Securitytube Metasploit Framework Expert Part 1 (Exploitation Basics)
/
0 Comments
Welcome to Part 1 of the SecurityTube Metasploit Framework Expert (SMFE) course material videos. You can sign up for the course here: http://www.securitytube.net/smfe
Metasploit Tutorial – Simple Icecast Exploit
This module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array. On win32 this happens to overwrite the saved instruction pointer, and on linux (depending on compiler, etc) this seems to generally overwrite nothing crucial (read not exploitable).
Cyber Espionage: The Chinese Threat (Full Episode) CNBC
It’s what experts at the highest levels of government say is the biggest threat to America’s economic security. Cyber spies hacking into U.S. corporations’ computer networks are stealing valuable trade secrets, intellectual property data and confidential business strategies.
Securing the Cloud eConference!
Apple and Google are ramping up their server farms to prepare for massive increases in the use of cloud platforms. Road warriors and consumers the world over are already accessing music, film and data via cloud implementations, like iTunes and Google Docs, and reliance on these systems will only increase.
‘Internet doomsday’ impact minimal, service providers say
Hours after "Internet doomsday" kicked in, major service providers say almost all customers have avoided the shut-off of their Internet service, although there are some who will not be able to read this story online, unless it's on their smartphones.
Cyber Espionage: The Chinese Threat
Experts at the highest levels of government say it's the biggest…
