Hacker Talk

Escuchar Hacker Talk

Podcast de Firo Solutions LTD

Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.

Empieza 30 días de prueba

4,99 € / mes después de la prueba.Cancela cuando quieras.

Prueba gratis

Todos los episodios

20 episodios
episode New Year special 2024 artwork
New Year special 2024

Hacker Talk 2024 New Year Special Featuring: Johnny Xmas, Zagros Bingol and Filip Kalebo. Topics: infosec's 9/11 - Target.com breach Leaking TSA master keys Starting to work in information security How the information security space has changed The hackers we lost along the way RIP Kevin Mitnick RIP hacker legend Robert “Ozzie” Osband (Richard Cheshire, The Cheshire Catalyst) 2600 Hackers on planet earth Crowd strike Trends we have seen in 2024 AI as a trend The future of AI Training models AI being used to fingerprint user activity AI in continuous integration pipelines Code Reviews Backdoor in tar Vulnerabilities in the linux kernel Risks of using opensource Exploit brokers OSS Fuzz Fuzzing Quantum computers Cray super computers Michelle Simmons creates a quantum computer at home National cryptology museum in Washington dc 40 years since Chaos Computer club, 2600 and Cult of the deadcow Chaos computer camp Bornhack toorcamp hope conference Defcon Cult of the deadcow Veilid Bluesky Decentralized technologies Hawk tuah Modern Scams Web3 and Web2 Privacy Downfall of telegram Telegram giving up on privacy SimpleX chat, signal and imessage Future External Links: https://linktr.ee/johnnyxmas [https://linktr.ee/johnnyxmas ] https://burbsec.com/ [https://burbsec.com/ ] https://en.wikipedia.org/wiki/XZ_Utils_backdoor [https://en.wikipedia.org/wiki/XZ_Utils_backdoor ] https://www.metafilter.com/203126/Tar-Trap-Caught [https://www.metafilter.com/203126/Tar-Trap-Caught] https://en.wikipedia.org/wiki/Hack-Tic [https://en.wikipedia.org/wiki/Hack-Tic] https://en.wikipedia.org/wiki/Chaos_Communication_Camp [https://en.wikipedia.org/wiki/Chaos_Communication_Camp ] https://cultdeadcow.com/ [https://cultdeadcow.com/ ] https://2600.com/ [https://2600.com/ ] https://toorcamp.org/experience/ [https://toorcamp.org/experience/ ] https://infocondb.org/presenter/richard-cheshire-the-cheshire-catalyst [https://infocondb.org/presenter/richard-cheshire-the-cheshire-catalyst ] https://www.imdb.com/name/nm1937010/ [https://www.imdb.com/name/nm1937010/ ] https://hope.net/memoriam.html [https://hope.net/memoriam.html ] https://veilid.com/ [https://veilid.com/ ] https://blog.rust.careers/post/veilid_dildog_rust_interview/ [https://blog.rust.careers/post/veilid_dildog_rust_interview/] https://bornhack.dk/bornhack-2025/ [https://bornhack.dk/bornhack-2025/] https://en.wikipedia.org/wiki/DEF_CON [https://en.wikipedia.org/wiki/DEF_CON ] https://en.wikipedia.org/wiki/Pavel_Durov [https://en.wikipedia.org/wiki/Pavel_Durov ] https://www.bbc.com/news/articles/cvglp0xny3eo [ https://www.bbc.com/news/articles/cvglp0xny3eo ] https://en.wikipedia.org/wiki/Bluesky [https://en.wikipedia.org/wiki/Bluesky ] https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html [https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html] https://google.github.io/oss-fuzz/research/llms/target_generation/ [https://google.github.io/oss-fuzz/research/llms/target_generation/] https://www.visitacity.com/en/washington-dc/attractions/the-national-cryptologic-museum [https://www.visitacity.com/en/washington-dc/attractions/the-national-cryptologic-museum] https://www.youtube.com/watch?v=bRj4ipIEmg0 [https://www.youtube.com/watch?v=bRj4ipIEmg0 ] https://www.msn.com/en-us/entertainment/celebrities/hawk-tuah-girl-haliey-welch-vanishes-after-crypto-scam-accusations-has-not-been-seen-online-for-weeks/ar-AA1waGkW [https://www.msn.com/en-us/entertainment/celebrities/hawk-tuah-girl-haliey-welch-vanishes-after-crypto-scam-accusations-has-not-been-seen-online-for-weeks/ar-AA1waGkW ] https://support.apple.com/en-us/102637 https://support.apple.com/en-us/102637 [ https://support.apple.com/en-us/102637 ] https://simplex.chat/ [https://simplex.chat/ ] https://en.wikipedia.org/wiki/Signal_(software) [https://en.wikipedia.org/wiki/Signal_(software) ] https://en.wikipedia.org/wiki/Moxie_Marlinspike [https://en.wikipedia.org/wiki/Moxie_Marlinspike ]

29 dic 2024 - 2 h 4 min
episode Cat shaped hardware hacking with Alex Lynd artwork
Cat shaped hardware hacking with Alex Lynd

The hardware hacker, creator of the wifi-nugget, cybersecurity content creator, hak5 host and our guest of honor in this episode of Hacker Talk is Alex Lynd! In this episode, we cover: Alex background, working with hak5, content creation O.MG pentesting cable Signal intelligence Wifi hacking Hardware hacking Modifying the hardware of calculators, playing games on calculators Hacking the texas instrument ti 84 calculator Alex's first computer being the raspberry pi Starting with Linux Embedded security Hardware developer perspective Making hardware devices Making low-cost hacking devices low cost, high availability and effective hacking devices GPS implants ESP8266, 3 dollar wifi microcontroller Wardriving with esp8266 wifi nugget Making cat-shaped hardware Making a friendly and portable hardware design Learning about wifi hacking and microcontrollers USB nugget USB rubber ducky Keystroke injection attacks ATtiny85 Arduino Thought process behind creating the wifi nugget How Filip cracked his neighbors wifi Aircrack-ng Airgeddon Creating a DIY beginner hardware kit The creation of wifi nugget, the first 100 devices SpaceHuhn Maker Wifi Beacon spoofing pranks esp32 vs esp8266 wifi chip Crafting custom packets with the esp8266 chip Espressif Systems trying to stop people from using it's wifi chips for offensive purposes by locking down its software development kit. Spoofing attacks esp32 native USB mode EMulating USB connected devices for data exfiltration Auto trunked packets pmkid wifi attack Cracking wpa2 handshakes Guessing autogenerated wifi passwords Hashcat Password generator based on your local area code The best password-cracking word list Filip has ever used Funny pranks with the wifi nugget Nugget defender, see if anyone is attacking your network use Canary tokens to detect if someone is breaking into your system Bugged microsoft word and pdf documents Having an intrusion detection system in your pocket wifi honeypots Getting started designing custom printed circuit boards(PCB) Design with easyeda Creating a tv-be-gone Sourcing pcb boards Circuit board art What software to use to create boards Antenna design Omni directional antennas Yagi antennas Sourcing hardware Making it more user friendly Links: https://alexlynd.com/ [https://alexlynd.com/ ] https://mg.lol/blog/omg-cable/ [https://mg.lol/blog/omg-cable/] https://github.com/HakCat-Tech/WiFi-Nugget [https://github.com/HakCat-Tech/WiFi-Nugget] https://education.ti.com/en/products/calculators/graphing-calculators/ti-84-plus [https://education.ti.com/en/products/calculators/graphing-calculators/ti-84-plus] https://en.wikipedia.org/wiki/Raspberry_Pi [https://en.wikipedia.org/wiki/Raspberry_Pi] https://hak5.org/ [https://hak5.org/ ] https://en.wikipedia.org/wiki/ESP8266 [https://en.wikipedia.org/wiki/ESP8266] https://retia.io/ [https://retia.io/ ] https://twitter.com/AlexLynd [https://twitter.com/AlexLynd] https://usbnugget.com https://usbnugget.com [ https://usbnugget.com]/ https://shop.hak5.org/products/usb-rubber-ducky https://en.wikipedia.org/wiki/ATmega328 [https://en.wikipedia.org/wiki/ATmega328 ] https://en.wikipedia.org/wiki/Arduino_Nano [https://en.wikipedia.org/wiki/Arduino_Nano] https://www.pcboard.ca/mini-attiny85-usb [https://www.pcboard.ca/mini-attiny85-usb] https://www.arrow.com/en/research-and-events/articles/attiny85-arduino-tutorial [https://www.arrow.com/en/research-and-events/articles/attiny85-arduino-tutorial] https://github.com/derv82/wifite2 [https://github.com/derv82/wifite2 ] https://en.wikipedia.org/wiki/Aircrack-ng [https://en.wikipedia.org/wiki/Aircrack-ng] https://www.kali.org/tools/airgeddon/ [https://www.kali.org/tools/airgeddon/ ] https://github.com/SpacehuhnTech/esp8266_deauther [https://github.com/SpacehuhnTech/esp8266_deauther ] http://deauther.com/ [http://deauther.com/ ] https://spacehuhn.com/ [https://spacehuhn.com/] https://ieeexplore.ieee.org/document/4529384/ [https://ieeexplore.ieee.org/document/4529384/] https://en.wikipedia.org/wiki/ESP32 [https://en.wikipedia.org/wiki/ESP32 ] https://www.espressif.com/ [https://www.espressif.com/ ] https://documentation.meraki.com/MR/Other_Topics/PMKID_Vulnerability_FAQ_-_WPA%2F%2FWPA2-PSK_and_802.11r [https://documentation.meraki.com/MR/Other_Topics/PMKID_Vulnerability_FAQ_-_WPA%2F%2FWPA2-PSK_and_802.11r ] https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access [https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access ] https://colab.research.google.com/ [https://colab.research.google.com/ ] https://en.wikipedia.org/wiki/Hashcat [https://en.wikipedia.org/wiki/Hashcat] https://github.com/danielmiessler/SecLists [https://github.com/danielmiessler/SecLists] https://github.com/HakCat-Tech/Nugget-Invader [https://github.com/HakCat-Tech/Nugget-Invader ] https://canarytokens.org/generate [https://canarytokens.org/generate ] https://easyeda.com/ [https://easyeda.com/] https://www.pcbway.com/ https://www.pcbway.com/ [ https://www.pcbway.com/] https://www.kicad.org/ https://www.kicad.org/ [ https://www.kicad.org/ ] https://en.wikipedia.org/wiki/Nordic_Semiconducto [https://en.wikipedia.org/wiki/Nordic_Semiconducto]r

14 abr 2023 - 59 min
episode Darknet Operation Security with Sam Bent Part 1 artwork
Darknet Operation Security with Sam Bent Part 1

Sam Bent, previously by his online handle as the Darknet Vendor "2happytimes2" is our Hacker of the episode! In this episode of Hacker Talk we get to hear, how Sam put toghter an Opsec plan that ended up protecting him against a 20 count indetment and 200 years in prison. Thanks to a bruteforce attack in the true hacker spirit he managed to get out of prison.  What is it like to apply strong operation security practices in your everyday life?  How does one survive and adapt to hostile environments? Join us in this thrill seeking episode of Hacker Talk, where we get to hear Sam's story.  In this episode we cover:    Darknet Vendor, Darknet Marketplaces   Darknet Forum Administrator First Introduction to Tor  Silkroad, Early Bitcoin days  Bitcoin Pizza for 20 000 Bitcoins Moderating darknet forums Money laundering charges    Privacy Journey into selling on the darknet   Residential Security    Living in Vermont, United States of America Computer support    Forming information security policies   Backtraq 2(Released March 2007)  Yagi antenna, randomizing your mac address before you use your neighbors wifi Removing DNA from packages.   Speaking at Defcon   Dealing with the Department of Homeland security Social Engineering Operation security Dread Darknet Forum Dealing with Hostile Environments on the darknet and in prison  Profiling yourself Importance of Adoptability   Managing multiple identities  Pretty good privacy(PGP) Trust on the Darknet Resumes on the Darknet    Best practices for Password Managers  Storing password's in "The Slip", secure convenience security   How to ship mail securely Interacting with the united states judicial system  Franks hearing Becoming a paralegal in Prison Writing a 200-page passion of release motion Building trust in Online Communities Links: Doingfedtime Youtube channel: https://www.youtube.com/@DoingFedTime [https://www.darknetstats.com/seasoned-dark-web-vendor-2happytimes2-sentenced-to-5-years-in-prison/] Bitcoin talk pizza thread: https://bitcointalk.org/index.php?topic=137.0 [https://bitcointalk.org/index.php?topic=137.0]  https://en.wikipedia.org/wiki/Vermont [https://en.wikipedia.org/wiki/Vermont] https://en.wikipedia.org/wiki/BackTrack  [https://en.wikipedia.org/wiki/BackTrack] Sam's defcon talk: https://www.youtube.com/watch?v=NGiUhjuB22Y [https://www.youtube.com/watch?v=NGiUhjuB22Y] https://www.16personalities.com/ [https://www.16personalities.com/] https://en.wikipedia.org/wiki/Pretty_Good_Privacy   [https://en.wikipedia.org/wiki/Pretty_Good_Privacy ] https://en.wikipedia.org/wiki/Silk_Road_(marketplace)    [https://en.wikipedia.org/wiki/Silk_Road_(marketplace) ] https://www.shouselaw.com/ca/blog/warrant/what-does-it-mean-to-traverse-a-warrant-what-is-a-franks-motion/ [https://www.shouselaw.com/ca/blog/warrant/what-does-it-mean-to-traverse-a-warrant-what-is-a-franks-motion/] https://forum.defcon.org/node/241998 https://www.darknetstats.com/seasoned-dark-web-vendor-2happytimes2-sentenced-to-5-years-in-prison/

27 dic 2022 - 1 h 12 min
episode Bug Bounty Bootcamp with Vickie lii artwork
Bug Bounty Bootcamp with Vickie lii

Our Hacker of the episode is "Vickie lii"! Vickie tells us about Bug Bounties, her new book and information security.  Tune in now! In this episode we cover: Background, getting into security Getting into Bug Bounty  First Bug bounty  Hackerone, Bug crowd Reporting Security Bugs Coordinating bug bounties   Life as a bug bounty hunter Interaction with engineers Bug bounty bootcamp Book Security as a hobby Writing Books How to hack web applications   Vickie's favourite types of Vulnerabilities    Template injection IDOR Writers block Nostarch   Book Publishing   Bug bounty tools Python and Bash    Make bug bounties more enjoyable  Portswinger Lab Finding low hanging fruits   legal harbor  Caring about security researchers   Links: https://twitter.com/vickieli7    https://en.wikipedia.org/wiki/Bug_bounty_program https://vickieli.dev/   https://portswigger.net/web-security/all-labs    https://portswigger.net/research/server-side-template-injection https://www.geeksforgeeks.org/insecure-direct-object-reference-idor-vulnerability/    https://nostarch.com/bug-bounty-bootcamp Grab a copy of Vickie's book: https://www.amazon.com/Bug-Bounty-Bootcamp-Reporting-Vulnerabilities-ebook/dp/B08YK368Y3

24 nov 2022 - 38 min
episode CodeQL with Alvaro Munoz artwork
CodeQL with Alvaro Munoz

In this episode of Hacker Talk: One of the most powerful newer static analysis tool is CodeQL.   By converting your code base into a Codeql database, you can now write   queries in a read-only way, in order to find security vulnerabilities    and problems in you Code-base. We wanted to know more about this declarative language called "CodeQL". Straight from Github's Security Lab, we are joined by Alvaro Munoz!   Alvaro, is a Security Researcher, Leads a team of researchers that leverage Codeql to find and model vulnerabilities at Github, with a background in research related to finding remote code execution bugs through deserialization.   Tune in as we get to hear the ins and out of CodeQL, how to get started, when Codeql was used to find a vulnerability in a public Covid-19 system, how to find vulnerabilities with Codeql and a lot more! Topics covered: Learning to thing outsite the box by playing Capture the flag CodeQL declarative languages  Static code analysis Getting a broad view of the source code Writing queries with CodeQL to find vulnerabilities    Modeling vulnerabilities with CodeQL The learning curve of CodeQL Quering github repositories for vulnerabilities Write codeql for a large amount of repositories with lgtm(use it goes before it goes EOL) Linters vs codeql CodeQL integrated with continuous integration pipelines Get started with Codeql Submit your codeql queries to Github Security Lab's Bug bounty Best practices for writing queries     Thinking of the code as a database with codeql Finding vulnerabilities in Covid-19 systems Best pratices for CodeQL  Reduce false possitives  CodeQL with nvim(neovim)     Improving vim by creating a more interactive development enviroment alternative, "neovim". LSP integration with neovim.   CodeQL with Emacs Remote code execution bugs found with CodeQL.   Bugs found in Radar Covid App Patterns leading to remote code execution    Auditing javascript frameworks CodeQL vs other static analysis tools Capture the flag codeql challanges The future of CodeQL External links: https://lgtm.com/   [https://lgtm.com/] https://github.com/pwntester [https://github.com/pwntester ]  https://neovim.io/ [https://neovim.io/] https://en.wikipedia.org/wiki/Language_Server_Protocol     https://en.wikipedia.org/wiki/Semgrep Covid 19 tracing app - https://securitylab.github.com/research/securing-the-fight-against-covid19-through-oss/ - https://threatpost.com/german-covid-19-contact-tracing-vulnerability-rce/161419/ Github Security Lab web site: https://securitylab.github.com/ Join Github Security Lab Slack Channel:  https://join.slack.com/t/ghsecuritylab/shared_invite/zt-120w4vby8-_O9u9k2hPfgbju1tddBPcg https://twitter.com/pwntester Bounty program: https://securitylab.github.com/bounties/ https://codeql.github.com/ https://codeql.github.com/docs/codeql-overview/   http://www.pwntester.com/ https://en.wikipedia.org/wiki/Abstract_syntax_tree   https://en.wikipedia.org/wiki/Control_flow_analysis https://github.com/github/codeql-learninglab-actions https://github.com/anticomputer/emacs-codeql/    Special thanks too: We want to give a huge thanks to Github's Security Lab Team for making this episode a reality!

24 oct 2022 - 53 min
Soy muy de podcasts. Mientras hago la cama, mientras recojo la casa, mientras trabajo… Y en Podimo encuentro podcast que me encantan. De emprendimiento, de salid, de humor… De lo que quiera! Estoy encantada 👍
MI TOC es feliz, que maravilla. Ordenador, limpio, sugerencias de categorías nuevas a explorar!!!
Me suscribi con los 14 días de prueba para escuchar el Podcast de Misterios Cotidianos, pero al final me quedo mas tiempo porque hacia tiempo que no me reía tanto. Tiene Podcast muy buenos y la aplicación funciona bien.
App ligera, eficiente, encuentras rápido tus podcast favoritos. Diseño sencillo y bonito. me gustó.
contenidos frescos e inteligentes
La App va francamente bien y el precio me parece muy justo para pagar a gente que nos da horas y horas de contenido. Espero poder seguir usándola asiduamente.

Empieza 30 días de prueba

4,99 € / mes después de la prueba.Cancela cuando quieras.

Podcasts exclusivos

Sin anuncios

Podcast gratuitos

Audiolibros

20 horas / mes

Prueba gratis

Sólo en Podimo

Audiolibros populares