Sven Morgenroth is a security researcher at Netsparker. He found filter bypasses for Chrome’s XSS auditor and several web application firewalls. He comes on the show to discuss PHP Type Juggling Vulnerabilities. To learn more about Netsparker, visit: https://securityweekly.com/netsparker Full Show Notes Subscribe to YouTube Channel
Our very own Larry Pesce delivers the Technical Segment this week on Spoofing GPS with a hackRF. Full Show Notes Subscribe to YouTube Channel Hosts
An introduction to FL2K: Software Defined Radio is all the rage for detecting unknown signals and transmitters. We’ll show you how to set up and use a surreptitious transmitter to start your journey. Full Show Notes Subscribe to YouTube Channel
Chris ‘Lopi’ Spehn is a consultant on Mandiant’s red team. Chris was formerly a penetration tester for major credit card companies and retailers. Chris is also the founder of Illinois State University’s first information security club, participated in CCDC for three years, and received first place in National Cyber League 2012. Full Show Notes Subscribe […]
John is a Senior Product Manager at DFLabs, where he performs a wide variety of tasks from product management to content development and partner management. John Moran talks about DFLabs Incman SOAR. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!
Ever wonder how to get started pen testing Android Apps? This tech segment will demonstrate a few basic techniques and tools to give you a taste of mobile app assessments with the Android platform. Full Show Notes Subscribe to YouTube Channel
Jason Wood delivers this technical segment on NMAP. Everyone loves using Nmap and the Nmap Scripting Engine. We don’t always write NSE scripts though. Writing scripts for can be a bit intimidating at first, but they aren’t too bad to get started on. In this tech segment, we will talk a bit about LUA, writing […]
IPFIX stands for Internet Protocol Flow Information Export. It was created due to a need for common, universal standard of export for Internet Protocol flow information from routers, probes, and other devices that are used by meditation systems, accounting/billing systems, and network management systems to facilitate services such as measurement, accounting, and billing. Full Show […]
Keith will be talking through some of the tools, techniques, and procedures he uses to perform recon, identify targets of interest, and report findings faster and easier. Full Show Notes Subscribe to YouTube Channel
John gives a Technical Segment this week entitled “Building A Purple Team”. He talks about different MITRE Tools. Full Show NotesVisit http://secweekly2.wpengine.com/esw for all the latest episodes!