Primal Security Podcast

About this podcast
Primal Security Podcast is a show for people who want to hear about the latest security news and hear about the security industry.
Latest episodes
Aug. 14, 2017
Winter is coming and HBO is already feeling the chill…well maybe. This month we are joined by Zack, Luke, Lane, and Andrew talking about news items, and their normal random banter. This is the first podcast in a while we don’t mention Marissa Mayer from some breach…ah crap, well we will get it next time. NIST 800-63 Updated In June – TLDR you don’t need to change passwords all the time and you don’t need to require special characters, longer passwords better and harder to crack Shocker: Free VPN really isn’t that secure or private Chrome Extensions being hijacked to inject ads HBO Hacked #WinterIsComing Putin Bans VPNs Windows 10 Detecting PS attacks maybe? Skimmers Sending Texts Now – Card Fraud and Chill? MalwareTech Arrested for alleged ties to Kronos HaveIBeen PWND Passwords (300M) to download Dont bash researchers offensive tools in vendor ads (it back fires) #MimikatzStopsCarbonBlack Interesting Burp Extension: Burpa DEF CON: Most talks/workshops are up, here is a good one BH/DC: Hackers were able to compromise voting systems easily with physical access. Wanna cry hackers blocked from laundering bitcoins  Sweden leaks personal data of nearly all citizens Brooks Brothers discloses year long data breach  
June 26, 2017
With our first update of the summer we address multiple compromises, electoral hacks, and much much more! 1) WANNACRY/Ransomware Update 2) Kmart Pwned Again... 3) Chipotle hacked (hide your burritos)! 4) Gamestop hacked (I'm running out of valid credit cards) 5) Macron campaign hack and reaction 6) Russia accessed voter data/systems in 39 states 7) Shadowbrokers subscription and crowdfunding 8) XP isn't quite EoL yet
April 27, 2017
Tanium breaches trust with customer data to get new customers:   Unicode phishing:   Shadow Brokers New Release of Stuff:   Mastercard reveals fingerprint biometric to replace pin:    Massive Oracle Quarterly Patch Not the Only Worry with Solaris and Apache Struts 2:   Breaches:
March 13, 2017
Besides NOVA 2017 “Im Cuckoo for Malware”: IoT cloudpets hacked , Breaking Google Captcha v2 PoC Yahoo Hacked.......again: RIP SHA-1: S3 Outage: WordPress Vuln that popped the steal mountain of primalsec: SMBv3 Vuln:
Dec. 29, 2016
News Items:   APT-28 and APT-29, Fancy Bear and Cozy Bear:   Massive Data breaches   Hospitals make up 88% of all data breaches:   Cyber attacks on hospitals grew 63% in 2016:   Healthcare industry suffers 6.2 billion dollars in data breaches:$62-billion-in-data-breaches/d/d-id/1325482   Yahoo Got Hit Hard in 2016 - they got breached by all the things multiple times:
Oct. 31, 2016
Octoberfest -> Micah just released python parser for untapped   Mirai Botnet DNS Attacks (IoT) Joomla Vuln (CVE-2016-8869, 8870) - Unauth Account creation and priv esc Joomla core 3.4.4-3.6.3 (patched 3.6.4) PoC is out on this several examples. Dirtyc0w exploit (CVE-2016-5195) BSidesDC 2016: We Spoke Sean Metcaf Spoke on Powershell Micah Spoke on how to get connected in the security industry   BSidesJXN - 5 Ways We Break into a Network Phishing Web App Vulns Multicast Name Resolution Poisoning SMB Relay Attacks Account Compromise 
Sept. 2, 2016
This episode of Primal Security podcast is hosted by Andrew, Lane, Luke, and Zack with guest speaker Dan Amodio. Dan is an expert with all things penetration testing and red teaming and discusses his experiences with getting started in the industry. A lot of people want to become the super cool "hacker", but where do you start? Dan explains that the actual day to day of a penetration tester is far more than just performing penetration testing, you are a trusted consultant for your customer who often has to work long hours to ensure you complete the project. If you are new to security, or want to learn how to grow into a penetration testing role check out this podcast.
May 15, 2016
News Items: Bug Bounty via Hacker One for Porn Hub Blind XSS on Go Daddy Support Submission ImageTragick HTML PoC + Exploit PoC Cybrary Session Wednesday: How to Break Into A Company From the Internet Pt.1 Pwndlist got Pwned Facebook CTF platform Verizon 2016 DBIR released... And it is a source of controversy Ransomware on house of Reps have increased dramatically, resulting in the blocking of yahoo mail List of Panama Papers Officials released   Technical Segment: Email Spoofing and Phishing Highlight: If a company is using Google Apps for Work and has not set up SPF/DKIM/DMARC their domain can be leveraged to spoof emails..very reliably. Surprise surprise, people click links! Do you even need to be crafty? No probably not, but lets discuss some ways anyhow. You can spoof Emails - It can happen: Great write-up from Cobalt Strike If you are new to the email spoofing you should really read this article Telnet to the mail server, and attempt to manually craft the email. This works in default configurations on many Email servers and security appliances - SPF/DKIM/DMARC may not be setup allowing you to send email from the domain unauthenticated - The Cobalt Strike blog demonstrates that. This can also be done in Gmail! - Shows up as spoofed in normal gmail, but what about Google Apps for Work - You do not have SPF/DKIM/DMARC setup and can very easily spoof emails from that domain - both two the target domain and externally, and it will very frequently bypass security controls - we will release code on how to do that. We are normally targeting organizations that leverage Outlook - It will only grab the name portion of the email header (not the email) and present that to users, so you can have a Gmail email (can bypass controls since its Gmail/legit) and you can send email using Python (or another scripting language), and modify the name to be a quazi-spoof.
April 22, 2016
This month's podcast is hosted by Andrew, Lane, Luke, Matt, Zack, and guest speaker Eric Peterson from BreakPoint Labs. Eric has an extensive background in hunting for malware on enterprise networks and shares his knowledge on Ransomware.