<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:media="http://search.yahoo.com/mrss/" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link href="https://feeds.simplecast.com/7PC5um_Q" rel="self" title="MP3 Audio" type="application/atom+xml"/>
    <atom:link href="https://simplecast.superfeedr.com/" rel="hub" xmlns="http://www.w3.org/2005/Atom"/>
    <generator>https://simplecast.com</generator>
    <title>We think we know</title>
    <description>We think we know how computer systems work, but how come they keep surprising us?
We also think we know how humans behave, but we keep finding out we don’t.

This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers.

We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today.

Get ready to be caught off guard as we debunk misconceptions, dissect wins, and explore what ethical hacking culture teaches us.

This is the “We think we know” podcast from Pentest-Tools.com.</description>
    <copyright>2023</copyright>
    <language>en</language>
    <pubDate>Tue, 9 Apr 2024 06:52:50 +0000</pubDate>
    <lastBuildDate>Tue, 9 Apr 2024 06:53:01 +0000</lastBuildDate>
    <image>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <title>We think we know</title>
      <url>https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/a30b617f-4efe-4068-b05a-ded969563bbd/3000x3000/we-think-we-know-podcast.jpg?aid=rss_feed</url>
    </image>
    <link>https://pentest-tools.com/blog/categories/podcast</link>
    <itunes:type>episodic</itunes:type>
    <itunes:summary>We think we know how computer systems work, but how come they keep surprising us?
We also think we know how humans behave, but we keep finding out we don’t.

This podcast is for ethical hackers who are thirsty for challenges and who never settle for easy answers.

We challenge some of the best offensive security pros in the world to reveal the unique traits, skills, and real-world experiences that got them where they are today.

Get ready to be caught off guard as we debunk misconceptions, dissect wins, and explore what ethical hacking culture teaches us.

This is the “We think we know” podcast from Pentest-Tools.com.</itunes:summary>
    <itunes:author>Pentest-Tools.com</itunes:author>
    <itunes:explicit>no</itunes:explicit>
    <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/a30b617f-4efe-4068-b05a-ded969563bbd/3000x3000/we-think-we-know-podcast.jpg?aid=rss_feed"/>
    <itunes:new-feed-url>https://feeds.simplecast.com/7PC5um_Q</itunes:new-feed-url>
    <itunes:keywords>cybersecurity, ethical hacking, hacking, information security, penetration testing, security testing, vulnerability management, vulnerability scanning, whitehat hacking</itunes:keywords>
    <itunes:owner>
      <itunes:name>Pentest-Tools.com</itunes:name>
      <itunes:email>andra.zaharia@pentest-tools.com</itunes:email>
    </itunes:owner>
    <itunes:category text="Technology"/>
    <itunes:category text="Education"/>
    <itunes:category text="Science"/>
    <item>
      <guid isPermaLink="false">264840cf-9862-4537-9187-15844a0154af</guid>
      <title>We think we know hackers thrive on deep environment knowledge</title>
      <description><![CDATA[<p>“Not everything works as configured. Not everyone behaves as trained.”</p><p>The reality of this statement makes it possible for us, the people in offensive security, to have a job. It also highlights how unpredictable our work can be and how never-ending our learning process is.</p><p>We work in a space where things are so complex that we need to combine big-picture, higher-level thinking with boost-on-the-ground practice.</p><p>And our guest today is <i>brilliant </i>at doing just that. </p><p>Pete Herzog has spent over two decades distilling the fundamental principles of security testing, turning them into a decade-defining manual - the Open Source Security Testing Methodology Manual (OSSTMM). Pete brings offensive and defensive security concepts together to break down important misconceptions.  </p><p>Listen to this conversation to uncover:</p><ul><li>Why you can’t do security without understanding the process behind it [08:23]</li><li>How automation can help but, at the same time, hurt the ones using it [11:00]</li><li>Why you can’t rely only on automated security tools in your pentests [19:10]</li><li>The importance of implementing security controls to change the environment [28:22]</li><li>Pete’s perspective on "Zero Trust" and how they tackled this ion OSSTMM [35:18]</li><li>Why he thinks there are “too many parrots, not enough pirates” in this space [43:42]</li><li>The excitement of researching for OSSTMM v4 and exploring new technologies [51:40]  </li></ul><p>From the expert systems behind AI-driven tools and their blindspots to generalizations that hurt offensive security outcomes, we explore key elements that shape today’s problems - some of which you’re probably wrestling with as well. </p><p>Let’s explore them!</p>
]]></description>
      <pubDate>Tue, 9 Apr 2024 06:52:50 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>“Not everything works as configured. Not everyone behaves as trained.”</p><p>The reality of this statement makes it possible for us, the people in offensive security, to have a job. It also highlights how unpredictable our work can be and how never-ending our learning process is.</p><p>We work in a space where things are so complex that we need to combine big-picture, higher-level thinking with boost-on-the-ground practice.</p><p>And our guest today is <i>brilliant </i>at doing just that. </p><p>Pete Herzog has spent over two decades distilling the fundamental principles of security testing, turning them into a decade-defining manual - the Open Source Security Testing Methodology Manual (OSSTMM). Pete brings offensive and defensive security concepts together to break down important misconceptions.  </p><p>Listen to this conversation to uncover:</p><ul><li>Why you can’t do security without understanding the process behind it [08:23]</li><li>How automation can help but, at the same time, hurt the ones using it [11:00]</li><li>Why you can’t rely only on automated security tools in your pentests [19:10]</li><li>The importance of implementing security controls to change the environment [28:22]</li><li>Pete’s perspective on "Zero Trust" and how they tackled this ion OSSTMM [35:18]</li><li>Why he thinks there are “too many parrots, not enough pirates” in this space [43:42]</li><li>The excitement of researching for OSSTMM v4 and exploring new technologies [51:40]  </li></ul><p>From the expert systems behind AI-driven tools and their blindspots to generalizations that hurt offensive security outcomes, we explore key elements that shape today’s problems - some of which you’re probably wrestling with as well. </p><p>Let’s explore them!</p>
]]></content:encoded>
      <enclosure length="70640673" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/8dd6b83f-cdc8-4ad8-946b-f80f4b44d885/audio/f1c0bf7e-5378-49e2-beed-ec15245bb5fe/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know hackers thrive on deep environment knowledge</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/3ecc0ce9-cf33-41fe-a630-11ea2bd7a933/3000x3000/pete-herzog-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>01:13:35</itunes:duration>
      <itunes:summary>Pete Herzog has spent over two decades distilling the fundamental principles of security testing, turning them into a decade-defining manual - the Open Source Security Testing Methodology Manual (OSSTMM). 

With V4 coming this year and new results from in-depth research, Pete brings offensive and defensive security concepts together to break down important misconceptions.</itunes:summary>
      <itunes:subtitle>Pete Herzog has spent over two decades distilling the fundamental principles of security testing, turning them into a decade-defining manual - the Open Source Security Testing Methodology Manual (OSSTMM). 

With V4 coming this year and new results from in-depth research, Pete brings offensive and defensive security concepts together to break down important misconceptions.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>12</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">08568000-af80-4a8d-b54e-d03229a01506</guid>
      <title>We think we know you can&apos;t attack what you don&apos;t understand</title>
      <description><![CDATA[<p>In this episode, we continue to ask the meaningful questions:</p><ol><li>What makes a great pentester? </li><li>How can you balance the art of manual testing with the efficiency of automation?</li><li>What is the unique value that pentesters bring to offensive security? </li><li>And what can't be commoditized in this craft?</li></ol><p>Gabrielle's mantra, “action for cyberpeace”, resonates through her work, and today, she shares her journey, experiences, and the lessons that shaped her career so far. </p><p>Key highlights from this conversation:</p><ul><li>What specific skills do you need to be a great penetration tester [02:45]</li><li>How self-learning and consistency help you achieve your goals [07:55]</li><li>Why she values team collaboration to deliver the best work you can do [13:57]</li><li>How she got into cybersec and why she strives for cyberpeace [24:35]</li><li>How to find balance between your personal life and your work [28:37]</li><li>When automation is effective in pentesting and where that ends [32:02]</li><li>How to set healthy boundaries to protect your personal life and health [41:11]</li><li>Which hobbies juggle her curiosity and broaden her horizons [51:59]  </li></ul><p>Give this episode with Gabrielle a listen if you want to level up your ethical hacking skills and challenge your modus operandi. </p>
]]></description>
      <pubDate>Tue, 26 Mar 2024 07:12:24 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <media:thumbnail height="720" url="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/30c1d84a-a43b-421e-979d-3fea0761ef89/gabrielle-youtube-thumbnail.jpg" width="1280"/>
      <content:encoded><![CDATA[<p>In this episode, we continue to ask the meaningful questions:</p><ol><li>What makes a great pentester? </li><li>How can you balance the art of manual testing with the efficiency of automation?</li><li>What is the unique value that pentesters bring to offensive security? </li><li>And what can't be commoditized in this craft?</li></ol><p>Gabrielle's mantra, “action for cyberpeace”, resonates through her work, and today, she shares her journey, experiences, and the lessons that shaped her career so far. </p><p>Key highlights from this conversation:</p><ul><li>What specific skills do you need to be a great penetration tester [02:45]</li><li>How self-learning and consistency help you achieve your goals [07:55]</li><li>Why she values team collaboration to deliver the best work you can do [13:57]</li><li>How she got into cybersec and why she strives for cyberpeace [24:35]</li><li>How to find balance between your personal life and your work [28:37]</li><li>When automation is effective in pentesting and where that ends [32:02]</li><li>How to set healthy boundaries to protect your personal life and health [41:11]</li><li>Which hobbies juggle her curiosity and broaden her horizons [51:59]  </li></ul><p>Give this episode with Gabrielle a listen if you want to level up your ethical hacking skills and challenge your modus operandi. </p>
]]></content:encoded>
      <enclosure length="52518799" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/a177b370-94bd-4872-9349-7af5dd3a1f0a/audio/8bf53aa9-3821-4d1c-8970-5c20cd57b4f2/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know you can&apos;t attack what you don&apos;t understand</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/3b8f6eb2-8e14-4a03-9c70-0f2157c1aeaa/3000x3000/gabrielle-simplecast.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:42</itunes:duration>
      <itunes:summary>Gabrielle isn&apos;t just a pentester; she&apos;s a powerhouse of knowledge, an advocate for cyber education, and a mentor shaping the future of ethical hacking. 

With 9+ years of experience in cybersecurity, she focuses on sharing it with her community members through practical and valuable resources.</itunes:summary>
      <itunes:subtitle>Gabrielle isn&apos;t just a pentester; she&apos;s a powerhouse of knowledge, an advocate for cyber education, and a mentor shaping the future of ethical hacking. 

With 9+ years of experience in cybersecurity, she focuses on sharing it with her community members through practical and valuable resources.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>11</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">b6827e45-6cec-4015-ab91-6bd93c39eb2f</guid>
      <title>We think we know what makes a good pentester</title>
      <description><![CDATA[<p>With 20+ years of cybersecurity work, Tom unpacks the complexities of penetration testing, discussing the roles of vendors, practitioners, and technological advancements. </p><p>He also shares his perspective on what makes a good pentester, the value of mentorship, and the ethical challenges in this line of work. </p><p><strong>Explore this conversation to learn:</strong></p><ul><li>How pentesting changed over the years and who’s shaping it [03:02]</li><li>How to avoid burnout and deal with imposter syndrome [09:13]</li><li>Why he seeks and values mentorship for personal and professional growth [19:44]</li><li>The importance of constant learning and networking with your peers  [23:23] </li><li>How compliance brings down the value of pentesting and what to do about it [30:04]</li><li>How cultivating range can help you in your pentesting career [37:24]</li><li>How to set healthy boundaries to protect your health [41:11]</li></ul><p>This episode with Tom is a <i>must-listen</i> if you want to learn how to showcase your work and elevate your thinking and tactics.</p><h2>Resources from this episode</h2><ul><li>Tom’s <a href="https://www.spylogic.net/">personal website</a></li><li>Tom on <a href="https://www.linkedin.com/in/tomeston/">LinkedIn</a></li><li>Tom on <a href="https://twitter.com/agent0x0">Twitter</a></li><li><a href="https://sharedsecurity.net/">The Shared Security podcast</a></li><li><a href="https://www.goodreads.com/en/book/show/61271741">The People Hacker book</a> by Jenny Radcliffe</li><li>Tom’s journey from offensive security to leadership at the <a href="https://www.phillipwylieshow.com/episodes/a-journey-from-offensive-secur">Phillip Wylie Show</a></li><li>Ethical hackers and the legacy of the hacker manifesto for <a href="https://www.cyberempathy.org/episodes/ethical-hackers-legacy-hacker-manifesto">Cyber Empathy</a></li><li><a href="https://tib3rius.com/">Tib3rius</a></li><li><a href="https://www.youtube.com/c/jhaddix">Jason Haddix </a></li><li><a href="https://twitter.com/HackingDave">Dave Kennedy</a></li></ul>
]]></description>
      <pubDate>Tue, 12 Mar 2024 08:06:14 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>With 20+ years of cybersecurity work, Tom unpacks the complexities of penetration testing, discussing the roles of vendors, practitioners, and technological advancements. </p><p>He also shares his perspective on what makes a good pentester, the value of mentorship, and the ethical challenges in this line of work. </p><p><strong>Explore this conversation to learn:</strong></p><ul><li>How pentesting changed over the years and who’s shaping it [03:02]</li><li>How to avoid burnout and deal with imposter syndrome [09:13]</li><li>Why he seeks and values mentorship for personal and professional growth [19:44]</li><li>The importance of constant learning and networking with your peers  [23:23] </li><li>How compliance brings down the value of pentesting and what to do about it [30:04]</li><li>How cultivating range can help you in your pentesting career [37:24]</li><li>How to set healthy boundaries to protect your health [41:11]</li></ul><p>This episode with Tom is a <i>must-listen</i> if you want to learn how to showcase your work and elevate your thinking and tactics.</p><h2>Resources from this episode</h2><ul><li>Tom’s <a href="https://www.spylogic.net/">personal website</a></li><li>Tom on <a href="https://www.linkedin.com/in/tomeston/">LinkedIn</a></li><li>Tom on <a href="https://twitter.com/agent0x0">Twitter</a></li><li><a href="https://sharedsecurity.net/">The Shared Security podcast</a></li><li><a href="https://www.goodreads.com/en/book/show/61271741">The People Hacker book</a> by Jenny Radcliffe</li><li>Tom’s journey from offensive security to leadership at the <a href="https://www.phillipwylieshow.com/episodes/a-journey-from-offensive-secur">Phillip Wylie Show</a></li><li>Ethical hackers and the legacy of the hacker manifesto for <a href="https://www.cyberempathy.org/episodes/ethical-hackers-legacy-hacker-manifesto">Cyber Empathy</a></li><li><a href="https://tib3rius.com/">Tib3rius</a></li><li><a href="https://www.youtube.com/c/jhaddix">Jason Haddix </a></li><li><a href="https://twitter.com/HackingDave">Dave Kennedy</a></li></ul>
]]></content:encoded>
      <enclosure length="49497372" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/e366ffbe-036f-4b28-9807-39b463e764a0/audio/8ece7c48-1665-4185-8126-245e755ac368/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know what makes a good pentester</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/85f7960c-ab18-4142-bce8-f7d029a8f900/3000x3000/tom-eston-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:51:33</itunes:duration>
      <itunes:summary>Who or what shapes the perception of penetration testing? How do you step away from firefighting and develop a more systematic approach in your work as a pentester? These are some of the questions we’re answering in this new episode. 

Today’s guest is Tom Eston, an experienced security professional, team manager, and a true leader in offensive security. </itunes:summary>
      <itunes:subtitle>Who or what shapes the perception of penetration testing? How do you step away from firefighting and develop a more systematic approach in your work as a pentester? These are some of the questions we’re answering in this new episode. 

Today’s guest is Tom Eston, an experienced security professional, team manager, and a true leader in offensive security. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>10</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">39daba7b-2eb0-4f39-9113-936efafd9b56</guid>
      <title>We think we know what it takes to build hacking tools</title>
      <description><![CDATA[<p>Stay tuned as we explore how tools like Nmap and sqlmap have shaped penetration testing over the last two decades, and stick around to discover which aspects make pentesting predominantly a craft - and which parts have become standardized (and what that means for your work).</p><p><strong>Unpack this conversation to discover:</strong></p><ul><li>The depth of the work involved in crafting offensive security tools [04:45]</li><li>What you can learn <i>only</i> by developing and maintaining tools [08:03]</li><li>How Villain evolved and key learnings from building it [17:00]</li><li>The challenges of finding balance in deep offensive security work [21:30]</li><li>How Panagiotis uses automation to make his work smoother [25:35]</li><li>How building his own tools shaped his thinking [32:00]</li><li>What makes penetration testing a craft (with hands-on examples) [38:12]</li><li>Why (and how) he finds the motivation to do meaningful work [48:16]</li><li>What kind of projects keep him energized [50:55]</li></ul><p>Venture with us into the evolution of hacking tools, as T3l3machus shares his journey from admiring early toolmakers to becoming a pioneer, creating tools like BabelStrike and Villain. </p><h2>Resources from this episode:</h2><ul><li>Panagiotis on <a href="https://www.linkedin.com/in/t3l3machus/">LinkedIn</a></li><li>Panagiotis on <a href="https://github.com/t3l3machus">GitHub</a></li><li>His <a href="https://www.youtube.com/channel/UCebj---w2CTP49tah7a8Veg">YouTube channel</a></li><li><a href="https://www.youtube.com/watch?v=rqAgcB-lNks">How to create your own GitHub projects</a></li><li>John Hammond about <a href="https://www.youtube.com/watch?v=pTUggbSCqA0">hacking using Villain</a></li><li><a href="https://github.com/t3l3machus/Villain">Villain</a></li><li><a href="https://github.com/t3l3machus/toxssin">Toxssin</a></li><li><a href="https://github.com/t3l3machus/hoaxshell">Hoaxshell</a></li><li><a href="https://github.com/t3l3machus/BabelStrike">BabelStrike</a></li><li><a href="https://web.mit.edu/kerberos/">Kerberos</a></li></ul>
]]></description>
      <pubDate>Tue, 27 Feb 2024 09:28:39 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>Stay tuned as we explore how tools like Nmap and sqlmap have shaped penetration testing over the last two decades, and stick around to discover which aspects make pentesting predominantly a craft - and which parts have become standardized (and what that means for your work).</p><p><strong>Unpack this conversation to discover:</strong></p><ul><li>The depth of the work involved in crafting offensive security tools [04:45]</li><li>What you can learn <i>only</i> by developing and maintaining tools [08:03]</li><li>How Villain evolved and key learnings from building it [17:00]</li><li>The challenges of finding balance in deep offensive security work [21:30]</li><li>How Panagiotis uses automation to make his work smoother [25:35]</li><li>How building his own tools shaped his thinking [32:00]</li><li>What makes penetration testing a craft (with hands-on examples) [38:12]</li><li>Why (and how) he finds the motivation to do meaningful work [48:16]</li><li>What kind of projects keep him energized [50:55]</li></ul><p>Venture with us into the evolution of hacking tools, as T3l3machus shares his journey from admiring early toolmakers to becoming a pioneer, creating tools like BabelStrike and Villain. </p><h2>Resources from this episode:</h2><ul><li>Panagiotis on <a href="https://www.linkedin.com/in/t3l3machus/">LinkedIn</a></li><li>Panagiotis on <a href="https://github.com/t3l3machus">GitHub</a></li><li>His <a href="https://www.youtube.com/channel/UCebj---w2CTP49tah7a8Veg">YouTube channel</a></li><li><a href="https://www.youtube.com/watch?v=rqAgcB-lNks">How to create your own GitHub projects</a></li><li>John Hammond about <a href="https://www.youtube.com/watch?v=pTUggbSCqA0">hacking using Villain</a></li><li><a href="https://github.com/t3l3machus/Villain">Villain</a></li><li><a href="https://github.com/t3l3machus/toxssin">Toxssin</a></li><li><a href="https://github.com/t3l3machus/hoaxshell">Hoaxshell</a></li><li><a href="https://github.com/t3l3machus/BabelStrike">BabelStrike</a></li><li><a href="https://web.mit.edu/kerberos/">Kerberos</a></li></ul>
]]></content:encoded>
      <enclosure length="52588598" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/45593f18-b5aa-4bdd-bddf-1eff500df2c4/audio/ec1c5839-0c12-436b-ba7f-139a734700bb/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know what it takes to build hacking tools</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/b1ca8dcb-57dc-41fd-8d3e-0106f6edb272/3000x3000/panagiotis-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:46</itunes:duration>
      <itunes:summary>Why would someone spend a lot of their time making penetration testing tools? Especially when it takes what it takes to maintain them.

Today on We think we know, we&apos;re peeling back the layers of offensive security with the enigmatic Panagiotis Chartas, also known by his alias  - T3l3machus - a nod to his Greek heritage and the strategic depth of his expertise.</itunes:summary>
      <itunes:subtitle>Why would someone spend a lot of their time making penetration testing tools? Especially when it takes what it takes to maintain them.

Today on We think we know, we&apos;re peeling back the layers of offensive security with the enigmatic Panagiotis Chartas, also known by his alias  - T3l3machus - a nod to his Greek heritage and the strategic depth of his expertise.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>9</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">704c8bed-5f59-4be6-96b2-882c2b3c2665</guid>
      <title>We think we know our mind is our best hacking tool</title>
      <description><![CDATA[<p>Inti not only sheds light on what happens when expectations meet reality, but he also shares his unique approach to problem-solving with real-life examples you can add to your own process. </p><p>With 12+ years of experience in this space, Inti De Ceukelaire is a Belgian ethical hacker and cybercrime investigator. He currently works as the Chief Hacker Officer at Europe’s largest vulnerability disclosure platform <a href="https://intigriti.com/">Intigriti</a> and is also a founding member of the <a href="https://www.centerforcybersecuritypolicy.org/hacking-policy-council">Hacker Policy Council</a>.</p><p>Inti also excelled in various bug bounty competitions, where he’s been rewarded by companies like Google, Meta, Yahoo, The US Department of Defense, or Amazon for identifying critical vulnerabilities in their systems.</p><p><strong>Dive deeper into this conversation to learn:</strong></p><ul><li>Why the best hackers started their career by running scripts and trial and error [03:47]</li><li>Why bug bounty hunters need to nurture their creativity when looking for particular vulns [07:37]</li><li>What the main differences between bug bounty and pentesting are [09:46]</li><li>How to impersonate developers as a bug bounty tactic [13:42]</li><li>Why bug bounty often looks like a rabbit hole [25:24]</li><li>Why it’s important to define your own success and appreciate your failures [30:33]</li><li>How AI helps ethical hackers eliminate repetitive and boring tasks [34:19]</li><li>How deep research can lead to unexpected wins in ethical hacking [43:55]</li></ul><p>Join us as we explore the intricacies of bug bounties, the crucial role of mindset in hacking, and how to turn every failure into a stepping stone to success.</p>
]]></description>
      <pubDate>Tue, 13 Feb 2024 12:05:04 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>Inti not only sheds light on what happens when expectations meet reality, but he also shares his unique approach to problem-solving with real-life examples you can add to your own process. </p><p>With 12+ years of experience in this space, Inti De Ceukelaire is a Belgian ethical hacker and cybercrime investigator. He currently works as the Chief Hacker Officer at Europe’s largest vulnerability disclosure platform <a href="https://intigriti.com/">Intigriti</a> and is also a founding member of the <a href="https://www.centerforcybersecuritypolicy.org/hacking-policy-council">Hacker Policy Council</a>.</p><p>Inti also excelled in various bug bounty competitions, where he’s been rewarded by companies like Google, Meta, Yahoo, The US Department of Defense, or Amazon for identifying critical vulnerabilities in their systems.</p><p><strong>Dive deeper into this conversation to learn:</strong></p><ul><li>Why the best hackers started their career by running scripts and trial and error [03:47]</li><li>Why bug bounty hunters need to nurture their creativity when looking for particular vulns [07:37]</li><li>What the main differences between bug bounty and pentesting are [09:46]</li><li>How to impersonate developers as a bug bounty tactic [13:42]</li><li>Why bug bounty often looks like a rabbit hole [25:24]</li><li>Why it’s important to define your own success and appreciate your failures [30:33]</li><li>How AI helps ethical hackers eliminate repetitive and boring tasks [34:19]</li><li>How deep research can lead to unexpected wins in ethical hacking [43:55]</li></ul><p>Join us as we explore the intricacies of bug bounties, the crucial role of mindset in hacking, and how to turn every failure into a stepping stone to success.</p>
]]></content:encoded>
      <enclosure length="46452539" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/c8c49078-32e6-4311-92a3-f88efd31811c/audio/5b17c8df-a93f-4e00-b59b-7da9594e03f5/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know our mind is our best hacking tool</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/9e5568ca-fe4b-4a19-ac48-4657e0882734/3000x3000/inti-de-ceukelaire-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:48:23</itunes:duration>
      <itunes:summary>From his early days of script kiddie shenanigans to helping shape the landscape of bug bounty programs, Inti De Ceukelaire&apos;s story is a thrilling ride through the highs and lows of offensive security.  It also serves as a statement of the transformative power of curiosity and ethical hacking. </itunes:summary>
      <itunes:subtitle>From his early days of script kiddie shenanigans to helping shape the landscape of bug bounty programs, Inti De Ceukelaire&apos;s story is a thrilling ride through the highs and lows of offensive security.  It also serves as a statement of the transformative power of curiosity and ethical hacking. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>8</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d4f50bc7-ecb6-4acf-9a86-7636ba9d2335</guid>
      <title>We think we know what it feels like when we do a good job</title>
      <description><![CDATA[<p>Today’s guest, <strong>Willa Riggins</strong>, talks about how “every small piece contributes to the larger picture” in pentesting and explains why “it's about understanding the intricacies and appreciating the craftsmanship."</p><p>From the mindset behind excellent pentesting work to the (difficult) things that are never going to change in this space, we glide through Willa’s experiences, hard-earned know-how, and thoughtful approach. </p><p>Dive straight into the convo to learn:</p><ul><li>Why you need to get comfortable with trial and error to enjoy pentesting  [03:43]</li><li>The key lesson Willa learned from working in app security [09:45]</li><li>How to focus on your craft when reporting vulnerabilities [13:14] </li><li>The challenges pentest teams face in making their work count [19:07]</li><li>The realistic, reasonable way to use automation in pentesting [24:28] </li><li>Two aspects of the hacker mindset worth cultivating [28:36] </li><li>Why (and how) having a hobby outside pentesting makes you more productive [33:33]</li><li>How to set realistic expectations around developing a career in the field [36:42]</li><li>What will be the key differentiating factor in penetration testing [42:40]</li></ul><p>We believe you’ll get wisdom and inspiration from this kind and generous conversation. Willa will help you get a broader understanding of this field highlighting the fundamental role of people and teamwork. </p><p>Just hit play! </p>
]]></description>
      <pubDate>Tue, 30 Jan 2024 11:21:40 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>Today’s guest, <strong>Willa Riggins</strong>, talks about how “every small piece contributes to the larger picture” in pentesting and explains why “it's about understanding the intricacies and appreciating the craftsmanship."</p><p>From the mindset behind excellent pentesting work to the (difficult) things that are never going to change in this space, we glide through Willa’s experiences, hard-earned know-how, and thoughtful approach. </p><p>Dive straight into the convo to learn:</p><ul><li>Why you need to get comfortable with trial and error to enjoy pentesting  [03:43]</li><li>The key lesson Willa learned from working in app security [09:45]</li><li>How to focus on your craft when reporting vulnerabilities [13:14] </li><li>The challenges pentest teams face in making their work count [19:07]</li><li>The realistic, reasonable way to use automation in pentesting [24:28] </li><li>Two aspects of the hacker mindset worth cultivating [28:36] </li><li>Why (and how) having a hobby outside pentesting makes you more productive [33:33]</li><li>How to set realistic expectations around developing a career in the field [36:42]</li><li>What will be the key differentiating factor in penetration testing [42:40]</li></ul><p>We believe you’ll get wisdom and inspiration from this kind and generous conversation. Willa will help you get a broader understanding of this field highlighting the fundamental role of people and teamwork. </p><p>Just hit play! </p>
]]></content:encoded>
      <enclosure length="48151543" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/26e412ef-7fe3-43c8-9059-821756f71ddb/audio/ab68b384-bfa7-4d99-b7ad-1aa563f1a055/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know what it feels like when we do a good job</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/d52285ad-5169-4b81-997e-0e2606027813/3000x3000/willa-riggins-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:50:09</itunes:duration>
      <itunes:summary>To deliver meaningful results as a pentester you have to be both patient and persistent. You have to love the process and strive for results for your clients. You also have to go in-depth and cultivate a broader understanding of all the pieces of the puzzle.  </itunes:summary>
      <itunes:subtitle>To deliver meaningful results as a pentester you have to be both patient and persistent. You have to love the process and strive for results for your clients. You also have to go in-depth and cultivate a broader understanding of all the pieces of the puzzle.  </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>7</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">beed129a-ef5a-4399-b73f-9288e2e7714b</guid>
      <title>We think we know how to build differentiating skills in offsec</title>
      <description><![CDATA[<p>There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex security challenges is through <i>hands-on training</i>. That’s what IppSec, our guest, does with kindness, passion, and in the community’s best interest.</p><p>IppSec helps us bust a couple of common myths which, if left unquestioned, may alter learning, distort results, and, ultimately, create big gaps in understanding, all of which can undermine your future success. </p><p>Press play to listen to IppSec explain:</p><ul><li>Why recon requires constantly "reading between the lines" [03:20]</li><li>Why AI can’t find business logic vulnerabilities [08:23]</li><li>Why genuine communication with clients is essential [12:48]</li><li>How rewarding and valuable it is to invest in the open-source community [17:35]</li><li>How discipline makes a difference and how to develop it [24:00]</li><li>How pentesting and bug bounty hunting complement each other [27:00]</li><li>How you can build specific skills that differentiate you in the community [35:36]</li><li>How to develop your own learning system [38:04] </li><li>Why it matters to make constant learning a positive experience [44:48]</li></ul><p>IppSec’s generosity to share so many practical, valuable examples will help you get a better understanding of this discipline and enhance your knowledge. </p>
]]></description>
      <pubDate>Tue, 16 Jan 2024 09:50:01 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex security challenges is through <i>hands-on training</i>. That’s what IppSec, our guest, does with kindness, passion, and in the community’s best interest.</p><p>IppSec helps us bust a couple of common myths which, if left unquestioned, may alter learning, distort results, and, ultimately, create big gaps in understanding, all of which can undermine your future success. </p><p>Press play to listen to IppSec explain:</p><ul><li>Why recon requires constantly "reading between the lines" [03:20]</li><li>Why AI can’t find business logic vulnerabilities [08:23]</li><li>Why genuine communication with clients is essential [12:48]</li><li>How rewarding and valuable it is to invest in the open-source community [17:35]</li><li>How discipline makes a difference and how to develop it [24:00]</li><li>How pentesting and bug bounty hunting complement each other [27:00]</li><li>How you can build specific skills that differentiate you in the community [35:36]</li><li>How to develop your own learning system [38:04] </li><li>Why it matters to make constant learning a positive experience [44:48]</li></ul><p>IppSec’s generosity to share so many practical, valuable examples will help you get a better understanding of this discipline and enhance your knowledge. </p>
]]></content:encoded>
      <enclosure length="52675116" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/db6cb64a-cf29-436f-ad9c-f7deba8dfe32/audio/7afb136a-c4a3-4b43-9190-5f92534c7886/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know how to build differentiating skills in offsec</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/9199a879-826a-462a-aa10-412daf488e23/3000x3000/ippsec-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:52</itunes:duration>
      <itunes:summary>There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex security challenges is through hands-on training. That’s what IppSec, our guest, does with kindness, passion, and in the community’s best interest. Explore his counterintuitive ways to improve your offensive security mindset, your learning system, discipline, and practice. 
</itunes:summary>
      <itunes:subtitle>There’s a constant loop of learning, doing, and improving in offensive security. And one way to develop the “muscle” to tackle complex security challenges is through hands-on training. That’s what IppSec, our guest, does with kindness, passion, and in the community’s best interest. Explore his counterintuitive ways to improve your offensive security mindset, your learning system, discipline, and practice. 
</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>6</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">524bb7eb-7dbb-4201-814a-3263b4b7a560</guid>
      <title>We think we know the value of first principles in offensive security</title>
      <description><![CDATA[<p>Ready to excel in offensive security this year? Delve into the mind of Vivek Ramachandran, a cybersecurity virtuoso who’s seen (and learned)<i> a lot</i> in this field. </p><p>He's a force that fuels both his current company and the broader cybersecurity landscape with original thinking, educational and actionable insights.</p><p>And there's more to Vivek than just technical savvy. He's on a mission to revolutionize how we view ethical hackers and infosec pros, using his captivating comic books to challenge cliches and spark a new wave of enthusiasm in the next generation.</p><p><strong>Tune in for this insightful episode with Vivek to find out:</strong></p><ul><li>Why people mistakenly equate offensive security with functional testing [04:36]</li><li>How (and why) the Hackers: Superheroes of the Digital Age comics came to be [07:13]</li><li>Why first principles are essential in mastering and elevating security concepts [12:31]</li><li>How to build your career on curiosity, gut feeling, generosity, and perseverance [19:33]</li><li>Why we need human ingenuity as the nature of what we automate changes [29:10]</li><li>What an entrepreneurial adventure will teach you about yourself - and others [43:45]</li><li>How being part of the infosec community changes your work, thinking, and career [51:00]</li></ul><p>Vivek’s vast career is a rich source of inspiration if you’re ready to practice <a href="https://www.goodreads.com/en/book/show/23848190">extreme ownership</a>, <a href="https://www.goodreads.com/en/book/show/29939161">radical candor</a>, and achieve the kind of alignment between your principles and actions that will propel your work and life to the next level.</p><p> </p><p><strong>Resources from this episode:</strong></p><ul><li>Vivek on <a href="https://www.linkedin.com/in/vivekramachandran/">LinkedIn</a></li><li>Vivek’s <a href="https://yourstory.com/2020/05/techie-tuesday-vivek-ramachandran-cybersecurity-pentester-academy">story in cybersecurity</a></li><li>Comic books - <a href="https://www.vrncomics.com/">Hackers: Superheroes of the digital age</a></li><li>Vivek on the <a href="https://www.youtube.com/watch?v=PJ4PIxO9328">Philip Wylie Show</a></li><li>Advanced Wi-Fi security with Vivek at <a href="https://www.youtube.com/watch?v=TOxch8ZBi2I">DEF CON 23</a></li><li>Training courses on <a href="https://www.pentesteracademy.com/">Pentester Academy</a></li><li><a href="https://en.wikipedia.org/wiki/OSI_model">OSI model layers</a></li></ul>
]]></description>
      <pubDate>Tue, 2 Jan 2024 03:00:00 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>Ready to excel in offensive security this year? Delve into the mind of Vivek Ramachandran, a cybersecurity virtuoso who’s seen (and learned)<i> a lot</i> in this field. </p><p>He's a force that fuels both his current company and the broader cybersecurity landscape with original thinking, educational and actionable insights.</p><p>And there's more to Vivek than just technical savvy. He's on a mission to revolutionize how we view ethical hackers and infosec pros, using his captivating comic books to challenge cliches and spark a new wave of enthusiasm in the next generation.</p><p><strong>Tune in for this insightful episode with Vivek to find out:</strong></p><ul><li>Why people mistakenly equate offensive security with functional testing [04:36]</li><li>How (and why) the Hackers: Superheroes of the Digital Age comics came to be [07:13]</li><li>Why first principles are essential in mastering and elevating security concepts [12:31]</li><li>How to build your career on curiosity, gut feeling, generosity, and perseverance [19:33]</li><li>Why we need human ingenuity as the nature of what we automate changes [29:10]</li><li>What an entrepreneurial adventure will teach you about yourself - and others [43:45]</li><li>How being part of the infosec community changes your work, thinking, and career [51:00]</li></ul><p>Vivek’s vast career is a rich source of inspiration if you’re ready to practice <a href="https://www.goodreads.com/en/book/show/23848190">extreme ownership</a>, <a href="https://www.goodreads.com/en/book/show/29939161">radical candor</a>, and achieve the kind of alignment between your principles and actions that will propel your work and life to the next level.</p><p> </p><p><strong>Resources from this episode:</strong></p><ul><li>Vivek on <a href="https://www.linkedin.com/in/vivekramachandran/">LinkedIn</a></li><li>Vivek’s <a href="https://yourstory.com/2020/05/techie-tuesday-vivek-ramachandran-cybersecurity-pentester-academy">story in cybersecurity</a></li><li>Comic books - <a href="https://www.vrncomics.com/">Hackers: Superheroes of the digital age</a></li><li>Vivek on the <a href="https://www.youtube.com/watch?v=PJ4PIxO9328">Philip Wylie Show</a></li><li>Advanced Wi-Fi security with Vivek at <a href="https://www.youtube.com/watch?v=TOxch8ZBi2I">DEF CON 23</a></li><li>Training courses on <a href="https://www.pentesteracademy.com/">Pentester Academy</a></li><li><a href="https://en.wikipedia.org/wiki/OSI_model">OSI model layers</a></li></ul>
]]></content:encoded>
      <enclosure length="51021251" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/9574b170-132f-4167-b38a-683bbbbdf557/audio/e29e94c4-0c96-4a4b-b9aa-16010b49e8a9/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know the value of first principles in offensive security</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/b9a36946-008b-4cf2-9a24-4f59bc80509a/3000x3000/vivek-ramachandran-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:53:08</itunes:duration>
      <itunes:summary> Let&apos;s dive into the depths of offensive security with Vivek Ramachandran, a titan in the field with over 22 years of frontline experience and 13 years as a trailblazing entrepreneur. He&apos;s not just a figure of profound expertise, but a beacon of inspiration, reshaping how we approach, learn, and evolve in cybersecurity. 

Vivek&apos;s journey is a masterclass in blending technical mastery with impactful education and community building. He&apos;s a force that fuels both his current company and the broader cybersecurity landscape with original thinking and actionable insights. </itunes:summary>
      <itunes:subtitle> Let&apos;s dive into the depths of offensive security with Vivek Ramachandran, a titan in the field with over 22 years of frontline experience and 13 years as a trailblazing entrepreneur. He&apos;s not just a figure of profound expertise, but a beacon of inspiration, reshaping how we approach, learn, and evolve in cybersecurity. 

Vivek&apos;s journey is a masterclass in blending technical mastery with impactful education and community building. He&apos;s a force that fuels both his current company and the broader cybersecurity landscape with original thinking and actionable insights. </itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>5</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">0d52d360-e9fc-402b-b93d-6cb3444ca73e</guid>
      <title>We think we know hacking is a tool for deeper change</title>
      <description><![CDATA[<p>If you have questions that boggle your mind about penetration testing, Jayson is <i>the person</i> to learn from. </p><p>In the fourth episode of our We <i>think</i> we know podcast, we delve into the world of ethical hacking with the legendary <strong>Jayson E. Street</strong>. </p><p>As an icon in the penetration testing community, Jayson brings a unique blend of wit, wisdom, empathy, and a true understanding of the hacker mindset.</p><p>He has a unique talent for breaking down penetration testing into fundamental ideas, using memorable stories you'll want to tell others (and actually remember!).</p><p><strong>Dive into this special episode with Jayson to learn:</strong></p><ul><li>Why every hacker needs to define and focus on their vision of changing the world [04:28]</li><li>How (and why) his unique, creative approach helps him tackle security issues [16:20]</li><li>Why automation can’t work as a defensive model for solving puzzles [25:05]</li><li>How to mitigate risks and explain them to clients in terms they care about [43:58]</li><li>Why AI won’t replace pentesters’ job, but enhance them [49:40]</li></ul><p>Don’t miss this episode that packs so many practical, real-world examples you can learn from and apply in your life and work.</p><p><strong>Resources from this episode:</strong></p><ul><li>Jayson on <a href="https://www.linkedin.com/in/jstreet/">LinkedIn</a></li><li>Wired Tech Support: Jayson <a href="https://www.youtube.com/watch?v=6i-84wqc_qU">answers penetration test questions</a> from Twitter </li><li>Jayson’s <a href="https://jaysonestreet.com/">website</a></li><li>Jayson on the Darknet Diaries - <a href="https://darknetdiaries.com/episode/6/">Ep 6</a></li><li><a href="https://www.youtube.com/watch?v=02Vf3NjTPsI">Documentary</a>: Penetration tester Jayson E. Street helps banks by hacking them</li><li>Book: <a href="https://f0rb1dd3n.com/">Dissecting the hack: the f0rb1dd3n network</a></li><li>Jayson on the <a href="https://cyberempathy.org/episodes/why-being-kind-is-the-harder-thing-to-do">Cyber Empathy podcast</a> - Ep 34, season 4</li></ul><p> </p>
]]></description>
      <pubDate>Tue, 19 Dec 2023 07:55:48 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>If you have questions that boggle your mind about penetration testing, Jayson is <i>the person</i> to learn from. </p><p>In the fourth episode of our We <i>think</i> we know podcast, we delve into the world of ethical hacking with the legendary <strong>Jayson E. Street</strong>. </p><p>As an icon in the penetration testing community, Jayson brings a unique blend of wit, wisdom, empathy, and a true understanding of the hacker mindset.</p><p>He has a unique talent for breaking down penetration testing into fundamental ideas, using memorable stories you'll want to tell others (and actually remember!).</p><p><strong>Dive into this special episode with Jayson to learn:</strong></p><ul><li>Why every hacker needs to define and focus on their vision of changing the world [04:28]</li><li>How (and why) his unique, creative approach helps him tackle security issues [16:20]</li><li>Why automation can’t work as a defensive model for solving puzzles [25:05]</li><li>How to mitigate risks and explain them to clients in terms they care about [43:58]</li><li>Why AI won’t replace pentesters’ job, but enhance them [49:40]</li></ul><p>Don’t miss this episode that packs so many practical, real-world examples you can learn from and apply in your life and work.</p><p><strong>Resources from this episode:</strong></p><ul><li>Jayson on <a href="https://www.linkedin.com/in/jstreet/">LinkedIn</a></li><li>Wired Tech Support: Jayson <a href="https://www.youtube.com/watch?v=6i-84wqc_qU">answers penetration test questions</a> from Twitter </li><li>Jayson’s <a href="https://jaysonestreet.com/">website</a></li><li>Jayson on the Darknet Diaries - <a href="https://darknetdiaries.com/episode/6/">Ep 6</a></li><li><a href="https://www.youtube.com/watch?v=02Vf3NjTPsI">Documentary</a>: Penetration tester Jayson E. Street helps banks by hacking them</li><li>Book: <a href="https://f0rb1dd3n.com/">Dissecting the hack: the f0rb1dd3n network</a></li><li>Jayson on the <a href="https://cyberempathy.org/episodes/why-being-kind-is-the-harder-thing-to-do">Cyber Empathy podcast</a> - Ep 34, season 4</li></ul><p> </p>
]]></content:encoded>
      <enclosure length="56853453" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/cf3c6f47-b71d-4c60-9647-5c1abe3fa0ad/audio/229ccd7d-b087-46ea-8806-3f12e640879e/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know hacking is a tool for deeper change</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/6821805c-a387-4752-af03-4a2795b43816/3000x3000/jayson-e-street-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:59:13</itunes:duration>
      <itunes:summary>Welcome to an insightful episode of our We think we know podcast where we delve deep into the world of ethical hacking with the legendary Jayson E. Street. 

As an icon in the penetration testing community, Jayson brings a unique blend of wit, wisdom, and a profound understanding of the hacker mindset.

Join us as we explore the essence of hacking, not as a mere technical pursuit but as an art form, a craft that transcends traditional boundaries. </itunes:summary>
      <itunes:subtitle>Welcome to an insightful episode of our We think we know podcast where we delve deep into the world of ethical hacking with the legendary Jayson E. Street. 

As an icon in the penetration testing community, Jayson brings a unique blend of wit, wisdom, and a profound understanding of the hacker mindset.

Join us as we explore the essence of hacking, not as a mere technical pursuit but as an art form, a craft that transcends traditional boundaries. </itunes:subtitle>
      <itunes:keywords>cybersecurity, offensive security, penetration testing, jayson e street, hacker, ethical hacking</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>4</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">477bbc98-64fe-4155-837e-8649702c9773</guid>
      <title>We think we know offensive security is an infinite game (and why)</title>
      <description><![CDATA[<p><i><strong>“There is no end goal in this industry. You're always going to keep moving forward.”</strong></i></p><p>This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester. </p><p>For the third episode of We <i>think</i> we know, we welcome<strong> Tim Connell</strong>, an enthusiastic penetration tester and the Director of Cybersecurity Services at <a href="https://www.pulsarsecurity.com/">Pulsar Security</a>, to explore the most common security testing myths and misconceptions.</p><p>Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.</p><p>So join us on We <i>think</i> we know, as we unpack the layers and narratives shaping offensive security work.</p><p>Listen to the new episode to find out:</p><ul><li>Why it’s essential to really understand what each customer needs from their pentest [08:31] </li><li>How to improve your workflow by making some of it replicable [21:33]</li><li>Why it matters to learn as much as you can and use that to deliver better work [33:05]</li><li>How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]</li><li>Why (and how) visual representations boost clear communication in penetrating testing [46:31]</li><li>The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05] </li></ul><p>At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!  </p><h2><strong>Resources from this episode:</strong></h2><ul><li>Tim on <a href="https://www.linkedin.com/in/tim-connell-39b00529/">LinkedIn</a></li><li>His journey from Sales to Director of Offensive Security on the <a href="https://www.youtube.com/watch?v=bvjSytDaQNc">Cybersecurity Recruiter podcast</a></li><li>Tim on hacking a Wi-Fi network password in 2 seconds on the <a href="https://blog.pulsarsecurity.com/videos/hacking-wifi-password-in-2-seconds">Pulsar Security blog</a></li></ul><p> </p>
]]></description>
      <pubDate>Tue, 5 Dec 2023 03:00:00 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p><i><strong>“There is no end goal in this industry. You're always going to keep moving forward.”</strong></i></p><p>This quote from our guest does a great job at capturing the conversation we explore in this podcast: the love for the process, the hunger for knowledge, how to add value for clients, and become a better penetration tester. </p><p>For the third episode of We <i>think</i> we know, we welcome<strong> Tim Connell</strong>, an enthusiastic penetration tester and the Director of Cybersecurity Services at <a href="https://www.pulsarsecurity.com/">Pulsar Security</a>, to explore the most common security testing myths and misconceptions.</p><p>Tim shares some practical tips and examples that spotlight his commitment to continuous learning and community contribution. His enthusiasm and genuine dedication to this space are so inspiring - that we hope will lift you and get better at what you do.</p><p>So join us on We <i>think</i> we know, as we unpack the layers and narratives shaping offensive security work.</p><p>Listen to the new episode to find out:</p><ul><li>Why it’s essential to really understand what each customer needs from their pentest [08:31] </li><li>How to improve your workflow by making some of it replicable [21:33]</li><li>Why it matters to learn as much as you can and use that to deliver better work [33:05]</li><li>How to speed up your learning process by building stuff and looking deeper into vulnerabilities [41:21]</li><li>Why (and how) visual representations boost clear communication in penetrating testing [46:31]</li><li>The perks of being more involved in the community, being resourceful, and keeping your motivation to move forward [50:05] </li></ul><p>At the end of it, you’ll walk away with many valuable lessons to use in both your life and career. Let us know which hit home for you!  </p><h2><strong>Resources from this episode:</strong></h2><ul><li>Tim on <a href="https://www.linkedin.com/in/tim-connell-39b00529/">LinkedIn</a></li><li>His journey from Sales to Director of Offensive Security on the <a href="https://www.youtube.com/watch?v=bvjSytDaQNc">Cybersecurity Recruiter podcast</a></li><li>Tim on hacking a Wi-Fi network password in 2 seconds on the <a href="https://blog.pulsarsecurity.com/videos/hacking-wifi-password-in-2-seconds">Pulsar Security blog</a></li></ul><p> </p>
]]></content:encoded>
      <enclosure length="52613676" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/3b8667ba-36a8-42ec-acd2-24f4c8616b06/audio/303af0ac-367f-44fd-a84a-a9423317bef1/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know offensive security is an infinite game (and why)</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/1a406fae-3464-4a25-a771-62db417fb7a8/3000x3000/tim-connell-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:48</itunes:duration>
      <itunes:summary>Dive into an episode with Tim Connell, where he unveils the art of penetration testing through his lens - from transforming &apos;just a pentest&apos; into a nuanced, client-focused strategy, to leveraging his sales background for deeper customer understanding, and sharing his journey of growth from sales to becoming an influential voice in cybersecurity, all while spotlighting the vital role of curiosity and resourcefulness in the unstopable world of offensive security.</itunes:summary>
      <itunes:subtitle>Dive into an episode with Tim Connell, where he unveils the art of penetration testing through his lens - from transforming &apos;just a pentest&apos; into a nuanced, client-focused strategy, to leveraging his sales background for deeper customer understanding, and sharing his journey of growth from sales to becoming an influential voice in cybersecurity, all while spotlighting the vital role of curiosity and resourcefulness in the unstopable world of offensive security.</itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>3</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">cc3d6394-f99f-4a6f-b475-1d9d8f8b1ff0</guid>
      <title>We think we know how to give pentest clients what they really need</title>
      <description><![CDATA[<p>It’s not <i>just</i> penetration testing, just like today’s guest is not <i>just</i> an offensive security pro. </p><p>If you’re the ambitious type who’s always up for new challenges, then you’re most likely going to resonate with today’s guest and his approach.  </p><p>Experienced penetration tester and <a href="https://www.volkis.com.au/">Volkis</a> co-founder, <strong>Alexei Doudkine</strong> joins us in the second episode of the podcast to debunk pentesting misconceptions. </p><p>With 10+ years of offensive security experience under his belt and his learnings as a business owner, Alexei challenges the status quo to get other hackers to walk a mile in their clients' shoes. </p><p>You’ll also hear Alexei unpack the skills and mindset it takes to deliver quality in penetration testing and become a better ethical hacker. Some of these ideas may make you uncomfortable - and that’s why we believe they’re worth listening to. </p><p>Whether it’s about absorbing technical complexities like a sponge or developing an intuitive perception of vulnerabilities, this conversation highlights the aspects of penetration testing that make it a <i>true</i> craft. </p><p>So, come along with us on <strong>We </strong><i><strong>think</strong></i><strong> we know</strong>, as we unpack the layers and narratives shaping offensive security work.</p><p><strong>In this episode, you’ll learn:</strong></p><ul><li>Why it’s not about data, but how you use it and the human impact behind it. [12:24]</li><li>What it takes to develop your hacker intuition that tells you there’s something there - even before you have proof [15:25]</li><li>Why automation is not the problem, but using it as a standard checkbox in your engagements is [19:00]</li><li>How to use learning to also stay humble, rooted in the here and now [27:30]</li><li>Why it’s worth prioritizing people over security testing during tougher economic times [44:45]</li><li>The perks of being uncomfortable, hungry for learning, and doing your best work [49:20]</li></ul><p>By the end of this episode, you'll look at your work - and the infosec community - with fresh eyes.  </p><h2>Resources from this episode:</h2><ul><li>Alexei on <a href="https://www.linkedin.com/in/alexei-doudkine/">Linkedin</a></li><li>Alexei’s hacker origin story on the <a href="https://www.volkis.com.au/blog/hacker-origin-stories-alexei/">Volkis blog</a></li><li>Alexei on the <a href="https://cyberempathy.org/episodes/empathy-in-ethical-hacking">Cyber Empathy podcast</a> - Ep. 5, Season 1</li><li><a href="https://www.volkis.com.au/blog/independence-policy/">The Volkis Independence Policy</a></li></ul><h2>Listen to this episode on:</h2><ul><li><a href="https://open.spotify.com/show/0NpfINV1ZaIP6JEqzKoIAg">Spotify</a></li><li><a href="https://podcasts.apple.com/ro/podcast/we-think-we-know/id1715298481">Apple Podcasts</a></li><li><a href="https://music.amazon.com/podcasts/1e966552-8ec7-406b-a480-70aab7a78a8a/we-think-we-know">Amazon Podcasts</a></li><li><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zaW1wbGVjYXN0LmNvbS83UEM1dW1fUQ">Google Podcasts</a></li></ul>
]]></description>
      <pubDate>Tue, 21 Nov 2023 07:31:07 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>It’s not <i>just</i> penetration testing, just like today’s guest is not <i>just</i> an offensive security pro. </p><p>If you’re the ambitious type who’s always up for new challenges, then you’re most likely going to resonate with today’s guest and his approach.  </p><p>Experienced penetration tester and <a href="https://www.volkis.com.au/">Volkis</a> co-founder, <strong>Alexei Doudkine</strong> joins us in the second episode of the podcast to debunk pentesting misconceptions. </p><p>With 10+ years of offensive security experience under his belt and his learnings as a business owner, Alexei challenges the status quo to get other hackers to walk a mile in their clients' shoes. </p><p>You’ll also hear Alexei unpack the skills and mindset it takes to deliver quality in penetration testing and become a better ethical hacker. Some of these ideas may make you uncomfortable - and that’s why we believe they’re worth listening to. </p><p>Whether it’s about absorbing technical complexities like a sponge or developing an intuitive perception of vulnerabilities, this conversation highlights the aspects of penetration testing that make it a <i>true</i> craft. </p><p>So, come along with us on <strong>We </strong><i><strong>think</strong></i><strong> we know</strong>, as we unpack the layers and narratives shaping offensive security work.</p><p><strong>In this episode, you’ll learn:</strong></p><ul><li>Why it’s not about data, but how you use it and the human impact behind it. [12:24]</li><li>What it takes to develop your hacker intuition that tells you there’s something there - even before you have proof [15:25]</li><li>Why automation is not the problem, but using it as a standard checkbox in your engagements is [19:00]</li><li>How to use learning to also stay humble, rooted in the here and now [27:30]</li><li>Why it’s worth prioritizing people over security testing during tougher economic times [44:45]</li><li>The perks of being uncomfortable, hungry for learning, and doing your best work [49:20]</li></ul><p>By the end of this episode, you'll look at your work - and the infosec community - with fresh eyes.  </p><h2>Resources from this episode:</h2><ul><li>Alexei on <a href="https://www.linkedin.com/in/alexei-doudkine/">Linkedin</a></li><li>Alexei’s hacker origin story on the <a href="https://www.volkis.com.au/blog/hacker-origin-stories-alexei/">Volkis blog</a></li><li>Alexei on the <a href="https://cyberempathy.org/episodes/empathy-in-ethical-hacking">Cyber Empathy podcast</a> - Ep. 5, Season 1</li><li><a href="https://www.volkis.com.au/blog/independence-policy/">The Volkis Independence Policy</a></li></ul><h2>Listen to this episode on:</h2><ul><li><a href="https://open.spotify.com/show/0NpfINV1ZaIP6JEqzKoIAg">Spotify</a></li><li><a href="https://podcasts.apple.com/ro/podcast/we-think-we-know/id1715298481">Apple Podcasts</a></li><li><a href="https://music.amazon.com/podcasts/1e966552-8ec7-406b-a480-70aab7a78a8a/we-think-we-know">Amazon Podcasts</a></li><li><a href="https://podcasts.google.com/feed/aHR0cHM6Ly9mZWVkcy5zaW1wbGVjYXN0LmNvbS83UEM1dW1fUQ">Google Podcasts</a></li></ul>
]]></content:encoded>
      <enclosure length="50582394" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/33dbfd5b-10cd-4079-83ac-ede2b32321f8/audio/5694b8b4-cead-41bb-97ff-3ce89f21ceca/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know how to give pentest clients what they really need</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/7d8db5e0-ee39-497f-ae1b-f619b7d50681/3000x3000/alexei-doudkine-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:52:41</itunes:duration>
      <itunes:summary></itunes:summary>
      <itunes:subtitle></itunes:subtitle>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>2</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">d234661b-3bf9-4b9d-9e31-3fa88129aae4</guid>
      <title>We think we know how to explain the value of a penetration test</title>
      <description><![CDATA[<p>Welcome to the kick-off episode of the <strong>We </strong><i><strong>think</strong></i><strong> we know</strong> podcast! </p><p>Whether you’re looking for a fresh perspective, to learn about and <i>from</i> our guest, or just to see if this podcast is worth your time, thanks for choosing to spend some time with us! We don’t take it for granted.</p><p>Today, we've got the fantastic <strong>Alethe Denis</strong> with us. Wearer of many hats and a generous contributor to the cybersecurity community, Alethe’s work covers a broad range of offensive security, from pentesting to social engineering, and red teaming, including tabletop exercises. </p><p>In 2019, Alethe took home the top prize at the prestigious DEF CON Social Engineering CTF. She later snagged a DEF CON Black Badge, becoming a go-to social engineering expert and cybersecurity ally for companies around the world.</p><p>Sharing examples from her real-world experience, Alethe helps us break down a stubborn misconception: that penetration testing is merely a commodity, another box to tick off for compliance. </p><p>By all means, this is not a new issue in offensive security. But it is a persistent one.</p><p>When seen as a commodity, pentesting undervalues expertise, it lowers pay, leads to superficial testing scopes, and reduces the satisfaction penetration testers get from their work.</p><p>That’s why we’re talking about it.</p><p>Alethe offers very practical tips and language you can use to highlight the value of your work and the nuances it involves. </p><p>You’re in for a treat! </p><p> </p><p><strong>Hacker's toolbox from this episode:</strong></p><ul><li><a href="https://twitter.com/AletheDenis" target="_blank">Alethe on Twitter</a></li><li><a href="https://alethedenis.com/" target="_blank">Alethe’s website</a></li><li>Alethe on the <a href="https://darknetdiaries.com/episode/107/" target="_blank">Darknet Diaries</a> - EP. 107</li><li><a href="https://www.darkreading.com/dr-tech/social-engineering-adds-depth-to-red-team-exercises" target="_blank">Social engineering adds depth to red team exercises</a></li></ul>
]]></description>
      <pubDate>Tue, 7 Nov 2023 07:25:41 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>Welcome to the kick-off episode of the <strong>We </strong><i><strong>think</strong></i><strong> we know</strong> podcast! </p><p>Whether you’re looking for a fresh perspective, to learn about and <i>from</i> our guest, or just to see if this podcast is worth your time, thanks for choosing to spend some time with us! We don’t take it for granted.</p><p>Today, we've got the fantastic <strong>Alethe Denis</strong> with us. Wearer of many hats and a generous contributor to the cybersecurity community, Alethe’s work covers a broad range of offensive security, from pentesting to social engineering, and red teaming, including tabletop exercises. </p><p>In 2019, Alethe took home the top prize at the prestigious DEF CON Social Engineering CTF. She later snagged a DEF CON Black Badge, becoming a go-to social engineering expert and cybersecurity ally for companies around the world.</p><p>Sharing examples from her real-world experience, Alethe helps us break down a stubborn misconception: that penetration testing is merely a commodity, another box to tick off for compliance. </p><p>By all means, this is not a new issue in offensive security. But it is a persistent one.</p><p>When seen as a commodity, pentesting undervalues expertise, it lowers pay, leads to superficial testing scopes, and reduces the satisfaction penetration testers get from their work.</p><p>That’s why we’re talking about it.</p><p>Alethe offers very practical tips and language you can use to highlight the value of your work and the nuances it involves. </p><p>You’re in for a treat! </p><p> </p><p><strong>Hacker's toolbox from this episode:</strong></p><ul><li><a href="https://twitter.com/AletheDenis" target="_blank">Alethe on Twitter</a></li><li><a href="https://alethedenis.com/" target="_blank">Alethe’s website</a></li><li>Alethe on the <a href="https://darknetdiaries.com/episode/107/" target="_blank">Darknet Diaries</a> - EP. 107</li><li><a href="https://www.darkreading.com/dr-tech/social-engineering-adds-depth-to-red-team-exercises" target="_blank">Social engineering adds depth to red team exercises</a></li></ul>
]]></content:encoded>
      <enclosure length="52378782" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/eaa22ba3-e32d-4b2c-b2ca-3520c40013c5/audio/0970abd1-64cb-478b-9c03-85df341689f5/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>We think we know how to explain the value of a penetration test</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:image href="https://image.simplecastcdn.com/images/94c74c65-87e4-4cb6-89c4-edcc6b541399/521cf88e-c101-4e40-b856-e366d5f5c80f/3000x3000/alethe-denis-episode-pic.jpg?aid=rss_feed"/>
      <itunes:duration>00:54:33</itunes:duration>
      <itunes:summary>The brilliant Alethe Denis joins us in this first episode to unravel the intricacies of security testing. As a seasoned offensive security pro who&apos;s breaking barriers and shattering myths, her insider stories are packed with tips on how to: navigate security quandaries, build trust in pentest engagements, and break into the industry.

So, come along with us on We think we know, as we unpack the layers and narratives shaping offensive security work.</itunes:summary>
      <itunes:subtitle>The brilliant Alethe Denis joins us in this first episode to unravel the intricacies of security testing. As a seasoned offensive security pro who&apos;s breaking barriers and shattering myths, her insider stories are packed with tips on how to: navigate security quandaries, build trust in pentest engagements, and break into the industry.

So, come along with us on We think we know, as we unpack the layers and narratives shaping offensive security work.</itunes:subtitle>
      <itunes:keywords>cybersecurity, information security, offensive security, penetration testing, ethical hacking</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>1</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
    <item>
      <guid isPermaLink="false">bc6f1d9c-4491-451b-b260-8bedaa91a0e9</guid>
      <title>Welcome to We *think* we know!</title>
      <description><![CDATA[<p>🤩 We’re launching a podcast!<br /><br />On Nov. 7, the first episode of We <strong>Think</strong> We Know will be in your headphones! </p><p>Here's the low-down:<br /><br /><strong>🤔 What is it about?</strong><br />Learning how to be better hackers by challenging assumptions and digging deeper into the why, how, and what of offensive security. In the 1st season, we're unpacking why #penetrationtesting is a craft and *not* a commodity.<br /><br /><strong>🎤 Who’s gonna be on? </strong><br />Some of the best #offensivesecurity professionals, who joined us to reveal their unique skills, traits, and real-world experiences in a way that directly fuels your growth.<br /><br /><strong>😎 What’s in it for me? </strong><br />Thought-provoking ideas, practical advice you can use straight away, battle-tested advice on how to present your work and develop your career. <br /><br /><strong>👉 Why are *we* doing this? </strong><br />Because we care deeply about the people in this community and the work they do. <br />Because we believe that learning from each other is what made #ethicalhacking what it is today - and what it keeps it evolving. <br />Because there are a lot of hackers whose stories can educate and inspire others, both new to this field and already committed to it.<br /><br />📌 If you want to find out the moment We *Think* We Know comes out, subscribe to our Youtube channel: <a href="https://www.youtube.com/@PentestToolscom/podcasts" target="_blank">https://www.youtube.com/@PentestToolscom/podcasts</a></p>
]]></description>
      <pubDate>Mon, 6 Nov 2023 14:27:34 +0000</pubDate>
      <author>andra.zaharia@pentest-tools.com (Pentest-Tools.com)</author>
      <link>https://pentest-tools.com/blog/categories/podcast</link>
      <content:encoded><![CDATA[<p>🤩 We’re launching a podcast!<br /><br />On Nov. 7, the first episode of We <strong>Think</strong> We Know will be in your headphones! </p><p>Here's the low-down:<br /><br /><strong>🤔 What is it about?</strong><br />Learning how to be better hackers by challenging assumptions and digging deeper into the why, how, and what of offensive security. In the 1st season, we're unpacking why #penetrationtesting is a craft and *not* a commodity.<br /><br /><strong>🎤 Who’s gonna be on? </strong><br />Some of the best #offensivesecurity professionals, who joined us to reveal their unique skills, traits, and real-world experiences in a way that directly fuels your growth.<br /><br /><strong>😎 What’s in it for me? </strong><br />Thought-provoking ideas, practical advice you can use straight away, battle-tested advice on how to present your work and develop your career. <br /><br /><strong>👉 Why are *we* doing this? </strong><br />Because we care deeply about the people in this community and the work they do. <br />Because we believe that learning from each other is what made #ethicalhacking what it is today - and what it keeps it evolving. <br />Because there are a lot of hackers whose stories can educate and inspire others, both new to this field and already committed to it.<br /><br />📌 If you want to find out the moment We *Think* We Know comes out, subscribe to our Youtube channel: <a href="https://www.youtube.com/@PentestToolscom/podcasts" target="_blank">https://www.youtube.com/@PentestToolscom/podcasts</a></p>
]]></content:encoded>
      <enclosure length="733656" type="audio/mpeg" url="https://cdn.simplecast.com/audio/ea77e4f7-204e-4d95-96aa-fc5b69b7f4dd/episodes/9f20b239-b22b-4720-b737-7d8f1515fc7a/audio/734846d7-5e78-4c36-8c34-7fe688d033ff/default_tc.mp3?aid=rss_feed&amp;feed=7PC5um_Q"/>
      <itunes:title>Welcome to We *think* we know!</itunes:title>
      <itunes:author>Pentest-Tools.com</itunes:author>
      <itunes:duration>00:00:45</itunes:duration>
      <itunes:summary>🚀 Launching: the We Think We Know podcast! 

Hear from top offensive security pros to elevate your hacker craft. Subscribe for the Nov 7 drop! 🎧

🛠️ Dive into penetration testing secrets, career-boosting tips, and inspiring hacker stories. Learn, grow, and join our ethical hacking evolution. Subscribe now!</itunes:summary>
      <itunes:subtitle>🚀 Launching: the We Think We Know podcast! 

Hear from top offensive security pros to elevate your hacker craft. Subscribe for the Nov 7 drop! 🎧

🛠️ Dive into penetration testing secrets, career-boosting tips, and inspiring hacker stories. Learn, grow, and join our ethical hacking evolution. Subscribe now!</itunes:subtitle>
      <itunes:keywords>cybersecurity, pentesting, information security, offensive security, red teaming, penetration testing, vulnerability detection, ethical hacking</itunes:keywords>
      <itunes:explicit>no</itunes:explicit>
      <itunes:episodeType>full</itunes:episodeType>
      <itunes:episode>0</itunes:episode>
      <itunes:season>1</itunes:season>
    </item>
  </channel>
</rss>