Skip to main content

Introducing ISOPodCast


So I decided to start a podcast. I'm a big fan of podcasts and it's been very cool to see more Information Security related ones surface. I wanted to get in the action and try to do something (hopefully) a little different than most in that the purpose was to have on people I find fascinating, set a topic that doesn't necessarily have to be technical and just see where it goes. 

I present ISOPodCast and let me explain the name.

The ISO stands for Information Second Opinion because I want to discuss and debate with the guests various issues such as community (Episode #1), education, mental health and the like. There's also a bit of wordplay with ISO, InfoSec(ond) and also Isopods are cool looking.

This post is going to introduce Episode #1 - "Community" where my guest Allan Stojanovic (@allansto) talk about our local scene here in Toronto, Canada as a whole and identity.

Now here's what I'd like to ask of you dear listeners:

This is the first episode and I'm brand new to podcasting and long-form conversation while trying to stay on topic and fit the time slot. 

Allan and I had to record this twice because the first time we had an air conditioning unit that we couldn't control ruin the recording. This one you're about to hear we had to do somewhere that was a little better but still echo and some other issues I couldn't clean out without really butchering the voices.Very heavily compressed. You'll notice Allan has more bass in his voice and I also sound farther away but we did the best we could.

Oh also sorry for the airplane and the occasional mic getting knocked. We both tend to talk with our hands :)

So please be gentle and I promise to make the recordings better with time in much more acoustic environments.

I'll be setting the iTunes feed and all that very soon but for right now just to get this out the door I'm hosting everything on Soundcloud. The domain isopodcast.com will just take you there for now until I build out a dedicated page.

This is was a lot of fun to do and I really hope you enjoy. 

Here's the podcast: Episode #1 - "Community"

Please follow the podcast Twitter account: @ISOPodHost :)

Thank you all.

-InvokeThreatGuy

Popular posts from this blog

Leveraging WEF and the HELK

In an effort to have some more content on this blog (wow life gets busy sometimes!) I thought I'd write up this post on how to configure Windows Event Forwarding and the awesome project, HELK. On a bit of a side-note, this post coincides with an event we run up here in Toronto, Canada called the Canadian Collegiate Cyber Exercise (C3X). This year we are running the first real iteration (although we executed a pilot version last year which you can see here:  https://www.youtube.com/watch?v=oycYKQzzHoU ) and part of the design will be providing the students with HELK. OK back on track. I'll admit that when I first learned about Windows Event Forwarding it seemed a little daunting. A few of the posts I first read seemed confusing and a lot of moving parts. To the newcomer, Windows Event Logs can also be fairly intimidating which is why projects such as HELK are so fantastic to be openly and freely distributed. So why leverage WEF? Well, at a very basic level (and this

We Break So We Can Build Better

Hello again friends! Today I'm writing this post to shed a little preview light on how our team that builds C3X (Canadian Collegiate Cyber Exercise) will be approaching the design for the 2019 competition. We are doing a lot of different and fun things this year which means all of us are very excited and at the same time have a beast of a project ahead of us. I'm also going to discuss areas where you can help out and be a part of this wonderful event. C3X Overview Entering its third year, the C3X is a competition that puts student teams from various Canadian colleges and universities who are enrolled in cyber security programs a chance to defend a controlled environment against a team of offensive security professionals. That's the short and sweet version but there is so much more. Ben Wells (@1StealthMove) and I created this in 2016 and saw the first event happen in 2017. Why did we do this? Canada isn't exactly overflowing with combative challenges. Sur

Simple PowerShell One-Liners

In this post, I want to go over some basic recon-style commands in PowerShell, which complements a talk I gave recently at the DefCon 416 meetup. A good chunk of my demonstration consisted of various ways to accomplish simple recon and post-exploitation tasks by leveraging what is already installed throughout Windows environments. I'm going to keep things very basic and simple just in case PowerShell is brand new to you. These "one-liners" are meant to show things you can incorporate into a script that, when placed onto a targeted machine, executed in memory, can spit the output into a file or send it back to a C2 server. Let's begin :) I am using a Windows 7 virtual machine running PowerShell v2, but feel free to use Win8 or higher. Open up a PowerShell prompt (no need to run as an admin, but may be required later).   I create a folder on the desktop called "hello" with a single text file called "hello.txt" inside. Feel free to do the