Cyber Crime Junkies cover image

Break in. Offensive Security. Hacker Phil Wylie.

Cyber Crime Junkies

00:00

CTFs: A Red Team Exercise

Use a separate computer than the regular one that they use, right? Set up their own either home server or laptop, PC, et cetera. So that way it's kind of a contained unit away from like your regular work and your regular study. Yes, definitely because you get like Metasploit, some of the more commercialized tools open source tools been around there's kind of safe. Sometimes when you start downloading exploits, you never know. It can be backdoored because not everyone is creating exploits or doing this ethically.

Play episode from 20:17
Transcript

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app