Ever wonder how to get started pen testing Android Apps? This tech segment will demonstrate a few basic techniques and tools to give you a taste of mobile app assessments with the Android platform. Full Show Notes Subscribe to YouTube Channel
Jason Wood delivers this technical segment on NMAP. Everyone loves using Nmap and the Nmap Scripting Engine. We don’t always write NSE scripts though. Writing scripts for can be a bit intimidating at first, but they aren’t too bad to get started on. In this tech segment, we will talk a bit about LUA, writing […]
IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show […]
Keith will be talking through some of the tools, techniques, and procedures he uses to perform recon, identify targets of interest, and report findings faster and easier. Full Show Notes Subscribe to YouTube Channel
John gives a Technical Segment this week entitled “Building A Purple Team”. He talks about different MITRE Tools. Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!
Paul delivers the Technical Segment this week entitled “Docker Security Incident: Lessons Learned”! Blog Post Full Show Notes Subscribe to YouTube Channel
This week in the Topic Segment, our very own Jeff Man gives us a recap on the 2018 RSA Conference! He discusses HackerOne CEO talking Bug Bounty programs, DevSecOps day at RSA demonstrates how the thinking around secure software has evolved, if it’s time to kill the Pen Test, and more! Full Show Notes Subscribe […]
Eyal is the Former Head of Israeli Air Force CERT & Forensics Team & currently the Senior Security Researcher at Javelin Networks. Eyal will describe and explain how AD Domain Trusts and Forest Trusts works, and how they can leverage by attackers to hop from one domain to another, after the compromise of the first […]
In the bad old days we used to exploit LSASS memory to dump hashed credentials from memory. When dealing with a domain controller, and a large environment this is dangerous. This segment will address a safer way to extract hashed credentials from the environment for subsequent download, and cracking. Full Show Notes Subscribe to YouTube […]
Security Weekly Productions 86, Doug White, Enterprise Security Weekly, paul asadoorian, Secure Digital Life, Security Threats from Virtual Machines, six security threats to virtual machines, tech segment, Topic
Doug White, host of Secure Digital Life, comes on the show to talk about five, no six security threats from virtual machines! Full Show NotesVisit http://securityweekly.com/esw for all the latest episodes!