diff --git a/sql/hpr-db-part-14.sql b/sql/hpr-db-part-14.sql index 74980db..56849c0 100644 --- a/sql/hpr-db-part-14.sql +++ b/sql/hpr-db-part-14.sql @@ -571,7 +571,8 @@ INSERT INTO `eps` (`id`, `date`, `title`, `duration`, `summary`, `notes`, `hosti (3999,'2023-11-30','Holiday Challenges Series Ep 02 TryHackMe Advent of Cyber Challenge',183,'Discussing the TryHackMe Advent of Cyber challenge to help you enjoy the holiday season','
Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.
\nIf you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996
\nI have been using TryHackMe for several years, and I recommend it to\nall of my students. It is a great environment where people can get hands\non experience with technology that relates to cyber security, all from\nthe comfort of their browser and free year-round.
\nThe TryHackMe Advent of Cyber challenge is a free gamified\nenvironment which focuses on penetration testing, security\noperations/engineering, forensics/incident response, malware analysis,\nmachine learning, and more!
\nThis year\'s challenge opens on December 1, 2023 (Which is the reason\nwhy I am posting twice this week). Typically, the Advent of Cyber\nchallenge includes daily beginner-friendly exercises for people new to\ncybersecurity. These can consist of walkthroughs, video tutorials, and\nchallenges. There are also prizes available based on random drawings and\non participant success.
\nInfosec personalities like John Hammond, Gerald Auger, InsiderPHD,\nand InfoSec Pat are featured in this year\'s challenge.
\nYou can play with last year\'s Advent of Cyber challenge by visiting\nhttps://tryhackme.com/room/adventofcyber4. It outlines\nthe overall story and shows all of the tasks last year\'s participants\nexperienced, including both offensive and defensive topics like: log\nanalysis, OSINT, scanning, brute force attacks, email analysis,\nCyberChef, blockchain smart contracts, malware analysis, memory\nforensics, packet analysis, web application hacking, and more!
\nEverything can be done with a free account from within a browser.
\nIf you want to learn more about cybersecurity, transition your career\ninto infosec, or just have fun playing with cyber challenges, you can\ngive it a try by visiting tryhackme.com or https://tryhackme.com/r/christmas
\nPlease note: I am not affiliated with TryHackMe in any way, other\nthan having been a paying member for many years. Students and others who\nhave participated in previous year\'s Advent of Cyber challenges have\ntold me how much they enjoyed it and learned from it. Even though I have\nbeen an infosec practitioner for more years than I would like to admit,\nI also have enjoyed taking part in this challenge.
\nIf this is not for you, I will be sharing another option for a\nholiday challenge in my next episode.
\n',394,0,0,'CC-BY-SA','Advent of Cyber, TryHackMe, Hands on, cyber, cybersecurity, infosec, holiday, challenge',0,0,1), (4006,'2023-12-11','Holiday Challenges Ep 3 SANS Holiday Hack Challenge & KringleCon',160,'Discussing the SANS Holiday Hack Challenge & KringleCon to help you enjoy the holiday season','Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.
\nIf you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996
\nThe SANS Holiday Hack Challenge is an interactive online technology\nand hacking game combined with a virtual security conference, beginning\nin the second week of December. By the time this episode drops, it may\nalready be live. You can tour the North Pole conference facilities,\nmeeting people, interactive non-player characters (NPC), and maybe even\nsome villains from Holiday Hack Challenges past, as you solve problems\nand gather clues which you use to help save Christmas.
\nEverything can be done from within the browser, and did I mention\nthere is a virtual security conference, called KringleCon? Some of the\nbiggest rock stars (and most humble and brilliant people) in\nCyberSecurity speak each year at KringleCon. Many of their talks also\nprovide clues to solving game challenges.
\nEd Skoudis and his team (The same people who build SANS NetWars) work\ntirelessly year after year to create the most amazing experience,\ncomplete with custom music! This has become one of my favorite holiday\ntraditions each year. You can learn more about the 2023 challenge by\nwatching Ed\'s Inside SANS Holiday Hack Challenge 2023 YouTube video at\nhttps://www.youtube.com/watch?v=X9Gmdr_CxzQ
\nYou can access this year\'s challenge by visiting sans.org/holidayhack\nor https://www.sans.org/mlp/holiday-hack-challenge-2023/
\nThere, you will learn more about all things Holiday Hack before the\ngame opens in the second week of December. If you want to play now, or\njust get a feel for it, you can access three of the previous years\'\nchallenges right now at the same site.
\nI am not associated with SANS or the Holiday Hack Challenge in any\nway, other than to have participated for several years now, and I have\nwatched other people learn and grow by taking part in it.
\nI hope that you have enjoyed this short series. If there are other\nonline challenges you find interesting or informative, I encourage you\nto record a show about them.
\nHave a wonderful day.
\n',394,0,0,'CC-BY-SA','SANS, KringleCon, holiday, challenge',0,0,1), (3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','Source: Former\nNHS secretary found guilty of illegally accessing medical\nrecords
\n
Supporting Source: Open\nStreet Map link to Redditch Worcestershire.
\n
Source: NetSupport\nRAT Infections on the Rise. Targeting Government and Business\nSectors
\n
Source: Beware:\nMalicious Google Ads Trick WinSCP Users into Installing\nMalware
\n
Source: Trojanized\nPyCharm Software Version Delivered via Google Search Ads.
\n
Tags: Reply show, password managers, lastpass.
Reply to: hpr3988\n:: Beeper.com
\n
Supporting Source: Beeper chat application
\n
Supporting Source: Beeper Github page
\n
Supporting Source: Work with us at\nBeeper
\n
Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
\n
Reply to: hpr3994 ::\nLastpass Response
\n
Source: Whitest Kids U Know:\nLeg Peeing
\n
This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1); +(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','Tags: Reply show, password managers, lastpass.
Reply to: hpr3988\n:: Beeper.com
\n
Supporting Source: Beeper chat application
\n
Supporting Source: Beeper Github page
\n
Supporting Source: Work with us at\nBeeper
\n
Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
\n
Reply to: hpr3994 ::\nLastpass Response
\n
Source: Whitest Kids U Know:\nLeg Peeing
\n
This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1), +(3998,'2023-11-29','Using open source OCR to digitize my mom\'s book',1847,'How I used open source tools such as gphoto2 and the OCR software tesseract to digitize pages','To improve the speed of my workflow, I wrote a bash script that uses\nthe open source programs programs gphoto2
,\ntesseract
, grep
and ImageMagick
\nto digitize my mom\'s 338 page book. Here is the link to the script:\nhttps://github.com/deltaray/ocr-script
Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.
\nIf you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996
\nI have been using TryHackMe for several years, and I recommend it to\nall of my students. It is a great environment where people can get hands\non experience with technology that relates to cyber security, all from\nthe comfort of their browser and free year-round.
\nThe TryHackMe Advent of Cyber challenge is a free gamified\nenvironment which focuses on penetration testing, security\noperations/engineering, forensics/incident response, malware analysis,\nmachine learning, and more!
\nThis year\'s challenge opens on December 1, 2023 (Which is the reason\nwhy I am posting twice this week). Typically, the Advent of Cyber\nchallenge includes daily beginner-friendly exercises for people new to\ncybersecurity. These can consist of walkthroughs, video tutorials, and\nchallenges. There are also prizes available based on random drawings and\non participant success.
\nInfosec personalities like John Hammond, Gerald Auger, InsiderPHD,\nand InfoSec Pat are featured in this year\'s challenge.
\nYou can play with last year\'s Advent of Cyber challenge by visiting\nhttps://tryhackme.com/room/adventofcyber4. It outlines\nthe overall story and shows all of the tasks last year\'s participants\nexperienced, including both offensive and defensive topics like: log\nanalysis, OSINT, scanning, brute force attacks, email analysis,\nCyberChef, blockchain smart contracts, malware analysis, memory\nforensics, packet analysis, web application hacking, and more!
\nEverything can be done with a free account from within a browser.
\nIf you want to learn more about cybersecurity, transition your career\ninto infosec, or just have fun playing with cyber challenges, you can\ngive it a try by visiting tryhackme.com or https://tryhackme.com/r/christmas
\nPlease note: I am not affiliated with TryHackMe in any way, other\nthan having been a paying member for many years. Students and others who\nhave participated in previous year\'s Advent of Cyber challenges have\ntold me how much they enjoyed it and learned from it. Even though I have\nbeen an infosec practitioner for more years than I would like to admit,\nI also have enjoyed taking part in this challenge.
\nIf this is not for you, I will be sharing another option for a\nholiday challenge in my next episode.
\n',394,0,0,'CC-BY-SA','Advent of Cyber, TryHackMe, Hands on, cyber, cybersecurity, infosec, holiday, challenge',0,0,1), (4006,'2023-12-11','Holiday Challenges Ep 3 SANS Holiday Hack Challenge & KringleCon',160,'Discussing the SANS Holiday Hack Challenge & KringleCon to help you enjoy the holiday season','Since some of the information you are about to hear is time specific,\nI want to let you know that I am recording this near the end of November\nin 2023.
\nIf you missed the first episode, which introduces this series, you\ncan go back and listen to HPR3996
\nThe SANS Holiday Hack Challenge is an interactive online technology\nand hacking game combined with a virtual security conference, beginning\nin the second week of December. By the time this episode drops, it may\nalready be live. You can tour the North Pole conference facilities,\nmeeting people, interactive non-player characters (NPC), and maybe even\nsome villains from Holiday Hack Challenges past, as you solve problems\nand gather clues which you use to help save Christmas.
\nEverything can be done from within the browser, and did I mention\nthere is a virtual security conference, called KringleCon? Some of the\nbiggest rock stars (and most humble and brilliant people) in\nCyberSecurity speak each year at KringleCon. Many of their talks also\nprovide clues to solving game challenges.
\nEd Skoudis and his team (The same people who build SANS NetWars) work\ntirelessly year after year to create the most amazing experience,\ncomplete with custom music! This has become one of my favorite holiday\ntraditions each year. You can learn more about the 2023 challenge by\nwatching Ed\'s Inside SANS Holiday Hack Challenge 2023 YouTube video at\nhttps://www.youtube.com/watch?v=X9Gmdr_CxzQ
\nYou can access this year\'s challenge by visiting sans.org/holidayhack\nor https://www.sans.org/mlp/holiday-hack-challenge-2023/
\nThere, you will learn more about all things Holiday Hack before the\ngame opens in the second week of December. If you want to play now, or\njust get a feel for it, you can access three of the previous years\'\nchallenges right now at the same site.
\nI am not associated with SANS or the Holiday Hack Challenge in any\nway, other than to have participated for several years now, and I have\nwatched other people learn and grow by taking part in it.
\nI hope that you have enjoyed this short series. If there are other\nonline challenges you find interesting or informative, I encourage you\nto record a show about them.
\nHave a wonderful day.
\n',394,0,0,'CC-BY-SA','SANS, KringleCon, holiday, challenge',0,0,1), (3997,'2023-11-28','The Oh No! News.',875,'Sgoti talks about Malware distributed via Google\'s Dynamic Ads and more.','Source: Former\nNHS secretary found guilty of illegally accessing medical\nrecords
\n
Supporting Source: Open\nStreet Map link to Redditch Worcestershire.
\n
Source: NetSupport\nRAT Infections on the Rise. Targeting Government and Business\nSectors
\n
Source: Beware:\nMalicious Google Ads Trick WinSCP Users into Installing\nMalware
\n
Source: Trojanized\nPyCharm Software Version Delivered via Google Search Ads.
\n
Tags: Reply show, password managers, lastpass.
Reply to: hpr3988\n:: Beeper.com
\n
Supporting Source: Beeper chat application
\n
Supporting Source: Beeper Github page
\n
Supporting Source: Work with us at\nBeeper
\n
Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
\n
Reply to: hpr3994 ::\nLastpass Response
\n
Source: Whitest Kids U Know:\nLeg Peeing
\n
This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1); +(4005,'2023-12-08','Sgoti\'s reply to multiple shows.',893,'Sgoti replies to a few HPR Shows.','Tags: Reply show, password managers, lastpass.
Reply to: hpr3988\n:: Beeper.com
\n
Supporting Source: Beeper chat application
\n
Supporting Source: Beeper Github page
\n
Supporting Source: Work with us at\nBeeper
\n
Reply to: hpr3989 :: LastPass\nSecurity Update 1 November 2023
\n
Reply to: hpr3994 ::\nLastpass Response
\n
Source: Whitest Kids U Know:\nLeg Peeing
\n
This work is licensed under a Creative Commons\nAttribution-ShareAlike 4.0 International License.
\n',391,0,0,'CC-BY-SA','reply show, password managers, lastpass',0,0,1), +(3998,'2023-11-29','Using open source OCR to digitize my mom\'s book',1847,'How I used open source tools such as gphoto2 and the OCR software tesseract to digitize pages','To improve the speed of my workflow, I wrote a bash script that uses\nthe open source programs programs gphoto2
,\ntesseract
, grep
and ImageMagick
\nto digitize my mom\'s 338 page book. Here is the link to the script:\nhttps://github.com/deltaray/ocr-script