- Видео 154
- Просмотров 148 792
Hakin9 Media
Добавлен 13 июл 2021
The official channel of Hakin9 Media, the publisher of Hakin9, eForensics, and PenTest magazines. Visit our pages for more info about our products!
How Vision Models Work: Architecture of Image Classifiers | Adversarial AI Attacks Course | HAKIN9
This video tutorial provides a deep dive into adversarial attacks on image classification models and is aimed at professionals and hobbyists interested in understanding the weaknesses of AI systems.
JOIN THE FULL COURSE - hakin9.org/course/adversarial-ai-attacks-breach-defend-fortify-image-classifiers-w77/
DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY!
HAKIN9 MEDIA MAGAZINE FAMILY:
Hakin9 Magazine hakin9.org/
eForenscis Magazine www.eforensicsmag.com/
PenTest Magazine www.pentestmag.com/
The techniques described in our content may only be used in private, local networks and with the owner's permission. Hakin9 Media sp....
JOIN THE FULL COURSE - hakin9.org/course/adversarial-ai-attacks-breach-defend-fortify-image-classifiers-w77/
DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY!
HAKIN9 MEDIA MAGAZINE FAMILY:
Hakin9 Magazine hakin9.org/
eForenscis Magazine www.eforensicsmag.com/
PenTest Magazine www.pentestmag.com/
The techniques described in our content may only be used in private, local networks and with the owner's permission. Hakin9 Media sp....
Просмотров: 48
Видео
Enhancing Penetration Testing With Drones | Aerial Assault:Combining Drones and Pentesting | PenTest
Просмотров 489 часов назад
This video tutorial explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. Dive in! JOIN THE FULL COURSE - pentestmag.com/product/aerial-assault-combining-drones-and-pentesting-w54/ DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine hakin9...
Q&A with Angelina Tsuboi | Satellite Security | Hakin9
Просмотров 10514 дней назад
This is a video interview with Angelina Tsuboi, an instructor for Hakin9's online LIVE WORKSHOP entitled "SATELLITE SECURITY", that launches on October 17th at 9AM PDT/12PM EDT/6PM CET Register for the event here: hakin9.org/product/satellite-security-l05/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The techniq...
Game Hacking Live Workshop Invitation | Anthony "RedHatAugust" Radzykewycz | Hakin9
Просмотров 4221 день назад
This is a video introduction with Anthony "RedHatAugust" Radzykewycz, an instructor for Hakin9's online LIVE WORKSHOP entitled "GAME HACKING", that launches on September 28th at 8AM MST/11PM EDT/5PM CET Register for the event here: hakin9.org/product/game-hacki... HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The...
Q&A with Anthony "RedHatAugust" Radzykewycz | Game Hacking | Hakin9
Просмотров 45Месяц назад
This is a video interview with Anthony "RedHatAugust" Radzykewycz, an instructor for Hakin9's online LIVE WORKSHOP entitled "GAME HACKING", that launches on September 28th at 8AM MST/11PM EDT/5PM CET Register for the event here: hakin9.org/product/game-hacking-l01/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ Th...
Q&A with Robert Thomas | Build Ethical Hacking Arsenal with ChatGPT-4o | Hakin9
Просмотров 65Месяц назад
This is a video interview with Robert Thomas, an instructor for Hakin9's VoD online course entitled "Build Ethical Hacking Arsenal with ChatGPT-4o". Get your seat here: hakin9.org/product/build-ethical-hacking-arsenal-with-chatgpt-4o-w76/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The techniques described in o...
Q&A with Hugo Le Belzic | Pixel Trickery: Outsmarting AI in Image Classification Models | Hakin9
Просмотров 70Месяц назад
This is a video interview with Hugo Le Belzic, an instructor for Hakin9's online LIVE WORKSHOP entitled "Pixel Trickery: Outsmarting AI in Image Classification Models", that launches on September 21st at 9AM MST/12PM EDT/6PM CET Register for the event here: hakin9.org/product/pixel-trickery-outsmarting-ai-in-image-classification-models-l02/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eFore...
Hakin9 Webinar | Online Class: Network Security | with Kate Libby & Anthony Radzykewicz
Просмотров 973 месяца назад
Kate Libby and Anthony Radzykewicz discuss analyzing data, identifying risks, and other topics related to Network Security. Learn more through Kate's course - hakin9.org/product/kismet-wireless-network-monitoring-and-analysis-w72/ DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine ...
Online Class: Automotive Security | with Anthony Radzykewycz & Ravi Rajput | PenTest WEBINAR
Просмотров 2094 месяца назад
Anthony Radzykewycz and Ravi Rajput discuss automotive security, its challenges in the future and exchange opinions on educating users when it comes to cybersecurity. JOIN THE FULL COURSE - pentestmag.com/course/autosec-pro-vehicle-cybersecurity-mastery-w52/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9....
Online Class: Drone Pentesting | with Steven Coffey and Timothy Hoffman | PenTest WEBINAR
Просмотров 3545 месяцев назад
Steven Coffey and Timothy Hoffman discuss drone pentesting, the role of curiosity in learning about cybersecurity and the latest regarding UAVs. JOIN THE FULL COURSE - pentestmag.com/course/aerial-assault-combining-drones-and-pentesting-w54/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9.org eForenscis Ma...
eForensics WEBINAR | Incident Response and Forensic Fundamentals | with Afshan Naqvi
Просмотров 3146 месяцев назад
Afshan Naqvi and Staford Titus discuss DFIR, automation techniques tailored for AWS, cybersecurity. JOIN THE FULL COURSE - eforensicsmag.com/course/dfir-in-aws-w63/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9.org eForenscis Magazine www.eforensicsmag.com PenTest Magazine www.pentestmag.com The techniqu...
Interview with Steven Coffey | 13 Questions | PenTest
Просмотров 1166 месяцев назад
This video interview with Steven Coffey from our series "13 Questions" let's you connect with our instructors and their products more. Dive into the fascinating world of drones cybersecurity! JOIN THE FULL COURSE - pentestmag.com/course/aerial-assault-combining-drones-and-pentesting-w54/ HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest...
Hacking with Golang | interview by FILIP PIRES | Hakin9 x PenTest
Просмотров 1736 месяцев назад
This video interview hosted by brazillian PRO cybersecurity specialist Filip Pires, will help you dive deep into the world of hacking with golang! JOIN THE FULL COURSE - pentestmag.com/product/learning-track-hacking-with-golang/ *DISCLAIMER* This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine ...
CAN Replay Attack on Real Car | AutoSec Pro: Vehicle Cybersecurity Mastery | PenTest
Просмотров 7037 месяцев назад
CAN Replay Attack on Real Car | AutoSec Pro: Vehicle Cybersecurity Mastery | PenTest
AWS Threat Assessment Scenario | AWS Security Essentials | Hakin9
Просмотров 1928 месяцев назад
AWS Threat Assessment Scenario | AWS Security Essentials | Hakin9
Hakin9 Webinar | AWS Security Essentials | with Afshan Naqvi
Просмотров 4338 месяцев назад
Hakin9 Webinar | AWS Security Essentials | with Afshan Naqvi
Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9
Просмотров 6719 месяцев назад
Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9
Kali Linux & Frida | Mobile Ethical Hacking | PenTest
Просмотров 2,1 тыс.9 месяцев назад
Kali Linux & Frida | Mobile Ethical Hacking | PenTest
Advance Splunk Query | Mastering Splunk: A Comprehensive Guide | PenTest
Просмотров 3239 месяцев назад
Advance Splunk Query | Mastering Splunk: A Comprehensive Guide | PenTest
CVEs & Exploits | OSINT Tools & TTPs For Pentesters and Red Teamers | PenTest
Просмотров 4549 месяцев назад
CVEs & Exploits | OSINT Tools & TTPs For Pentesters and Red Teamers | PenTest
Kismet Wireless: Network Monitoring and Analysis | 7 Most Common Wi-Fi Threats | Hakin9
Просмотров 24210 месяцев назад
Kismet Wireless: Network Monitoring and Analysis | 7 Most Common Wi-Fi Threats | Hakin9
Aerospace Cybersecurity: Satellite Hacking | Detecting Attacks and Mitigation Strategies | PenTest
Просмотров 1,4 тыс.10 месяцев назад
Aerospace Cybersecurity: Satellite Hacking | Detecting Attacks and Mitigation Strategies | PenTest
Hakin9 Webinar | How to Become a CISO | with Kathleen Mullin
Просмотров 14110 месяцев назад
Hakin9 Webinar | How to Become a CISO | with Kathleen Mullin
DRP Practical Case Study Using ChatGPT
Просмотров 30411 месяцев назад
DRP Practical Case Study Using ChatGPT
PenTest Mag's Live Webinar on Aerospace Cybersecurity with Timothy Hoffman & Angelina Tsuboi
Просмотров 366Год назад
PenTest Mag's Live Webinar on Aerospace Cybersecurity with Timothy Hoffman & Angelina Tsuboi
Authentication Flood | Wireless Network Attacks | Hakin9
Просмотров 953Год назад
Authentication Flood | Wireless Network Attacks | Hakin9
Forensic Science Challenges: Cloud Architecture | Cloud Forensics | eForensics Magazine
Просмотров 307Год назад
Forensic Science Challenges: Cloud Architecture | Cloud Forensics | eForensics Magazine
E-Mails Leading to a Malicious Link | Client-Side Exploitation | Hakin9
Просмотров 614Год назад
E-Mails Leading to a Malicious Link | Client-Side Exploitation | Hakin9
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities | Hakin9
Просмотров 1,3 тыс.Год назад
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities | Hakin9
Hi i make currently working on a project to detect drug trafficking in social media like twitter, instagram, telegram, whatsapp. Can you guide me on how to do a website or app that detects or identifies drug dealers. Please help me..
Hi i make currently working on a project to detect drug trafficking in social media like twitter, instagram, telegram, whatsapp. Can you guide me on how to do a website or app that detects or identifies drug dealers. Please help me..
2 years late, but can this be used in a real world scenario?
This doesnt explain how it is used to "detect fake images"
ahh so this is what this program can do!
Thank you.
thnks !
check check
The responsitory you use is private
'Promo sm' ✨
xsshunter doesnt allow new members
❤
instead of foxy proxy is there anyother tool i can use it for burpsuite
Can i hire you
😮😮
gracias!!!
👍
Your audio keeps cutting out. I tried a couple different audio outputs and then noticed the captions were cutting out at the same time too. I would very much like to watch the content. Please re-upload with a new audio source.
Do you run arm6 ? Or something like that? And on which pi you have setup it ?
Very useful contents
good job bro
any discount on the Course ??
Valuable
Please make a tutorial video on exploiting and hacking Sound/Audio/PA systems
outdated dog$hit
This was a lot of fun! Best regards, Cordny
I can't believe Ive never seen that /displaydns before - nice! also typo on 2:30-3:30 - Get-SmbOpenFile
The heading should be encryption over Linux logical volumes. Here we are not talking about Ext4 FS.
Is this work without root phone
😊
Where did you get that shell code?
not work in iOS 16.5
On the wireshark, if the destination show broadcast, what does it mean?
behtreen. Can I use the same method for my ps5 as well?
I need to carry out a forensic experiment. It involves using Facebook and TikTok on Windows 10 via both Chrome and Firefox browsers. Subsequently, I must reconstruct the activities using the user-side storage and investigate if there are any discrepancies between the two browsers. Would you help me? I dont know how to do that, lol
tanks bro, sucess
thank you so muchhh
How did you acquire the Instagram image?
how could i make it understand if a wifi network is shut down, based on low or steady beacon for example.
How on android
nice thx
It's more called a de-authentication attack.
whoever needs help with this shouldnt be in forensics in the first place
Assalomu alaykum
Kod qanaqa edi
how to create programming language with assembly language
Do you have a blind XSS payload to bypass some WAFs?
is this some kind of joke ? You clicked on link, then on file and then allowed to execute it. but said that just clicked on link. That was some old browser on old windows, that does not have sandbox in it ?
Thank you very much for an excellent explanation, everything was explained in a pleasant and excellent way, and not quickly, in your course do you also show a wan way? And all the commands?
good where are you from bro