The InfoSec & OSINT Show

By Josh Amishav

The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own skills.

  1. 1.
    60 - AJ Yawn & Automating AWS Security
    37:51
  2. 2.
    59 - Tim Adams & DNS Filtering
    21:05
  3. 3.
    58 - Ryan Dewhurst & Securing WordPress
    32:01
  4. 4.
    57 - Ben Dowling & IP Geolocation
    32:39
  5. 5.
    56 - Assaf Dahan & Ransomware Trends
    31:01
  6. 6.
    55 - Charlie Belmer & NoSQL Injection
    34:17
  7. 7.
    54 - Jeff Foley & Asset Discovery with Amass
    26:50
  8. 8.
    53 - hashcat 101
    9:13
  1. 9.
    52 - InfoSec News & Analysis
    6:25
  2. 10.
    51 - Jim Manico & Developing Securely
    37:02
  3. 11.
    50 - pdp (Petko Petkov) & Automating Pownage with PownJS
    34:50
  4. 12.
    49 - Gabrielle Botbol & Becoming a Pen Tester
    29:42
  5. 13.
    48 - Paulino Calderón & Practical IoT Hacking
    30:57
  6. 14.
    47 - Christian Folini & The Core Rule Set
    40:30
  7. 15.
    46 - InfoSec News & Analysis
    6:49
  8. 16.
    45 - John Hammond & Hacking CTFs
    32:33
  9. 17.
    44 - Ted Harrington & Doing Application Security Right
    37:41
  10. 18.
    43 - Robert "RSnake" Hansen & The Future of Data Privacy
    55:16
  11. 19.
    42 - Charles Shirer & Pen Testing with No Money Down
    30:33
  12. 20.
    41 - Chris Hadnagy & Human Hacking
    33:01
  13. 21.
    40 - Fabio Viggiani & Supply Chain Attacks
    35:02
  14. 22.
    39 - Josh Sokol & Managing Risk Simply
    35:44
  15. 23.
    38 - Tyrone Wilson & Breaking Into the Security Industry
    27:30
  16. 24.
    37 - Jenny Radcliffe & People Hacking
    36:57
  17. 25.
    36 - Tracy Maleeff & Empathy Based InfoSec
    40:07
  18. 26.
    35 - Ed Bellis & Risk Based Vulnerability Management
    33:21
  19. 27.
    34 - John Strand & Moving Beyond 0-Days
    36:36
  20. 28.
    33 - Tanya Janca & Coding Securely
    32:40
  21. 29.
    32 - Or Katz & Phishing Evasion Techniques
    35:15
  22. 30.
    31 - Chris Rock & Cyber Mercenaries
    28:08
  23. 31.
    30 - Hakluke & The Bug Bounty Mindset
    31:38
  24. 32.
    29 - Katie Moussouris & Running Bug Bounties
    31:20
  25. 33.
    28 - STÖK and Hunting Bug Bounties
    30:50
  26. 34.
    27 - Joona Hoikkala and Advanced FFuF Scanning
    29:00
  27. 35.
    26 - James Kettle and Becoming a Security Researcher
    20:13
  28. 36.
    25 - Jeremiah Grossman and Asset Inventory
    30:20
  29. 37.
    24 - Ira Winkler & How to Stop Stupid
    37:29
  30. 38.
    23 - Samy Kamkar & Reverse Engineering
    44:29
  31. 39.
    22 - Chris Kubecka & Hacking the World with OSINT
    29:39
  32. 40.
    21 - HD Moore & Advanced Asset Inventory Techniques
    28:38
  33. 41.
    20 - Robert Baptiste (Elliot Anderson) & Mobile App Hacking
    29:45
  34. 42.
    19 - Tommy Devoss (Dawgyg) & Bug Bounty Hunting on Steroids
    35:37
  35. 43.
    18 - Simon Bennetts & Headless Automated Scanning with ZAP
    30:36
  36. 44.
    17 - Matthias Wilson & Using OSINT Against Nigerian Scammers
    30:33
  37. 45.
    16 - Ty Miller & Security Automation
    32:35
  38. 46.
    15 - Chris Dale & Breaking up Recon from the Pen Test
    27:37
  39. 47.
    14 - Andrew van der Stock & the Future of OWASP
    31:25
  40. 48.
    13 - Advanced Passive Recon with the Amass Scripting Engine
    15:15
  41. 49.
    12 - Brute force more effectively with custom wordlists
    8:38
  42. 50.
    11 - Hacking from the command line with Bash and Vim
    12:21

Listen to The InfoSec & OSINT Show now.

Listen to The InfoSec & OSINT Show in full in the Spotify app