
BrakeSec Education Podcast
A podcast about the world of Cybersecurity, Privacy, Compliance, and Regulatory issues that arise in today's workplace. Co-hosts Bryan Brake, Brian Boettcher, and Amanda Berlin teach concepts that aspiring Information Security professionals need to know, or refresh the memories of seasoned veterans.
Latest episodes

Sep 8, 2014 • 36min
Malware, Threat Intelligence, and Blue Team talks at cons -- with Michael Gough Pt.2
We're back with part 2 of our discussion with Michael Gough. Not only do we discuss more about malware, but we also ask Michael's opinion on how commercialized conventions like Black Hat and Defcon have gotten, how good threat intelligence feeds are, and why there aren't more defensive talks at cons.
Michael is currently slated to give a talk on logging at DerbyCon September 24th, 2014 on how logging can help to mitigate malware infections.
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Sep 1, 2014 • 37min
Malware, and Malware Sentinel -- with Michael Gough Pt.1
Brian and I managed to get an interview with Michael Gough. If you remember, Michael was on to discuss Malware infections back in February, and we decided it was time to check up on him and his newly named 'Malware Sentinel'. This is part 1, where we discuss some of the recent malware infections, and where you need to look for new file creation, and what you can be looking for in your windows logs that are excellent indicators of malware compromise.
Windows logging cheat sheet - http://sniperforensicstoolkit.squarespace.com/storage/logging/Windows%20Logging%20Cheat%20Sheet%20v1.1.pdf
Malware Management Framework - http://sniperforensicstoolkit.squarespace.com/malwaremanagementframework
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Aug 25, 2014 • 49min
Reconnaissance: Finding necessary info during a pentest
I had a healthy debate with Mr. Boettcher this week about the merits of doing recon for a pentest. Mr. Boettcher is a heavy duty proponent of it, and I see it as a necessary evil, but not one that I consider important. We hash it out, and find some common ground this week.
People search links:
Spokeo - http://www.spokeo.com/
Pipl - https://pipl.com/
Sec Filings site: http://www.sec.gov/edgar/searchedgar/webusers.htm
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Aug 23, 2014 • 19min
Mr. Boettcher made a thing! Setting up a proper Debian install!
Mr. Boettcher made a thing! He created a video that highlights how to install Linux securely in a VM. His next video will be how to setup OWASP's WebGoat to test for vulnerable web apps. He noticed that documentation is a bit sparse, and often contradictory, so he wanted to help other folks who are having issues to get a proper install.
You will need an Network Install ISO of Debian, and you will need either VMware Player or Workstation.
His notes are below... Enjoy!
Secure the Goat #1 - Goat PenCreate a directory where you will put the VM. We'll call it 'goat'.Download the Debian Network Install ISO and place it in the 'goat' directory.Create a 'share' directory inside the goat directoryPlace a (test) file in the share directoryIn VMware Worstation create a new vm using a Debian ISO and run installUpdate the sudoers file$ su - root$ update-alternatives --config editor change to vim.tiny by pressing 2 and enter$ visudo -f /etc/sudoers copy the root line and add one for goat userIn order to install vmware tools, we'll need to install these packages$ sudo apt-get install gcc linux-headers-$(uname -r) makeFor the vmware tools install to work properly, these simlinks are required$ cd /lib/modules/$(uname -r)/build/include/linux$ sudo ln -s ../generated/utsrelease.h$ sudo ln -s ../generated/autoconf.hInsert vmware tools virtual CDIn the workstation menu select vm -> install vmware tools$ tar -C /tmp/ -zxvf /media/cdrom/VMwarTools... $ sudo /tmp/VMwareTools.../vmware-install.plShow desktop icons$ gsettings set org.gnome.desktop.background show-desktop-icons truechange resolution in menu at top: applications/system tools/preferences/system settings/ then 'displays'in Workstation under vm/settings, set virtual machine shared folderremove ISO file, take snapshot

Aug 18, 2014 • 37min
Ratproxy and on being a better Infosec Professional
This week, we go into a proxy program called "Ratproxy", discussed it's ins and outs. Plus, Mr. Boettcher and I have a discussion about how we as infosec people should work with developers and IT professionals to provide them training and understanding of security concepts.
https://code.google.com/p/ratproxy/
http://blog.secureideas.com/2012/07/how-to-setup-ratproxy-on-windows.html
Ratproxy icon courtesy of honeytech and flicker
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Aug 10, 2014 • 19min
Introduction to Nmap, Part 2
Here is Part 2 of our video for understanding the basics of Nmap. I discuss some of the logging output, the scripts found in Nmap, and the output that Nmap gives you for reporting or comparison later.
I really did want to go more into the Lua portion of the scripting engine, and perhaps make a simple script, but time constraints halted that. I hope to get more adept at video creation and hopefully editing, to make a more concise video tutorial.
Nmap target specifications: http://nmap.org/book/man-target-specification.html
http://nmap.org/book/nse-usage.html
Explanation of all Nmap scripts: http://nmap.org/nsedoc/
nmap icon courtesy of insecure.org

Aug 10, 2014 • 33min
Risk Management discussion with Josh Sokol - Part 2
This week we take some time to talk about risk management with Josh Sokol. This is part 2 from our interview with him last week... We talk some more about Simple Risk from the POV of Risk Management, as well as the licensing/modification of Simple Risk.
Mr. Boettcher and Josh discuss the merits of Qualitative vs. Quantitative Risk Analysis, and which one is better...
We also discuss NIST 800 series guidelines, and how he used those to excellent effect in Simple Risk.
Josh also discusses OWASP, how the advocacy and outreach works and how flexible the organization is.
NIST 800 Series docs - http://csrc.nist.gov/publications/PubsSPs.html
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Aug 4, 2014 • 28min
Interview with creator of Simple Risk, Josh Sokol! (Part 1)
Josh Sokol is on the International OWASP board of directors in addition to being the Information Security Program Owner at National Instruments in Austin, Texas. This week, he sat down with Brakeing Down Security to talk about Simple Risk, his homebrew application that assists people and organizations in managing their business risk, and at a much nicer cost that other GRC applications (it's free!) Check out Part 1 below. If you're at BlackHat 2014 this year, he will be showcasing it at Arsenal!
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Jul 28, 2014 • 45min
Flashback: Sqlmap - a little how-to, and getting your developers involved in using it.
This is a flashback from July 2015.
Mr. Boettcher and I discussed SQLMAP, a tool that can automate the process of pentesting databases and even registries on Windows. We discuss some functions of the program and why developers should get training on these.
Mr. Boettcher and I talk about how Infosec professionals should help to educate QA and Developers to be able to look at their processes and incorporate security testing, using tools like sqlmap in the Software lifecycle.
SQLMAP links
SQLMAP Wiki and more detailed documentation - https://github.com/sqlmapproject/sqlmap/wiki
http://sqlmap.org/
https://github.com/sqlmapproject/sqlmap
http://hackertarget.com/sqlmap-tutorial/
https://www.owasp.org/index.php/Automated_Audit_using_SQLMap
http://www.binarytides.com/sqlmap-hacking-tutorial/
http://blog.spiderlabs.com/2013/12/sqlmap-tricks-for-advanced-sql-injection.html
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/

Jul 21, 2014 • 46min
Part 2 with Georgia Weidman!
It only gets better in Part 2 of our Interview with Georgia Weidman, Author, Security Researcher and Creator of the Smartphone Pentesting Framework.
She talks about how people underestimate the mobile platform for pentesting purposes, and we even find out that in addition to Teaching a class on exploit development at BlackHat this year, she's going to be helping a great organization overseas.
We also got her talking about some do's and don'ts of pentesting! ;)
Please enjoy!
Georgia's book on No Starch: http://www.nostarch.com/pentesting
on Amazon.com: http://www.amazon.com/Penetration-Testing-Hands-On-Introduction-Hacking/dp/1593275641 (non-sponsored link)
Intro "Private Eye", transition "Mining by Moonlight", and Outro "Honeybee" created by Kevin MacLeod (incompetech.com) Licensed under Creative Commons: By Attribution 3.0http://creativecommons.org/licenses/by/3.0/