
How to Encrypt Your DNS and STOP Your ISP SNOOPING!
This video is from Naomi Brockwell: NBTV. We presume what we search for on the internet stays private. But you might be leaking all of your internet activity through something called a DNS request. It’s possible that every site you want to visit is being collected and sold by your ISP, or monitored by countless […]
Read More
DNS Remote Code Execution: Finding the Vulnerability 👾 (Part 1)
In this video, Flashback Team will tell you the story of how we found CVE-2020-10881 in the Pwn2Own Tokyo 2019 hacking competition and present our Game Plan for exploiting it.
Read More
Sony’s Impact on Internet Censorship
Naomi Brockwell: NBTV explains Sony is attacking critical infrastructure of the internet, why this is terrifying for the future of free online expression and access to information, and what you can do to help.
Read More
Are There Privacy Issues with DNS?
In this video, Naomi Brockwell will explain how DNS works, and how to set up your DNS to make your internet browsing far more private.
Read More
Google, Apple, and Microsoft Go Passwordless
- Frank
- May 16, 2022
- Android
- Apple
- big ip
- big-ip
- cyber security
- darren kitchen
- dns
- dns poisoning
- Enterprise
- f5
- fido
- fido alliance
- hack
- hack5
- hacker
- Hak5
- information security
- infosec
- IP Addresses
- Kernel
- Microsoft
- passwordless
- penetration testing
- pentest
- pentester
- pentesting
- red team
- shannon morse
- snubs
- Technology
An enterprise vulnerability has public exploits, big brands are going passwordless, and install this android security patch asap!
Read More
Banking in Latin America: Planning for Hybrid Cloud | Part 2
- Frank
- July 21, 2020
- AKS
- Application Gateway
- architecture
- Azure
- Azure Front Door
- Azure in the Enterprise
- Azure Kubernetes Service
- azure networking
- Cloud Native
- cluster
- Deployment
- Developers
- dns
- Fernando Mejia
- Gateway Subnet
- Hadoop
- Hub
- Hybrid Cloud
- Hybrid Networking
- IP
- Kubernetes
- kubernetes cluster
- Lyle Dodge
- machines
- Microservices
- Microsoft
- Microsoft Azure
- network
- Network Peering
- Nodes
- On-Premises
- Pod
- Spoke topology
- sql database
- Virtual Firewalls
- Virtual Network
- VNET
- VPN
- Workloads
In this second part episode, Fernando Mejia walks through everything you need to plan for in a Hybrid Cloud architecture for Azure Kubernetes Service. This includes IP address concerns from on-premises to Azure, hub and spoke topology, as well as the different options you have in Azure Kubernetes Service. Watch Part 1 Learn more: https://azure.microsoft.com/en-us/overview/kubernetes-on-azure
Read More
How DNS Works
Speaking of infrastructure, did you ever wonder how do websites marry up to their IP addresses? Dr Mike Pound explains the Domain Name System – DNS in this Computerphile video.
Read More
How to Build an Active Directory Hacking Lab
- Frank
- January 4, 2020
- Active Directory
- active directory lab
- Cybersecurity
- dns
- dns takeover
- domain admin
- ethical hacking
- hacker
- hacking
- ipv6 attack
- ipv6 dns takeover
- kali linux
- kerberoasting
- lab build
- llmnr
- m4v3r1ck
- mitm6 tutorial
- pen testing
- penetration tester
- penetration testing
- pentesting
- takeover
- tcm
- the cyber mentor
- thecybermentor
- walkthrough
The Cyber Mentor explores the how and why you should build an Active Directory Lab in this cyber-security filled tutorial video.
Read More