Exploring Information Security - Timothy De Block   /     How to build a malicious link clicker

Description

In this clicking on that link episode of the Exploring Information Security podcast, Daniel Ebbutt and Kyle Andrus join me to discuss how to build a machine that is used to click on malicious links.Daniel (@notdanielebbutt) and Kyle (@chaoticflaws) are two of the people I go to when I need to have a better understanding of what a malicious link does. They're passion for clicking on links is out of this world. They also provide some really good insights into the work of clicking on links most people shouldn't. I asked if they'd be willing to walk me through building out a machine that could help me do what they do. They kindly obliged and thus another open mic podcast is born.In this episode we discuss:How to click on a malicious linkWhat we can learn from clicking on a malicious linkWhat the best setup is for clicking on a malicious linkWhat to do with that information [RSS Feed] [iTunes]

Summary

Daniel (@notdanielebbutt) and Kyle (@chaoticflaws) are two of the people I go to when I need to have a better understanding of what a malicious link does. They're passion for clicking on links is out of this world. They also provide some really good insights into the work of clicking on links most people shouldn't. I asked if they'd be willing to walk me through building out a machine that could help me do what they do. They kindly obliged and thus another open mic podcast is born.

Subtitle
Daniel Ebbutt and Kyle Andrus join me to discuss how to build a machine that is used to click on malicious links.
Duration
00:40:59
Publishing date
2018-04-02 00:00
Link
http://www.timothydeblock.com/eis/2018/4/1/how-to-build-a-malicious-link-clicker
Contributors
  With Daniel Ebbutt and Kyle Andrus
author  
Enclosures
http://static1.squarespace.com/static/52ebedcae4b0ad4aad060b4a/t/5abd962d758d46a7b617d1e8/1522374258718/EIS-ep-132-malicious-link-clicker.mp3
audio/mpeg