7 afleveringen

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

Unorthodox Hacking Unorthodox Hacking

    • Technologie

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

    • video
    Episode #7 - Hidden Windows Passwords

    Episode #7 - Hidden Windows Passwords

    Finding and displaying some areas where Windows stores authentication credentials.

    • 7 min.
    • video
    Episode #6 - Tinted Windows

    Episode #6 - Tinted Windows

    Demonstration of some little known Windows techniques such as getting Local System through AT and long filename fun.

    • 15 min.
    • video
    Episode #5 - PHP and VHOSTS

    Episode #5 - PHP and VHOSTS

    Demonstration of gaining access to a web host providers system through PHP.

    • 11 min.
    • video
    Episode #3 - Hacking Oracle

    Episode #3 - Hacking Oracle

    Demonstration of gaining access to a system shell through an Oracle database, along with mitigations.

    • 32 min.
    • video
    Episode #4 - Hacking MSSQL

    Episode #4 - Hacking MSSQL

    Demonstration of gaining access to a system shell through a Microsoft SQL (MSSQL) database, along with mitigations.

    • 13 min.
    • video
    Episode #2 - RealVNC Authentication Bypass

    Episode #2 - RealVNC Authentication Bypass

    Demonstration of the recent RealVNC authentication bypass vulnerability, along with mitigations.

    • 4 min.

Top-podcasts in Technologie

Acquired
Ben Gilbert and David Rosenthal
✨Poki - Podcast over Kunstmatige Intelligentie AI
Alexander Klöpping & Wietse Hage
De Technoloog | BNR
BNR Nieuwsradio
Lex Fridman Podcast
Lex Fridman
Darknet Diaries
Jack Rhysider
Bright Podcast
Bright B.V.