All Episodes
Chat with a White Hat — 73 episodes
Hack: Domain Admin Password in 20 Seconds
Exploiting SAML Audience Misconfiguration
Fighting AI with AI: The Future of Pen Testing
CSS Injection Leads to Zero-Day Vulnerability
Security Testing: Not Glamorous, But Essential
Pentesting: A Fool's Errand?
The Importance of Articulating Vulnerability Impact
Journey into Cybersecurity: HaxrByte's Story
SQL Injection: Understanding the Backend
CSS Injection Leads to Major Security Breach
Dylan’s Quick Introduction
From Gamer to Bug Bounty Hunter with Dylan Lawhon
The Importance of Planning in Penetration Testing
Start Now: Breaking into Cybersecurity
Pentesting: A Partnership, Not an Adversary
Reverse Engineering Mac OS X Keylogger
Master Fundamentals for Cybersecurity
Guest Spotlight: Dylan Lawhon - The Cybersecurity Journey
Guest Spotlight: Nick Aures' Cybersecurity Insights
Ed Williams Shares a Shocking Password Hack
Why Upgrading Memory Boosts Performance
Unexpected EDR Deployment Hack
Hacking a County's Prison Management System
My First Interest in Computers at Age 7
Mike Talks About the Power of AI in Pentesting
AI: The New Programming Language
Authentication Bypass: Redirect Vulnerability
Mastering Exploit Coding: Learn the Premise, Not the Antecedent
Agentic Pentesting: Democratizing Cybersecurity
When EDR Becomes Your Best Deployment Tool
Underestimated Attack Vector: Execution After Redirect
Neil Kettle Flips the Pyramid Scheme Script
AI in Pentesting: A Game Changer
Hacking in 4 Days: A Password Breakthrough
Nick Aures Talks Skipping Fundamentals in Pen Testing
Neil Kettle Reveals Hidden OSX Backdoor Trick from 2010
Guest Introduction and Role at Spiderlab/LevelBlue
Nick Aures on the Rise of Claude Code in 2024
AI's Impact on Red Teaming & Pen Testing
Bureaucracy in Security Testing
Slow Down: Key to Effective Security Testing
Web App Pentesting: Eye-Opening Factor
Pentesting: More Than Just Hacking
Market Economy Hides Cyber Exploits
Cybersecurity Threats Are Piling Up Faster Than Ever
Reverse Engineering IIS Exploit
Pentesting: More Than Just Hacking
AI Boosts Penetration Testing Speed
The Hidden Threat: Market Economy & Exploits
AI in Security: Hype, Reality, and Future
AI: The New Computer
Cybersecurity: Learn the Core Science
AI: Not Innovative, Just Fast
Mastering Assembler for C Fluency
Security Testing: More Than Just Scanning
AI in Cybersecurity: 2026 Advice
Pentesting: A Fool's Errand
AI in Cybersecurity: 2026 Advice
Nick Aures Talks Zero Days and Exploit Techniques
Just Start: Hands-On Cybersecurity
Slow Down: CTF & Pen Testing Mistakes
Hacking Mac OS X
Nick Aures (Senior Pentester)
Exploiting EDR Console for Mass Deployment
AI Boosting Red Teaming Efficiency
AI in Pen Testing: Client Concerns
AI: Not Replacing Human Expertise
Red Teaming vs Pen Testing: A Hacker's Perspective
AI in Cybersecurity: Offense & Defense
EDR Deployment: When One Payload Triggers Hundreds of Beacons
Compromising the Target using their EDR
Neil Kettle - Vulnerability Researcher
HaxrByte (Penetration Tester/Ethical Hacker; Red Teamer/Red Team Operator)