The InfoSec & OSINT Show

The InfoSec & OSINT Show

The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own InfoSec & OSINT skills.

Episodes

60 - AJ Yawn & Automating AWS SecurityEpisode 60 Show Notes
59 - Tim Adams & DNS FilteringEpisode 59 Show Notes
58 - Ryan Dewhurst & Securing WordPressEpisode 58 Show Notes
57 - Ben Dowling & IP GeolocationEpisode 57 Show Notes
56 - Assaf Dahan & Ransomware TrendsEpisode 56 Show Notes
55 - Charlie Belmer & NoSQL InjectionEpisode 55 Show Notes
54 - Jeff Foley & Asset Discovery with AmassEpisode 54 Show Notes
53 - hashcat 101Episode 53 Show Notes
52 - InfoSec News & AnalysisEpisode 52 Show Notes
51 - Jim Manico & Developing SecurelyEpisode 51 Show Notes
50 - pdp (Petko Petkov) & Automating Pownage with PownJSEpisode 50 Show Notes
49 - Gabrielle Botbol & Becoming a Pen TesterEpisode 49 Show Notes
48 - Paulino Calderón & Practical IoT HackingEpisode 48 Show Notes
47 - Christian Folini & The Core Rule SetEpisode 47 Show Notes
46 - InfoSec News & AnalysisEpisode 46 Show Notes
45 - John Hammond & Hacking CTFsEpisode 45 Show Notes
44 - Ted Harrington & Doing Application Security RightEpisode 44 Show Notes
43 - Robert "RSnake" Hansen & The Future of Data PrivacyEpisode 43 Show Notes
42 - Charles Shirer & Pen Testing with No Money DownEpisode 42 Show Notes
41 - Chris Hadnagy & Human HuckingEpisode 41 Show Notes
40 - Fabio Viggiani & Supply Chain AttacksEpisode 40 Show Notes
39 - Josh Sokol & Managing Risk SimplyEpisode 39 Show Notes
38 - Tyrone Wilson & Breaking Into the Security IndustryEpisode 38 Show Notes
37 - Jenny Radcliffe & People HackingEpisode 37 Show Notes
36 - Tracy Maleef & Empathy Based InfoSecEpisode 36 Show Notes
35 - Ed Bellis & Risk Based Vulnerability ManagementEpisode 35 Show Notes
34 - John Strand & Moving Beyond 0-DaysEpisode 34 Show Notes
33 - Tanya Janca & Coding SecurelyEpisode 33 Show Notes
32 - Or Katz & Phishing Evasion TechniquesEpisode 32 Show Notes
31 - Chris Rock & Cyber MercenariesEpisode 31 Show Notes
30 - Hakluke & The Bug Bounty MindsetEpisode 30 Show Notes
29 - Katie Moussouris & Running Bug BountiesEpisode 29 Show Notes
28 - STÖK and Hunting Bug BountiesEpisode 28 Show Notes
27 - Joona Hoikkala and Advanced FFuF ScanningEpisode 27 Show Notes
26 - James Kettle and Becoming a Security ResearcherEpisode 26 Show Notes
25 - Jeremiah Grossman and Asset InventoryEpisode 25 Show Notes
24 - Ira Winkler & How to Stop StupidEpisode 24 Show Notes
23 - Samy Kamkar & Reverse EngineeringEpisode 23 Show Notes
22 - Chris Kubecka & Hacking the World with OSINTEpisode 22 Show Notes
21 - HD Moore & Advanced Asset Inventory TechniquesEpisode 21 Show Notes
20 - Robert Baptiste (Elliot Anderson) & Mobile App HackingEpisode 20 Show Notes
19 - Tommy Devoss (Dawgyg) & Bug Bounty Hunting on SteroidsEpisode 19 Show Notes
18 - Simon Bennetts & Headless Automated Scanning with ZAPEpisode 18 Show Notes
17 - Matthias Wilson & Using OSINT Against Nigerian ScammersEpisode 17 Show Notes
16 - Ty Miller & Security AutomationEpisode 16 Show Notes
15 - Chris Dale & Breaking up Recon from the Pen TestEpisode 15 Show Notes
14 - Andrew van der Stock & the Future of OWASPEpisode 14 Show Notes
13 - Advanced Passive Recon with the Amass Scripting EngineEpisode 13 Show Notes
12 - Brute force more effectively with custom wordlistsEpisode 12 Show Notes
11 - Hacking from the command line with Bash and VimEpisode 11 Show Notes
10 - Server Side Request Forgery Attacks and BypassesEpisode 10 Show Notes
9 - Automating Recon - Mapping Your Target EffectivelyEpisode 9 Show Notes
8 - Domain and Network Recon using Amass - Mapping the Attack SurfaceEpisode 8 Show Notes
7 - GitHub Reconnaissance - Finding the needle in the HaystackEpisode 7 Show Notes
6 - Hunting Open Elasticsearch Databases for Fun and ProfitEpisode 6 Show Notes
5 - Asset Inventory for Red Teamers and OSINT InvestigatorsEpisode 5 Show Notes
4 - Infosec News & Website AttributionEpisode 4 Show Notes
3 - Infosec News & Reverse Image SearchEpisode 3 Show Notes
2 - InfoSec News & Cyber Attribution with Canary TokensEpisode 2 Show Notes
1 - Zoom Security Risks & Anonymous LinkedIn SearchesEpisode 1 Show Notes