Posts in category Security Videos

Advanced Malware Analysis Training Se...

Advanced Malware Analysis Training Session 11 – (Part 2)  Dissecting the HeartBeat RAT Functionalities
Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 2) Dissecting the HeartBeat  RAT Functionalities   This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session, I explained “De [...]

Advanced Malware Analysis Training Se...

Advanced Malware Analysis Training Session 10 – (Part 1) Reversing & Decrypting Communications of HeartBeat RAT
  Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) and our advanced malware training session on (Part 1) Reversing & Decrypting Communications of HeartBeat RAT This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012.       In this extended session [...]

Advanced Malware Analysis Training Se...

Advanced Malware Analysis Training Session 2 – Botnet Analysis
Here is the quick update on this month’s Local Security meet (SX/Null/G4H/owasp) where Amit Malik delivered a superb session on analysis of Botnets with practical case study. This is part of our FREE ‘Advanced Malware Analysis Training’ series started from Dec 2012. In this session Amit Malik explained various advance [...]

Stealing iPhone Backups using Metaspl...

Stealing iPhone Backups using Metasploit
Introduction to iPhone Backups: iTunes is used to back up the iPhone data to a computer. iTunes backup makes a copy of everything on the device like contacts, SMS, photos, calendar, music, call logs, configuration files, database files, keychain, network settings, offline web application cache, safari bookmarks, cookies and application data, [...]

Launched SecurityPhresh.com – Y...

Launched SecurityPhresh.com – Your daily dose of fresh Security Newz !
We are excited to announce the first beta launch of our new project – SecurityPhresh.com – A dedicated portal to bring out the fresh and latest security stuff from all corners of the world. .   . It is born out of my own need to keep on top of all that is happening in security world. Often I used to wander through many news [...]

Make Greater Mark by Contributing on ...

Make Greater Mark by Contributing on SecurityXploded.com
If you have got that hunger, drive, passion for the Computer Security and wanna make it big in this field much faster than others, here is the greater opportunity for you. For the first time,  SecurityXploded.com opens up to those who are still crawling in the dark and struggling to get the light of the day, now you can showcase your work on [...]

Video on SpyDllRemover Detecting HxDe...

Video on SpyDllRemover Detecting HxDef Rootkit
Few days ago, we have released the major version 4.0 of SpyDllRemover which featured significant enhancements over the previous versions. In order to show case all the features properly we have decided to create a series of video demonstrations which will help user to understand & use the SpyDllRemover to its full potential. . . Here is [...]

FireMaster Video Tutorial Showing Hyb...

FireMaster Video Tutorial Showing Hybrid & Bruteforce Method
FireMaster is the first ever built tool to recover the lost master password of Firefox. Master password is used by Firefox to protect the stored sign-on information for all visited websites. If the master password is forgotten, then there is no way to recover the master password and user will lose all the sign-on information stored in it. How [...]

Detecting ‘Slow Dll Hijacking&#...

Detecting ‘Slow Dll Hijacking’ Vulnerability using DllHijackAuditor
‘Dll Hijack’ vulnerability is one of the recently highlighted critical security issue affecting most of the popular Windows applications. Every day researchers are discovering more and more applications which are vulnerable to various forms of ‘Dll Hijacking’ and at the same time attackers have started exploiting [...]

Unleashing VASTO – A Virtualiza...

Unleashing VASTO – A Virtualization Assesment Toolkit
VASTO is the first of its kind toolkit designed to asses the security of various Virtualization solutions including VMWare and Xen server.  It is implemented as set of modules which can be integrated into Metasploit , the popular penetration testing framework.  This makes it very easy for pen testers to directly integrate VASTO with their exi [...]

Our Company

Follow us on Facebook


Join Mailing List

Get direct access to our expert trainers or mingle with like minded security folks in our mailing list