Head to to start your free 30-day trial, and get 20% off an annual premium subscription.
PART TWO IS OUT NOW 👉
In this video, we take a deep dive into EternalBlue, the infamous exploit behind many of the most impactful cyber-attacks, such as WannaCry, NotPetya, TrickBot, and more. This is the most sophisticated exploit I have covered on this channel, due to the sheer rigor and length of the exploit chain. I wanted to build up to a comprehensive understanding of the exploit, starting with the buffer overflow / out-of-bounds write, as well as the arbitrary memory allocation, before outlining how the attack is executed. Whether you’re a pen tester, security researcher, or cyber security expert, I hope you’ll find this attack as fascinating as I did.
JOIN THE DISCORD! 👉
EternalBlue technical sources:
CON 26/DEF CON 26 presentations/
~arnold/427/18s/427_18S/indepth/EternalBlue/
EternalBlue non-technical sources:
Memo 7434
://
@theshadowbrokers/lost-in-translation
://
SMB documentation:
MUSIC CREDITS:
LEMMiNO - Cipher
CC BY-SA 4.0
LEMMiNO - Firecracker
CC BY-SA 4.0
LEMMiNO - Nocturnal
CC BY-SA 4.0
LEMMiNO - Siberian
CC BY-SA 4.0
LEMMiNO - Encounters
CC BY-SA 4.0
#programming #software #softwareengineering #computerscience #code #hacking #hack #cybersecurity #exploit #tracking #softwareengineer #vulnerability #pentesting #privacy #spyware #malware #cyber #cyberattack #zeroday #security #cybersecurity #breaches #databreaches #bug #bugbounty #pentesting #penetrationtesting #backdoor #hacked #CPU #eternalblue #wannacry #notpetya #ransomware #worms #computerworm #NSA #leak #bufferoverflow #memory #exploitchain #zeroclick #microsoftexploit #windowsexploit #cyberattack
1 view
460
109
5 months ago 00:19:56 2
What Kaspersky really discovered...
1 year ago 00:03:53 1
What is Netiquette?
13 years ago 00:01:49 107
ZADROT IBANI ? WAHAHAHAHAHAHAHAHAH
12 years ago 00:01:01 71
kaspersky_go_home
8 months ago 00:03:48 1
What is Social Engineering?
3 years ago 00:01:16 1
Be More with Kaspersky!
1 year ago 00:05:42 1
How to Remove Kaspersky Password Protection – Step by Step
9 years ago 00:01:03 49
#TheSAS2016 is searching for answers
7 years ago 00:02:15 1
What is a VPN and Why You Should Use It to Protect Your Privacy
3 years ago 00:01:49 1
What is Phishing?
12 years ago 00:03:31 224
Make love not cyberwar
9 years ago 00:02:23 7
Kaspersky IT Security Experts On Your Side
6 years ago 00:02:13 40
What The Flock vol.5 | Hip-Hop 1x1 1/8 - Lil Kes vs Jimmy Yudat
3 years ago 00:03:09 1
What is a DDoS Attack?
10 years ago 00:01:46 64
SMWUG5 | LIL KES VS NEVA | HIP-HOP 1x1 PRO |
4 years ago 00:02:14 1
The Data Dollar Store - A Data Shopping Social Experiment by Kaspersky Lab
2 years ago 00:07:42 1
Röyksopp - What Else Is There (Trentemøller Remix)
13 years ago 00:01:40 16
Three Reasons: Kes
10 years ago 00:02:17 53
SMWUG5 | ОНСО VS LIL KES | HIP-HOP 1x1 PRO |
5 years ago 00:01:23 1
[HD Fancam] What If - Xiumin Focus @ 170226 EXO’rDIUM in Manila Day 2
2 years ago 00:07:55 1
Jase FOS feat. Claire Van Der Boom - Do What You Want (Max Graham Afterhours In Montreal Mix)
12 years ago 00:07:59 72
Каспер 1 год
8 months ago 00:00:41 1
Even if you don’t know what lies in wait for your children...