Gesamtlänge aller Episoden: 10 days 22 hours 50 minutes
Hey friends, today I share my experience working with ChatGPT, , and to help me pentest Active Directory, as well as a machine called . Will AI replace pentesters as we know them today? In my humble opinion: not quite...
Today we talk about our first experience working through the responsible disclosure process after finding vulnerabilities in a security product. We cannot share a whole lot of details as of right now, but wanted to give you some insight into the...
Today our good buddy and I keep trying to hack the machine based on the movie (see part and and ). In today's final chapter, Paul and I: Find Eric's secret SSH back door Locate...
Today we had a blast talking with Robert McCurdy about ! JAMBOREE allows you to quickly spin up a portable Git/Python/Java environment and much more! From a pentesting POV, you can whip up an Android pentesting environment, BloodHound/SharpHound...
After about a year break (, we're back with an updated episode of How to Succeed in Business Without Really Crying. We cover: Why we're not planning on selling the business any time soon Using ProtonVPN Our pre first impressions of a...
Today we're joined by Matt Warner of Blumira (remember him from episodes and and ?) to talk about choosing the right XDR strategy! There's a lot to unpack here. Are EDR, MDR and XDR related? Can you get them all from one...
Today we're talking about how you can use to keep your home PC and/or pentest dropbox automatically updated with the latest/greatest patches!
Hey friends, today my and I kept trying to hack the machine based on the movie (see part and ). In our journey we learned some good stuff: Port knocking is awesome using utilities like : ...
Today we're talking about 7 steps you can take to (hopefully) reclaim a hacked Facebook account. The key steps are: Ask Facebook for help (good luck with that) Put out an SOS on your socials Flag down the FBI Call the cops! Grumble to your attorney...
Today we talk about an awesome path to internal network pentest pwnage using from a domain controller, a tool called , and a boatload of cloud-cracking power on the cheap from . Here's my chicken scratch notes for how to take the...