PLAY PODCASTS
Security Weekly Podcast Network (Video)

Security Weekly Podcast Network (Video)

4,843 episodes — Page 97 of 97

Episode 350: Interview with Kevin Finisterre

Kevin Finisterre is a Senior Research Consultant with Accuvant, has hacked everything from utilities providers to police cars and is keen on disseminating information relating to the identification and exploitation of software vulnerabilities on many platforms.

Nov 7, 201327 min

Episode 350: Interview with Jayson Street

Jayson E. Street is an author of “Dissecting the hack: The F0rb1dd3n Network” from Syngress. Also creator of dissectingthehack.com He has also spoken at DEFCON, DerbyCon, UCON and at several other ‘CONs and colleges on a variety of Information Security subjects. His life story can be found on Google under “Jayson E. Street” *He is a highly carbonated speaker who has partaken of Pizza from Beijing to Brazil. He does not expect anybody to still be reading this far but if they are please note he was chosen as one of Time’s persons of the year for 2006. ;)

Nov 7, 201327 min

Episode 350: Angelo & Leo - Honeynet.org

Contacts: [email protected] [email protected] They can also be reached on twitter: @ProjectHoneynet @angelodellaera @lvdeijk

Nov 7, 201315 min

Episode 350: Graham, Auerbach and Thuen

Discussion of expectations of privacy today and what does privacy mean.

Nov 7, 201359 min

Security Weekly #350 - Whitelisting Java

Greg Hetrick shows us how to better lock down our Java apps since we can't "just uninstall Java!"

Nov 4, 20137 min

Episode 350: Using NMap to get HTML Comments from HTTP Responses

Description: Extracts and outputs HTML/JS comments from HTTP responses. Why would someone use the tool or technique ? : "The attached script makes use of patterns to extract HTML comments from HTTP responses. There are times sensitive information may be present within HTML comments. While this does not necessarily represent a breach in security, it can give an attacker leverage useful for exploitation."

Nov 4, 201318 min

Stories of the Week - Episode 348

Jack's rantapocalypse, popping penguins, the Yahoo bounty, Paul wants a new phone and the Blackhole kit guy goes down. We think.

Oct 16, 201342 min

Tech Segment with Heather Mahalik - Episode 348

Heather Mahalik is a senior digital forensics analyst at Basis Technology. As the on-site project manager, she uses her experience to manage the cell phone exploitation team and supports media and cell phone forensics efforts in the U.S. government. Heather is a certified SANS instructor and teaching the upcoming course Advanced Smartphone and Mobile Device Forensics.

Oct 12, 201320 min

Interview with Thierry Zoller - Episode 348

Thierry has 14 years experience in information security, designing resistant architectures and systems, managing development and information security teams, ISM policies and high profile penetration tests. Thierry has a security blog over at blog.zoller.lu . Thierry is currently now working as a Practice Lead for Threat and Vulnerability Management at Verizon Business.

Oct 12, 201347 min

Stories and Rants of the Week - Episode 347

The team goes off on some pretty big tangents this week and does a lot more rambling than actual discussion of stories. However, they did get in talk about DerbyCon, the Yahoo bug bounty and a couple of hacks this week. If you're not hardcore about having the whole segment about published security articles, you might enjoy this on as well.

Oct 7, 201345 min

Tech Segment with Jared DeMott - Episode 347

Jared DeMott has spoken at security conferences such as Black Hat, Defcon, ToorCon, Shakacon, DakotaCon, GRRCon, and DerbyCon. He is active in the security community by teaching his Application Security course, and has co-authored a book on Fuzzing.

Oct 6, 20139 min

Interview with Jaime Filson - Episode 347

Jaime enjoys long walks on the beach while his computer equipment is busy fuzzing software, cracking passwords, or spidering the internet. He's also the creator of the gitDigger project as well as staff of DEFCON's wireless village.

Oct 4, 201318 min

Interview with Vivek Ramachandran

Vivek Ramachandran is a world renowned security researcher and evangelist. His expertise includes computer and network security, exploit research, wireless security, computer forensics, embedded systems security, compliance and e-Governance. He is the founder of Security Tube and Pentester Academy .

Sep 26, 201353 min

Stories of the Week - Episode 346

Before the gang heads off for Derby Con, we still have the stories of the week. Paul, Greg and Patrick are here to talk about Shodan searches, Dropbox opening your docs, 10 things to never say during a presentation and a whole lot more!

Sep 26, 201340 min

DerbyCon Organizers and Stories - Episode 345

The last segment from episode 345 features Dave, Martin, Adrian and Nick, the DerbyCon organizers to talk about the upcoming third edition of their conference in Louisville. Find out how they planned it to be bigger and better this year! Plus, a couple stories of the week!

Sep 13, 201333 min

Tech Segment with Pete Finnigan - Episode 345

Pete Finnigan works as an independent Oracle security consultant for his own company PeteFinnigan.com Limited . Pete specializes in performing detailed Oracle security IT Health checks against Oracle databases using a detailed methodology developed by Pete from many years of experience in securing databases.

Sep 13, 201317 min

Interview with Rich Mogull - Episode 345

Rich has twenty years experience in information security, physical security, and risk management. He is the founder of Securosis and specializes in data security, application security, emerging security technologies, and security management.

Sep 13, 201352 min

Drunken Security News - Episode 344

Want to try to scam John Strand? That might not be the best of ideas. Burp got updated, Rsnake's "joke", opting out to watch porn, 5 Guys Burgers on security and maybe a new way to prevent CSRF.

Sep 9, 201340 min

Interview with Richard Stiennon

Richard Stiennon, security expert and industry analyst, is known for shaking up the industry and providing actionable guidance to vendors and end users. He relaunched the security blog ThreatChaos.com and is the founder of IT-Harvest.

Sep 9, 201348 min

Drunken Security News - Episode 343

You got Paul and Larry this week as they take you through all the fun that is hacking geolocators, Java 6, getting sudo on an OSX machine, and a great story from the pentesting field by Larry. Plus a whole lot more!

Sep 5, 201334 min

Enumerating a Domain using ADSI in PowerShell

Carlos Perez is also known as @DarkOperator, He spends his time reverse engineering, and practicing PowerShell Kung-Fu. Known by his motto "Shell is only the Beginning".

Sep 5, 201321 min

Interview with Ira Winkler - Episode 343

Ira Winkler, CISSP is President of Secure Mentem. Ira is one of the foremost experts in the human elements of cyber security and is known for the extensive espionage and social engineering simulations that he has conducted for Fortune 500 companies globally, and has been named a “Modern Day James Bond” by the media.

Sep 4, 201333 min

BruCon Matt - Episode 343

Matt is a long time volunteer of BruCon and is going to let us know all the great things in store for 2013.

Sep 4, 201315 min

Interview with Phil Young - Episode 342

Philip Young, aka Soldier of Fortran, is a mainframe phreak! His love of mainframes goes back to when he watched Tron, wide eyed, for the first time. Though it would be decades until he actually got his hands on one he was always interested in their strangeness. Phil has always been in to security since his days as a sysop and playing around on Datapac (the Telenet of Canada). Some people build toy trains, others model airplanes, but Phil's hobby is mainframe security.

Aug 28, 201336 min

Tech Segment with Zach Cutlip - Episode 342

Zach will be going over how he does research on exploiting embedded systems and his exploit development framework bowcaster. Zachary Cutlip is a security researcher with Tactical Network Solutions, in Columbia, MD. At TNS, Zach develops exploitation techniques targeting embedded systems and network infrastructure. Since 2003, Zach has worked either directly for or with the National Security Agency in various capacities. Before embracing a lifestyle of ripped jeans and untucked shirts, he spent six years in the US Air Force, parting ways at the rank of Captain. Zach holds an undergraduate degree from Texas A&M University and a master's degree from Johns Hopkins University.

Aug 28, 201331 min

Drunken Security News - Episode 342

From the Bradley Manning sentencing to DDOSing your former employer, the guys at PSW cover all the interesting stories of the week.

Aug 28, 201331 min

Drunken Security News - Episode 341

Trying to wake up sleeping babies through hacking the baby monitor. Fire in the studio. Male to male plugs. Updating your pooty...and firefox. Fun ways to log in to your Leap Motion controlled Windows box and the iLO authentication bypass. Plus more on this week's Drunken Security News!

Aug 16, 201339 min

Tech Segment with Allison Nixon - Episode 341

Denying Service to DDOS Protection Services

Aug 16, 201321 min

Interview with Whitfield Diffie - Episode 341

Dr. Diffie is a pioneer of public-key cryptography and was VP of Information Security and Cryptography at ICANN. He is author of Privacy on the Line: The Politics of Wiretapping and Encryption

Aug 16, 201350 min

Tech Segment: Threat Analytics with Ty Miller - Episode 340

Ty Miller is CEO and Founder of Threat Intelligence , has had many TV appearances, radio interviews, print newspaper and magazine articles, and regular online commentary & BlackHat Trainings. Ty Miller's experience not only covers penetration testing, it also expands into regulations like PCI, developing and running industry benchmark accreditations, performing forensic investigations, as well as creating and executing security training ranging from introductory security through to highly advanced security concepts and skillsets. Today he is here to do a tech segment on his product Threat Analytics.

Aug 14, 201323 min

Drunken Security News - Episode 340

All things Black Hat, DefCon. Making $15,000 to $20,000 per hour. Hijacking a Prius. Vulnerable printers. More SCADA hacking. Hacking toilets.

Aug 13, 20131h 6m

Tech Segment: Honeyports - Episode 340

If you've seen one of mine, or John Strand's, presentations on offensive countermeasures, you know about Honeyports. If you've taken our class or read our book, you've seen this too! Just to recap: If you tell your host to listen for connections on a port, and make certain the client is making a full TCP connection, you can "shun" or block the remote IP address. A Honeyport is a port that nothing should be listening on. When something, or someone, makes a connection to this port, you create and implement a local firewall rule on the host to block that IP address. Previously we had shell scripts and a Windows command to make this happen. I wanted to extend this functionality, but quickly ran into limitations. So, I decided to write a Python script to implement this on all 3 platforms.

Aug 13, 201313 min

Hack Naked TV Episode 59

In this episode we talk about pwnedlist and how many companies are compromised and don't even know it. We also talk about how one should not throw stones in glass houses.

Aug 7, 201311 min

Hack Naked TV Episode 57

In this episode we talk about Prism, M$, HIPAA and Panic!!! In the financial sector!! Links for this episode: http://tinyurl.com/HNTV-HIPAA-Costs http://tinyurl.com/HNTV-Financial-collapse http://tinyurl.com/HNTV-MS-NSA

Jul 19, 20138 min

OWASP Top 10 (2013) with Dave Wichers

The OWASP Top Ten is an awareness document for web application security, representing broad consensus about the most critical web application security risks as determined by the OWASP community. The OWASP Top 10 is one of the earliest and longest running OWASP projects, first published in 2003, and updates have been produced in 2004, 2007, 2010, and now 2013.

Jul 19, 201323 min

Interview with Troy Hunt - Episode 339

Troy is a Software architect and Microsoft MVP, you'll usually find him writing about security concepts and process improvement in software delivery on his blog. He also has a free e-book out "OWASP Top 10 for .NET developers"

Jul 19, 201338 min

Interview with Onapsis - Episode 338

Selena Proctor, Alex Horan and Mariano Nunez join us from Onapsis.

Jul 15, 201352 min

Interview with Schuyler Towne - Episode 338

Schuyler Towne is on a mission to recover as much information as possible about the lock-related patents that were lost to the patent office fire of 1836. His primary interest is in the history and the story of the creators of the lost locks, but his goal is to conduct all of the research in public, using Zotero, so everyone can follow along and those particularly inclined can even participate. That rough research will remain available indefinitely, but he will go on to curate and organize the work for publication on the website. Depending on what we recover we could potentially restore entire patents to the patent record, or 3D print working locks based on their drawings. We could solve a mystery, or rewrite history.

Jul 15, 201321 min

Interview with Kati Rodzon and Mike Murray

Kati Rodzon is the manager of Security Behavior Deisgn for MAD Security. Her last nine years have been spent studying psychology and ways to modify human behavior. From learning about the power of social pressure on groups, to how subtle changes in reinforcement can drastically change individual behavior, Kati has spent the better part of a decade learning how humans work and now applies that to security awareness. Mike Murray has spent more than a decade helping companies to protect their information by understanding their vulnerability posture from the perspective of an attacker. Mike co-founded MAD Security, where he leads engagements to help corporate and government customers understand and protect their security organization.

Jul 3, 201336 min

Interview with Matt Bergin - Episode 337

Matt "Level" Bergin, age twenty four, works for CORE Security as a Senior Security Consultant where his day job consists of discovering, exploiting, and mitigating vulnerabilities in their client’s network environments. Before joining CORE, Matt became well recognized in the industry through his activities in the US Cyber Challenge and publications of vulnerability research such as his discovery of the Microsoft IIS 7.5 FTP Heap Overflow.

Jul 3, 201328 min

Hack naked TV 56ish

In this episode we talk about the importance of being able to detect insider threats.

Jun 27, 20138 min

Tech Segment: Bro IDS

Bro is a passive, open-source network traffic analyzer and was originally developed by Vern Paxson, who continues to lead the project now jointly with a core team of researchers and developers at the International Computer Science Institute in Berkeley, CA; and the National Center for Supercomputing Applications in Urbana-Champaign, IL. Liam Randall and Seth Hall are on to give us additional insight into how Bro IDS is used.

Jun 21, 201337 min

Interview with Bruce Potter and JP Bourget - Episode 335

We have JP Bourget and Bruce Potter on the show to announce their ball busting ride across the USA, CycleOverride . CycleOverride is planning a series of rides over the coming years that revolve around information security and fundraising for organizations important to the infosec community. Support the EFF in support of Cycle Override

Jun 18, 201314 min