[ Videos ]
Security Research & Technical Demonstrations

x86 Conditional Jumps and EFLAGS: GDB Debugging Deep Dive
Hands-on reverse engineering demo showing how x86 conditional jumps really work. Single-step through assembly with GDB + pwndbg to understand EFLAGS manipulation and control flow analysis.
Watch Video
Hand-Written Stage-1 Bootloader: Raw x86 Assembly from Scratch
Deep dive into building a custom bootloader in pure x86 assembly. No GRUB, no OS - just raw BIOS calls, MBR parsing, and INT 13h disk operations from 0x7C00.
Watch Video
Network Forensics Part 2: DNS Attacks and Tor Analysis
Professor Talia Q explores advanced network forensics including DNS spoofing attacks, TCP sequence analysis, Tor onion routing, and the challenges of investigating anonymized communications.
Watch Video
Network Forensics Part 1: Foundational Techniques
Part 1 of Professor Talia Q's timeless lecture series laying the foundation of network forensics, including TCP/IP analysis, Telnet exploration, log-based evidence gathering, and the philosophy behind digital investigations. This classic directly informs design choices in HarrisonSec's Secured VLAN architecture.
Watch Video
StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing
A quick demo of StegoSafe's web version, showing how to encrypt, split, and hide secrets inside images using advanced steganography.
Watch Video
Complete Secure Company Network Design
A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration
Watch Video
HarrisonSec Lab Tour: Behind the Scenes of Our Security Research
An exclusive tour of HarrisonSec's security lab, showcasing our testing environment, hardware, and the methodology behind our Secured VLAN and other projects.
Watch Video
Buffer Overflow Attack Explained
This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners
Watch Video