<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0" encoding="UTF-8" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:admin="http://webns.net/mvcb/" xmlns:atom="http://www.w3.org/2005/Atom/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:fireside="http://fireside.fm/modules/rss/fireside">
  <channel>
    <fireside:hostname>web01.fireside.fm</fireside:hostname>
    <fireside:genDate>Wed, 22 Apr 2026 07:01:50 -0500</fireside:genDate>
    <generator>Fireside (https://fireside.fm)</generator>
    <title>TechSNAP - Episodes Tagged with “Shodan”</title>
    <link>https://techsnap.systems/tags/shodan</link>
    <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
    <description>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</description>
    <language>en-us</language>
    <itunes:type>episodic</itunes:type>
    <itunes:subtitle>Systems, Network, and Administration Podcast. </itunes:subtitle>
    <itunes:author>Jupiter Broadcasting</itunes:author>
    <itunes:summary>Systems, Network, and Administration Podcast. Every two weeks TechSNAP covers the stories that impact those of us in the tech industry, and all of us that follow it. Every episode we dedicate a portion of the show to answer audience questions, discuss best practices, and solving your problems.
</itunes:summary>
    <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
    <itunes:explicit>no</itunes:explicit>
    <itunes:owner>
      <itunes:name>Jupiter Broadcasting</itunes:name>
      <itunes:email>chris@jupiterbroadcasting.com</itunes:email>
    </itunes:owner>
<itunes:category text="News">
  <itunes:category text="Tech News"/>
</itunes:category>
<item>
  <title>Episode 361: It's All in the Log</title>
  <link>https://techsnap.systems/361</link>
  <guid isPermaLink="false">60c0569a-55b4-446f-bf42-6d017d933f4f</guid>
  <pubDate>Thu, 29 Mar 2018 08:00:00 -0700</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/60c0569a-55b4-446f-bf42-6d017d933f4f.mp3" length="24152919" type="audio/mpeg"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
</itunes:subtitle>
  <itunes:duration>32:49</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.
Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more! 
</description>
  <content:encoded>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>Embarrassing flaws get exposed when the logs get reviewed, Atlanta city government gets shut down by Ransomware, and the cleverest little Android malware you’ll ever meet.</p>

<p>Plus we go from a hacked client to a Zero-day discovery, answer some questions, ask a few, and more!</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes" rel="nofollow" href="https://www.mac4n6.com/blog/2018/3/21/uh-oh-unified-logs-in-high-sierra-1013-show-plaintext-password-for-apfs-encrypted-external-volumes-via-disk-utilityapp">Unified Logs in High Sierra (10.13) Show Plaintext Password for APFS Encrypted External Volumes</a> &mdash; My verification test is below. Note that it gets stored in on-disk, collected logs (non-volatile logs).</li><li><a title="Thousands of servers found leaking 750MB worth of passwords and keys" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/thousands-of-servers-found-leaking-750-mb-worth-of-passwords-and-keys/">Thousands of servers found leaking 750MB worth of passwords and keys</a> &mdash; Leaky etcd servers could be a boon to data thieves and ransomware scammers.</li><li><a title="Atlanta city government systems down due to ransomware attack" rel="nofollow" href="https://arstechnica.com/information-technology/2018/03/atlanta-city-government-systems-down-due-to-ransomware-attack/">Atlanta city government systems down due to ransomware attack</a> &mdash; FBI called in as some city services are interrupted, employees told to turn off PCs.</li><li><a title="Android malware found inside apps downloaded 500,000 times | ZDNet" rel="nofollow" href="http://www.zdnet.com/article/android-malware-found-inside-apps-downloaded-500000-times/">Android malware found inside apps downloaded 500,000 times | ZDNet</a> &mdash;  Cybercriminals have distributed malware to hundreds of thousands of Android users by hiding it inside a series of apparently harmless apps.</li><li><a title="From hacked client to 0day discovery" rel="nofollow" href="https://security.infoteam.ch/en/blog/posts/from-hacked-client-to-0day-discovery.html">From hacked client to 0day discovery</a> &mdash; The client’s account had been blocked because it was spotted sending spam. Once connected to the service, it was clear that the monthly quota of the account was almost reached and that the latest emails sent shown on the dashboard had content that were clearly spam.</li><li><a title="Listener Feedback from Jeff S" rel="nofollow" href="https://pastebin.com/kbBuE71Z">Listener Feedback from Jeff S</a></li><li><a title="Listener Feedback from Tyler" rel="nofollow" href="https://pastebin.com/cPNmQ1JR">Listener Feedback from Tyler</a></li></ul>]]>
  </itunes:summary>
</item>
<item>
  <title>Episode 354: Here Come the Script Kiddies</title>
  <link>https://techsnap.systems/354</link>
  <guid isPermaLink="false">e2e1b46b-2f05-465f-821b-95680dc0cda0</guid>
  <pubDate>Thu, 01 Feb 2018 18:00:00 -0800</pubDate>
  <author>Jupiter Broadcasting</author>
  <enclosure url="https://aphid.fireside.fm/d/1437767933/95197d05-40d6-4e68-8e0b-2f586ce8dc55/e2e1b46b-2f05-465f-821b-95680dc0cda0.mp3" length="38049693" type="audio/mp3"/>
  <itunes:episodeType>full</itunes:episodeType>
  <itunes:author>Jupiter Broadcasting</itunes:author>
  <itunes:subtitle>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</itunes:subtitle>
  <itunes:duration>51:59</itunes:duration>
  <itunes:explicit>no</itunes:explicit>
  <itunes:image href="https://media24.fireside.fm/file/fireside-images-2024/podcasts/images/9/95197d05-40d6-4e68-8e0b-2f586ce8dc55/cover.jpg?v=4"/>
  <description>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.
Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.
</description>
  <content:encoded>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </content:encoded>
  <itunes:summary>
    <![CDATA[<p>AutoSploit has the security industry in a panic, so we give it a go. To our surprise we discover systems at the DOD, Amazon, and other places vulnerable to this automated attack. We’ll tell you all about it, and what these 400 lines of Python known as AutoSploit really do.</p>

<p>Plus injecting arbitrary waveforms into Alexa and Google Assistant commands, making WordPress bulletproof, and how to detect and prevent excessive port scan attacks.</p><p>Sponsored By:</p><ul><li><a rel="nofollow" href="https://do.co/snap">Digital Ocean</a>: <a rel="nofollow" href="https://do.co/snap">Apply our promo snapocean after you create your account, and get a $10 credit.</a> Promo Code: snapocean</li><li><a rel="nofollow" href="http://techsnap.ting.com">Ting</a>: <a rel="nofollow" href="http://techsnap.ting.com">Save $25 off a device, or get $25 in service credits!</a> Promo Code: Visit techsnap.ting.com</li><li><a rel="nofollow" href="http://ixsystems.com/techsnap">iXSystems</a>: <a rel="nofollow" href="http://ixsystems.com/techsnap">Get a system purpose built for you.</a> Promo Code: Tell them we sent you!</li></ul><p>Links:</p><ul><li><a title="Audio Adversarial Examples" rel="nofollow" href="https://nicholas.carlini.com/code/audio_adversarial_examples/">Audio Adversarial Examples</a> &mdash; We have constructed targeted audio adversarial examples on speech-to-text transcription neural networks: given an arbitrary waveform, we can make a small perturbation that when added to the original waveform causes it to transcribe as any phrase we choose.</li><li><a title="Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type" rel="nofollow" href="https://hotforsecurity.bitdefender.com/blog/keylogger-found-on-thousands-of-wordpress-based-sites-stealing-every-keypress-as-you-type-19501.html">Keylogger found on thousands of WordPress-based sites, stealing every keypress as you type</a> &mdash; But, in a twist, this particular attack isn’t just interested in mining Monero. While the website’s front-end is digging for cryptocurrencies, the back-end is secretly hosting a keylogger designed to steal unsuspecting users’ login credentials.</li><li><a title="Qubes Air: Generalizing the Qubes Architecture | Qubes OS" rel="nofollow" href="https://www.qubes-os.org/news/2018/01/22/qubes-air/">Qubes Air: Generalizing the Qubes Architecture | Qubes OS</a> &mdash; Qubes Air is the next step on our roadmap to making the concept of “Security through Compartmentalization” applicable to more scenarios. It is also an attempt to address some of the biggest problems and weaknesses plaguing the current implementation of Qubes, specifically the difficulty of deployment and virtualization as a single point of failure. While Qubes-as-a-Service is one natural application that could be built on top of Qubes Air, it is certainly not the only one. We have also discussed running Qubes over clusters of physically isolated devices, as well as various hybrid scenarios. I believe the approach to security that Qubes has been implementing for years will continue to be valid for years to come, even in a world of apps-as-a-service.</li><li><a title="Making network authentication simple in a Bring Your Own Device environment" rel="nofollow" href="https://medium.com/@anatole.beuzon/making-network-authentication-simple-in-a-bring-your-own-device-environment-9080baf39617">Making network authentication simple in a Bring Your Own Device environment</a> &mdash; In this article, we explore in depth the challenges we faced regarding compatibility, security, and user experience, and the solutions we came up with. We explain how we combined 802.1X authentication (wired &amp; wireless) and per-subscriber VLANs to offer our users a quality Internet experience.</li><li><a title="“Autosploit” tool sparks fears of empowered “script kiddies”" rel="nofollow" href="https://arstechnica.com/information-technology/2018/02/threat-or-menace-autosploit-tool-sparks-fears-of-empowered-script-kiddies/">“Autosploit” tool sparks fears of empowered “script kiddies”</a> &mdash;  "AutoSploit attempts to automate the exploitation of remote hosts."</li><li><a title="AutoSploit: Automated Mass Exploiter" rel="nofollow" href="https://github.com/NullArray/AutoSploit">AutoSploit: Automated Mass Exploiter</a> &mdash; Clone the repo. Or deploy via Docker.</li><li><a title="How To Use psad to Detect Network Intrusion Attempts" rel="nofollow" href="https://www.digitalocean.com/community/tutorials/how-to-use-psad-to-detect-network-intrusion-attempts-on-an-ubuntu-vps">How To Use psad to Detect Network Intrusion Attempts</a> &mdash; The key to using psad effectively is to configure danger levels and email alerts appropriately, and then follow up on any problems. This tool, coupled with other intrusion detection resources like tripwire can provide fairly good coverage to be able to detect intrusion attempts.</li><li><a title="Portainer: Simple management UI for Docker" rel="nofollow" href="https://github.com/portainer/portainer">Portainer: Simple management UI for Docker</a></li><li><a title="What is iSCSI (Internet Small Computer System Interface)" rel="nofollow" href="http://searchstorage.techtarget.com/definition/iSCSI">What is iSCSI (Internet Small Computer System Interface)</a></li></ul>]]>
  </itunes:summary>
</item>
  </channel>
</rss>
