Jul 28, 2014
This is a flashback from July 2015.
Mr. Boettcher and I discussed SQLMAP, a tool that can automate the process of pentesting databases and even registries on Windows. We discuss some functions of the program and why developers should get training on these.
Mr. Boettcher and I talk about how Infosec professionals...
Jul 21, 2014
It only gets better in Part 2 of our Interview with Georgia Weidman, Author, Security Researcher and Creator of the Smartphone Pentesting Framework.
She talks about how people underestimate the mobile platform for pentesting purposes, and we even find out that in addition to Teaching a class on exploit development at...
Jul 14, 2014
So, I uploaded this little tutorial of nmap, a very nice tool I use on a regular basis, both at home and at work.
I did some basic scans, showed off the command line and the Windows 'Zenmap' version, as well as discussed some regularly used switches.
The next video I do about nmap will discuss more switches, the Nmap...
Jul 14, 2014
We have a real treat the next two weeks. Author and Mobile Security Researcher Georgia Weidman, who we also found out will be providing exploit development training at Black Hat this year.
She is the author of an awesome book "Penetration Testing: A Hands-On Introduction to Hacking" (
Jul 7, 2014
This is the continuation of our podcast from last week with Phil Beyer.
We started out talking about risk registers, and we end the podcast with a little Q&A about positions in companies (Chief Risk Officer, Chief Data Protection Officer), and whether these positions are useful.
Risk registers...