Hacker And The Fed cover image

Thousands of Intelligence and Defense Employees Exposed, a Hacker Infects His Own Computer, Google Accuses Apple Employee of Not Reporting a Zero-day

Hacker And The Fed

CHAPTER

How to Verify That Software Is Safe for Production

Hector, Alonzo and Ethan answer your questions at hacker in the fed. If you have questions for Hector and I, reach out to us at questions at hackerinthefed.com. We love your questions and we'd love your feedback. Pete: How would you go about verifying that software is safe from a production environment with a little specific tooling as possible? Could you do a successful living off the land reverse engineering of a given binary? If not, what would be the resources you would need to feel comfortable for you to get the job done well?

00:00
Transcript
Play full episode

Remember Everything You Learn from Podcasts

Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.
App store bannerPlay store banner