Professionally Evil Perspective








October 2021
          1 2
3 4 5 6 7 8 9
10 11 12 13 14 15 16
17 18 19 20 21 22 23
24 25 26 27 28 29 30


In this episode, we discuss ethics, TLS 1.3, autonomous cars and replacements for multifactor authentication. We also interview Amanda Berlin and her experience writing the book Defensive Security Handbook: Best Practices for Securing Infrastructure.

Direct download: PEP19.mp3
Category:security -- posted at: 10:39am EDT

This episode of the Professionally Evil Perspective podcast is an interview-style discussing the project RTLAMR. We discuss the purpose of the code, how SDR is used and the information you can expect to find from your ERT devices floating in the airwaves.

Direct download: RTLAMR-merged.m4a
Category:general -- posted at: 2:04pm EDT

In this Professionally Evil Podcast PEPisode, we re-launch the podcast.  12 of us hang out and talk about what we are doing and whats coming up.



Direct download: Podcast_July_12_2017.mp4
Category:security -- posted at: 3:50pm EDT

James and Kevin discuss a few of the events this year (breaches and otherwise), the release of Samuari 3.0 and some up-coming events.   

Direct download: PEP15.mp3
Category:security -- posted at: 3:19pm EDT

Is the idea of penetration testing evolving or is it staying the same?   What is the goal of a penetration test?  Does it differ by client?   James and Kevin discuss penetration testing and how it is changing. 

When it comes to reporting, what data do you include, how do you represent it, and who is your audience?  These questions and more are discussed.

Direct download: PEP14.mp3
Category:security -- posted at: 4:51pm EDT

We are not lawyers but want to make you aware of some of the laws that exist around data breaches.  Sometimes these laws pop up with very little media coverage and you have no idea.  

Direct download: PEP13.mp3
Category:security -- posted at: 3:52pm EDT

James and Kevin talk about the new office in Jacksonville, FL.  Some rambling about setting it up and how we like it.   Not so technical.. but exciting for us.

Direct download: PEP12.mp3
Category:security -- posted at: 11:44am EDT

James and Kevin discuss the idea of Exploitation and its importance in the testing methodology.  Join them for a witty conversation about one of the favorite phases of the process.

Direct download: PEP_Episode_12.mp3
Category:security -- posted at: 5:32pm EDT

Kevin and James discuss not only the issues for regarding vulnerabilities, but the real issue of the lack of security being part of the process.  This podcast covers a few different ways to build security in and reduce the risk exposure of your applications. 

Direct download: PEP11.mp3
Category:security -- posted at: 5:37pm EDT

James and Kevin discus the discovery aspect of the pentesting methodology as well as ramble about some other topics.   They announce the Samurai Helmet winner and talk about some upcomming events.

Direct download: PEP10.mp3
Category:security -- posted at: 1:46pm EDT

In this episode, James, Jason Gillam, Thom and Kevin talk about their experience at DerbyCon 2013 and the experience received at most cons that you attend.   A few talks are discussed and thoughts about the events and cons in general.

Direct download: Pep9.mp3
Category:security -- posted at: 7:41pm EDT

James and Kevin discuss all the naming issues seen with vulnerabilities, the release of SamuraiWTF 2.1 and a few other topics.

Direct download: PEP_Episode_8.mp3
Category:security -- posted at: 2:41pm EDT

In this episode, James, Kevin and Thom discuss the topic of the mapping phase of penetration testing.  The tool of the episode is Dirbuster, with a mention of Yokoso!.

Direct download: Pep7.mp3
Category:security -- posted at: 10:04pm EDT

In this episode James, Kevin and Jason discuss the hows and whys of recon during a pen test.  This is a very important first step in the process because it leads to a lot of information about a target very quickly. 

Direct download: Pep6.mp3
Category:general -- posted at: 11:12pm EDT

Kevin Johnson and James Jardine kick off the topic of attacking the web by looking at what web penetration testing is and what both sides of the test need to think about.  They discuss the need for the client to understand why they are testing, and what they are testing.  It then moves into discussing scoping techniques and some common gotchas.  A quick discussion on testing methodology, and then a quick segment on SQLMap and how it works. 

Direct download: PEP_Episode_5.mp3
Category:security -- posted at: 9:24am EDT

In this episode, James, Kevin and Nathan discuss the topic of Mobile testing.  They start of discussing the need for a lab environment and some of the hardware recommended.  They then discuss capturing network traffic with wireshark, http traffic with Burp, and the many benefits of the OWASP MobiSec project.

Direct download: PEP_Episode_4.mp3
Category:security -- posted at: 7:46pm EDT

In this Episode, Kevin, James and Jason discuss implications of using default or weak credentials on systems and applications.  In addition, they discuss some other mis-configurations regarding HTTP Methods and Web Server file accessibility (web.xml).

Direct download: PEP_Episode_3.mp3
Category:security -- posted at: 3:19pm EDT

In this podcast, James Jardine and Kevin Johnson discuss topics ranging from passwords to RSA to breaches.  We also release the new jingle as requested by @ChrisJohnRiley!

Direct download: PEP_Episode_2.mp3
Category:security -- posted at: 2:28pm EDT

In this episode, Kevin Johnson and James Jardine talk about a number of different flaws that many penetration testers and application developers miss.  They talk about how username harvesting and password resets can cause issues.  They also discuss the exposure that APIs and web services bring to applications.

Direct download: PEP_Episode_1.mp3
Category:security -- posted at: 3:21pm EDT