[ Videos ]

Security Research & Technical Demonstrations

x86 Conditional Jumps and EFLAGS: GDB Debugging Deep Dive

x86 Conditional Jumps and EFLAGS: GDB Debugging Deep Dive

Hands-on reverse engineering demo showing how x86 conditional jumps really work. Single-step through assembly with GDB + pwndbg to understand EFLAGS manipulation and control flow analysis.

July 11, 2025
Assembly x86 GDB EFLAGS Reverse Engineering Debugging Malware Analysis Systems Programming
Watch Video
Hand-Written Stage-1 Bootloader: Raw x86 Assembly from Scratch

Hand-Written Stage-1 Bootloader: Raw x86 Assembly from Scratch

Deep dive into building a custom bootloader in pure x86 assembly. No GRUB, no OS - just raw BIOS calls, MBR parsing, and INT 13h disk operations from 0x7C00.

June 25, 2025
Bootloader Assembly x86 BIOS Reverse Engineering Low-Level Programming Operating Systems
Watch Video
Network Forensics Part 2: DNS Attacks and Tor Analysis

Network Forensics Part 2: DNS Attacks and Tor Analysis

Professor Talia Q explores advanced network forensics including DNS spoofing attacks, TCP sequence analysis, Tor onion routing, and the challenges of investigating anonymized communications.

May 22, 2025
Network Forensics DNS Security Tor Analysis TCP Spoofing Dark Web Investigation HarrisonSec
Watch Video
Network Forensics Part 1: Foundational Techniques

Network Forensics Part 1: Foundational Techniques

Part 1 of Professor Talia Q's timeless lecture series laying the foundation of network forensics, including TCP/IP analysis, Telnet exploration, log-based evidence gathering, and the philosophy behind digital investigations. This classic directly informs design choices in HarrisonSec's Secured VLAN architecture.

May 20, 2025
Network Forensics Digital Evidence Log Analysis TCP/IP Cybercrime Investigation HarrisonSec
Watch Video
StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing

StegoSafe: Hiding Secrets in Images with Encryption and Secret Sharing

A quick demo of StegoSafe's web version, showing how to encrypt, split, and hide secrets inside images using advanced steganography.

May 13, 2025
Steganography Data Hiding Encryption Secret Sharing Privacy Tools
Watch Video
Complete Secure Company Network Design

Complete Secure Company Network Design

A comprehensive 3-hour demonstration of how to design and implement a secure enterprise network with multiple security zones, VLANs, and proper firewall configuration

May 12, 2025
Network Security VLAN Segmentation Firewall Configuration DMZ Enterprise Architecture
Watch Video
HarrisonSec Lab Tour: Behind the Scenes of Our Security Research

HarrisonSec Lab Tour: Behind the Scenes of Our Security Research

An exclusive tour of HarrisonSec's security lab, showcasing our testing environment, hardware, and the methodology behind our Secured VLAN and other projects.

May 11, 2025
Security Lab Research Environment HarrisonSec Network Testing Security Tools
Watch Video
Buffer Overflow Attack Explained

Buffer Overflow Attack Explained

This is one of the clearest demonstrations of a buffer overflow attack I've seen, where Dr. Mike Pound not only explains the theory but shows the complete attack process, invaluable for security learners

May 10, 2025
Buffer Overflow Memory Security Exploit Linux Security
Watch Video