Vunerability-centric Pentesting | Matthew Toussain
![](https://i.ytimg.com/vi/KFUcJ_TwrkQ/mqdefault.jpg)
48:36
Never Say Anything: NSA Hacking for Defense at Scale | Tony Sager
![](https://i.ytimg.com/vi/ySoLn2WnuGs/mqdefault.jpg)
23:19
Offensive Lab Environments (Without the Suck) | Travis Kaun
![](https://i.ytimg.com/vi/ViyRShl8KC8/mqdefault.jpg)
43:10
Your Favorite Coffee Shop...How Threat Actors Use Victims to Create More Victims | James Bierly
![](https://i.ytimg.com/vi/Rj3sTAMYNQk/mqdefault.jpg)
11:59
this SSH exploit is absolutely wild
![](https://i.ytimg.com/vi/jqINeyAmrXE/mqdefault.jpg)
31:36
Scanning & Fixing Vulnerabilities with Kali Linux | Metasploitable2 Virtual Machines
![](https://i.ytimg.com/vi/NLezMfNXSmw/mqdefault.jpg)
46:53
Epic Fails and Heist Tales: Red Teaming Toward Truly Tested Security | Alethe Denis
![](https://i.ytimg.com/vi/6SNy0u6pYOc/mqdefault.jpg)
32:30
DEF CON 32 - The Darkest Side of Bug Bounty - Jason Haddix
![](https://i.ytimg.com/vi/5dnVH7jCZKQ/mqdefault.jpg)
10:36