DEF CON 22 - Metacortex and Grifter - Touring the Darkside of the Internet. An Introduction to Tor
hanna88at October 13,2015 This video is pretty short and leaves you hanging on the fact that the button really needs to be unfrozen in order for this to be useful. It would be nice if those videos were combined. The NOPs were used in a previous video--it seems like the same couple of actions/commands are used very commonly by crackers to manipulate the code.
mcoates1at February 23,2016 Again, this seems like a very powerful tool if you're used to reading assembly language. It not only let's you see variables during the application runtime, but it seems you can alter the behavior of the application as well. Very good, stuff.
BrianDaugetteat April 14,2016 The OllyDbg videos seem a bit repetitive, where the presenter is doing different variations of the same thing. What would be interesting is to see how programs overcome these techniques and how those prevent a debugger from allowing a user to do this kind of activity. This entire series was a pretty quick and dirty guide to a small window of functionality that a debugger has. I'd like to see other videos that show some of the other things OllyDbg can do, preferable with a presenter that can go more in depth, and is more prepared.
stadkalat April 22,2016 Great tool by analyzing the assembly language but a tutorial of this short span is of very less use for any learner.
Safiyahat November 24,2016 The quality here was SO much better than the previous parts so kudos right there! The presenter has clearly developed his presentation skills since he seemed to know what he was doing this time, no trial and error business, and everything important for the viewers was actually fully visible on screen (not cutoff as in previous videos). It was great to see him do something besides bypassing logins, this time getting rid of a "nag" popup message, and I look forward to seeing how he'll unfreeze the button.