Keeping It Open Source with Metasploit’s HD Moore

Keeping It Open Source with Metasploit’s HD Moore

This season of Hacker Valley Red wraps up with another interview of an incredible offensive cybersecurity legend. Known first and foremost for his work founding Metasploit and his recent work co-founding Rumble, HD Moore joins the show this week to hear about his journey from spiteful hacker to successful founder. HD walks through the history of Metasploit, the motivation behind their coding decisions, his opinions on open source software, and the excitement of exploration and discovery.

Timecoded Guide:

[04:57] Catching up with HD’s career from his hacking exploits in the ‘90s through his founding of Metasploit to his recent activities with Rumble

[11:41] Getting personal with the feelings and takeaways from a project as successful and impactful on the cyber industry as Metasploit

[18:52] Explaining HD’s personal philosophies around accessible education and the risk of sharing vulnerable information publicly

[25:39] Diving deep into the technical stories of HD’s path of discovery and exploration during his time at Metasploit

[31:14] Giving advice for future founders and hackers looking to make a legendary impact on the cybersecurity community

Sponsor Links:

Thank you to our sponsors Axonius and PlexTrac for bringing this season of HVR to life!

Life is complex. But it’s not about avoiding challenges or fearing failure. Just ask Simone Biles — the greatest gymnast of all time. Want to learn more about how Simone controls complexity? Watch her video at axonius.com/simone

PlexTrac is pleased to offer an exclusive Red Team Content Bundle for Hacker Valley listeners. This bundle contains both our "Writing a Killer Penetration Test Report" and "Effective Purple Teaming" white papers in ONE awesome package. Head to PlexTrac.com/HackerValley to learn more about the platform and get your copy today!

What were some of the trials, tribulations, and successes of Metasploit?

Although Metasploit has had a lasting impact on the cyber world, HD Moore is not afraid to admit that part of Metasploit existed out of spite for critics, employers, and gatekeepers in the cybersecurity industry. In terms of trials and tribulations, HD saw a great deal of criticism come from his peers and from professionals ahead of him in the industry, often displaying rudeness towards the quality of the exploits and Metasploit’s audience of young hackers. Later, HD says that a surprising and amusing side effect of his success with the project was watching employers and peers go from criticizing to lifting up his work with Metasploit and attributing success of many hacking professionals to its creation.

“When we started the Metasploit project, we really wanted to open up to everybody. We wanted to make sure that, even if you barely knew how to program, you can still contribute something to Metasploit. So, we did our best to make it really easy for folks to get in touch with us, to submit code.”

Where does your philosophy land today on giving information freely?

HD has heard the same opinions many professionals that teach and give information freely have heard: “You’re making it easier for people to use this information the wrong way.” Instead of considering the worst possible outcomes of making hacking accessible, HD chooses to acknowledge the importance of accessible education and publicly provided information. According to HD, if someone is creating and teaching content to the next generation of red teamers, that content is theirs to use. Whether they’re a physical pen tester teaching lock picking or a hacker disclosing a vulnerability, what they choose to share with others has to be based on personal moral code and what others do with that information is up to them.

“It comes down to: You do the work, you own the result. If you're teaching people how to do stuff, great, they can do what they want. You can decide to do that, you can decide not to do that, but it's your decision to spend your time training people or not training them.”

Is it possible to be a CEO, or a co-founder, and stay technical?

The downside of success in the cybersecurity industry is often stereotyped as losing the opportunity to be a hands-on hacker. However, for HD, his success has allowed him to do the exact opposite and instead prioritize his time to be technical. HD believes strongly in the ability to make this happen through proper delegation of duties, incorporating new leaders and managers in your company or project, and acknowledging when you may need the help to bring what you’re working on to the next level. HD is proud of his success with Metasploit and Rumble, and is happy that he was able to hand off certain duties to other professionals that he knew would do better if they had a chance in the founder’s shoes.

“Don't let the growth of your company change what you enjoy about your work. That's really the big thing there, and there's lots of ways you can get there. You can hire folks to help out, you can promote your co-founder to CEO. You can bring on program managers or project managers to help with all the day to day stuff."

What advice do you have for people looking to follow a similar cyber career path?

Content is the name of the game, especially when you’re looking to get more eyes on what you do. HD is the first to admit that putting himself out there in a blog post, on a podcast, or at a stage show is not always a walk in the park, taking him out of his comfort zone and often away from the tech that he spends his time on. However, publicly displaying himself and his work has brought attention to Rumble and Metasploit, and HD knows he would not have achieved this level of success without putting his content out into the world, hearing feedback from his peers, and even receiving his fair share of criticism from industry professionals.

“Not all of it is the most fun thing to do all the time, but it is crucially important, not just for growing yourself and getting out there and getting feedback from your peers, but for learning because you learn so much from the feedback you get from that effort.”

-----------

Links:

Stay in touch with HD Moore on LinkedIn, Twitter, and his website.

Learn more about Rumble, Inc on LinkedIn and the Rumble website.

Keep up with Hacker Valley on our website, LinkedIn, Instagram, and Twitter.

Follow Ron Eddings on Twitter and LinkedIn

Catch up with Chris Cochran on Twitter and LinkedIn

Continue the conversation by joining our Discord

Jaksot(404)

AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter

AI, Deepfakes, and Human Risk in Cybersecurity with Perry Carpenter

In a world filled with AI-generated deceptions, how do we discern what’s real? Ron sits down with Perry Carpenter, author of FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions, to discuss the risks and the potential of synthetic media and human risk management. Whether you’re worried about deepfakes or curious about AI’s role in creativity, this episode has something for everyone. Impactful Moments: 00:00 – Intro 00:49 – Synthetic voices surprise in mastermind 01:42 – Perry’s new book FAIK: A Practical Guide to Living in a World of Deepfakes, Disinformation, and AI-Generated Deceptions 03:42 – Psychology's role in cybersecurity 06:07 – Human risk management explained 09:14 – Deepfakes in fraud and scams 15:13 – Demo of deepfake voices 20:22 – Using cakes to explain large language models  27:00 – AI helps overcome creative blocks 32:00 – Managing AI hallucinations and risks Connect with our guest, Perry Carpenter: https://www.linkedin.com/in/perrycarpenter Purchase a copy of Perry’s book FAIK here: https://www.amazon.com/FAIK-Practical-Disinformation-AI-Generated-Deceptions/dp/1394299885 Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

22 Loka 202433min

How to Become a True Security Leader with Nathan Case

How to Become a True Security Leader with Nathan Case

How does one become a true security leader? According to Nathan Case, it’s not about titles—it’s about impact.  In this episode, Nathan Case, VP of Cloud Security at Clarity, shares his journey through security leadership, including stories from his time at AWS and his approach to building mission-driven teams. Nathan discusses balancing family with leadership, the future of AI in cybersecurity, and what it takes to become a real leader in the security space. He also reflects on the importance of being chosen as a leader, rather than striving for the title.   Impactful Moments: 00:00 – Introduction 02:31 – Journey from AWS to Clarity 04:00 – Cyber Dominance 05:55 – Leading Through M&A 07:00 – Redefining the CISO Role 11:00 – Shared Security Responsibility 15:15 – Balancing Mission and Family 20:00 – AI in Security 28:30 – Leadership in Incident Response 32:00 – Woodworking and Perfectionism 35:00 – Leaders Are Chosen Links: Connect with our guest, Nathan Case: https://www.linkedin.com/in/nathancase/ Check out Nathan and Ross Haleliuk's blog on Security Incident Response here: https://ventureinsecurity.net/p/a-different-take-on-security-incident Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

15 Loka 202436min

AI and the Future of Cyber Defense with John Hubbard

AI and the Future of Cyber Defense with John Hubbard

How can AI shape the future of cybersecurity defense? In this episode, we dive into SOC operations, AI integration, and the latest in threat detection with John Hubbard, Cyber Defense Curriculum Lead at SANS. John discusses the expansive landscape of cybersecurity defense, while sharing insights on AI's role in threat detection and the cutting-edge tools that are pushing the boundaries of cybersecurity. From automation to detecting anomalies in network traffic, this episode will bring you up to speed on the latest trends and challenges facing cyber defense teams. Impactful Moments: 00:00 – Introduction 01:00 – Meet John Hubbard: Cyber Defense Curriculum Lead at SANS 02:30 – Overview of the SANS Cyber Defense Curriculum 03:30 – The Role of AI in Cybersecurity 05:30 – How AI is Shaping Threat Detection in SOCs 09:00 – Automation and AI: Practical Use Cases 15:00 – AI in Network Traffic Analysis 19:00 – The Future of SOC Operations with AI   Links: Connect with our guest, John Hubbard: https://www.linkedin.com/in/johnlhubbard/ Check out the SANS Cybersecurity Courses & Certifications: https://www.sans.org/cyber-security-courses/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

8 Loka 202434min

How Adversaries Are Living Off The Dark Web with Jason Haddix

How Adversaries Are Living Off The Dark Web with Jason Haddix

Have you ever lost something important, only to find out someone moved it without telling you? The same thing happens with our personal and business data. But what if you could see what the adversary sees?  In this episode, Jason Haddix, Field CISO at Flare, shares his experiences in red teaming, accessing dark web credentials, and protecting against malicious actors. Whether you're curious about data exposure or how threat actors operate, this conversation offers insights into the constant changes in cybersecurity.   Impactful Moments: 00:00 - Introduction 01:11 - The Basics of the Dark Web and How Criminals Operate 07:16 - Flare's Role in Cybersecurity 11:14 - Common Security Mistakes 20:04 - Pen Testing with Flare 21:33 - Exploiting Exposed Credentials 22:19 - Reconnaissance Tools and Techniques 24:38 - Email Security Concerns 28:43 - The Power of Stealer Logs 38:21 - Dark Web Tactics and AI 39:33 - Advice for Cybersecurity Leaders 42:04 - Exploring Flare’s Platform for Threat Intelligence 44:26 - Conclusion and Final Thoughts Links: Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/ Check out Flare here: https://try.flare.io/hacker-valley-media/ Check out Arcanum here: https://www.arcanum-sec.com/   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

1 Loka 202444min

AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan

AT&T Dynamic Defense: Security Before It Reaches Your Company's Doorstep with Senthil Ramakrishnan

In this episode, Ron Eddings and Jen Langdon speak with Senthil Ramakrishnan, Assistant Vice President of Cybersecurity Product at AT&T Business. Senthil shares information about how a new product, AT&T Dynamic Defense™, helps protect customers by providing threat detection and mitigation at the network edge. They’ll discuss how it can address evolving cybersecurity threats, including real-world examples like the Log4j vulnerability, and how its simplicity allows for a zero-touch experience.   Impactful Moments: 00:00 - Welcome 01:01 - Introducing guest, Senthil Ramakrishnan 04:01 - Security at the Network Edge 05:57 - Fitting in With Businesses 08:00 - “Can You Just Block It For Us?” 10:05 - Stopping Log4j 11:18 - Default Enabled Policy 15:57 - How Involved is the Customer? 16:40 - Simplifying Security for Customers   Links: Connect with our guest Senthil Ramakrishnan: https://www.linkedin.com/in/senthil-ramakrishnan-66406b30/ Check out AT&T Dynamic Defense™: https://www.business.att.com/products/att-dynamic-defense.html Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Check out our upcoming events: hackervalley.com/livestreams

24 Syys 202418min

Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam

Soft Skills in Technical Sales to Connect and Sell More with Evgeniy Kharam

Technical skills open doors, but are soft skills sealing the deal? In this episode, Evgeniy Kharam reveals how communication and connection lead to success in technical sales.    From vulnerability to voice control, Evgeniy shares how to connect with clients and sell more effectively in tech.   Evgeniy Kharam has authored “Architecting Success: The Art of Soft Skills and Technical Sales”, to teach the art of soft skills, and the importance of building connections through vulnerability.   Impactful Moments: 00:00 - Introduction 01:08 - Meet Evgeniy Kharam  02:21 - Ski & Snowboard Cybersecurity Conference 06:22 - Impact of Events and Community Building 10:19 - ‘Architecting Success’ 10:36 - Sales Engineers’ Evolving Role 25:58 - POCs and Soft Skills 28:01 - Your Voice: A Key Soft Skill 31:28 - Connect with Evgeniy   Links: Connect with our guest, Evgeniy Kharam: https://www.linkedin.com/in/ekharam/ Check out Evgeniy’s Book, “Architecting Success: The Art of Soft Skills in Technical Sales: Connect to Sell More“ here: https://a.co/d/0xJSyew Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

17 Syys 202431min

Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix

Recon Like An Adversary: Uncovering Modern Techniques in Attack Surface Management with Jason Haddix

Ever wondered how the best defenders become unstoppable? They think like the attackers. In this episode with Jason Haddix, we reveal the strategies hackers don’t want you to know about and show you how to use them to your advantage. Jason, CEO of Arcanum Information Security and Field CISO at Flare, helps us step into the mind of a hacker. With stories and insights that will change how you think about cybersecurity, he talks about the tactics that can turn any security program into a fortress. From exploiting the overlooked to using AI for unbeatable defense, this conversation will revolutionize your approach to cybersecurity.   00:00 Introduction 01:29 Jason Haddix, CEO at Arcanum and Field CISO for Flare 04:48 Origins of Arcanum 07:04 Recon in Cybersecurity 12:22 Recon Discoveries 27:41 Flare's Role in Credential Management 33:47 Tooling for Small Businesses 35:47 Using AI for Cybersecurity 41:23 Flare Platform Deep Dive 43:20 Conclusion   Links: Connect with our guest, Jason Haddix: https://www.linkedin.com/in/jhaddix/ Check out Flare here: https://try.flare.io/hacker-valley-media/ Check out Arcanum here: https://www.arcanum-sec.com/ Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

10 Syys 202446min

I Failed Over 300 Times Trying To Get Into Security ft. Joe South

I Failed Over 300 Times Trying To Get Into Security ft. Joe South

Joe South is a testament to resilience, unconventional decisions, and finding success in unexpected places. If you’ve ever felt stuck in a rut or on the verge of giving up, Joe’s experience might be the jolt you need to keep pushing forward. Joe, Principal Security Engineer and host of the “Security Unfiltered” podcast, shares his journey into cybersecurity and battling depression after being rejected more than 300 times when applying for security roles. Joe shares advice on breaking into cybersecurity, dealing with rejection, the importance of mentorship, and staying persistent.   00:00 Introduction 01:00 Joe South, Principal Security Engineer and Host of the Security Unfiltered podcast 02:34 Early Career Struggles and Breakthrough 03:59 The Turning Point: From Help Desk to Cybersecurity 06:44 Rejection and Finding Success 11:17 Advice for Aspiring Cybersecurity Professionals 16:19 The Importance of Continuous Learning in Cybersecurity 18:10 Join the Hacker Valley Creative Mastermind! 19:10 Securing AI Models: Challenges and Strategies 20:10 The Importance of Communication in Security 21:22 Experience and Career Advancement 21:52 Rethinking Success: The Value of Being Number Two 23:57 Pressure and Rewards of Being a CISO 26:16 The Benefits of Podcasting and Content Creation 32:28 Balancing Personal and Public Information 35:27 Overcoming Adversity and Putting Yourself Out There 38:01 Final Thoughts and Advice for Aspiring Content Creators Links: Connect with our guest, Joe South: https://www.linkedin.com/in/joseph-south/ Check out the Security Unfiltered podcast here: https://securityunfiltered.com   Check out our upcoming events: https://www.hackervalley.com/livestreams Join our creative mastermind and stand out as a cybersecurity professional: https://www.patreon.com/hackervalleystudio Love Hacker Valley Studio? Pick up some swag: https://store.hackervalley.com Continue the conversation by joining our Discord: https://hackervalley.com/discord Become a sponsor of the show to amplify your brand: https://hackervalley.com/work-with-us/

3 Syys 202440min

Suosittua kategoriassa Koulutus

rss-murhan-anatomia
voi-hyvin-meditaatiot-2
psykopodiaa-podcast
rss-liian-kuuma-peruna
jari-sarasvuo-podcast
rss-luonnollinen-synnytys-podcast
rss-arkea-ja-aurinkoa-podcast-espanjasta
ilona-rauhala
adhd-podi
aamukahvilla
psykologia
ihminen-tavattavissa-tommy-hellsten-instituutti
rss-tule-tule-hyva-ero
rss-finnish-with-eemeli-podcast
rss-monarch-talk-with-alexandra-alexis
mielipaivakirja
rss-uskonto-on-tylsaa
rss-valo-minussa-2
rss-niinku-asia-on
rss-keskeneraiset-aidit