POPULARITY
John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. This microcast is a short version of our full interview with Strand, which you can listen to at https://soundcloud.com/cybercrimemagazine/how-my-mom-broke-into-a-prison-pen-testing-keeps-us-secure-john-strand
Today's episode is hosted by Marc. He talks to John Strand, Owner of Black Hills Information Security, about how John's first job in cybersecurity landed him in the middle of one of the largest lawsuits in United States history, how the gates that keep people from getting into cybersecurity have changed over the years, and how malicious hackers will always have a step-up on pen testing. Check out Black Hills Infosec here : https://www.blackhillsinfosec.com/
In this episode of Cybercrime Radio, John Strand, owner of Black Hills InfoSec, shares how his mother broke into a South Dakota prison by pretending to be a health inspector, why pen testing helps keep us secure, why it's so dangerous, and more. To learn more about Black Hills, visit https://blackhillsinfosec.com/ • For more on cybersecurity, visit us at https://cybersecurityventures.com/
Welcome to another fun tale of internal pentest pwnage! Today's tale includes these helpful informational tidbits: My understanding is that in order for mitm6 relay attacks to work against DCs, those DCs have to have LDAPS config'd properly. Use nmap -sV -p646 name.of.domain.controller to verify this (thanks this site for the tip!) PowerView is awesome when used with Find-InterestingDomainShareFile to find interesting files with the word password or sensitive or other helpful strings. eavesarp helped me identify some weird hosts on weird subnets sending regular bursts of traffic to "interesting" hosts! Check out this video from Black Hills Infosec to learn more. I've also got some personal updates for you, including: House updates Fighting with the man/woman upstairs My worst Webinar nightmare came true A socially distanced wedding singing experience
Insecure - Cyber Security Podcast With Keith Wilson and John Morton
Erich Mueller returns to the show as the boys discuss continued learning for your first five years, Keith's terrorist wall, and how Morton learned Python. All this and a bag of chips this week on the Insecure Cybersecurity Podcast... bet.References:Black Hills Security - https://blackhillsinfosec.com/John Strand's webinar - https://blackhillsinfosec.com/webcast-5-year-plan-infosec/Black Hills Youtube - https://www.youtube.com/channel/UCJ2U9Dq9NckqHMbcUupgF0AClosing Music:"Robots are Technology" - Blaming TimGet The Latest Episode On: Apple: https://apple.co/2MvqaM6Stitcher: http://bit.ly/insecurestitcherGoogle Play: http://bit.ly/insecuregpSpotify: http://bit.ly/insecurepodYouTube: http://bit.ly/InsecureTubeWeb: http://www.totallyinsecure.comOpinions of the hosts and its guests are their own. This podcast in no way represents the views of the host's or guest's respective companies or their affiliates.
We figured out two step verification. Well, sort of. At least we know the difference between two factor authentication and two step verification. Sometimes all it takes is a quick review of the options.CORRECTIONIn this episode I said Paul Asadoorian works for Black Hills Infosec. Apparently he doesn’t. He’s got his own thing going on.LINKS1. Two-factor authentication (2FA) versus two-step verification (2SV)2. two-step verification - Another artical on the difference between 2SV and 2FA
Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!
Carrie Roberts joined Black Hills InfoSec after working for HP's Global Cyber Security group, where she worked as a network penetration tester. Full Show Notes: http://wiki.securityweekly.com/wiki/index.php/Episode501#Tech_Segment:_Slipping_Executables_Past_Firewalls_with_Carrie_Roberts.2C_Black_Hills_InfoSec_-_7:00-7:30PM Subscribe to YouTube Channel: https://www.youtube.com/channel/UCg--XBjJ50a9tUhTKXVPiqg Security Weekly Website: http://securityweekly.com Follow us on Twitter: @securityweekly
David Conrad of ICANN joins us, Carrie Roberts of Black Hills InfoSec breaks all the firewalls, and we discuss the security news for the week. Stay tuned!