Logo

    white hat

    Explore " white hat" with insightful episodes like "Episode 57: What About...? Cyber Security", "Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington", "Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington", "Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More! • Ben Sadeghipour (NahamSec) & Julian Wood" and "Episode 3:10: 1337 H4xx0r" from podcasts like ""Chewin' The Fat", "ITSPmagazine", "Tech Done Different", "GOTO - Today, Tomorrow and the Future" and "Linux User Space"" and more!

    Episodes (12)

    Episode 57: What About...? Cyber Security

    Episode 57: What About...? Cyber Security

    In this Episode, Big Jay sits down with a hand-picked panel of experts in the field of Cyber Security to discuss how to stay safe in this Digital Age.  How can you protect yourself from malware, being hacked, having your identity stolen and how can hackers use AI to do it?
    The discussions couldn't be contained in just one Episode, so Chewin' The Fat is introducing a NEW Podcast called WHITE HAT GUYS to be starting soon!
    Be sure to check out our website (CTFpresents.info) for more information.

    Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington

    Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington

    Guest: Ethan Dietrich, Founder and CEO of SIXGEN [@SixGenInc]

    On LinkedIn | https://www.linkedin.com/in/ethan-dietrich-86343b30/

    On YouTube | https://www.youtube.com/channel/UC-aLxtVynWxNWwfyKzK42VA

    ________________________________

    Hosts:

    Ben Schmerler

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ben-schmerler

    Ted Harrington

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

    ________________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ________________________________

    Episode Description

    This week’s guest is Ethan Dietrich, SIXGEN’s CEO. He joins TDD to discuss what security looks like from an attacker's point of view and how his team uses the information to level the playing field.

    You’ll Learn:

    - What a day looks like when thinking and acting like the bad guy

    - How attackers stay anonymous

    - How can we level the playing field

    - What's the mindset companies need to have to protect themselves

    - How AI could change the cyber security industry

    ________________________________

    For more podcast stories from Tech Done Different With Ted Harrington and Ben Schmerler: https://www.itspmagazine.com/tech-done-different-podcast

    Watch the webcast version on-demand on YouTube:

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwi

    ITSPMagazine YouTube Channel:

    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington

    Thinking Like a Bad Guy | A Conversation With Ethan Dietrich | Tech Done Different Podcast With Ben Schmerler and Ted Harrington

    Guest: Ethan Dietrich, Founder and CEO of SIXGEN [@SixGenInc]

    On LinkedIn | https://www.linkedin.com/in/ethan-dietrich-86343b30/

    On YouTube | https://www.youtube.com/channel/UC-aLxtVynWxNWwfyKzK42VA

    ________________________________

    Hosts:

    Ben Schmerler

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ben-schmerler

    Ted Harrington

    On ITSPmagazine  👉 https://www.itspmagazine.com/itspmagazine-podcast-radio-hosts/ted-harrington

    ________________________________

    This Episode’s Sponsors

     

    Are you interested in sponsoring an ITSPmagazine Channel?
    👉 https://www.itspmagazine.com/sponsor-the-itspmagazine-podcast-network

    ________________________________

    Episode Description

    This week’s guest is Ethan Dietrich, SIXGEN’s CEO. He joins TDD to discuss what security looks like from an attacker's point of view and how his team uses the information to level the playing field.

    You’ll Learn:

    - What a day looks like when thinking and acting like the bad guy

    - How attackers stay anonymous

    - How can we level the playing field

    - What's the mindset companies need to have to protect themselves

    - How AI could change the cyber security industry

    ________________________________

    For more podcast stories from Tech Done Different With Ted Harrington and Ben Schmerler: https://www.itspmagazine.com/tech-done-different-podcast

    Watch the webcast version on-demand on YouTube:

    📺 https://www.youtube.com/playlist?list=PLnYu0psdcllTQ79pdnWWvCuhWjyw9WGwi

    ITSPMagazine YouTube Channel:

    📺 https://www.youtube.com/@itspmagazine

    Be sure to share and subscribe!

    Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More! • Ben Sadeghipour (NahamSec) & Julian Wood

    Hack Like a Pro: Bug Bounties, Web Vulnerabilities & More! • Ben Sadeghipour (NahamSec) & Julian Wood

    This interview was recorded for GOTO Unscripted at GOTO Copenhagen.
    gotopia.tech

    Read the full transcription of this interview here

    Ben Sadeghipour - VP of Research at Hadrian Security
    Julian Wood - Developer Advocate at AWS @julian_wood 

    RESOURCES
    tryhackme.com
    hackthebox.com
    pentesterlab.com
    ctfchallenge.com
    bugbountyhunter.com
    portswigger.net/burp

    Ben
    nahamsec.com
    @nahamsec
    twitch.tv/nahamsec
    instagram.com/nahamsec

    Julian
    @julian_wood
    wooditwork.com
    linkedin.com/in/julianrwood

    DESCRIPTION
    Join us for an engaging conversation between Ben Sadegiphour, VP of Research at Hadrian Security, and Julian Wood, Developer Advocate at AWS. In this conversation, we will explore a range of captivating topics, such as: Bug bounties, ethical hacking, Skills, Resources, tips and much more.

    Whether you're an aspiring ethical hacker or simply interested in the fascinating world of cybersecurity, this video is packed with knowledge and practical advice. Get ready to hack like a pro and join us on this exciting journey!

    RECOMMENDED BOOKS
    Peter Yaworski • Real-World Bug Hunting
    Vickie Li • Bug Bounty Bootcam
    Carlos A. Lozano & Shahmeer Amir • Bug Bounty Hunting Essential
    Sanjib Sinha • Bug Bounty Hunting for Web Security
    Jim Manico & August Detlefsen • Iron-Clad Java
    Liz Rice • Container Security
    Aaron Parecki • OAuth 2.0 Simplified
    Aaron Parecki • OAuth 2.0 Servers
    Erdal Ozkaya • Cybersecurity: The Beginner's Guide

    Twitter
    Instagram
    LinkedIn
    Facebook

    Looking for a unique learning experience?
    Attend the next GOTO conference near you! Get your ticket: gotopia.tech

    SUBSCRIBE TO OUR YOUTUBE CHANNEL - new videos posted daily!

    Episode 3:10: 1337 H4xx0r

    Episode 3:10: 1337 H4xx0r
    Coming up in this episode 1. Releasing it when it's ready 2. Exploitation Remotely 3. Exploitation Locally 4. Name Changes and Mergers 5. And Kali as we see it today The Video Version https://youtu.be/_ITBw2c3XaQ 0:00 Cold Open 1:04 Releasing When It's Ready 12:16 WHoppix vs. Auditor 14:40 WHAX, a Merger and Backtrack 17:50 Backtrack 4, 5 and Kali 23:09 Kali 2 Rolls Right Along 28:30 2020 to the Present 34:51 Kali as a Daily Driver? 1:03:25 Next Time: A Few Things Banter Fedora 37 is still in the works (https://fedoramagazine.org/fedora-linux-37-update/) Elementary 7 is still on the way too (https://blog.elementary.io/updates-for-october-2022/) Announcements Give us a sub on YouTube (https://linuxuserspace.show/youtube) You can watch us live on Twitch (https://linuxuserspace.show/twitch) the day after an episode drops. If you like what we're doing here, make sure to send us a buck over at https://patreon.com/linuxuserspace Kali Linux the History remote-exploit.org (https://web.archive.org/web/20011103174848/http://www.remote-exploit.org/) mutsonline (https://web.archive.org/web/20041204031803/http://www.whoppix.net/muts.html) whitehat.co.il - "This site (https://web.archive.org/web/20040408014912/http://whitehat.co.il/news.php) aims to create a repository of tools and information for Penetration testers and ethical hackers." Max Moser releases (https://web.archive.org/web/20040602170909/http://www.remote-exploit.org/) from his company's website, moser-informatik.ch (https://web.archive.org/web/20040609013958/http://www.moser-informatik.ch/?page=products⟨=eng) Whoppix based on Knoppix is released (https://web.archive.org/web/20041204023530/http://www.whoppix.net/index.html) with thanks from muts (https://web.archive.org/web/20041204035804/http://www.whoppix.net/thanks.html) muts announces (https://web.archive.org/web/20050709141020/http://www.whoppix.net/muts.html) that Whoppix has evolved into a new project - WHAX Max Moser's Auditor Security Collection had structure and stability (http://www.remote-exploit.org/articles/backtrack/) The merger of WHAX and Auditor Security Collection was put to the community (https://web.archive.org/web/20060108153041/http://forum.remote-exploit.org/viewtopic.php?p=5488#5488) The two projects finished the merger and became Backtrack (https://web.archive.org/web/20100114211335/http://www.backtrack-linux.org/) and were based on Slax (https://web.archive.org/web/20061013072357/http://www.remote-exploit.org/index.php/BackTrack). Offensive-Security.org was born (https://web.archive.org/web/20061027172140/http://www.offensive-security.com/about.html) and is the company backing Backtrack. Essentially a spinoff (https://web.archive.org/web/20061101034051/http://www.offensive-security.com/faq.html) of Moser's remote-exploit.org Backtrack 2 is released (https://web.archive.org/web/20070315153750/http://forums.remote-exploit.org/showthread.php?t=5681) Backtrack 3 is released (https://web.archive.org/web/20090529075045/http://www.remote-exploit.org/backtrack_devlog.html) Backtrack 4 was released (https://web.archive.org/web/20100114220541/http://www.backtrack-linux.org/backtrack/backtrack4-release/) Backtrack 5 dropped the Slax base and is now based on Ubuntu (https://web.archive.org/web/20110515012740/http://www.backtrack-linux.org:80/backtrack/backtrack-5-release/) Backtrack 5 R3 was released (https://web.archive.org/web/20120816161818/http://www.backtrack-linux.org/backtrack/backtrack-5-r3-released/) and was the last release of Backtrack ever. The Kali Teaser (https://web.archive.org/web/20130401012801/http://www.backtrack-linux.org/backtrack/kali-a-teaser-into-the-future/) Kali 1.0 (https://www.kali.org/blog/kali-linux-1-0-0-release/) Bleeding Edge Kali (https://www.kali.org/blog/bleeding-edge-kali-repositories/) Using the Linux Deploy app in Android, Kali could be installed (https://www.kali.org/blog/kali-linux-android-linux-deploy/) Kali gets a self destruct button (https://www.kali.org/blog/kali-linux-1-0-6-release/) Kali soars among the cloud. Amazon's cloud, anyway. (https://www.kali.org/blog/kali-linux-amazon-ec2-ami/) Metapackages are introduced (https://www.kali.org/blog/kali-linux-metapackages/) EFI boot capabilities are added (https://www.kali.org/blog/kali-linux-1-0-8-release/) Kali NetHunter was released (https://www.kali.org/blog/kali-linux-1-0-9a-release/) Official Docker images (https://www.kali.org/blog/official-kali-linux-docker-images/) Kali gets another rebase (https://www.kali.org/blog/kali-linux-2-0-release/) Windows Subsystem for Linux (https://www.kali.org/blog/kali-on-the-windows-subsystem-for-linux/) Wireguard VPN (https://www.kali.org/blog/wireguard-on-kali/) support is official Support for Vagrant (https://www.kali.org/blog/announcing-kali-for-vagrant/) Raspberry Pi 4 support (https://www.kali.org/blog/raspberry-pi-4-and-kali/) Revamp of the metapackages (https://www.kali.org/blog/major-metapackage-makeover/) Running Kali as non-root user (https://www.kali.org/blog/kali-default-non-root-user/) Kali Linux is spotted in the TV show Mr. Robot (https://www.kali.org/blog/mr-robot-arg-society/) kids.kali.org (https://web.archive.org/web/20210402010342/https://kids.kali.org/) was launched! Yes, it was for April fools. Unkaputtbar (https://www.kali.org/blog/unkaputtbar/) 2022.2 (https://www.kali.org/blog/kali-linux-2022-2-release/) brought Hollywood-Activate 2022.3 (https://www.kali.org/blog/kali-linux-2022-3-release/) is the latest release at the time of the recording More Announcements Want to have a topic covered or have some feedback? - send us an email, contact@linuxuserspace.show Kali Linux Links Kali Linux Web Page (https://www.kali.org/) Kali Linux Docs (https://www.kali.org/docs/) Kali Tools Docs (https://www.kali.org/tools/) Kali Forums (https://forums.kali.org/) Kali Discord (https://discord.kali.org/) Kali Blog (https://www.kali.org/blog/) About Kali Linux page (https://www.kali.org/features/) Kali for Arm (https://arm.kali.org/) Kali NetHunter (https://nethunter.kali.org/) Housekeeping Catch these and other great topics as they unfold on our Subreddit or our News channel on Discord. * Linux User Space subreddit (https://linuxuserspace.show/reddit) * Linux User Space Discord Server (https://linuxuserspace.show/discord) * Linux User Space Telegram (https://linuxuserspace.show/telegram) * Linux User Space Matrix (https://linuxuserspace.show/matrix) * Linux User Space Twitch (https://linuxuserspace.show/twitch) * Linux User Space Mastodon (https://linuxuserspace.show/mastodon) * Linux User Space Twitter (https://linuxuserspace.show/twitter) Next Time We will discuss a couple of topics and some feedback. Our next distro is Linux Lite (https://www.linuxliteos.com/) Come back in two weeks for more Linux User Space Stay tuned and interact with us on Twitter, Mastodon, Telegram, Matrix, Discord whatever. Give us your suggestions on our subreddit r/LinuxUserSpace Join the conversation. Talk to us, and give us more ideas. All the links in the show notes and on linuxuserspace.show. We would like to acknowledge our top patrons. Thank you for your support! Producer Bruno John Dave Co-Producer Johnny Tim Super User Advait Bjørnar CubicleNate Eduardo S. Jill and Steve LiNuXsys666 Nicholas Paul sleepyeyesvince

    Versions of Hyper Violence & Feminine Revolt

    Versions of Hyper Violence & Feminine Revolt

    Episode 37 - Versions of Hyper Violence & Feminine Revolt

    Exploring versions of violence through its various forms, including the perpetual inappropriate allocation of monetary resources. Is misinformation the new virtual land of milk and honey, is the future to be determined by those with the best version of Augmented Reality? Let’s explore the 4th wall of information, a 21st-century schism, of half-truths and flat-out lies.

    Support us on Patreon - Exclusive Content
    https://www.patreon.com/positivelypedestrian

    Merch Store
    https://positivelypedestrian.com/store

    Episode Extra Content
    https://positivelypedestrian.com/Versions-of-Hyper-Violence-and-Feminine-Revolt

    Who Are You?: Joseph Harris: From stealing game accounts to a white hat hacker

    Who Are You?: Joseph Harris: From stealing game accounts to a white hat hacker

    What do people normally do when they were 12 years old? Learning, playing, and maybe surviving?

    Joseph Harris, a former black hat hacker and now a white hat hacker, and bug bounty hunter, at age of 12 started stealing other people's game accounts, using social engineering to trick the email providers or game companies to hand him the data that he needs to hack and steal other people's account!

    In this episode, Joseph told the stories of how he went from stealing simple gaming accounts, into sim-swapping, and stealing millions in crypto altcoins, which ultimately resulted in him being in jail.

    He also recounts all the techniques that he used to hack into people's accounts, exploiting bugs on service providers' websites like Verizon, Gmail, Yahoo, AOL, and more. 

    Make sure you follow Joseph on

    YouTube: https://www.youtube.com/channel/UCdcuF5Zx6BiYmwnS-CiRAng

    Twitter: @AkaD0c (https://twitter.com/akad0c)

    Listen to this episode, and tweet at me @jaltucher and Jay @jay_yow07 if you like this series, and if you or you know someone with interesting stories!

    If you like this series, please leave a review, likes, and subscribes on any podcast player of your choosing!

    Follow Brian's journey on Instagram and Bandcamp:

    IG: @brianlawlored
    Spotify: Brian Lawlor

    Bandcamp: BrianLawlor.bandcamp.com

    https://www.youtube.com/watch?v=usiTyS5bmtw

    Visit Notepd.com to read more idea lists, or sign up and create your own idea list!

    My new book Skip The Line is out! Make sure you get a copy wherever you get your new book!

    Join You Should Run For President 2.0 Facebook Group, and we discuss why should run for president.

    I write about all my podcasts! Check out the full post and learn what I learned at jamesaltucher.com/podcast.

    Thanks so much for listening! If you like this episode, please subscribe to “The James Altucher Show” and rate and review wherever you get your podcasts:

    Apple Podcasts

    Stitcher

    iHeart Radio

    Spotify

     

    Follow me on Social Media:

    YouTube

    Twitter

    Facebook

    ------------

    • What do YOU think of the show? Head to JamesAltucherShow.com/listeners and fill out a short survey that will help us better tailor the podcast to our audience!
    • Are you interested in getting direct answers from James about your question on a podcast? Go to JamesAltucherShow.com/AskAltucher and send in your questions to be answered on the air!

    ------------

    ------------

    Thank you so much for listening! If you like this episode, please rate, review, and subscribe to “The James Altucher Show” wherever you get your podcasts: 

    Follow me on social media:

    373: Хакеры и взломы

    373: Хакеры и взломы
    В этом выпуске мы рассказываем о знаменитых хакерах - Кевине Митнике и Капитане Кранче, DDoS-атаках и социальной инженерии, кражах данных кредитных картах и поиске данных об НЛО, Вайомингском инциденте и Великой Хакерской Войне.

    Hashing It Out #85- Gauntlet.Network Tarun Chitra

    Hashing It Out #85- Gauntlet.Network Tarun Chitra

    In this episode, we explore the incentives of both consensus systems and defi with Tarun Chitra is the Founder & CEO of Gauntlet. Tarun is applying his experience of AI and financial simulation to blockchains. Using ‘agent-based simulation’ he helps protocol designers to discover unexpected strategies to extract more than their share of value.

    Links:Gauntlet.Network

    The Bitcoin Podcast Network Social Media

    Donate to Hashing It Out

    Discuss

    Logos Press Engine includes Logos Podcast and Hashing It Out. Hashing it Out dives into the mechanisms and hardware of the technology that aid in making sovereign communities. 

    Hashing It Out #85- Gauntlet.Network Tarun Chitra

    Hashing It Out #85- Gauntlet.Network Tarun Chitra

    In this episode, we explore the incentives of both consensus systems and defi with Tarun Chitra is the Founder & CEO of Gauntlet. Tarun is applying his experience of AI and financial simulation to blockchains. Using ‘agent-based simulation’ he helps protocol designers to discover unexpected strategies to extract more than their share of value.

    Links:Gauntlet.Network

    The Bitcoin Podcast Network Social Media

    Donate to Hashing It Out

    Discuss

    Logos Press Engine includes Logos Podcast and Hashing It Out. Hashing it Out dives into the mechanisms and hardware of the technology that aid in making sovereign communities.