The InfoSec & OSINT Show

The InfoSec & OSINT Show

The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own InfoSec & OSINT skills.

Episodes

Episode 80 | Psychology and Ransomware
Episode 79 | Mastering The Science Behind Social Engineering
Episode 78 | The 3 Root Causes of Ransomware
Episode 77 | Collecting Threat Intel For Good
Episode 76 | Automating Attack Surface Management
75 - Jeff Man - From the NSA to PCI
74 - Brett Johnson & Online Crime
73 - Higinio Ochoa & Hacking with Anonymous
72 - Nathan Sweaney & The Future of Privacy
71 - Peter Taylor & Fraud Detection
70 - Bob Diachenko & Hunting Open Databases
69 - James Linton & The Email Prankster
68 - Christian Espinosa & Tactical Communication
67 - Evan Francen & Security Fundamentals
66 - Matt Danner & Digital Forensics
65 - Martina Dove PhD & The Psychology of Scams
64 - Daniel Cuthbert & Pen Testing with the ASVS
63 - Nico "Dutch_Osintguy" Dekens & Leveraging Telegram in OSINT
62 - Alissa Knight & Hacking Cars
61 - Robert Graham & Large Scale Port Scanning w/Masscan
60 - AJ Yawn & Automating AWS Security
59 - Tim Adams & DNS Filtering
58 - Ryan Dewhurst & Securing WordPress
57 - Ben Dowling & IP Geolocation
56 - Assaf Dahan & Ransomware Trends
55 - Charlie Belmer & NoSQL Injection
54 - Jeff Foley & Asset Discovery with Amass
53 - hashcat 101
52 - InfoSec News & Analysis
51 - Jim Manico & Developing Securely
50 - pdp (Petko Petkov) & Automating Pownage with PownJS
49 - Gabrielle Botbol & Becoming a Pen Tester
48 - Paulino Calderón & Practical IoT Hacking
47 - Christian Folini & The Core Rule Set
46 - InfoSec News & Analysis
45 - John Hammond & Hacking CTFs
44 - Ted Harrington & Doing Application Security Right
43 - Robert "RSnake" Hansen & The Future of Data Privacy
42 - Charles Shirer & Pen Testing with No Money Down
41 - Chris Hadnagy & Human Hacking
40 - Fabio Viggiani & Supply Chain Attacks
39 - Josh Sokol & Managing Risk Simply
38 - Tyrone Wilson & Breaking Into the Security Industry
37 - Jenny Radcliffe & People Hacking
36 - Tracy Maleef & Empathy Based InfoSec
35 - Ed Bellis & Risk Based Vulnerability Management
34 - John Strand & Moving Beyond 0-Days
33 - Tanya Janca & Coding Securely
32 - Or Katz & Phishing Evasion Techniques
31 - Chris Rock & Cyber Mercenaries
30 - Hakluke & The Bug Bounty Mindset
29 - Katie Moussouris & Running Bug Bounties
28 - STÖK and Hunting Bug Bounties
27 - Joona Hoikkala and Advanced FFuF Scanning
26 - James Kettle and Becoming a Security Researcher
25 - Jeremiah Grossman and Asset Inventory
24 - Ira Winkler & How to Stop Stupid
23 - Samy Kamkar & Reverse Engineering
22 - Chris Kubecka & Hacking the World with OSINT
21 - HD Moore & Advanced Asset Inventory Techniques
20 - Robert Baptiste (Elliot Anderson) & Mobile App Hacking
19 - Tommy Devoss (Dawgyg) & Bug Bounty Hunting on Steroids
18 - Simon Bennetts & Headless Automated Scanning with ZAP
17 - Matthias Wilson & Using OSINT Against Nigerian Scammers
16 - Ty Miller & Security Automation
15 - Chris Dale & Breaking up Recon from the Pen Test
14 - Andrew van der Stock & the Future of OWASP
13 - Advanced Passive Recon with the Amass Scripting Engine
12 - Brute force more effectively with custom wordlists
11 - Hacking from the command line with Bash and Vim
10 - Server Side Request Forgery Attacks and Bypasses
9 - Automating Recon - Mapping Your Target Effectively
8 - Domain and Network Recon using Amass - Mapping the Attack Surface
7 - GitHub Reconnaissance - Finding the needle in the Haystack
6 - Hunting Open Elasticsearch Databases for Fun and Profit
5 - Asset Inventory for Red Teamers and OSINT Investigators
4 - Infosec News & Website Attribution
3 - Infosec News & Reverse Image Search
2 - InfoSec News & Cyber Attribution with Canary Tokens
1 - Zoom Security Risks & Anonymous LinkedIn Searches