Videos worth watching

More videos

Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications
  

Consent & Compromise: Abusing Entra OAuth for Fun and Access to Internal Microsoft Applications

What would happen if I simply logged in to this internal Microsoft application with my own Microsoft account? Surely that

Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange
  

Cross-Origin Web Attacks via HTTP/2 Server Push and Signed HTTP Exchange

In this talk, we will introduce the security implications of HTTP/2 server push and signed HTTP exchange (SXG) on the

Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour
  

Your Traffic Doesn’t Lie: Unmasking Supply Chain Attacks via Application Behaviour

Supply chain compromises like the 2020 SolarWinds breach have shown how devastating and stealthy these attacks can be. Despite advances

XUnprotect: Reverse Engineering macOS XProtect Remediator
  

XUnprotect: Reverse Engineering macOS XProtect Remediator

The macOS threat landscape has changed considerably in recent years with the ever-increasing prevalence of macOS malware. In response, Apple

Weaponizing Apple AI for Offensive Operations
  

Weaponizing Apple AI for Offensive Operations

Apple’s on device AI frameworks CoreML, Vision, AVFoundation enable powerful automation and advanced media processing. However, these same capabilities introduce

DEF CON 33  – Can’t Stop the ROP: Automating Universal ASLR Bypasses – Bramwell Brizendine
  

DEF CON 33 – Can’t Stop the ROP: Automating Universal ASLR Bypasses – Bramwell Brizendine

High-entropy ASLR was supposed to make bypasses of ASLR on Windows virtually impossible – until now! This talk will debut

DEF CON 33 – DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks – Ryan Emmon
  

DEF CON 33 – DisguiseDelimit: Exploiting Synology NAS with Delimiters and Novel Tricks – Ryan Emmon

Network Attached Storage (NAS) devices are indispensable in many corporate and home environments. These devices often live on the network

DEF CON 33 – Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen  – Marek Tóth
  

DEF CON 33 – Browser Extension Clickjacking: One Click and Your Credit Card Is Stolen – Marek Tóth

Browser extensions have become increasingly popular for enhancing the web browsing experience. Common examples are ad blockers, cryptocurrency wallets, and

Learn PowerShell!
  

Learn PowerShell!

Just Hacking Training livestream with Andrew Pla! Friday February 20th at 10am PT / 1pm ET. https://justhacking.com/John HammondRead More

Black Hat USA 2025 | Locknote: Conclusions & Key Takeaways from Black Hat USA 2025
  

Black Hat USA 2025 | Locknote: Conclusions & Key Takeaways from Black Hat USA 2025

Join Black Hat USA Review Board Members for a compelling discussion on the most pressing issues facing the InfoSec community