Tradecraft Security Weekly (Audio) cover art

Tradecraft Security Weekly (Audio)

Tradecraft Security Weekly (Audio)

Written by: Security Weekly
Listen for free

About this listen

***This show is very visual and you may want to visit our YouTube channel to access the video footage from these episodes: https://youtube.com/securityweekly*** Want to learn about all of the latest security tools and techniques? This is the show for you! We show you how to install, configure and use a wide variety of security tools for both offense and defense. Whether you are a penetration tester or defending enterprise networks, this show will help youCopyright Security Weekly Politics & Government
Episodes
  • Black Hat & DEF CON 2018 - Tradecraft Security Weekly #28
    Aug 21 2018

    This is the Hacker Summer Camp 2018 edition of Tradecraft Security Weekly. In this week's episode Beau Bullock (@dafthack) talks about some of the more interesting items he saw come out of the Black Hat and DEF CON conferences this year.

    For Show Links: https://wiki.securityweekly.com/TS_Episode28

    Show More Show Less
    14 mins
  • Phishing 2FA Tokens with CredSniper - Tradecraft Security Weekly #25
    Apr 13 2018

    Organizations are implementing two-factor on more and more web services. The traditional methods for phishing credentials is no longer good enough to gain access to user accounts if 2FA is setup. In this episode Mike Felch (@ustayready) and Beau Bullock (@dafthack) demonstrate a tool that Mike wrote called CredSniper that assists in cloning portals for harvesting two-factor tokens.

    Links: https://github.com/ustayready/CredSniper

    Show More Show Less
    19 mins
  • Evading Network-Based Detection Mechanisms - Tradecraft Security Weekly #24
    Mar 29 2018

    In this episode of Tradecraft Security Weekly hosts Beau Bullock (@dafthack) and Mike Felch (@ustayready) discuss methods for evading network-based detection mechanisms. Many commercial IDS/IPS devices do a pretty decent job of detecting standard pentesting tools like Nmap when no evasion options are used. Additionally, companies are doing a better job at detecting and blocking IP addresses performing password attacks. Proxycannon is a tool that allows pentesters to spin up multiple servers to proxy attempts through to bypass some of these detection mechanisms.

    Links:
    Nmap Evasion Options - https://nmap.org/book/man-bypass-firewalls-ids.html
    ProxyCannon - https://www.shellntel.com/blog/2016/1/14/update-to-proxycannon

    Show More Show Less
    20 mins
No reviews yet