PodParley PodParley
Chat with a White Hat cover art

All Episodes

Chat with a White Hat — 73 episodes

#
Title
1

Hack: Domain Admin Password in 20 Seconds

2

Exploiting SAML Audience Misconfiguration

3

Fighting AI with AI: The Future of Pen Testing

4

CSS Injection Leads to Zero-Day Vulnerability

5

Security Testing: Not Glamorous, But Essential

6

Pentesting: A Fool's Errand?

7

The Importance of Articulating Vulnerability Impact

8

Journey into Cybersecurity: HaxrByte's Story

9

SQL Injection: Understanding the Backend

10

CSS Injection Leads to Major Security Breach

11

Dylan’s Quick Introduction

12

From Gamer to Bug Bounty Hunter with Dylan Lawhon

13

The Importance of Planning in Penetration Testing

14

Start Now: Breaking into Cybersecurity

15

Pentesting: A Partnership, Not an Adversary

16

Reverse Engineering Mac OS X Keylogger

17

Master Fundamentals for Cybersecurity

18

Guest Spotlight: Dylan Lawhon - The Cybersecurity Journey

19

Guest Spotlight: Nick Aures' Cybersecurity Insights

20

Ed Williams Shares a Shocking Password Hack

21

Why Upgrading Memory Boosts Performance

22

Unexpected EDR Deployment Hack

23

Hacking a County's Prison Management System

24

My First Interest in Computers at Age 7

25

Mike Talks About the Power of AI in Pentesting

26

AI: The New Programming Language

27

Authentication Bypass: Redirect Vulnerability

28

Mastering Exploit Coding: Learn the Premise, Not the Antecedent

29

Agentic Pentesting: Democratizing Cybersecurity

30

When EDR Becomes Your Best Deployment Tool

31

Underestimated Attack Vector: Execution After Redirect

32

Neil Kettle Flips the Pyramid Scheme Script

33

AI in Pentesting: A Game Changer

34

Hacking in 4 Days: A Password Breakthrough

35

Nick Aures Talks Skipping Fundamentals in Pen Testing

36

Neil Kettle Reveals Hidden OSX Backdoor Trick from 2010

37

Guest Introduction and Role at Spiderlab/LevelBlue

38

Nick Aures on the Rise of Claude Code in 2024

39

AI's Impact on Red Teaming & Pen Testing

40

Bureaucracy in Security Testing

41

Slow Down: Key to Effective Security Testing

42

Web App Pentesting: Eye-Opening Factor

43

Pentesting: More Than Just Hacking

44

Market Economy Hides Cyber Exploits

45

Cybersecurity Threats Are Piling Up Faster Than Ever

46

Reverse Engineering IIS Exploit

47

Pentesting: More Than Just Hacking

48

AI Boosts Penetration Testing Speed

49

The Hidden Threat: Market Economy & Exploits

50

AI in Security: Hype, Reality, and Future

51

AI: The New Computer

52

Cybersecurity: Learn the Core Science

53

AI: Not Innovative, Just Fast

54

Mastering Assembler for C Fluency

55

Security Testing: More Than Just Scanning

56

AI in Cybersecurity: 2026 Advice

57

Pentesting: A Fool's Errand

58

AI in Cybersecurity: 2026 Advice

59

Nick Aures Talks Zero Days and Exploit Techniques

60

Just Start: Hands-On Cybersecurity

61

Slow Down: CTF & Pen Testing Mistakes

62

Hacking Mac OS X

63

Nick Aures (Senior Pentester)

64

Exploiting EDR Console for Mass Deployment

65

AI Boosting Red Teaming Efficiency

66

AI in Pen Testing: Client Concerns

67

AI: Not Replacing Human Expertise

68

Red Teaming vs Pen Testing: A Hacker's Perspective

69

AI in Cybersecurity: Offense & Defense

70

EDR Deployment: When One Payload Triggers Hundreds of Beacons

71

Compromising the Target using their EDR

72

Neil Kettle - Vulnerability Researcher

73

HaxrByte (Penetration Tester/Ethical Hacker; Red Teamer/Red Team Operator)