7 episodes

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

Unorthodox Hacking Unorthodox Hacking

    • Technology

Unorthodox Hacking's goal is to expose the mysteries behind hacking through demonstrational video tutorials, while taking it one step further and concluding each episode with ways to mitigate the hacks demonstrated. We will dive into the traditional and not so traditional hacks one may encounter, since it is easy to defend against the more well know hacks published in just about every book, but much more difficult to even detect a persistent attacker who wishes to remain under the radar.

    • video
    Episode #7 - Hidden Windows Passwords

    Episode #7 - Hidden Windows Passwords

    Finding and displaying some areas where Windows stores authentication credentials.

    • 7 min
    • video
    Episode #6 - Tinted Windows

    Episode #6 - Tinted Windows

    Demonstration of some little known Windows techniques such as getting Local System through AT and long filename fun.

    • 15 min
    • video
    Episode #5 - PHP and VHOSTS

    Episode #5 - PHP and VHOSTS

    Demonstration of gaining access to a web host providers system through PHP.

    • 11 min
    • video
    Episode #3 - Hacking Oracle

    Episode #3 - Hacking Oracle

    Demonstration of gaining access to a system shell through an Oracle database, along with mitigations.

    • 32 min
    • video
    Episode #4 - Hacking MSSQL

    Episode #4 - Hacking MSSQL

    Demonstration of gaining access to a system shell through a Microsoft SQL (MSSQL) database, along with mitigations.

    • 13 min
    • video
    Episode #2 - RealVNC Authentication Bypass

    Episode #2 - RealVNC Authentication Bypass

    Demonstration of the recent RealVNC authentication bypass vulnerability, along with mitigations.

    • 4 min

Top Podcasts In Technology

Podcast o technologii
Kanał o technologii
Nadgryzieni - Rozmowy (nie tylko) o Tech
Wojtek Pietrusiewicz
Lex Fridman Podcast
Lex Fridman
Technologicznie
Pucek / Kuźniar • by Voice House
Opanuj.AI Podcast
Opanuj.AI Podcast
Product Odyssey
Vazco