Courses from 1000+ universities
Discover an easier way to explore affordable, credit-worthy online courses with our expanded community college catalog.
600 Free Google Certifications
Web Development
Python
Graphic Design
Astronomy: Exploring Time and Space
Inglés empresarial: ventas, gestión y liderazgo
AI and Big Data in Global Health Improvement
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore macOS security vulnerabilities and bypasses with Patrick Wardle, focusing on synthetic events and code-signing flaws. Learn about potential risks and defensive strategies for Mac users.
Explore the evolution of advanced threats and defensive software, focusing on persistent methods at hardware and firmware levels. Gain insights into modern security gaps and potential solutions.
Exploración técnica de vulnerabilidades en Cisco IOS, incluyendo bypass de DEP, ROPing, shellcode en etapas y evasión de mecanismos de integridad. Incluye demostraciones prácticas y código fuente.
Innovative approaches to botnet construction using network protocols and technologies, exploring SNMP, DNS, HTTP, and other methods for communication and control.
Explore RFID vulnerabilities in MIFARE Classic cards, focusing on public transport systems. Learn about attack methods, countermeasures, and real-world implications for security professionals.
Reverse-engineering and exploiting a hardened MSP430 device: techniques for firmware extraction, analysis, and data retrieval from RAM, with focus on overcoming JTAG security measures.
Explore security vulnerabilities in DVB-C networks, including middleware server attacks, protocol bugs, and MPEG stream fuzzing. Learn to hijack TV streams and manipulate cable broadcasting systems.
Análisis de la relación entre hackers, clickbait y rating desde la perspectiva periodÃstica, explorando los desafÃos del periodismo y la importancia de la participación comunitaria en la difusión de información tecnológica.
Explore how ANSI escape sequences can inject, vandalize, and weaponize plaintext logfiles. Learn about terminal injection, log tampering techniques, and their modern implications for cloud CLI's and DevOps environments.
Exploración detallada de vulnerabilidades en redes VoLTE, demostrando cómo un atacante puede acceder y controlar la red IMS con equipo económico, permitiendo servicios móviles no autorizados.
Exploración detallada de una vulnerabilidad en el SDK Gecko de Silicon Labs, revelando cómo se puede eludir el arranque seguro y la verificación de firmware en dispositivos IoT.
Explore Windows Event Log persistence techniques, bypassing security measures, and elevating privileges in red team operations. Learn innovative approaches for undetectable attacks using Windows itself.
Unveiling a Windows design flaw allowing privilege escalation from Medium to High integrity level, demonstrating a 100% reliable exploit on the latest Windows versions.
Uncover novel techniques to identify and exploit flawed logic in honeypots, enabling counter-intelligence activities. Learn about comprehensive research on 40 honeypots and global scan analysis findings.
Unveiling security flaws in TETRA radio systems used by government agencies and critical infrastructure. Demonstrates vulnerabilities in encryption, authentication, and identity protection, enabling practical attacks on confidentiality and integrity of c…
Get personalized course recommendations, track subjects and courses with reminders, and more.