Artwork

Player FM - Internet Radio Done Right

16 subscribers

Checked 5M ago
اضافه شده در three سال پیش
محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal
Player FM - برنامه پادکست
با برنامه Player FM !
icon Daily Deals

Black Hat Python with Tim Arnold and Justin Seitz

1:04:04
 
اشتراک گذاری
 

Manage episode 334221759 series 3370924
محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

This episode is the first time the authors of the book: Black Hat Python. In today's episode of Hacker Talk Justin Seitz and Tim Arnold joins us on the show and we get to hear Tim and Justin stories about Python, Hacking and a lot more!

In this episode we cover:

Journey into hacking and technology

Finding like-minded people, dopamine kicks

Infosec community

CackalackyCon

Issa

https://en.wikipedia.org/wiki/Information_Systems_Security_Association

Tinkering

Python

Creating IT-security python courses

From Twitter to Nostarch

Exploits for Windows 10 and 64bit machines

Favorite python libraries, Lxml, requests

Syscalls with PyPledge, visualizing packet analysis with scapy

Programming, Microsoft basic, PHP, vb6,

the future with golang

Virtual environments in python

Workflow for programming

Visual code studio, Microsoft turning good

Wingware

Wingide with immunity debugger

Hunchly's daily dark web report

Archive.is to archive .onion sites

Onionscan

Fresh onions

Modern exploit and zeroday writing

Ms08067 exploit

How to write books

Best practices for writing

  continue reading

20 قسمت

Artwork

Black Hat Python with Tim Arnold and Justin Seitz

Hacker Talk

16 subscribers

published

iconاشتراک گذاری
 
Manage episode 334221759 series 3370924
محتوای ارائه شده توسط Firo Solutions LTD. تمام محتوای پادکست شامل قسمت‌ها، گرافیک‌ها و توضیحات پادکست مستقیماً توسط Firo Solutions LTD یا شریک پلتفرم پادکست آن‌ها آپلود و ارائه می‌شوند. اگر فکر می‌کنید شخصی بدون اجازه شما از اثر دارای حق نسخه‌برداری شما استفاده می‌کند، می‌توانید روندی که در اینجا شرح داده شده است را دنبال کنید.https://fa.player.fm/legal

This episode is the first time the authors of the book: Black Hat Python. In today's episode of Hacker Talk Justin Seitz and Tim Arnold joins us on the show and we get to hear Tim and Justin stories about Python, Hacking and a lot more!

In this episode we cover:

Journey into hacking and technology

Finding like-minded people, dopamine kicks

Infosec community

CackalackyCon

Issa

https://en.wikipedia.org/wiki/Information_Systems_Security_Association

Tinkering

Python

Creating IT-security python courses

From Twitter to Nostarch

Exploits for Windows 10 and 64bit machines

Favorite python libraries, Lxml, requests

Syscalls with PyPledge, visualizing packet analysis with scapy

Programming, Microsoft basic, PHP, vb6,

the future with golang

Virtual environments in python

Workflow for programming

Visual code studio, Microsoft turning good

Wingware

Wingide with immunity debugger

Hunchly's daily dark web report

Archive.is to archive .onion sites

Onionscan

Fresh onions

Modern exploit and zeroday writing

Ms08067 exploit

How to write books

Best practices for writing

  continue reading

20 قسمت

همه قسمت ها

×
 
Hacker Talk 2024 New Year Special Featuring: Johnny Xmas, Zagros Bingol and Filip Kalebo. Topics: infosec's 9/11 - Target.com breach Leaking TSA master keys Starting to work in information security How the information security space has changed The hackers we lost along the way RIP Kevin Mitnick RIP hacker legend Robert “Ozzie” Osband (Richard Cheshire, The Cheshire Catalyst) 2600 Hackers on planet earth Crowd strike Trends we have seen in 2024 AI as a trend The future of AI Training models AI being used to fingerprint user activity AI in continuous integration pipelines Code Reviews Backdoor in tar Vulnerabilities in the linux kernel Risks of using opensource Exploit brokers OSS Fuzz Fuzzing Quantum computers Cray super computers Michelle Simmons creates a quantum computer at home National cryptology museum in Washington dc 40 years since Chaos Computer club, 2600 and Cult of the deadcow Chaos computer camp Bornhack toorcamp hope conference Defcon Cult of the deadcow Veilid Bluesky Decentralized technologies Hawk tuah Modern Scams Web3 and Web2 Privacy Downfall of telegram Telegram giving up on privacy SimpleX chat, signal and imessage Future External Links: https://linktr.ee/johnnyxmas https://burbsec.com/ https://en.wikipedia.org/wiki/XZ_Utils_backdoor https://www.metafilter.com/203126/Tar-Trap-Caught https://en.wikipedia.org/wiki/Hack-Tic https://en.wikipedia.org/wiki/Chaos_Communication_Camp https://cultdeadcow.com/ https://2600.com/ https://toorcamp.org/experience/ https://infocondb.org/presenter/richard-cheshire-the-cheshire-catalyst https://www.imdb.com/name/nm1937010/ https://hope.net/memoriam.html https://veilid.com/ https://blog.rust.careers/post/veilid_dildog_rust_interview/ https://bornhack.dk/bornhack-2025/ https://en.wikipedia.org/wiki/DEF_CON https://en.wikipedia.org/wiki/Pavel_Durov https://www.bbc.com/news/articles/cvglp0xny3eo https://en.wikipedia.org/wiki/Bluesky https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html https://google.github.io/oss-fuzz/research/llms/target_generation/ https://www.visitacity.com/en/washington-dc/attractions/the-national-cryptologic-museum https://www.youtube.com/watch?v=bRj4ipIEmg0 https://www.msn.com/en-us/entertainment/celebrities/hawk-tuah-girl-haliey-welch-vanishes-after-crypto-scam-accusations-has-not-been-seen-online-for-weeks/ar-AA1waGkW https://support.apple.com/en-us/102637 https://simplex.chat/ https://en.wikipedia.org/wiki/Signal_(software) https://en.wikipedia.org/wiki/Moxie_Marlinspike…
 
The hardware hacker, creator of the wifi-nugget, cybersecurity content creator, hak5 host and our guest of honor in this episode of Hacker Talk is Alex Lynd! In this episode, we cover: Alex background, working with hak5, content creation O.MG pentesting cable Signal intelligence Wifi hacking Hardware hacking Modifying the hardware of calculators, playing games on calculators Hacking the texas instrument ti 84 calculator Alex's first computer being the raspberry pi Starting with Linux Embedded security Hardware developer perspective Making hardware devices Making low-cost hacking devices low cost, high availability and effective hacking devices GPS implants ESP8266, 3 dollar wifi microcontroller Wardriving with esp8266 wifi nugget Making cat-shaped hardware Making a friendly and portable hardware design Learning about wifi hacking and microcontrollers USB nugget USB rubber ducky Keystroke injection attacks ATtiny85 Arduino Thought process behind creating the wifi nugget How Filip cracked his neighbors wifi Aircrack-ng Airgeddon Creating a DIY beginner hardware kit The creation of wifi nugget, the first 100 devices SpaceHuhn Maker Wifi Beacon spoofing pranks esp32 vs esp8266 wifi chip Crafting custom packets with the esp8266 chip Espressif Systems trying to stop people from using it's wifi chips for offensive purposes by locking down its software development kit. Spoofing attacks esp32 native USB mode EMulating USB connected devices for data exfiltration Auto trunked packets pmkid wifi attack Cracking wpa2 handshakes Guessing autogenerated wifi passwords Hashcat Password generator based on your local area code The best password-cracking word list Filip has ever used Funny pranks with the wifi nugget Nugget defender, see if anyone is attacking your network use Canary tokens to detect if someone is breaking into your system Bugged microsoft word and pdf documents Having an intrusion detection system in your pocket wifi honeypots Getting started designing custom printed circuit boards(PCB) Design with easyeda Creating a tv-be-gone Sourcing pcb boards Circuit board art What software to use to create boards Antenna design Omni directional antennas Yagi antennas Sourcing hardware Making it more user friendly Links: https://alexlynd.com/ https://mg.lol/blog/omg-cable/ https://github.com/HakCat-Tech/WiFi-Nugget https://education.ti.com/en/products/calculators/graphing-calculators/ti-84-plus https://en.wikipedia.org/wiki/Raspberry_Pi https://hak5.org/ https://en.wikipedia.org/wiki/ESP8266 https://retia.io/ https://twitter.com/AlexLynd https://usbnugget.com / https://shop.hak5.org/products/usb-rubber-ducky https://en.wikipedia.org/wiki/ATmega328 https://en.wikipedia.org/wiki/Arduino_Nano https://www.pcboard.ca/mini-attiny85-usb https://www.arrow.com/en/research-and-events/articles/attiny85-arduino-tutorial https://github.com/derv82/wifite2 https://en.wikipedia.org/wiki/Aircrack-ng https://www.kali.org/tools/airgeddon/ https://github.com/SpacehuhnTech/esp8266_deauther http://deauther.com/ https://spacehuhn.com/ https://ieeexplore.ieee.org/document/4529384/ https://en.wikipedia.org/wiki/ESP32 https://www.espressif.com/ https://documentation.meraki.com/MR/Other_Topics/PMKID_Vulnerability_FAQ_-_WPA%2F%2FWPA2-PSK_and_802.11r https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access https://colab.research.google.com/ https://en.wikipedia.org/wiki/Hashcat https://github.com/danielmiessler/SecLists https://github.com/HakCat-Tech/Nugget-Invader https://canarytokens.org/generate https://easyeda.com/ https://www.pcbway.com/ https://www.kicad.org/ https://en.wikipedia.org/wiki/Nordic_Semiconducto r…
 
Sam Bent, previously by his online handle as the Darknet Vendor "2happytimes2" is our Hacker of the episode! In this episode of Hacker Talk we get to hear, how Sam put toghter an Opsec plan that ended up protecting him against a 20 count indetment and 200 years in prison. Thanks to a bruteforce attack in the true hacker spirit he managed to get out of prison. What is it like to apply strong operation security practices in your everyday life? How does one survive and adapt to hostile environments? Join us in this thrill seeking episode of Hacker Talk, where we get to hear Sam's story. In this episode we cover: Darknet Vendor, Darknet Marketplaces Darknet Forum Administrator First Introduction to Tor Silkroad, Early Bitcoin days Bitcoin Pizza for 20 000 Bitcoins Moderating darknet forums Money laundering charges Privacy Journey into selling on the darknet Residential Security Living in Vermont, United States of America Computer support Forming information security policies Backtraq 2(Released March 2007) Yagi antenna, randomizing your mac address before you use your neighbors wifi Removing DNA from packages. Speaking at Defcon Dealing with the Department of Homeland security Social Engineering Operation security Dread Darknet Forum Dealing with Hostile Environments on the darknet and in prison Profiling yourself Importance of Adoptability Managing multiple identities Pretty good privacy(PGP) Trust on the Darknet Resumes on the Darknet Best practices for Password Managers Storing password's in "The Slip", secure convenience security How to ship mail securely Interacting with the united states judicial system Franks hearing Becoming a paralegal in Prison Writing a 200-page passion of release motion Building trust in Online Communities Links: Doingfedtime Youtube channel: https://www.youtube.com/@DoingFedTime Bitcoin talk pizza thread: https://bitcointalk.org/index.php?topic=137.0 https://en.wikipedia.org/wiki/Vermont https://en.wikipedia.org/wiki/BackTrack Sam's defcon talk: https://www.youtube.com/watch?v=NGiUhjuB22Y https://www.16personalities.com/ https://en.wikipedia.org/wiki/Pretty_Good_Privacy https://en.wikipedia.org/wiki/Silk_Road_(marketplace) https://www.shouselaw.com/ca/blog/warrant/what-does-it-mean-to-traverse-a-warrant-what-is-a-franks-motion/ https://forum.defcon.org/node/241998 https://www.darknetstats.com/seasoned-dark-web-vendor-2happytimes2-sentenced-to-5-years-in-prison/…
 
Our Hacker of the episode is "Vickie lii"! Vickie tells us about Bug Bounties, her new book and information security. Tune in now! In this episode we cover: Background, getting into security Getting into Bug Bounty First Bug bounty Hackerone, Bug crowd Reporting Security Bugs Coordinating bug bounties Life as a bug bounty hunter Interaction with engineers Bug bounty bootcamp Book Security as a hobby Writing Books How to hack web applications Vickie's favourite types of Vulnerabilities Template injection IDOR Writers block Nostarch Book Publishing Bug bounty tools Python and Bash Make bug bounties more enjoyable Portswinger Lab Finding low hanging fruits legal harbor Caring about security researchers Links: https://twitter.com/vickieli7 https://en.wikipedia.org/wiki/Bug_bounty_program https://vickieli.dev/ https://portswigger.net/web-security/all-labs https://portswigger.net/research/server-side-template-injection https://www.geeksforgeeks.org/insecure-direct-object-reference-idor-vulnerability/ https://nostarch.com/bug-bounty-bootcamp Grab a copy of Vickie's book: https://www.amazon.com/Bug-Bounty-Bootcamp-Reporting-Vulnerabilities-ebook/dp/B08YK368Y3…
 
In this episode of Hacker Talk: One of the most powerful newer static analysis tool is CodeQL. By converting your code base into a Codeql database, you can now write queries in a read-only way, in order to find security vulnerabilities and problems in you Code-base. We wanted to know more about this declarative language called "CodeQL". Straight from Github's Security Lab, we are joined by Alvaro Munoz! Alvaro, is a Security Researcher, Leads a team of researchers that leverage Codeql to find and model vulnerabilities at Github, with a background in research related to finding remote code execution bugs through deserialization. Tune in as we get to hear the ins and out of CodeQL, how to get started, when Codeql was used to find a vulnerability in a public Covid-19 system, how to find vulnerabilities with Codeql and a lot more! Topics covered: Learning to thing outsite the box by playing Capture the flag CodeQL declarative languages Static code analysis Getting a broad view of the source code Writing queries with CodeQL to find vulnerabilities Modeling vulnerabilities with CodeQL The learning curve of CodeQL Quering github repositories for vulnerabilities Write codeql for a large amount of repositories with lgtm(use it goes before it goes EOL) Linters vs codeql CodeQL integrated with continuous integration pipelines Get started with Codeql Submit your codeql queries to Github Security Lab's Bug bounty Best practices for writing queries Thinking of the code as a database with codeql Finding vulnerabilities in Covid-19 systems Best pratices for CodeQL Reduce false possitives CodeQL with nvim(neovim) Improving vim by creating a more interactive development enviroment alternative, "neovim". LSP integration with neovim. CodeQL with Emacs Remote code execution bugs found with CodeQL. Bugs found in Radar Covid App Patterns leading to remote code execution Auditing javascript frameworks CodeQL vs other static analysis tools Capture the flag codeql challanges The future of CodeQL External links: https://lgtm.com/ https://github.com/pwntester https://neovim.io/ https://en.wikipedia.org/wiki/Language_Server_Protocol https://en.wikipedia.org/wiki/Semgrep Covid 19 tracing app - https://securitylab.github.com/research/securing-the-fight-against-covid19-through-oss/ - https://threatpost.com/german-covid-19-contact-tracing-vulnerability-rce/161419/ Github Security Lab web site: https://securitylab.github.com/ Join Github Security Lab Slack Channel: https://join.slack.com/t/ghsecuritylab/shared_invite/zt-120w4vby8-_O9u9k2hPfgbju1tddBPcg https://twitter.com/pwntester Bounty program: https://securitylab.github.com/bounties/ https://codeql.github.com/ https://codeql.github.com/docs/codeql-overview/ http://www.pwntester.com/ https://en.wikipedia.org/wiki/Abstract_syntax_tree https://en.wikipedia.org/wiki/Control_flow_analysis https://github.com/github/codeql-learninglab-actions https://github.com/anticomputer/emacs-codeql/ Special thanks too: We want to give a huge thanks to Github's Security Lab Team for making this episode a reality!…
 
In this episode of Hacker Talk, we are joined by the Hacker and SecBSD contributor: The BSDBandit! Tune is as we deep into secbsd, the penetration distribution for the BSD community. In this episode we cover: Video games Kali linux meets bsd Started to hack in college mandraka linux FreeBSD 4.8 and beyond BSD vs Linux Reading the RFC's IRIX Learn from developer mailing lists OpenBSD's mailing The start of SECBSD - BSD based Penetration testing distribution SecBSD, release cyckle Documentation in the BSD world NetBSD on toasters and sega dreamcast Comparing the BSD's Porting ruby Beef to BSD Web applications as houses Webb application api's Security Penetration testing Management vs Security Researchers and developers The adventures of Hacking and learning The state of Hacking Tinkering with FreeBSD ManPages Unix Powertools book Vi Editor Having fun with Technology People code computers Time allocation and having a good schedule Rust programming Visual code studio Pentesting with Rust Mental health Taking brakes, allocating discord and Internet Relay Chat Libera.chat irc Irssi irc client Phreakers going into VoIP OpenBTS IceCast Future of IT-Security Moving everything to the browser Challenge of the episode: The BSDBandit challenges you to read one man page per day for one year Links: https://en.wikipedia.org/wiki/Mandriva_Linux https://www.freebsd.org/releases/4.8R/announce/ https://secbsd.org https://twitter.com/SecBSD https://rfcs.io/http https://www.rfc-editor.org/rfc/ https://en.wikipedia.org/wiki/IRIX https://en.wikipedia.org/wiki/Sub7 https://marc.info/?l=openbsd-misc&r=1 https://www.openbsd.org/faq/ports/guide.html https://twitter.com/CryptoBanshee_ https://beefproject.com/ https://www.oreilly.com/library/view/unix-power-tools/0596003307/ https://www.amazon.com/UNIX-PowerTools-Jerry-Peek/dp/1565922603 https://en.wikipedia.org/wiki/Vim_(text_editor) https://en.wikipedia.org/wiki/Vi https://twitter.com/bsdbandit https://crates.io/ https://www.rust-lang.org/ https://github.com/bsdbandit https://crates.io/crates/pledge https://en.wikipedia.org/wiki/Ghostscript https://en.wikipedia.org/wiki/Discord https://en.wikipedia.org/wiki/Irssi https://en.wikipedia.org/wiki/2600%3A_The_Hacker_Quarterly https://libera.chat/ https://en.wikipedia.org/wiki/OpenBTS https://icecast.org/…
 
Hacker Talk is back! Stronger than ever with a new episode, in this episode we are all about Podman! Joining us today is Dan Walsh. One of the main people behind Podman! Dan is very knowledgeable in the (oci)container security world. We are super happy to have him on Hacker Talk and hear about Podman. Topics: Podman Podman in action book Dan's journey into Unix and Linux Following Paul cormia to redhat, CEO of redhead Redhat, working on pre-vpn Working on se-linux Container technology Security for openshift Being integrated with docker Oci images and runtimes Fork and exec Security in containers Docker daemon Design behind podman Better security in podman Combining podman with kubernetics Docker Vs systemd Full integration with systemd Buildah, docker build with podman Background story of buildah Overhead in containers Get started with migrating infrastructure to podman Gitlab runners with podman Podman on non-linux systems Docker starting to charge for Windows and Mac Podman desktop gui Linux security Sec-comp Land lock security mitigation in the Linux kernel SE-linux Encrypted virtual machines Intel-sgx with KVM virtual machines Trusting proprietary CPU encrypted environments Encrypted workloads Security at the hardware level Links https://www.manning.com/books/podman-in-action Se-linux Podman Docker https://www.youtube.com/watch?v=MmUwrP791sI Replacing docker with Podman Buildah Docker starts to charge for usage Read Dan's book: https://www.manning.com/books/podman-in-action Find more episodes of Hacker Talk at: https://anchor.fm/hacker-talk Subscribe to Hacker Talk's RSS feed: https://anchor.fm/s/7984c230/podcast/rss…
 
In this episode of Hacker Talk, we are joined by the social engineer, windows security ninja, hacker and security researcher Mattias Borg. Tune is as we get to hear about scam calls and social engineering! In this episode we cover: Social Engineering Micro-expressions How long can you get with scam calls? Windows Security Best practices Dealing with scam callers Getting more information from scam call center What happens when people fall for scam callers. Educating others Links: The Art of Human Hacking https://en.wikipedia.org/wiki/Christopher_J._Hadnagy https://twitter.com/MattiasBorg82 https://blog.sec-labs.com/ https://www.youtube.com/watch?v=YsznWl0Wc4I https://www.youtube.com/watch?v=1zTsfs4Q6IY For feedback and guest suggestions, email: podcast at firosolutions dot com…
 
In this episode of Hacker Talk, we are joined by the amazing Hacker, G0t mi1k! G0t mi1k is part of the offensive security team and he also runs the database of vulnerable virtual machines, called Vulnhub. Topics: Background Getting into infosec Becoming a moderator First remote shell Backtrack Offensive security Start and background story of Vulnhub.com Encouraging people to run virtual machines Hoarding data, hosting virtual machine images The start of Exploit-db, milw0rm Curating exploits Running virtual machines with Proxmox home lab and vmwareVMware Best practices for protecting internet facing virtual machines Locking down machines The rise and fall of port knocking Single Packet Authorization Learning security by doing Understanding the entire circle of it security. Exploits in Fail2ban Writing a book as a dyslexic The importance of changing the pace of Life. Taking time away from the Keyboard. Working from home External links: https://en.wikipedia.org/wiki/Proxmox_Virtual_Environment https://www.exploit-db.com/ Single Packet Authorization https://www.vulnhub.com/ https://en.wikipedia.org/wiki/Fail2ban https://en.wikipedia.org/wiki/Port_knocking https://blog.g0tmi1k.com/ https://twitter.com/g0tmi1k https://research.securitum.com/fail2ban-remote-code-execution/…
 
Today we are joined by: Mike Spicer, the builder of the Wifi Cactus, someone you can see walking around various security conference with a backpack filled with wireless monitoring goodies :) Mike wanted to see what was really happening on one of the most dangerous wifi networks in the world, this and a lot more in this episode of Hacker Talk. In this episode we cover: Questioning the dangerous assumption How dangerous is Defcon's network really? Dialup internet, warez, Hacking, Tinkering, and programming The movie Hackers from 1995 Wardriving, driving around to find internet, Orinoco gold wireless card WiFi Starting a startup wireless internet service provider company Software-defined radio Hacking Radiofrequency LoRa Helium Lori hardware Things network Lori iot Amazon sidewalk Interconnected devices 900megahertz OpenBTS BladeRF 3g stingrays WiFi Cactus, wifi kraken Wardriving with wireless antennas Pitfalls with airodump Wireless captures Wireless standards, going to WiFi 6 From one box to twelve 25 hak5 pineapples from Darren kitchen Kismet, Andrew dragon(creator of kismet) Intel nuc Live streaming data from the WiFi Cactus WiFi Cactus at Defcamp in Romania Analyzing wardriving from security conferences Pcapinator GitHub Wireshark Mdns, clear text, DNS queries to slack Building your own wardriving device Wireless penetration tests Intel ax220 PCI express WiFi adapter, 30-40 USD, native Linux support Monitoring for wireless de-authentication attacks Deploying kismet for detection with raspberry pi 4 with a 30usd Wireless adapter for starting to monitor their WiFi security Best practices for cracking wpa2 handshakes with hashcat Best security practices for setting up wireless networks Links: https://www.imagine41.com/product/orinoco-gold-wireless-networks-pc-card / https://en.wikipedia.org/wiki/Software-defined_radio https://en.wikipedia.org/wiki/Wardriving https://twitter.com/d4rkm4tter https://github.com/mspicer/pcapinator https://www.wigle.net/ https://en.wikipedia.org/wiki/LoRa https://www.helium.com https://www.kismetwireless.net/ https://www.intel.com/content/www/us/en/products/sku/189347/intel-wifi-6-ax200-gig/specifications.html We would like to give a special thanks to Feedspot for featuring us, we recommend that you check them out: https://blog.feedspot.com/hacker_podcasts/…
 
Welcome back to Hacker Talk! This is part two of our conversation with Steven Phillips Steven is a really interesting developer, hacker and thinker. I personally enjoy reading his blog tryingtobeawesome.com where he covers various parts of programming, philosophy and software. Topics: "Machine Learning" being good or bad Security with machine learning Turning a stop light to a truck Algorithms What type of Artificial intelligence do we need for software James Mickens Generative Pre-trained Transformer 3 Solving bad human code datasets Global code quality How do we write good code? The progress of software how good Structured Query Language is Secure codebase's Pseudorandom Clojure Python Golang Vlang Designing The ethical source movement Code Licenses Internet Privacy End-to-end encryption Podman Browser Extensions Reaching the largest userbase for software Web assembly The onion router | Tor user adoption AI-Powered Super Hackers are a real threat and a lot more on Hacker Talk! Links: https://en.wikipedia.org/wiki/James_Mickens https://en.wikipedia.org/wiki/GPT-3 https://en.wikipedia.org/wiki/SQL https://en.wikipedia.org/wiki/Clojure https://effective.af/ https://firstdonoharm.dev/ https://www.torproject.org/ https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit https://en.wikipedia.org/wiki/Go_(game) View part one here: https://anchor.fm/hacker-talk/episodes/Programmable-Philosophy-with-Steve-Phillips---Part-1-e1ju6b3…
 
In this episode of Hacker Talk, we are joined by Lucas Lundgren, is an impressive penetration tester, security researcher, and our Hacker of honor today. Lucas is known for going out on the internet and finding interesting internet-facing protocols, he has found several internet-facing critical infrastructures, prison door systems, medical x-ray file storage servers(Pacs), earthquake systems, and a lot more! In this episode we cover the following topics: Journey into hacking, radio, commodore64, Amiga 500, cracking games Time bomb viruses for Amiga 500 games Finding vulnerabilities, getting invited to conferences to speak at 13 War dialing Amiga 500, phone phreaking with modern Learning lock picking building your own port scanner Scanning the entire internet with Masscan from home with a 10gigabit connection Parsing scan results with elastic search, grep, kibana Mqtt - embedded protocol, finding and opening prison doors with MQTT, Malware with MQTT brokers Opening and closing doors in prisons in the UK Atm's with MQTT Changing oil pipelines pressure with Finding protocols to scan the internet for iscsi Hacking x-ray machines Finding hospitals x-ray records in Pax servers dating back to 1985 Problems with hospitals' x-ray storage servers Reporting security vulnerabilities Editing x-ray pictures, Malware that adds black spots on the pictures and reuploads it. Malware in metadata of the x-ray pictures X-ray malware in the wild Image recognition Making fictional earthquakes Remote code execution on doorbells Hack-rf, software-defined radio Wardriving Hacking radio Iridium Weather satellites Hacking satellites Breaking into a gas pump with wooden straws Physical penetration testing Links: https://github.com/robertdavidgraham/masscan https://en.wikipedia.org/wiki/MQTT https://www.elastic.co/kibana https://en.wikipedia.org/wiki/Picture_archiving_and_communication_system https://www.youtube.com/watch?v=o7qDVZr0t2c https://en.wikipedia.org/wiki/Barnaby_Jack https://www.iridium.com/ https://hack.cysat.eu/ Skullkeysecurity.com https://twitter.com/Acidgen…
 
Hackers on Plant Earth - Hope with Mitch Altman and Greg Newby Hackers on Planet Earth(HOPE), is a biannual volunteer-driven hacker conference that got started in 1994. On the hacking and phone phreaking's magazine 2600 10th anniversary. In this episode of Hacker Talk, we are joined by two hackers that are behind the curtain at the HOPE conference. Greg Newby and Mitch Altman are both two impressive Hackers, helping the HOPE conference be the amazing hacking conference it is today. In this episode we cover: How Hope has evolved during the years Greg and Mitch's journey's into the hacking mindset Problems with big pharma and the importance of biohacking HOPE moving location from Hotel Pennsylvania to Saint John's University Hackerspaces exploring technology Phone phreaking Life-changing events at HOPE Demoscene with original hardware from the 1980'ies at HOPE Making 8-bit generated art and music Running a physical hacker conference Hidden gems at HOPE How can you can run your own conference Logistics behind the HOPE conference Links: https://hope.net/ https://petascale.org/ https://en.wikipedia.org/wiki/Mitch_Altman https://2600.com https://archive.org/details/HOPE-3-The_Hacker_s_Code https://en.wikipedia.org/wiki/Demoscene https://en.wikipedia.org/wiki/Hackers_on_Planet_Earth The Hacker Talk team will be at May Contain Hackers which will take place in the Netherlands at the same time as the HOPE conference. Find us for some stickers and Hacker Talk swag!…
 
Steve Phillips, is an interesting developer, privacy advocate, hacker and thinker. Tune into this episode of Hacker Talk as we are joined by Steve Phillips in this Programmable Philosophy special. In this episode we cover: Steve's journey into technology Being able to build and utilize tools Cypherpunk Privacy, Encryption Philosophy with programming Proving philosophical theories with programming Python, Django Paul gram Putting the technologist first in companies Combining programming with entrepreneurship Going from utilizing one computer core to multithreading Clojure lisp, using all the libraries from lisp and java. Static typing Golang in 2010, From the one-year anniversary to hacker news. Golang's history. go fix - Automatically rewriting code for new API calls and dependencies. Creating software that lasts forever, making it easy for developers to upgrade old versions. Make standards that the code will use to automatically upgrade the old code, and avoid breaking core functionality. Dependency management Long build times V programming language Fast compile times in V and Go. Green threads, go routines. Efficient concurrency with low overhead. Small runtime languages. Designing encrypted protocols, threat models. Use libsodium LeapChat secure chat Securing a large number of people End-to-end encryption with web applications, not trusting the middleman Trusted service workers in modern browsers, preinstall javascript. Detecting malicious new versions of javascript code. Web assembly, practical use-cases for web assembly. Allowing users to run precompiled binaries on any platform in a browser. How Web assembly run's in a very low overhead sandbox. Docker will be replaced by podman How docker is not the silver bullet for security, alternatives to it. Trusted microservices environments. Privilege separation web assembly nano process model No need to trust the libraries that you use. Sandboxing, Electrum apps. Running C++ 20% slower with web assembly. Shopify's and Cloudflare's use of web assembly Nomad, Kubernetes is too complex Docker daemon Links: https://tryingtobeawesome.com https://www.goodreads.com/book/show/16153182-cypherpunks http://www.executablephilosophy.org/ https://en.wikipedia.org/wiki/Paul_Graham_(programmer) https://www.djangoproject.com/ https://clojure.org/guides/learn/sequential_colls https://www.educative.io/answers/what-is-a-goroutine https://vlang.io/ https://www.leapchat.org/ https://doc.libsodium.org/ https://developer.mozilla.org/en-US/docs/Web/API/Service_Worker_API https://webassembly.org/docs/security/ https://www.nomadproject.io/ https://podman.io/…
 
This episode is the first time the authors of the book: Black Hat Python. In today's episode of Hacker Talk Justin Seitz and Tim Arnold joins us on the show and we get to hear Tim and Justin stories about Python, Hacking and a lot more! In this episode we cover: Journey into hacking and technology Finding like-minded people, dopamine kicks Infosec community CackalackyCon Issa https://en.wikipedia.org/wiki/Information_Systems_Security_Association Tinkering Python Creating IT-security python courses From Twitter to Nostarch Exploits for Windows 10 and 64bit machines Favorite python libraries, Lxml, requests Syscalls with PyPledge, visualizing packet analysis with scapy Programming, Microsoft basic, PHP, vb6, the future with golang Virtual environments in python Workflow for programming Visual code studio, Microsoft turning good Wingware Wingide with immunity debugger Hunchly's daily dark web report Archive.is to archive .onion sites Onionscan Fresh onions Modern exploit and zeroday writing Ms08067 exploit How to write books Best practices for writing…
 
Buckle in for a great episode of Hacker Talk! Pavol Luptak, CEO of Nethemba joins us, and walks us through the vulnerabilities that were found in Slovakia's covid-19 PCR and anti-gen authority. Tune into the most technical and detailed covid-19 hacking episode, right here on Hacker Talk. In this episode we cover: Pavol's journey into it-security old-school Unix privilege escalation attacks Traditional C and Assembly, shellcodes Becoming a penetration tester Rfid Finding vulnerabilities in parking system, parking in Bratislava for free Hacking Slovakia's covid-19 systems extracting PCR and anti-gen covid-19 tests for all Slovakian citizens. Finding vulnerabilities in PCR test authorities. enumeration attacks. Slovakian eHranica forms. Generating birthdate number. Finding birthdates on Facebook and Wikipedia Leveraging different parts of the systems to make them work together Impersonation attacks OWASP Web Security Testing Guide Cracking Captcha's Rate limiting requests Security mitigations that you can user Central European Bug Bounty programs Hacktrophy Best practices for bug bounties for enterprises How to get started with penetration testing The new smart contract security field Personal number generation script: #!/bin/bash for (( year=54; year < 100; year++))); to for (( month=1; month < 13; month++))); to for (( day=1; day < 32; day++))); to for (( suffix=0; suffix < 10000; suffix++)) to final=$(( $year*100000000+$month*1000000+$day*10000+$suffix )); if (( final % 11 == 0 )); then printf "%010d\n" $final; fi done done done done External Links: https://nethemba.com/possibility-of-widespread-leak-and-misuse-of-eu-vaccination-certificates/ https://nethemba.com/kriticka-zranitelnost-v-aplikacii-moje-ezdravie-unik-databazy-pacientov-testovanych-na-covid-19/ https://slides.com/nethemba/how-trivial-critical-vulnerabilities-can-lead-to-a-complete-leak-of-sensitive-covid-19-data-on-all-citizens-of-the-country https://spectator.sme.sk/c/22722505/serious-flaw-in-ehranica-form-attackers-able-to-send-people-into-self-isolation.html https://wilderko.medium.com/ https://owasp.org/www-project-web-security-testing-guide/ https://nginx.org/ https://docs.nginx.com/nginx-waf/ https://en.wikipedia.org/wiki/Cloudflare https://hacktrophy.com/en/ https://nethemba.com/resources/ehranice-critical-vulnerabilities.pdf…
 
David Jacoby, is a Swedish Hacker, Professional Penetration tester, Security Researcher, featured in the Swedish it-security show called "Hackad" and our guest of honor today! In this episode of Hacker Talk, we are joined by the Swedish hacker David Jacoby! Have you ever watched a video on your phone in your spare time? what if the site had a malicious javascript that will scan your internal network for smart devices and then trigger a remote code execution? Join us as we deep dive into IT-Security, get to hear how David got into hacking, and a lot more! Topics we covered: Phone Phreaking in Sweden Software security David's journey into hacking Privilege escalations on older systems Linux system administration Bulletin board system Running bbs systems at home through a raspberry pi Making security stronger and helping people Password reuse Säkerhet och sekretess Magazine Red team penetration testing How to motivate your organization to implement a security program Attacking consumer devices, hacking smart devices at home Scanning internal networks without a shell using a javascript scanner in the client's browser Hacking internal devices such as Network Attached Storage devices. enumerating networks and scanning with javascript Consumer devices lifespan, testing certifications, best practices for vendors Submitting security vulnerabilities Hack.se, the Swedish hacking scene, and background Favorite Pentesting tools, netcat openbsd version Network segmentation Bad common patterns for enterprise networks Stealing paste buffers Securing society at a large scale The future of information technology security External Links: https://www.imdb.com/title/tt15746988/ https://en.wikipedia.org/wiki/Bulletin_board_system https://www.youtube.com/watch?v=GQpQHqIKE5E https://www.youtube.com/watch?v=_0hXeNRGetg https://se.linkedin.com/in/djacoby https://www.davidjacoby.se/ https://nmap.org/ncat/ https://man.openbsd.org/nc https://www.trustedsec.com/tools/crackmapexec/ https://www.hypr.com/password-reuse/ https://en.wikipedia.org/wiki/Internet_Relay_Chat…
 
Ben Kurtz - Golang Malware part 2 Topics covered: Golang Hells gate, direct system calls on windows How system calls are normally done in windows, Windows Kernel Evading anti malware detection on Windows with Banana Phone How to get started writing c2's in golang. Sliver, Opensource golang command and control. Red team mindset Evolution of programmers, bad patterns CVE's, common vulnerability enumeration number Auditing source code Javascript frameworks Cross site scripting, SQL injection and XXE(Xml External Entity) for scanning internal networks and exfiltrating data. Building secure code bases Security Engineers Supervisory control and data acquisition (SCADA) log4j Remote of execution and directory traversal in Java, Java's file constructor, LDAP and DirContext Golang for micro services Python Common bad patterns LDAP injection Modern security nightmares Remote debug protocols String concatenation Resistance to current modern implementation and safer framework. Finding bugs in games that can be used to attack power-plants. Dependency management Backdoor factory Bettercap Man in the middle Spoofing BGP BGP hijacks Links: https://github.com/Binject https://github.com/C-Sto/BananaPhone https://github.com/BishopFox/sliver https://cve.mitre.org/ https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing https://www.youtube.com/watch?v=FkuUpg5FO2g https://en.wikipedia.org/wiki/SCADA https://en.wikipedia.org/wiki/Log4j https://www.coding-bootcamps.com/blog/build-containerized-applications-with-golang-on-kubernetes.html https://docs.oracle.com/javase/8/docs/api/index.html?javax/naming/directory/DirContext.html https://apache.org/foundation/foundation-projects.html https://docs.oracle.com/javase/8/docs/api/index.html?javax/management/JMX.html https://en.wikipedia.org/wiki/Java_Debug_Wire_Protocol https://www.freecodecamp.org/news/big-o-notation-why-it-matters-and-why-it-doesnt-1674cfa8a23c/ https://github.com/bettercap/bettercap https://www.bettercap.org/ https://bgpmon.net/ https://en.wikipedia.org/wiki/BGP_hijacking https://labs.ripe.net/author/vastur/bgplay-integrated-in-ripestat/ https://www.symbolcrash.com/podcast/ https://www.youtube.com/symbolcrash…
 
Ben Kurtz, is an interesting hacker that has been involved in the infosec space for over 20 years. He has done a large chunk of research into writing malware and post-exploitation tools in the Golang programming language. Tune into this episode of Hacker Talk as we are joined by Ben Kurtz and deep dive into Golang Malware. In this episode of Hacker Talk, we cover the following topics: Getting into programming, apple 2, hacking, bulletin board systems, pirating apple 2 software unix security, shadow and files in the /etc/ folder evolution of network security since 1994 first talk at DEFCON, life as a developer LISP Dan Kaminsky, recruited as a professional hacker Learning different programming languages Learning pascal in a basement Functional programming, constraint solver Getting into the Golang flow. Plan-9 redoing C++ Getting into Golang malware encrypted mesh network Ratnet Iran shutting down tls connections Internet Censorship Code audits Writing malware in different languages V programming language Nym programming language dild, dynamic loading library in OSX parsing memory in golang process execution block loading windows syscall's evading anti-malware systems hells gate, direct windows system calls Network traffic obfuscation online communities that have been running for a long time, Second Life Offline mesh network Red team penetration Write your own malware implant as a penetration tester. Obfuscating malware traffic writing malware Sliver, opensource version of cobalt strike, Command and Control Server testing malware setting up a test environment Penetration testing as a Red Team. Golang Antivirus/EDR evasion Enterprise network monitoring Shellcode loaders in pure golang Rewriting the backdoor factory in golang. Obfuscating binaries with the custom golang debug library Parsing executables from memory(RAM) universal system binary loader without touching disk Links: https://www.hack-the-planet.net/ https://github.com/awgh https://github.com/Binject https://github.com/Binject/go-donut https://github.com/C-Sto/BananaPhone/ https://www.symbolcrash.com/wp-content/uploads/2019/02/Authenticode_PE-1.pdf https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/ https://github.com/boku7/HellsGatePPID https://teamhydra.blog/2020/09/18/implementing-direct-syscalls-using-hells-gate/ https://vxug.fakedoma.in/papers/VXUG/Exclusive/HellsGate.pdf https://2600.com/ https://en.wikipedia.org/wiki/Bulletin_board_system https://en.wikipedia.org/wiki/Plan_9_from_Bell_Labs https://go.dev/ https://go.dev/doc/effective_go https://github.com/awgh/ratnet https://github.com/BishopFox/sliver https://www.youtube.com/watch?v=3RQb05ITSyk | Golang Malware defcon talk https://vlang.io/ https://vlang.io/compare https://en.wikipedia.org/wiki/Nim_(programming_language) https://github.com/vyrus001/go-mimikatz https://github.com/vyrus001/go-mimikatz/blob/master/packer/packer.go…
 
Dan Demeter, well-known security researcher in the Romanian information-security space. In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team. In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan. Topics covered in this episode: Getting into infosec Romania in the early personal internet space, connecting rj45 network cables to potatoes milw0rm, Bugtraq mailing list, backtrack, hell bond hackers Capture the flag(CTF) competitions Internet café Threat intelligence Security research Kaspersky Advanced persistence threats, what is an advanced persistence threat? Finding advanced malware in the wild. Threat levels for individuals Threat modeling Enterprise and consumer malware Antivirus programs targeted malware malware for crypto-currency projects finding advanced malware as a threat intelligence researcher bypassing advanced malware checks Reverse engineering malware ollydbg, NSA decompiler Malware obfuscation techniques yara rules wrapping malware with VM protect Post exploitation malware stages Lazarus Malware, Bangladesh Cyber Bank Heist Malware on sim-cards Using satalite ip addresses reporting malicious command and control servers malware campaigns spreading in Romania phishing and identity theft Bring your own device policy Stay safe working from home Best ways to protect yourself online Writing malware signatures and writing yara rules malware similarity engines Links: https://hackthissite.org/ https://hbh.sh/home https://en.wikipedia.org/wiki/Bugtraq https://en.wikipedia.org/wiki/BackTrack https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered https://securelist.com/ https://securityespresso.org/ https://www.kaspersky.com/ https://twitter.com/kaspersky https://twitter.com/_xdanx https://en.wikipedia.org/wiki/OllyDbg https://hex-rays.com/IDA-pro/ https://ghidra-sre.org/ https://vmpsoft.com/ https://github.com/ParrotSec/mimikatz https://en.wikipedia.org/wiki/Lazarus_Group https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery https://www.kaspersky.com/cyber-crime-lazarus-swift https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29 https://securelist.com/equation-group-from-houston-with-love/68877/ https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/ https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511 https://en.wikipedia.org/wiki/Regular_expression https://github.com/VirusTotal/yara https://github.com/neo23x0 https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/ https://en.wikipedia.org/wiki/Red_October_%28malware%29…
 
Loading …

به Player FM خوش آمدید!

Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.

 

icon Daily Deals
icon Daily Deals
icon Daily Deals

راهنمای مرجع سریع

در حین کاوش به این نمایش گوش دهید
پخش