Tag Archives: infosec

PODCAST: Amazon Key & HID Attacks with MG

WiRPfsLy_400x400

Guest: MG

This episode’s guest is Bay Area based security researcher MG. He joins the podcast to share his work experimenting with various HID (Human Interface Devices) attacks using USB drives and cables. MG has also made news recently for disclosing a vulnerability in the Amazon Key smart lock technology and shares his experience developing the proof of concept and eventually sharing it with Amazon’s security team.

Check out MG’s work here!

Amazon Key Attack

HID attack hardware

All-USB-devices-on-table

USB Rubber Ducky by Hak5

USB-rubber-ducky

MG’s HID attack platform for USB Type-A connectors

USBA-connector

PCB-boardwithUSBAconnector

Smoke-emitting USB drive

Smoke-USB

Exploding USB drive

Apple USB Lightning connector (MG’s HID attack cable on left)

Apple-lightningbolt2

Apple-lightningbolt-1

MG’s HID attack platform for USB Type-C connectors

USBC-connectors

DIRECT DOWNLOAD OF PODCAST MP3

Subscribe on iTunes, GooglePlay and Stitcher!

Tagged , , , , , , , ,

PODCAST: Rachel Tobac

RACHELLLGuest – Rachel Tobac

Rachel is co-founder and CEO of Social Proof Security and Chair of the Board of Women In Security and Privacy.

Rachel-Tobac-SECTF-1500x500

Rachel discusses (and demonstrates) the art of “vishing” and social engineering. She placed 2nd twice in the Social Engineering Capture the Flag competition at DEFCON 24 and DEFCON 25 and has become a popular speaker and advocate for personal and organizational safety through social engineering awareness.

Subscribe via iTunes, GooglePlay and/or Stitcher!

DIRECT DOWNLOAD MP3 OF PODCAST

 

 

Tagged , , , , , , , , , , , , , , , , , , ,

PODCAST: Judy Towers & Michael Goedekr

This episode is an interview with intelligence analyst Judy Towers and Michael Goedekr, CEO of hackdefnet, conducted over the summer at DEFCON 25 in Las Vegas (2017). Judy and Michael share their thoughts on threat intelligence, risk analysis, dealing with C suite executives and more.

Tagged , , , , , , , ,

PODCAST: Physical Pen-testing with Jek Hyde

Jek-Hyde-baby-bump-pic-bathroom-1Guest Jek Hyde of Sincerely Security with prosthetic “baby bump.”

My guest this episode is “Jek” a social engineer/pen-tester who recently live tweeted a real world penetration test in which her team successfully breached a client’s corporate offices and networks. We talk about how she got into social engineering and information security. It was fun to learn about her experiences and pick up a few tips and tricks as I prepare for the Social Engineering Capture The Flag competition at DEFCON next week!

Tagged , , , , , , , , , , , , , , , , , , ,

RSAC 2017: Rob Graham on Mirai and IoT Botnets

UPDATED WITH SLIDES (03/15/17)

rob-graham

“Mirai and IoT Botnet Analysis” MP3 AUDIO FILE

RSAC2017-Mirai-OPENINGSLIDE

“Mirai and IoT Botnet Analysis” SLIDES – PDF FILE

At this year’s RSA security conference in San Francisco, researcher Rob Graham gave a presentation entitled “Mirai and IoT Botnet Analysis.” His talk examined the infamous “Mirai” Internet of Things botnet and shared details on how it operates. Graham also covered technical aspects of the cameras it infects and detailed his own experimentation with Mirai in the wild. He went on to discuss last year’s massive DDoS attacks on DNS provider Dyn, which involved variations of the Mirai IoT botnet.

No official AV video recording of this talk, but the audio and RSAC slides are all you need.

Enjoy!

Also, check out Rob’s blog!

-Vince

Follow me on Twitter!

Tagged , , , , , , , , , , ,

PODCAST: Twitter, Snowden and Privacy

pardon-snowden-screen-shot-1

This episode breaks down last week’s online Q & A between Twitter CEO Jack Dorsey and infamous NSA whistle blower Edward Snowden on Periscope. The event, promoted by the organizers of the campaign Pardon Snowden, featured a lengthy discussion on privacy and the role of social media in sharing user data with law enforcement and intelligence agencies.

jacob-young-twitter-avi-1

Jacob Young – who submitted a question to Snowden and had it answered, sorta.

The event also included questions from Twitter users. Jacob Young, a software engineer and privacy advocate, was one of the lucky users who submitted a question and had it answered by Snowden during the event. Jacob joins the podcast to give his reaction to Snowden’s answer to his question and also shares his thoughts on mass surveillance, privacy and more.

If you are curious about the Snowden Q&A in question and want to view the event in it’s entirety, here’s a link to the Periscope video: https://www.periscope.tv/w/1vOxwgnXeYLxB

subscribe to podcast on

1-logo-itunesstitcher-logo

PODCAST MP3 DIRECT DOWNLOAD

Tagged , , , , , , , , ,
%d bloggers like this: