DiscoverThe InfoSec & OSINT Show
The InfoSec & OSINT Show
Claim Ownership

The InfoSec & OSINT Show

Author: Josh Amishav

Subscribed: 115Played: 1,873
Share

Description

The goal of the podcast is to share practical tips of what works and what doesn't in information security. Essentially we turn our guests' wisdom into practical tips you can use to improve your own skills.
80 Episodes
Reverse
In Episode 80, Josh Amishav talks about the pyschological warfare that is being waged against various ransomware gangs, developments to Darkside, REvil and Blackmatter, Russia's handling of cyber criminals, using stealer log combo lists as part of your OSINT investigations and more.  For more information, including the show notes check out: https://breachsense.io/podcast 
In Episode 79, Josh Amishav chats with Mike Murr about the science behind social engineering, micro-expressions, FACS, which is the Facial Action Coding System, Common mistakes made during SE engagements, manipulation techniques and more.  For more information, including the show notes check out: https://breachsense.io/podcast 
In Episode 78, Josh Amishav does a solo adventure to talk about the thought process behind launching the Breachsense Darkweb API. The three main takeaways from the episode are: How ransomware has become a life and death issue What effect shutting down the REvil gang has had The 3 most common initial attack vectors used in ransomware attacks For more information, including the show notes check out: https://breachsense.io/podcast 
In Episode 77, Josh Amishav talks with Nate Warfield about threat intel, CTI League and cloud risk. My three main takeaways from the episode are: How to use tags to easily search Shodan for systems vulnerable to specific CVEs The most common threats the medical sector faces A couple of interesting techniques he uses to collect threat intel For more information, including the show notes check out: https://breachsense.io/podcast 
In Episode 76, Josh Amishav chats with Chris Dale about several techniques to associate a given asset back to a company. Three takeaways from the episode are: How to generate a custom wordlist for brute forcing your target A bunch of methods to correlate associated company assets via things like the DOM, JARM and TLS How to automate vulnerability discover For more information, including the show notes check out: https://breachsense.io/podcast 
In episode 75, Jeff Man joins us to talk about his time in the NSA, PCI, Hak4Kidz and content creation. My 3 main takeaways were 1) What red teaming was like in the 80s 2) Why PCI gets a bad reputation and 3) His tips for giving great conference talks. For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information, including the show notes check out: https://breachsense.io/podcast  In episode 74, Brett Johnson joins us to talk about online crime, social engineering, spear phishing and trust. My 3 main takeaways were 1) How criminals convince us to trust them online 2) Bypassing company policies via social engineering and 3) How to get people to believe fake news and legends over facts For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 73, Higinio Ochoa joins us for a behind the scenes look at his hacking escapades with Anonymous. The same methodology can be used for bug hunting today. My 3 main takeaways were 1) Building target lists at scale 2) His two OpSec mistakes which led to him getting caught and 3) What his must have hacking tools are now. For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 72, Nathan Sweaney joins us talk about the future of privacy. My 3 main takeaways were 1) Who's collecting our bluetooth and wifi signals 2) How to get your talk accepted to a security con and 3) How he used OSINT to steal (in air quotes) his twitter handle from a Nazi. For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 71, Peter Taylor "The Fraud Guy" joins us talk about various aspects of fraud. My 3 main takeaways were 1) The common types of fraud he sees in his investigations 2) How Covid has influenced the fraud space and 3) Why aged shell companies and email addresses are so valuable For more information, including the show notes check out: https://breachsense.io/podcast 
    In episode 70, Volodymyr "Bob" Diachenko joins us talk about his research around open databases. My 3 main takeaways were 1) How he finds open databases 2) How he stays on the legal side when verifying his research and 3) Some cyber hygiene tips to prevent allowing unauthorized access to your critical infrastructure  For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 69, James Linton joins us talk about his email pranking days and Business Email Compromise in general. My 3 main takeaways were 1) some tactical tips on how he gained rapport on the initial contact 2) common risks associated with email related fraud and 3) how to protect yourself against email scams For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 68, Christian Espinosa joins us talk about effective communication. My 3 main takeaways were 1) Why we need to stop listening for agreement and instead look for insights 2) how acknowledging yourself plays a critical role in your ability to recognize others achievements and 3) The advantages of mono-tasking vs multi-tasking For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 67, Evan Francen hangs out to talk about security fundamentals, communicating risk & passwords. My 3 main takeaways were 1) What a CISOs job actually is when you boil it down 2) How to choose a risk methodology that’s right for you and 3) Some of the intricacies involved in secure password management For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 66, Matt Danner joins the show to talk about digital forensics. My 3 main takeaways were 1) How to perform a forensics investigation against Google Storage 2) What the limitations of the Google Drive API are and 3) How to approach iOS and Android devices in an investigation. For more information, including the show notes check out: https://breachsense.io/podcast 
In episode 65, I talk with Dr. Martina Dove about the psychology behind fraud, persuasion and scam techniques. My 3 main takeaways were 1) What makes some people more susceptible to fraud 2) the techniques scammers use to convince us to take certain actions and 3) What influence factor is the most powerful For more information, including the show notes check out: https://breachsense.io/podcast 
In episode 64, Daniel Cuthbert joins us to talk about the OWASP Application Security Verification Standard. My 3 main takeaways were 1) Why the ASVS will make you a better pen tester and even bounty hunter 2) How to use the ASVS for threat modelling and 3) His tips on getting your talk accepted at a security conference For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 63, I talk with Nico Dekens, a.k.a Dutch_Osintguy about the dangers of relying on one search engine, Telegram OpSec, browser extensions & more. My 3 main takeaways were 1) When specific search engines will give you better results than others 2) How Telegram can be a better OSINT source than Tor and 3) Search techniques for finding the right keywords and channels on Telegram For more information, including the show notes check out: https://breachsense.io/podcast 
    In episode 62, Alissa Knight, the author of Hacking Connected Cars, joins us to talk about hacking connected cars, APIs, defense as well as vulnerability management. My 3 main takeaways were 1) Where to even begin with car hacking 2) The challenges car manufacturers have when trying to defend against these attacks and 3) How APIs are shaping the future of hacking For more information, including the show notes check out: https://breachsense.io/podcast 
  In episode 61, Robert Graham, the creator of masscan, joins us to talk about running internet wide port scanning the right way. My 3 main takeaways were 1) How to use the banner function correctly 2) How to figure out the fastest rate you can send packets and 3) The most common mistakes Rob sees when folks run masscan For more information, including the show notes check out: https://breachsense.io/podcast 
loading
Comments (1)

Sam Van Curen

Hey so you have a website or a show with more episodes, please don't stop, I listen to alot security and osint, CyberSecurity Computer Science Etc, and I have to say I like your format and with a lil news and some practical advice and tutorials, really appreciate, and I gotta say you'll have a really good product here I'd you fkeep it up, you definitely know your stuff and are up to date. keep it up bro

Apr 27th
Reply
loading