Description: I previously had this chopped up into pieces that were pretty hard to watch. Now that I'm allowed to have videos longer than 15 minutes, I thought I'd give you the un-cut version! Here's the entire 1 hour talk from beginning to end. Links to the source code for the server being compromised and a blog entry can be found here: http://www.cyber-defense.org/Blog/files/e6fb7327cb615688f90fc07656a3880d-28.html
For other great short videos, try http://auditcasts.com
Tags: overflow , exploitation , exploit , metasploit ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
I'm Not a programmer still i can understand.Nice Presentation.
good content. check out this
http://www.securitytube.net/groups?operation=view&groupId=7
http://www.securitytube.net/groups?operation=view&groupId=4