ASLR and DEP Exploit Development Demo for UNSW ZEIT8042
Fatih Ozavci
ASLR and DEP Exploit Development Demo for UNSW ZEIT8042
26:01
Tehsat Malware Traffic Generator - IcedID Ransomware Traffic Simulation
Fatih Ozavci
Tehsat Malware Traffic Generator - IcedID Ransomware Traffic Simulation
6:52
C2Gate Malware Traffic Generator - Introduction
Fatih Ozavci
C2Gate Malware Traffic Generator - Introduction
6:59
TA505+ Adversary Simulation: Reconnaissance - TA505 ThreatIntel and Introduction
Fatih Ozavci
TA505+ Adversary Simulation: Reconnaissance - TA505 ThreatIntel and Introduction
21:27
TA505+ Adversary Simulation: Lateral Movement - 1 Tunneling and Discovery
Fatih Ozavci
TA505+ Adversary Simulation: Lateral Movement - 1 Tunneling and Discovery
22:23
TA505+ Adversary Simulation: Delivery - 1 Email to Excel File and Petaq Execution
Fatih Ozavci
TA505+ Adversary Simulation: Delivery - 1 Email to Excel File and Petaq Execution
6:00
TA505+ Adversary Simulation: AoO - 8 Linux Ircd Exploitation and Docker Privilege Escalation
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 8 Linux Ircd Exploitation and Docker Privilege Escalation
6:14
TA505+ Adversary Simulation:  Weaponisation - 4 Petaq Implant and Service Demonstration
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 4 Petaq Implant and Service Demonstration
11:18
TA505+ Adversary Simulation: AoO - 2 Ransomware Simulation
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 2 Ransomware Simulation
9:40
TA505+ Adversary Simulation: Weaponisation - 7 Excel File Running Petaq Dropper
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 7 Excel File Running Petaq Dropper
12:29
TA505+ Adversary Simulation: Weaponisation - 6 Petaq UAC Bypass and Running Meterpreter
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 6 Petaq UAC Bypass and Running Meterpreter
12:23
TA505+ Adversary Simulation: AoO - 1 Situational Awareness Credential Dump Meterpreter Injection
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 1 Situational Awareness Credential Dump Meterpreter Injection
27:50
TA505+ Adversary Simulation: Exploitation - 1 Restriction Escape   Persistency and UAC Bypass
Fatih Ozavci
TA505+ Adversary Simulation: Exploitation - 1 Restriction Escape Persistency and UAC Bypass
12:06
TA505+ Adversary Simulation:  Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter
Fatih Ozavci
TA505+ Adversary Simulation: Exploitation - 2 Stealing SYSTEM Token and Giving it to Meterpreter
16:40
TA505+ Adversary Simulation: AoO - 3 Compromising Windows 2008 and Data Exfiltration
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 3 Compromising Windows 2008 and Data Exfiltration
15:09
TA505+ Adversary Simulation: Weaponisation - 3 Petaq Dropper
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 3 Petaq Dropper
10:46
TA505+ Adversary Simulation: Weaponisation - 2 Petaq AMSI Bypass
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 2 Petaq AMSI Bypass
18:07
TA505+ Adversary Simulation: Exercise Conclusion
Fatih Ozavci
TA505+ Adversary Simulation: Exercise Conclusion
3:24
TA505+ Adversary Simulation: AoO - 5 Swift Application Compromise
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 5 Swift Application Compromise
10:15
TA505+ Adversary Simulation: Delivery - 2 Nested Implants
Fatih Ozavci
TA505+ Adversary Simulation: Delivery - 2 Nested Implants
8:35
TA505+ Adversary Simulation: AoO - 7 Linux Privilege Escalation Attempts
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 7 Linux Privilege Escalation Attempts
10:24
TA505+ Adversary Simulation: AoO - 6 Brute Forcing SSH and Exploiting ProFTPD on Linux Server
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 6 Brute Forcing SSH and Exploiting ProFTPD on Linux Server
8:39
TA505+ Adversary Simulation: Lateral Movement - 2 Star Like Nested Implant Connections
Fatih Ozavci
TA505+ Adversary Simulation: Lateral Movement - 2 Star Like Nested Implant Connections
3:10
TA505+ Adversary Simulation: AoO - 4 Credential Dump on Windows 2008
Fatih Ozavci
TA505+ Adversary Simulation: AoO - 4 Credential Dump on Windows 2008
6:39
TA505+ Adversary Simulation: Weaponisation - 5 Petaq Implant Running Meterpreter
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 5 Petaq Implant Running Meterpreter
9:29
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development
Fatih Ozavci
TA505+ Adversary Simulation: Weaponisation - 1 C2 and Malware Development
11:15
Practical Automated Adversary Simulation Using Petaq C2 (AusCERT 2020 Demo)
Fatih Ozavci
Practical Automated Adversary Simulation Using Petaq C2 (AusCERT 2020 Demo)
9:41
Introduction to Purple Team Simulations using Petaq C2/Malware
Fatih Ozavci
Introduction to Purple Team Simulations using Petaq C2/Malware
1:14:14
VoIP Wars: Destroying Jar Jar Lync (exploit demonstration)
Fatih Ozavci
VoIP Wars: Destroying Jar Jar Lync (exploit demonstration)
12:58
SDES based SRTP traffic decryption demo
Fatih Ozavci
SDES based SRTP traffic decryption demo
3:19
Boghe VoIP client - SIP Invite based PoC exploit (0 Day)
Fatih Ozavci
Boghe VoIP client - SIP Invite based PoC exploit (0 Day)
2:37
Vi-Vo VoIP client - SIP Message based PoC exploit (0 Day)
Fatih Ozavci
Vi-Vo VoIP client - SIP Message based PoC exploit (0 Day)
1:41
Shellshock exploit demonstration for Cisco CUCM 10.5.1
Fatih Ozavci
Shellshock exploit demonstration for Cisco CUCM 10.5.1
3:13
VoIP Wars: Attack of the Cisco Phones (Live Demo Remake)
Fatih Ozavci
VoIP Wars: Attack of the Cisco Phones (Live Demo Remake)
11:39
Attacking SIP/VoIP Servers Using VIPROY VoIP Pen-Test Kit for Fun & Profit
Fatih Ozavci
Attacking SIP/VoIP Servers Using VIPROY VoIP Pen-Test Kit for Fun & Profit
53:06
Hacking Trust Relationships of SIP/NGN Gateways
Fatih Ozavci
Hacking Trust Relationships of SIP/NGN Gateways
7:55
SIP/NGN Services Pen-Testing using Metasploit SIP Modules v2
Fatih Ozavci
SIP/NGN Services Pen-Testing using Metasploit SIP Modules v2
7:27
Penetration Testing for SIP/VoIP Services (Using Metasploit Framework)
Fatih Ozavci
Penetration Testing for SIP/VoIP Services (Using Metasploit Framework)
12:38