Podcast Episodes

Back to Search
PoC or GTFO, Volume 1

PoC or GTFO, Volume 1



The Book, "PoC or GTFO, Volume 1" is a collection of articles and essays from various authors on the topic of computer security and reverse engineering. The authors, who are known for their expertise…


Published on 9 months, 2 weeks ago

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology

Physical Red Team Operations: Physical Penetration Testing with the REDTEAMOPSEC Methodology



The Book, Physical Red Team Operations: Physical Penetration Testing, is a guide for security professionals on how to plan and execute physical red team operations, or physical penetration testing. T…


Published on 9 months, 2 weeks ago

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks

Phishing and Communication Channels: A Guide to Identifying and Mitigating Phishing Attacks



The Book material provides a comprehensive guide to phishing attacks, exploring various types, tactics, communication channels, and legal aspects. It examines social engineering techniques, different…


Published on 9 months, 2 weeks ago

PGP & GPG: Email for the Practical Paranoid

PGP & GPG: Email for the Practical Paranoid



This excerpt from the Book "PGP & GPG: Email for the Practical Paranoid" by Michael W. Lucas provides an overview of the open-source encryption programs PGP and GnuPG, which are used to protect the c…


Published on 9 months, 2 weeks ago

Personal Digital Security: Protecting Yourself from Online Crime

Personal Digital Security: Protecting Yourself from Online Crime



This excerpt from the Book, "Personal Digital Security: Protecting Yourself from Online Crime" provides advice on how to keep personal computers and mobile devices secure from malicious hackers. The …


Published on 9 months, 2 weeks ago

Perform a web penetration test

Perform a web penetration test



This Book teaches readers how to perform a web penetration test. The course explains the stages of a penetration test, beginning with understanding the nature of such a test and the ethics involved, …


Published on 9 months, 2 weeks ago

Penetration Testing With Perl

Penetration Testing With Perl



This excerpt from the Book "Pentesting With Perl" describes how to use Perl programming for penetration testing. The book covers a wide range of topics including how to use Perl to gather open-source…


Published on 9 months, 2 weeks ago

Linux Forensics

Linux Forensics



This Book, Linux Forensics, aims to provide a comprehensive guide to digital forensics using Linux. It explores various techniques for collecting, analyzing, and interpreting digital evidence from Li…


Published on 9 months, 2 weeks ago

Pentest Secrets: Breaking The Unbreakable Enterprise Security

Pentest Secrets: Breaking The Unbreakable Enterprise Security



The excerpt is a section from the book "Pentest Secrets," which details the author's experience with a double-blind penetration test. The author, Sagar Bansal, describes his team's process of gaining…


Published on 9 months, 2 weeks ago

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools

Penetration Testing With the Bash Shell: Make the Most of the Bash Shell and Kali Linux's Command-Line-Based Security Assessment Tools



Penetration Testing with the Bash Shell is a guide to using the Bash shell and Kali Linux command-line tools for penetration testing. The book covers fundamental Bash skills, customizing the shell en…


Published on 9 months, 2 weeks ago





If you like Podbriefly.com, please consider donating to support the ongoing development.

Donate