5 episodes

Welcome to 'Break Into Security: Is It Broken?' where we explore the exciting world of cybersecurity and the many challenges and opportunities for those looking to break into the industry. From understanding the latest cybersecurity concepts to learning about the different career paths available, our podcast is your go-to resource for all things security. Whether you're a student, a recent graduate, or a professional looking to make a career change, our expert guests and in-depth discussions will provide you with the insights and knowledge you need to succeed in this fast-paced and ever-evolving field. So join us as we delve into the world of security and discover if the industry is truly broken or if there are just a few cracks in the system.

Break Into Security; Is It Broken Mogul Group Podcasts

    • Technology

Welcome to 'Break Into Security: Is It Broken?' where we explore the exciting world of cybersecurity and the many challenges and opportunities for those looking to break into the industry. From understanding the latest cybersecurity concepts to learning about the different career paths available, our podcast is your go-to resource for all things security. Whether you're a student, a recent graduate, or a professional looking to make a career change, our expert guests and in-depth discussions will provide you with the insights and knowledge you need to succeed in this fast-paced and ever-evolving field. So join us as we delve into the world of security and discover if the industry is truly broken or if there are just a few cracks in the system.

    The Swiss Army Knives of Hacking: Netcat, Ncat, and Nmap

    The Swiss Army Knives of Hacking: Netcat, Ncat, and Nmap

    Welcome to another episode of the "Break Into Security: Is It Broken?" podcast with your host, Akyl "Ambition" Phillips. In this episode, we delve into the world of hacking and discuss the Swiss Army knives of the trade. Akyl introduces us to three powerful tools: Netcat, Ncat, and Nmap.

    Netcat, which emerged in October 1995, and its counterpart Ncat, developed a year later, share similar functionalities but are not coded with the same source code. These command-line utilities are essential for any aspiring hacker or security engineer. Akyl takes us through the various applications of these tools, from opening Netcat listeners to file transfers and downloads, data encryption with the Open SSL toolkit, banner grabbing, live drive cloning, and even remote and reverse shells.

    But why are these tools considered Swiss Army knives? Akyl explains how Nmap, created by Gordon Lyons in 1997, brings network mapping, OS detection, and scripting into the mix. Nmap, coded in C and C++, with additional support for Python and Lua, combines the functionalities of Netcat and Ncat while adding advanced features. It becomes a must-have resource for network engineers, security professionals, and aspiring penetration testers.

    For those looking to explore these powerful tools further, Akyl provides valuable resources in the podcast description. The NMAP Guide offers comprehensive information on Nmap, while the Netcat cheat sheet provides a handy reference for understanding the Swiss Army nature of these tools.

    Whether you're an industry newcomer or an experienced professional, understanding and utilizing these Swiss Army knives of network and system security is crucial. Join Akyl in uncovering the vast capabilities and potential of Netcat, Ncat, and Nmap in this enlightening episode.

    Tune in now to sharpen your hacking skills and gain insights into the world of network security.Netcat Cheatsheet- https://quickref.me/nc.html

    NCat Cheatsheet- https://kalinull.medium.com/ncat-cheatsheet-ddc5f07d8533

    NMAP Cheatsheet- https://www.stationx.net/nmap-cheat-sheet/

    NMAP Ref Guide- https://nmap.org/book/man.html

    Command from Video {nc -l -p [port#] -e /bin/bash}

    • 5 min
    Initial Access: Mastering the MITRE ATT&CK Matrix

    Initial Access: Mastering the MITRE ATT&CK Matrix

    In this episode of "Break Into Security: Is it Broken?", host Akyl Ambition Phillips takes you on an animated, pleasantly aggressive deep dive into the world of the MITRE ATT&CK Matrix. With a decade+ of experience in information technology, information security, and cybersecurity, Akyl shares his insights and knowledge tailored for both newcomers and experienced professionals in the cybersecurity field. Discover the landscape of cybersecurity in 2023, the benefits of utilizing the MITRE ATT&CK Matrix, and its application in various environments. Also, explore initial access techniques, including drive-by compromise, replication through removable media, and supply chain compromise. This episode is perfect for those breaking into the industry, those who want to learn more about the MITRE ATT&CK Matrix, or experienced professionals looking to expand their understanding. So, join Akyl for an engaging and informative journey into the world of cybersecurity!Checkout the Mitre Att&CK Watch the Full Video Presentation on Youtube

    • 26 min
    Becoming a Cybersecurity Risk Management Expert with Patrick Jeanty

    Becoming a Cybersecurity Risk Management Expert with Patrick Jeanty

    Welcome to an electrifying episode of "Break into Security; Is it Broken?" where we delve into the captivating journey of a Marine veteran who has made a successful transition into the world of cybersecurity. This Cyber Risk Management Expert shares their story, offering an inside look at the challenges and triumphs along the way.

    Don't miss out on the chance to hear from someone who has lived the experience and can provide valuable insights and guidance for veterans looking to break into cybersecurity. From understanding the industry's landscape to developing the necessary skills, our guest covers it all.

    We also discuss the current state of the industry, including the skills shortage, the importance of diversity and inclusivity, and what the future holds. Join us for a thought-provoking conversation that will leave you feeling inspired and motivated to pursue your own path in cybersecurity.

    So, if you're a veteran interested in transitioning into the field, or just looking for some guidance, tune in now! This episode of "Break into Security; Is it Broken?" is a must-listen for anyone who wants to thrive in the fast-paced world of cybersecurity. Don't wait, hit the play button now!

    • 38 min
    Break Into Security; Is It Broken (The Trailer)

    Break Into Security; Is It Broken (The Trailer)

    "Are you interested in breaking into the cybersecurity industry but don't know where to start? Are you curious about the latest cybersecurity concepts and trends but don't know where to look? "Break Into Security; Is It Broken?" is here to guide you through the ins and outs of the cybersecurity industry. Join host Akyl Phillips as he interviews industry experts, explores the latest cybersecurity concepts, and shares tips and tricks for breaking into the field. From learning the basics to staying ahead of the game, "Break Into Security; Is It Broken?" has got you covered. Tune in to learn about the industry, the people, and the tech. So, if you're ready to take the first step in your cybersecurity journey, join us on "Break Into Security; Is It Broken?" and let's explore the world of cybersecurity together."

    • 51 sec
    The Correlation between Social Engineering and Digital Marketing

    The Correlation between Social Engineering and Digital Marketing

    In this episode of "Break into Security", we delve into the fascinating world of social engineering and its correlation with digital marketing. Our host, Ambition Phillips, takes us on a journey through the principles of social engineering and how they can be used to manipulate human behavior to gain unauthorized access to computer systems and networks. We explore the concept of authority in social engineering, and how it is utilized in marketing tactics, techniques, and protocols. From the use of scent in the Aqua Velva and Old Spice commercials to the symbolism of a masculine scent in advertising, we uncover the ways in which marketers use social engineering to influence consumer behavior. Join us as we explore the intersection of social engineering and digital marketing and discover the question that it brings to mind.

    Watch The Video Episode:

    https://youtu.be/KazNGMuGMF4

    Social Engineering Reads:Mailchimp Suffer Social Engineering Attack - https://www.cshub.com/attacks/news/iotw-mailchimp-suffers-another-social-engineering-attack

    Social Engineering Stats - https://www.thesslstore.com/blog/social-engineering-statistics/

    Social Engineering Uber - https://www.theverge.com/2022/9/16/23356959/uber-hack-social-engineering-threats

     The Psychology of Social Engineering - https://www.youtube.com/watch?v=wDY_SPfed7c&t=2059s

     

     

    • 14 min

Top Podcasts In Technology

Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Deep Questions with Cal Newport
Cal Newport
Dwarkesh Podcast
Dwarkesh Patel
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times