Hacker And The Fed

Search Engine Vulnerabilities, Ghost Tokens, Anna Kournikova

Apr 27, 2023
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
How to Deal With Dependency Confusion
01:37 • 3min
3
Google's Recalling to a Repository
04:54 • 2min
4
Giaraffe Security: How to Find Dependency Confusions in Large Tech Companies
06:47 • 2min
5
The Googlers Compromise
08:46 • 2min
6
Google's Social Engineering Campaign: A Passive Attack
10:36 • 2min
7
How to Integrate Python Into Your Development Cycle
12:59 • 3min
8
Ghost Tokens Open Google Accounts to Permanent Infections
15:35 • 2min
9
The Ghost Token: A Backdoor to Your Account
17:40 • 2min
10
OAuth Fishing: A Social Engineering Campaign
19:36 • 2min
11
Google's Ghost Token Attack
21:30 • 3min
12
Delete Me: A Simple Subscription Privacy Service for Reducing Unwanted Personal Information
24:04 • 2min
13
How to Start a Therapy Program With BetterHelp
26:27 • 3min
14
The Absurdity of Hacker Group Names
29:05 • 3min
15
Microsoft's Change in Names of Hacking Groups
32:32 • 2min
16
How Long Would It Take to Brute Force a Password?
34:36 • 2min
17
How to Crack High Entropy Passwords
36:57 • 2min
18
How to Create a Password That's Simple and Effective
38:36 • 2min
19
Hacker in the Fed: How to Save Our Banter
40:26 • 2min
20
The Importance of Intelligence Analysts in Cyber Cases
42:17 • 2min
21
The Importance of Security in Apple Devices
44:31 • 4min
22
The Melissa Virus
48:33 • 2min
23
The Anacornicova Virus
50:20 • 4min
24
How Many Times Has Hector Left His Own Name in the Episode?
53:58 • 2min
25
Naxo's Exciting Year
55:49 • 2min