Épisodes

  • Shodan Unmasking the Internet´s Devices
    Sep 12 2025

    Shodan, a search engine for internet-connected devices. They explain how Shodan gathers public information, like open ports and software versions, by "pulling banners" from millions of IP addresses, which is a legal form of passive reconnaissance. The tutorial demonstrates using Shodan's web interface and command-line tool to identify vulnerable systems, such as those running outdated software or exposing sensitive ports, for both ethical hacking (penetration testing) and defensive security purposes.

    Voir plus Voir moins
    15 min
  • Complete guide to smuggling
    11 min
  • Shodan The Search Engine
    Sep 10 2025

    Shodan, a search engine for internet-connected devices. They explain how Shodan gathers public information, like open ports and software versions, by "pulling banners" from millions of IP addresses, which is a legal form of passive reconnaissance. The tutorial demonstrates using Shodan's web interface and command-line tool to identify vulnerable systems, such as those running outdated software or exposing sensitive ports, for both ethical hacking (penetration testing) and defensive security purposes.

    Voir plus Voir moins
    6 min
  • Nmap Demystified
    Sep 5 2025

    In this episode we provide a foundational overview of Nmap, a critical cybersecurity tool. The discussion highlights Nmap's primary function in identifying open ports and their associated services on target systems, a crucial step for both network administrators assessing their infrastructure and ethical hackers seeking vulnerabilities. The speakers explain basic Nmap commands like nmap -sT [IP address] for TCP scans and nmap -sU [IP address] for UDP scans, detailing the underlying TCP/IP communication principles, such as the three-way handshake and flag responses, that Nmap leverages. Furthermore, the source debunks common misconceptions, such as the "stealthiness" of SYN scans, and emphasizes the importance of understanding non-default ports and operating system detection (-A switch) for a more comprehensive security posture.

    Voir plus Voir moins
    15 min
  • Cartels Built Their Own Invisible Internet A Deep Dive into Off-Grid Networks and What It Means
    Sep 3 2025

    We discuss how Mexican drug cartels developed sophisticated, independent cellular networks to evade surveillance from governments and rival organizations. These private networks utilized older 2G/3G low-frequency technologies, like OpenBTS software and specialized hardware, to minimize the need for numerous cell towers, especially in remote areas. A key innovation highlighted is their advanced encryption methods, which generated temporary keys based on local geographic and environmental conditions, making interception extremely difficult. The text further explains that this technology, initially implemented by groups like Las Zetas with the help of kidnapped engineers, is now becoming more accessible and affordable for companies and individuals seeking secure, private communication off the public grid.

    Voir plus Voir moins
    16 min
  • Burp Suite Essentials for Web Vulnerability Testing
    Sep 2 2025

    A comprehensive, hands-on course on Burp Suite, a leading software for web penetration testing. It explains Burp Suite's modular design and its various core components, such as Proxy, Scanner, Intruder, Repeater, Decoder, and Comparer. The course details how to set up Burp Suite, including configuring proxy settings and installing CA certificates for HTTPS interception, and demonstrates practical applications like spidering, vulnerability scanning, Brute Force attacks, SQL injection, and command injection.

    Voir plus Voir moins
    13 min
  • Burp Suite Essentials for Web Vulnerability Testing
    Sep 2 2025

    A comprehensive, hands-on course on Burp Suite, a leading software for web penetration testing. It explains Burp Suite's modular design and its various core components, such as Proxy, Scanner, Intruder, Repeater, Decoder, and Comparer. The course details how to set up Burp Suite, including configuring proxy settings and installing CA certificates for HTTPS interception, and demonstrates practical applications like spidering, vulnerability scanning, Brute Force attacks, SQL injection, and command injection.

    Voir plus Voir moins
    6 min
  • The Moscow Rules: CIA Operatives, Cold War Tactics, and Defying the KGB
    Aug 31 2025

    In the heart of the Cold War, CIA operatives Antonio and Jonna Mendez faced the impossible: spying on Moscow under constant surveillance and the ever-present threat of the KGB. The Moscow Rules dives into their thrilling story, uncovering the ingenious tactics and daring strategies they developed to outwit Soviet intelligence. From Hollywood-inspired identity swaps to high-tech gadgets straight out of a spy movie, Antonio and Jonna’s work became the foundation for the CIA’s survival in a world where every move was monitored. As Russia’s influence grows again, this episode offers a fascinating look at the risks and brilliance behind some of the most effective intelligence operations of the 20th century.

    Voir plus Voir moins
    43 min