Coverbild der Sendung CyberCode Academy

CyberCode Academy

Podcast von CyberCode Academy

Englisch

Wissen​schaft & Techno​logie

Begrenztes Angebot

2 Monate für 1 €

Dann 4,99 € / MonatJederzeit kündbar.

  • 20 Stunden Hörbücher / Monat
  • Podcasts nur bei Podimo
  • Alle kostenlosen Podcasts
Loslegen

Mehr CyberCode Academy

Welcome to CyberCode Academy — your audio classroom for Programming and Cybersecurity.🎧 Each course is divided into a series of short, focused episodes that take you from beginner to advanced level — one lesson at a time.From Python and web development to ethical hacking and digital defense, our content transforms complex concepts into simple, engaging audio learning.Study anywhere, anytime — and level up your skills with CyberCode Academy.🚀 Learn. Code. Secure.You can listen and download our episodes for free on more than 10 different platforms:https://linktr.ee/cybercode_academy

Alle Folgen

245 Folgen

Episode Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup Cover

Course 35 - Footprinting and Reconnaissance | Episode 1: Methodology, OSINT Tools, and Lab Setup

In this lesson, you’ll learn about: footprinting, OSINT, and setting up a penetration testing lab1. Penetration Testing Methodology🔹 The First Rule: Legal Scope * Before any testing: * Define scope clearly * Get explicit permission 👉 Why it matters: * Protects you legally * Defines what systems you can test * Prevents unauthorized access issues 2. Footprinting & Reconnaissance🔹 Definition * The process of gathering information about a target before attacking 🔹 Types of Footprinting🟢 Passive Footprinting * No direct interaction with the target * Uses publicly available data 🔴 Active Footprinting * Direct engagement with the target * Higher risk of detection 🌐 OSINT (Open Source Intelligence) * Collecting intelligence from: * Public databases * Websites * Social platforms 3. Essential OSINT & Footprinting Tools🔹 Basic Network Tools * nslookup * DNS records and IP resolution * whois * Domain registration and ownership details 🔹 Search & Intelligence Platforms * Shodan * Discover exposed devices and services 🔹 Visual Intelligence Tool * Maltego * Maps relationships between: * Domains * Emails * Infrastructure 🔹 Website Analysis * HTTrack * Clone websites for offline analysis 🔹 Advanced Recon Frameworks * Recon-ng * theHarvester 👉 Used for: * Automated data collection * Email harvesting * Domain intelligence 4. Building a Safe Lab Environment🔹 Why You Need a Lab * Avoid testing on real systems * Practice safely and legally * Simulate real-world attacks 🔹 Virtualization Platform * Oracle VM VirtualBox 👉 Important: * Install: * Base platform * Extension Pack 🔹 Operating System for Pentesting * Kali Linux 👉 Includes: * Pre-installed security tools * Ready-to-use environment 5. Troubleshooting Setup * Always: * Follow guides specific to your OS (Windows / Linux / Mac) * Check virtualization support (VT-x / AMD-V) Key Takeaways * Always start with scope and permission * Footprinting is the foundation of pentesting * OSINT provides powerful public intelligence * Tools automate and enhance data gathering * A lab environment is essential for safe practice Big PictureThis phase is where you:👉 Move from zero knowledge → complete visibility * Understand the target * Map the attack surface * Prepare for deeper testing Mental Model * Methodology → “What am I allowed to do?” * Footprinting → “What can I learn?” * Lab → “Where can I practice safely?” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

Gestern - 14 min
Episode Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth Cover

Course 34 - Cybersecurity Kill Chain | Episode 4: Command, Objectives, and Defense in Depth

In this lesson, you’ll learn about: Command & Control (C2), Actions on Objectives, and Defense in Depth1. Command & Control (C2) Phase🔹 Definition * The stage where an attacker establishes a communication channel with a compromised system 🔹 Purpose * Send commands to the infected machine * Receive exfiltrated data * Maintain persistent remote access 🔹 Evasion Techniques * Attackers disguise communication as normal traffic 👉 Example: * Using platforms like: * Twitter * Why this works: * Traffic appears legitimate * Blends into normal user behavior * Harder for detection systems to flag 2. Actions on Objectives (Final Goal)🔹 Definition * The phase where the attacker achieves their intended objective 🔹 Common Targets * Sensitive data such as: * Financial records * Credit card data * Credentials * Intellectual property 🔹 Attacker Behavior * Operate stealthily * Maintain long-term access * Avoid detection while extracting value 3. Defense in Depth🔹 Definition * A layered security strategy designed to protect systems at multiple levels 🔹 Framework * Cyber Defense Matrix 4. Six Core Defensive Actions🛡️ Detect * Identify malicious or suspicious activity 🚫 Deny * Prevent unauthorized access ⚡ Disrupt * Interrupt attacker operations 📉 Degrade * Reduce the effectiveness of the attack 🎭 Deceive * Mislead attackers (e.g., honeypots, fake assets) 🔒 Contain * Limit the spread and impact of an attack 5. Why Defense in Depth Matters * No single security control is sufficient * Attacks occur in multiple stages 👉 Effective defense must: * Cover every phase of the Cyber Kill Chain Key Takeaways * C2 enables attackers to remotely control compromised systems * Attackers often hide communication within legitimate traffic * Actions on Objectives is where real damage or data theft occurs * Defense in Depth provides layered protection across all stages * Security should be proactive, not reactive Big Picture👉 This is the final stage of the attack lifecycle: * C2 → Control the system * Actions → Achieve the objective * Defense → Detect, limit, and stop the attack You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

21. Mai 2026 - 19 min
Episode Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation Cover

Course 34 - Cybersecurity Kill Chain | Episode 3: Delivery, Exploitation, and Installation

In this lesson, you’ll learn about: Delivery, Exploitation, and Installation in the Cyber Kill Chain1. Delivery Phase (Getting the Payload to the Target)🔹 Definition * The process of transferring the malicious payload to the victim 🔹 Common Delivery Methods📡 Technical Methods * Using exposed services: * FTP uploads * Web downloads 💾 Physical Methods * Infected USB drives left in: * Offices * Public places 🎭 Social Engineering (Most Effective) * Tool: * Social Engineering Toolkit (SET) * Used for: * Spear-phishing campaigns * Mass phishing emails 👉 Key idea: * Trick the user into executing the payload themselves 2. Exploitation Phase (Triggering the Attack)🔹 Definition * The moment the payload: * executes successfully * bypasses security controls 🔹 How Exploitation Happens * Exploiting: * Software vulnerabilities * Misconfigurations 🔹 Most Common Weakness👉 Human behavior * Clicking malicious links * Entering credentials on fake pages 3. Installation Phase (Maintaining Access)🔹 Definition * Establishing a persistent foothold on the system 🔹 Goal * Ensure attacker can: * Reconnect anytime * Maintain control 🔹 Common Concept * Installing: * Backdoors * Persistent malware 🔹 Tool Example * Metasploit * Used to: * Set up a listener * Wait for incoming connection from victim 👉 Once connected: * A session is opened * Attacker gains remote control 4. Exploitation vs Installation (Key Difference)PhasePurposeResultExploitationBreak into the systemInitial accessInstallationStay inside the systemPersistent access5. Full Flow Understanding * Delivery * Gets payload to victim * Exploitation * Executes payload successfully * Installation * Keeps long-term access Key Takeaways * Delivery relies heavily on social engineering * Exploitation is about triggering execution * Installation ensures persistence * Humans are often the weakest link * Tools automate the process, but logic remains consistent Big PictureThese phases represent:👉 From sending the attack → to owning the system * Delivery = Entry point * Exploitation = Break-in * Installation = Persistence Mental ModelThink of it like: * Delivery → “Send the package” * Exploitation → “Open the door” * Installation → “Stay inside the house” You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

20. Mai 2026 - 20 min
Episode Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies Cover

Course 34 - Cybersecurity Kill Chain | Episode 2: Active Reconnaissance and Weaponization Strategies

In this lesson, you’ll learn about: Active Reconnaissance and Weaponization in the Cyber Kill Chain1. Transition: From Recon to Action * After passive recon, attackers move to: * Active Reconnaissance → direct interaction * Then → Weaponization → building attack tools 👉 This is the shift from: * Collecting information → Preparing the attack 2. Active Reconnaissance (Deep Target Profiling)🔹 Definition * Directly interacting with the target system to gather: * Technical details * Human-related intelligence 🔹 Technical Techniques * Port Scanning & Fingerprinting * Tools: * Nmap * Zenmap * Discover: * Open ports * Running services * Operating system * Web Application Analysis * Tools: * Burp Suite * OWASP ZAP * Identify: * Hidden endpoints * Admin panels * Vulnerabilities 🔹 Non-Technical Techniques * Social engineering using: * LinkedIn * Facebook * Build: * Spear-phishing attacks * Highly targeted emails/messages * Based on real employee data 3. Weaponization Phase🔹 Definition * Building the attack payload based on gathered intel 👉 Important: * No interaction with the victim yet * Happens entirely on the attacker’s side 4. Why Reconnaissance Matters Here * Good recon → precise payload * Poor recon → failed attack 👉 Example: * If attacker knows: * OS version * Open ports * Installed software ➡️ They can craft: * A payload that fits perfectly 5. Payload Concepts (High-Level) * A payload is: * Code designed to run on the target system 🔹 Common Strategy * Use outbound connections: * Reverse TCP / HTTPS 👉 Why? * Firewalls usually: * Block incoming connections * Allow outgoing connections 6. Tools Used in Weaponization🔹 Payload Generation * Metasploit * Create executable payloads 🔹 Evasion Techniques * Unicorn * Generates: * PowerShell-based payloads * Less suspicious than executables 7. Key Differences Between the Two PhasesPhaseGoalInteractionActive ReconGather detailed target dataYesWeaponizationBuild attack payloadNoKey Takeaways * Active recon provides deep technical insight * Weaponization turns that insight into attack capability * Tools like Nmap and Burp reveal weaknesses * Payloads are tailored based on real target data * Outbound connections are commonly abused to bypass firewalls You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

19. Mai 2026 - 20 min
Episode Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals Cover

Course 34 - Cybersecurity Kill Chain | Episode 1: Reconnaissance and Footprinting Fundamentals

In this lesson, you’ll learn about: reconnaissance in the Cyber Kill Chain1. What is Reconnaissance? * Reconnaissance is the first phase of the Cyber Kill Chain * It focuses on: * Gathering information about a target 👉 Why it matters: * It forms the foundation of the entire attack * Poor recon = weak attack * Strong recon = precise targeting 2. Passive Reconnaissance (Footprinting)🔹 Definition * Collecting information without directly interacting with the target 👉 Low risk of detection🔹 Common Techniques🌐 Network Information Gathering * Tools like: * whois → domain ownership & contacts * nslookup → DNS & IP mapping 🔍 Search Engines & Specialized Platforms * Shodan * Censys Used to find: * Open ports * Running services * Technologies used 👥 Social Media Intelligence (OSINT) * LinkedIn * Employee roles * Tech stack hints * Facebook * Personal interests * Behavior patterns 👉 Useful for: * Phishing attacks * Social engineering 🗑️ Physical Recon (Dumpster Diving) * Searching discarded materials for: * Passwords * Internal documents * Configurations 3. Active Reconnaissance🔹 Definition * Direct interaction with the target system 👉 Higher risk of detection🔹 Common Techniques📡 Ping Sweeps * Identify: * Live hosts on a network 🔎 Port Scanning & Fingerprinting * Tool: * Nmap Used to detect: * Open ports (e.g., SSH, FTP, VNC) * Operating system details 4. Passive vs Active ReconTypeInteractionRisk LevelExamplePassiveNoLowShodan, LinkedInActiveYesHighNmap scan5. Why Reconnaissance is Critical * Builds a complete target profile * Identifies: * Weak points * Entry points * Makes later stages: * Faster * More effective Key Takeaways * Recon = information gathering phase * Passive recon is stealthy and preferred * Active recon is powerful but detectable * Tools like Shodan and Nmap reveal technical exposure * Social media provides human attack vectors Big PictureReconnaissance is where attackers:👉 Move from guessing → knowing * Instead of blind attacks * They perform data-driven targetin You can listen and download our episodes for free on more than 10 different platforms: https://linktr.ee/cybercode_academy [https://linktr.ee/cybercode_academy]

18. Mai 2026 - 13 min
Super gut, sehr abwechslungsreich Podimo kann man nur weiterempfehlen
Super gut, sehr abwechslungsreich Podimo kann man nur weiterempfehlen
Ich liebe Podcasts, Hörbücher u. -spiele, Dokus usw. Hier habe ich genügend Auswahl. Macht 👍 weiter so

Wähle dein Abonnement

Am beliebtesten

Begrenztes Angebot

Premium

20 Stunden Hörbücher

  • Podcasts nur bei Podimo

  • Keine Werbung in Podimo Podcasts

  • Jederzeit kündbar

2 Monate für 1 €
Dann 4,99 € / Monat

Loslegen

Premium Plus

100 Stunden Hörbücher

  • Podcasts nur bei Podimo

  • Keine Werbung in Podimo Podcasts

  • Jederzeit kündbar

30 Tage kostenlos testen
Dann 13,99 € / monat

Kostenlos testen

Nur bei Podimo

Beliebte Hörbücher

Loslegen

2 Monate für 1 €. Dann 4,99 € / Monat. Jederzeit kündbar.