DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor
msharma6at April 26,2017 This another video which basically goes over the same thing but using different scenarios. It would be interesting to find out if there are instances where this software doesn't work to crack the user name and passwords.
BSharmaat May 03,2017 This video is showcasing the different ways that this tool can be used. Though it's similar to the other videos, it provides information on how to maneuver inside the tool and how it can be used for getting around annoying "nagging" messages.
Wangjaat May 10,2017 Defeating nagware is a very valuable skill to develop.
stkramergmu3at September 17,2017 This is basically the same as nulling out a password, but this time, it is an error message. Someone mentioned checksums as a way to avoid this type of hampering. I'd be interested to learn more about secure coding practices that might avoid this type of hack.
gwlongat September 24,2017 All of these debug tutorials go over basic programs that have no security implementations to prevent tampering - I wish some of the tutorials would go over something a little more advanced. A basic buffer overflow tutorial using debuggers would be really beneficial to a lot of the students.