This content from the Shawn Ryan Show discusses the technical aspects of using Remote Access Trojans (RATs) for unauthorized computer control and cryptocurrency mining. The guest, an admitted former unethical hacker, details how infected computers were leveraged for mining operations before he claims to have developed 'morals'. The discussion highlights the potential for large-scale botnet creation and exploitation.
This entry details the Pwnagotchi, a device inspired by the Tamagotchi toy, designed for Wi-Fi network analysis. It utilizes AI and a Raspberry Pi Zero W to capture WPA handshakes, essential for understanding network security vulnerabilities. The device's functionality and AI-driven learning process are explained, highlighting its role in ethical hacking and network penetration testing.
This video features John Lovell of Warrior Poet Society interviewing Troy, a professional ethical hacker with 17 years of experience. They delve into the critical realities of cybersecurity and online privacy, drawing parallels between digital threats and physical combat. Troy, presented as an elite subject matter expert, explains the vulnerabilities of IoT devices, critical infrastructure like SCADA systems, and the high value of medical data on the black market. The discussion emphasizes that true online privacy is largely a myth and provides practical advice on digital situational awareness to avoid becoming an easy target.
You've reached the end! 3 videos loaded.
Gun Laws by State
Read firearms regulations for all 50 states + D.C.
Find Gun Dealers
Search licensed FFL dealers near you.