Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526

Your WAF is not safe! Sven Morgenroth, a Security Researcher at Netsparker, blows Paul’s mind with his ninja-esque input filter bypass skills in this technical segment! Full Show Notes Subscribe to YouTube Channel

The post Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526 appeared first on Security Weekly.

Continue reading Bypassing Input Filters with Sven Morgenroth, Netsparker – Paul’s Security Weekly #526

Paul’s Printer Hacking Adventures – Paul’s Security Weekly #525

Printer attacks have been around for some time. Paul describes some of the latest techniques and research into printer hacking, including capturing print jobs, manipulating print jobs and other attacks. These are useful on penetration tests (believe it or not). Defenders take note, printers must be on your radar. Run PJL Commands: printer:/> site @PJL […]

The post Paul’s Printer Hacking Adventures – Paul’s Security Weekly #525 appeared first on Security Weekly.

Continue reading Paul’s Printer Hacking Adventures – Paul’s Security Weekly #525

VaporTrail with Larry Pesce and Galen Alderson, InGuardians – Paul’s Security Weekly #524

Larry and his intern, Galen Alderson, present a demo of their Vaportrail project! Galen shows us how to exfiltrate data from networks using broadcast FM radio and other inexpensive materials. Full Show Notes Subscribe to YouTube Channel

The post VaporTrail with Larry Pesce and Galen Alderson, InGuardians – Paul’s Security Weekly #524 appeared first on Security Weekly.

Continue reading VaporTrail with Larry Pesce and Galen Alderson, InGuardians – Paul’s Security Weekly #524

Tech Segment: RITA, John Strand – Enterprise Security Weekly #55

John Strand from Black Hills Information Security, does a tech segment on real intelligence threat analytics. How it works, how you can get it up and running, how easy it is to get started, and what you can actually get out of the tool fairly quickly. Full Show Notes Visit http://securityweekly.com/esw for all the latest […]

The post Tech Segment: RITA, John Strand – Enterprise Security Weekly #55 appeared first on Security Weekly.

Continue reading Tech Segment: RITA, John Strand – Enterprise Security Weekly #55

Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523

Almog Ohayon of Javelin Networks pits Javelin ADProtect against Microsoft ATA in an epic threat analytics showdown! Full Show Notes Subscribe to YouTube Channel

The post Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523 appeared first on Security Weekly.

Continue reading Javelin ADProtect vs. Microsoft ATA with Almog Ohayon – Paul’s Security Weekly #523

Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523

Sven Morgenroth of Netsparker joins us to expound upon an original blog post on bypassing corporate firewalls and vulnerable web applications in this technical segment! Full Show Notes Subscribe to YouTube Channel

The post Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523 appeared first on Security Weekly.

Continue reading Bypassing Corporate Firewalls with Sven Morgenroth, Netsparker – Paul’s Security Weekly #523

Hardening Software RNGs with Don Pezet, ITProTV – Paul’s Security Weekly #522

This is a random technical segment on implementing random number generators in Linux. Don shows us the ins and outs of the entropy pool, the different between /dev/random and /dev/urandom, and some awesome hardware that can increase entropy. Full Show Notes Subscribe to YouTube Channel

The post Hardening Software RNGs with Don Pezet, ITProTV – Paul’s Security Weekly #522 appeared first on Security Weekly.

Continue reading Hardening Software RNGs with Don Pezet, ITProTV – Paul’s Security Weekly #522

Demystifying the Art of Hunting with Paul Ewing, Endgame – Paul’s Security Weekly #521

Paul Ewing from Endgame talks about the different types of threat hunting (network, host and logs) and the pros and cons of each! Full Show Notes Subscribe to YouTube Channel

The post Demystifying the Art of Hunting with Paul Ewing, Endgame – Paul’s Security Weekly #521 appeared first on Security Weekly.

Continue reading Demystifying the Art of Hunting with Paul Ewing, Endgame – Paul’s Security Weekly #521

Domain Admin in Active Directory, Guy Franco – Paul’s Security Weekly #520

Guy came on the show and gave a live demo on how to become Domain Admin in an Active Directory environment, and keep those privileges for 20+ years. Guys shows us how to abuse service accounts to get yourself a golden ticket. Then shows how the Javelin Networks technology can be used to detect, prevent […]

The post Domain Admin in Active Directory, Guy Franco – Paul’s Security Weekly #520 appeared first on Security Weekly.

Continue reading Domain Admin in Active Directory, Guy Franco – Paul’s Security Weekly #520

Tech Segment: Managing AWS Cloud Resources, Apollo Clark – Enterprise Security Weekly #51

Apollo Clark discusses the tools and techniques your team can use to manage, monitor and tune your enterprise AWS deployment. How to Manage AWS Cloud Resources The Triangle of Security Success states: “Every good sales pitch involves triangles facing up or down.” – Andy Sutcliffe Inventory Management Resources State Management Default, weak, reused passwords, shared […]

The post Tech Segment: Managing AWS Cloud Resources, Apollo Clark – Enterprise Security Weekly #51 appeared first on Security Weekly.

Continue reading Tech Segment: Managing AWS Cloud Resources, Apollo Clark – Enterprise Security Weekly #51