Search a title or topic

Over 20 million podcasts, powered by 

Player FM logo
show episodes
 
Artwork

1
The Host Unknown Podcast

Host Unknown, Thom Langford, Andrew Agnes, Javvad Malik

icon
Unsubscribe
icon
Unsubscribe
Monthly+
 
Host Unknown is the unholy alliance of the old, the new and the rockstars of the infosec industry in an internet-based show that tries to care about issues in our industry. It regularly fails. With presenters that have an inflated opinion of their own worth and a production team with a pathological dislike of them (or “meat puppets” as it often refers to them), it is with a combination of luck and utter lack of good judgement that a show is ever produced and released. Host Unknown is availab ...
  continue reading
 
Artwork

1
7 Minute Security

Brian Johnson

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
7 Minute Security is a weekly information security podcast focusing on penetration testing, blue teaming and building a career in security. The podcast also features in-depth interviews with industry leaders who share their insights, tools, tips and tricks for being a successful security engineer.
  continue reading
 
Artwork
 
I started out wrapping burritos at Chipotle, dreaming of something bigger but not quite sure where to go. Over time, that drive to learn and grow led me into cybersecurity—an industry where the stakes are high and the stories are endlessly fascinating. K.O.’s Launchpad is my way of opening the door for anyone curious about how to break in, level up, and find purpose in a field that’s shaping our digital future. In every episode, we’ll chat with experts, share practical strategies, and explor ...
  continue reading
 
Artwork

1
The Hacker's Cache

Kyser Clark - Cybersecurity

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
The show that decrypts the secrets of offensive cybersecurity, one byte at a time. Every week I invite you into the world of ethical hacking by interviewing leading offensive security practitioners. If you are a penetration tester, bug bounty hunter, red teamer, or blue teamer who wants to better understand the modern hacker mindset, whether you are new or experienced, this show is for you.
  continue reading
 
Artwork

1
CYBER

VICE

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
Hacking. Hackers. Disinformation campaigns. Encryption. The Cyber. This stuff gets complicated really fast, but Motherboard spends its time embedded in the infosec world so you don't have to. Host Matthew Gault talks every week to Motherboard reporters about the stories they're breaking and to the industry's most famous hackers and researchers about the biggest news in cybersecurity. Hosted on Acast. See acast.com/privacy for more information.
  continue reading
 
Artwork

1
Security Noise

TrustedSec

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
In the security industry, it's easy to get overwhelmed by the constant barrage of information and buzzy trends. On Security Noise, we help you sort through the noise and identify the information that truly matters. Listen to hear from practitioners in the field who are using the latest tools and methodologies to stay ahead. Whether you're a seasoned security pro or an industry newcomer, our podcast has something for anyone in the business of making the world secure. Presented by TrustedSec, ...
  continue reading
 
Artwork

1
Cyber Security Interviews

Douglas A. Brush | Weekly Interviews w/ InfoSec Pros

icon
Unsubscribe
icon
Unsubscribe
Monthly
 
There is “no one way” to start and stay in the field of cyber security. Whether you are involved from the military, law enforcement, consulting, or IT services, it doesn’t matter. I have had countless discussions for years with other professionals online, at conferences, or over drinks, which have changed the way I think about cyber security. That is where this podcast comes in. What if I can capture those moments and frank discussions? I want to share the stories from other cyber security l ...
  continue reading
 
Loading …
show series
 
Today’s tale of pentest pwnage is another great one! We talk about: The SPNless RBCD attack (covered in more detail in this episode) Importance of looking at all “branches” of outbound permissions that your user has in BloodHound This devilishly effective MSOL-account-stealing PowerShell script (obfuscate it first!) A personal update on my frustrat…
  continue reading
 
He stayed up for 24 hours straight to pass one of OffSec’s toughest exams. In this episode of The Hacker’s Cache, I sit down with Pratham Shah, a 21-year-old cybersecurity consultant who holds OSCE3, OSCP+, OSWA, and more. We break down his insane study grind, how OSWA pushed him harder than OSCP, and why he thinks passion matters more than paychec…
  continue reading
 
Today we’re excited to release ProxmoxRox – a repo of info and scripts to help you quickly spin up Ubuntu and Windows VMs. Also, some important news items: 7MinSec.club in-person meeting is happening Wednesday, May 14! More details here. We did our second Tuesday TOOLSday this week and showed you some local privesc techniques when you have local ad…
  continue reading
 
In this episode of The Hacker’s Cache, I sit down with Noah Pack, an aerospace pentester with a ridiculous cert stack and an unconventional mindset. We talk about hacking obscure systems with no public tools or documentation, transitioning from SOC analyst to pentester, and why reading the manual might be your secret weapon. If you’ve ever wondered…
  continue reading
 
Let's Encrypt now offers certificates with 6-day lifetimes but what does that mean for the commercial TLS trust anchor world? On this episode of Security Noise, Geoff and Skyler are joined by Principal Security Consultant Justin Bollinger to discuss new options for certificate lifetimes and the implications of the new maximum ages, good and bad. Ab…
  continue reading
 
Today’s a fun tale of pentest pwnage where we leveraged a WinRM service ticket in combination with the shadow credentials attack, then connected to an important system using evil-winrm and make our getaway with some privileged Kerberos TGTs! I also share an (intentionally) vague story about a personal struggle I could use your thoughts/prayers/vibe…
  continue reading
 
This week in InfoSec (10:26) With content liberated from the “today in infosec” twitter account and further afield 1st April 1998: Hackers changed the MIT home page to read "Disney to Acquire MIT for $6.9 Billion". https://x.com/todayininfosec/status/1907094503552336134 1st April 2004: The now ubiquitous Gmail service is launched as an invitation-o…
  continue reading
 
In this episode of The Hacker’s Cache, Matthew Younker (aka Zumi Yumi) shares the raw truth about what it really took to break into offensive security, working full time, going to college, and grinding for OSCP with almost zero rest. He opens up about the unhealthy sacrifices he made, why OSWA was harder than OSCP, and how his journey from Army haz…
  continue reading
 
In this episode, I sit down with Mike McPhee, a principal solutions engineer at Cisco, to explore his expansive career in cybersecurity. We delve into his early experiences in the US Navy, his journey through multiple degrees and certifications, including the prestigious GIAC Security Expert, and the lessons he learned from challenging roles in the…
  continue reading
 
Hello! This week Joe “The Machine” Skeen and I kicked off a series all about pentesting GOAD (Game of Active Directory). In part one we covered: Checking for null session enumeration on domain controllers Enumerating systems with and without SMB signing Scraping AD user account descriptions Capturing hashes using Responder Cracking hashes with Hash…
  continue reading
 
In this episode, Channa Rajaratne joins me to unpack one of the most common questions in cybersecurity: should you go after certifications, a college degree, or a bootcamp? We break down the pros and cons of each, share personal experiences, and talk about which path actually helped us get hired. Channa also shares his take on underrated skills lik…
  continue reading
 
In this episode of Security Noise, Geoff and Skyler talk with IR Practice Lead Carlos Perez and Security Consultant Zach Bevilacqua about the world of security operations. They discuss current trends, the role of AI, challenges with traditional SIEM tools, and the value of proper logging and monitoring configurations. How important are proactive me…
  continue reading
 
Hi friends, today I’m kicking off a series talking about the good/bad/ugly of hosting security services. Today I talk specifically about transfer.zip. By self-hosting your own instance of transfer.zip, you can send and receive HUGE files that are end-to-end encrypted using WebRTC. Sweet! I also supplemented today’s episode with a short live video o…
  continue reading
 
What separates a good pentester from a great one? It’s not just about popping shells or passing certs. In this solo episode, I break down the real-world skills that actually matter. Technical, non-technical, and everything in between. I share hard lessons from the field, my thoughts on being well-rounded vs. specialized, and why communication, clie…
  continue reading
 
In this episode of K.O.'s Launchpad: An Infosec Podcast, we dive into the inspiring journey of Simeon Kakpovi, the founder of the KC7 Foundation and a senior threat intelligence analyst at Microsoft. We discuss his transition from a network defender at Lockheed Martin to shaping a more inclusive future in cybersecurity through his nonprofit organiz…
  continue reading
 
Hola friends! Today’s tale of pentest pwnage talks about abusing Exchange and the Azure ADSync account! Links to the discussed things: adconnectdump – for all your ADSync account dumping needs! Adam Chester PowerShell script to dump MSOL service account dacledit.py (part of Impacket) to give myself full write privileges on the MSOL sync account: da…
  continue reading
 
In this episode of The Hacker’s Cache, Kyser Clark and Zach Winchester talk about breaking into cybersecurity without a college degree and why it’s not the dealbreaker people think it is. You’ll hear a real-world story of going from firewall configs to full-time pentesting with just an OSCP and hands-on experience. We also get into hardware hacking…
  continue reading
 
In this episode of K.O.'s Launchpad, we explore the extraordinary journey of Jibby Saetang, who transitioned from repairing watches to becoming a security researcher on Microsoft's GHOST team. Jibby shares his path from working in a family jewelry business to joining the cybersecurity industry, with no formal IT background. We delve into his experi…
  continue reading
 
How has email security evolved over the years? What challenges do organizations face in protecting against sophisticated phishing attacks? Find out on this episode of Security Noise! Business Email Compromise (BEC) attacks are becoming increasingly common and sophisticated. In this episode, Geoff and Skyler speak with Incident Response Security Con…
  continue reading
 
Hey friends, our good buddy Joe “The Machine” Skeen and I are back this week with part 2 (check out part 1!) tackling GOAD SCCM again! Spoiler alert: this time we get DA! YAY! Definitely check out these handy SCCM resources to help you – whether it be in the lab or IRL (in real life): GOAD SCCM walkthrough MisconfigurationManager – tremendous resou…
  continue reading
 
Burnout sucks, but what if it's actually a sign of growth? In this episode of The Hacker’s Cache, I break down why burnout isn’t always the enemy and how pushing yourself to the limit can actually make you better. Just like lifting weights to failure builds muscle, hitting burnout and recovering makes you mentally stronger. I’ll share my own experi…
  continue reading
 
Getting laid off can feel like the end of the road, but what if it’s actually the beginning of something bigger? In this episode of The Hacker’s Cache, Justin Mahon shares his journey from military IT to offensive security, including how he bounced back after a cybersecurity layoff and landed in a better position than before. We break down the real…
  continue reading
 
In this episode, Geoff and Skyler talk with TrustedSec Security Consultants Whitney Phillips and Justin Bollinger about their recent presentations and experiences at CactusCon in Mesa, Arizona. Justin delves deep into the complexities surrounding the Common Vulnerabilities and Exposures (CVE) identification process and bug bounty programs, highligh…
  continue reading
 
In this episode of The Hacker’s Cache, I sit down with Constantinos Kaplanis, a senior penetration tester who took an unconventional path into cybersecurity. With no prior IT experience, he grinded his way into the field—applying to 500 jobs, enduring countless rejections, and proving his skills through sheer persistence. One of his biggest accompl…
  continue reading
 
This week in InfoSec (11:22) With content liberated from the “today in infosec” twitter account and further afield 27th February 2002: Timothy Allen Lloyd was sentenced to 41 months in prison for activating a logic bomb at Omega Engineering, 20 days after being fired as a network administrator. https://x.com/todayininfosec/status/189525558888147402…
  continue reading
 
In today’s episode I talk about what I’m working on this week, including: Playing with Sliver C2 and pairing it with ShellcodePack Talking about Netexecer, my upcoming tool that helps automate some of the early/boring stuff in an internal pentest A gotcha to watch out for if utilizing netexec’s MSSQL upload/download functionality…
  continue reading
 
Many aspiring penetration testers believe that earning the OSCP is the ultimate proof of their skills—but what happens when they step into a real-world engagement? In this episode of The Hacker’s Cache, Tyler Ramsbey joins me to break down the hard truth about OSCP, the gaps it leaves in real-world pentesting, and why experience always outweighs ce…
  continue reading
 
It's time to talk about TikTok! On this episode of Security Noise, Geoff and Skyler speak with Senior Security Consultants Kelsey Segrue and Travis Kaun about algorithms, data security, and how we got to where we are today with the popular Chinese-owned app. They also discuss other Chinese technologies and devices that you may want to keep an eye o…
  continue reading
 
If you want to be an expert in cybersecurity, coding isn’t optional—it’s essential. In this Q&A episode of The Hacker’s Cache, I break down why learning to code separates the entry-level professionals from the true experts and how AI is shifting the skills needed in offensive security. I also dive into the different career paths available after lan…
  continue reading
 
Hi friends, today we're talking about pentesting potatoes (not really, but this episode is sort of a homage to episode 333 where I went to Boise to do a controls assessment and ended up doing an impromptu physical pentest and social engineer exercise). I talk about what a blast I'm having hunting APTs in XINTRA LABS, and two cool tools I'm building…
  continue reading
 
Kyser Clark sits down with senior penetration tester Spencer Alessi to discuss a skill that separates top-tier pentesters from the rest—client communication. While technical prowess is essential, Spencer shares how clear, proactive communication can make or break a pentest engagement, impact client trust, and even determine career growth. They also…
  continue reading
 
Today we continue our journey from last week where we spun up a Hetzner cloud server and Ludus.cloud SCCM pentesting range! Topics include: Building a Proxmox Backup Server (this YouTube video was super helpful) Bridging a second WAN IP to the Hetzner/Ludus server Wrestling with the Hetzner (10-rule limit!) software firewall When attacking SCCM – y…
  continue reading
 
Are cybersecurity bootcamps worth the hefty price tag, or are they just another overhyped shortcut to nowhere? In this episode of The Hacker’s Cache, I sit down with Keith Coleman, a seasoned cybersecurity professional with experience in pentesting, security engineering, DevSecOps, and more. We break down the true value of bootcamps, why many gradu…
  continue reading
 
In this episode of Security Noise, Geoff and Skyler are joined by two TrustedSec experts, Security Consultant Edwin David and Principal Security Consultant Justin Bollinger, to talk about the evolution of authentication and what it looks like in 2025. We discuss passwordless authentication, multi-factor authentication (MFA), and the implications of…
  continue reading
 
I had an absolute ball this week spinning up my first Hetzner server, though it was not without some drama (firewall config frustrations and failing hard drives). Once I got past that, though, I got my first taste of the amazing world of Ludus.cloud, where I spun up a vulnerable Microsoft SCCM lab and have started to pwn it. Can’t say enough good t…
  continue reading
 
Kyser Clark is joined by Paul Nieto, a seasoned penetration tester with over 22 years of experience spanning physical and cybersecurity. Paul shares his journey from physical security to offensive security, detailing how his curiosity and drive for challenges led to a successful career pivot. They discuss the importance of networking, the debate be…
  continue reading
 
Today I’m excited about some tools/automation I’ve been working on to help shore up the 7MinSec security program, including: Using Retype as a document repository Leveraging the Nessus API to automate the downloading/correlating of scan data Monitoring markdown files for “last update” changes using a basic Python script…
  continue reading
 
Kyser Clark dives into the growing role of AI in the tech industry and its potential to replace mid-level professionals. Inspired by comments from tech leaders like Mark Zuckerberg, we explore why companies are investing heavily in AI, how it could reshape the middle-class job market, and what it means for cybersecurity professionals. Kyser shares …
  continue reading
 
In this episode, Geoff and Skyler are joined by TrustedSec's Force Cloud Security Practice Lead @nyxgeek to talk about his findings after 3 years of user enumeration in Azure! He also dives into techniques and the implications of "presence data" in Microsoft Teams. We get a preview of his conference talks at (the now past) Shmoocon and HackCon, whi…
  continue reading
 
David Taxer, a cybersecurity expert with over 12 years of experience, shares the incredible story of uncovering a $200 million fraud ring disguised under a major corporation. Learn how his unique background in SEO and intelligence helped him expose insider threats and fraudulent schemes, as well as the challenges he faced as a whistleblower. This e…
  continue reading
 
Hello friends! Today we’re talking about a neat and quick-to-setup documentation service called Retype. In a nutshell, you can get Retype installed on GitHub pages in about 5 minutes and be writing beautiful markdown pages (with built-in search) immediately. I still absolutely love Docusaurus, but I think Retype definitely gives it a run for its mo…
  continue reading
 
Kyser Clark interviews Patrick Gorman, also known as InfoSec Pat, a seasoned cybersecurity professional with over 23 years of experience. They discuss the importance of certifications in the cybersecurity field, the challenges of retaining knowledge, and the journey of creating educational content on YouTube. Pat shares insights on his motivations …
  continue reading
 
Happy new year friends! Today we talk about business/personal resolutions, including: New year’s resolution on the 7MinSec biz side to have a better work/life balance New training offering in the works Considering Substack as a communications platform A mental health booster that I came across mostly by accident…
  continue reading
 
In this episode, Kyser Clark discusses the competitive landscape of cybersecurity, emphasizing the importance of culture fit, the reality of job openings, and how to stand out in a crowded field. He highlights the necessity of hard work, continuous learning, and the value of soft skills in securing a position. Additionally, he addresses the misconc…
  continue reading
 
Today we’re doing a milkshake of several topics: wireless pentest pwnage, automating the boring pentest stuff with cursor.ai, and some closing business thoughts at 7MinSec celebrates its 7th year as a security consultancy. Links discussed today: AWUS036ACH wifi card (not my favorite anymore) Panda PAU09 N600 (love this one!) The very important Gith…
  continue reading
 
Loading …
Listen to this show while you explore
Play