Reporting from DEFCON 2012, Darren catches up with Georgia Weidman to talk mobile application security. Plus Piotr and the gang from Quad Shot recap the last years experience building their open source RC aircraft. All that and more this time on Hak5!
This time in the show from Black Hat 2012, popping hotel key card locks and soho wifi routers with elegance. All that and more on this special episode of Hak5.
This time on the show we're tunneling our traffic through multiple servers with proxychains. Plus, safe password keeping and Active Directory authentication for Linux. All that and more this time on Hak5.
This time on the show, we challenge you... to respond... then we'll authenticate ya! That's right, we're getting into Challenge Response Authentication. Plus, Two-Factor Authentication for SSH using the Google Authenticator and how not to lock yourself out of your own workstation. All that and more, this time on Hak5!
Encryption 101 begins with understanding the terminology and mechanisms. This week we're breaking down encryption in the context of SSH - from symmetric and asymmetric to block and stream ciphers. All that and more, this time on Hak5.
This time on the show, using One-Time-Passwords in Linux for SSH authentication. We cover the theory and set up our server with a Yubikey. Plus, relay'ing without GatewayPorts, easily edit Known_Hosts, Free SSHFS in Windows and a ton more, this time on Hak5!
This time on the show, Local and Remote forwarding with SSH, Persistent connections in Linux with AutoSSH, Windows tunnels that don't quit with a GUI front-end for Plink and a whole lot of technolust. All that and more, this time on Hak5!
Traversing NAT firewalls couldn't be easier with a well crafted SSH proxy. This week Darren and Shannon break down reverse shells and persistence using a WiFi Pineapple and some autossh-fu. Plus, SSHFS GUIs for Linux, ClientAliveMaxCounts, Putty keys without Pageant and more!
Continuing with SOCKS5, SSH, Public Key Pairs and fingerprints, Darren and Shannon use SSH to create a secure remotely mounted network filesystem with implementations in both Windows and Linux.
This time on Hak5: We begin a special series on proxies. Caching, filtering, security or anonymity -- whatever your reasons may be Darren and I are exploring the in's and out's of this great technology from the ground up. All that and more, this time on Hak5!
This time on the show Darren reports from SXSW 2012 with Eighty of Dual Core and Chris Mooney of DoD.net. The boys discuss two-factor authentication on the Linux platform then brainstorm and develop a tool, dubbed "Kill All The Humans", to protect your machine from unwanted invaders. Invaders must die.
This time on the show, locking down your PC with proximity and a little bluetooth magic -- I'll be showing you how. Then, what's the IEEE on about these days? Darren reports from South-by-South-West. More fun bash tips and VPN security - who do you trust? All that and more, this time on Hak5!
This time on the show, maintaining persistence and privacy on IRC with your very own bouncer - Darren explains. Then setting up simple 2-factor authentication in Windows. Plus why VIM is better than VI, or was that Emacs? All that and much more this time on Hak5!
This time on the show, Ubuntu 12.04 is around the corner and we have a first-look at its new Head-Up Display. Then Eighty of Dual Core joins us to setup Backtrack 5 with root encryption. Plus Ubuntu on Android?