Securitytube Metasploit Framework Expert Part 4 (Framework Organization)

/
This is Part 4 of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . You can sign up for the course here http://www.securitytube.net/smfe Enjoy!

Securitytube Metasploit Framework Expert Part 3 ( Meterpreter Basics )

/
Description: This is Part 2 of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . You can sign up for the course here http://www.securitytube.net/smfe Enjoy! In this video, we will look at the basics of Meterpreter - how it uses reflective DLL injection to stay in-memory, communicates over encrypted channels, uses TLV for communication which allows for multi-channel communication and a bunch of other things.

Securitytube Metasploit Framework Expert Part 2 ( Why Metasploit? )

/
This is Part 2 of the Security Metasploit Framework Expert (SMFE) course material. You can begin by watching Part 1 here: http://www.securitytube.net/video/2556 . You can sign up for the course here: http://www.securitytube.net/smfe

Securitytube Metasploit Framework Expert Part 1 (Exploitation Basics)

/
Welcome to Part 1 of the SecurityTube Metasploit Framework Expert (SMFE) course material videos. You can sign up for the course here: http://www.securitytube.net/smfe

Metasploit Tutorial – Simple Icecast Exploit

/
This module exploits a buffer overflow in the header parsing of icecast, discovered by Luigi Auriemma. Sending 32 HTTP headers will cause a write one past the end of a pointer array. On win32 this happens to overwrite the saved instruction pointer, and on linux (depending on compiler, etc) this seems to generally overwrite nothing crucial (read not exploitable).

Cyber Espionage: The Chinese Threat (Full Episode) CNBC

/
It’s what experts at the highest levels of government say is the biggest threat to America’s economic security. Cyber spies hacking into U.S. corporations’ computer networks are stealing valuable trade secrets, intellectual property data and confidential business strategies.

Securing the Cloud eConference!

/
Apple and Google are ramping up their server farms to prepare for massive increases in the use of cloud platforms. Road warriors and consumers the world over are already accessing music, film and data via cloud implementations, like iTunes and Google Docs, and reliance on these systems will only increase.

‘Internet doomsday’ impact minimal, service providers say

/
Hours after "Internet doomsday" kicked in, major service providers say almost all customers have avoided the shut-off of their Internet service, although there are some who will not be able to read this story online, unless it's on their smartphones.

Cyber Espionage: The Chinese Threat

/
Experts at the highest levels of government say it's the biggest…

Understanding and Protecting Personally Identifiable Information (PII)

/
What is Pii? It is Personally Identifiable Information (PII), a term used in information technology sector to describe information about an individual that could potentially identify that person, such as a name, email address, street address, telephone number or social security number or other biometric data, number.