InfoSec clickbait title by BuzzSec! Key validation with Algorithm and creating a Keygen - Part 1/2 -=[ 🔴 Stuff I use ]=- → Microphone:* https://amzn.to/2LW6ldx → Graphics tablet:* https://amzn.to/2C8djYj → Camera#1 for streaming:* https://amzn.to/2SJ66VM → Lens for streaming:* https://amzn.to/2CdG31I → Connect Camera#1 to PC:* https://amzn.to/2VDRhWj → Camera#2 for electronics:* https://amzn.to/2LWxehv → Lens for macro shots:* https://amzn.to/2C5tXrw → Keyboard:* https://amzn.to/2LZgCFD → Headphones:* https://amzn.to/2M2KhxW -=[ ❤️ Support ]=- → per Video: https://www.patreon.com/join/liveoverflow → per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join -=[ 🐕 Social ]=- → Twitter: https://twitter.com/LiveOverflow/ → Website: https://liveoverflow.com/ → Subreddit: https://www.reddit.com/r/LiveOverflow/ → Facebook: https://www.facebook.com/LiveOverflow/ -=[ 📄 P.S. ]=- All links with "*" are affiliate links. LiveOverflow / Security Flag GmbH is part of the Amazon Affiliate Partner Programm. #ReverseEngineering
URLs are surprisingly hard to read. Chrome Bug: https://bugs.chromium.org/p/chromium/issues/detail?id=841105 Orange Tsai: https://twitter.com/orange_8361 A New
A friend told me that a GW2 trading bot implemented a dumb API. We are going to find and use it to track the bot. Play Guild Wars 2: https://account.arena.net/
A reddit user finds raspberry pi zeros hidden behind trash cans, vending machines and other places in the college library. We reverse engineer them and determin
Can programs be uncrackable? Let's try to find some anti-debugging tricks. https://www.sentinelone.com/blog/breaking-and-evading/ http://blog.ioactive.com/201
We will have a look at what syscalls are and what it has to do with the kernel mode an user mode. We do this by exploring a kernel function and trace it down to
Part 15: We start reversing VerifyKey for the "Pirate's Treasure" challenge. This will take us several videos. In this first part we look at the input validatio
In this video, we'll see how hackers really crack passwords. This video is edited with Filmora video editor, get it here : https://goo.gl/RtmNC5 DISCLAIMER :
This short php code contains a critical vulnerability. In this video I will explain in detail what I think while analysing it. Original source of challenge: ht
Using the webkit bug CVE-2016-4657 to start hacking the Nintedno Switch. I have taken the first part from qwerty's iOS 9.3 jailbreak and adapt it to the Nintend
Solving a crackme implemented in JavaScript that attempts to obfuscate the algorithm through some anti-debugging. Solution Script / HTML: https://gist.github.c
A video collaboration with Electronics Idiot to show how an electronic lock could be implemented and how it can be attacked. Electronics Idiot channel: https:/
Hi guy, Today we show video about: Primitive technology - Primitive skills catch big fish and Cooking fish - Eating delicious #PrimitiveTechnology #SurvivalSk
In this video we figure out how to do a popunder in Chrome version 59, by using a trick. Hopefully Chrome fixes this, because I resent this kind of advertisemen
In this short tutorial you'll learn to crack software with the help of ollydbg tool. No more Trial softwares, patch them yourself easily. ollydbg software = ht
This challenge was part of the FLARE-On 2018 CTF. In this video we reverse engineer a basic windows .exe to find out how to win the game. At first we tried to a
I try to answer every question I get. Unfortunately a lot of them are extremely low effort and waste my time. I love to help, but please put some work into your
In this part I'm thinking about the effects of bots on MMORPGs and then look at the collected data. The Data: https://imgur.com/a/X8Syu Part 1: https://www.you
Please Subscribe to my channel. Tools: OLLYDBG Application: http://www.mytreedb.com/