This class introduces students to the I2P and Tor Darknets. 2:69:23 YouTube/Archive.org 02/01/2014
I recorded this video twice. First time, the sound was hideous when the fan came on. I decided to re-record it and post both versions. I cover installing Nessus on Kali Linux and doing Nessus credentialed scans using Windows passwords and Linux SSH keys. 36.31 YouTube 01/17/2014
This is a class we did to introduce students to Metasploit at IU Southeast. Special guest lecturer Jeremy Druin (@webpwnize). To follow along, I recommend downloading Kali Linux. 2:26:56 YouTube/Archive.org 12/14/2013
Somehow I forgot to post these to this page last year. YouTube/Archive.org 03/13/2013
(should have been 2012)
This is the 8th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae (or other tools) for the Kentuckiana ISSA. This one covers SQLMap. 1:20:57 YouTube 02/11/2013
This is the 7th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae (or other tools) for the Kentuckiana ISSA. This one covers SQL Server Hacking. 1:37:34 YouTube/Archive.org
619.8MB 01/05/2013
This is Brent Salisbury talk on SDN and security for the Kentuckiana ISSA November meeting. Sorry about the sound, I need to get a mic next time. 54:36 YouTube/Archive.org
344.3MB 11/04/2012
This is the 5th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Metasploit. 1:06:12 YouTube/Archive.org 09/09/2012
This is the 4th in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Nessus, NeXpose and Metasploitable 2. 1:01:10 YouTube/Archive.org 08/05/2012
Here's my talk from the 2011 Nashville Infosec. This is more or less the description I sent them: "This talk will cover core items an attacker would want to locate and copy off of a Windows system, as well as what tools they would use to bypass weak security precautions like file system permissions and OS/BIOs passwords. Core date in this case would be things like stored passwords and wireless keys, but could also include network paths and the like. It will underscore the importance of physical security and hard drive encryption." 50:52 YouTube/Archive.org
This one is out of order. Somehow I put it on the front page, but forgot about adding it to this index. 09/16/2011
This is the 3rd in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers Traceroute and Scapy. 1:07:09 YouTube/Archive.org 06/02/2012
This is the 2nd in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. This one covers scanning Nmap, Hping, Amap, TCPDump, Metasploit, etc. 1:03:33 YouTube/Archive.org 05/12/2012
This is the first in a line of classes Jeremy Druin will be giving on pen-testing and web app security featuring Mutillidae for the Kentuckiana ISSA. Topics: Virtual Box Installation, Installing virtual machines, Configuring virtual networks - bridged, nat, hostonly, USB devices in virtual machines, Wireless networks in virtual machines, Installing Guest Additions, How to install Mutillidae in Windows on XAMPP, How to install Mutillidae in Linux Samurai 1:07:18 YouTube/Archive.org 04/07/2012
When I started the Mutillidae project it was with the intention of using it as a teaching tool and making easy to understand video demos. Truth be told, I never did as much with it as I intended. However, after Jeremy Druin (@webpwnized) took over the development it really took off. I have since come to find out he has been doing A LOT of YouTube video tutorials with Mutillidae, which he said I could share here. I will be copying his descriptions with slight editing and embedding his videos in this page. YouTube 03/15/2012
Hopefully this will give a nice visual illustration of how Electronic codebook (ECB) and Cipher-block chaining (CBC) work using AES-128 and OpenSSL. You can learn a lot from a known plain text, and repeating patterns. Inspired by labs from Kevin Benton & "Crypto Lab 1" SEED. YouTube/Archive.org 03/13/2012
Night 1
"How Do You Know Your Colo Isn’t "Inside" Your Cabinet, A Simple Alarm Using Teensy" by David Zendzian
"Bending SAP Over & Extracting What You Need!" by Chris John Riley
"ROUTERPWN: A Mobile Router Exploitation Framework" by Pedro Joaquin
"Security Is Like An Onion, That’s Why it Makes You Cry" by Michele Chubirka
"Five Ways We’re Killing Our Own Privacy" by Michael Schearer
Night 2
"Cracking WiFi Protected Setup For Fun and Profit" by Craig Heffner
"Passive Aggressive Pwnage: Sniffing the Net for Fun & Profit" by John Sawyer
"Ressurecting Ettercap" by Eric Milam
"Security Onion: Network Security Monitoring in Minutes" by Doug Burks
"Remotely Exploiting the PHY Layer" by Travis Goodspeed YouTube/Archive.org
02/05/2012
Includes:
Resurrection of Ettercap: easy-creds, Lazarus & Assimilation
Eric Milam - (Brav0Hax) &
Emilio Escobar
Media Hype and Hacks that Never Happened
Space Rouge
More than one way to skin a cat: identifying multiple paths to compromise a target through the use of Attach Graph Analysis
Joe Klein
Proper Depth / Breadth testing for Vulnerability Analysis and fun with tailored risk reporting metrics.
Jason M Oliver
Extending Information Security Methodologies for Personal User in Protecting PII.
John Willis
Stratfor Password Analysis
Chris Truncer
Intro To Bro
Richard Bejtlich
Javascript Deobfuscation
Glen Pendley YouTube/Archive.org
02/05/2012
I'm taking a security class were we had a lab on Unix/Linux file system permissions. I decided I might as well record it, and the steps taken, along with explanations as to what I was doing to set the permissions such as read, write, execute, SetUID, SetGID and the Stickybit. Kevin Benton created the lab, so I'd like to give him credit for inspiring me to do this video. 24:56 YouTube/Archive.org 01/21/2012
Thanks to Doug Burks for making building a Network Security Monitoring Server much easier. I mentioned Snort, Snorby, Barnyard, PulledPork and Daemonlogger in the title, but there is a lot more on the distro than that. This is a nice way to get an IDS up and running featuring pretty frontends without going into dependency hell. 20:53 YouTube/Archive.org
01/16/2012
This is Jeremy's talk from a recent ISSA meeting. In it he covers what the title says, showing off stealing of HTML 5 storage, injecting JSON, using Burp Suite, Muttillidae and some XSS attack fun. Sorry about the noise in the first bit, I had to set the camera up a ways off and it picked up my bag of chips better than it did Jeremy's talk. @webpwnized 54:31 YouTube/Archive.org
01/07/2012
This video was made to show some of the extra features of NetworkMiner Professional, like Pcap-over-IP, running on OS X under Mono, Export results to CSV / Excel, Geo IP localization, Host coloring support, and Command line scripting support. 11:47 YouTube 12/03/2011
A little while back Joe Hollingsworth and I were interviewed for an article in the Southern Indiana Business Source. The local Kiwanis club asked for a 25 min talk on the subject of the article, so we came up with this mandate:
Given only 25 minutes, tell us what a small business could do to help their security posture.
Well, it ended up being almost 40min and we did not get through all of the slides. The live video camera failed, so the audio in this video is what the laptop recorded. It may not be something most of my readers will be interested in, but it may help you present on a similar topic. 39:29 Youtube 8/20/2011
This is essentially the talk I gave at Defcon 19, but I had a little more time to cover the topic in this canned video:
Darknets/Cipherspaces such as Tor and I2P have been covered before in great detail. Sometimes it can be hard to follow attack strategies that have been used against them as the papers written on the topic have been academic and abstract. What this talk will attempt to do is step back and give an overview of the topic in a manner hopefully more conducive to the understanding of security practitioners, giving more concrete examples. While little to nothing in this talk will be "new and groundbreaking" it should lead to a better understanding of how encrypted anonymizing networks can be subverted to reveal identities. 1:00:43 YouTube/Archive.org 8/09/2011
Ohio Information Security Forum (OISF) Anniversary Event Videos
These are the presentations from the Ohio Information Security (OISF)
Anniversary Event. The descriptions are largely Ligatted from the
OISF website.
Endpoint Security Decisions - Kurt
Roemer
Defending against XSS - Jason Montgomery
Project
Ubertooth: Building a Better Bluetooth Adapter - Michael Ossmann
Making
Windows 7 SP1 32/64bit Boot CD/DVD/USBs with Winbuilder - Adrian Crenshaw
Cloud Computing Security - Dr. James Walden
7/19/2011
AIDE 2011
Conference Videos
These are the presentations from the AIDE
2011 conference at Marshall University. We had some issues early on with the
schedule not matching the talks, so descriptions are incomplete. The
descriptions I do have are largely Ligatted from the
AIDE website.
Social Networks - Evan Patterson
Who are you going to call? - Evan Patterson
WV Crimes requiring Electronic & Digital Evidence - Philip Morrison
Professionalism on the Witness Stand - Phillip Morrison
Common Darknet Weaknesses - Adrian "Irongeek" Crenshaw
Recent HIPAA/HITECH Changes - Caleb Knight
Hacking A Mature Security Program - David "ReL1K" Kennedy
YouTube/Archive.org
7/18/2011
This is a quick and dirty video to show how to make a multiboot thumbdrive with XBOOT. You can also create a multiboot CD/DVD by combining other ISOs. Operating Systems loaded on mine include: Backtrack 5, Winbuilder/Win7PE SE, DBAN, UBCD4Win, TAILS, Gparted, Ubuntu 11.04, etc. 4:41 YouTube 7/08/2011
This is a talk I did on making bootable USB drives/CDs/DVDs for my local ISSA. Think of it as a braindump and starting point for making your own. 1:22:49 Vimeo/AVI 225.6MB 6/04/2011
OSInt, Cyberstalking, Footprinting and Recon: Getting to know you
The following are videos from the Footprinting/OSInt/Recon/Cyberstalking
class I did up in Fort Wayne Indiana for the
Northeast Indiana Chapter of ISSA.
I've split the class into three videos by subtopic, and included the text from
the presentation for quick linking.
1:26:25DNS, Whois and Domain Tools
Finding general Information about an organization via the web
Anti-social networks
Google Hacking
Metadata
Other odds and ends
1:26:17
59:31 Vimeo/AVI 5/23/2011
http://www.spylogic.net 50:44 Vimeo/AVI 97.2MB 5/15/2011
http://www.secmaniac.com 45:15 Vimeo/AVI 125.6MB 5/15/2011
This is the presentation I did for Notacon 2011. Honeypots might be ok for research, but they don’t allow you to have fun at an attacker’s expense the same way funnypot and skiddy baiting does. In this talk I’ll be covering techniques you can use to scar the psyche or to have fun at the expense of attackers or people invading your privacy. Sorry about the subpar sound, I had a bit of echo from where my camera was positioned. 45:36 Vimeo/AVI 4/18/2011
This is the talk I did at Blackhat DC 2011 about de-anonymizing I2P darknet services. 1:03:28 Vimeo/AVI 4/8/2011
Recorded at the April 2011 Louisville ISSA meeting. 1:10:06 Vimeo/AVI 4/2/2011
The following are videos of the presentations from the Outerzone 2011 hacker conference. Thanks to Skydog, Robin, Scott, SomeNinjaMaster and the Hacker Consortium crew for the con. Also thanks to Seeblind and others for doing AV. I'm looking forward to Skydogcon and working with the guys again at Derbycon.
List:
SkyDog - Opening Ceremonies/etc.
SkyDog - The Modern Day Hacker
IronGeek - Rendering Hacker Con Videos with AviSynth
MadMex - Windows Command Line Incident Response
HalfJack -Building your Own Green Home
Beau Woods - What Companies and Vendors must know about securing mobile devices, mobile applications, access and data.
Rick Hayes - Assessing and Pen-Testing IPv6 Networks
Pure Hate - Why your password policy sucks
Billy Hoffman - Advice on starting a start-up
Contest Prize Giveaway, Awards, Closing Ceremonies Vimeo/AVI 03/21/2011
Wireshark, TCPDump, Metasploit sniffing with Meterpreter, ARP Poisoning, Ettercap, Cain, NetworkMinor, Firesheep and Xplico. Vimeo/AVI 02/14/2011
List:
Opening Remarks & Security Enabler, Bill Gardner & Rob Dixon
Where we at? A look at Information Security, David Kennedy (ReL1K)
Radio Reconnaissance in Penetration Testing, Matt Neely
Social Engineering In-Depth, Chris Criswell & Wayne Porter
Penetration Testing - The Continuing Failures of an Industry, Keith Pachulski
Blue team is sexy - refocusing on defense, Mick Douglas
DDoS: Defending Against an Internet Mob, Kenneth Scott
Cipherspace/Darknets: anonymizing private networks, Adrian Crenshaw
Hackers Trail Mix, Elliott Cutright Vimeo/AVI 02/22/2011
Grecs and the folks at Shmoo were kind enough to let me record the FireTalks from Shmoocon 2011. Vimeo/AVI 02/01/2011
Hosting Hidden Services in I2P: eepSites and SSH
Here is another foray into Cipherspace. In this video I'll show how to get your
eepSite up and running, along with pointing an HTTP tunnel to another web server
besides the build in Jetty, and also how to host SSH inside of the I2P network.
17:35 Vimeo/MP4/WMV
01/17/2011
Round 1:
Shoecon Intro with Rick and Scott, then some SSL Cert Wildcards fun with Karthik
Hacking Green or Eco Conscious Stalking with Rick Hayes
Physical Penetration Testing with Keith Pachulski and Brian Martin
Building a barcode LED flasher, and why with Adrian Crenshaw
High Speed Data services over RF with Brian Wilson
Round 2:
Wi-Fi Basics for Geeks – How Wireless Really Works
Advice on Starting a Startup with the ever caffeinated Billy Hoffman
Economics of Security and Cybercrime with Beau Woods
Recent Threat Landscape with Ben Feinstein
Unfortunately, I've not been able to recover the live MP4 of Skydog's talk. I may post the file later to see if anyone else can figure a way to recover it.
Vimeo 10/19/2010
In this presentation I talk about the categories of malicious USB devices:
USB Mass Storage containing malware
U3 Thumb drives with "evil" autorun payloads
Hardware key loggers
Programmable HID USB Keyboard Dongle Devices
along with detection and mitigation techniques involving GPO (Windows) and UDEV (Linux) settings. It was presented at Phreaknic 14.
1:02:49 Vimeo 10/18/2010While at Phreaknic 14 I did a quick lightning talk on my project to test the anonymity provided by I2P. Mostly I'll be aiming at web server misconfigurations in eepSites. It starts getting fast at the end because I was running out of time (10 min is kind of short for the subject). Still, I hope it is a good intro to I2P, and my plans. 13:18 Vimeo 10/18/2010
This is a presentation I did for the Blugrass ISSA chapter. Tools covered, at least lightly, are: Nmap, Hping, UnicornScan,
AutoScan, Netscan, Metasploit, NetworkMiner and of course BackTrack 4 R1. A few minor flubs, and one spot where I deleted a demo fail. :) 1:14:12 Vimeo/Archive.org 240.70MB 9/25/2010
The Programmable HID USB Keystroke Dongle (PHUKD) is a small device based around the Teensy microcontroller development board. It allows users to program in keystrokes and mouse macros that can execute when the device is plugged in, after a set time, or when certain environmental conditions are met (light, noise, temperature, etc.) This device can be used as a replacement for a U3 hacksaw, as a device left behind to execute commands when someone with elevated privileges is likely to be logged in, or give as a Trojan device to unsuspecting targets. Much pwnage should ensue.
I've added my Defcon video to the bottom of the Videos and Pictures section of the PHUKD article.
Also checkout the "PowerShell OMFG Video" Dave Kennedy and Josh Kelley (winfang) did at Defcon 18
http://www.secmaniac.com/august-2010/powershell_omfg/
it used PHUKD devices for part of it. 54:42 Vimeo 9/16/2010
This is a class we gave for the Kentuckiana ISSA on the the subject of password exploitation. The Password Exploitation Class was put on as a charity event for the Matthew Shoemaker Memorial Fund ( http://www.shoecon.org/ ). The speakers were Dakykilla, Purehate_ and myself. This is sort of the first Question-Defense / Irongeek joint video. Lots of password finding and crack topics were covered: Hashcat, OCLHashcat, Cain, SAMDump2, Nir's Password Recovery Tools, Password Renew, Backtrack 4 R1, UBCD4Win and much more. About 4.5 hours of content. var Archive.org/AVI 08/30/2010
This video will show you the basics of setting up the Teensyduino environment in Windows so you can start developing PHUKD devices. 6:57 YouTube 07/14/2010
This is a presentation I did at the Kentuckiana ISSA and then again at the Ohio Security Forum on Mutillidae/Samurai WTF/OWASP Top 10. I chose to post the Ohio version of the video as I think it came out better, but the slides are the same. Plenty of information on XSS (Cross Site Scripting), CSRF (Cross Site Request Forgery) and SQL/Command Injection. 1:01:50 Vimeo/AVI 07/12/2010
It should be noted, I did not create these videos, my buddy Rick from the ISDPodcast did (at least the first two). Still, they are worth sharing.
I have some links below if you want more info on the Ligatt / Gregory D. Evans controversy that has been going around. If nothing else, it will help with people researching the person/company:
Ligatt / Gregory D. Evans Fun Charlatan Entry at Attrition.org
Follow all the Ligatt fun on Twitter
The Register has a good writeup on Ligatt / Gregory D. Evans
This is probably the most concise writeup on Ligatt / Gregory D. Evans
If you want to read the book "How To Become The Worlds No. 1 Hacker" for yourself, but you don't want to pay Ligatt for plagiarizing, grab the PDF at this link var YouTube 06/24/2010
Metasploit Class
Videos
On May 8th 2010 the
Kentuckiana
ISSA held a 7 hour Metasploit class at the Brown hotel in Louisville Ky.
Proceeds from the class went to the Hackers For Charity Food for Work program.
The instructors were David "ReL1K" Kennedy, Martin "PureHate" Bos, Elliott "Nullthreat"
Cutright, Pwrcycle and Adrian "Irongeek" Crenshaw. Below are the videos of the
event. I hope you enjoy them, and if you do please consider donating to Johnny
Longs' organization. This should be more Metasploit than you can stand!
This is a segment I did an interview for. They took very little of what I said, and played up the voyeur aspect (I told them webcams were not that big a worry, but drive by bot installs were). 3:53 FLV 05/06/2010
The following are videos of the presentations from the Outerzone 2010 hacker conference. Thanks to Skydog, Robin, Scott, SomeNinjaMaster and the Hacker Consortium crew for the con. Also thanks to Karlo, Keith, and Seeblind for doing AV. I'm looking forward to Skydogcon. var Archive.org/MP4 var 03/28/2010
Attacking and Defending WPA Enterprise Networks - Matt Neely
Matt Neely of
SecureState came to the March
Kentuckiana ISSA meeting and gave
a great presentation on securing and hacking WPA Enterprise networks. If you are
confused by the acronym soup of "EAP-TLS, EAP-TTLS/MSCHAPv2,
PEAPv0/EAP-MSCHAPv2, PEAPv1/EAP-GTC, PEAP-TLS" and which are the better options,
this may be the video for you.
46:55 Vimeo/Blip/MP4
233MB
03/06/2010
This is a presentation I was working on for the malware class I'm enrolled in. For some reason my voice was cracking while recording it, but I guess it was good practice for the live version I'll do tomorrow. Besides just an introduction to Steganography, I'll also talk a little about my SnarlBot project that will attempt to use stego in a command and control channel. 49:39 Vimeo/Blip/WMV 120MB 03/01/2010
Recorded at: Louisville OWASP Chapter - Fourth Meeting, Friday January 29th, 2010
Speaker: Rafal Los will be discussing Flash and Web 2.0 security 57.33 Vimeo/Blip/Mp4 247MB 01/30/2010
I have to present two papers for my malware class, so I figure I'd share my practice video with my readers. Slides are available in PDF and PPTX forms. 26.02 Blip/MP5 25.1MB 01/25/2010
HoneyPots are hosts meant to be attacked either to distract the attackers or to research their techniques. This video will cover setting up a simple HoneyPot in Windows using an application called HoneyBOT. I'll also talk a little about capturing a pcap file with dumpcap for later analysis. 9:45 Youtube/MP4 16.8MB 01/19/2010
In a previous video, I showed how to set up an Ethernet bridge in Windows XP. This is very useful for sniffing traffic leaving your LAN for the purposes of IDS (Intrusion Detection System), network monitoring, statistics or just plain snooping. In this video, I cover setting up an Ethernet bridge in Linux. Other tools used in this video include Wireshark, TCPDump, Etherape and Driftnet. 9:59 Youtube/MP4 72MB 12/29/2009
According to RFC 793, if a closed port gets a TCP packet without the SYN, RST, or ACK flag being set, it is suppose to respond with a RST packet. If the port is open, the TCP stack is suppose to just drop the packet without giving a response. Not all Operating Systems follow the RFC to the letter however, and these discrepancies allow for OS fingerprinting. I've covered OS fingerprinting in other videos (which I will link off to later), this video will just illustrates the point by showing off Nmap's XMAS scan option which sets only the FIN, PSH, and URG flags and nothing else. I'll also be using Zenmap, Ndiff and Wireshark to help you get the idea. 9:24 Youtube/WMV 102MB 12/25/2009
When Steve invited me up to Indianapolis to help with a Metasploit class I jumped at the opportunity. We had a good time and IndySec puts on a great event. They let me record the talks, unfortunately I was testing out a new video rig and the audio failed on the first three parts (Intro/Welcome, Network Setup, Getting started with Metasploit). The rig worked great for the Social Engineering, Meterpreter and SQL Pwnage/Fast Track sections. My presentation was just a rehash of the video I put up last week on msfpayload/msfencoder/metasploit 3.3 so I decided not to post it on this page. var Blip.tv/MP4 12/13/2009
Using msfpayload and msfencode from Metasploit 3.3 to bypass anti-virus
This subject has been covered before, but why not once more?
Metasploit 3.3 adds some new options, and better Windows support. As stated in
the title, this video will cover using msfpayload and msfencode from Metasploit
3.3 to bypass anti-virus. I will also talk a little about using CWSandbox and
VirusTotal to examine malware. If you find this video useful, consider going to
the
Metasploit Unleashed page and donating to the Hackers For Charity Kenya food
for work program, or come to the
IndySec charity event. By the way, I've put out two versions of this video,
one andSWF and the other a streaming video. Please let me know which you prefer.
Applications can add all sorts of data into the documents they create or edit. DOC, PDF, XLS and other file types can contain all sorts of extra data, like usernames, network paths, printers and application version numbers. This sort of information is great for doing initial research about an organization before doing a pen-test. This video with cover using FOCA, pointing it at a domain name, and grabbing metadata from doc, ppt, pps, xls, docx, pptx, ppsx, xlsx, sxw, sxc, sxi, odt, ods, odg, odp, pdf and wpd files. var SWF 10.8MB 12/1/2009
This is a presentation I gave for the local Louisville ISSA. I took this as an opportunity to learn a bit about AVISynth and do a split screen video. Thanks to Gary for being my camera man. 58:29:00 Vimeo 11/7/2009
This is a quick and dirty version of my Darknets talk from Phreaknic 2009, I hope to have a better version up soon. It covers the the basics of semi-anonymous networks, their use (political dissidence, file sharing, gaming and pr0n), how they were developed and what they mean to organizations. The main focus will be on the Tor, I2P, Freenet and anoNet Darknets, their uses and weaknesses. 1:09:00 Vimeo 11/2/2009
I2P (originally standing for Invisible Internet Project) can be seen as a networking layer sitting on top of IP that uses cryptography to keep messages confidential, and multiple peer to peer network tunnels for anonymity and plausible deniability. While Tor is focused more for hiding your identity while surfing the public Internet, I2P is geared more toward networking multiple I2P users together. While you can surf to the public Internet using one of the I2P out proxies, it's meant more for hiding the identity of the providers of services (for example eepSites), sort of like Tor's concept of Hidden Services, but much faster. Another advantage I2P has is NetDB, a distributed way to let peers know about each other once initial seeding has occurred. Tor on the other hand uses it's own directory to identify servers, which in theory could be more easily blocked. Both networks have their advantages and trade offs. This video won't cover the details of I2P's peering or encryption systems, and may seem kind of rambling, but it should be enough to get you up and running on the darknet.
Please note, this video came out way larger than I intended. var SWF 34.3MB 10/26/2009
Louisville InfoSec CTF 2009
This video summarizes one possible way contestants could have completed the
Capture The Flag event at the 2009
Louisville Infosec. Tools and concepts used in the video include: Backtrack
4, Kismet Newcore, Nmap, Metasploit, Meterpreter, Firefox, SQL Injection, Cain,
Truecrypt and 7zip.
13:43 Vimeo
74.40MB
10/11/2009
DiskDigger is a tool that allows you to recover deleted files off of a FAT or NTFS drive. It has two modes of operation: In the first it merely looks in the FAT/MFT to find files marked as deleted, in much the same way that the tool called Restoration does. In the 2nd mode it does a file carve down the drive looking at the raw bits and finding the know headers and footers of various file types, much like PhotoRec. While PhotoRec seems a little more powerful, DiskDigger is easier to use and its preview functionality is quite nice. This video will cover the basics of recovering deleted files with DiskDigger. var SWF 6.88MB 09/29/2009
I thought some of you might find this an interesting gadget, so I decide to review it. It might be useful for reconnaissance before a pen-test, or as a covert place to store files. 2:34 YouTube 09/27/2009
Mr. Rohyt Belani was kind enough to do a presentation on combining web application attacks with spear phishing at the Sept 2009 Louisville OWASP meeting (our chapter's LinkedIn page can be found here). If you are interested in finding out more about some of the topics Rohyt mentions in his presentation, check out these other videos on Footprinting/Network Recon and Exploiting Common Web App Vulnerabilities. 1:15:58 Vimeo 09/19/2009
This is a class I gave for the Kentuckiana ISSA on the the subject of Anti-forensics. It's about 3 hours long, and sort of meandering, but I hope you find it handy. For the record, Podge was operating the camera :) Apparently it was not on me during the opening joke, but so be it, no one seemed to get it. I spend way to much time on the Internet it seems. Also, I'm in need of finding video host to take these large files. This class video is 3 hours, 7 min and 1.2GB as captured. 3:07:00 Blip.tv 08/24/2009
This talk will cover hardware keyloggers and their use. About six will be presented in person for folks to try hands on, with a few others referenced in the slide show (mini-pci ones for example) . I'll cover the advantages and disadvantages of the current crop on the market and how they work. Also covered will be possible ways to detect hardware keyloggers via physical inspection an software. 58:09 Blip.tv 07/24/2009
For those not in the know, Netcat is a utility who's goal is to be like the Unix cat command, but for network connections. It has been referred to as a "Swiss-army knife for TCP/IP" for good reason, since it can do so many things. var SWF 41.20MB 07/22/2009
Along the way to making a video on Ncat I needed to compile Nmap 5 from source, so I figured I might as well do a video on that as well. There are many reasons why you might want to compile Nmap from source instead of just using the package manager, so enjoy. var SWF 11.60MB 07/18/2009
Fyodor gave me a heads up that Nmap 5 was coming out, so I figured I'd do a couple of videos on useful new features that come with Nmap 5 and later. For a better understanding of Nmap in general, check out my older videos which I will link to after the presentation. In this video I will cover the basics of using NDiff to compare two seperate Nmap scans. This is really useful for change management, where you want to know what new devices have appeared on your network or about ones that have disappeared for some reason. You could easily schedule Nmap to run on your network weekly, and then compare the differences with NDiff to see what has changed. var SWF 5.94MB 07/16/2009
In Russell's own words: "The U3 incident response switchblade is a tool designed to gather forensic data from a machine in an automated, self-contained fashion without user intervention for use in an investigation. The switchblade is designed to be very modular, allowing the investigator/IR team to add their own tools and modify the evidence collection process quickly." This video shows you how to setup u3ir, and modify it. var SWF 8.02MB 07/09/2009
This is a recording of the presentation I gave to the Louisville Chapter of OWASP about the Mutillidae project. A while back I wanted to start covering more web application pen-testing tools and concepts in some of my videos and live classes. Of course, I needed vulnerable web apps to illustrate common web security problems. I like the WebGoat project, but sometimes it's a little hard to figure out exactly what they want you to do to exploit a given web application, and it's written in J2EE (not a layman friendly language). In an attempt to have something simple to use as a demo in my videos and in class, I started the Mutillidae project. This is a video covering the first 5 of the OWASP Top 10. 1:14:41 Vimeo 06/20/2009
Originally, this was going to be one 4hr class, but Jeff had something come up so he could not cover WEP/WPA cracking, and my section took so long that Brian never got a chance to present his material on DD-WRT. I'm hoping to get them back to do a part 2 of this video. In this section I cover the basics of WiFi, good chipsets, open file shares, monitor mode, war driving tools, testing injection, deauth attacks and the evil twin attack. Some of this comes out as kind of a stream of consciousness, but hopefully you can find some useful nuggets from my brain dump of what I've learned about 802.11a/b/g/n hacking. As far as classes goes this is the mostly complicated one I've set up, and for a wireless class Brian and I had to run a lot of wires. :) 3:28:37 Blip.tv
05/24/2009
I did some recording of the goings on at the Notacon and Outerz0ne 2009 hacker cons. If you want to get a feel for these cons, check out the video. 49:13 Blip.tv 05/10/2009
This is a presentation I gave for the Kentuckiana ISSA on May 8th, 2009. It covers the basics of protecting yourself when using open WiFi on a potentially hostile networks, most notable Hacker cons, but also coffee shops, libraries, airports and so forth. Topics include: open file shares, unneeded services, sniffing and evil twin attacks. The talk is based on the Hacker Con HiJinx tri-fold I wrote awhile back. 59:39 Blip.tv 05/09/2009
Mutillidae is a deliberately vulnerable set of PHP scripts I wrote to implement the OWASP Top 10 web vulnerabilities. I plan to use these scripts to illustrate common web app attacks in a series of future videos. The easiest way to get up and running with Mutillidae is to use XAMPP, an easy to install Apache distribution containing MySQL, PHP and Perl. This first video covers setting up Mutillidae, which can be downloaded from:
http://www.irongeek.com/i.php?page=security/mutillidae-deliberately-vulnerable-php-owasp-top-10 var SWF 6.23MB 04/29/2009
Over the years I've done a lot of video tutorials using screencasting software to teach folks new to hacking how various security tools work. I'd like to share the tips and tricks I've learned so that others can start to teach people about technology in the same way. Covered topics will include: Screencasting software, free tools, getting the best video for the least bandwidth, audio work, free hosting, animations and more. This is a presentation I did for Notacon 2009. Thanks to Ted and crew for recording it. 51:04 Blip.tv 04/20/2009
John Strand of Pauldotcom allowed me to post this video that shows how to use SSLStrip to proxy an SSL connection and sniff it, without those annoying warning messages about the cert that other tools give. From John's description:
With SSLStrip we have the ability to strip SSL from a sessions. Using this tool we have the capability to capture in clear text user IDs and passwords. 8:39 Blip.tv 04/15/2009
I've been wanting to record some of my live classes, as well as the talks at the upcoming Louisville Infosec. This is the rig I plan to use to capture both the Power Point/computer screen and live video of the presenter at the same time. Let me know if you have any ideas for improvement. Blip.tv 03/30/2009
This class covers recon work, showing the student how a pen-tester/attacker can use public information to learn more about an organization before they compromise it's security. Covered topics will include DNS tools (like Whois, NSlookup/Dig, Nmap -sL), Google Hacking using advanced search terms and Metadata in images and documents. Recorded for the Kentuckiana ISSA on March 21, 2009. 3hr, 7min
more or less Blip.tv 03/25/2009
Joe McCray of Learn Security Online sent me a video of a presentation he gave on Advanced SQL Injection. It's a great primer, and I love his presentation style. Someone buy the man a VGA to composite converter, or a HD camcorder so he can keep making these vids. Vimeo 03/20/2009
Prepare your liver for the apocalypse. Blip.tv 03/09/2009
Traditional web apps used the browser as a mere terminal to talk with the application running on the web server. Ajax and Web 2.0 shifted the application so that some was running on the client and some of the web server. Now, so-called offline application are web application that work when they aren't connected to the web! Confused? This talk will explore how to attack offline apps with live demos of new attack techniques like client-side SQL Injection and resource manifest hijacking.
BIO: Acidus is a Atlanta hacker who is not really sure why you keep listening to him. Blip.tv 03/09/2009
Today security filters can be found on our network perimeter, on our servers, in our frameworks and applications. As our network perimeter becomes more secure, applications become more of a target. Security filters such as IDS and WAF are relied upon to protect applications. Intrusion detection evasion techniques were pioneered over a decade ago. How are today's filters withstanding ever evolving evasion tactics? The presentation will examine how evasion techniques worked in the past and provide insight into how these techniques can still work today; with a focus on HTTP attacks. A practical new way to bypass Snort will be demonstrated. A tool to test other IDS for the vulnerability in Snort will be demonstrated.
Bio: Background: While performing a pentest on a fortune 50 company I got caught. My IP address was subsequently blocked. It was apparent that I was causing way too much noise and they had triggered a network security filter that blocked me. I came up with this presentation idea after implementing the evasion techniques found here in a proxy application. I quickly realized none of them work anymore on modern IDS. After some experimentation I eventually found something that would let me sneak nearly any type of web attack past Snort. More details on the attack can be found in my outline. I'm currently working on a tool that will allow anyone to test their IDS/IPS for this vulnerability. Blip.tv 03/09/2009
RAID is a great technology and in many cases is suppose to keep our data safe. What happens when it fails? RAID Arrays are one of the most painful things to reassemble. RAID 0 and RAID 5 software reassemblies have problems with Slice Sizes, and Drive Orders and in many cases, the user has no idea what the settings are. What do you do when you don’t know the Slice Size and Drive Orders and you need the data from damaged drives? Well here is a demonstration of a way to determine this using Sight and Sound. I crammed as much on the subject as I can into a 50 minute presentation with Demos. Blip.tv 03/09/2009
What they are, why they're important, where they are, and how you can start one yourself. You may already have one close by. The talk will illustrate how hackers are taking back the moniker and bringing the community back into the light. Blip.tv 03/09/2009
The first part of this presentation presents a new paradigm for the Incident Response process called Rapid Enterprise Triaging (RETRI), where the primary objective is to isolate the infected network segment for analysis without disrupting its availability. Part two of this presentation will introduce a new Enterprise Incident Response tool that complements the RETRI paradigm. The tool is a free, possibly open source, agent-based tool that is deployed to the compromised segment to perform the traditional incident response tasks (detect, diagnose, collect evidence, mitigate, prevent and report back). The tool will be released at Blackhat 2009 / Defcon 2009 if all goes well.For now you get screen shots. Blip.tv 03/09/2009
This talk will cover malicious JavaScript currently being used in the wild. It will start with the big daddy of embedded malicious JavaScript, Asprox, which last year gave rise to panicked headlines like "100,000s of websites compromised" and continuing through more recent samples such as the fake Yahoo Counter and the recent MS09-002 exploits. We will look at attack vectors, obfuscation techniques, and multi-stage delivery systems, and exploits used. This will feature the analysis of several samples harvest from the wilds of the Internet.
Bio: My name is Nick Chapman. I'm a security researcher with the SecureWorks Counter-Threat Unit. Prior to focusing on security issues full time, I worked as both a System Administrator and Network Engineer in the ISP world. Blip.tv 03/09/2009
This talk will present a live demo of a man-in-the-middle-attack, using Cain & Able.
SlimJim100, also known as Brian Wilson, has presented at ChicagoCon 3 times in the past. His resume is filled with 3, 4, and 5 letter certifications, and his reputation reflects his skills.SlimJim100 - Live Demo of Cain & Able and the Man-in-the-middle-attack. Blip.tv 03/09/2009
A primer on silkscreening t-shirts and garments. This talk goes thru the process of single color silkscreening, showing the steps necessary to produce the artwork, burning a screen, and then screening a shirt. We'll be producing shirts on stage, showing the techniques learned from much trial and error. Want to make your own Outerz0ne 5 Con shirt? C'mon up and do it yourself. Want to see yours made? We can do that too! Meant to be an interactive talk, to also raise interest in graphic arts and a to try and bring back a bit of the old school stuff.
Skydog currently works for a major university, while also holding down positions as President for two non-profits. One is Nashville 2600, which is the group responsible for Phreaknic, and the Hacker Consortium, a large non-profit hackerspace in Nashville, TN. When he isn't doing all of that happiness, he's trying to keep his son from cutting a finger off, and making sure he's not surfing pron. Blip.tv 03/09/2009
An overview of recent developments impacting the Fourth Amendment and privacy conscious computer professionals: including discussions on the United States Constitution, Federal Statutes, Administrative decisions, and, most importantly, the case laws that interpret and define the Fourth Amendment. Special attention is given to topics affecting computer professionals, including border crossings, foreign nationals, forced disclosures, and the October 2008, Crist decision.
Tyler holds degrees in Software Architecture from New College of Florida and a Juris Doctor from the Stetson University College of Law. He co-founded the Azureus Bittorrent client in 2003 and currently works as CTO for Digome, LLC in Nashville, TN. His work experience includes Florida State Attorney's, Federal Magistrate Richardson, and Justice Anstead of the Florida Supreme Court. Tyler presented at PhreakNic 12 and has taught several courses on computer programming and security. Blip.tv 03/09/2009
The goal is to promote the idea of open source hardware, and expand the community. We will begin with an intro into what an "arduino micro controller" is, how they work, and what you can do with them. You will see that you don't need to be an electronics wizard to create amazing projects that enhance your life! Whether a code ninja, hardware guru, enthusiast, a pro or total n00b, the arduino offers amazing potential, community, and empowerment to any who wish to grasp it.
Website: http://dailyduino.com (blog for arduino projects and related electronics news.) Blip.tv 03/09/2009
As regular Irongeek readers know, I’ve covered wardriving (the act of physically moving around in meatspace looking for WiFi access point) before. In this video, I want to cover another tool for wardriving: WiFiFoFum for the Windows Mobile platform. var SWF 7.98MB
03/05/2009
The folks over at Wirelesskeylogger.com were kind enough to send me a review unit. For more info on hardware keyloggers in general, check out some of my other articles and videos on the topic which I will link to at the end of this presentation. The core idea of a wireless hardwarekeylogger is that you only have to get physical access to the computer once to install it. From then on you just have to get close enough to the box with a bluetooth device to grab the logs, at least in theory. var SWF 3.76MB 02/13/2009
In a previous video I covered using the Tor anonymity network to browse the web anonymously. In this one I'll cover the basics of setting up a Tor hidden service. With a Tor hidden service, the true host IP of the service is hidden by the Tor network. Instead of having to hand out the true IP of the server, a service creator can hand out a *.onion hostname that's not linked directly to them. By setting up a Tor hidden service it becomes much harder for an adversary to figure out where the service is really being hosted from, and thus much harder to shutdown. This is a great thing for people like whistle blowers and political dissidents that want to share information anonymously, unfortunately it's also useful to pedos so be careful what links you choose to click on the onion network. var SWF 4.78MB 01/29/2009
NetworkMiner is a cool little sniffer app by Erik Hjelmvik. Described as a Network Forensic Analysis Tool (NFAT), it allows you to parse libpcap files or to do a live capture of the network and find out various things passively. The main uses I like it for are file reconstruction of FTP, SMB, HTTP and TFTP streams as well as passive OS fingerprinting, but it can do a lot more. NetworkMinor uses the Satori, p0f and Ettercap OS fingerprints, and can be run from a thumb drive without having to install it. It's designed to run under Windows, but you can also use it under Linux with Wine. var SWF 17.60MB 12/17/2008
Wireshark is an awesome open source general purpose network analyzer (AKA: a Sniffer). Before you continue on with this video, I recommend that you check out my article A Quick Intro to Sniffers so you understand the background information. In this video I'll cover the following topics: Running Wireshark, starting a capture with options, drilling down the OSI model, capture filter options, popping out a single packet, sorting by columns, following TCP streams, exporting HTTP objects, simple display filters, the filter builder, applying filters from different panes , saving filters, opening a Wiki page, Edit-> Find packet, sniffing an HTTP Basic Authentication password, Analyzers ->Expert Info, Analyzers ->Firewall ACLs, stats, editing color rules and saving the capture. var SWF 26.10MB 12/05/2008
I had to do a presentation for one of my MBA courses, and one of the topic choices was the Sarbanes-Oxley act. I chose it because I thought I could relate it to computer security, but as it turns out the connection is somewhat tenuous as you will see if you watch the presentation. 27:18 Blip.tv 11/30/2008
This video from John Strand shows how to bypass anti virus tools utilizing the new tricks in Metasploit 3.2 6:06 Vimeo 11/22/2008
In this video, Bigmac shows how to redirect web traffic and trick users into downloading Meterpreter and running it on their box. 8:29 Vimeo 11/22/2008
The video quality of this lecture is not very good, but it should give you an idea of what my ISSA classes are like. Covered topics include Wireshark, Ettercap, Cain and the slightest bit of NetworkMiner before the camera cut out. Pardon the blue tint, it was the projectors fault and not the Aiptek Action HD's. I shrunk it down from the original 720p, so the screen is not all that readable. I also experimented in cleaning up the audio in Audacity. I hope to cover Wireshark and NetworkMiner again shortly in higher quality videos. 2:45:00 Vimeo n/a 11/16/2008
This is Morgellon and Droop's talks about hacking the Arduino micro controller platform from Phreaknic 12. Droops and Morgellon will take you from basic electronics to building embedded systems. Learn how to build a standalone RFID tag reader with a fancy LCD display or your own oscilloscope or children's toys that speak to you or how to solar power a geothermal heat pump. There may even be some giveaways and contests. Magical Potions will be consumed but not provided.
Check out the following sites by Droops and Morgellon:
http://dailyduino.com/
http://www.hackermedia.org/
I've done a little work to pull some noise out of the audio, but I may have made it worse in some spots. Thanks go out to the Phreaknic 12 A/V team SomeNinjaMaster, Night Carnage, Greg, Brimstone, Poiu Poiu, Mudflap, and Drunken Pirate for setting up the rigs and capturing the video. 67:05 Blip.tv
n/a 10/29/2008
Phreaknic 12 (2008) Hacker Con
This is a quick and dirty video documentary of the things that when on around the talks and event at Phreaknic 12 (2008). Don't watch if you get sick at shaky cam movies like Blair Witch or Cloverfield. A rough timeline of the content in the video is as follows:
Intro and leaving Louisville with Brian. Morgellon talks
about hacking the Arduino micro controller
platform. Sorteal talks about the LiVes Open Source video editor. AT&T Batman
building by night. Mojo-JoJo soldering some stuff for the shooting range. The
patron gods of hackerdom. Registration. Con swag overview. Morgellon gets
his discreet logic on. AK-47 building with HandGrip and Buttstock. Froggy talks
up Notacon, which I plan to go to next year. Skydog explains the Jware chair
toss event, and then we compete. Rootwars hacker wargames. I ask
Int80 about using his nerdcore
music in some of my videos. NotLarry explains rootwars. Some iPhone hacking with
Lee Baird and John Skinner. I
do a little
Bluecaseing/Warnibbling with the Bluetooth on my Nokia n810. John, Lee,
Brian and I go to the German restaurant. I blind DOSman with the light from my
camera and check out what folks are doing with the
Arduinos Droops brought for folks to play
with. I check back in on R00tW4rz. I blind Droops. I talk Ettercap filters with
operat0r. USB door key fun with the
Arduino. More breadboard fun. Nokia n810 +
Ettercap Filter + Lemon-part = win.
Int80 gets down with his own bad self, and the rest of Phreaknic. I find an
energy drink with protein. Folks play with the hardware keyloggers I brought,
and we have some epic fail with the IBM Model M + USB adapter + Mac OS 10.5.
Winn Schwartau joins in on the
keylogger fun. DOSman and Zack use
a directional antenna from the 9th floor to search downtown Nashville for WiFi
access points. Zoom in on Al. John and Lee eat jerky.
Daren and Shannon from Hak5 blind me this
time. :) Then they do a quick interview. I interview
TRiP about the legalities of wardriving,
sniffing and leaving your access point open so you have plausible deniability of
copyright infringement (most likely it won't hold water in court if you are a
computer geek). I give Hak5 Daren beef jerky.
Ziplock had more con badges
than God. I meet up with Iridium. I talk with Nightcarnage about the audio/video
setup at Phreaknic. As I predicted, the
Potters won the WiFi
Race. I say why this was the best Phreaknic ever. Using green lasers on crack
dealers. Techno in the dark, the Aiptek action HD does not do well in low light.
Nicodemius shows off his Minority Report like multi-touch table. Hula hoop
contest. I check back in with Jeff Cotton and his USB keyed door. I strap on my
gear to leave the con. Brian and I do a wrap up of our thoughts on Phreaknic
2008.
About
1:25:00 Blip.tv
n/a
10/29/2008
In this video I'll be showing how Cain can pull off a "Man in the Middle" attack against the Remote Desktop Protocol. While RDP versions 6.0 and later are less susceptible to these attacks because of the verification schemes added, there is still a risk since so many users just click yes to all warning messages. var SWF 8.09MB 10/20/2008
John Strand of Black Hills Security sent me another awesome video on using BeEF, cross site scripting and other fun. 6:58 Vimeo n/a
10/16/2008
John Strand of Black Hills Security sent me an awesome video on using Metasploit to create an EXE with the Meterpreter payload that creates a reverse TCP connection outbound, blowing through many NAT boxes and firewalls. This goes great with a previous video I did on EXE Binders/Joiners. 6:26 Vimeo n/a 10/15/2008
I'm creating this video for three reasons: 1. While I've done a lot of videos on Cain, most of them are more advanced and assume you know the basics. 2. The last video I did on ARP poisoning with Cain was more than four years ago, Cain looks quite a bit different now. 3. I wanted a reference for the classes I'll be teaching for the Kentuckiana ISSA. Before you watch this video, read my article "The Basics of Arp spoofing/Arp poisoning" so you will have a better grasp of the concept. var SWF 4.63MB 10/14/2008
John Strand gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. He gives a fascinating talk about why "security in depth" is dead, and lives again. John then goes on to demo Evilgrade, using msfpayload and obscuring it against signature based malware detection, dumping SAM hashes with the Metasploit Meterpreter and using a patched Samba client to pass the hash and compromise a system. I'd like to thank John for letting me record his talk. 80:16 Vimeo n/a 10/11/2008
Rohyt Belani gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. Rohyt shows new ways to think about hacking, going into how and why simple things work on the people element. Why hack a system when a quick Google search can reveal so much? Rohyt's talk was humorous and informative, and I'd like to thank him for letting me record his it. 52:01 Vimeo n/a 10/11/2008
I gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. I cover the basics of how network sniffers work, and specifically talk about Wireshark, Cain, Ettercap and NetworkMiner. I came up with the presentation on short order, so please be forgiving of the stumbles. :) You can download the slides from here. 61:25 Vimeo n/a 10/11/2008
Kevin Beaver gave this presentation for the Kentuckiana ISSA at the Louisville Infosec 2008 conference. There's a lot of great advice in this video on how to approach an infosec career in the right way. Kevin endorses being a security "renaissance man", expanding your knowledge outside of the tech side to understand the business, people and legal sides as well. At the same time he also points out that sometimes specialization is good, so focus on your strengths. I'd like to thank Kevin for letting me record his talk. 41:00 Vimeo n/a 10/11/2008
Host based firewalls are fine and dandy, but I'd rather turn off services I don't need than to just block them. Host based firewalls are sort of a bandage, and while they can be useful for knowing what is connecting out (see egress filtering), it's better just not to have unneeded network services running in the first place. This video can be seen as a supplement to my article "What can you find out from an IP?" var SWF 11.5MB 10/08/2008
In a previous video I explained the basics of cryptographic hashes. Go watch "A Brief Intro To Cryptographic Hashes/MD5" before this video. In this tutorial, I'll be giving an example of why weak hashes are bad. The example I'll be using is the CRC32 hash that Outlook uses to store a PST archive's password with. The CRC32 algorithm as implemented by Microsoft Outlook is easy to generate hash collisions for, so even if you can't find the original password you can find an alternate one that works just as well. var SWF 2.02MB 10/01/2008
An overview of how may lab is set up, as well as a review of the Aiptek Action HD 1080p 4:44 Vimeo n/a 09/24/2008
This was a DefCon 15 presentation (August 3-5, 2007) by Sam Bowne. Sam does a great job explaining how to teach ethical hacking at a university, and since he gave me a shout out in the video I figured I'd post it up here. Definitely a must watch if you are trying to convince your college's administration that it's a good idea to teach such a course. Check out Sam's site at http://www.samsclass.info/ if you want to use his teaching curriculum. 28:16 n/a Google 09/23/2008
This is a quick video reconstruction I did of how Sarah Palin's Yahoo account got "hacked". You will see it's more about insecure design and easy to find information than anything really technical. I made a test account at Yahoo and this video traces the steps the attacker took. I'm hoping it will be useful to journalists who don't really seem to have a grasp on the story. Feel free to link it anyplace you like. var 5.23MB SWF 09/18/2008
DD-WRT is a Linux firmware available for many Linksys, NetGear, Belkin, D-Link, Fon, Dell, Asus and other vendor's wireless routers. DD-WRT is far more feature rich than the stock firmware that comes with most routers. This video covers the basics of installing and configuring DD-WRT. var 12.2MB SWF 09/13/2008
This is a presentation I gave for the Kentuckiana ISSA on the security tool Nmap. I've also posted the slides and other media so you can follow along if you like. Topics covered include: port scanning concepts, TCP three way handshake, stealth scans, idle scans, bounce scans, version detection, OS detection, NSE/LUA scripting and firewall logs. Hope some of you can make it to the free class we will be holding at Ivy Tech Sellersburg on Sept 20th, 2008 at 1pm. Contact me to RSVP. The video is about an hour long. Enjoy. 59:41 n/a Vimeo 09/06/2008
The Ironkey is a high security thumb drive designed to provide strong AES encryption, tamper resistance and other security services. 17.6MB SWF 07/07/2008
A network Tarpit, sometimes know by the German word Teergrube, is a service or set of hosts that deliberately try to slow malicious network connections down to a crawl. The idea is to put up unused hosts or services on the network that respond to an attacker, but do things to waste their time and greatly slow their scanning (or spreading in the case of Worms). For this video I'll be using a package called LaBrea by Tom Liston and tarpitting unused IP addresses on my home LAN. var 23.4MB SWF 06/26/2008
Devil2005 has created a video on compiling and configuring dhcpd from source. He's using the Fedora 9 distro of Linux for the video, but the lessons learned should be applicable to other distros. For that matter, even if you are not interested in installing dhcp in this way it's still a good lesson on how to download and compile various applications from source. var 18.7MB SWF 06/22/2008
Fighting back against buffer overflows and memory corruption
I've recently become interested in measures that modern CPUs can take to prevent various types of memory corruption attacks. One such feature is the NX bit (as AMD calls it, XD is Intel's term), which allows for memory pages to me marked as not executable. Microsoft Windows started using this ability with XP SP2 as part of their Data Execution Prevention (DEP) feature. Unfortunately, to get most out of DEP you have to configure it. This video will show how to configure DEP protection in Windows XP and Vista.
var 6.67MB SWF 06/08/2008
In my previous two videos I showed how to use Ettercap plugins for various pen-testing and security evaluation functions. In this video I'll show how to use the Ettercap plugin dns_spoof to set up DNS spoofing on the local area network. var 6.70MB SWF 06/07/2008
In my previous video I showed how to use Ettercap plugins to find sniffers on the network. In this video I'll show three more useful Ettercap plugins: find_ip, gw_discover and isolate. var 6.49MB SWF 05/29/2008
Most of you are familiar with using Ettercap for attacking systems, but what about using it to find attackers? This tutorial will cover using Ettercap to find people sniffing on your network. The plug-ins we will be using are search_promisc, arp_cop and scan_poisoner. var 9.68MB
SWF 05/20/2008
A cryptographic hash function takes an input and returns a fixed size string that corresponds to it, called a hash. Cryptographic hashes have a lot of uses, some of which are: detecting data changes, storing or generating passwords, making unique keys in databases and ensuring message integrity. This video will mostly cover detecting file changes, but I hope it gets your mind going in the right direction for how hashes can be used. Specifically covered will be tools for creating MD5 hashes in Windows and Linux. var 5.40MB SWF 05/10/2008
This video is on Dspeech, a freeware tool that uses Microsoft's SAPI (Speech Application Programming Interface) to convert text to spoken word. What's special about it is it lets you make an MP3 of the text, so you can listen to it on your computer, in you car or on your MP3 player. It's great for listening to notes. var 3.74MB SWF 03/24/2008
This video will demonstrate one of the USB KeyLlama brand of hardware keyloggers in action. var 6.38MB SWF 03/18/2008
Truecrypt 5.0 adds many new features, most importantly Windows system partition encryption. To put it in slightly inaccurate layman's terms, this means encrypting your entire C: drive. Even if you already write your sensitive data to an encrypted space, files are sometimes squirreled away in unencrypted temp space or in the page file where they may be recovered. Using Truecrypt to encrypt your Windows XP system partition will help eliminate this problem. var 6.85MB SWF 02/11/2008
This video will demonstrate one of the KeyLlama brand of hardware keyloggers in action, specifically the 2MB PS/2 model. I hope this video will give the viewer a better grasp of how these hardware keyloggers work. var 14.1MB SWF 02/05/2008
Some people worry about the easy with which their voice communications may be spied upon. Laws like CALEA have made this simpler in some ways, and with roaming wiretaps even those not under direct investigation may lose their privacy. Phil Zimmermann , creator of PGP, has come up with a project called Zfone which aims to do for VoIP what PGP did for email. var 5.02MB SWF 01/28/2008
This tutorial will show how to use GPG and the FireGPG plug-in to encrypt and decrypt messages in Gmail. GPG is an open source implementation of OpenPGP (Pretty Good Privacy) , a public-key-encryption system. With public key encryption you don't have to give away the secret key that decrypts data for people to be able to send you messages. All senders need is the public key which can only be used to encrypt, this way the secret key never has to be sent across unsecured channels.
var 10.6MB SWF 01/14/2008
SQL injection is a common web application attack that focuses on the database backend. WebGoat is a deliberately insecure J2EE web application maintained by OWASP designed to teach web application security lessons. I plan to use WebGoat for a few future videos. This first WebGoat video will show the basics of installing WebGoat and doing two of its SQL injection lessons. var 10.1MB SWF 11/14/2007
While at PhreakNIC I got a chance to interview Kn1ghtl0rd and lowtek mystik about their research into RFID, its hackabilty and other information. If you want to lean more information about RFID check out their video from last year at http://phreaknic.wilpig.org/ . Video for their new talk this year should be up in the coming months. 9:38 YouTube 10/22/2007
As many of my viewers know, I have an interest in metadata and how it can be used in a pen-test. Thanks to PaulDotCom I found out about a tool called Metagoofil that makes it easy to search for metadata related to a domain name. var 5.58MB SWF 10/15/2007
During 2005 Sony BMG was discovered to be including Extended Copy Protection (XPC) and MediaMax CD-3 software on music CDs. The software was automatically installed in the background onto users computers systems that used the autorun function to start running the CD. The software could hide itself from the computers process list in the same way a rootkit would. There was over 100 titles in total that included this "rootkit". Using similar techniques we are going to use the autorun feature with a USB drive to run multiple hacking tools. var 5.59MB SWF 10/12/2007
Fans of my site will think this is a silly video, but I've seen the question asked so many times in forums that I feel I should make a video. Now I'll have something on hand to point people to when they email me, feel free to link to this video if you get the same question. I'll be burning BackTrack with the freeware tool CDBurnerXP, but it would work the same way with Ubuntu, Knoppix or Helix. var 1.47MB SWF 10/09/2007
Map out your WiFi finds with IGiGLE and WiGLE. It's great for users of Netstumbler and Kismet. var 7.10MB SWF 10/01/2007
This video introduces the viewer to using a Nokia Internet Tablet as a pen-testing device. var 7.58MB SWF 09/26/2007
Metadata is data about data. Different file formats store extra data about themselves in different ways. This video will cover metadata that can be used during a forensic investigation, namely MS Word doc metadata and the metadata stored in a Jpeg's Exif data. var 4.81MB SWF 09/20/2007
THC-Hydra is a remote dictionary attack tool from The Hacker's Choice group. It's a well made tool that supports a lot of protocols and options. The following protocols are supported: TELNET, FTP, HTTP, HTTPS, HTTP-PROXY, SMB, SMBNT, MS-SQL, MYSQL, REXEC, RSH, RLOGIN, CVS, SNMP, SMTP-AUTH, SOCKS5, VNC, POP3, IMAP, NNTP, PCNFS, ICQ, SAP/R3, LDAP2, LDAP3, Postgres, Teamspeak, Cisco auth, Cisco enable, LDAP2, Cisco AAA. var 3.15MB SWF 08/08/2007
Another continuation of my file carving video and selective file shredding (DOD 5220.22-M) to thwart forensics tools video, this video shows how to use Darik's Boot and Nuke (DBAN) to totally wipe a drive. DBAN is a great tool to add to your anti-forensics tool box. var 5.67MB SWF 07/25/2007
A continuation of my file carving video, this video shows how to use Eraser and CCleaner to help thwart forensics tools. var 3.36MB SWF 07/12/2007
A quick guide to setting up James Marshall's CGIProxy Perl script and how proxies are used to get around web content restrictions and stay anonymous. This video also shows how to quickly find an open CGI proxy with a search engine. var 6.12MB SWF 06/26/2007
This video introduces the concept of data carving/file carving for recovering deleted files, even after a drive has been formatted. var 4.24MB SWF 06/13/2007
This video introduces the viewer to the AirPcap USB adapter, and auditing WiFi networks with it. var 1.93MB SWF 06/11/2007
This video introduces the viewer to the AirPcap USB adapter, and auditing WiFi networks with it. var 5.91MB SWF 06/06/2007
This video introduces the viewer to port forwarding with Universal Plug In Play, and some of the associated security problems. var 2.69MB SWF 05/30/2007
Just some video Irongeek took while at Notacon 2007. Plenty of stuff for those with an interest in Hacking and digital arts. Radar, full motion video on an 8088, a great Bluetooth discussion, shock sites, stun guns, Everclear, IPTV show hosts, Demoparty/Demoscene, hacker condoms, Ethernet alternatives, fire staffs, laser data links and more. 32:55 79.5MB FLV & AVI 05/03/2007
Just what the title says. In this first video I'll cover how to get SSH can VNC up an running. var 3.16MB SWF 03/18/2007
Yes, yet another video on cracking WEP. :) var 9.06MB SWF 03/16/2007
This video serves as a brief introduction to the use of the Tor anonymizing network in Windows. var 8.00MB SWF 03/08/2007
Due to the lack of LM hashes, Vista passwords stored in the SAM file are harder to crack. However, the NTLM hash is the same as always and can be cracked if the password is weak. var 5.59MB SWF 02/21/2007
In this video I'll cover installing updates and new packages in Ubuntu Linux. var 7.62MB SWF 02/11/2007
Just what the title says. In this first video I'll cover a bit about partitioning, dual booting with Windows and the basic steps you need to do to get Ubuntu Linux up and running. var 4.58MB SWF 02/05/2007
Process Monitor is a useful tool to see what registry, file system and thread changes processes are making on your Windows system. var 6.08MB SWF 01/14/2007
Run all of your Windows and Linux security tools from one dual boot UFD. var 8.36MB SWF 11/30/2006
Pretty much what the title says, building a BartPE CD for Hacking and system recovery. Some of the tools I will show off are Sala's Password Renew, Cain, RunScanner and XPE. var 22.3MB SWF 10/17/2006
Some of the sites that originally hosted them are gone. I'm just putting these up so they are not lost forever. 09/05/2006
How to use the hosts file to block ads, and a little on how the hosts file works. var 2.63MB SWF 09/03/2006
Passive OS Fingerprinting With P0f And Ettercap
If you've seen my videos on Nmap you've seen active OS fingerprinting in action.
In this tutorial I use P0f and Ettercap to show how to detect the Operating
System of a box passively.
var 4.52MB
SWF
08/16/2006
A little about cracking MD5 password hashes. In this tutorial we take the hashes from a phpbb2 database and crack them using online tools and Cain. var 4.47MB SWF 08/02/2006
Access sites that allow indexing by Google but require you to subscribe to view the content. var 3.69MB SWF 07/31/2006
Using TrueCrypt with Alternate Data Streams to hide encrypted data. var 3.68MB SWF 07/19/2006
Using TrueCrypt to create standard and hidden volumes for "plausible deniability" encryption. var 7.33MB SWF 06/19/2006
This video gives the basics of using DD to make an image of a drive over the network and Autopsy to look for data, both from the Auditor Boot CD. var 4.24MB SWF 06/05/2006
This video covers Bluesnarfing, serepticiously grabbing data off of Bluetooth devices. var 7.87MB SWF 05/24/2006
(XVID) 04/10/2006
(XVID) 03/08/2006
The title says it all pretty much. Audit that SAM file fast! var 4.33MB SWF 02/21/2006
In this video I show how to add patches and extra modules to the Back|track Hacking Live CD using MySlax. var 4.22MB SWF 02/07/2006
Just showing off this cool live CD recently released at ShmooCon 2006. Great for surfing anonymously. var 3.27MB SWF 01/30/2006
In my last video I showed how to use the free VMware Player to boot a Live CD ISOs. This time I'm going to show how to use Robert D. Petruska's VMX Builder to make your own VMs with hard drives (vmdk file) and pretty much any virtual hardware you want. var 1.58MB SWF 01/26/2006
In this video I show how to use the free VMware Player to run Live CDs like Knoppix, Auditor or Bart's PE Builder from an ISO. var 4.50MB SWF 01/20/2006
I set up a quick video tutorial to show how to set up an encrypted tunnel using SSH's dynamic port forwarding (sort of a poor man's VPN) in both Linux and Windows. The tools used are OpenSSH, PuTTY and Firefox, but it should be enough info to allow you to figure out how to set up other clients. var 2.95MB SWF 01/11/2006
This video covers the use of the recent (Jan 2006) WMF file code execution vulnerability with Metasploit. It shows how to shovel a shell back to the attacker with the WMF vulnerability. See Microsoft Security Advisory 912840. Thanks to kn1ghtl0rd, AcidTonic, Electroman and livinded for their help. var 3.71MB SWF 01/02/2006
I thought this might be of use to those that would like to submit something to Infonomicon TV or Hack TV but lack the cash for a proper MiniDV camcorder. 5:39 10.10MB AVI(XVID) 12/15/2005
Sarah will tell you a bit about Firewalls and walk you though enabling the built-in firewalls that come with Windows XP and Mac OS X. 2:58 9.70MB AVI(XVID) 11/16/2005
Anna will walk you though updating your Windows XP or Mac OS X computer. 3:06 6.40MB AVI(XVID) 11/16/2005
Indiana Higher Education Cybersecurity Summit 2005
(It covers cracking the SAM/Syskey, Cached ADS/Domain Credentials, VNC stored passwords and Windows Protected Storage) var 5.71MB SWF 04/25/2005