Podcast appearances and mentions of adrian crenshaw

  • 4PODCASTS
  • 6EPISODES
  • 51mAVG DURATION
  • ?INFREQUENT EPISODES
  • Mar 16, 2018LATEST

POPULARITY

20172018201920202021202220232024


Best podcasts about adrian crenshaw

Latest podcast episodes about adrian crenshaw

TrustedSec Security Podcast
2.12 - Is that CryptoMiner or a Utility? Wildcards for the Masses, Look-a-Likes, and More CPU Vulnerabilities

TrustedSec Security Podcast

Play Episode Listen Later Mar 16, 2018 41:57


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Geoff Walton, Rob Simon, Scot Berner, and Adrian Crenshaw. Show links: Calendar 2 tried turning Macs into cryptocurrency mining rigs, swiftly rolled back Mac App Store update following reviews https://letsencrypt.org/2017/07/06/wildcard-certificates-coming-jan-2018.html https://krebsonsecurity.com/2018/03/look-alike-domains-and-visual-confusion https://www.cnet.com/news/amd-has-a-spectre-meltdown-like-security-flaw-of-its-own Tool Time Notes: https://github.com/securitywithoutborders/hardentools/releases

TrustedSec Security Podcast
2.4 – Law Firm Hacks, Voting Systems and Russia Hacking, 5 signs to better security, Wire, CobaltStrike and more!

TrustedSec Security Podcast

Play Episode Listen Later Dec 29, 2016 79:03


Welcome to the Trusted Security Podcast – a podcast dedicated to bringing the latest news on information security and the industry. This episode features the following members: Dave Kennedy, Justin Elze, Geoff Walton, Adrian Crenshaw, Jim McMurry and Ethan Coulter from Milton Security: Special thanks to Dual Core Music for the intro music and to Milton Security Jim and Ethan for joining the podcast this episode! Show links: http://www.wsj.com/articles/cyber-hack-exposes-law-firms-weak-spots-1482965375 http://www.politico.com/story/2016/12/election-hacking-vulnerabilities-233024 http://www.infoworld.com/article/3153217/hacking/5-signs-were-finally-getting-our-act-together-on-security.html http://www.newsweek.com/hackers-hijack-planes-flight-system-flaw-534071 http://www.wsj.com/articles/trump-namesthomasbossert-chief-adviser-on-homeland-security-1482852680 https://www.trustedsec.com/december-2016/wire-messenger-new-competitor-signal/ Tool Time Notes: https://www.cobaltstrike.com/

Exploring Information Security Archive 1
My DerbyCon talk - The Blue Team Starter Kit

Exploring Information Security Archive 1

Play Episode Listen Later Oct 12, 2015 20:31


I had the wonderful opportunity to speak at DerbyCon this year. The overall experience was amazing and I am thankful and honored to speak at such a great event. I was placed in the stables track with a 20-25 minute talk, which makes the recording perfect for this podcast. A huge shoutout and thanks to Adrian Crenshaw for all his work in recording talks for conferences. The information security community would be lesser without him.

Exotic Liability
25: Iron Geek

Exotic Liability

Play Episode Listen Later Aug 5, 2015 58:24


Adrian Crenshaw,Incident response switchblade,Tiger Team: The Whole Story,Our neighborhood memories,Conboot,Cool tools for data collection,PW cracker speed test,Look at my thumb,Olympic games,Louisville Info Sec Conference,Anti-forensics,Legalities

Exotic Liability
25: Iron Geek

Exotic Liability

Play Episode Listen Later Aug 5, 2015 58:24


Adrian Crenshaw,Incident response switchblade,Tiger Team: The Whole Story,Our neighborhood memories,Conboot,Cool tools for data collection,PW cracker speed test,Look at my thumb,Olympic games,Louisville Info Sec Conference,Anti-forensics,Legalities

DEF CON 22 [Materials] Speeches from the Hacker Convention.
Adrian Crenshaw- Dropping Docs on Darknets: How People Got Caught

DEF CON 22 [Materials] Speeches from the Hacker Convention.

Play Episode Listen Later Dec 12, 2014


Presentation available here: https://www.defcon.org/images/defcon-22/dc-22-presentations/Crenshaw/DEFCON-22-Adrian-Crenshaw-Dropping-Docs-on-Darknets-How-People-Got-Caught-UPDATED.pdf Dropping Docs on Darknets: How People Got Caught Adrian Crenshaw TRUSTEDSEC & IRONGEEK.COM Most of you have probably used Tor before, but I2P may be unfamiliar. Both are anonymization networks that allow people to obfuscate where their traffic is coming from, and also host services (web sites for example) without it being tied back to them. This talk will give an overview of both, but will focus on real world stories of how people were deanonymized. Example cases like Eldo Kim & the Harvard Bomb Threat, Hector Xavier Monsegur (Sabu)/Jeremy Hammond (sup_g) & LulzSec, Freedom Hosting & Eric Eoin Marques and finally Ross William Ulbricht/“Dread Pirate Roberts” of the SilkRoad, will be used to explain how people have been caught and how it could have been avoided. Adrian Crenshaw has worked in the IT industry for the last seventeen years. He runs the information security website Irongeek.com, which specializes in videos and articles that illustrate how to use various pen-testing and security tools. He did the cert chase for awhile (MCSE NT 4, CNE, A+, Network+. i-Net+) but stopped once he had to start paying for the tests himself. He holds a Master of Science in Security Informatics, works for TrustedSec as a Senior Security Consultant and is one of the co-founders of Derbycon. Twitter: @irongeek_adc