The InfoSec & OSINT Show
Your weekly dose of information security and open source intelligence news, tips and commentary.
info_outline 56 - Assaf Dahan & Ransomware Trends 05/13/2021
56 - Assaf Dahan & Ransomware Trends In episode 56, Assaf Dahan joins us to talk about ransomware, monitization techniques, attribution and getting started as a malware researcher. My 3 main takeaways were 1) why the double extortion method is so popular 2) how long it takes to exfiltrate our data 3) the most common initial attack vectors used to infect targets
info_outline 55 - Charlie Belmer & NoSQL Injection 05/06/2021
55 - Charlie Belmer & NoSQL Injection This week Charlie Belmer joins the show to chat about NoSQLi, web proxies, cloud security, tips to get started in InfoSec and more. My 3 main takeaways were 1) how SQLi differs from NoSQLi 2) why privacy still matters and 3) How cookieless tracking works and some of the frightening techniques used
info_outline 54 - Jeff Foley & Asset Discovery with Amass 04/29/2021
54 - Jeff Foley & Asset Discovery with Amass This week Jeff Foley hangs all to talk about asset discovery using amass, recon methodologies, hashcat style brute forcing, extending functionality via Lua and more. My 3 main takeaways were 1) finding assets that don’t share a domain name using JARM 2) how they made scanning faster by essentially lowering the DNS brute forcing query rate and 3) where the project is headed
info_outline 53 - hashcat 101 04/15/2021
53 - hashcat 101 This week we cover a basic introduction to password cracking with hashcat. We cover why rainbow tables are no longer useful, password salts, identifying hash types, wordlists, attack modes, the rules language, secure hashing algorithms, password safes and more.
info_outline 52 - InfoSec News & Analysis 04/08/2021
52 - InfoSec News & Analysis This week I offer a curated (almost) 5 minute summary of the latest InfoSec news including the Ubiquiti hack, the latest Facebook data leak, PHP's official Git repository hack, Github security tool updates, Government phishing attacks, a critical netmask NPM vuln, a Spectre/Meltdown mitigation bypass, a zero-click exploit in IoS's Mail, cryptomining Docker images and Microsoft Exchange exploits in the wild.
info_outline 51 - Jim Manico & Developing Securely 04/01/2021
51 - Jim Manico & Developing Securely This week Jim Manico joins the show to talk about Cross Site Scripting, CSPs, strict dynamic, trusted types, SameSite cookies, NIST SP 800-63, password shucking and more. My 3 main takeaways were 1) how to do input validation correctly 2) why using nonces in your CSP is safer than creating an allowed list policy and 3) the right way to handle passwords
info_outline 50 - pdp (Petko Petkov) & Automating Pownage with PownJS 03/25/2021
info_outline 49 - Gabrielle Botbol & Becoming a Pen Tester 03/18/2021
49 - Gabrielle Botbol & Becoming a Pen Tester This week Gabrielle Botbol joins the show to talk about getting into the world of pen testing, certs, CTFs, self study resources, report writing, repeatable risk scoring, finding XSS and staying current. My 3 main takeaways were 1) the CTFs you should be practicing on 2) some strategies to gain credibility in the industry and 3) which certs are worth the investment
info_outline 48 - Paulino Calderón & Practical IoT Hacking 03/11/2021
48 - Paulino Calderón & Practical IoT Hacking This week Paulino Calderón joins the show to chat about his methodology for finding bugs in IoT devices, using Lua for quick exploit development, alarming vulnerabilities he found in a smart water bottle, extending Nmap's functionality and his tips for starting a security business.
info_outline 47 - Christian Folini & The Core Rule Set 03/04/2021
47 - Christian Folini & The Core Rule Set This week Christian Folini hangs out to talk about protecting web apps with the OWASP Core Rule Set, getting into the security industry, impedance mismatch and anomaly scoring. My 3 main takeaways were 1) how RASPs compare to WAFs 2) how paranoia levels are used to eliminate false positives and 3) how the Swiss Post used the CRS to protect a vulnerable online voting system
info_outline 46 - InfoSec News & Analysis 02/25/2021
46 - InfoSec News & Analysis This week we change things up a bit and review a curated (almost) 5 minute summary of the latest InfoSec news including SolarWinds sanctions, language supply chain attacks, Egregor ransomware as a service, N.Korean crypto theft, vuln exploitation in the wild, Mexican politicians and ATM skimming, a new password manager, legal use of look-alike domains, rogue Yandex employees and SIM swapping attacks.
info_outline 45 - John Hammond & Hacking CTFs 02/18/2021
45 - John Hammond & Hacking CTFs This week John Hammond joins the show to talk about hacking with Python, certs vs degrees, avoiding rabbit holes and the differences between various flavors of CTFs. My 3 main takeaways were 1) how to get started with capture the flag competitions 2) dealing with burnout and 3) his methodology to analyze malware
info_outline 44 - Ted Harrington & Doing Application Security Right 02/11/2021
44 - Ted Harrington & Doing Application Security Right This week Ted Harrington hangs out to talk about hacking passive medical devices, predicting Ethereum private keys and exploiting business logic flaws. My 3 main takeaways were 1) Ted's 6 fundamentals of security testing 2) How do to threat modelling right and 3) His advice for starting a security company
info_outline 43 - Robert "RSnake" Hansen & The Future of Data Privacy 02/04/2021
43 - Robert "RSnake" Hansen & The Future of Data Privacy This week Robert Hansen joins us to talk about privacy as a service, search engine and VPN privacy, the future of cyber-insurance, asset discovery, hackers.org and some tips on starting a security business. My 3 main takeaways were 1) the future of data privacy 2) How he used snapshots of the internet to predict stock prices and 3) what security controls he would do differently if he ran hackers.org today
info_outline 42 - Charles Shirer & Pen Testing with No Money Down 01/28/2021
42 - Charles Shirer & Pen Testing with No Money Down This week Charles Shirer joins us to talk about pen testing, OSINT and how he got started in security. My 3 main takeaways were 1) when to use SecBSD as an alternative to Kali 2) How to approach pen testing APIs as opposed to web apps and 3) some tactical tips on maintaining your mental health when dealing with the pressures of InfoSec.
info_outline 41 - Chris Hadnagy & Human Hacking 01/21/2021
41 - Chris Hadnagy & Human Hacking This week Chris Hadnagy joins us to talk about the psychology behind social engineering, choosing effective pretexts, as well as the science behind how we make decisions. My 3 main takeaways were 1) how to identify personality types and communicate effectively using DISC 2) how Oxytocin and Amygdala hijacking influence our behavior and 3) How to get started in a career as a social engineer
info_outline 40 - Fabio Viggiani & Supply Chain Attacks 01/14/2021
40 - Fabio Viggiani & Supply Chain Attacks This week Fabio Viggiani hangs out to talk about supply chain attacks, ransomware, mapping your software dependencies and assuming breach. My 3 main takeaways were 1) his insights into reverse engineering the SolarWinds Orion malware 2) Up-in-coming trends he sees in ransomware and 3) how he runs incident response investigations
info_outline 39 - Josh Sokol & Managing Risk Simply 01/07/2021
39 - Josh Sokol & Managing Risk Simply This week Josh Sokol joins the show talk about managing risk with a focus on keeping it simple, turning a free open source project into a business and his suggestions on how to get started in InfoSec. My 3 main takeaways were 1) the three components of risk mitigation 2) the different level of maturity within risk management programs and 3) his process for ensuring his codebase is secure
info_outline 38 - Tyrone Wilson & Breaking Into the Security Industry 12/17/2020
38 - Tyrone Wilson & Breaking Into the Security Industry This week Tyrone Wilson hangs out to talk about breaking into the security industry, passive OSINT and starting a security business. My 3 main takeaways were 1) how to use free tools to gain experience before joining a SOC 2) how he used OSINT to find his biological father and 3) how to maintain your privacy when using exercise apps.
info_outline 37 - Jenny Radcliffe & People Hacking 12/10/2020
37 - Jenny Radcliffe & People Hacking This week Jenny Radcliffe joins to the show to talk about social engineering. My 3 main takeaways were 1) which influence factors are most useful in specific situations like in person social engineering vs phishing emails 2) reading micro-expressions in context and understanding their limitations and 3) how to protect yourself against social engineering attacks.
info_outline 36 - Tracy Maleeff & Empathy Based InfoSec 12/03/2020
36 - Tracy Maleeff & Empathy Based InfoSec This week Tracy Maleeff hangs out to talk about using empathy to improve your InfoSec investigations. My 3 main takeaways were 1) how to collaborate OSINT findings before drawing a conclusion 2) how to communicate technical issues to a non-technical audience and 3) some tactical tips on using empathy to discover new information.
info_outline 35 - Ed Bellis & Risk Based Vulnerability Management 11/26/2020
35 - Ed Bellis & Risk Based Vulnerability Management This week Ed Bellis joins the show to talk about risk based vulnerability management. My 3 main takeaways were 1) which factors you should take into consideration when prioritizing vulnerability remediation 2) the effects that public exploit code has on remediation efforts 3) how organizations can improve their threat prioritization by using their own threat intel in their risk assessments
info_outline 34 - John Strand & Moving Beyond 0-Days 11/19/2020
34 - John Strand & Moving Beyond 0-Days This week John Strand joins the show to talk about pen testing in the age of Corona, bypassing multi-factor authentication, dealing with ransomware and starting a security business. My 3 main takeaways were 1) why 0-days don't matter 2) how to bypass identity services like Okta and 3) the one guiding rule for creating a security business
info_outline 33 - Tanya Janca & Coding Securely 11/12/2020
info_outline 32 - Or Katz & Phishing Evasion Techniques 11/05/2020
32 - Or Katz & Phishing Evasion Techniques This week Or Katz joins us to shares his research into novel phishing evasion techniques seen in the wild. My 3 main takeaways were 1) What the most popular methods to propagate phishing attacks are 2) what signals can help determine if complicated code is malicious or not and 3) How to handle potentially malicious users when we don’t have enough information to understand their true intentions
info_outline 31 - Chris Rock & Cyber Mercenaries 10/29/2020
31 - Chris Rock & Cyber Mercenaries This week Chris Rock shares his story as well as some techniques he's used as a cyber mercenary. My 3 main takeaways were 1) why 0-days are rarely needed 2) Spear-phishing as the most efficient technique for the initial compromise 3) why the easiest path to your target may be by hacking someone else, like their accountant
info_outline 30 - Hakluke & The Bug Bounty Mindset 10/22/2020
30 - Hakluke & The Bug Bounty Mindset This week Hakluke shares some mindset tweaks and tactical advice on how to improve your bug bounty hunting. My 3 main takeaways were 1) why the abundance mindset is so important 2) what we can learn from the similarities between the music industry and bounty hunting and 3) why collaboration is so important.
info_outline 29 - Katie Moussouris & Running Bug Bounties 10/15/2020
29 - Katie Moussouris & Running Bug Bounties This week Katie Moussouris hangs out to talk about both the advantages as well as challenges in running bug bounty programs. My 3 main takeaways were when companies should choose a bounty as opposed to a pen test, where a company should be at operationally before launching a program and how companies should prepare before launching their bug bounty program.
info_outline 28 - STÖK and Hunting Bug Bounties 10/08/2020
28 - STÖK and Hunting Bug Bounties This week STÖK joins us to talk about how he approaches bug bounties. My 3 main takeaways were why you should specialize in a couple of specific bug types. Why you should constantly scan a multitude of bounty programs and why you should hack with a team.
info_outline 27 - Joona Hoikkala and Advanced FFuF Scanning 10/01/2020
27 - Joona Hoikkala and Advanced FFuF Scanning This week Joona Hoikkala joins us to talk about some of the advanced features of ffuf. My 3 main takeaways were why you should use a VPS for running scans and how to integrate an external ffuf scan into your local Burp instance. Why you should use filters instead of the default pattern matcher to remove false positives as well as what cool functionality he's working on to enhance ffuf's capabilities.