7 episodes

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

Unorthodox Hacking Unorthodox Hacking

    • Technology
    • 4.0 • 10 Ratings

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

    • video
    Episode #7 - Hidden Windows Passwords

    Episode #7 - Hidden Windows Passwords

    Finding and displaying some areas where Windows stores authentication credentials.

    • 7 min
    • video
    Episode #6 - Tinted Windows

    Episode #6 - Tinted Windows

    Demonstration of some little known Windows techniques such as getting Local System through AT and long filename fun.

    • 15 min
    • video
    Episode #5 - PHP and VHOSTS

    Episode #5 - PHP and VHOSTS

    Demonstration of gaining access to a web host providers system through PHP.

    • 11 min
    • video
    Episode #3 - Hacking Oracle

    Episode #3 - Hacking Oracle

    Demonstration of gaining access to a system shell through an Oracle database, along with mitigations.

    • 32 min
    • video
    Episode #4 - Hacking MSSQL

    Episode #4 - Hacking MSSQL

    Demonstration of gaining access to a system shell through a Microsoft SQL (MSSQL) database, along with mitigations.

    • 13 min
    • video
    Episode #2 - RealVNC Authentication Bypass

    Episode #2 - RealVNC Authentication Bypass

    Demonstration of the recent RealVNC authentication bypass vulnerability, along with mitigations.

    • 4 min

Customer Reviews

4.0 out of 5
10 Ratings

10 Ratings

Add 155144888 ,

Thank you!!!

Love the podcast, wish the author would start these again with some new material. However, thank you very much for the contributions made. This has clarified lots of questions.

Kharazan ,

Perfect.

Finally, a simple, straight forward diving into technical security. Perfect length videos. Well explained. Exciting.

AMDROZ ,

Very informative

I don't understand how people are bashing this. It's very easy to understand and it's simple to catch on to, even for a beginner. I'm learning from these videos and learning about ddosing from a friend. The methods listed are also useful in starting to protect your computer from attacks. Great podcasts, can't wait for more.

Top Podcasts In Technology

No Priors: Artificial Intelligence | Technology | Startups
Conviction | Pod People
Lex Fridman Podcast
Lex Fridman
All-In with Chamath, Jason, Sacks & Friedberg
All-In Podcast, LLC
Acquired
Ben Gilbert and David Rosenthal
Hard Fork
The New York Times
This Week in XR Podcast
Charlie Fink Productions