Secure After Dark

PODCAST · technology

Secure After Dark

People often imagine hackers lurking in back alleys, skulking through darkness. Even though the reality is cybersecurity, and even hacking, is more corporate, there’s still an on-the-streets vibe to much of what cyber professionals do. If that’s where your interest lies, The Secure After Dark podcast is for you.Join host Tanner Shinn to learn from Alias and outside guests about the often-hidden side of cybersecurity.  

  1. 20

    Advanced ODINT, Infrastructure Mapping & War Driving (ft. Ringmast4r) 🧠

    In this episode of Secure After Dark, Tanner sits down with Ringmast4r (Patrick Quirk) to dive into aggressive OSINT, large-scale government data extraction, and the future of digital transparency. From war driving and custom-built signal intelligence rigs to extracting more than 188GB of publicly exposed Venezuelan government data, Ringmast4r walks through the mindset, tools, and automation behind his research.We also explore ODINT, his nonprofit initiative focused on mapping digital infrastructure and documenting security failures across global government systems ... all without crossing legal lines. If you’re into OSINT, RF hacking, hardware builds, and pushing technical boundaries, this one’s for you. ⌨️ 🔗https://odint.io🔗http://instagram.com/ringmast4r/Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  2. 19

    DEF CON 33 ft. Solaris

    In this After Dark episode, Solaris and Tanner take us behind the scenes of real-world penetration tests ... with wild stories of social engineering and physical ops that range from wedding crashers to Italian perfume factories’ networks. 🕵️‍♂️💻Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  3. 18

    "Fear of Hacking at DEF CON Vegas" (AFTER DARK SPECIAL)

    Valiant didn’t go to Las Vegas expecting to find belonging. He went to DEF CON (the world’s most infamous hacker conference) armed with stickers, a mic, and a healthy dose of paranoia. What he found was something else entirely.This isn’t your typical conference recap. It’s a raw, unfiltered, and occasionally absurd field report from the front lines of hacker culture. From TSA misadventures and social engineering sleight-of-hand to vishing competitions, AI villages, and many a drink, this is the story of how a n00b stumbled into a world he didn’t know he was already part of.If you’ve ever wondered what it’s really like inside DEF CON, or what happens when a marketing director who is charged-and-synced with the spirit of Hunter S. Thompson goes full gonzo in the name of cybersecurity, this one’s for you.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  4. 17

    Ransomware, DEF CON, and the Closing of A LEGEND.

    This year, our favorite bar closed and ransomware attacks have been forecast to double... is there a connection? Probably not, but listen to the new Secure AFter Dark anyway as we chat about all of this and more!Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  5. 16

    Episode 14: Rewriting Pentesting - Netexec's Developer Insights

    Tanner Shinn sits down with Alex and Thomas, developers behind Netexec, to talk all things pentesting. From rewriting tools to redefining workflows, this episode dives into how Netexec is reshaping offensive security for modern red teams. 💻⚡️Whether you're deep in the weeds of network testing or just curious about where open-source tooling is headed, you won’t want to miss this one.Check out the Netexec project here: https://www.netexec.wiki/Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  6. 15

    Cybersafari: An Inteview With Joe Exotic

    Join Donovan Farrow for an exclusive interview with the one and only Joe Exotic, the infamous "Tiger King"! 🐅In this episode, Joe opens up about his life behind bars, his thoughts on his trial, and what the future holds for him. You won't want to miss his candid takes on the controversies, his passion for big cats, and his plans for redemption.Get ready for a wild ride with Joe Exotic!Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  7. 14

    Episode 13: Insider Insight: IR From an Insider Perspective, Pt 2

    Tanner and Joe continue their conversation about how IRs appear from inside an organization.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  8. 13

    Episode 12: Insider Insight: IR From an Insider Perspective, Pt 1

    Tanner is joined by Joe Bowersox to chat about an IR from an insider perspective - what organizations should know, how they should prepare, and how to interact with an IR team for best results. This is Part 1 of a 2 part episode.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  9. 12

    Episode 11: InfoSec Pat

    Tanner Shinn is joined by cybersecurity content creator and consultant InfoSec Pat to talk about his journey to becoming a recognized and respected provider of information in the cybersecurity and IT community. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  10. 11

    Episode 10: Get Zapped: Simon Bennetts on Zap and All Things Security

    Simon Bennetts helped pioneer the popular web app scanner Zap. He joins Tanner Shinn to talk about the tool's development and expansion and all other things cybersecurity. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  11. 10

    Episode 9 - Insane in Cyber

    Join Tanner Shinn and Keelan Knox as they discuss how high-stress cyber situations can lead to "interesting" interactions. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  12. 9

    Episode 8 - Dark Frontier: Digital Forensics in the Wild

    Digital forensics is a niche field. It takes a very special sort of person. The few. The proud. The traumatized.  On this episode of Secure After Dark, host Tanner Shinn is joined by Alias CEO and founder Donovan Farrow. He'll share stories from his expert career in the field, from how Alias was founded to protect the innocent to how deep the strange, bizarre, and profane can go when dealing with what can be the dark underbelly of the cyber field.  Disclaimer: This episode contains explicit references to adult themes. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  13. 8

    Episode 7 - Adult Activity Vulnerability

    The IOT (Internet of Things) presents a range of vulnerabilities, from the ability of the devices themselves to be hacked to the potential to use hacked devices for further, more critical exploits (remember the company hacked through an internet-enabled fish tank thermometer?).  The dangers are wide ranging. So are the potentially exploitable devices.  On this episode of Secure After Dark, host Tanner Shinn talks with Andrew Lemon about the world of internet-enabled adult novelty items, from the way they can be exploited to how they could be used to leverage other exploits to how companies involved in the industry already collect, store, use, and sell user data.  Disclaimer - this episode contains explicit reference to adult material.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  14. 7

    Episode 6 - Probing AI's Powers: From Security Enhancements to Extortion Tactics

    AI is all the rage in the news. From how cyberthreats will be on the rise to how cyberdefense can leverage the technology for better security. But what, really, can AI do? What's hype? And what are legitimate concerns and opportunities?On this episode of Secure After Dark, Tanner Shinn engages in a conversation with an AI practitioner to get to the bottom of what is and what isn't possible. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  15. 6

    Episode 5 - Forensics Follies

    Digital Forensics is its own world. And the population can be…interesting. First calls and ongoing cases can run from the mundane to the truly mad. On this episode of Secure After Dark, Tanner Shinn is joined by Andrew Peters, Alias Forensics expert, to discuss the peculiarities of the role and how to navigate conversations with the hurt and the unhinged. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  16. 5

    Episode 4 - All Geared Up

    Security experts and hackers alike know, and probably have, all the tools of the trade. But having the tools and efficiently carrying them and having them handy for use is another issue. On this episode of the Secure After Dark podcast, host Tanner Shinn talks with gear craftsman Daniel, known online as Mr. AOKU, designer of aoku ware. They'll talk about how he got into hacking and creating gear for covert entry and ease of use and why design should matter when you're figuring out how to carry your kit. Interested in aoku merch? Visit the shop at https://aokuware.com.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  17. 4

    Episode 3 - Let's Get Physical: Tips of the Trade for Forced an Coerced Entry, Part 2

    Tanner Shinn and Skypirate continue their discussion of physical entry techniques and tricks. Interested in learning more about the work Skypirate does? Visit his website: https://www.cloakedentryco.com/This is part 2 of a 2 part episode.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  18. 3

    Episode 3 - Let's Get Physical: Tips of the Trade for Forced an Coerced Entry, Part 1

    Looking to "break into" cybersecurity? Maybe it involves literally learning how to break in!Physical penetration is one of the most interesting, obscure, and rewarding parts of checking organizational (and sometimes personal) security. The most secure network isn't safe if it's not protected physically.Host Tanner Shinn is joined today by Skypirate (aka Marcus Singletary), a longtime army expert in covert and surreptitious entry and founder of Cloaked Entry Co. They'll talk all things forced entry, from the tools to use to the tricks to avoid discovery. This is part 1 of a 2 part episode.Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  19. 2

    Episode 2 - Get Ready to Get Yoinked: Physical Fitness in Cybersecurity

    Cybersecurity is mostly a sedentary job. You sit. You defend. You research. You remediate. It's a lot of time staring at a screen.It's easy to develop that cyberslouch and slide into that cyberbod. 💪🏽On this edition of the Secure After Dark podcast, host Tanner Shinn (did you know he once owned a gym?) and guest Phillip Wylie (did you know he's a former wrestler?) chat about why physical fitness is important to our field. They'll share their journeys lifting weights and getting fit. 🏋️‍♂️#Cybersecurity #Fitness #SecureAfterDarkListen on Apple Podcasts, Spotify and anywhere you get your podcasts.

  20. 1

    Episode 1 - Physical Feats

    Your physical security is key to your cybersecurity. The most secure network can be breached if an attacker can walk into your server room. And that's what Alias tries to do in a Physical Penetration test.On this episode, host Tanner Shinn is joined by Alias Security Engineer Robert Leasure to discuss the tips and tricks of the trade and share stories of favorite and most successful tactics and engagements. Listen on Apple Podcasts, Spotify and anywhere you get your podcasts.

Type above to search every episode's transcript for a word or phrase. Matches are scoped to this podcast.

Searching…

No matches for "" in this podcast's transcripts.

Showing of matches

No topics indexed yet for this podcast.

Loading reviews...

ABOUT THIS SHOW

People often imagine hackers lurking in back alleys, skulking through darkness. Even though the reality is cybersecurity, and even hacking, is more corporate, there’s still an on-the-streets vibe to much of what cyber professionals do. If that’s where your interest lies, The Secure After Dark podcast is for you.Join host Tanner Shinn to learn from Alias and outside guests about the often-hidden side of cybersecurity.

HOSTED BY

Alias Cybersecurity

CATEGORIES

URL copied to clipboard!