PAGE_READWRITE` during the mem alloc phase, write the code and then switch the permission to `PAGE_EXECUTE_READ` using `VirtualProtectEx`. This method provides you with a RW buffer for data copy which becomes an RX buffer for execution. By the way, malfind is dependent on `vadinfo` plugin, `vadinfo` shows the original protection only, meaning you'll not see the `PAGE_EXECUTE_READ` memory segment, so there's that. EDIT: Props to Monnappa for this demonstration. Not many people have the guts to demonstrate and explain such topics.
@DROPSHIPCAPTAIN
@DROPSHIPCAPTAIN Ай бұрын
Cool!
@arashinoatode
@arashinoatode Ай бұрын
such simple presemtation. loved it
@apple.3947
@apple.3947 Ай бұрын
what the fuck is this.
@blitzkrieg19397
@blitzkrieg19397 Ай бұрын
16:06
@lingdatang669
@lingdatang669 2 ай бұрын
29:29 BOOKmark
@Koenfred19
@Koenfred19 2 ай бұрын
Is there a Adguard or Pihole blocklist for the domain's of pegasus so Day2Day users can have a extra (Little) layer of protection against them?
@lingdatang669
@lingdatang669 2 ай бұрын
24:14 bookmark
@0xbitbybit
@0xbitbybit 2 ай бұрын
Would be interested to see how the first phase was done, how the "light bulb" strings are actually generated, I get they are different function calls but what the process looks like and the tools used and how it's actually done would be good to see!
@CyberDeck-pg7sf
@CyberDeck-pg7sf 2 ай бұрын
Is it possible to get the sample you are analyzing ?
@florencetown4024
@florencetown4024 2 ай бұрын
05:00
@miralnuruyev9177
@miralnuruyev9177 2 ай бұрын
Up
@DerIchBinDa
@DerIchBinDa 2 ай бұрын
"Intel has a 95% market share" - oh boy did that not age well 😅
@Lou-sassole3
@Lou-sassole3 2 ай бұрын
Oh hell yea
@michaeldula462
@michaeldula462 3 ай бұрын
Interesting. Even if this is more than 2 decades old, it's still applicable today.
@ack1299
@ack1299 3 ай бұрын
Very insightful session. Thanks a lot!
@marianarlt
@marianarlt 3 ай бұрын
Cat tries to eat plushy fish: 80mio views in two days Very good in-depth talk about the technologies that run our world that are still valuable years later:
@KatyYoder-cq1kc
@KatyYoder-cq1kc 3 ай бұрын
All militia, governments, white supremacists, and communists: Cease and desist all malicious use of AI against myself and my family. We are not your property.
@GullKhan006
@GullKhan006 3 ай бұрын
Am from Pakistan 🎉
@GullKhan006
@GullKhan006 3 ай бұрын
I love My heroes ❤
@jimmyblaze_4115
@jimmyblaze_4115 3 ай бұрын
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications or even Pegasus.
@jimmyblaze_4115
@jimmyblaze_4115 3 ай бұрын
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications.
@jimmyblaze_4115
@jimmyblaze_4115 3 ай бұрын
I'm suffering terrorism issues in Sudbury Ontario they are using SSL or tsl packets and illegal communications.
@OhMyVideology
@OhMyVideology 3 ай бұрын
Great talk
@shubham_srt
@shubham_srt 3 ай бұрын
ayoooo
@shubham_srt
@shubham_srt 3 ай бұрын
i am late af
@ihacksi
@ihacksi 4 ай бұрын
Best memory forensics presentation ever! Thank you sir!
@Shinesunny-sg6qc
@Shinesunny-sg6qc 4 ай бұрын
a good idea about treat definder
@tcmatg
@tcmatg 4 ай бұрын
legend
@iocan1693
@iocan1693 4 ай бұрын
Improve ur english or speak with a translator. Impossible to listen to. Shame because its an interesting topic
@reverse_meta9264
@reverse_meta9264 4 ай бұрын
Ad-hoc - allow devices to connect to each other (not that commonly used) as opposed to connecting to central AP 08:43 Discovery (how 802.11 discovery works) 10:25 Discovery on peer-to-peer network, find the P2P group owner Need active scanning, passive scanning will not work 13:00 looking at probe response packet as seen in wireshark 14:50 P2P service discovery
@Thedude897
@Thedude897 4 ай бұрын
Radar based pin detection! WTF
@tippimaravala
@tippimaravala 4 ай бұрын
how come medical hackers never asked me
@sunshinenewday8195
@sunshinenewday8195 4 ай бұрын
How can I block ultra sonic frequency attack they are using some kind of high noise?