Hakin9 Media
Hakin9 Media
  • Видео 154
  • Просмотров 148 792
How Vision Models Work: Architecture of Image Classifiers | Adversarial AI Attacks Course | HAKIN9
This video tutorial provides a deep dive into adversarial attacks on image classification models and is aimed at professionals and hobbyists interested in understanding the weaknesses of AI systems.
JOIN THE FULL COURSE - hakin9.org/course/adversarial-ai-attacks-breach-defend-fortify-image-classifiers-w77/
DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY!
HAKIN9 MEDIA MAGAZINE FAMILY:
Hakin9 Magazine hakin9.org/
eForenscis Magazine www.eforensicsmag.com/
PenTest Magazine www.pentestmag.com/
The techniques described in our content may only be used in private, local networks and with the owner's permission. Hakin9 Media sp....
Просмотров: 48

Видео

Enhancing Penetration Testing With Drones | Aerial Assault:Combining Drones and Pentesting | PenTest
Просмотров 489 часов назад
This video tutorial explores the cutting-edge intersection of drone technology and cybersecurity penetration testing. Dive in! JOIN THE FULL COURSE - pentestmag.com/product/aerial-assault-combining-drones-and-pentesting-w54/ DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine hakin9...
Q&A with Angelina Tsuboi | Satellite Security | Hakin9
Просмотров 10514 дней назад
This is a video interview with Angelina Tsuboi, an instructor for Hakin9's online LIVE WORKSHOP entitled "SATELLITE SECURITY", that launches on October 17th at 9AM PDT/12PM EDT/6PM CET Register for the event here: hakin9.org/product/satellite-security-l05/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The techniq...
Game Hacking Live Workshop Invitation | Anthony "RedHatAugust" Radzykewycz | Hakin9
Просмотров 4221 день назад
This is a video introduction with Anthony "RedHatAugust" Radzykewycz, an instructor for Hakin9's online LIVE WORKSHOP entitled "GAME HACKING", that launches on September 28th at 8AM MST/11PM EDT/5PM CET Register for the event here: hakin9.org/product/game-hacki... HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The...
Q&A with Anthony "RedHatAugust" Radzykewycz | Game Hacking | Hakin9
Просмотров 45Месяц назад
This is a video interview with Anthony "RedHatAugust" Radzykewycz, an instructor for Hakin9's online LIVE WORKSHOP entitled "GAME HACKING", that launches on September 28th at 8AM MST/11PM EDT/5PM CET Register for the event here: hakin9.org/product/game-hacking-l01/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ Th...
Q&A with Robert Thomas | Build Ethical Hacking Arsenal with ChatGPT-4o | Hakin9
Просмотров 65Месяц назад
This is a video interview with Robert Thomas, an instructor for Hakin9's VoD online course entitled "Build Ethical Hacking Arsenal with ChatGPT-4o". Get your seat here: hakin9.org/product/build-ethical-hacking-arsenal-with-chatgpt-4o-w76/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest Magazine www.pentestmag.com/ The techniques described in o...
Q&A with Hugo Le Belzic | Pixel Trickery: Outsmarting AI in Image Classification Models | Hakin9
Просмотров 70Месяц назад
This is a video interview with Hugo Le Belzic, an instructor for Hakin9's online LIVE WORKSHOP entitled "Pixel Trickery: Outsmarting AI in Image Classification Models", that launches on September 21st at 9AM MST/12PM EDT/6PM CET Register for the event here: hakin9.org/product/pixel-trickery-outsmarting-ai-in-image-classification-models-l02/ HAKIN9 MEDIA FAMILY: Hakin9 Magazine hakin9.org/ eFore...
Hakin9 Webinar | Online Class: Network Security | with Kate Libby & Anthony Radzykewicz
Просмотров 973 месяца назад
Kate Libby and Anthony Radzykewicz discuss analyzing data, identifying risks, and other topics related to Network Security. Learn more through Kate's course - hakin9.org/product/kismet-wireless-network-monitoring-and-analysis-w72/ DISCLAIMER This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine ...
Online Class: Automotive Security | with Anthony Radzykewycz & Ravi Rajput | PenTest WEBINAR
Просмотров 2094 месяца назад
Anthony Radzykewycz and Ravi Rajput discuss automotive security, its challenges in the future and exchange opinions on educating users when it comes to cybersecurity. JOIN THE FULL COURSE - pentestmag.com/course/autosec-pro-vehicle-cybersecurity-mastery-w52/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9....
Online Class: Drone Pentesting | with Steven Coffey and Timothy Hoffman | PenTest WEBINAR
Просмотров 3545 месяцев назад
Steven Coffey and Timothy Hoffman discuss drone pentesting, the role of curiosity in learning about cybersecurity and the latest regarding UAVs. JOIN THE FULL COURSE - pentestmag.com/course/aerial-assault-combining-drones-and-pentesting-w54/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9.org eForenscis Ma...
eForensics WEBINAR | Incident Response and Forensic Fundamentals | with Afshan Naqvi
Просмотров 3146 месяцев назад
Afshan Naqvi and Staford Titus discuss DFIR, automation techniques tailored for AWS, cybersecurity. JOIN THE FULL COURSE - eforensicsmag.com/course/dfir-in-aws-w63/ Content created for educational purposes and for ethical hacking practices only. HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine www.hakin9.org eForenscis Magazine www.eforensicsmag.com PenTest Magazine www.pentestmag.com The techniqu...
Interview with Steven Coffey | 13 Questions | PenTest
Просмотров 1166 месяцев назад
This video interview with Steven Coffey from our series "13 Questions" let's you connect with our instructors and their products more. Dive into the fascinating world of drones cybersecurity! JOIN THE FULL COURSE - pentestmag.com/course/aerial-assault-combining-drones-and-pentesting-w54/ HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine hakin9.org/ eForenscis Magazine www.eforensicsmag.com/ PenTest...
Hacking with Golang | interview by FILIP PIRES | Hakin9 x PenTest
Просмотров 1736 месяцев назад
This video interview hosted by brazillian PRO cybersecurity specialist Filip Pires, will help you dive deep into the world of hacking with golang! JOIN THE FULL COURSE - pentestmag.com/product/learning-track-hacking-with-golang/ *DISCLAIMER* This video is a part of the ethical hacking course, provided with the ethical and educational purposes ONLY! HAKIN9 MEDIA MAGAZINE FAMILY: Hakin9 Magazine ...
CAN Replay Attack on Real Car | AutoSec Pro: Vehicle Cybersecurity Mastery | PenTest
Просмотров 7037 месяцев назад
CAN Replay Attack on Real Car | AutoSec Pro: Vehicle Cybersecurity Mastery | PenTest
AWS Threat Assessment Scenario | AWS Security Essentials | Hakin9
Просмотров 1928 месяцев назад
AWS Threat Assessment Scenario | AWS Security Essentials | Hakin9
Hakin9 Webinar | AWS Security Essentials | with Afshan Naqvi
Просмотров 4338 месяцев назад
Hakin9 Webinar | AWS Security Essentials | with Afshan Naqvi
Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9
Просмотров 6719 месяцев назад
Introduction to Kismet | Kismet Wireless: Network Monitoring and Analysis | Hakin9
Kali Linux & Frida | Mobile Ethical Hacking | PenTest
Просмотров 2,1 тыс.9 месяцев назад
Kali Linux & Frida | Mobile Ethical Hacking | PenTest
Advance Splunk Query | Mastering Splunk: A Comprehensive Guide | PenTest
Просмотров 3239 месяцев назад
Advance Splunk Query | Mastering Splunk: A Comprehensive Guide | PenTest
CVEs & Exploits | OSINT Tools & TTPs For Pentesters and Red Teamers | PenTest
Просмотров 4549 месяцев назад
CVEs & Exploits | OSINT Tools & TTPs For Pentesters and Red Teamers | PenTest
Kismet Wireless: Network Monitoring and Analysis | 7 Most Common Wi-Fi Threats | Hakin9
Просмотров 24210 месяцев назад
Kismet Wireless: Network Monitoring and Analysis | 7 Most Common Wi-Fi Threats | Hakin9
Aerospace Cybersecurity: Satellite Hacking | Detecting Attacks and Mitigation Strategies | PenTest
Просмотров 1,4 тыс.10 месяцев назад
Aerospace Cybersecurity: Satellite Hacking | Detecting Attacks and Mitigation Strategies | PenTest
Hakin9 Webinar | How to Become a CISO | with Kathleen Mullin
Просмотров 14110 месяцев назад
Hakin9 Webinar | How to Become a CISO | with Kathleen Mullin
DRP Practical Case Study Using ChatGPT
Просмотров 30411 месяцев назад
DRP Practical Case Study Using ChatGPT
PenTest Mag's Live Webinar on Aerospace Cybersecurity with Timothy Hoffman & Angelina Tsuboi
Просмотров 366Год назад
PenTest Mag's Live Webinar on Aerospace Cybersecurity with Timothy Hoffman & Angelina Tsuboi
Publish your artcle at PenTest Mag!
Просмотров 109Год назад
Publish your artcle at PenTest Mag!
Authentication Flood | Wireless Network Attacks | Hakin9
Просмотров 953Год назад
Authentication Flood | Wireless Network Attacks | Hakin9
Forensic Science Challenges: Cloud Architecture | Cloud Forensics | eForensics Magazine
Просмотров 307Год назад
Forensic Science Challenges: Cloud Architecture | Cloud Forensics | eForensics Magazine
E-Mails Leading to a Malicious Link | Client-Side Exploitation | Hakin9
Просмотров 614Год назад
E-Mails Leading to a Malicious Link | Client-Side Exploitation | Hakin9
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities | Hakin9
Просмотров 1,3 тыс.Год назад
Improper Error Handling | Penetration testing OWASP Top 10 Vulnerabilities | Hakin9

Комментарии

  • @varshithgoud1589
    @varshithgoud1589 17 дней назад

    Hi i make currently working on a project to detect drug trafficking in social media like twitter, instagram, telegram, whatsapp. Can you guide me on how to do a website or app that detects or identifies drug dealers. Please help me..

  • @varshithgoud1589
    @varshithgoud1589 17 дней назад

    Hi i make currently working on a project to detect drug trafficking in social media like twitter, instagram, telegram, whatsapp. Can you guide me on how to do a website or app that detects or identifies drug dealers. Please help me..

  • @oentrepreneur
    @oentrepreneur Месяц назад

    2 years late, but can this be used in a real world scenario?

  • @H3li0s_kun
    @H3li0s_kun Месяц назад

    This doesnt explain how it is used to "detect fake images"

  • @senditall152
    @senditall152 2 месяца назад

    ahh so this is what this program can do!

  • @johnyount989
    @johnyount989 4 месяца назад

    Thank you.

  • @shKiev
    @shKiev 5 месяцев назад

    thnks !

  • @shKiev
    @shKiev 5 месяцев назад

    check check

  • @JohannesWolf-l1f
    @JohannesWolf-l1f 5 месяцев назад

    The responsitory you use is private

  • @Francesco-xs1lt
    @Francesco-xs1lt 6 месяцев назад

    'Promo sm' ✨

  • @nix138
    @nix138 6 месяцев назад

    xsshunter doesnt allow new members

  • @bayou__
    @bayou__ 6 месяцев назад

  • @sakura-gd8nh
    @sakura-gd8nh 6 месяцев назад

    instead of foxy proxy is there anyother tool i can use it for burpsuite

  • @miscellaneous4584
    @miscellaneous4584 7 месяцев назад

    Can i hire you

  • @daksh-or1xn
    @daksh-or1xn 7 месяцев назад

    😮😮

  • @gabbasex
    @gabbasex 7 месяцев назад

    gracias!!!

  • @jonasarman5074
    @jonasarman5074 7 месяцев назад

    👍

  • @jonjflanagan
    @jonjflanagan 8 месяцев назад

    Your audio keeps cutting out. I tried a couple different audio outputs and then noticed the captions were cutting out at the same time too. I would very much like to watch the content. Please re-upload with a new audio source.

  • @sargismartirosyan9946
    @sargismartirosyan9946 8 месяцев назад

    Do you run arm6 ? Or something like that? And on which pi you have setup it ?

  •  9 месяцев назад

    Very useful contents

  • @diefer8093
    @diefer8093 9 месяцев назад

    good job bro

  • @sheleshrauthan5912
    @sheleshrauthan5912 9 месяцев назад

    any discount on the Course ??

  • @rebelkingxs8048
    @rebelkingxs8048 9 месяцев назад

    Valuable

  • @cybsecprof1008
    @cybsecprof1008 9 месяцев назад

    Please make a tutorial video on exploiting and hacking Sound/Audio/PA systems

  • @rootshell101
    @rootshell101 10 месяцев назад

    outdated dog$hit

  • @testingsaas-createcontentt5413
    @testingsaas-createcontentt5413 11 месяцев назад

    This was a lot of fun! Best regards, Cordny

  • @xmlisnotaprotocol
    @xmlisnotaprotocol Год назад

    I can't believe Ive never seen that /displaydns before - nice! also typo on 2:30-3:30 - Get-SmbOpenFile

  • @C7ZI
    @C7ZI Год назад

    The heading should be encryption over Linux logical volumes. Here we are not talking about Ext4 FS.

  • @ubsongs1736
    @ubsongs1736 Год назад

    Is this work without root phone

  • @darcy6698
    @darcy6698 Год назад

    😊

  • @dolby360
    @dolby360 Год назад

    Where did you get that shell code?

  • @chrismok23
    @chrismok23 Год назад

    not work in iOS 16.5

  • @redzafahmi6288
    @redzafahmi6288 Год назад

    On the wireshark, if the destination show broadcast, what does it mean?

  • @TonyAsh-rp6fp
    @TonyAsh-rp6fp Год назад

    behtreen. Can I use the same method for my ps5 as well?

  • @YouTubler0815
    @YouTubler0815 Год назад

    I need to carry out a forensic experiment. It involves using Facebook and TikTok on Windows 10 via both Chrome and Firefox browsers. Subsequently, I must reconstruct the activities using the user-side storage and investigate if there are any discrepancies between the two browsers. Would you help me? I dont know how to do that, lol

  • @davidferraz9312
    @davidferraz9312 Год назад

    tanks bro, sucess

  • @anhla4265
    @anhla4265 Год назад

    thank you so muchhh

  • @snsndnnxnxnnx427
    @snsndnnxnxnnx427 Год назад

    How did you acquire the Instagram image?

  • @ciruzzmaster
    @ciruzzmaster Год назад

    how could i make it understand if a wifi network is shut down, based on low or steady beacon for example.

  • @ibrahimmods2808
    @ibrahimmods2808 Год назад

    How on android

  • @muhammadaleem-xt9tl
    @muhammadaleem-xt9tl Год назад

    nice thx

  • @howtodefeatgangstalking
    @howtodefeatgangstalking Год назад

    It's more called a de-authentication attack.

  • @justiinahirvonen4902
    @justiinahirvonen4902 Год назад

    whoever needs help with this shouldnt be in forensics in the first place

  • @asqarkarakulov3485
    @asqarkarakulov3485 Год назад

    Assalomu alaykum

  • @asqarkarakulov3485
    @asqarkarakulov3485 Год назад

    Kod qanaqa edi

  • @aspergerhyperactive903
    @aspergerhyperactive903 Год назад

    how to create programming language with assembly language

  • @Samuel-so7ne
    @Samuel-so7ne Год назад

    Do you have a blind XSS payload to bypass some WAFs?

  • @duck6405
    @duck6405 Год назад

    is this some kind of joke ? You clicked on link, then on file and then allowed to execute it. but said that just clicked on link. That was some old browser on old windows, that does not have sandbox in it ?

  • @silkroad780
    @silkroad780 Год назад

    Thank you very much for an excellent explanation, everything was explained in a pleasant and excellent way, and not quickly, in your course do you also show a wan way? And all the commands?

  • @DEADCODE_
    @DEADCODE_ Год назад

    good where are you from bro