Data Centers

Is your data center converged, virtualized, cloud-enabled, and software-defined? Or full of legacy and high-TCO equipment? Find out how to build an infrastructure that keeps you ahead of the competition.

  • Page Fault Liberation Army

    Webcasts // Jan 2014 // provided by SecurityTube.net

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Watch Now
  • A Syscall to ARMs

    Webcasts // Jan 2014 // provided by SecurityTube.net

    ARM processors are growing more and more prevalent in the world; ARM itself claims that more than 20 billion chips have been shipped. Take a moment to appreciate that is about three chips for every man, woman, and child on earth. The three main topics, the presenter aim to cover...

    Watch Now
  • All Your Baseband Are Belong to Us

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter explores the viability of attacks against the baseband processor of GSM cellular phones and shows first practical results that enable code execution on them. It will include a demo of a practical exploitation of a remote memory corruption on the iPhone4.

    Watch Now
  • Page Fault Liberation Army or Gained in Translation

    Webcasts // Jan 2014 // provided by SecurityTube.net

    x86 processors contain a surprising amount of built-in memory translation logic, which is driven by various data tables with intricate entry formats, and can produce various kinds of traps and other interesting computational effects. These features are mostly relics of earlier, more civilized times, when Jedi Knights tried to protect...

    Watch Now
  • An Introduction to Firmware Analysis

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter gives an introduction to firmware analysis: It starts with how to retrieve the binary, e.g. get a plain file from manufacturer, extract it from an executable or memory device, or even sniff it out of an update process or internal CPU memory, which can be...

    Watch Now
  • General Notes About Exploiting Windows X64

    Webcasts // Jan 2014 // provided by SecurityTube.net

    During the last few years, x64 processors have been a growing technology adding performance and memory range to the old 32-bits cores. Now-a-days, most of the PCs make use of them, and Microsoft has ported its operating system, Windows, adding several changes and protection measures. Security measures have evolved since...

    Watch Now
  • Using Web Proxy Servers for Hacking

    Webcasts // Jan 2014 // provided by SecurityTube.net

    Sometimes the user wants to pentest on some website so it is very difficult to hide their identity when they hack some website, so using web proxy they can hide their identity. And if in their network there is one firewall so they are not able to access some website...

    Watch Now
  • Scanning Web Server Using Nikto

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this podcast, the speaker will scan on apache server and Ubuntu 11.04. The speaker will explain how to learn Nikto tool for scanning the web server. Nikto is an open source web server scanner tool.

    Watch Now
  • Darknet and Hidden Servers at Blackhat DC 2011

    Webcasts // Jan 2014 // provided by SecurityTube.net

    Locally ran proxies that the users' can connect to and control via a web browser. These connect other I2P routers via tunnels. Network information is distributed via a DHT know as NetDB. In this webcast, the presenter will discuss the Darknets and hidden servers identifying the true IP/network identity of...

    Watch Now
  • The Exploration and Exploitation Of an SD Memory Card

    Webcasts // Jan 2014 // provided by SecurityTube.net

    In this webcast, the presenter demonstrates a method for reverse engineering and loading code into the microcontroller within a SD memory card. All \"Managed flash\" devices, such as SD, microSD, and SSD, contain an embedded controller to assist with the complex tasks necessary to create an abstraction of reliable, contiguous...

    Watch Now