7 episodes

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

Unorthodox Hacking Unorthodox Hacking

    • Technology
    • 3.8, 11 Ratings

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

    • video
    Episode #7 - Hidden Windows Passwords

    Episode #7 - Hidden Windows Passwords

    Finding and displaying some areas where Windows stores authentication credentials.

    • 7 min
    • video
    Episode #6 - Tinted Windows

    Episode #6 - Tinted Windows

    Demonstration of some little known Windows techniques such as getting Local System through AT and long filename fun.

    • 15 min
    • video
    Episode #5 - PHP and VHOSTS

    Episode #5 - PHP and VHOSTS

    Demonstration of gaining access to a web host providers system through PHP.

    • 11 min
    • video
    Episode #4 - Hacking MSSQL

    Episode #4 - Hacking MSSQL

    Demonstration of gaining access to a system shell through a Microsoft SQL (MSSQL) database, along with mitigations.

    • 13 min
    • video
    Episode #3 - Hacking Oracle

    Episode #3 - Hacking Oracle

    Demonstration of gaining access to a system shell through an Oracle database, along with mitigations.

    • 32 min
    • video
    Episode #2 - RealVNC Authentication Bypass

    Episode #2 - RealVNC Authentication Bypass

    Demonstration of the recent RealVNC authentication bypass vulnerability, along with mitigations.

    • 4 min

Customer Reviews

3.8 out of 5
11 Ratings

11 Ratings

The_J_ness ,

Please Elaborate

good layered on info but too fast!!! also needs basic info about the used programs, window shares, ect.

or us podcast watchers are left in the \\dark !!!

Add 155144888 ,

Thank you!!!

Love the podcast, wish the author would start these again with some new material. However, thank you very much for the contributions made. This has clarified lots of questions.

Kharazan ,

Perfect.

Finally, a simple, straight forward diving into technical security. Perfect length videos. Well explained. Exciting.

Top Podcasts In Technology

Listeners Also Subscribed To