Featured Video

Blue Team or Red Team?

Hear from Héctor Cuevas Cruz as he shares his career from early days in DragonJAR forum to how he's become a team leader of hackers for Bishop Fox.

Video

TomNomNom AMA

Tom Hudson (aka TomNomNom) participates in this Discord AMA about the pen testing tools he's created over the years, his cybersecurity journey, and more.

Video

13th B-Sides Las Vegas - ICS Security Assessments 101 or How da Fox I Test Dis?

We have seen many ICS attacks both in the news and in several talks at security conferences. They show how ICS protocols are insecure by default and how we can mess with control components so easily. However, from a consulting point of view, are we really asking our ICS clients to let us mess with their critical infrastructure just to show what we already know?

Video

13th BSides Las Vegas - Management Hacking 101

Tom Eston, AVP of Consulting at Bishop Fox, shares his best advice for becoming a successful manager and leader in the security industry.

Video

SmogCloud: Expose Yourself Without Insecurity - Cloud Breach Patterns

Presented at Black Hat 2020, this presentation looks at the most pragmatic ways to continuously analyze your AWS environments and operationalize that information to answer vital security questions. Demonstrations include integration between IAM Access Analyzer, Tiros Reachability API, and Bishop Fox CAST Cloud Connectors, along with a new open source tool SmogCloud to find continuously changing AWS internet-facing services.

Video

Illumio Assessment Report: Interview with Raghu Nandakumara and Rob Ragan

Illumio Field CTO Raghu Nandakumara and Bishop Fox Principal Researcher Rob Ragan discuss the efficacy of microsegmentation in this interview.
Video

Dufflebag: Uncovering Secrets in Exposed EBS Volumes

In this video, Dan Petro demonstrates how the Bishop Fox open source tool Dufflebag works.

Video

DerpCon 2020 - Demystifying Capture The Flags (CTF)s

In the talk: Demystifying CTFs, Barrett Darnell will provide an overview of CTF formats, the skills they require and the experience they develop, and conclude with a plethora of CTF resources for those wanting to participate.
Video

DerpCon 2020 - Ham Hacks: Breaking into the World of Software Defined Radio

If you’re a hacker who has always been too afraid of RF protocols to try getting into SDRs, or you have a HackRF collecting dust in your closet, this talk will show you the ropes.

Video

DerpCon 2020 | .NET Roulette: Exploiting Insecure Deserialization in Telerik UI

Telerik UI for ASP.NET AJAX is a widely used suite of UI components for web applications.
Video

Zigbee Hacking: Smarter Home Invasion with ZigDiggity

Existing Zigbee hacking solutions have fallen into disrepair, having barely been maintained, let alone improved upon. Left without a practical way to evaluate the security of Zigbee networks, we've created ZigDiggity, a new open-source pentest arsenal from Bishop Fox.
Video

DEF CON 27 (2019) - Finding Secrets In Publicly Exposed EBS Volumes

In this talk, Ben Morris shows how he found all sorts of secrets and associated data—passwords, SSH private keys, TLS certificates, application source code, API keys, and anything else that might be stored on a server hard disk.
Video

Drone Hacking: Wireless Mouse Flyby Hijack with DangerDrone

Some quick live footage of flying the Danger Drone, a free penetration testing platform from Bishop Fox.

This site uses cookies to provide you with a great user experience. By continuing to use our website, you consent to the use of cookies. To find out more about the cookies we use, please see our Privacy Policy.