Defensive Security Podcast Episode 254
We’re baaaack
We’re baaaack
I created a Jupyter Notebook to query the crt.sh website, dump the results into a pandas data frame, and then printing out the unique list of results to the screen for OSINT investigations.
Cloud security is about much more than security functionality. The top cloud providers all seem to have a capable suite of security features and most surveyed organizations report that they see all the top cloud platforms as generally secure. So, why d…
https://www.bankinfosecurity.com/capital-one-must-turn-over-mandiant-forensics-report-a-14352
https://www.databreachtoday.com/insider-threat-lessons-from-3-incidents-a-14312
https://www.zdnet.com/article/ransomware-deploys-virtual-machines-to-hide-itse…
According to the National Oceanic and Atmospheric Administration (NOAA), a tornado (also called a twister, whirlwind, or cyclone) is a violently rotating column of air that extends from a thunderstorm and comes into contact with the ground. Tornado intensity is measured by the enhanced Fujita (EF) scale from 0 through 5, based on the amount […]
“Best Practices for Protecting Against Phishing, Ransomware and Email Fraud”
Osterman Research conducted a survey among corporate decisions makers in early 2018 and found that nearly 28% of those organizations had experienced a phishing attack…
“Hacking for Dummies, 6th Edition ($29.99 Value) Free for a Limited Time”
Stop hackers before they hack you!
In order to outsmart a would-be hacker, you need to get into the hacker’s mindset and with this book, thinking like a bad guy has never …
Penta (PENTest + Automation tool) is Pentest automation tool using Python3.
Installation
Install requirements
penta requires the following packages.
Python3.7
pipenv
Resolve python package dependency.
$ pipenv install
If you dislike pi…
Dolos Cloak- Automated 802.1x Bypass
Dolos Cloak is a python script designed to help network penetration testers and red teamers bypass 802.1x solutions by using an advanced man-in-the-middle attack.
The script is able to piggyback on the wired…
Phantom Tap (PhanTap) – An ‘Invisible’ Network Tap Aimed at Red Teams.
With limited physical access to a target building, this tap can be installed inline between a network device and the corporate network.
PhanTap is silent in the network an…