SECTION 9 Cyber Security show

SECTION 9 Cyber Security

Summary: Just two people trying to figure out IT & information security. We spend a lot of time researching & testing security tools & best practices. We thought it would be a good idea to share our experiences with the world. Stay safe & secure. Don't let the hackers win!

Podcasts:

 #43 Prioritizing Vulnerabilities & Application Security | File Type: audio/mpeg | Duration: 35:31

This week we learned a few things about prioritizing vulnerabilities and OWASP application security. When it comes to vulnerabilities, you […]

 #42 Authenticated Scans With OpenVAS | File Type: audio/mpeg | Duration: 45:33

In this episode we talk about authenticated scans with OpenVAS. We cover the planning process, implementing authenticated scans, & lesions […]

 #41 Implementing Vulnerability Scanning | File Type: audio/mpeg | Duration: 29:38

I decided it was time to implement vulnerability scanning for Section 9.  We go over why we need it, & […]

 #40 Linux Commands: ifconfig vs ip | File Type: audio/mpeg | Duration: 18:54

Once again Dorothy finds time to work on her Raspberry Pi Kali Linux project. This time we learn that the […]

 #39 Migrating Projects to The New Network | File Type: audio/mpeg | Duration: 34:20

We begin migrating Dorothy’s Raspberry Pi project to the new network. She picks a vlan, subnet & switch ports. We […]

 #38 Forced to Implement a New Network | File Type: audio/mpeg | Duration: 29:23

On Wednesday morning we had a power outage. We survived, but this experience forced us to implement a new network. […]

 #37 Network Design, Cable Management & Switching | File Type: audio/mpeg | Duration: 27:05

We are struggling to figure out network design, cable management & switching, as we rebuild our network. We want to […]

 #36 Bypassing firewalls with Kali Linux & a Raspberry Pi | File Type: audio/mpeg | Duration: 39:08

In this episode, Dorothy goes back to her Raspberry Pi & Kali Linux project. She talks about ssh, changing the […]

 #35 Password Management | File Type: audio/mpeg | Duration: 28:16

It’s time for some password management. Like everyone else, we have too many usernames and passwords to remember. We cover […]

 #26 Hacking Metasploitable 2 with Metasploit | File Type: audio/mpeg | Duration: 32:13

This week we talk about hacking into Metasploitable 2 with Metasploit and the Msfconsole. We also talk about additional challenges we face when applying for an IT job. We share some of our concerns, and how we plan to get the skills we need. Damien share’s his new found skill with Metasploit and the Msfconsole. […]

 #25 Hacking: Joining The Dark Side | File Type: audio/mpeg | Duration: 44:56

In this episode we talk about keeping what we’ve learned, a WannaCry clarification, and Joining the dark side. As with anything, IT skills are perishable. Use them or loose them. We talk about the skills we’ve lost, how we got them back and how we plan to keep them. We do a quick WannaCry clarification […]

 #24 Searching for Exploits in Metasploit | File Type: audio/mpeg | Duration: 23:31

In this episode, we search for exploits in Metasploit. Damien covers the search command, CVE’s, Microsoft security bulletins and more. Find the exploit code for WannaCry / WannaCrypt by searching for the CVE, or Microsoft Security Bulletin. Understanding CVE’s and other vulnerability information is a big part of security. This information can help you secure […]

 #23 A Way to Study for IT Certs | File Type: audio/mpeg | Duration: 30:47

In this episode we share our way of studying for an IT certification. Dorothy explains the importance of hands on experience. This includes hands on labs and review questions. NETWORK DIAGRAM LINKS Homework-EnterpriseNetwork – Dorothy’s review questions Cybrary – Free and Open Source Cyber Security Learning

 #22 WannaCry, Kali Linux & IT Burnout | File Type: audio/mpeg | Duration: 36:06

In this episode we talk about WannCray, Kali Linux tools and IT Burnout. Everyone in IT has been talking about WannaCry. We focus on prevention and recovery. Damien talks about the Kali Linux tools he’s trying to learn. So far he’s looking into Recon-NG, Shodan and Metasploit. Dorothy want’s to share our experiences with IT […]

 #21: Ransomware, Network Troubleshooting & Kali Linux | File Type: audio/mpeg | Duration: 30:39

We recorded this episode on Saturday, 5-13-17. The day after the WannaCry ransomware attack. We explain what it is, what happened and share our experiences. We also share some of the problems we’ve run into with our projects. Dorothy does some network troubleshooting. I try to get the software required to follow our Kali Linux […]

Comments

Login or signup comment.