BrakeSec Education Podcast
Bryan Brake, Amanda Berlin, and Brian Boettcher
All episodes
Best episodes
Seasons
Top 10 BrakeSec Education Podcast Episodes
Goodpods has curated a list of the 10 best BrakeSec Education Podcast episodes, ranked by the number of listens and likes each episode have garnered from our listeners. If you are listening to BrakeSec Education Podcast for the first time, there's no better place to start than with one of these standout episodes. If you are a fan of the show, vote for your favorite BrakeSec Education Podcast episode by adding your comments to the episode page.
2018-032-chris Hadnagy, discusses his new book, OSINT and SE Part 1
BrakeSec Education Podcast
09/08/18 • 37 min
Christopher Hadnagy Interview:
Origin story- connoisseur of moonshine
Sponsored Link (paperback on Amazon): https://amzn.to/2NKxLD9
SEORG book list: https://www.social-engineer.org/resources/seorg-book-list/
Chris’ Podcast: https://www.social-engineer.org/podcast/
SECTF at Derby (contestants are chosen)
Remembering - attention to detail
Remembering details
Can be the difference between success and failure
Social Engineering - the different aspects:
- Info Gathering
- Time constraints
- Accommodating non-verbals
- Body language must match mood
- Using a slower rate of speech
- Suspending ego
- RSVP
- Rapport
- Psychology
- “Getting information without asking for it”
- Elicitation
- ‘The Dark Art’ -negative outcome for the target
- Manipulation
- “Getting someone to do what you want them to do”
- Understanding the science of compliance
- Influence
- Profiling
- Communications Modeling
- Facial Expressions
- Body Language
- Don’t overextend your reach
- Knowledge that comes from a point of truth, or is easily faked
- Pretexting
- Emotional Hijacking
- Misdirection
- Art
- Science
Questions:
What precipitated the need to write another book?
You bring up several successful operations, and several failures…
How do you regroup from a failure, especially if the point of entry is someone that ‘got you’...
“The level of the assistance you request must be equal to the level of rapport you have built” -
Seems like understanding this is an acquired skill, not set in stone…
Many of us in the infosec world are introverts… how do you suggest we hone our skills in building rapport without coming off as creepy?
Work place? On the commute?
Does being an introvert mean that it might take longer to get to the goal? Can we use our introverted natures to our advantage?
Get Ryan on the show…
Lots of items
(8 principles of influence)
Typical daily SE activities
Holding a door open, then the person reciprocates
Framing
We don’t ‘kill our dogs’, we ‘put them to sleep’.
Questions from our Slack:
Ben:
Do you feel there's an importance for non-InfoSec adjacent folks to learn about Social Engineering, and maybe go through some sort of training in order to navigate day-to-day life in the modern world?
What does an interview at Chris’ company look like?
https://www.innocentlivesfoundation.org/
Check out our Store on Teepub! https://brakesec.com/store
Join us on our #Slack Channel! Send a request to @brakesec on Twitter or email [email protected]
#Brakesec Store!:https://www.teepublic.com/user/bdspodcast
#Spotify: https://brakesec.com/spotifyBDS
#RSS: https://brakesec.com/BrakesecRSS
#Youtube Channel: http://www.youtube.com/c/BDSPodcast
#iTunes Store Link: https://brakesec.com/BDSiTunes
#Google Play Store: https://brakesec.com/BDS-GooglePlay
Our main site: https://brakesec.com/bdswebsite
2015-044-A MAD, MAD, MAD, MAD Active Defense World w/ Ben Donnelly!
BrakeSec Education Podcast
10/30/15 • 55 min
It's a madhouse this week! We invited Ben Donnelly (@zaeyx) back to discuss a new software framework he's crafted, called #MAD Active Defense. Ben wants to make Active Defense simple enough for even the busiest blue teamer.
The interface takes it design from other well known #software frameworks, namely #Metasploit, #REcon-ng, and even a bit of #SET, he said.
We even did a quick demo of MAD, discussed the tenets of #Active #Defense, and talked about a little skunkworks project of Ben's that you will find enjoyable.
Direct Link: http://brakeingsecurity.com/2015-044-a-mad-mad-mad-mad-world-with-ben-donnelly
Promethean Security MAD GitHub: https://github.com/PrometheanInfoSec/MAD
Demo Video (~110MB): http://traffic.libsyn.com/brakeingsecurity/MAD_Ben_edited.mkv
Backup Demo Download (gDrive) site (~110MB): https://goo.gl/FtWlCM
Check us out using the TuneIn App!: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/
RSS: http://www.brakeingsecurity.com/rss
#activeDefense #blueTeam #intrusionDefense #benDonnelly
Derbycon - A podcast with Podcasters! *explicit*
BrakeSec Education Podcast
09/30/15 • 0 min
Mr. Boettcher and I attended Derbycon, and while he was out attending talks, I got invited to do a podcast with some of the other podcasts who were there. Special thanks to Edgar Rojas, Amanda Berlin, Jerry Bell, Andrew Kalat, Paul Coggin, Tim DeBlock, and everyone else at our recording. We have a bit more audio that we will post this month, including a discussion of a tool Mr. Boettcher and Michael Gough collaborated on to make windows malware analysis easier to do.
2015-030: Bsides Austin panel Discussion (Red Team vs. Blue Team)
BrakeSec Education Podcast
07/13/15 • 38 min
My podcast co-host Brian Boettcher, along with Kate Brew, an Austin, TX based security blogger, headed up this panel called "Red Team Vs. Blue Team". The idea was to ask people from various sides of the aisles (attackers and defenders) pressing questions about how the industry operates.
Infosec heavyweights like Kevin Johnson (@secureideas), Mano Paul (@manopaul), Josh Sokol (@joshSokol), made this a very excellent podcast...
We hope you enjoy!
2015-017: History of ITIL, and integrating Security
BrakeSec Education Podcast
04/18/15 • 55 min
Much of InfoSec and Compliance is all about processes, procedures, controls, audits, and the proper management of all of these. To do so, you need a proper framework to make these as seamless as possible. ITIL is one of these types of frameworks.
We introduce Mr. Tim Wood on the podcast, who has over 20 years of ITIL experience and began ITIL implementations in banks and Healthcare systems in the United Kingdom. He currently works with different industries to change culture and make an ITIL a reality.
This week, we go over the History of ITIL, and understand the various incarnations from v1.0 to v3.0. You quickly understand where security will start fitting into all those facets of the ITIL framework.
Tim Wood's Presentation: https://drive.google.com/file/d/0B-qfQ-gWynwiVS0zLTZidml0VzA/view?usp=sharing (view only)
2015-014-SANS Top 20 Controls - #12 and #13
BrakeSec Education Podcast
03/28/15 • 57 min
We continue our trek down the list of SANS Top 20 Critical Security Controls this week with #12 and #13 - Boundry Defense, and Controlled use of Administrative Privileges. Learn what you can do to shore up your network defenses, and how to handle admin privileges... When to give that kind of access, and how to make privileged access as secure as possible while still allowing administrators to do their work.
https://www.sans.org/media/critical-security-controls/CSC-5.pdf
http://www.openspf.org/
https://4sysops.com/
2017-010-Authors Amanda Berlin and Lee Brotherston of the "Defensive Security Handbook"
BrakeSec Education Podcast
03/22/17 • 73 min
Our very own Ms. Berlin and Mr. Lee Brotherston (@synackpse), veteran of the show, co-authored an #O'Reilly book called the "Defensive Security Handbook"
We talk with Amanda and Lee (or Lee and Amanda :D ) about why they wrote the book, how people should use the book, and how you can maximize your company's resources to protect you.
The best thing is that you can pick up the ebook right now! It's available for pre-order on Safari books (Link), or pre-order on Amazon.com (Link)
Hope you enjoy!
Direct Link: http://traffic.libsyn.com/brakeingsecurity/2017-010-Defensive_Security_handbook.mp3
Youtube Channel: https://www.youtube.com/channel/UCZFjAqFb4A60M1TMa0t1KXw
Itunes: (look for '2017-010') https://itunes.apple.com/us/podcast/brakeing-down-security-podcast/id799131292?mt=2
Previous Lee Brotherston episodes:
Threat Modeling w/ Lee Brotherston
Lee fills in for Mr. Boettcher, along with Jarrod Frates
TLS fingerprinting application
#Bsides #London is accepting Call for Papers (#CFP) starting 14 Febuary 2017, as well as a Call for Workshops. Tickets are sold out currently, but will be other chances for tickets. Follow @bsidesLondon for more information. You can find out more information at https://www.securitybsides.org.uk/
CFP closes 27 march 2017
------
HITB announcement:
“Tickets are on sale, And entering special code 'brakeingsecurity' at checkout gets you a 10% discount". Brakeing Down Security thanks #Sebastian Paul #Avarvarei and all the organizers of #Hack In The Box (#HITB) for this opportunity! You can follow them on Twitter @HITBSecConf. Hack In the Box will be held from 10-14 April 2017. Find out more information here: http://conference.hitb.org/hitbsecconf2017ams/
---------
Join our #Slack Channel! Sign up at https://brakesec.signup.team #RSS: http://www.brakeingsecurity.com/rss #Google Play Store: https://play.google.com/music/m/Ifp5boyverbo4yywxnbydtzljcy?t=Brakeing_Down_Security_podcast
iHeartRadio App: https://www.iheart.com/show/263-Brakeing-Down-Securi/
SoundCloud: https://www.soundcloud.com/bryan-brake
Comments, Questions, Feedback: [email protected]
Support Brakeing Down Security Podcast on #Patreon: https://www.patreon.com/bds_podcast
#Twitter: @brakesec @boettcherpwned @bryanbrake
#Player.FM : https://player.fm/series/brakeing-down-security-podcast
#Stitcher Network: http://www.stitcher.com/s?fid=80546&refid=stpr
#TuneIn Radio App: http://tunein.com/radio/Brakeing-Down-Security-Podcast-p801582/
2018-007- Memcached DDoS, Secure Framework Documentation, and chromebook hacking
BrakeSec Education Podcast
03/05/18 • 45 min
Topics:
- Secure Framework documents
- Modifying chromebooks so you can use Debian/Ubuntu
- Memcached is the new DDoS hotness
- Announcement of the next BrakeSec Training Class (see Show Notes below for more info)
Link to secure framework document: https://drive.google.com/open?id=1xLfY4uI88K2AiA1mosWJ7jFyP100Jv5d
Tickets are already on sale for "Hack in the Box" in Amsterdam from 9-13 April 2018, and using the checkout code 'brakeingsecurity' discount code gets you a 10% discount". Register at https://conference.hitb.org/hitbsecconf2018ams/register/#Spotify: https://brakesec.com/spotifyBDS
#RSS: https://brakesec.com/BrakesecRSS
#Youtube Channel: http://www.youtube.com/c/BDSPodcast
#iTunes Store Link: https://brakesec.com/BDSiTunes
#Google Play Store: https://brakesec.com/BDS-GooglePlay
Our main site: https://brakesec.com/bdswebsite
Join our #Slack Channel! Email us at [email protected]
or DM us on Twitter @brakesec
#iHeartRadio App: https://brakesec.com/iHeartBrakesec
#SoundCloud: https://brakesec.com/SoundcloudBrakesec
Comments, Questions, Feedback: [email protected]
Support Brakeing Down Security Podcast by using our #Paypal: https://brakesec.com/PaypalBDS OR our #Patreon
https://brakesec.com/BDSPatreon
#Twitter: @brakesec @boettcherpwned @bryanbrake @infosystir
#Player.FM : https://brakesec.com/BDS-PlayerFM
#Stitcher Network: https://brakesec.com/BrakeSecStitcher
#TuneIn Radio App: https://brakesec.com/TuneInBrakesec
--Show Notes--
Announcements:
Matt Miller’s class on Assembly and Reverse engineering
Starts 2 April - 6 sessions
2nd Class - 6 sessions, beginning 21 May
Beginner course on Assembly
Advanced course, dealing with more advanced topics
$150 for each class, or a $250 deal if you sign up for both classes
paypal.me/BDSPodcast/150USD - Specify in the NOTES if you want the “Beginner” or “Advanced” course
paypal.me/BDSPodcast/250USD - If you want both courses
We need a minimum of 10 students per class
Projects:
Chromebook with Debian
Bit of a pain, if I could be honest..
Needed USB hub with eth0, and a USB soundcard
USB3 low profile thumbdrives would be better
https://www.amazon.com/gp/product/B01K5EBCES/ref=oh_aui_detailpage_o01_s00?ie=UTF8&psc=1
https://www.securecontrolsframework.com/ ←--well well worth the signup
https://drive.google.com/open?id=1xLfY4uI88K2AiA1mosWJ7jFyP100Jv5d - ‘secure.xlsx’
http://www.dummies.com/programming/certification/security-control-frameworks/
Numerous security frameworks already exist:
Cisco
NiST
CoBIT
ITIL (can be utilized)
SWIFT https://www.accesspay.com/wp-content/uploads/2017/09/SWIFT_Customer_Security_Controls_Framework.pdf
“My weird path to #infosec” on twitter
https://en.wikipedia.org/wiki/Hydrocolloid_dressing
2020-004-Marcus Carey, ShmooCon Report, threat simulation
BrakeSec Education Podcast
02/05/20 • 31 min
Marcus Carey https://twitter.com/marcusjcarey
Prolific Author, Defender, Enterprise Architect at ReliaQuest
https://www.darkreading.com/vulnerabilities---threats/reliaquest-acquires-threatcare/d/d-id/1335950
“GreyMatter integrates security data from security incident and event manager (SIEM), endpoint detection and response (EDR), firewalls, threat intelligence feeds, and other security tools, and includes analysis functions and automation. Threatcare's technology — which will become a new feature on the platform — simulates how a specific threat or attack could target an organization's network in order to determine whether its security tools and settings are or are not actually working to thwart the threats.”
Security model - everyone’s is diff
How do you work with your threat model?
A proper threat model
Attack Simulation -
How is this different from doing a typical Incident Response tabletop? Threat modeling systems?
How is this different than a pentest?
Is this automated red teaming? How effective can automated testing be?
Is this like some kind of constant scanning system?
How does this work with threat intel feeds?
Can it simulate ransomware, or any attacks?
Hedgehog principles
A lot of things crappily, and nothing good
Mr. Boettcher: “Why suck at everything...”
Atomic Red Team - https://github.com/redcanaryco/atomic-red-team
ATT&CK Matrix - https://attack.mitre.org/matrices/enterprise/
Tribe of Hackers
https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1793464189 - Red Book
The Tribe of Hackers team is back with a new guide packed with insights from dozens of the world’s leading Red Team security specialists. With their deep knowledge of system vulnerabilities and innovative solutions for correcting security flaws, Red Team hackers are in high demand. Tribe of Hackers Red Team: Tribal Knowledge from the Best in Offensive Cybersecurity takes the valuable lessons and popular interview format from the original Tribe of Hackers and dives deeper into the world of Red Team security with expert perspectives on issues like penetration testing and ethical hacking. This unique guide includes inspiring interviews from influential security specialists, including David Kennedy, Rob Fuller, Jayson E. Street, and Georgia Weidman, who share their real-world learnings on everything from Red Team tools and tactics to careers and communication, presentation strategies, legal concerns, and more
- Learn what it takes to secure a Red Team job and to stand out from other candidates
- Discover how to hone your hacking skills while staying on the right side of the law
- Get tips for collaborating on documentation and reporting
- Explore ways to garner support from leadership on your security proposals
- Identify the most important control to prevent compromising your network
- Uncover the latest tools for Red Team offensive security
https://smile.amazon.com/Tribe-Hackers-Cybersecurity-Advice-World/dp/1119643376 - Yellow Book
Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World is your guide to joining the ranks of hundreds of thousands of cybersecurity professionals around the world. Whether you’re just joining the industry, climbing the corporate ladder, or considering consulting, Tribe of Hackers offers the practical know-how, industry perspectives, and technical insight you need to succeed in the rapidly growing information security market. This unique guide includes inspiring interviews from 70 security experts, including Lesley Carhart, Ming Chow, Bruce Potter, Robert M. Lee, and Jayson E. Street.
- Get the scoop on the biggest cybersecurity myths and misconceptions about security
- Learn what qualities and credentials you need to advance in the cybersecurity field
- Uncover which life hacks are worth your while
- Understand how social media and the Internet of Things has changed cybersecurity
- Discover what it takes to make the move from the corporate world to your own cybersecurity venture
- Find your favorite hackers online and continue the conversation
2015-007-SANS_Top20_14and15--Proving_Grounds_Microcast with Megan Wu!
BrakeSec Education Podcast
02/10/15 • 53 min
Extra special treat this week! We do a continuation of our review of the Top 20 Security Controls, in which we do #14 and #15, which all of you will find very interesting.
But the real reason we are posting this today is the Call for Papers and Call for Mentors for the Bsides Las Vegas Proving Grounds! We invited Magen Wu (@tottenkoph) on to discuss. If you've ever asked yourself "I'd like to give a talk, but they'd never put me on" NOW IS YOUR CHANCE! :)
This is a great opportunity if you're a veteran speaker, or just want to give back to the community at large... You can mentor a n00b to help them create a topic, help them hone their paper, and be with them when they give the talk at Bsides Las Vegas in July.
Many thanks to @tottenkoph and @securitymoey. They need your help, both as a mentor and a mentee. This is also an excellent networking opportunity. You get 1-on-1 access to an often influential mentor, someone in the infosec community, and your talk will be seen by several hundred people. hmmm.... maybe I should put one in :D
-----
SANS #14-10:
Ensure that the log collection system does not lose events during peak activity, and that the system detects and alerts if event loss occurs (such as when volume exceeds the capacity of a log collection system). This includes ensuring that the log collection system can accommodate intermittent or restricted-bandwidth connectivity through the use of handshaking / flow control.
------
"Dirty Rhodes" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/
Show more best episodes
Show more best episodes
FAQ
How many episodes does BrakeSec Education Podcast have?
BrakeSec Education Podcast currently has 459 episodes available.
What topics does BrakeSec Education Podcast cover?
The podcast is about News, Security, Web, Legal, Pentesting, Tech News, Compliance, Podcasts, Technology, Education, Privacy, Cissp, Cybersecurity and Healthcare.
What is the most popular episode on BrakeSec Education Podcast?
The episode title '2020-033-garmin hack, Tesla employee thwarted IP espionage, Slack RCE payout, and more!' is the most popular.
What is the average episode length on BrakeSec Education Podcast?
The average episode length on BrakeSec Education Podcast is 52 minutes.
How often are episodes of BrakeSec Education Podcast released?
Episodes of BrakeSec Education Podcast are typically released every 7 days, 1 hour.
When was the first episode of BrakeSec Education Podcast?
The first episode of BrakeSec Education Podcast was released on Jan 15, 2014.
Show more FAQ
Show more FAQ