Chapter
Running exploits in the military
The military runs exploits to see if their computers are vulnerable, monitoring for security events and helping secure the network better, by using tools that gather information about what computers, services, and applications are running on the network.
Clips
DRADA offers cloud compliance software for continuous monitoring and visibility into risk, security controls and audit readiness for various standards.
01:06 - 03:15 (02:09)
Summary
DRADA offers cloud compliance software for continuous monitoring and visibility into risk, security controls and audit readiness for various standards. It can automate custom frameworks and controls to meet an organization's security needs.
ChapterRunning exploits in the military
Episode114: HD
PodcastDarknet Diaries
The early days of the internet were characterized by inquisitive dial-up connections and the discovery of new machines.
03:16 - 04:57 (01:41)
Summary
The early days of the internet were characterized by inquisitive dial-up connections and the discovery of new machines. Before the internet, one would have to repeatedly dial and try to connect by phone to various machines and explore their functions.
ChapterRunning exploits in the military
Episode114: HD
PodcastDarknet Diaries
The speaker discusses their experience as a first-time programmer at a DoD contractor where they were tasked with building hacker tools to test the Air Force's defenses, and how it was a fun job despite being a terrible programmer.
04:57 - 07:47 (02:50)
Summary
The speaker discusses their experience as a first-time programmer at a DoD contractor where they were tasked with building hacker tools to test the Air Force's defenses, and how it was a fun job despite being a terrible programmer.
ChapterRunning exploits in the military
Episode114: HD
PodcastDarknet Diaries
Edith Piazza and Peter T. Leeson started Digital Defense to provide security assessments, including penetration testing for commercial clients.
07:44 - 08:25 (00:40)
Summary
Edith Piazza and Peter T. Leeson started Digital Defense to provide security assessments, including penetration testing for commercial clients. However, the lack of readily available exploits in the late 90s posed a significant challenge.
ChapterRunning exploits in the military
Episode114: HD
PodcastDarknet Diaries
Learn about the process of a typical penetration test and the importance of exploiting a system's vulnerabilities in order to demonstrate the risk to the client.
08:25 - 09:44 (01:19)
Summary
Learn about the process of a typical penetration test and the importance of exploiting a system's vulnerabilities in order to demonstrate the risk to the client.