Hacking with James Kettle
Easy Prey3 Juni 2020

Hacking with James Kettle

Have you ever wondered how hackers find vulnerabilities and how companies can find and fix their own? You will find out today! On average 30,000 new websites are hacked every day.

Our guest for this episode is James Kettle. James is the Director of Research at PortSwigger Web Security where he explores new ways to attack websites and designs and refines vulnerability detection techniques for the Burp Suites scanner.

James shares his hacking experience and hard work helping companies keep their websites secure from all the crazy stuff going on out there. On today's episode, James shares his expertise to help you be more aware of possible red flags and prevention measures to take to protect yourself and your website.

Show Notes:
  • [00:40] - When James was at university he saw that Google said they would pay anybody that could hack their website. He thought that sounded like fun and spent a huge amount of time doing that.
  • [01:02] - Now James works at PortSwigger and researches new techniques to hack websites.
  • [01:11] - Bounty programs are where a company wants to make sure their product or website doesn't get hacked by malicious people so they go out and publicly say that anyone is welcome to try and hack their website. If you are successful and you don't do any damage, but you tell them how you did it they will pay you for it and then fix it.
  • [03:45] - Pen testing is the classic approach to securing your website where you pay a consultant to spend one or two weeks trying to hack your website.
  • [05:14] - It is totally worth it to get that third party view. Developers often can't find problems with their own products.
  • [06:13] - If you want to find a vulnerability on a website you need to use an attack technique.
  • [07:15] - These days they see a lot of cross-site scripting vulnerabilities and it's the most common one they see.
  • [07:37] - One of the most common causes of high impact breaches is access control issues.
  • [08:45] - James shares the biggest data breach they were able to do during their testing.
  • [10:31] - Try to use a framework whenever possible, because it makes things like sequel injection less likely to happen.
  • [11:01] - The standard approach after you make the website is to try to get someone else to look at it.
  • [11:27] - With Wordpress, it is very important to keep it up to date, install as few plug-ins as possible, and choose a good password.
  • [14:08] - Use as few browser extensions as possible to avoid possible malware issues.
  • [15:25] - Most people are not being personally targeted by hackers so the threats that most people need to watch out for are things that can be automated.
  • [16:10] - If you are using the same password on multiple websites you are going to get hacked.
  • [17:02] - A common misconception is that if you have a strong unique password then it doesn't matter if you reuse it.
  • [18:03] - James uses websites with the assumption that all the data I give this website is going to end up public at some point.
  • [18:45] - Provide the minimum information possible.
  • [20:19] - James shares his all-time favorite story.
  • [22:33] - If an entity builds their security around detecting when people are attacking them then running a bug bounty would be harmful because they have no idea who is legitimate or hostile. If your website is on the internet, it is being attacked.
  • [23:35] - When you are being attacked, it is important to know that it most likely isn't personal.

Thanks for joining us on Easy Prey. Be sure to subscribe to our podcast on iTunes and leave a nice review.

Links and Resources:

Avsnitt(321)

Art Heists

Art Heists

The world of art theft looks glamorous in the movies, but the reality is far more complicated. From multi-million dollar forgery schemes to undercover FBI operations recovering stolen national treasur...

29 Apr 37min

The Power of Prediction

The Power of Prediction

We make predictions all the time including about the weather, about traffic, about what someone is going to say next. It feels natural, even rational. But when algorithms start making predictions abou...

22 Apr 39min

Privacy vs Reality

Privacy vs Reality

Online security advice often sounds simple until you actually try to follow it. Between password managers, privacy settings, and data brokers, protecting yourself can start to feel like a full-time jo...

15 Apr 58min

Wired to Trust

Wired to Trust

It's easy to think scams only work when someone misses something obvious. In reality, most of them don't look obvious at the start. They show up as normal situations with just enough friction to notic...

8 Apr 41min

Intimate Partner Fraud

Intimate Partner Fraud

Most scams leave a digital trail. A fake email, a spoofed number, a fraudulent website. You can trace them, report them, sometimes even reverse them. But what happens when the scam has no digital trai...

1 Apr 45min

Identity without Passwords

Identity without Passwords

Every day, employees at hotels, restaurants, and resorts across the country are doing exactly what they were hired to do: being warm, responsive, and eager to help. It's what makes hospitality work. I...

25 Mars 38min

When Cybercrime Gets Personal

When Cybercrime Gets Personal

Most security breaches don't begin with sophisticated code or elaborate technical exploits. They begin with a phone call, a convincing email, or someone at a help desk who just wanted to be helpful. T...

18 Mars 45min

Stopping Phone Scams

Stopping Phone Scams

Phone scams get dismissed as background noise or just annoying interruptions and unknown numbers with robotic voices we learn to ignore. But behind that noise is an industry built on psychology, autom...

11 Mars 45min

Populärt inom Politik & nyheter

aftonbladet-krim
rss-krimstad
p3-krim
svenska-fall
spar
aftonbladet-daily
flashback-forever
politiken
rss-sanning-konsekvens
rss-expressen-dok
motiv
rss-vad-fan-hande
rss-krimreportrarna
blenda-2
ett-rent-noje
grans
kungligt
rss-aftonbladet-krim
svd-ledarredaktionen
rss-frandfors-horna