security.didici.cc

TekThing 130 – Cheap Mesh Routers? Focal Spark In Ear Headphone, Latency vs. Bandwidth, Solar Photography Tips!

1 day ago

Are there cheap mesh routers??? Focal Spark In Ear Review, Latency vs. Bandwidth, Solar Photography with Binoculars! —— 00:57 Affordable Mesh Routers??? @sanbornVR tweets, “When are mesh routers going to be affordable? They are the cost of game cons ...

Hak5 2214 – Kid in a candy store – Hack Across the Planet

2 days ago

————————
—- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat Wire RSS: https://shannonmorse.podb ...

198 Million US Voters Data Exposed – Threat Wire

3 days ago

198 million us voters data has been exposed, the US warns of north korean cyberattacks, a hacker pleads guilty to attacks on military, and the CIA hacks routers with CherryBlossom. All that coming up now on Threat Wire. ——————
———- Sho ...

Hak5 2213 – Pineapple Taiwan Beer – Hack Across the Planet

1 week ago

Exactly as the title says. #HackAcrossThePlanet Next up: Johannesburg, London and round about the UK. Sign up at https://hackacrosstheplan
et.com ——————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscr ...

Hak5 2212 – Two nuts and a squirrel – Hack Across the Planet

1 week ago

Title says it all… #HackAcrossThePlanet —
———————
- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 ...

TekThing 129 – Best Games of E3! I Left Comcast For Common.net, Tech Gifts Dad Doesn’t Want, Be Internet Awesome

1 week ago

Common.net wireless mesh internet, BIG TITLES and indie games from E3, get ready for the eclipse, Be Internet Awesome! —— 01:15 Total Eclipse August 21st! THE TOTAL ECLIPSE IS COMING… we’ve never seen one in person, so we’re stoked… check out ...

Hak5 2211 – Went places, did things. Hack Across the Planet

1 week ago

Not much I can say about Blue Ant, the engagement or what’s going on other than to share with you some bits of B-Roll from the latest chapter in the Hack Across the Planet Adventure. Regular episodes return this July. Tour continues in Johannesburg and ...

Did Russia Hack US Election Systems? – Threat Wire

1 week ago

Did Russia hack election systems, Comey testifies to the Senate, and a Ukrainian Power Grid is Downed by Crash Override. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th ...

How to Upgrade the System76 Galago Pro Linux Laptop – TekThing Short

1 week ago

Learn how to do a hardware upgrade to your laptop with these easy steps! —— Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the show for you every week!https://www.patreon.
com/tekthing —— EMAIL US!a ...

TekThing 128 – 8K Dell UltraSharp 32 Monitor Review! Best Business Card Scanner, HomePod, New Drives or New NAS?

2 weeks ago

Dell UltraSharp 32 8K Monitor, Apple HomePod, Do I need a new NAS? Android Business Card Scanner, USB Ports on Planes? —— 00:49 WWDC: HomePod & iMac Pro We took a lot of notes from WWDC 2017… watch the video to find out which new apple products rea ...

Add a Mic to Any Headphones! The Antlion ModMic 5 – TekThing Short

2 weeks ago

The Antlion ModMic 5 allows you to add a quality microphone to any headphones. https://antlionaudio.com
/collections/modmichttp:/
/amzn.to/2snQZV5 —— T
hank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the sh ...

Fireball Malware Infects Millions – Threat Wire

2 weeks ago

Fireball malware infects millions of computers worldwide, a OneLogin breach creates headaches for users, and Wikileaks is back with another Vault7 leak. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su ...

AusCERT2017 Keynote: Of Hardware and Humans: Exploiting the Universal Attack Vector

3 weeks ago

Darren Kitchen and Shannon Morse travel to Gold Coast, Australia to give a keynote at AusCERT 2017, Australia’s largest and oldest information security conference. Find more details on our talk here: https://hakshop.com/blogs
/news/what-is-the-best-se
cur ...

Hak5 2210 – Hak5 Down Under – Hack Across the Planet

3 weeks ago

Darren heads to Gold Coast Australia for AusCERT 2017 and meets up with Shannon Morse! ——————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5 ...

TekThing 127 – System76 Galago Pro Linux Laptop, Ultimate USB Charger, LineageOS Android, Hacking Security Pros!

3 weeks ago

Best Desktop USB Charger, System76 Galago Pro Laptop, LineageOS Android, Hacking Security Pros! —— 1:50 Ultimate USB Charger! Curt, aka @farmboy24 tweets, “Patrick what are you using to charge all of the phones and tablets in your household? Done w ...

No More Drone Registration! Subtitles Can Be Hacked, Fake Net Neutrality Comments – Threat Wire

3 weeks ago

No more drone registration, watch movies with subtitles? Beware a remote code execution flaw, and was your name used for anti-net neutrality comments? All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pp ...

HakTip 157 – Linux Terminal 201: Searching and Locating Files

4 weeks ago

In this HakTip, we’re learning how to search for files with the locate and find commands, as well as how to search within files with grep! ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: ...

The Best $100 Waterproof Bluetooth Speaker?! UE Wonderboom vs UE Roll 2 – TekThing Short

1 month ago

Ultimate Ears just came out with the new Wonderboom Waterproof Bluetooth Speaker, but is it good enough to upgrade? We compare the UE Boom 2, Roll 2, and Wonderboom to find out which is best! Wonderboom: http://amzn.to/2ppq8dr Ro
ll 2: http://amzn.to/2r5zb ...

HakTip 156 – Linux Terminal 201: How To Use tar, gzip, bzip2, and zip

1 month ago

Archiving vs Compression? What’s the difference between tar, gzip, bzip2, and zip? We’ll check out all of them, along with how to use each tool in the terminal on HakTip! —————
————- Shop: http://www.hakshop.com Su
pport: http://www ...

TekThing 125 – Fight Ransomware!!! Should I Pay for Antivirus? How To Back Up and Rip DVD, Cable Modem Lawsuit!

1 month ago

How To Fight Ransomware!!! Should I Pay for Antivirus? Back Up DVDs & Blu-rays, Run Pi-hole and OpenDNS! —— 00:32 FIGHT RANSOMWARE The Wannacry Ransomware has encrypted the data on hundreds of thousands of computers, we tell you how to fight ransomwar ...

TekThing 126 – Best Nintendo Switch Accessories, Free Music Servers, Chocolatey Package Server, Soldering Irons!

1 month ago

Top 5 Nintendo Switch Accessories, Free Music Servers, Install Windows Apps With Chocolatey, Soldering Iron Picks! —— 02:28 Best Nintendo Switch Accessories!!! Looking for the best accessories for your Nintendo Switch? Find out why Shannon’s uses th ...

Hak5 2209 – Pseudocode for Life – Hack Across the Planet

1 month ago

Pseudocode for Life starts at 6:38 ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Conta
ct Us: http://www.twitter.com/ha
k5 Threat ...

Safe Headphones for Kids and Adults! – TekThing Short

1 month ago

Gain more control over your audio levels with Puro’s BT2200 headphones for kids, and Studio Grade Adult Bluetooth Wireless Headphones! Puro Labs BT5200 Studio Grade Headphones: http://amzn.to/2raXSIy Pu
ro Labs BT2200 Kids Headphones: http://amzn.to/2rbi ...

WannaCry Ransomware Infects the World – Threat Wire

1 month ago

Everything we know so far about WannaCrypt or WannaCry, Microsoft criticizes gov’t agencies, a keylogger is found on HP machines, and Trump’s new cybersecurity measures. All that coming up now on Threat Wire. ——————
———- Shop: http ...

HakTip 155 – Linux Terminal 201: How To Use Man Pages

1 month ago

Man pages are super useful for learning about common commands in the Linux Terminal! Find out more today on HakTip! —————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/h ...

TekThing 124 – Tech Gifts For Mom, USB Type C Dock: Dell TB16 vs Kensington SD4600P, QoS, Dumbest WiFi Boost Ever

1 month ago

7 Tech Gifts For Mom Under $100, USB Type C Dock: Dell TB16 vs Kensington SD4600P, QoS, Dumbest WiFi Speed Boost Ever —— Simple Things Can Make WiFi Suck What quick fix did Patrick do to take a desktop PC from 10Mb/s to 100 Mb/s downloads? Watch the v ...

Experiencing Self Driving Autonomous Cars with Intel! – TekThing Short

1 month ago

Intel invited me to their Autonomous Driving Garage to check out all the things they’re doing to help get self driving vehicles onto the market. —— Thank You Patrons! Without your support via patreon.com/tekthing, we wouldn’t be able to make the ...

2FA Via Text Is Broken, Windows Could Have a Worm – Threat Wire

1 month ago

Google fixes a major phishing attack, 2FA via text is still broken, and a remote code execution vulnerability has been reported to microsoft. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http ...

HakTip 154 – Linux Terminal 201: ifconfig vs ip

1 month ago

Wondering what’s the difference between ifconfig and ip? These two commands are similar but one is much more powerful. Check out this episode to find out why! https://access.redha
t.com/sites/default/files
/attachments/rh_ip_comman
d_cheatsheet_1214_jcs_pr ...

TekThing 123 – Speed Up Your Cable Modem! Is Your Battery Pack Too Big To Fly? MS Surface Pro Substitutes, DNSCrypt

1 month ago

Speed Up Your Cable Modem! Is Your Battery Pack To Big For Air Travel? MS Surface Pro Substitutes, DNSCrypt = Security! —— 00:37 Speed Up Your Cable Modem Can you speed up for your cable modem for free? Will a new cable modem make your internet faster ...

Hak5 2208 – MAC Spoofing for Free in-flight Wi-Fi (and monkeys) – Hack Across The Planet

1 month ago

Hack Across the Planet continues from Bangkok to Jakarta to Bali. ( the tech content is hidden at 7:30 ) ———————
——- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Sit ...

Unboxing the Aukey Mechanical Keyboard! – TekThing Short

1 month ago

Curious about the new Aukey Mechanical Keyboard? Check out our unboxing and review! Links!http://amzn.to/2pG
exFr Like the background music? It’s by Dale Chase! http://www.dalechase.com/
—— Thank You Patrons! Without your support via patreon.com/tek ...

The FCC Targets Net Neutrality, NSA Stops Email Spying – Threat Wire

1 month ago

The FCC has targeted net neutrality, the NSA stops -some- of their email spying, IoT vigilantes are on the rise, and Intel devices can be pwned. All that coming up now on Threat Wire. Links:https://mothe
rboard.vice.com/en_us/art
icle/shady-conservative-g
ro ...

HakTip 153 – Linux Terminal 201: Networking Commands You Should Know Pt 2!

1 month ago

Part two! Learn many networking commands you need to know to get started in Linux! ——————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org ...

TekThing 122 – Cheap Dell Gaming Monitor! Star Trek Bridge Crew VR Review, Two Factor Authentication For Windows!

1 month ago

Cheap Dell Gaming Monitor Packs FreeSync! Star Trek Bridge Crew VR Review, Two Factor Authentication For Windows! —— 02:57 3 New Dell Monitors! We love Dell’s U3415W UltraSharp curved monitor, but it’s not cheap. We review the new 1080p Dell S Fam ...

Hak5 2207 – Attacked by Children – Hack Across the Planet

1 month ago

Attacked by children during water festival (Songkran) in Bangkok, Thailand and some Hak5 announcements. http://HackAcrossThePlane
t.com ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http: ...

Ultimate Minimalist Gaming Desktop Setup! – TekThing Short

2 months ago

I wanted to turn my office space into a peaceful haven of technology fit for video gaming and productivity. Check it out and make sure to subscribe for more! **Have an idea for network shelving? Let me know in the comments so I can finally upgrade that ca ...

Steal a Car With $22 in Tech, FCC Removes Price Caps, and Punycode is Full of Win – Threat Wire

2 months ago

The FCC still isn’t so keen on internet freedom, a new car could cost as little as $22, and it’s possible to phish people using Unicode. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http: ...

TekThing 121 – AMD Radeon RX 580 vs GTX 1060! Logitech G413 Gaming Keyboard, Pi-Hole vs. OpenDNS, UPDATE WINDOWS!!!

2 months ago

Logitech G413 Gaming Keyboard, Pi-Hole vs. OpenDNS, AMD Radeon RX 580 vs GTX 1060, UPDATE WINDOWS NOW!!! —— 00:43 AMD RX 500 Series GPUs Is this the fastest GPU from AMD? PCPer’s Ryan Shrout joins us to talk Nvida Titan XP, and how AMD’s new Radeo ...

Hak5 2206 – Hacking Hotel WiFi – Hack Across the Planet

2 months ago

Sniffing open WiFi for unencrypted HTTP GET traffic reveals a captive portal privacy concern – this time on Hak5! Sign up at https://hackacrosstheplan
et.com ——————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
r ...

ShadowBrokers Release New NSA Docs – Threat Wire

2 months ago

Emergency sirens went off in Dallas, but it was a pretty low-tech hack, inmates in an Ohio prison build their own computers to access the internet, and the ShadowBrokers offer up a Good Friday Surprise from the NSA. All that coming up now on Threat Wire. ...

HakTip 152 – Linux Terminal 201: Networking Commands You Should Know!

2 months ago

Learn about Linux commands, such as ping, traceroute, and netstat in this episode of HakTip! —————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://ww ...

TekThing 120 – Anker PowerCore Battery Pack Battle! Ryzen 5 CPUs Rock, ThermoPeanut, Best Headphones CanJam 2017

2 months ago

Anker’s PowerCore II 20000 and PowerCore Turbo Portable Charger, Ryzen 5 CPUs, ThermoPeanut, Best Headphones CanJam 2017 —— 00:56 Ryzen 5 CPUs Hint: if you’re doing a lot of multithreaded work, you’re seriously considering AMD for your next CPU! ...

Hak5 2205 – Why’s Everyone Talking About Mastodon?

2 months ago

Why is everyone talking about Mastodon lately? Is this the new open source social network you should join? ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our S ...

Better Border Protections for Your Electronic Devices – Threat Wire

2 months ago

A Bipartisan bill for better border protections? Did Symantec just oust the CIA? And Wi-Fi networks can hack your phone, All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/t ...

TekThing 119 – 3 Tools That Hide Your Browsing History! QNAP TS-251A NAS, VPN On Your Router Is Slow, DNS Leaks!

2 months ago

3 Tools That Hide Your Browsing History! QNAP TS-251A NAS Review, VPN On Your Router Is Slow, Detect DNS Leaks! —— 1:00 3 Tools That Hide Your Browsing History Hey, your ISP has tracked your browsing for a long time, but advertisers are probably worse ...

Hak5 2204 – Bash Bunny Development: Behind the Scenes – Hack Across the Planet

2 months ago

Bash Bunny firmware version 1.1 coming soon at http://bashbunny.com #Hac
kAcrossThePlanet is in full swing. Sign up at http://HackAcrossThePlane
t.com ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Su ...

To VPN or Not To VPN? – Threat Wire

2 months ago

Do you use a VPN? ATMs are being hacked, again, and the CIAs marble framework was used to hide their hacks. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Sub ...

To VPN or Not To VPN? – Threat Wire

2 months ago

Do you use a VPN? ATMs are being hacked, again, and the CIAs marble framework was used to hide their hacks. All that coming up now on Threat Wire. ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Sub ...

HakTip 151 – Linux Terminal 201: Apt vs Apt-Get

2 months ago

Today we’re talking about the differences between apt-get and apt in the Linux command line! ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http:// ...

HakTip 151 – Linux Terminal 201: Apt vs Apt-Get

2 months ago

Today we’re talking about the differences between apt-get and apt in the Linux command line! ——————
———- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http:// ...

TekThing 118 – Ryzen Overclocked, Corsair H110i Liquid Cooler, Eufy RoboVac 11 vs Roomba, Nextcloud Raspberry Pi!

2 months ago

Nextcloud Raspberry Pi, Eufy RoboVac 11 vs Roomba, Corsair H110i Liquid Cooler, Ryzen 7 Overclocked W/ Benchmarks —– 00:59 Galaxy S8 & Essential Android Phone, Galaxy S8 launched March 29th, the day after we shot this video! Andy Rubin, the co-founder ...

Hak5 2203 – Keybase Chat & A Hak5 Host Takeover!

2 months ago

In this episode of Hak5, we’ve got new hosts! Plus, is Keybase Chat the best new encrypted chat client? Enjoy our early April Fool’s episode with special guests! —————
————- Shop: http://www.hakshop.com Su
pport: http://www.patreon. ...

ISPs Could Sell User Web Data with Senate Vote – Threat Wire

2 months ago

Symantec issued HTTPS certificates are on Google’s chopping block, the Senate votes to allow ISPs to sell web search data, Wikileaks says the CIA targets Apple devices, and John Deere tractors are being hacked. All that coming up now on ThreatWire. — ...

HakTip 150 – Linux Terminal 201: Working with Storage Media, ISO Images, and MD5 Checksums

3 months ago

Today on HakTip we’re talking about dealing with flashdrives in the terminal. —————
—————- Shop: http://www.hakshop.com Su
pport: http://www.patreon.com/th
reatwire Subscribe: http://www.youtube.com/ha
k5 Our Site: http://www.hak5.org Co ...

TekThing 117 – Update WhatsApp Now! Lenovo Ideapad Y900 Gaming Laptop, Kano Raspberry Pi, Teach Kids To Code!

3 months ago

Update WhatsApp & Telegram Now! Lenovo Ideapad Y900 Gaming Laptop Review, Kano Raspberry Pi, Teach Kids To Code! —— 00:41 Kano Computer & Coding For Kids Kano Computer & Coding For [email protected] tweets @TekThing “Hi! For his birthday, my soon ...

Hak5 2202 – Concealed Exfiltration – Pocket Network Attacks with the Bash Bunny

3 months ago

Check out the SMB Exfiltrator payload from the Bash Bunny github:https://github.com
/hak5/bashbunny-payloads/
tree/master/payloads/libr
ary/smb_exfiltrator Bash Bunny: http://www.bashbunny.com
Hack Across The Planet: http://www.hackacrossthep
lanet.com —— ...

Process Token Dumper Part 2: Code Walkthrough

3 months ago

For More Information Please Visit: http://www.pentest
eracademy.com Full Course: http://www.pentesteracade
my.com/course?id=31

Process Listing API: CreateToolhelp32Snapshot

3 months ago

For More Information Please Visit: http://www.pentest
eracademy.com Full Course: http://www.pentesteracade
my.com/course?id=31

Process Listing API: PSAPI EnumProcess

3 months ago

For More Information Please Visit: http://www.pentest
eracademy.com Full Course: http://www.pentesteracade
my.com/course?id=31

BSides Philadelphia 2016 - Size Doesn't Matter : Metrics and Other Four Letter Security Words

3 months ago

You are here. No really, you are here. But how do you know where here is? How do you know if you're better or worse than your industry counterparts? Maintaining an effective security program requires focus on metrics and frameworks as a backdrop to narrat ...

BSides Philadelphia 2016 - Web Application Exploit 101 : Breaking Access Control and Business Logic

3 months ago

One of the critical attack vectors against web application is exploiting access control and business logic. These are severe problems, but discovering these issues are difficult. It is because web application scanner cannot find out these vulnerabilities ...

BSides Philadelphia 2016 - Red Teaming your Risk Management Framework

3 months ago

While most red team talks focus on the tools and tactics, this talk with take a compliance slant. Focusing on the NIST 800-53a revision 4 assessment framework, we will explain how the government definesred team testing. Afterwards, we will walk through al ...

BSides Philadelphia 2016 - "Knowing the Enemy"- Creating a Cyber Threat Actor Attribution Program

3 months ago

Cyber-attacks have continued to rise, with the existing threats progressively evolving at a rapid pace while newer more lethal threats are emerging at an alarming rate. Despite organizations having increased their investments in technological solutions, w ...

BSides Philadelphia 2016 - Getting Permission to Break Things

3 months ago

As a security professional or penetration tester, it's often our "job" to break things, but what is absolutely essential is that we get the permission to break things. There are different pain points for organizations, and it's essential to get the buy-in ...

BSides Philadelphia 2016 - Information security and the law

3 months ago

In information security, sometimes the difference between employed and criminal is a fine line. This talk will discuss how the law affects and guides our profession. Contracts, regulatory law (HIPAA, GLBA) and criminal law (Computer Fraud and Abuse Act) a ...

BSides Philadelphia 2016 - Cryptography Pitfalls

3 months ago

Developers tend do a poor job of implementing cryptography and other security measures in their systems. However, we as security people aren't doing very much to help them be successful. Often the primitives used are out of date and overlook very subtle f ...

BSides Philadelphia 2016 - Threat Intel Analysis of Ukrainian's Power Grid Hack

3 months ago

The sequence of events taken by the adversary in the months leading up to December 23, 2015 when a cyber operation targeting Ukrainian electricity infrastructure, resulting in power outages affecting approximately 225,000 customers. BlackEnergy 3, KillDis ...

BSides Philadelphia 2016 - Hacking Your Way into the APRS Network on the Cheap -- Extended Edition

3 months ago

The APRS (Automatic Packet Reporting System) is a decades old digital wireless network, run primarily by amateur radio operators, which currently spans the world. While seemingly primitive compared to modern networks, it is surprisingly robust, and highly ...

BSides Philadelphia 2016 - So you want to beat the Red Team?

3 months ago

They say, “The Red Team ALWAYS wins!” Do you want to save face against the Red Team? Trying to beat them? No budget to hire a Red Team but want the cliff notes? In this presentation, I’ll describe several paths to compromise and the most valuable te ...

BSides Philadelphia 2016 - Top 10 Mistakes Made In Active Directory That Can Lead To Being Compromised

3 months ago

Hitting the “Finish” button is only the beginning to creating a secure Active Directory. From the settings you must configure to protect against MimiKatz to the 7 registry keys you manually set to ensure time is configured on the Primary Domain Contro ...

BSides Philadelphia 2016 - Hacking the Human: Social Engineering Basics

3 months ago

Divided into 8 segments covering the core fundamentals of Social Engineering. Starts with "the golden rule of SE" aka abusing self-interest and moves on to wearing masks/selling fake identities and the associate dangers, story telling to build characters ...

BSides Philadelphia 2016 - A tour through the magical wonderful world of crypto land

3 months ago

This is a walkthrough some random topics in cryptography. I will write a few hundred slides in the feeling of a choose your own adventure game. Each topic will be somewhere between 3-10 slides and will encompass a bunch of things between cryptographic mod ...

BSides Philadelphia 2016 - Owning MS Outlook with Powershell

3 months ago

Most companies, businesses, and organizations rely on Microsoft Outlook for managing email. This talk explores how Outlook can be leveraged for the benefit of red teams and penetration testers using only Windows PowerShell. Going beyond the basics of mere ...

BSides Philadelphia 2016 - Every day is a Zero Day: Building an in-house Secure SDLC program

3 months ago

As applications continue to grow and expand in functionality and behavior, security needs to keep up with this expansion. Creating secure applications begins with the inclusion of security in the early design phases and continues throughout the applicatio ...

BSides Philadelphia 2016 - Hunting: Defense Against The Dark Arts

3 months ago

“We can all agree that threat ("Evil") detection is an essential component of a functioning security monitoring program. Let's start thinking about how to take our tradecraft to the next level and hunt for insecure conditions ("Ways for Evil to do Evil ...

WhatsApp Web App Account Takeover, and Yahoo Hackers Indicted – Threat Wire

3 months ago

Twitter Counter gets hacked, WhatsApp and Telegram web apps vulnerable to account takeovers, four have been indicted in one of the Yahoo hacks, and the White House has a new cybersecurity coordinator. All that coming up now on Threat Wire. ————— ...

GrrCon 2016 - Bad Guys Look Just Like You

3 months ago

GrrCon 2016 - Bad Guys Look Just Like You For More Information Please Visit: http://grrcon.com/ http:/
/www.irongeek.com/i.php?p
age=videos/grrcon2016/mai
nlist

GrrCon 2016 - Getting to the Root of Advanced Threats Before Impact

3 months ago

In today?s modern digital landscape, effectively protecting against advanced malware and zero-day attacks requires more than a simple firewall or anti-virus approach ? it takes a smart combination of real-time network analysis, comprehensive endpoint visi ...

GrrCon 2016 - Fighting the Enemy Within

3 months ago

Concerned about Stuxnet, Operation Aurora, and other similar advanced nation-state attack campaigns and looking for ways to detect and prevent those attacks? That?s great, but have you checked your patching rates lately? Are your logs spooling away withou ...

SECUREWV 2016 - Mobile Forensics An Introduction

3 months ago

SECUREWV 2016 - Mobile Forensics An Introduction For More Information Please Visit:- http://securewv.com/ http
://www.irongeek.com/i.php
?page=videos/securewv-hac
k3rcon2016/mainlist

SECUREWV 2016 - Network Forensics using Kali Linux and/or SANS Sift

3 months ago

A former digital forensics laboratory manager and examiner, Josh Brunty has over a decade of experience in the field of digital forensics & investigations. Josh is currently an Assistant Professor of Digital Forensics for the Department of Integrated Scie ...

SECUREWV 2016 - Intro to Digital Forensics

3 months ago

In the fields of computer security and information technology, computer security incident response involves the monitoring and detection of security events on a computer or computer network, and the execution of proper responses to those events. Computer ...

SECUREWV 2016 - Intro to WireShark

3 months ago

Wireshark, a network analysis tool formerly known as Ethereal, captures packets in real time and displays them in human-readable format. Wireshark includes filters, color-coding and other features that let you dig deep into network traffic and inspect ind ...

SECUREWV 2016 - Evidence Collection - Part 2

3 months ago

Evidence handling is clearly one of the most important aspects in the expanding field of digital forensics. The never-ending innovation in technologies tends to keep best practices in constant flux in effort to meet industry needs. This class will cover t ...

SECUREWV 2016 - Evidence Collection - Part 1

3 months ago

Evidence handling is clearly one of the most important aspects in the expanding field of digital forensics. The never-ending innovation in technologies tends to keep best practices in constant flux in effort to meet industry needs. This class will cover t ...

SECUREWV 2016 - Python Scripting - Part 2

3 months ago

SECUREWV 2016 - Python Scripting - Part 2 For More Information Please Visit:- http://securewv.com/ http
://www.irongeek.com/i.php
?page=videos/securewv-hac
k3rcon2016/mainlist

SECUREWV 2016 - Python Scripting - Part 1

3 months ago

SECUREWV 2016 - Python Scripting - Part 1 For More Information Please Visit:- http://securewv.com/ http
://www.irongeek.com/i.php
?page=videos/securewv-hac
k3rcon2016/mainlist

SECUREWV 2016 - Intro to Linux

3 months ago

SECUREWV 2016 - Intro to Linux - Part 1 For More Information Please Visit:- http://securewv.com/ http
://www.irongeek.com/i.php
?page=videos/securewv-hac
k3rcon2016/mainlist

SECUREWV 2016 - Giving Back - Submitting to PTES 101

3 months ago

How many of us have used or heard of the Penetration Testing Execution Standard aka PTES? How many have thought about or attempted to contribute? PTES has great popularity within the Information Security community, however, it needs more support and contr ...

SECUREWV 2016 - How to hack all the bug bounty things automagically and reap the rewards (profit)!

3 months ago

This talk will cover how I replicated a Shodan-like functionality to make a targeted, automated active-scanning and data-replicating system that seeks out and replicates open Mongo instances, Redis instances, and Apache / $webserver open indexes amongst o ...

SECUREWV 2016 - Bitcoin: From Zero to "I get it."

3 months ago

Talk is about the technical aspects of bitcoin and its architecture with the parallels to traditional finance systems for reference. Graduated Marshall in 2013 BS Computer Science Enrolled in Marshall CS Masters 2015, bad idea. Linux System Administrator ...

SECUREWV 2016 - Securing The Secure Shell, The Automated Way

3 months ago

Everyone knows the few basic ssh settings required for security, such as disabling root login. Past those, there is a wealth of more advanced configuration options available that can take your security from pretty good to rock solid. However, configuring ...

SECUREWV 2016 - WTF? Srsly? Oh FFS! - IR Responses

3 months ago

Mark has over twenty years of information technology experience, of which most has been focused on information security. At his current position, Mark is responsible for the delivery of McAfee Network Security Platform (NSP), and McAfee Enterprise Securit ...

SECUREWV 2016 - Scripting Myself Out of a Job - Automating the Penetration Test with APT2

3 months ago

Nearly every penetration test begins the same way; run a NMAP scan, review the results, choose interesting services to enumerate and attack, and perform post-exploitation activities. What was once a fairly time consuming manual process, is now automated! ...

SECUREWV 2016 - Windows Timelines in Minutes

3 months ago

Creating a timeline is a standard part of many forensics investigations. Unfortunately, creating a timleine with many standard tools, such as Autopsy, can be tedious and consume several hours. When the timeline is finally done, the options to present it a ...

SECUREWV 2016 - How to Not Cheat on Your Spouse: What Ashley Madison Can Teach Us About OpSec

3 months ago

Embarrassed spouses everywhere are scurrying for excuses about their infidelity. This refresher will look at some lessons we can all take away on how to not get caught up in embarrassing situations. Simple steps could have prevented lots of embarrassment ...

SECUREWV 2016 - Building an Infosec Program from Ground Zero: From the Coat Closet to the Data Center

3 months ago

The purpose of the talk is to share some of my experiences in working within the public and private sector and to help small to medium sized businesses to get started with some basic controls to help monitor and defend their computer systems. I hope that ...

SECUREWV 2016 - SUSpect - A powershell based tool to provide early detection of ransomware and other attack techniques.

3 months ago

Attendees will learn about SUSpect, a powershell tool that might be useful in detecting ransomware and other attack tools. You'll learn why this tool *shouldn't* be needed, but how it can be there as a fallback. After all, layered defense is a good thing. ...

SECUREWV 2016 - So You've Inherited a Security Department, Now What?

3 months ago

Over the last decade, technology adoption has exploded worldwide and corporations have struggled to keep pace. Usability and revenue creation have been the key motivating factors, often ignoring the proactive design and security required for long-term sta ...