Hacking car codes - central lock security primer

6 October 2020 Reading time: ~1 minute

This video is about automotive vulnerabilities and an illustration of the attack on the car key system by intercepting and decoding wireless signals.


Insecurity of Industrial Control System (ICS)

5 October 2020 Reading time: ~1 minute

Video about vulnerabilities in industrial systems and a demonstration of hackers exploiting electricity distribution systems (e.g., National Grid) (simulated attack). Note that the demo you can see in this video I implemented in software (100% virtualised) and also in hardware. The hardware demonstrator was publicly available at several conferences, such as RSAC and BlackHat Europe.


Cross-site Scripting vulnerability explained

5 October 2020 Reading time: ~1 minute

Video explaining what Cross Site Scripting (XSS) vulnerability is and how it can be exploited. The video was made when I was working for 7Safe.


SQL Injection vulnerability explained

5 October 2020 Reading time: ~1 minute

Video explaining what SQL injection vulnerability is and how it can be practically exploited. The video was made when I was working for 7Safe. In this video, the viewer can learn about different types of SQL injections (error-based and blind) with step-by-step examples of what are the internal mechanisms of this vulnerability and how it can be exploited.


An introductory video to the business negotiation course

5 October 2020 Reading time: ~1 minute

An introductory video to the business negotiation course I made for my colleague at the University of Cambridge. The course is about teaching advanced negotiations and the background is a relationship between five fictional countries "Turopian Union". Preparing this video required a lot of graphic design and heavy use of Camtasia.


RSAC 2020

5 October 2020 Reading time: ~1 minute

Video from my talk at RSA Conference 2020 in San Francisco about insecurities of industrial systems (ICS/SCADA). This is a real case study demonstrating a creative (and successful) approach to the security assessment of industrial system.


Hit Counter

1