The InfoSec & OSINT Show

The InfoSec & OSINT Show

The weekly podcast presents a roundup of the latest information security news, open source intelligence and pen testing tips as well as techniques to improve your online security.

Episodes

35 - Ed Bellis & Risk Based Vulnerability ManagementEpisode 35 Show Notes
34 - John Strand & Moving Beyond 0-DaysEpisode 34 Show Notes
33 - Tanya Janca & Coding SecurelyEpisode 33 Show Notes
32 - Or Katz & Phishing Evasion TechniquesEpisode 32 Show Notes
31 - Chris Rock & Cyber MercenariesEpisode 31 Show Notes
30 - Hakluke & The Bug Bounty MindsetEpisode 30 Show Notes
29 - Katie Moussouris & Running Bug BountiesEpisode 29 Show Notes
28 - ST├ľK and Hunting Bug BountiesEpisode 28 Show Notes
27 - Joona Hoikkala and Advanced FFuF ScanningEpisode 27 Show Notes
26 - James Kettle and Becoming a Security ResearcherEpisode 26 Show Notes
25 - Jeremiah Grossman and Asset InventoryEpisode 25 Show Notes
24 - Ira Winkler & How to Stop StupidEpisode 24 Show Notes
23 - Samy Kamkar & Reverse EngineeringEpisode 23 Show Notes
22 - Chris Kubecka & Hacking the World with OSINTEpisode 22 Show Notes
21 - HD Moore & Advanced Asset Inventory TechniquesEpisode 21 Show Notes
20 - Robert Baptiste (Elliot Anderson) & Mobile App HackingEpisode 20 Show Notes
19 - Tommy Devoss (Dawgyg) & Bug Bounty Hunting on SteroidsEpisode 19 Show Notes
18 - Simon Bennetts & Headless Automated Scanning with ZAPEpisode 18 Show Notes
17 - Matthias Wilson & Using OSINT Against Nigerian ScammersEpisode 17 Show Notes
16 - Ty Miller & Security AutomationEpisode 16 Show Notes
15 - Chris Dale & Breaking up Recon from the Pen TestEpisode 15 Show Notes
14 - Andrew van der Stock & the Future of OWASPEpisode 14 Show Notes
13 - Advanced Passive Recon with the Amass Scripting EngineEpisode 13 Show Notes
12 - Brute force more effectively with custom wordlistsEpisode 12 Show Notes
11 - Hacking from the command line with Bash and VimEpisode 11 Show Notes
10 - Server Side Request Forgery Attacks and BypassesEpisode 10 Show Notes
9 - Automating Recon - Mapping Your Target EffectivelyEpisode 9 Show Notes
8 - Domain and Network Recon using Amass - Mapping the Attack SurfaceEpisode 8 Show Notes
7 - GitHub Reconnaissance - Finding the needle in the HaystackEpisode 7 Show Notes
6 - Hunting Open Elasticsearch Databases for Fun and ProfitEpisode 6 Show Notes
5 - Asset Inventory for Red Teamers and OSINT InvestigatorsEpisode 5 Show Notes
4 - Infosec News & Website AttributionEpisode 4 Show Notes
3 - Infosec News & Reverse Image SearchEpisode 3 Show Notes
2 - InfoSec News & Cyber Attribution with Canary TokensEpisode 2 Show Notes
1 - Zoom Security Risks & Anonymous LinkedIn SearchesEpisode 1 Show Notes