Hacker Talk brings you interesting conversation between some of the world best hackers, cyber security professionals and information security people.
The podcast Hacker Talk is created by Firo Solutions LTD. The podcast and the artwork on this page are embedded on this page using the public podcast feed (RSS).
Hacker Talk 2024 New Year Special
Featuring:
Johnny Xmas, Zagros Bingol and Filip Kalebo.
Topics:
infosec's 9/11 - Target.com breach
Leaking TSA master keys
Starting to work in information security
How the information security space has changed
The hackers we lost along the way
RIP Kevin Mitnick
RIP hacker legend Robert “Ozzie” Osband (Richard Cheshire, The Cheshire Catalyst)
2600
Hackers on planet earth
Crowd strike
Trends we have seen in 2024
AI as a trend
The future of AI
Training models
AI being used to fingerprint user activity
AI in continuous integration pipelines
Code Reviews
Backdoor in tar
Vulnerabilities in the linux kernel
Risks of using opensource
Exploit brokers
OSS Fuzz
Fuzzing
Quantum computers
Cray super computers
Michelle Simmons creates a quantum computer at home
National cryptology museum in Washington dc
40 years since Chaos Computer club, 2600 and Cult of the deadcow
Chaos computer camp
Bornhack
toorcamp
hope conference
Defcon
Cult of the deadcow
Veilid
Bluesky
Decentralized technologies
Hawk tuah
Modern Scams
Web3 and Web2
Privacy
Downfall of telegram
Telegram giving up on privacy
SimpleX chat, signal and imessage
Future
External Links:
https://en.wikipedia.org/wiki/XZ_Utils_backdoor
https://www.metafilter.com/203126/Tar-Trap-Caught
https://en.wikipedia.org/wiki/Hack-Tic
https://en.wikipedia.org/wiki/Chaos_Communication_Camp
https://toorcamp.org/experience/
https://infocondb.org/presenter/richard-cheshire-the-cheshire-catalyst
https://www.imdb.com/name/nm1937010/
https://hope.net/memoriam.html
https://blog.rust.careers/post/veilid_dildog_rust_interview/
https://bornhack.dk/bornhack-2025/
https://en.wikipedia.org/wiki/DEF_CON
https://en.wikipedia.org/wiki/Pavel_Durov
https://www.bbc.com/news/articles/cvglp0xny3eo
https://en.wikipedia.org/wiki/Bluesky
https://googleprojectzero.blogspot.com/2024/10/from-naptime-to-big-sleep.html
https://google.github.io/oss-fuzz/research/llms/target_generation/
https://www.visitacity.com/en/washington-dc/attractions/the-national-cryptologic-museum
https://www.youtube.com/watch?v=bRj4ipIEmg0
https://www.msn.com/en-us/entertainment/celebrities/hawk-tuah-girl-haliey-welch-vanishes-after-crypto-scam-accusations-has-not-been-seen-online-for-weeks/ar-AA1waGkW
https://support.apple.com/en-us/102637
https://en.wikipedia.org/wiki/Signal_(software)
https://en.wikipedia.org/wiki/Moxie_Marlinspike
The hardware hacker, creator of the wifi-nugget, cybersecurity content creator, hak5 host and our guest of honor in this episode of Hacker Talk is Alex Lynd!
In this episode, we cover:
Alex background, working with hak5, content creation
O.MG pentesting cable
Signal intelligence
Wifi hacking
Hardware hacking
Modifying the hardware of calculators, playing games on calculators
Hacking the texas instrument ti 84 calculator
Alex's first computer being the raspberry pi
Starting with Linux
Embedded security
Hardware developer perspective
Making hardware devices
Making low-cost hacking devices
low cost, high availability and effective hacking devices
GPS implants
ESP8266, 3 dollar wifi microcontroller
Wardriving with esp8266
wifi nugget
Making cat-shaped hardware
Making a friendly and portable hardware design
Learning about wifi hacking and microcontrollers
USB nugget
USB rubber ducky
Keystroke injection attacks
ATtiny85 Arduino
Thought process behind creating the wifi nugget
How Filip cracked his neighbors wifi
Aircrack-ng
Airgeddon
Creating a DIY beginner hardware kit
The creation of wifi nugget, the first 100 devices
SpaceHuhn Maker
Wifi Beacon spoofing pranks
esp32 vs esp8266 wifi chip
Crafting custom packets with the esp8266 chip
Espressif Systems trying to stop people from using it's wifi chips for offensive purposes by locking down its software development kit.
Spoofing attacks
esp32 native USB mode
EMulating USB connected devices for data exfiltration
Auto trunked packets
pmkid wifi attack
Cracking wpa2 handshakes
Guessing autogenerated wifi passwords
Hashcat
Password generator based on your local area code
The best password-cracking word list Filip has ever used
Funny pranks with the wifi nugget
Nugget defender, see if anyone is attacking your network
use Canary tokens to detect if someone is breaking into your system
Bugged microsoft word and pdf documents
Having an intrusion detection system in your pocket
wifi honeypots
Getting started designing custom printed circuit boards(PCB)
Design with easyeda
Creating a tv-be-gone
Sourcing pcb boards
Circuit board art
What software to use to create boards
Antenna design
Omni directional antennas
Yagi antennas
Sourcing hardware
Making it more user friendly
Links:
https://mg.lol/blog/omg-cable/
https://github.com/HakCat-Tech/WiFi-Nugget
https://education.ti.com/en/products/calculators/graphing-calculators/ti-84-plus
https://en.wikipedia.org/wiki/Raspberry_Pi
https://en.wikipedia.org/wiki/ESP8266
https://shop.hak5.org/products/usb-rubber-ducky
https://en.wikipedia.org/wiki/ATmega328
https://en.wikipedia.org/wiki/Arduino_Nano
https://www.pcboard.ca/mini-attiny85-usb
https://www.arrow.com/en/research-and-events/articles/attiny85-arduino-tutorial
https://github.com/derv82/wifite2
https://en.wikipedia.org/wiki/Aircrack-ng
https://www.kali.org/tools/airgeddon/
https://github.com/SpacehuhnTech/esp8266_deauther
https://ieeexplore.ieee.org/document/4529384/
https://en.wikipedia.org/wiki/ESP32
https://en.wikipedia.org/wiki/Wi-Fi_Protected_Access
https://colab.research.google.com/
https://en.wikipedia.org/wiki/Hashcat
https://github.com/danielmiessler/SecLists
https://github.com/HakCat-Tech/Nugget-Invader
https://canarytokens.org/generate
https://en.wikipedia.org/wiki/Nordic_Semiconductor
Sam Bent, previously by his online handle as the Darknet Vendor "2happytimes2" is our Hacker of the episode!
In this episode of Hacker Talk we get to hear, how Sam put toghter an Opsec plan that ended up protecting him against a 20 count indetment and 200 years in prison. Thanks to a bruteforce attack in the true hacker spirit he managed to get out of prison.
What is it like to apply strong operation security practices in your everyday life? How does one survive and adapt to hostile environments?
Join us in this thrill seeking episode of Hacker Talk, where we get to hear Sam's story.
In this episode we cover:
Darknet Vendor, Darknet Marketplaces
Darknet Forum Administrator
First Introduction to Tor
Silkroad,
Early Bitcoin days
Bitcoin Pizza for 20 000 Bitcoins
Moderating darknet forums
Money laundering charges
Privacy
Journey into selling on the darknet
Residential Security
Living in Vermont, United States of America
Computer support
Forming information security policies
Backtraq 2(Released March 2007)
Yagi antenna, randomizing your mac address before you use your neighbors wifi
Removing DNA from packages.
Speaking at Defcon
Dealing with the Department of Homeland security
Social Engineering
Operation security
Dread Darknet Forum
Dealing with Hostile Environments on the darknet and in prison
Profiling yourself
Importance of Adoptability
Managing multiple identities
Pretty good privacy(PGP)
Trust on the Darknet
Resumes on the Darknet
Best practices for Password Managers
Storing password's in "The Slip", secure convenience security
How to ship mail securely
Interacting with the united states judicial system
Franks hearing
Becoming a paralegal in Prison
Writing a 200-page passion of release motion
Building trust in Online Communities
Links:
Doingfedtime Youtube channel: https://www.youtube.com/@DoingFedTime
Bitcoin talk pizza thread: https://bitcointalk.org/index.php?topic=137.0
https://en.wikipedia.org/wiki/Vermont
https://en.wikipedia.org/wiki/BackTrack
Sam's defcon talk: https://www.youtube.com/watch?v=NGiUhjuB22Y
https://www.16personalities.com/
https://en.wikipedia.org/wiki/Pretty_Good_Privacy
https://en.wikipedia.org/wiki/Silk_Road_(marketplace)
https://forum.defcon.org/node/241998
https://www.darknetstats.com/seasoned-dark-web-vendor-2happytimes2-sentenced-to-5-years-in-prison/
Our Hacker of the episode is "Vickie lii"! Vickie tells us about Bug Bounties, her new book and information security.
Tune in now!
In this episode we cover:
Background, getting into security
Getting into Bug Bounty
First Bug bounty
Hackerone, Bug crowd
Reporting Security Bugs
Coordinating bug bounties
Life as a bug bounty hunter
Interaction with engineers
Bug bounty bootcamp Book
Security as a hobby
Writing Books
How to hack web applications
Vickie's favourite types of Vulnerabilities
Template injection
IDOR
Writers block
Nostarch
Book Publishing
Bug bounty tools
Python and Bash
Make bug bounties more enjoyable
Portswinger Lab
Finding low hanging fruits
legal harbor
Caring about security researchers
Links:
https://twitter.com/vickieli7
https://en.wikipedia.org/wiki/Bug_bounty_program
https://vickieli.dev/
https://portswigger.net/web-security/all-labs
https://portswigger.net/research/server-side-template-injection
https://www.geeksforgeeks.org/insecure-direct-object-reference-idor-vulnerability/
https://nostarch.com/bug-bounty-bootcamp
Grab a copy of Vickie's book:
https://www.amazon.com/Bug-Bounty-Bootcamp-Reporting-Vulnerabilities-ebook/dp/B08YK368Y3
In this episode of Hacker Talk:
One of the most powerful newer static analysis tool is CodeQL.
By converting your code base into a Codeql database, you can now write
queries in a read-only way, in order to find security vulnerabilities
and problems in you Code-base.
We wanted to know more about this declarative language called "CodeQL".
Straight from Github's Security Lab, we are joined by Alvaro Munoz!
Alvaro, is a Security Researcher, Leads a team of researchers that leverage Codeql to find and model vulnerabilities at Github, with a background in research related to finding remote code execution bugs through deserialization.
Tune in as we get to hear the ins and out of CodeQL, how to get started, when Codeql was used to find a vulnerability in a public Covid-19 system, how to find vulnerabilities with Codeql and a lot more!
Topics covered:
Learning to thing outsite the box by playing Capture the flag
CodeQL declarative languages
Static code analysis
Getting a broad view of the source code
Writing queries with CodeQL to find vulnerabilities
Modeling vulnerabilities with CodeQL
The learning curve of CodeQL
Quering github repositories for vulnerabilities
Write codeql for a large amount of repositories with lgtm(use it goes before it goes EOL)
Linters vs codeql
CodeQL integrated with continuous integration pipelines
Get started with Codeql
Submit your codeql queries to Github Security Lab's Bug bounty
Best practices for writing queries
Thinking of the code as a database with codeql
Finding vulnerabilities in Covid-19 systems
Best pratices for CodeQL
Reduce false possitives
CodeQL with nvim(neovim)
Improving vim by creating a more interactive development enviroment alternative, "neovim".
LSP integration with neovim.
CodeQL with Emacs
Remote code execution bugs found with CodeQL.
Bugs found in Radar Covid App
Patterns leading to remote code execution
Auditing javascript frameworks
CodeQL vs other static analysis tools
Capture the flag codeql challanges
The future of CodeQL
External links:
https://en.wikipedia.org/wiki/Language_Server_Protocol
https://en.wikipedia.org/wiki/Semgrep
Covid 19 tracing app
- https://securitylab.github.com/research/securing-the-fight-against-covid19-through-oss/
- https://threatpost.com/german-covid-19-contact-tracing-vulnerability-rce/161419/
Github Security Lab web site: https://securitylab.github.com/
Join Github Security Lab Slack Channel:
https://join.slack.com/t/ghsecuritylab/shared_invite/zt-120w4vby8-_O9u9k2hPfgbju1tddBPcg
https://twitter.com/pwntester
Bounty program: https://securitylab.github.com/bounties/
https://codeql.github.com/
https://codeql.github.com/docs/codeql-overview/
http://www.pwntester.com/
https://en.wikipedia.org/wiki/Abstract_syntax_tree
https://en.wikipedia.org/wiki/Control_flow_analysis
https://github.com/github/codeql-learninglab-actions
https://github.com/anticomputer/emacs-codeql/
Special thanks too:
We want to give a huge thanks to Github's Security Lab Team for making this episode a reality!
In this episode of Hacker Talk, we are joined by the Hacker and SecBSD contributor: The BSDBandit!
Tune is as we deep into secbsd, the penetration distribution for the BSD community.
In this episode we cover:
Video games
Kali linux meets bsd
Started to hack in college
mandraka linux
FreeBSD 4.8 and beyond
BSD vs Linux
Reading the RFC's
IRIX
Learn from developer mailing lists
OpenBSD's mailing
The start of SECBSD - BSD based Penetration testing distribution
SecBSD, release cyckle
Documentation in the BSD world
NetBSD on toasters and sega dreamcast
Comparing the BSD's
Porting ruby Beef to BSD
Web applications as houses
Webb application api's
Security
Penetration testing
Management vs Security Researchers and developers
The adventures of Hacking and learning
The state of Hacking
Tinkering with FreeBSD
ManPages
Unix Powertools book
Vi Editor
Having fun with Technology
People code computers
Time allocation and having a good schedule
Rust programming
Visual code studio
Pentesting with Rust
Mental health
Taking brakes, allocating
discord and Internet Relay Chat
Libera.chat irc
Irssi irc client
Phreakers going into VoIP
OpenBTS
IceCast
Future of IT-Security
Moving everything to the browser
Challenge of the episode:
The BSDBandit challenges you to read one man page per day for one year
Links:
https://en.wikipedia.org/wiki/Mandriva_Linux
https://www.freebsd.org/releases/4.8R/announce/
https://twitter.com/SecBSD
https://rfcs.io/http
https://www.rfc-editor.org/rfc/
https://en.wikipedia.org/wiki/IRIX
https://en.wikipedia.org/wiki/Sub7
https://marc.info/?l=openbsd-misc&r=1
https://www.openbsd.org/faq/ports/guide.html
https://twitter.com/CryptoBanshee_
https://beefproject.com/
https://www.oreilly.com/library/view/unix-power-tools/0596003307/
https://www.amazon.com/UNIX-PowerTools-Jerry-Peek/dp/1565922603
https://en.wikipedia.org/wiki/Vim_(text_editor)
https://en.wikipedia.org/wiki/Vi
https://twitter.com/bsdbandit
https://crates.io/
https://www.rust-lang.org/
https://github.com/bsdbandit
https://crates.io/crates/pledge
https://en.wikipedia.org/wiki/Ghostscript
https://en.wikipedia.org/wiki/Discord
https://en.wikipedia.org/wiki/Irssi
https://en.wikipedia.org/wiki/2600%3A_The_Hacker_Quarterly
https://libera.chat/
https://en.wikipedia.org/wiki/OpenBTS
https://icecast.org/
Hacker Talk is back! Stronger than ever with a new episode, in this episode we are all about Podman!
Joining us today is Dan Walsh. One of the main people behind Podman! Dan is very knowledgeable in the (oci)container security world. We are super happy to have him on Hacker Talk and hear about Podman.
Topics:
Podman
Podman in action book
Dan's journey into Unix and Linux
Following Paul cormia to redhat, CEO of redhead
Redhat, working on pre-vpn
Working on se-linux
Container technology
Security for openshift
Being integrated with docker
Oci images and runtimes
Fork and exec
Security in containers
Docker daemon
Design behind podman
Better security in podman
Combining podman with kubernetics
Docker Vs systemd
Full integration with systemd
Buildah, docker build with podman
Background story of buildah
Overhead in containers
Get started with migrating infrastructure to podman
Gitlab runners with podman
Podman on non-linux systems
Docker starting to charge for Windows and Mac
Podman desktop gui
Linux security
Sec-comp
Land lock security mitigation in the Linux kernel
SE-linux
Encrypted virtual machines
Intel-sgx with KVM virtual machines
Trusting proprietary CPU encrypted environments
Encrypted workloads
Security at the hardware level
Links
https://www.manning.com/books/podman-in-action
Se-linux
Podman
Docker
https://www.youtube.com/watch?v=MmUwrP791sI
Replacing docker with Podman
Buildah
Docker starts to charge for usage
Read Dan's book:
https://www.manning.com/books/podman-in-action
Find more episodes of Hacker Talk at:
https://anchor.fm/hacker-talk
Subscribe to Hacker Talk's RSS feed:
https://anchor.fm/s/7984c230/podcast/rss
In this episode of Hacker Talk, we are joined by the social engineer, windows security ninja, hacker and security researcher Mattias Borg.
Tune is as we get to hear about scam calls and social engineering!
In this episode we cover:
Social Engineering
Micro-expressions
How long can you get with scam calls?
Windows Security Best practices
Dealing with scam callers
Getting more information from scam call center
What happens when people fall for scam callers.
Educating others
Links:
The Art of Human Hacking
https://en.wikipedia.org/wiki/Christopher_J._Hadnagy
https://twitter.com/MattiasBorg82
https://blog.sec-labs.com/
https://www.youtube.com/watch?v=YsznWl0Wc4I
https://www.youtube.com/watch?v=1zTsfs4Q6IY
For feedback and guest suggestions, email:
podcast at firosolutions dot com
In this episode of Hacker Talk, we are joined by the amazing Hacker, G0t mi1k! G0t mi1k is part of the offensive security team and he also runs the database of vulnerable virtual machines, called Vulnhub.
Topics:
Background
Getting into infosec
Becoming a moderator
First remote shell
Backtrack
Offensive security
Start and background story of Vulnhub.com
Encouraging people to run virtual machines
Hoarding data, hosting virtual machine images
The start of Exploit-db, milw0rm
Curating exploits
Running virtual machines with Proxmox home lab and vmwareVMware
Best practices for protecting internet facing virtual machines
Locking down machines
The rise and fall of port knocking
Single Packet Authorization
Learning security by doing
Understanding the entire circle of it security.
Exploits in Fail2ban
Writing a book as a dyslexic
The importance of changing the pace of Life. Taking time away from the Keyboard.
Working from home
External links:
https://en.wikipedia.org/wiki/Proxmox_Virtual_Environment
https://en.wikipedia.org/wiki/Fail2ban
https://en.wikipedia.org/wiki/Port_knocking
https://research.securitum.com/fail2ban-remote-code-execution/
Today we are joined by: Mike Spicer, the builder of the Wifi Cactus, someone you can see walking around various security conference
with a backpack filled with wireless monitoring goodies :)
Mike wanted to see what was really happening on one of the most dangerous wifi networks in the world, this and a lot more in this episode of Hacker Talk.
In this episode we cover:
Questioning the dangerous assumption
How dangerous is Defcon's network really?
Dialup internet, warez, Hacking, Tinkering, and programming
The movie Hackers from 1995
Wardriving, driving around to find internet, Orinoco gold wireless card
WiFi
Starting a startup wireless internet service provider company
Software-defined radio
Hacking Radiofrequency
LoRa
Helium Lori hardware
Things network Lori iot
Amazon sidewalk
Interconnected devices
900megahertz
OpenBTS BladeRF
3g stingrays
WiFi Cactus, wifi kraken
Wardriving with wireless antennas
Pitfalls with airodump
Wireless captures
Wireless standards, going to WiFi 6
From one box to twelve
25 hak5 pineapples from Darren kitchen
Kismet, Andrew dragon(creator of kismet)
Intel nuc
Live streaming data from the WiFi Cactus
WiFi Cactus at Defcamp in Romania
Analyzing wardriving from security conferences
Pcapinator GitHub
Wireshark
Mdns, clear text,
DNS queries to slack
Building your own wardriving device
Wireless penetration tests
Intel ax220 PCI express WiFi adapter, 30-40 USD, native Linux support
Monitoring for wireless de-authentication attacks
Deploying kismet for detection with raspberry pi 4 with a 30usd Wireless adapter for starting to monitor their WiFi security
Best practices for cracking wpa2 handshakes with hashcat
Best security practices for setting up wireless networks
Links:
https://www.imagine41.com/product/orinoco-gold-wireless-networks-pc-card/
https://en.wikipedia.org/wiki/Software-defined_radio
https://en.wikipedia.org/wiki/Wardriving
https://twitter.com/d4rkm4tter
https://github.com/mspicer/pcapinator
https://www.wigle.net/
https://en.wikipedia.org/wiki/LoRa
https://www.helium.com
https://www.kismetwireless.net/
https://www.intel.com/content/www/us/en/products/sku/189347/intel-wifi-6-ax200-gig/specifications.html
We would like to give a special thanks to Feedspot for featuring us, we recommend that you check them out:
Welcome back to Hacker Talk!
This is part two of our conversation with Steven Phillips
Steven is a really interesting developer, hacker and thinker. I
personally enjoy reading his blog
tryingtobeawesome.com where he covers various parts of
programming, philosophy and software.
Topics:
"Machine Learning" being good or bad
Security with machine learning
Turning a stop light to a truck
Algorithms
What type of Artificial intelligence do we need for software
James Mickens
Generative Pre-trained Transformer 3
Solving bad human code datasets
Global code quality
How do we write good code?
The progress of software
how good Structured Query Language is
Secure codebase's
Pseudorandom
Clojure
Python
Golang
Vlang
Designing
The ethical source movement
Code Licenses
Internet Privacy
End-to-end encryption
Podman
Browser Extensions
Reaching the largest userbase for software
Web assembly
The onion router | Tor user adoption
AI-Powered Super Hackers are a real threat
and a lot more on Hacker Talk!
Links:
https://en.wikipedia.org/wiki/James_Mickens
https://en.wikipedia.org/wiki/GPT-3
https://en.wikipedia.org/wiki/SQL
https://en.wikipedia.org/wiki/Clojure
https://effective.af/
https://firstdonoharm.dev/
https://www.torproject.org/
https://github.com/13o-bbr-bbq/machine_learning_security/tree/master/DeepExploit
https://en.wikipedia.org/wiki/Go_(game)
View part one here:
https://anchor.fm/hacker-talk/episodes/Programmable-Philosophy-with-Steve-Phillips---Part-1-e1ju6b3
In this episode of Hacker Talk, we are joined by
Lucas Lundgren, is an impressive penetration tester, security researcher, and our Hacker of honor today.
Lucas is known for going out on the internet and finding interesting internet-facing protocols, he has found several internet-facing critical infrastructures, prison door systems, medical x-ray file storage servers(Pacs), earthquake systems, and a lot more!
In this episode we cover the following topics:
Journey into hacking, radio, commodore64, Amiga 500, cracking games
Time bomb viruses for Amiga 500 games
Finding vulnerabilities, getting invited to conferences to speak at 13
War dialing Amiga 500, phone phreaking with modern
Learning lock picking
building your own port scanner
Scanning the entire internet with Masscan from home with a 10gigabit connection
Parsing scan results with elastic search, grep, kibana
Mqtt - embedded protocol, finding and opening prison doors with MQTT,
Malware with MQTT brokers
Opening and closing doors in prisons in the UK
Atm's with MQTT
Changing oil pipelines pressure with
Finding protocols to scan the internet for
iscsi
Hacking x-ray machines
Finding hospitals x-ray records in Pax servers dating back to 1985
Problems with hospitals' x-ray storage servers
Reporting security vulnerabilities
Editing x-ray pictures,
Malware that adds black spots on the pictures and reuploads it.
Malware in metadata of the x-ray pictures
X-ray malware in the wild
Image recognition
Making fictional earthquakes
Remote code execution on doorbells
Hack-rf, software-defined radio
Wardriving
Hacking radio
Iridium
Weather satellites
Hacking satellites
Breaking into a gas pump with wooden straws
Physical penetration testing
Links:
https://github.com/robertdavidgraham/masscan
https://en.wikipedia.org/wiki/MQTT
https://en.wikipedia.org/wiki/Picture_archiving_and_communication_system
https://www.youtube.com/watch?v=o7qDVZr0t2c
https://en.wikipedia.org/wiki/Barnaby_Jack
Hackers on Plant Earth - Hope with Mitch Altman and Greg Newby
Hackers on Planet Earth(HOPE), is a biannual volunteer-driven hacker conference that got started in 1994. On the hacking and phone phreaking's magazine 2600 10th anniversary. In this episode of Hacker Talk, we are joined by two hackers that are behind the curtain at the HOPE conference.
Greg Newby and Mitch Altman are both two impressive Hackers, helping the
HOPE conference be the amazing hacking conference it is today.
In this episode we cover:
How Hope has evolved during the years
Greg and Mitch's journey's into the hacking mindset
Problems with big pharma and the importance of biohacking
HOPE moving location from Hotel Pennsylvania to Saint John's University
Hackerspaces
exploring technology
Phone phreaking
Life-changing events at HOPE
Demoscene with original hardware from the 1980'ies at HOPE
Making 8-bit generated art and music
Running a physical hacker conference
Hidden gems at HOPE
How can you can run your own conference
Logistics behind the HOPE conference
Links:
https://hope.net/
https://petascale.org/
https://en.wikipedia.org/wiki/Mitch_Altman
https://2600.com
https://archive.org/details/HOPE-3-The_Hacker_s_Code
https://en.wikipedia.org/wiki/Demoscene
https://en.wikipedia.org/wiki/Hackers_on_Planet_Earth
The Hacker Talk team will be at May Contain Hackers which will take place
in the Netherlands at the same time as the HOPE conference. Find us
for some stickers and Hacker Talk swag!
Steve Phillips, is an interesting developer, privacy advocate, hacker and thinker.
Tune into this episode of Hacker Talk as we are joined by Steve Phillips in this Programmable Philosophy special.
In this episode we cover:
Steve's journey into technology
Being able to build and utilize tools
Cypherpunk
Privacy, Encryption
Philosophy with programming
Proving philosophical theories with programming
Python, Django
Paul gram
Putting the technologist first in companies
Combining programming with entrepreneurship
Going from utilizing one computer core to multithreading
Clojure lisp, using all the libraries from lisp and java.
Static typing
Golang in 2010, From the one-year anniversary to hacker news. Golang's history.
go fix - Automatically rewriting code for new API calls and dependencies.
Creating software that lasts forever, making it easy for developers to upgrade old versions. Make standards that the code will use to
automatically upgrade the old code, and avoid breaking core functionality.
Dependency management
Long build times
V programming language
Fast compile times in V and Go.
Green threads, go routines. Efficient concurrency with low overhead.
Small runtime languages.
Designing encrypted protocols, threat models.
Use libsodium
LeapChat secure chat
Securing a large number of people
End-to-end encryption with web applications, not trusting the middleman
Trusted service workers in modern browsers, preinstall javascript. Detecting malicious new versions of javascript code.
Web assembly, practical use-cases for web assembly. Allowing users to run precompiled binaries on any platform in a browser.
How Web assembly run's in a very low overhead sandbox.
Docker will be replaced by podman
How docker is not the silver bullet for security, alternatives to it.
Trusted microservices environments.
Privilege separation
web assembly nano process model
No need to trust the libraries that you use.
Sandboxing, Electrum apps.
Running C++ 20% slower with web assembly.
Shopify's and Cloudflare's use of web assembly
Nomad, Kubernetes is too complex
Docker daemon
Links:
https://tryingtobeawesome.com
https://www.goodreads.com/book/show/16153182-cypherpunks
http://www.executablephilosophy.org/
https://en.wikipedia.org/wiki/Paul_Graham_(programmer)
https://www.djangoproject.com/
https://clojure.org/guides/learn/sequential_colls
https://www.educative.io/answers/what-is-a-goroutine
https://vlang.io/
https://www.leapchat.org/
https://doc.libsodium.org/
https://developer.mozilla.org/en-US/docs/Web/API/Service_Worker_API
https://webassembly.org/docs/security/
https://www.nomadproject.io/
https://podman.io/
This episode is the first time the authors of the book: Black Hat Python. In today's episode of Hacker Talk Justin Seitz and Tim Arnold joins us on the show and we get to hear Tim and Justin stories about Python, Hacking and a lot more!
In this episode we cover:
Journey into hacking and technology
Finding like-minded people, dopamine kicks
Infosec community
CackalackyCon
Issa
https://en.wikipedia.org/wiki/Information_Systems_Security_Association
Tinkering
Python
Creating IT-security python courses
From Twitter to Nostarch
Exploits for Windows 10 and 64bit machines
Favorite python libraries, Lxml, requests
Syscalls with PyPledge, visualizing packet analysis with scapy
Programming, Microsoft basic, PHP, vb6,
the future with golang
Virtual environments in python
Workflow for programming
Visual code studio, Microsoft turning good
Wingware
Wingide with immunity debugger
Hunchly's daily dark web report
Archive.is to archive .onion sites
Onionscan
Fresh onions
Modern exploit and zeroday writing
Ms08067 exploit
How to write books
Best practices for writing
Buckle in for a great episode of Hacker Talk! Pavol Luptak, CEO of Nethemba joins us, and
walks us through the vulnerabilities that were found in Slovakia's covid-19 PCR and anti-gen authority.
Tune into the most technical and detailed covid-19 hacking episode, right here on Hacker Talk.
In this episode we cover:
Pavol's journey into it-security
old-school Unix
privilege escalation attacks
Traditional C and Assembly, shellcodes
Becoming a penetration tester
Rfid
Finding vulnerabilities in parking system, parking in Bratislava for free
Hacking Slovakia's covid-19 systems
extracting PCR and anti-gen covid-19 tests for all Slovakian citizens.
Finding vulnerabilities in PCR test authorities.
enumeration attacks.
Slovakian eHranica forms.
Generating birthdate number.
Finding birthdates on Facebook and Wikipedia
Leveraging different parts of the systems to make them work together
Impersonation attacks
OWASP Web Security Testing Guide
Cracking Captcha's
Rate limiting requests
Security mitigations that you can user
Central European Bug Bounty programs
Hacktrophy
Best practices for bug bounties for enterprises
How to get started with penetration testing
The new smart contract security field
Personal number generation script:
#!/bin/bash
for (( year=54; year < 100; year++)));
to
for (( month=1; month < 13; month++)));
to
for (( day=1; day < 32; day++)));
to
for (( suffix=0; suffix < 10000; suffix++))
to
final=$(( $year*100000000+$month*1000000+$day*10000+$suffix ));
if (( final % 11 == 0 )); then printf "%010d\n" $final;
fi
done
done
done
done
External Links:
https://nethemba.com/possibility-of-widespread-leak-and-misuse-of-eu-vaccination-certificates/
https://nethemba.com/kriticka-zranitelnost-v-aplikacii-moje-ezdravie-unik-databazy-pacientov-testovanych-na-covid-19/
https://slides.com/nethemba/how-trivial-critical-vulnerabilities-can-lead-to-a-complete-leak-of-sensitive-covid-19-data-on-all-citizens-of-the-country
https://spectator.sme.sk/c/22722505/serious-flaw-in-ehranica-form-attackers-able-to-send-people-into-self-isolation.html
https://wilderko.medium.com/
https://owasp.org/www-project-web-security-testing-guide/
https://nginx.org/
https://docs.nginx.com/nginx-waf/
https://en.wikipedia.org/wiki/Cloudflare
https://hacktrophy.com/en/
https://nethemba.com/resources/ehranice-critical-vulnerabilities.pdf
David Jacoby, is a Swedish Hacker, Professional Penetration tester, Security Researcher, featured in the Swedish it-security show called "Hackad" and our guest of honor today!
In this episode of Hacker Talk, we are joined by the Swedish hacker David Jacoby!
Have you ever watched a video on your phone in your spare time? what if the site had a malicious javascript that will scan your internal
network for smart devices and then trigger a remote code execution?
Join us as we deep dive into IT-Security, get to hear how David got into hacking, and a lot more!
Topics we covered:
Phone Phreaking in Sweden
Software security
David's journey into hacking
Privilege escalations on older systems
Linux system administration
Bulletin board system
Running bbs systems at home through a raspberry pi
Making security stronger and helping people
Password reuse
Säkerhet och sekretess Magazine
Red team penetration testing
How to motivate your organization to implement a security program
Attacking consumer devices, hacking smart devices at home
Scanning internal networks without a shell using a javascript scanner in the client's browser
Hacking internal devices such as Network Attached Storage devices.
enumerating networks and scanning with javascript
Consumer devices lifespan, testing certifications, best practices for vendors
Submitting security vulnerabilities
Hack.se, the Swedish hacking scene, and background
Favorite Pentesting tools, netcat openbsd version
Network segmentation
Bad common patterns for enterprise networks
Stealing paste buffers
Securing society at a large scale
The future of information technology security
External Links:
https://www.imdb.com/title/tt15746988/
https://en.wikipedia.org/wiki/Bulletin_board_system
https://www.youtube.com/watch?v=GQpQHqIKE5E
https://www.youtube.com/watch?v=_0hXeNRGetg
https://se.linkedin.com/in/djacoby
https://www.davidjacoby.se/
https://nmap.org/ncat/
https://man.openbsd.org/nc
https://www.trustedsec.com/tools/crackmapexec/
https://www.hypr.com/password-reuse/
https://en.wikipedia.org/wiki/Internet_Relay_Chat
Ben Kurtz - Golang Malware part 2
Topics covered:
Golang
Hells gate, direct system calls on windows
How system calls are normally done in windows, Windows Kernel
Evading anti malware detection on Windows with Banana Phone
How to get started writing c2's in golang.
Sliver, Opensource golang command and control.
Red team mindset
Evolution of programmers, bad patterns
CVE's, common vulnerability enumeration number
Auditing source code
Javascript frameworks
Cross site scripting, SQL injection and XXE(Xml External Entity) for scanning internal networks and exfiltrating data.
Building secure code bases
Security Engineers
Supervisory control and data acquisition (SCADA)
log4j
Remote of execution and directory traversal in Java, Java's file constructor, LDAP and DirContext
Golang for micro services
Python
Common bad patterns
LDAP injection
Modern security nightmares
Remote debug protocols
String concatenation
Resistance to current modern implementation and safer framework.
Finding bugs in games that can be used to attack power-plants.
Dependency management
Backdoor factory
Bettercap
Man in the middle
Spoofing BGP
BGP hijacks
Links:
https://github.com/Binject
https://github.com/C-Sto/BananaPhone
https://github.com/BishopFox/sliver
https://cve.mitre.org/
https://owasp.org/www-community/vulnerabilities/XML_External_Entity_(XXE)_Processing
https://www.youtube.com/watch?v=FkuUpg5FO2g
https://en.wikipedia.org/wiki/SCADA
https://en.wikipedia.org/wiki/Log4j
https://www.coding-bootcamps.com/blog/build-containerized-applications-with-golang-on-kubernetes.html
https://docs.oracle.com/javase/8/docs/api/index.html?javax/naming/directory/DirContext.html
https://apache.org/foundation/foundation-projects.html
https://docs.oracle.com/javase/8/docs/api/index.html?javax/management/JMX.html
https://en.wikipedia.org/wiki/Java_Debug_Wire_Protocol
https://www.freecodecamp.org/news/big-o-notation-why-it-matters-and-why-it-doesnt-1674cfa8a23c/
https://github.com/bettercap/bettercap
https://www.bettercap.org/
https://bgpmon.net/
https://en.wikipedia.org/wiki/BGP_hijacking
https://labs.ripe.net/author/vastur/bgplay-integrated-in-ripestat/
https://www.symbolcrash.com/podcast/
https://www.youtube.com/symbolcrash
Ben Kurtz, is an interesting hacker that has been involved in the infosec space for over 20 years. He has done a large chunk of research into writing malware and post-exploitation tools in the Golang programming language.
Tune into this episode of Hacker Talk as we are joined by Ben Kurtz and deep dive into Golang Malware.
In this episode of Hacker Talk, we cover the following topics:
Getting into programming, apple 2, hacking, bulletin board systems,
pirating apple 2 software
unix security, shadow and files in the /etc/ folder
evolution of network security since 1994
first talk at DEFCON,
life as a developer
LISP
Dan Kaminsky, recruited as a professional hacker
Learning different programming languages
Learning pascal in a basement
Functional programming, constraint solver
Getting into the Golang flow.
Plan-9 redoing C++
Getting into Golang malware
encrypted mesh network
Ratnet
Iran shutting down tls connections
Internet Censorship
Code audits
Writing malware in different languages
V programming language
Nym programming language
dild, dynamic loading library in OSX
parsing memory in golang
process execution block
loading windows syscall's
evading anti-malware systems
hells gate, direct windows system calls
Network traffic obfuscation
online communities that have been running for a long time, Second Life
Offline mesh network
Red team penetration
Write your own malware implant as a penetration tester.
Obfuscating malware traffic
writing malware
Sliver, opensource version of cobalt strike, Command and Control Server
testing malware
setting up a test environment
Penetration testing as a Red Team.
Golang Antivirus/EDR evasion
Enterprise network monitoring
Shellcode loaders in pure golang
Rewriting the backdoor factory in golang.
Obfuscating binaries with the custom golang debug library
Parsing executables from memory(RAM)
universal system binary loader without touching disk
Links:
https://www.hack-the-planet.net/
https://github.com/awgh
https://github.com/Binject
https://github.com/Binject/go-donut
https://github.com/C-Sto/BananaPhone/
https://www.symbolcrash.com/wp-content/uploads/2019/02/Authenticode_PE-1.pdf
https://www.cyberbit.com/blog/endpoint-security/malware-mitigation-when-direct-system-calls-are-used/
https://github.com/boku7/HellsGatePPID
https://teamhydra.blog/2020/09/18/implementing-direct-syscalls-using-hells-gate/
https://vxug.fakedoma.in/papers/VXUG/Exclusive/HellsGate.pdf
https://2600.com/
https://en.wikipedia.org/wiki/Bulletin_board_system
https://en.wikipedia.org/wiki/Plan_9_from_Bell_Labs
https://go.dev/
https://go.dev/doc/effective_go
https://github.com/awgh/ratnet
https://github.com/BishopFox/sliver
https://www.youtube.com/watch?v=3RQb05ITSyk | Golang Malware defcon talk
https://vlang.io/
https://vlang.io/compare
https://en.wikipedia.org/wiki/Nim_(programming_language)
https://github.com/vyrus001/go-mimikatz
https://github.com/vyrus001/go-mimikatz/blob/master/packer/packer.go
Dan Demeter, well-known security researcher in the Romanian information-security space.
In 2014, Dan joined Kaspersky as a malware Security researcher, since then he has worked with various advanced anti-malware solutions and
is currently working with Threat Intelligence in Kaspersky's Global Research and Analysis Team.
In this episode of Hacker talk, we deep dive into malware, threat intelligence, advanced persistent threats, security and defensive security with Dan.
Topics covered in this episode:
Getting into infosec
Romania in the early personal internet space, connecting rj45 network cables to potatoes
milw0rm, Bugtraq mailing list, backtrack, hell bond hackers
Capture the flag(CTF) competitions
Internet café
Threat intelligence
Security research
Kaspersky
Advanced persistence threats, what is an advanced persistence threat?
Finding advanced malware in the wild.
Threat levels for individuals
Threat modeling
Enterprise and consumer malware
Antivirus programs
targeted malware
malware for crypto-currency projects
finding advanced malware as a threat intelligence researcher
bypassing advanced malware checks
Reverse engineering malware
ollydbg, NSA decompiler
Malware obfuscation techniques
yara rules
wrapping malware with VM protect
Post exploitation
malware stages
Lazarus Malware, Bangladesh Cyber Bank Heist
Malware on sim-cards
Using satalite ip addresses
reporting malicious command and control servers
malware campaigns spreading in Romania
phishing and identity theft
Bring your own device policy
Stay safe working from home
Best ways to protect yourself online
Writing malware signatures and writing yara rules
malware similarity engines
Links:
https://hackthissite.org/
https://hbh.sh/home
https://en.wikipedia.org/wiki/Bugtraq
https://en.wikipedia.org/wiki/BackTrack
https://cnc-central.fandom.com/wiki/Command_%26_Conquer:_Red_Alert_-_Remastered
https://securelist.com/
https://securityespresso.org/
https://www.kaspersky.com/
https://twitter.com/kaspersky
https://twitter.com/_xdanx
https://en.wikipedia.org/wiki/OllyDbg
https://hex-rays.com/IDA-pro/
https://ghidra-sre.org/
https://vmpsoft.com/
https://github.com/ParrotSec/mimikatz
https://en.wikipedia.org/wiki/Lazarus_Group
https://en.wikipedia.org/wiki/Bangladesh_Bank_robbery
https://www.kaspersky.com/cyber-crime-lazarus-swift
https://www.kaspersky.com/about/press-releases/2021_security-analyst-summit-back-online-on-september-28-29
https://securelist.com/equation-group-from-houston-with-love/68877/
https://securelist.com/satellite-turla-apt-command-and-control-in-the-sky/72081/
https://www.nbcnews.com/tech/security/facebook-sues-israel-s-nso-group-over-alleged-whatsapp-hack-n1073511
https://en.wikipedia.org/wiki/Regular_expression
https://github.com/VirusTotal/yara
https://github.com/neo23x0
https://www.tripwire.com/state-of-security/featured/operation-shadowhammer-hackers-planted-malware-code-video-games/
https://en.wikipedia.org/wiki/Red_October_%28malware%29
En liten tjänst av I'm With Friends. Finns även på engelska.