┌─────────┐┌────┐┌───┐┌────┐┌───┐┌─────────┐┌─────────┐┌────────┐ ┌─────────┐┌───┐┌─┐┌─┐┌────────┐ │ ││ └┘ ││ └┘ ││ ││ ││ ┌┐ │ │ ┌┐ ││ └┘ └┘ ││ ┌┐ └┐ │ ││ ││ ││ ││ ││ ││ │ │ ││ ││ ││ ││ │ │ ││ ││ ││ ┌────┘│ ┌───┘│ └┘ └┐│ └┘ ││ ││ └┘ │ └──┐ ┌──┘│ ┌┐ ││ ││ │┌───┐│ └───┐│ ┌┐ ││ ││ ┌┐ ││ │ │ │ │ ││ ││ ││ └┘ ││ ││ ││ ││ ││ ││ ││ │ └───┘ └────┘└───┘└─────────┘└─────────┘└─────────┘└────┘└───┘└─────────┘└────┘└───┘└─────────┘ ┌─────────────────────────────────────────────────────────────────────────────────────────────────┐ ├── Twitch ─── Twitter ─── Patreon ─── iTunes ─── Spotify ─── Snapchat ─── Instagram ─── TikTok ──┤ ├───────────────────────┬────────────────────────────────────────────────┬────────────────────────┤ │ └─Episode 46 - Machine Learning Security Tools ─┘ │ │ │ │ In this episode, we'll be discussing Machine Learning based Security Tools for Offense/Defense │ │ │ │ BLURB: K Hodges graduated with a GED from the South Florida Juvenile Justice Center. He's │ │ written code for numerous three letter agencies that wish to remain nameless, built │ │ Defensive ML for an infosec company that also wishes to remain nameless, and is part │ │ of a band of delightful degenerates called #GAYSEC │ │ │ │┌────┐┌───┐┌─┐┌┐┌─┐┌───┐ │ ││ ││ ┌─┘│ └┘└┘ ││ ┌─┘ │ ││ ┌┐ ││ └┐ │ ││ └─┐ │ ││ ││ ││ ┌┘ │ │└─┐ │ │ ││ ││ ││ └─┐│ ┌┐ │┌─┘ │ │ │└─┘└─┘└───┘└──┘└──┘└───┘ │ │ │ ╞═ The NYPD's new DNA dragnet: The department is collecting and storing genetic information, │ │ with virtually no rules to curb their use │ │ │ ╞═ Android Phones Can Get Hacked Just by Looking at a PNG Image │ │ │ ╞═ China hacked Norway's Visma to steal client secrets: investigators │ │ │ ╞═ Docker runc flaw opens the door to a 'Doomsday scenario' │ ╞═══ Seclists Advisory │ │ │ ╞═ Evil USB Cable Can Remotely Accept Commands From Hacker │ │ │ ╞═ New critical vulnerability discovered in open-source office suites │ │ │ ╞═ Many popular iPhone apps secretly record your screen without asking │ │ │ ╞═ Swiss govt offers reward for hacking its electronic vote system │ │ │ ╞═ Internet-connected industrial refrigerators can be remotely defrosted, thanks to │ │ default passwords │ │ │ ╞═ Russia to disconnect from the internet as part of a planned test │ │ │ ╞═ How quantum terrorists could bring down the future internet │ │ │ ╞═ Adobe Reader Zero-Day Micropatch Stops Malicious PDFs from Calling Home │ │ │ │ │ │┌────┐┌────┐┌────┐┌───┐ ┌───┐ ┌───┐┌────┐┌───┐ ┌───┐ │ ││ ┌──┘│ ┌┐ ││ ┌┐ ││ ┌┐└┐ │ ┌┐│ │ ┌─┘│ ┌┐ ││ ┌┐└┐│ ┌─┘ │ ││ │┌─┐│ ││ ││ ││ ││ ││ │ │ └┘└┐│ └┐ │ ││ ││ ││ ││ └─┐ │ ││ ││ ││ ││ ││ ││ ││ ││ │ │ ┌┐ ││ ┌┘ │ └┘ ││ ││ │└─┐ │ │ ││ └┘ ││ └┘ ││ └┘ ││ └┘ │ │ ││ ││ └─┐│ ┌┐ ││ └┘ │┌─┘ │ │ │└────┘└────┘└────┘└────┘ └─┘└─┘└───┘└─┘└─┘└────┘└───┘ │ │ │ ╞═ Continuing our work to improve recommendations on YouTube │ │ │ ╞═ What would a EvE online Internet look like? │ │ │ ╞═ ClusterFuzz (16,000 bugs in Chrome and over 11,000 in other Open Source Projects) │ │ │ ╞═ LOLBins and Trojans: How the Ramnit Trojan Spreads Via sLoad In A Cyber Attack │ │ │ ╞═ Atrient Android App Analysis │ │ │ ╞═ Mail Attachment Builds Ransomware Downloader from Super Mario Image │ │ │ ╞═ Pentesting Azure - The Report │ │ │ │┌────┐┌─┐┌─┐┌───┐┌────┐┌─────┐ ┌────┐┌────┐┌───┐ ┌───┐┌───┐ │ ││ ┌──┘│ ││ ││ ┌─┘│ ┌┐ │└─┐ ┌─┘ │ ┌──┘│ ┌┐ ││ ┌┐└┐│ ┌─┘│ ┌─┘ │ ││ │ │ └┘ ││ └┐ │ ││ │ │ │ │ │ │ ││ ││ ││ ││ └┐ │ └─┐ │ ││ │ │ ┌┐ ││ ┌┘ │ └┘ │ │ │ │ │ │ ││ ││ ││ ││ ┌┘ └─┐ │ │ ││ └──┐│ ││ ││ └─┐│ ┌┐ │ │ │ │ └──┐│ └┘ ││ └┘ ││ └─┐┌─┘ │ │ │└────┘└─┘└─┘└───┘└─┘└─┘ └─┘ └────┘└────┘└────┘└───┘└───┘ │ │ │ ╞═ Privilege Escalation in Ubuntu Linux (dirty_sock exploit) │ │ │ ╞═ Exploiting CVE-2018-19134: remote code execution through type confusion in Ghostscript │ │ │ ╞═ Remotely compromise devices by using bugs in Marvell Avastar Wi-Fi: from zero knowledge to │ │ zero-click RCE │ │ │ ╞═ Reversi: Generate very tiny reverse shell binaries for Linux [x86_64] │ │ │ ╞═ DNSGrep - Quickly Searching Large DNS Datasets │ │ │ ╞═ GreyNoise CLI Tool │ │ │ ╞═ pubsploit.py - Quick public exploit search for CVEs │ │ │ ╞═ awesome-GO-offensive-tools │ │ │ └─────────────────────────────────────────────────────────────────────────────────────────────────┘